default search action
ACM Computing Surveys, Volume 44
Volume 44, Number 1, January 2012
- Claudio Carpineto, Giovanni Romano:
A Survey of Automatic Query Expansion in Information Retrieval. 1:1-1:50 - David Zhang, Wangmeng Zuo, Feng Yue:
A Comparative Study of Palmprint Recognition Algorithms. 2:1-2:37 - Hanne Riis Nielson, Flemming Nielson, Henrik Pilegaard:
Flow Logic for Process Calculi. 3:1-3:39 - Songbo Song, Hassnaa Moustafa, Hossam Afifi:
A Survey on Personalized TV and NGN Services through Context-Awareness. 4:1-4:18 - Robert Wójcik, Andrzej Jajszczyk:
Flow Oriented Approaches to QoS Assurance. 5:1-5:37
Volume 44, Number 2, February 2012
- Manuel Egele, Theodoor Scholte, Engin Kirda, Christopher Kruegel:
A survey on automated dynamic malware-analysis techniques and tools. 6:1-6:42 - Kevin Crowston, Kangning Wei, James Howison, Andrea Wiggins:
Free/Libre open-source software development: What we know and what we do not know. 7:1-7:35 - Pedro Antunes, Valeria Herskovic, Sergio F. Ochoa, José A. Pino:
Structuring dimensions for collaborative systems evaluation. 8:1-8:28 - Godwin Caruana, Maozhen Li:
A survey of emerging approaches to spam filtering. 9:1-9:27
Volume 44, Number 3, June 2012
- Jan Midtgaard:
Control-flow analysis of functional programs. 10:1-10:33 - Hossain Shahriar, Mohammad Zulkernine:
Mitigating program security vulnerabilities: Approaches and challenges. 11:1-11:46 - Josep Silva:
A vocabulary of program slicing-based techniques. 12:1-12:41 - Joonho Kong, Sung Woo Chung, Kevin Skadron:
Recent thermal management techniques for microprocessors. 13:1-13:42 - Syed M. S. Islam, Mohammed Bennamoun, Robyn A. Owens, Rowan Davies:
A review of recent advances in 3D ear- and expression-invariant face biometrics. 14:1-14:34 - Gianpaolo Cugola, Alessandro Margara:
Processing flows of information: From data stream to complex event processing. 15:1-15:62 - John Hatcliff, Gary T. Leavens, K. Rustan M. Leino, Peter Müller, Matthew J. Parkinson:
Behavioral interface specification languages. 16:1-16:58 - Yves Younan, Wouter Joosen, Frank Piessens:
Runtime countermeasures for code injection attacks against C and C++ programs. 17:1-17:28
Volume 44, Number 4, August 2012
- Lukasz Budzisz, Johan Garcia, Anna Brunström, Ramon Ferrús:
A taxonomy and survey of SCTP research. 18:1-18:36 - Robert Biddle, Sonia Chiasson, Paul C. van Oorschot:
Graphical passwords: Learning from the first twelve years. 19:1-19:41 - Wilson Wong, Wei Liu, Mohammed Bennamoun:
Ontology learning from text: A look back and into the future. 20:1-20:36 - Huaiyu Liu, Mic Bowman, Francis Chang:
Survey of state melding in virtual worlds. 21:1-21:25 - Pedro Gonnet:
A review of error estimation in adaptive quadrature. 22:1-22:36 - Cigdem Sengul, Aline Carneiro Viana, Artur Ziviani:
A survey of adaptive services to cope with dynamics in wireless self-organizing networks. 23:1-23:35 - Paolo Bellavista, Antonio Corradi, Mario Fanelli, Luca Foschini:
A survey of context data distribution for mobile ubiquitous systems. 24:1-24:45 - Meng Wang, Bingbing Ni, Xian-Sheng Hua, Tat-Seng Chua:
Assistive tagging: A survey of multimedia tagging with human-computer joint exploration. 25:1-25:24 - Luca Cittadini, Giuseppe Di Battista, Massimo Rimondini:
On the stability of interdomain routing. 26:1-26:40
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.