skip to main content
Volume 50, Issue 1January 2018
Editor:
  • Sartaj Sahni
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0360-0300
EISSN:1557-7341
Bibliometrics
Skip Table Of Content Section
survey
Public Access
Data-Driven Techniques in Disaster Information Management
Article No.: 1, pp 1–45https://doi.org/10.1145/3017678

Improving disaster management and recovery techniques is one of national priorities given the huge toll caused by man-made and nature calamities. Data-driven disaster management aims at applying advanced data collection and analysis technologies to ...

survey
Business Process Variability Modeling: A Survey
Article No.: 2, pp 1–45https://doi.org/10.1145/3041957

It is common for organizations to maintain multiple variants of a given business process, such as multiple sales processes for different products or multiple bookkeeping processes for different countries. Conventional business process modeling languages ...

survey
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence
Article No.: 3, pp 1–38https://doi.org/10.1145/3041956

Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence areas. This ...

survey
Evaluation of Knowledge Gaps in Mathematical Applications of Thermal Image Processing Techniques for Fire Prevention
Article No.: 4, pp 1–43https://doi.org/10.1145/3009967

In this article, we present literature reviews on fire prevention methods, especially in mining industries, using thermal image processing techniques. Fire protection systems are crucial because of the increased loss of human lives due to coal fires and ...

survey
A Survey on Data-Flow Testing
Article No.: 5, pp 1–35https://doi.org/10.1145/3020266

Data-flow testing (DFT) is a family of testing strategies designed to verify the interactions between each program variable’s definition and its uses. Such a test objective of interest is referred to as a def-use pair. DFT selects test data with respect ...

survey
Public Access
A Survey of Timing Channels and Countermeasures
Article No.: 6, pp 1–39https://doi.org/10.1145/3023872

A timing channel is a communication channel that can transfer information to a receiver/decoder by modulating the timing behavior of an entity. Examples of this entity include the interpacket delays of a packet stream, the reordering packets in a packet ...

survey
A Survey of Qualitative Spatial and Temporal Calculi: Algebraic and Computational Properties
Article No.: 7, pp 1–39https://doi.org/10.1145/3038927

Qualitative spatial and temporal reasoning (QSTR) is concerned with symbolic knowledge representation, typically over infinite domains. The motivations for employing QSTR techniques include exploiting computational properties that allow efficient ...

survey
Open Access
Presentation Attack Detection Methods for Face Recognition Systems: A Comprehensive Survey
Article No.: 8, pp 1–37https://doi.org/10.1145/3038924

The vulnerability of face recognition systems to presentation attacks (also known as direct attacks or spoof attacks) has received a great deal of interest from the biometric community. The rapid evolution of face recognition systems into real-time ...

survey
Hypervideos and Interactive Multimedia Presentations
Article No.: 9, pp 1–34https://doi.org/10.1145/3038925

Hypervideos and interactive multimedia presentations allow the creation of fully interactive and enriched video. It is possible to organize video scenes in a nonlinear way. Additional information can be added to the video ranging from short descriptions ...

survey
Public Access
Smart Computing and Sensing Technologies for Animal Welfare: A Systematic Review
Article No.: 10, pp 1–27https://doi.org/10.1145/3041960

Animals play a profoundly important and intricate role in our lives today. Dogs have been human companions for thousands of years, but now they work to assist the disabled, and in combat and search and rescue situations. Farm animals are a critical part ...

survey
Hashing Techniques: A Survey and Taxonomy
Article No.: 11, pp 1–36https://doi.org/10.1145/3047307

With the rapid development of information storage and networking technologies, quintillion bytes of data are generated every day from social networks, business transactions, sensors, and many other domains. The increasing data volumes impose significant ...

survey
Understanding Human-Machine Networks: A Cross-Disciplinary Survey
Article No.: 12, pp 1–35https://doi.org/10.1145/3039868

In the current hyperconnected era, modern Information and Communication Technology (ICT) systems form sophisticated networks where not only do people interact with other people, but also machines take an increasingly visible and participatory role. Such ...

survey
Surviving the Web: A Journey into Web Session Security
Article No.: 13, pp 1–34https://doi.org/10.1145/3038923

In this article, we survey the most common attacks against web sessions, that is, attacks that target honest web browser users establishing an authenticated session with a trusted web application. We then review existing security solutions that prevent ...

survey
CASE Tool Support for Variability Management in Software Product Lines
Article No.: 14, pp 1–45https://doi.org/10.1145/3034827

Software product lines (SPL) aim at reducing time-to-market and increasing software quality through extensive, planned reuse of artifacts. An essential activity in SPL is variability management, i.e., defining and managing commonality and variability ...

survey
A Survey on Financial Applications of Metaheuristics
Article No.: 15, pp 1–23https://doi.org/10.1145/3054133

Modern heuristics or metaheuristics are optimization algorithms that have been increasingly used during the last decades to support complex decision-making in a number of fields, such as logistics and transportation, telecommunication networks, ...

survey
Public Access
Control-Flow Integrity: Precision, Security, and Performance
Article No.: 16, pp 1–33https://doi.org/10.1145/3054924

Memory corruption errors in C/C++ programs remain the most common source of security vulnerabilities in today’s systems. Control-flow hijacking attacks exploit memory corruption vulnerabilities to divert program execution away from the intended control ...

Subjects

Comments