ACM Computing Survey 2018

ACM Computing Survey 2018

  1. Approximate Communication: Techniques for Reducing Communication Bottlenecks in Large-Scale Parallel Systems

  2. 近似通信:在大型并行系统中减少通信瓶颈的技术

  3. Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research

  4. 分析和分类的形状变化的界面设计和基于应用程序的研究

  5. A Survey on Online Judge Systems and Their Applications
    3.一项关于在线法官系统及其应用的调查

  6. Metamorphic Testing: A Review of Challenges and Opportunities

  7. 变质测试:对挑战和机遇的回顾

  8. A Survey on the Usage of Eye-Tracking in Computer Programming

  9. 眼球追踪技术在计算机程序设计中的应用研究

  10. Survey on Access Control for Community-Centered Collaborative Systems

  11. 以社区为中心的协同系统的访问控制研究

  12. Quality Control in Crowdsourcing: A Survey of Quality Attributes, Assessment Techniques, and Assurance Actions

  13. 众包中的质量控制:质量属性、评估技术和保证行动的调查

  14. HPC Cloud for Scientific and Business Applications: Taxonomy, Vision, and Research Challenges

  15. 用于科学和商业应用的HPC云:分类、视觉和研究挑战

  16. On Fault Detection and Diagnosis in Robotic Systems

  17. 机器人系统故障检测与诊断

  18. Multimedia Big Data Analytics: A Survey

  19. 多媒体大数据分析:一项调查

  20. Exiting the Risk Assessment Maze: A Meta-Survey

  21. 走出风险评估迷宫:一项荟萃调查

  22. A Comprehensive Taxonomy of Fragmentation and Allocation Techniques in Distributed Database Design

  23. 分布式数据库设计中碎片和分配技术的综合分类

  24. Augmentation Techniques for Mobile Cloud Computing: A Taxonomy, Survey, and Future Directions

  25. 移动云计算的扩展技术:分类、调查和未来方向

  26. Multi-Robot Assembly Strategies and Metrics

  27. 多机器人装配策略和指标

  28. A Review and Assessment Framework for Mobile-Based Emergency Intervention Apps

  29. 基于手机的紧急干预应用程序的审查和评估框架

  30. Analysis of Online Social Network Connections for Identification of Influential Users: Survey and Open Research Issues

  31. 在线社交网络连接识别有影响力的用户分析:调查和公开研究问题

  32. Automatic Software Repair: A Bibliography

  33. 软件自动修复:参考书目

  34. Objectives and State-of-the-Art of Location-Based Social Network Recommender Systems

  35. 目标和最先进的基于位置的社会网络推荐系统

  36. Underwater Wireless Sensor Networks: A New Challenge for Topology Control–Based Systems

  37. 水下无线传感器网络:基于拓扑控制系统的新挑战

  38. A Study on Garbage Collection Algorithms for Big Data Environments
    20.大数据环境下的垃圾收集算法研究

  39. A Survey of Techniques for Automatically Sensing the Behavior of a Crowd

  40. 对自动感知人群行为的技术的调查

  41. A Systematic Review of Cloud Modeling Languages

  42. 云建模语言的系统回顾

  43. A Checkpoint of Research on Parallel I/O for High-Performance Computing

  44. 高性能计算并行I/O的一个研究点

  45. Network Structure Inference, A Survey: Motivations, Methods, and Applications

  46. 网络结构推论,调查:动机,方法和应用

  47. Facial Expression Analysis under Partial Occlusion: A Survey

  48. 局部遮挡下的面部表情分析:一项调查

  49. Survey and Analysis of Kernel and Userspace Tracers on Linux: Design, Implementation, and Overhead

  50. Linux上内核和用户空间跟踪程序的调查和分析:设计、实现和开销

  51. Are We Ready to Drive Software-Defined Networks? A Comprehensive Survey on Management Tools and Techniques

  52. 我们准备好驱动软件定义的网络了吗?关于管理工具和技术的全面调查

  53. Evaluating Computational Creativity: An Interdisciplinary Tutorial

  54. 评估计算创造力:一个跨学科的教程

  55. Large-Scale Indexing, Discovery, and Ranking for the Internet of Things (IoT)

  56. 物联网的大规模索引、发现和排名

  57. A Survey of Modelling Trends in Temporal GIS
    30.时态GIS建模趋势研究综述

  58. Practical Secure Computation Outsourcing: A Survey

  59. 实用的安全计算外包:一个调查

  60. Detection and Resolution of Rumours in Social Media: A Survey

  61. 社会媒体中谣言的发现与解决:一项调查

  62. Recent Advancements in Event Processing

  63. 事件处理的最新进展

  64. Survey on Load-Balancing Methods in 802.11 Infrastructure Mode Wireless Networks for Improving Quality of Service

  65. 802.11基础设施无线网络中负载均衡方法的研究

  66. Community Discovery in Dynamic Networks: A Survey

  67. 动态网络中的社区发现:一项调查

  68. The Privacy Implications of Cyber Security Systems: A Technological Survey

  69. 网络安全系统的隐私含义:技术调查

  70. Visual SLAM and Structure from Motion in Dynamic Environments: A Survey

  71. 动态环境中运动的视觉冲击与结构:综述

  72. Omission of Quality Software Development Practices: A Systematic Literature Review

  73. 质量软件开发实践的遗漏:一个系统的文献综述

  74. Edge-Oriented Computing Paradigms: A Survey on Architecture Design and System Management

  75. 面向边缘的计算范例:架构设计和系统管理的调查

  76. A Survey on NoSQL Stores

  77. 关于NoSQL存储的调查

  78. Using Genetic Algorithms in Test Data Generation: A Critical Systematic Mapping

  79. 利用遗传算法生成测试数据:一个关键的系统映射

  80. A Survey of Sensors in Healthcare Workflow Monitoring

  81. 医疗工作流程监控中传感器的研究综述

  82. A Comprehensive Perspective on Pilot-Job Systems

  83. 试点工作制度的综合视角

  84. GeoStreams: A Survey

  85. GeoStreams:一项调查

  86. Content-Based Music Information Retrieval (CB-MIR) and Its Applications toward the Music Industry: A Review

  87. 基于内容的音乐信息检索(CB-MIR)及其在音乐工业中的应用:综述

  88. Current and Future Trends in Mobile Device Forensics: A Survey

  89. 移动设备取证的当前和未来趋势:调查

  90. A Survey on Multidimensional Scaling

  91. 多维标度的研究

  92. A Survey of Random Forest Based Methods for Intrusion Detection Systems

  93. 基于随机森林的入侵检测方法综述

  94. Co-Simulation: A Survey

  95. 联合仿真:一项调查

  96. A Survey of Symbolic Execution Techniques

  97. 符号执行技术的概述

  98. A Survey on Routing in Anonymous Communication Protocols

  99. 匿名通信协议路由的研究

  100. A Survey of Network Traffic Anonymisation Techniques and Implementations

  101. 网络流量匿名化技术和实现的调查

  102. Provenance Analytics for Workflow-Based Computational Experiments: A Survey

  103. 基于工作流的计算实验的起源分析:调查

  104. A Survey of End-System Optimizations for High-Speed Networks

  105. 高速网络终端系统优化研究综述

  106. A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems

  107. 入侵检测系统中入侵警报分析的系统映射研究

  108. Toolflows for Mapping Convolutional Neural Networks on FPGAs: A Survey and Future Directions

  109. 用于在fpga上映射卷积神经网络的工具流:综述和未来方向

  110. Technical Privacy Metrics: A Systematic Survey

  111. 技术隐私度量:一个系统的调查

  112. Measuring Software Process: A Systematic Mapping Study

  113. 软件过程度量:一个系统的映射研究

  114. A Taxonomy of Software-Defined Networking (SDN)-Enabled Cloud Computing

  115. 支持SDN的云计算的分类

  116. Scalable Graph Processing Frameworks: A Taxonomy and Open Challenges

  117. 可伸缩的图形处理框架:分类法和开放挑战

  118. A Survey and Taxonomy of Self-Aware and Self-Adaptive Cloud Autoscaling Systems

  119. 自感知和自适应云自动标度系统的研究与分类

  120. Graph Summarization Methods and Applications: A Survey

  121. 图形摘要方法与应用:综述

  122. Reproducibility in Scientific Computing

  123. 在科学计算中的再现性

  124. Continuous Spatial Query Processing: A Survey of Safe Region Based Techniques

  125. 连续空间查询处理:基于安全区域的技术综述

  126. Deep Learning for Biometrics: A Survey

  127. 生物特征识别的深度学习:一项调查

  128. Sequence-Aware Recommender Systems
    66 序列感知推荐系统

  129. A Survey on Malicious Domains Detection through DNS Data Analysis
    67 基于 DNS 数据分析的恶意域名检测综述

  130. Voice Disguise in Automatic Speaker Recognition
    68 自动说话人识别中的语音伪装

  131. Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms
    69 谁看守望者: 对现代平台上系统和二进制分析的当前最先进技术、工具和方法的安全重点审查

  132. Systematically Understanding the Cyber Attack Business: A Survey
    70 系统理解网络攻击业务: 一项调查

  133. Activity Recognition with Evolving Data Streams: A Review
    71 进化数据流的活动识别: 综述

  134. FPGA Dynamic and Partial Reconfiguration: A Survey of Architectures, Methods, and Applications
    72 FPGA 动态和部分重新配置: 架构、方法和应用综述

  135. Auto-Scaling Web Applications in Clouds: A Taxonomy and Survey
    73 云中的自动缩放 Web 应用程序: 分类和调查

  136. Analytics for the Internet of Things: A Survey
    74 物联网分析: 一项调查

  137. Large-Scale Ontology Matching: State-of-the-Art Analysis
    75 大规模本体匹配: 最新分析

  138. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
    76 信息物理系统中基于物理的攻击检测综述

  139. Group Deviation Detection Methods: A Survey
    77 群体偏差检测方法: 综述

  140. Evaluation in Contextual Information Retrieval: Foundations and Recent Advances within the Challenges of Context Dynamicity and Data Privacy
    78 上下文信息检索中的评估: 上下文动态性和数据隐私挑战中的基础和最新进展

  141. A Survey on Homomorphic Encryption Schemes: Theory and Implementation
    79 同态加密方案综述: 理论与实现

  142. Deception Techniques in Computer Security: A Research Perspective
    80 计算机安全中的欺骗技术: 研究视角

  143. A Survey of Machine Learning for Big Code and Naturalness
    81 大代码和自然的机器学习综述

  144. Scalable Metadata Management Techniques for Ultra-Large Distributed Storage Systems -- A Systematic Review
    82 超大型分布式存储系统的可扩展元数据管理技术 -- 系统综述

  145. Spatio-Temporal Data Mining: A Survey of Problems and Methods
    83 时空数据挖掘: 问题与方法综述

  146. RDF Data Storage and Query Processing Schemes: A Survey
    84 RDF 数据存储和查询处理方案: 综述

  147. A Survey on Automatic Detection of Hate Speech in Text
    85 文本中仇恨语音的自动检测综述

  148. Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art
    86 虹膜识别的演示攻击检测: 最先进的评估

  149. Automated Regression Test Case Generation for Web Application: A Survey
    87 Web 应用程序的自动回归测试用例生成: 一项调查

  150. A Critical Review of Proactive Detection of Driver Stress Levels Based on Multimodal Measurements

  151. 基于多模态测量的驾驶员压力水平的主动检测技术综述

  152. A Survey on Gait Recognition

  153. 步态识别研究综述

  154. A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization

  155. 入侵检测与响应优化的博弈论方法研究综述

  156. Is Multimedia Multisensorial? - A Review of Mulsemedia Systems

  157. 多媒体Multisensorial吗?-多媒体系统综述

  158. A Survey on Deep Learning: Algorithms, Techniques, and Applications

  159. 深度学习:算法、技术和应用

  160. A Survey of Methods for Explaining Black Box Models

  161. 解释黑箱模型的方法的调查

  162. Security of Distance-Bounding: A Survey

  163. 距离边界的安全性:调查

  164. Triclustering Algorithms for Three-Dimensional Data Analysis: A Comprehensive Survey

  165. 三维数据分析的三聚类算法:综述

  166. A Survey on Compiler Autotuning using Machine Learning

  167. 使用机器学习进行编译器自动调优的研究

  168. Knee Articular Cartilage Segmentation from MR Images: A Review

  169. 膝关节软骨MR图像的分割:综述

  170. Host-Based Intrusion Detection System with System Calls: Review and Future Trends

  171. 基于主机的入侵检测系统与系统调用:综述与未来趋势

  172. Engagement in HCI: Conception, Theory and Measurement

  173. 参与HCI:概念,理论和测量

  174. A Survey on Self-Adaptive Security for Large-scale Open Environments
    100.大型开放环境自适应安全性研究综述

  175. Survey on Computational Trust and Reputation Models

  176. 计算信任和声誉模型调查

  177. Machine Learning in Network Centrality Measures: Tutorial and Outlook

  178. 机器学习在网络中的中心度量:教程和展望

  179. A Systematic Review for Smart City Data Analytics

  180. 智能城市数据分析的系统综述

  181. A Taxonomy and Future Directions for Sustainable Cloud Computing: 360 Degree View

  182. 可持续云计算的分类和未来方向:360度视图

  183. A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade

  184. 未来一代云计算的宣言:未来十年的研究方向

  185. Relation Extraction Using Distant Supervision: A Survey

  186. 利用远程监控提取关系:调查

  187. A Survey of Cloudlet-Based Mobile Augmentation Approaches for Resource Optimization

  188. 基于云的移动增强方法在资源优化中的应用

  189. A Survey and Taxonomy of Core Concepts and Research Challenges in Cross-Platform Mobile Development

  190. 跨平台移动开发的核心概念和研究挑战的调查和分类

  191. A Survey of Petri Nets Slicing

  192. Petri网切片调查

  193. Machine Learning for Survival Analysis: A Survey

  194. 生存分析的机器学习:一项调查

  195. Towards the Decentralised Cloud: Survey on Approaches and Challenges for Mobile, Ad hoc, and Edge Computing

  196. 向分散云:移动计算、特别计算和边缘计算的方法和挑战调查

  197. A Survey on Brain Biometrics

  198. 关于大脑生物特征的调查

  199. “Dave...I can assure you ...that it’s going to be all right ...” A Definition, Case for, and Survey of Algorithmic Assurances in Human-Autonomy Trust Relationships

  200. “戴夫…我可以向你保证……一切都会好起来的…“人类自治信任关系中算法保证的定义、案例和调查”

  201. Integrated NFV/SDN Architectures: A Systematic Literature Review

  202. 综合NFV/SDN架构:系统的文献综述

  203. A Survey of On-Chip Optical Interconnects

  204. 片上光学互连的研究进展

  205. A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration

  206. 物联网通信协议及相关雾和云计算集成挑战综述

  207. A Perspective Analysis of Handwritten Signature Technology

  208. 手写签名技术的前景分析

  209. A Comprehensive Survey of Deep Learning for Image Captioning

  210. 图像字幕深度学习的综合研究

  211. Cloud Brokerage: A Systematic Survey

  212. 云经纪:系统调查

  213. Issues and Challenges of Load Balancing Techniques in Cloud Computing: A Survey

  214. 云计算中负载平衡技术的问题和挑战:调查

  215. Methods and Tools for Policy Analysis

  216. 政策分析的方法和工具

  217. Recent Developments in Cartesian Genetic Programming and its Variants

  218. 笛卡尔遗传规划及其变体的最新发展

  219. Parallel Computing of Support Vector Machines: A Survey

  220. 支持向量机的并行计算:综述

  221. Synthesis of Facial Expressions in Photographs: Characteristics, Approaches, and Challenges

  222. 照片中面部表情的合成:特征、方法和挑战

  223. Formal Approaches to Secure Compilation: A Survey of Fully Abstract Compilation and Related Work

  224. 安全编译的正式方法:对完全抽象编译和相关工作的概述

  225. A Survey of Communication Performance Models for High-Performance Computing

  226. 高性能计算的通信性能模型综述

  227. Linked Vocabulary Recommendation Tools for Internet of Things: A Survey

  228. 物联网相关词汇推荐工具:调查

  229. STRAM: Measuring the Trustworthiness of Computer-Based Systems

  230. 度量基于计算机的系统的可靠性

  231. Post-Quantum Lattice-Based Cryptography Implementations: A Survey

  232. 基于后量子格的密码学实现:调查

  233. Demystifying Arm TrustZone: A Comprehensive Survey

  234. 解密Arm信任区:全面调查

  235. A Survey on Agent-based Simulation Using Hardware Accelerators

  236. 基于agent的硬件加速器仿真研究综述

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 202,980评论 5 476
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 85,178评论 2 380
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 149,868评论 0 336
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 54,498评论 1 273
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 63,492评论 5 364
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 48,521评论 1 281
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 37,910评论 3 395
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 36,569评论 0 256
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 40,793评论 1 296
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 35,559评论 2 319
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 37,639评论 1 329
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 33,342评论 4 318
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 38,931评论 3 307
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 29,904评论 0 19
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 31,144评论 1 259
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 42,833评论 2 349
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 42,350评论 2 342

推荐阅读更多精彩内容