Last update:
Tue Feb 4 06:45:01 MST 2025
Aaron Finerman An Editorial Note . . . . . . . . . . . 1--1 William S. Dorn Editor's Preview\ldots . . . . . . . . . 2--5 Saul Rosen Electronic Computers: a Historical Survey . . . . . . . . . . . . . . . . . 7--36 Robert F. Rosin Supervisory and Monitor Systems . . . . 37--54 R. L. Glass An Elementary Discussion of Compiler/Interpreter Writing . . . . . . 55--77
William S. Dorn Editor's Preview \ldots . . . . . . . . 81--84 Lance J. Hoffman Computers and Privacy: a Survey . . . . 85--103 J. M. McKinney A Survey of Analytical Time-Sharing Models . . . . . . . . . . . . . . . . . 105--116 George G. Dodd Elements of Data Management Systems . . 117--133
William S. Dorn Editor's Preview \ldots . . . . . . . . 135--138 M. V. Wilkes The Growth of Interest in Microprogramming: a Literature Survey 139--145 Azriel Rosenfeld Picture Processing by Computer . . . . . 147--176 William S. Dorn Editor's Postview \ldots . . . . . . . . 177--177
William S. Dorn Editor's Preview \ldots . . . . . . . . 179--182 William Kent Assembler-Language Macroprogramming: a Tutorial Oriented Toward the IBM 360 . . 183--196 Robert F. Rosin Contemporary Concepts of Microprogramming and Emulation . . . . . 197--212 J. D. Aron Information Systems in Perspective . . . 213--236
William S. Dorn Editor's Preview \ldots . . . . . . . . 1--3 T. A. Dolotta Functional Specifications for Typewriter-Like Time-Sharing Terminals 5--31 David Beech A Structural View of PL/I . . . . . . . 33--64 Doron J. Cohen and C. C. Gotlieb A List Structure Form of Grammars for Syntactic Analysis . . . . . . . . . . . 65--82
William S. Dorn Editor's Preview \ldots . . . . . . . . 83--87 Sally Yeates Sedelow The Computer in the Humanities and Fine Arts . . . . . . . . . . . . . . . . . . 89--110 H. Hellerman and H. J. Smith, Jr. Throughput Analysis of Some Idealized Input, Output, and Compute Overlap Configurations . . . . . . . . . . . . . 111--118 Ned Chapin Flowcharting With the ANSI Standard: a Tutorial . . . . . . . . . . . . . . . . 119--146
William S. Dorn Editor's Preview \ldots . . . . . . . . 147--152 Peter J. Denning Virtual Memory . . . . . . . . . . . . . 153--189 M. H. MacDougall Computer System Simulation: an Introduction . . . . . . . . . . . . . . 191--209 Cecil L. Smith Digital Control of Industrial Processes 211--241 William S. Dorn Editor's Postview \ldots . . . . . . . . 243--243 Albert C. Christoph Letter to the Editor: ``Assembler-Language Macroprogramming: A Tutorial Oriented Toward the IBM 360'' 243--244 William Kent Letter to the Editor: ``Assembler-Language Macroprogramming: A Tutorial Oriented Toward the IBM 360'' 244--244 Robert F. Rosin Erratum: ``Contemporary Concepts of Microprogramming and Emulation'' . . . . 244--244
Donald E. Knuth Von Neumann's First Computer Program . . 247--260 Lyle B. Smith A Survey of Interactive Graphical Systems for Mathematics . . . . . . . . 261--301
Robin Williams A Survey of Data Structures for Computer Graphics Systems . . . . . . . . . . . . 1--21 Caxton C. Foster An Unclever Time-Sharing System . . . . 23--48
C. E. Price Table Lookup Techniques . . . . . . . . 49--64 E. G. Coffman and M. J. Elphick and A. Shoshani System Deadlocks . . . . . . . . . . . . 67--78
Henry C. Lucas, Jr. Performance Evaluation and Monitoring 79--91 Andries van Dam and David E. Rice On-line Text Editing: a Survey . . . . . 93--114 Henry F. Ledgard Ten Mini-Languages: a Study of Topical Issues in Programming Languages . . . . 115--146
W. A. Martin Sorting . . . . . . . . . . . . . . . . 147--174 Peter J. Denning Third Generation Computer Systems . . . 175--216
Peter J. Denning A Note on Paging Drum Efficiency . . . . 1--3 Peter Wegner The Vienna Definition Language . . . . . 5--63
W. R. Schucany and Paul D. Minton and B. Stanley Shannon, Jr. A Survey of Statistical Packages . . . . 65--79 J. Nievergelt and J. C. Farrar What Machines Can and Cannot Do . . . . 81--96 Bernard Elspas and Karl N. Levitt and Richard J. Waldinger and Abraham Waksman An Assessment of Techniques for Proving Program Correctness . . . . . . . . . . 97--147
Eric A. Weiss An Appreciation . . . . . . . . . . . . 147--147 Leon Presser and John R. White Linkers and Loaders . . . . . . . . . . 149--167 C. A. R. Hoare and D. C. S. Allison Incomputability . . . . . . . . . . . . 169--178 Richard C. Holt Some Deadlock Properties of Computer Systems . . . . . . . . . . . . . . . . 179--196
Byron W. Stutzman Data Communication Control Procedures 197--220 Bruce H. Barnes A Programmer's View of Automata . . . . 221--239 Theodore C. Willoughby Staffing the MIS Function . . . . . . . 241--259
Elliott I. Organick Editorial Policy \ldots . . . . . . . . 1--3 J. J. Horning and B. Randell Process Structuring . . . . . . . . . . 5--30 J. L. Baer A Survey of Some Theoretical Aspects of Multiprocessing . . . . . . . . . . . . 31--80
Azriel Rosenfeld Progress in Picture Processing: 1969--71 81--108 Udo W. Pooch and Al Nieder A Survey of Indexing Techniques for Sparse Matrices . . . . . . . . . . . . 109--133
William W. White A Status Report on Computing Algorithms for Mathematical Programming . . . . . . 135--166 J. Daniel Couger Evolution of Business System Analysis Techniques . . . . . . . . . . . . . . . 167--198
E. M. Timmreck Computer Selection Methodology . . . . . 200--222 Per Brinch Hansen Concurrent Programming Concepts . . . . 223--245
Ivan E. Sutherland and Robert F. Sproull and Robert A. Schumacker A Characterization of Ten Hidden-Surface Algorithms . . . . . . . . . . . . . . . 1--55 Herbert Freeman Computer Processing of Line-Drawing Images . . . . . . . . . . . . . . . . . 57--97
A. V. Aho and S. C. Johnson LR Parsing . . . . . . . . . . . . . . . 99--124 Udo W. Pooch Translation of Decision Tables . . . . . 125--151
Daniel G. Bobrow and Bertram Raphael New Programming Languages for Artificial Intelligence Research . . . . . . . . . 153--174 Dennis G. Severance Identifier Search Mechanisms: a Survey and Generalized Model . . . . . . . . . 175--194 J. Nievergelt Binary Search Trees and File Organisation . . . . . . . . . . . . . . 195--207
Peter J. Denning Guest Editor's Overview \ldots . . . . . 209--211 P. J. Brown Programming and Documenting Software Projects . . . . . . . . . . . . . . . . 213--220 J. M. Yohe An Overview of Programming Practices . . 221--245 Niklaus Wirth On the Composition of Well-Structured Programs . . . . . . . . . . . . . . . . 247--259 Donald E. Knuth Structured Programming with go to Statements . . . . . . . . . . . . . . . 261--301 Brian W. Kernighan and P. J. Plauger Programming Style: Examples and Counterexamples . . . . . . . . . . . . 303--319 Udo W. Pooch Corrigendum: ``Translation of Decision Tables'' . . . . . . . . . . . . . . . . 321--321
Elliott I. Organick Editor's Overview . . . . . . . . . . . 1--1 W. D. Maurer and T. G. Lewis Hash Table Methods . . . . . . . . . . . 5--19 Leon Presser Multiprogramming Coordination . . . . . 21--44 Calvin N. Mooers Computer Software and Copyright . . . . 45--72
John W. Boyse and David R. Warn A Straightforward Model for Computer Performance Prediction . . . . . . . . . 73--93 Ira W. Cotton Microeconomics and the Market for Computer Services . . . . . . . . . . . 95--111
J. C. Huang An Approach to Program Testing . . . . . 113--128 Stephen R. Kimbleton and G. Michael Schneider Computer Communication Networks: Approaches, Objectives, and Performance Considerations . . . . . . . . . . . . . 129--173
Elliott I. Organick Editorial Policy Update . . . . . . . . 173--173 Suhas S. Patil Guest Editor's Note \ldots . . . . . . . 175--175 Robert M. Keller Look-Ahead Processors . . . . . . . . . 177--195 George A. Anderson and E. Douglas Jensen Computer Interconnection Structures: Taxonomy, Characteristics, and Examples 197--213 Kenneth J. Thurber and Leon D. Wald Associative and Parallel Processors . . 215--255 Elliott I. Organick Editor's Note . . . . . . . . . . . . . 257--257 Leon Presser Corrigendum: ``Multiprogramming Coordination'' . . . . . . . . . . . . . 257--257
E. H. Sibley Guest Editor's Introduction: The Development of Data-Base Technology . . 1--5 James P. Fry and Edgar H. Sibley Evolution of Data-Base Management Systems . . . . . . . . . . . . . . . . 7--42 Donald D. Chamberlin Relational Data-Base Management Systems 43--66 Robert W. Taylor and Randall L. Frank CODASYL Data-Base Management Systems . . 67--103 D. C. Tsichritzis and F. H. Lochovsky Hierarchical Data-Base Management: a Survey . . . . . . . . . . . . . . . . . 105--123 Ann S. Michaels and Benjamin Mittman and C. Robert Carlson A Comparison of the Relational and CODASYL Approaches to Data-Base Management . . . . . . . . . . . . . . . 125--151
Elliott I. Organick Editorial Overview . . . . . . . . . . . 153--153 Andrew S. Tanenbaum A Tutorial on Algol 68 . . . . . . . . . 155--190 Michael Marcotty and Henry F. Ledgard and Gregor V. Bochmann A Sampler of Formal Definitions . . . . 191--276 S. S. Reddi and E. A. Feustel A Conceptual Framework for Computer Architecture . . . . . . . . . . . . . . 277--300
Raymond T. Yeh Guest Editorial \ldots . . . . . . . . . 301--303 Lloyd D. Fosdick and Leon J. Osterweil Data Flow Analysis in Software Reliability . . . . . . . . . . . . . . 305--330 Sidney L. Hantler and James C. King An Introduction to Proving the Correctness of Programs . . . . . . . . 331--353
Raymond T. Yeh Guest Editorial \ldots . . . . . . . . . 355--357 Peter J. Denning Fault Tolerant Operating Systems . . . . 359--389 H. Hecht Fault-Tolerant Software for Real-Time Applications . . . . . . . . . . . . . . 391--407 Theodore A. Linden Operating System Structures to Support Security and Reliable Software . . . . . 409--445
Tse-Yun Feng Guest Editorial: an Overview of Parallel Processors and Processing . . . . . . . 1--2 S. S. Yau and H. S. Fung Associative Processor Architecture --- a Survey . . . . . . . . . . . . . . . . . 3--27 David J. Kuck A Survey of Parallel Machine Organization and Programming . . . . . . 29--59 C. V. Ramamoorthy and H. F. Li Pipeline Architecture . . . . . . . . . 61--102 Philip H. Enslow, Jr. Multiprocessor Organization --- a Survey 103--129
Peter J. Denning About This Issue \ldots . . . . . . . . 131--131 Peter J. Denning Editorial Policy . . . . . . . . . . . . 133--135 Robert Sedgewick Permutation Generation Methods . . . . . 137--164 Roy Levin and Peter J. Denning Surveyor's Forum: an Amplification on Hydra's Capabilities . . . . . . . . . . 165--165 James Donahue Surveyor's Forum: a Criticism of Sampler 166--167 Michael Marcotty and Henry F. Ledgard Surveyor's Forum: a Criticism of Sampler 167--168 Michael Marcotty and Henry F. Ledgard and Gregor V. Bochmann Corrigendum: ``A Sampler of Formal Definitions'' . . . . . . . . . . . . . 168--168
Peter J. Denning About This Issue \ldots . . . . . . . . 171--172 Mario J. Gonzalez, Jr. Deterministic Processor Scheduling . . . 173--204 Lester Lipsky and J. D. Church Applications of a Queueing Network Model for a Computer System . . . . . . . . . 205--221 James L. Peterson Petri Nets . . . . . . . . . . . . . . . 223--252 J. K. Iliffe Surveyor's Forum: an Error Recovery . . 253--254 Jack B. Dennis Surveyor's Forum: An Error Recovery . . 254--254 Peter J. Denning Surveyor's Forum: an Error Recovery . . 254--255 Andrew S. Tanenbaum Corrigenda: ``A Tutorial on Algol 68'' 255--256
Peter J. Denning About This Issue \ldots . . . . . . . . 257--257 D. G. Severance and J. V. Carlis A Practical Approach to Selecting Record Access Paths . . . . . . . . . . . . . . 259--272 William M. Taggart, Jr. and Marvin O. Tharp A Survey of Information Requirements Analysis Techniques . . . . . . . . . . 273--290 Bruce Weide A Survey of Analysis Techniques for Discrete Algorithms . . . . . . . . . . 291--313 Robert Sedgewick Corrigenda: ``Permutation Generation Methods'' . . . . . . . . . . . . . . . 314--314 Thomas W. Parsons Surveyor's Forum: a Forgotten Generation of Permutations . . . . . . . . . . . . 315--315 I. R. MacCallum Surveyor's Forum: a Forgotten Generation of Permutations . . . . . . . . . . . . 316--317
Peter J. Denning About This Issue \ldots . . . . . . . . 1--2 Ann Fitzsimmons and Tom Love A Review and Evaluation of Software Science . . . . . . . . . . . . . . . . 3--18 John Leslie King and Edward L. Schrems Cost-Benefit Analysis in Information Systems Development and Operation . . . 19--34 Erik Sandewall Programming in an Interactive Environment: the ``\sc Lisp'' Experience 35--71 Ronald J. Srodawa Positive Experiences with a Multiprocessing System . . . . . . . . . 73--82 Montgomery Phister, Jr. Surveyor's Forum: Putting Costs Through Effectively . . . . . . . . . . . . . . 83--83 Lester Lipsky and James D. Church Surveyor's Forum: Putting Costs Through Effectively: Author's Reply . . . . . . 83--84 H. J. Genrich and P. S. Thiagarajan Surveyor's Forum: Net Progress . . . . . 84--85 James Peterson Surveyor's Forum: Net Progress: Author's Reply . . . . . . . . . . . . . . . . . 85--85
Peter J. Denning About This Issue \ldots . . . . . . . . 87--87 Peter J. Denning Editorial Policy . . . . . . . . . . . . 89--92 N. C. Davis and S. E. Goodman The Soviet Bloc's Unified System of Computers . . . . . . . . . . . . . . . 93--122 B. Randell and P. A. Lee and P. C. Treleaven Reliability Issues in Computing System Design . . . . . . . . . . . . . . . . . 123--165 Joost S. M. Verhofstad Recovery Techniques for Database Systems 167--195 Marvin V. Zelkowitz Perspectives in Software Engineering . . 197--216 Nathan Relles Surveyor's Forum: Devising the Rhetoric of Rhetorical Devices . . . . . . . . . 217--217
G. Scott Graham Guest Editor's Overview\ldots Queuing Network Models of Computer System Performance . . . . . . . . . . . . . . 219--224 Peter J. Denning and Jeffrey P. Buzen The Operational Analysis of Queueing Network Models . . . . . . . . . . . . . 225--261 Clifford A. Rose A Measurement Procedure for Queueing Network Models of Computer Systems . . . 263--280 K. Mani Chandy and Charles H. Sauer Approximate Methods for Analyzing Queueing Network Models of Computing Systems . . . . . . . . . . . . . . . . 281--317 Jeffrey P. Buzen A Queueing Network Model of MVS . . . . 319--331 Y. Bard The VM/370 Performance Predictor . . . . 333--342 J. W. Wong Queueing Network Modeling of Computer Communication Networks . . . . . . . . . 343--351 Richard R. Muntz Queueing Networks: a Critique of the State of the Art and Directions for the Future . . . . . . . . . . . . . . . . . 353--359 John Gaschnig Surveyor's Forum: Experimental Analysis Discretely Done . . . . . . . . . . . . 361--361 Bruce W. Weide Surveyor's Forum: Experimental Analysis Discretely Done: Author's Reply . . . . 361--362
Peter J. Denning About This Issue \ldots . . . . . . . . 363--364 William M. Newman and Andries van Dam Recent Efforts Towards Graphics Standardization . . . . . . . . . . . . 365--380 James C. Michener and Andries van Dam Functional Overview of the Core System with Glossary . . . . . . . . . . . . . 381--387 R. Daniel Bergeron and Peter R. Bono and James D. Foley Graphics Programming Using the Core System . . . . . . . . . . . . . . . . . 389--443 James C. Michener and James D. Foley Some Major Issues in the Design of the Core Graphics System . . . . . . . . . . 445--463 Ingrid Carlbom and Joseph Paciorek Planar Geometric Projections and Viewing Transformations . . . . . . . . . . . . 465--502 Paul B. Moranda Surveyor's Forum: Is Software Science Hard? . . . . . . . . . . . . . . . . . 503--504 T. P. Baker Surveyor's Forum: Is Software Science Hard? . . . . . . . . . . . . . . . . . 504--504 Ann Fitzsimmons and Tom Love Surveyor's Forum: Is Software Science Hard? . . . . . . . . . . . . . . . . . 504--505 Richard M. Stallman Surveyor's Forum: Structured Editing with a Lisp . . . . . . . . . . . . . . 505--507 Erik Sandewall Surveyor's Forum: Structured Editing with a \sc Lisp . . . . . . . . . . . . 507--508 C. V. Ramamoorthy and H. F. Li Corrigenda: ``Pipeline Architecture'' 508--508
Peter J. Denning About This Issue \ldots . . . . . . . . 1--1 Dan Bernard Management Issues in Cooperative Computing . . . . . . . . . . . . . . . 3--17 Norman I. Badler and Stephen W. Smoliar Digital Representations of Human Movement . . . . . . . . . . . . . . . . 19--38 Subrata Dasgupta The Organization of Microprogram Stores 39--65 Edward A. Bender Surveyor's Forum: a Recurrent Problem 67--68 Bruce W. Weide Surveyor's Forum: a Recurrent Problem 68--68 Irving K. Wendel Surveyor's Forum: The Real Costs of Software . . . . . . . . . . . . . . . . 68--68 Marvin Zelkowitz Surveyor's Forum: The Real Costs of Software . . . . . . . . . . . . . . . . 69--69 Yonathan Bard Surveyor's Forum: Stochastic or Operational? . . . . . . . . . . . . . . 69--70 Jeffrey P. Buzen and Peter J. Denning Surveyor's Forum: Stochastic or Operational? . . . . . . . . . . . . . . 70--70 Jeffrey P. Buzen Surveyor's Forum: a Predictable Problem 71--72 Richard R. Muntz Surveyor's Forum: a Predictable Problem 72--72
Adele Goldberg About This Issue \ldots . . . . . . . . 73--74 Adele Goldberg Editorial Policy . . . . . . . . . . . . 75--78 Jacques Cohen Non-De\-ter\-min\-is\-tic Algorithms . . 79--94 Francisco Walter Molina A Survey of Resource Directive Decomposition in Mathematical Programming . . . . . . . . . . . . . . 95--104 Lynn J. McKell and James V. Hansen and Lester E. Heitger Charging for Computing Resources . . . . 105--120 Douglas Comer Ubiquitous B-Tree . . . . . . . . . . . 121--137 George Nagy and Sharad Wagle Geographic Data Processing . . . . . . . 139--181
Adele Goldberg About This Issue \ldots . . . . . . . . 183--183 Won Kim Relational Database Systems . . . . . . 187--211 A. G. Dale Database Management Systems Development in the USSR . . . . . . . . . . . . . . 213--226 Dorothy E. Denning and Peter J. Denning Data Security . . . . . . . . . . . . . 227--249 Siba N. Mohanty Models and Measurements for Quality Assessment of Software . . . . . . . . . 251--275 Robert Fenichel Surveyor's Forum: Heads I Win, Tails You Lose . . . . . . . . . . . . . . . . . . 277--277 Stuart H. Zweben Surveyor's Forum: Heads I Win, Tails You Lose . . . . . . . . . . . . . . . . . . 277--278 H. Christiaen Surveyor's Forum: Projecting Problems 278--279 Ingrid Carlbom Surveyor's Forum: Projecting Problems 279--280 Ingrid Carlbom and Joseph Paciorek Corrigenda: ``Geometric Projection and Viewing Transformations'' . . . . . . . 280--280
Adele J. Goldberg About This Issue \ldots . . . . . . . . 281--281 Peter J. Denning Editor's Overview --- Special Section on Data Encryption . . . . . . . . . . . . 283--283 Abraham Lempel Cryptology in Transition . . . . . . . . 285--303 Gustavus J. Simmons Symmetric and Asymmetric Encryption . . 305--330 Gerald J. Popek and Charles S. Kline Encryption and Secure Computer Networks 331--356 Herbert S. Bright and Richard L. Enison Quasi-Random Number Sequences from a Long-Period TLP Generator with Remarks on Application to Cryptography . . . . . 357--370 Gary H. Sockut and Robert P. Goldberg Database Reorganization --- Principles and Practice . . . . . . . . . . . . . . 371--395 Jon Louis Bentley and Jerome H. Friedman Data Structures for Range Searching . . 397--409 David S. Alberts Surveyor's Forum: a Question of Transition . . . . . . . . . . . . . . . 411--411 Marvin V. Zelkowitz Surveyor's Forum: a Question of Transition . . . . . . . . . . . . . . . 411--412 Douglas Comer Surveyor's Forum: The Tree Branches . . 412--412 Maylun Buck-Lew Surveyor's Forum: a Dance Prelude . . . 412--413
Adele J. Goldberg About This Issue \ldots . . . . . . . . 1--2 Fred J. Maryanski Backend Database Systems . . . . . . . . 3--25 Clarence A. Ellis and Gary J. Nutt Office Information Systems and Computer Science . . . . . . . . . . . . . . . . 27--60 Rob Kling Social Analyses of Computing: Theoretical Perspectives in Recent Empirical Research . . . . . . . . . . . 61--110 E. B. Fernandez Surveyor's Forum: Related Information 111--112 Won Kim Surveyor's Forum: Related Information 112--112 Oris D. Friesen Surveyor's Forum: Related Information 112--113
Adele J. Goldberg About This Issue \ldots . . . . . . . . 115--116 Adele J. Goldberg Editorial Policy . . . . . . . . . . . . 117--120 Anita K. Jones and Peter Schwarz Experience Using Multiprocessor Systems --- a Status Report . . . . . . . . . . 121--165 C. K. Wong Minimizing Expected Head Movement in One-Dimensional and Two-Dimensional Mass Storage Systems . . . . . . . . . . . . 167--178 Toby J. Teorey and James P. Fry The Logical Record Access Approach to Database Design . . . . . . . . . . . . 179--211 Lee D. Erman and Frederick Hayes-Roth and Victor R. Lesser and D. Raj Reddy The Hearsay-II Speech-Understanding System: Integrating Knowledge to Resolve Uncertainty . . . . . . . . . . . . . . 213--253 Stanley Dunn Surveyor's Forum: Working on Interpretations . . . . . . . . . . . . 255--255 Siba Mohanty Surveyor's Forum: Working on Interpretations . . . . . . . . . . . . 256--256
Adele J. Goldberg About This Issue \ldots . . . . . . . . 257--258 Stanley Habib Special Section on Microprogramming . . 259--259 David Landskov and Scott Davidson and Bruce Shriver and Patrick W. Mallett Local Microcode Compaction Techniques 261--294 Subrata Dasgupta Some Aspects of High-Level Microprogramming . . . . . . . . . . . . 295--323 Wesley A. Clark From Electron Mobility to Logical Structure: a View of Integrated Circuits 325--356 Walter Wilson Surveyor's Forum: Determining a Search 357--358 Jacques Cohen Surveyor's Forum: Determining a Search 358--358
Adele J. Goldberg About This Issue \ldots . . . . . . . . 359--360 C. S. Wetherell Probabilistic Languages: a Review and Some Open Questions . . . . . . . . . . 361--379 Patrick A. V. Hall and Geoff R. Dowling Approximate String Matching . . . . . . 381--402 R. S. Bird Tabulation Techniques for Recursive Programs . . . . . . . . . . . . . . . . 403--417 George S. Lueker Some Techniques for Solving Recurrences 419--436 Aristides A. G. Requicha Representations for Rigid Solids: Theory, Methods, and Systems . . . . . . 437--464 Toby J. Teorey and James P. Fry Corrigenda: ``The Logical Record Access Approach to Database Design'' . . . . . 465--465
Thomas P. Moran Guest Editor's Introduction: an Applied Psychology of the User . . . . . . . . . 1--11 Phyllis Reisner Human Factors Studies of Database Query Languages: a Survey and Assessment . . . 13--31 David W. Embley and George Nagy Behavioral Aspects of Text Editors . . . 33--70 William B. Rouse Human-Computer Interaction in the Control of Dynamic Systems . . . . . . . 71--99 B. A. Sheil The Psychological Study of Programming 101--120 Richard E. Mayer The Psychology of How Novices Learn Computer Programming . . . . . . . . . . 121--141
Adele Goldberg About This Issue \ldots . . . . . . . . 143--144 Adele Goldberg Editorial Policy . . . . . . . . . . . . 145--148 Walter H. Kohler A Survey of Techniques for Synchronization and Recovery in Decentralized Computer Systems . . . . . 149--183 Philip A. Bernstein and Nathan Goodman Concurrency Control in Distributed Database Systems . . . . . . . . . . . . 185--221 Jim Gray and Paul McJones and Mike Blasgen and Bruce Lindsay and Raymond Lorie and Tom Price and Franco Putzolu and Irving Traiger The Recovery Manager of the System R Database Manager . . . . . . . . . . . . 223--242 R. S. Bird Surveyor's Forum: a Recurring Bug . . . 243--243 Helmut Richter Surveyor's Forum: a Recurring Bug . . . 243--243
Adele Goldberg About This Issue \ldots . . . . . . . . 245--245 Carl E. Landwehr Formal Models for Computer Security . . 247--278 Maureen Harris Cheheyl and Morrie Gasser and George A. Huff and Jonathan K. Millen Verifying Security . . . . . . . . . . . 279--339 Jacques Cohen Garbage Collection of Linked Data Structures . . . . . . . . . . . . . . . 341--367 Aristides A. G. Requicha Surveyor's Forum: an Update on SynthaVision . . . . . . . . . . . . . . 369--369 Herbert A. Steinberg Surveyor's Forum: an Update on SynthaVision . . . . . . . . . . . . . . 369--369 Douglas J. Keenan Surveyor's Forum: Generating Solutions 370--370 George S. Lueker Surveyor's Forum: Generating Solutions 370--370
Adele Goldberg About This Issue \ldots . . . . . . . . 371--372 Narendra Ahuja and B. J. Schachter Image Models . . . . . . . . . . . . . . 373--397 Sargur N. Srihari Representation of Three-Dimensional Digital Images . . . . . . . . . . . . . 399--424 Edward H. Frank and Robert F. Sproull Testing and Debugging Custom Integrated Circuits . . . . . . . . . . . . . . . . 425--451 Andrew S. Tanenbaum Network Protocols . . . . . . . . . . . 453--489 Christiane Floyd and Reinhard Keil and Erhard Nullmeier Surveyor's Forum: Augmentation or Dehumanization? . . . . . . . . . . . . 491--492 Thomas P. Moran Surveyor's Forum: Augmentation or Dehumanization? . . . . . . . . . . . . 492--493 Bruce Leverett Surveyor's Forum: Interpreting Experimental Data . . . . . . . . . . . 493--494 David W. Embley and George Nagy Surveyor's Forum: Interpreting Experimental Data . . . . . . . . . . . 494--494
Adele Goldberg About This Issue \ldots . . . . . . . . 1--2 Michael Brady Computational Approaches to Image Understanding . . . . . . . . . . . . . 3--71 Alan R. Feuer and Narain H. Gehani Comparison of the Programming Languages C and Pascal . . . . . . . . . . . . . . 73--92 Philip C. Treleaven and David R. Brownbridge and Richard P. Hopkins Data-Driven and Demand-Driven Computer Architecture . . . . . . . . . . . . . . 93--143 David P. Reed Surveyor's Forum: Recovering an Error 145--146 Walter H. Kohler Surveyor's Forum: Recovering an Error 146--147
Adele J. Goldberg About This Issue \ldots . . . . . . . . 149--150 Adele J. Goldberg Editorial Policy . . . . . . . . . . . . 151--157 W. Richards Adrion and Martha A. Branstad and John C. Cherniavsky Validation, Verification, and Testing of Computer Software . . . . . . . . . . . 159--192 William E. Howden Validation of Scientific Programs . . . 193--227 Douglas D. Dunlop and Victor R. Basili A Comparative Analysis of Functional Correctness . . . . . . . . . . . . . . 229--244 Frank W. Allen and Mary E. S. Loomis and Michael V. Mannino The Integrated Dictionary/Directory System . . . . . . . . . . . . . . . . . 245--286 Lawrence W. Dowdy and Derrell V. Foster Comparative Models of the File Assignment Problem . . . . . . . . . . . 287--313 Heinz Bender Surveyor's Forum: Technical Transactions 315--316 David Gifford Surveyor's Forum: Technical Transactions 316--316 Philip Bernstein and Nathan Goodman Surveyor's Forum: Technical Transactions 317--318
Adele J. Goldberg About This Issue \ldots . . . . . . . . 319--320 Norman Meyrowitz and Andries Van Dam Interactive Editing Systems: Part I . . 321--352 Norman Meyrowitz and Andries van Dam Interactive Editing Systems: Part II . . 353--415 Richard Furuta and Jeffrey Scofield and Alan Shaw Document Formatting Systems: Survey, Concepts, and Issues . . . . . . . . . . 417--472 Alan Jay Smith Cache Memories . . . . . . . . . . . . . 473--530
Adele J. Goldberg About This Issue \ldots . . . . . . . . 531--532 T. A. Marsland and M. Campbell Parallel Search of Strongly Ordered Game Trees . . . . . . . . . . . . . . . . . 533--551 Stephen T. Barnard and Martin A. Fischler Computational Stereo . . . . . . . . . . 553--572 Mahadevan Ganapathi and Charles N. Fischer and John L. Hennessy Retargetable Compiler Code Generation 573--592 Bernard M. E. Moret Decision Trees and Diagrams . . . . . . 593--623 James L. Peterson Surveyor's Forum: Idiomatic Programming 625--625 Alan R. Feuer and Narain H. Gehani Surveyor's Forum: Idiomatic Programming 625--626
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 1--2 Gregory R. Andrews and Fred B. Schneider Concepts and Notations for Concurrent Programming . . . . . . . . . . . . . . 3--43 Salvatore T. March Techniques for Structuring Database Records . . . . . . . . . . . . . . . . 45--79 J. (Yiannis) G. Kollias and Michalis Hatzopoulos Surveyor's Forum: The File Assignment Problem . . . . . . . . . . . . . . . . 81--82 Lawrence W. Dowdy and Derrell V. Foster Surveyor's Forum: The File Assignment Problem . . . . . . . . . . . . . . . . 82--82 Govind Sharma Surveyor's Forum: Image Models . . . . . 83--84 Narendra Ahuja and B. J. Schachter Surveyor's Forum: Image Models . . . . . 84--84
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 85--86 Anthony I. Wasserman Editorial Policy . . . . . . . . . . . . 87--94 George Broomell and J. Robert Heath Classification Categories and Historical Development of Circuit Switching Topologies . . . . . . . . . . . . . . . 95--133 Victor L. Voydock and Stephen T. Kent Security Mechanisms in High-Level Network Protocols . . . . . . . . . . . 135--171
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 173--174 Magdy S. Abadir and Hassan K. Reghbati Functional Testing of Semiconductor Random Access Memories . . . . . . . . . 175--198 H. Partsch and R. Steinbrüggen Program Transformation Systems . . . . . 199--236 Dana Angluin and Carl H. Smith Inductive Inference: Theory and Methods 237--269 Bennet P. Lientz Issues in Software Maintenance . . . . . 271--278 William A. Wulf and Joe Newcomer and Bruce Leverett and Rick Cattell and Paul Knueven Surveyor's Forum: Retargetable Code Generators . . . . . . . . . . . . . . . 279--280 M. Ganapathi and J. L. Hennessy and C. N. Fischer Surveyor's Forum: Retargetable Code Generators . . . . . . . . . . . . . . . 280--281 Christopher W. Fraser Surveyor's Forum: Retargetable Code Generators . . . . . . . . . . . . . . . 281--283 M. Ganapathi and J. L. Hennessy and C. N. Fischer Surveyor's Forum: Retargetable Code Generators . . . . . . . . . . . . . . . 283--284
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 285--286 Theo Haerder and Andreas Reuter Principles of Transaction Oriented Database Recovery . . . . . . . . . . . 287--317 John Leslie King Centralized versus decentralized computing:organizational considerations and management options . . . . . . . . . 319--349 D. L. Lee and F. H. Lochovsky Voice Response Systems . . . . . . . . . 351--374 M. Stella Atkins Surveyor's Forum: Notations for Concurrent Programming . . . . . . . . . 375--376 Gregory R. Andrews and Fred B. Schneider Surveyor's Forum: Notations for Concurrent Programming . . . . . . . . . 376--377 Gregory R. Andrews and Fred B. Schneider Corrigenda: ``Concepts and notations for concurrent programs'' . . . . . . . . . 377--377
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 1--2 William Stallings Local Networks . . . . . . . . . . . . . 3--41 James F. Kurose and Mischa Schwartz and Yechiam Yemini Multiple-Access Protocols and Time-Con\-strained Communication . . . . 43--70 Won Kim Highly Available Systems for Database Applications . . . . . . . . . . . . . . 71--98
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 99--100 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 101--102 Anthony I. Wasserman Editorial Policy . . . . . . . . . . . . 103--110 Matthias Jarke and Jürgen Koch Query Optimization in Database Systems 111--152 Hervé Gallaire and Jack Minker and Jean-Marie Nicolas Logic and Databases: a Deductive Approach . . . . . . . . . . . . . . . . 153--185 Hanan Samet The Quadtree and Related Hierarchical Data Structures . . . . . . . . . . . . 187--260
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 261--262 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 263--264 Ben Shneiderman Response Time and Display Rate in Human Performance with Computers . . . . . . . 265--285 Dina Bitton and David J. DeWitt and David K. Hsiao and Jaishankar Menon A Taxonomy of Parallel Sorting . . . . . 287--318 Michael J. Quinn and Narsingh Deo Parallel Graph Algorithms . . . . . . . 319--348
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 349--350 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 351--351 Liba Svobodova File Servers for Network-Based Distributed Systems . . . . . . . . . . 353--398 C. T. Yu and C. C. Chang Distributed Query Processing . . . . . . 399--433
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 1--2 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 3--4 Gopal K. Gupta and Ron Sacks-Davis and Peter E. Tischer A Review of Recent Developments in Solving ODEs . . . . . . . . . . . . . . 5--47 Christos Faloutsos Access Methods for Text . . . . . . . . 49--74 Paul J. Besl and Ramesh C. Jain Three-Dimensional Object Recognition . . 75--145
Curtis Abbott Guest Editor's Introduction to the Special Issue on Computer Music . . . . 147--151 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 153--154 Anthony I. Wasserman Editorial Policy . . . . . . . . . . . . 155--162 Curtis Roads Research in Music and Artificial Intelligence . . . . . . . . . . . . . . 163--190 John W. Gordon System Architectures for Computer Music 191--233 Gareth Loy and Curtis Abbott Programming Languages for Computer Music Synthesis, Performance, and Composition 235--265 Bruce W. Pennycook Computer-Music Interfaces: a Survey . . 267--289
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 291--292 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 293--294 James H. Hester and Daniel S. Hirschberg Self-Organizing Linear Search . . . . . 295--311 Matthias Jarke and Yannis Vassiliou A Framework for Choosing a Database Query Language . . . . . . . . . . . . . 313--340 Susan B. Davidson and Hector Garcia-Molina and Dale Skeen Consistency in Partitioned Networks . . 341--370
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 375--376 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 377--378 John S. Quarterman and Abraham Silberschatz and James L. Peterson 4.2BSD and 4.3BSD as Examples of the UNIX System . . . . . . . . . . . . . . 379--418 Andrew S. Tanenbaum and Robbert van Renesse Distributed Operating Systems . . . . . 419--470 Luca Cardelli and Peter Wegner On Understanding Types, Data Abstraction, and Polymorphism . . . . . 471--522
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 1--2 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 3--4 R. H. Perrott and A. Zarea-Aliabadi Supercomputer Languages . . . . . . . . 5--22 Zvi Galil Efficient Algorithms for Finding Maximum Matching in Graphs . . . . . . . . . . . 23--38 Jayadev Misra Distributed Discrete-Event Simulation 39--65 Roland T. Chin and Charles R. Dyer Model-Based Recognition in Robot Vision 67--108
Anthony I. Wasserman About This Issue \ldots . . . . . . . . 113--114 Anthony I. Wasserman About the Authors \ldots . . . . . . . . 115--116 Anthony I. Wasserman Editorial Policy . . . . . . . . . . . . 117--124 Nancy G. Leveson Software Safety: Why, What, and How . . 125--163 R. A. Hirschheim The Effect of \em A Priori Views on the Social Implications of Computing: The Case of Office Automation . . . . . . . 165--195 Toby J. Teorey and Dongqing Yang and James P. Fry A Logical Design Methodology for Relational Databases Using the Extended Entity-Relationship Model . . . . . . . 197--222
Salvatore T. March About This Issue \ldots . . . . . . . . 227--228 Salvatore T. March About the Authors \ldots . . . . . . . . 229--229 Ali Mili and Jules Desharnais and Jean Raymond Gagné Formal Models of Stepwise Refinement of Programs . . . . . . . . . . . . . . . . 231--276 Barbara G. Ryder and Marvin C. Paull Elimination Algorithms for Data Flow Analysis . . . . . . . . . . . . . . . . 277--316
Salvatore T. March About This Issue \ldots . . . . . . . . 319--319 Salvatore T. March About the Authors \ldots . . . . . . . . 321--321 C. Batini and M. Lenzerini and S. B. Navathe A Comparative Analysis of Methodologies for Database Schema Integration . . . . 323--364 Arthur H. Veen Dataflow Machine Architecture . . . . . 365--396
Salvatore T. March About This Issue \ldots . . . . . . . . 1--1 Salvatore T. March About the Authors \ldots . . . . . . . . 3--3 Kalle Lyytinen Different Perspectives on Information Systems: Problems and Solutions . . . . 5--46 Alfons Kemper and Mechtild Wallrath An Analysis of Geometric Modeling in Database Systems . . . . . . . . . . . . 47--91
Salvatore T. March About This Issue \ldots . . . . . . . . 93--93 Salvatore T. March About the Authors \ldots . . . . . . . . 95--95 Salvatore T. March Editorial Policy . . . . . . . . . . . . 97--104 Malcolm P. Atkinson and O. Peter Buneman Types and Persistence in Database Programming Languages . . . . . . . . . 105--190 Arie Segev Surveyor's Forum: Transitive Dependencies . . . . . . . . . . . . . . 191--192 Toby J. Teorey Surveyor's Forum: Transitive Dependencies . . . . . . . . . . . . . . 193--193 Ali Mili and Jules Desharnais and Jean Raymond Gagné Corrigendum: ``Formal Models of Stepwise Refinements of Programs'' . . . . . . . 195--195
Salvatore T. March About This Issue \ldots . . . . . . . . 197--198 Salvatore T. March About the Authors \ldots . . . . . . . . 199--199 Richard Hull and Roger King Semantic Database Modeling: Survey, Applications, and Research Issues . . . 201--260 Debra A. Lelewer and Daniel S. Hirschberg Data Compression . . . . . . . . . . . . 261--296
Salvatore T. March About This Issue \ldots . . . . . . . . 299--299 Salvatore T. March About the Authors \ldots . . . . . . . . 301--301 Edgar Knapp Deadlock Detection in Distributed Databases . . . . . . . . . . . . . . . 303--328 Carol Bergfeld Mills and Linda J. Weldon Reading Text from Computer Screens . . . 329--358
Salvatore T. March About This Issue \ldots . . . . . . . . 1--1 Salvatore T. March About the Authors \ldots . . . . . . . . 3--3 Hideaki Takagi Queuing Analysis of Polling Models . . . 5--28 Scott Danforth and Chris Tomlinson Type Theories and Object-Oriented Programming . . . . . . . . . . . . . . 29--72
Salvatore T. March About This Issue \ldots . . . . . . . . 73--73 Salvatore T. March About the Authors \ldots . . . . . . . . 75--75 Salvatore T. March Editorial Policy . . . . . . . . . . . . 77--84 R. J. Enbody and H. C. Du Dynamic Hashing Schemes . . . . . . . . 85--113 Kenneth L. Kraemer and John Leslie King Computer-Based Systems for Cooperative Work and Group Decision Making . . . . . 115--146
Salvatore T. March About This Issue \ldots . . . . . . . . 149--149 Salvatore T. March About the Authors \ldots . . . . . . . . 151--151 Joan Peckham and Fred Maryanski Semantic Data Models . . . . . . . . . . 153--189 Michael V. Mannino and Paicheng Chu and Thomas Sager Statistical Profile Estimation in Database Systems . . . . . . . . . . . . 191--221
Salvatore T. March About This Issue \ldots . . . . . . . . 223--224 Salvatore T. March About the Authors \ldots . . . . . . . . 225--225 Allen M. Johnson, Jr. and Miroslaw Malek Survey of Software Tools for Evaluating Reliability, Availability, and Serviceability . . . . . . . . . . . . . 227--269 Hanan Samet Hierarchical Representations of Collections of Small Rectangles . . . . 271--309
Salvatore T. March About This Issue \ldots . . . . . . . . 1--2 Salvatore T. March About the Authors \ldots . . . . . . . . 3--3 H. Rex Hartson and Deborah Hix Human-Computer Interface Development: Concepts and Systems for Its Management 5--92 Kevin Knight Unification: a Multidisciplinary Survey 93--124
Salvatore T. March About This Issue \ldots . . . . . . . . 125--126 Salvatore T. March About the Authors \ldots . . . . . . . . 127--127 Salvatore T. March Editorial Policy . . . . . . . . . . . . 129--136 Bruce Abramson Control Strategies for Two-Player Games 137--161 Thomas Ellman Explanation-Based Learning: a Survey of Programs and Perspectives . . . . . . . 163--221 Charles J. Colbourn and Paul C. van Oorschot Applications of Combinatorial Designs in Computer Science . . . . . . . . . . . . 223--250
Salvatore T. March About This Issue \ldots . . . . . . . . 251--251 Peter Wegner Guest Editor's Introduction to the Special Issue on Programming Language Paradigms . . . . . . . . . . . . . . . 253--258 Salvatore T. March About the Authors \ldots . . . . . . . . 259--260 Henri E. Bal and Jennifer G. Steiner and Andrew S. Tanenbaum Programming Languages for Distributed Computing Systems . . . . . . . . . . . 261--322 Nicholas Carriero and David Gelernter How to Write Parallel Programs: a Guide to the Perplexed . . . . . . . . . . . . 323--357 Paul Hudak Conception, Evolution, and Application of Functional Programming Languages . . 359--411 Ehud Shapiro The Family of Concurrent Logic Programming Languages . . . . . . . . . 413--510
Salvatore T. March About This Issue \ldots . . . . . . . . 511--512 Salvatore T. March About the Authors \ldots . . . . . . . . 513--513 Nabil R. Adam and John C. Wortmann Security-Control Methods for Statistical Databases: a Comparative Study . . . . . 515--556 Timothy Bell and Ian H. Witten and John G. Cleary Modeling for Text Compression . . . . . 557--591 Charles E. McDowell and David P. Helmbold Debugging Concurrent Programs . . . . . 593--622
Salvatore T. March About This Issue \ldots . . . . . . . . 1--2 Salvatore T. March About the Authors \ldots . . . . . . . . 3--3 A. J. van de Goor and C. A. Verruijt An Overview of Deterministic Functional RAM Chip Testing . . . . . . . . . . . . 5--33 Russell J. Abbott Resourceful Systems for Fault Tolerance, Reliability, and Safety . . . . . . . . 35--68
Salvatore T. March About This Issue \ldots . . . . . . . . 69--70 Salvatore T. March About the Authors \ldots . . . . . . . . 71--71 Salvatore T. March Editorial Policy . . . . . . . . . . . . 73--81 Raif O. Onvural Survey of Closed Queueing Networks with Blocking . . . . . . . . . . . . . . . . 83--121 Krzysztof Pawlikowski Steady-State Simulation of Queueing Processes: a Survey of Problems and Solutions . . . . . . . . . . . . . . . 123--170 Robert Mandl Surveyor's Forum: ``Applications of Combinatorial Designs in Computer Science'' . . . . . . . . . . . . . . . 171--171
Salvatore T. March About This Issue \ldots . . . . . . . . 173--173 Ahmed K. Elmagarmid and Calton Pu Introduction to the Special Issue on Heterogeneous Databases . . . . . . . . 175--178 Salvatore T. March About the Authors \ldots . . . . . . . . 179--181 Amit P. Sheth and James A. Larson Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases . . . . . . . . . . 183--236 Gomer Thomas and Glenn R. Thompson and Chin-Wan Chung and Edward Barkmeyer and Fred Carter and Marjorie Templeton and Stephen Fox and Berl Hartman Heterogeneous Distributed Database Systems for Production Use . . . . . . . 237--266 Witold Litwin and Leo Mark and Nick Roussopoulos Interoperability of Multiple Autonomous Databases . . . . . . . . . . . . . . . 267--293
Salvatore T. March About This Issue \ldots . . . . . . . . 295--296 Salvatore T. March About the Authors \ldots . . . . . . . . 297--297 Fred B. Schneider Implementing Fault-Tolerant Services Using the State Machine Approach: a Tutorial . . . . . . . . . . . . . . . . 299--319 Eliezer Levy and Abraham Silberschatz Distributed File Systems: Concepts and Examples . . . . . . . . . . . . . . . . 321--374 Randy H. Katz Toward a Unified Framework for Version Modeling in Engineering Databases . . . 375--408 Krzysztof Pawlikowski Corrigenda: ``Steady-State Simulation of Queueing Processes: A Survey of Problems and Solutions'' . . . . . . . . . . . . 409--409
Salvatore T. March About This Issue \ldots . . . . . . . . 1--2 Salvatore T. March About the Authors \ldots . . . . . . . . 3--3 David Goldberg What Every Computer Scientist Should Know About Floating-Point Arithmetic . . 5--48 Gregory R. Andrews Paradigms for Process Interaction in Distributed Programs . . . . . . . . . . 49--90 Roger S. Chin and Samuel T. Chanson Distributed, object-based programming systems . . . . . . . . . . . . . . . . 91--124 S. Sankar and D. S. Rosenblum Surveyor's Forum: Runtime Checking and Debugging of Formally Specified Programs 125--127
Salvatore T. March About This Issue \ldots . . . . . . . . 129--129 Salvatore T. March About the Authors \ldots . . . . . . . . 131--131 Salvatore T. March Editorial Policy . . . . . . . . . . . . 133--141 K. Shahookar and P. Mazumder VLSI Cell Placement Techniques . . . . . 143--220 Bandula W. Abeysundara and Ahmed E. Kamal High-Speed Local Area Networks and Their Performance: a Survey . . . . . . . . . 221--264
Salvatore T. March About This Issue \ldots . . . . . . . . 265--266 Salvatore T. March About the Authors \ldots . . . . . . . . 267--267 Naser S. Barghouti and Gail E. Kaiser Concurrency Control in Advanced Database Applications . . . . . . . . . . . . . . 269--317 Zvi Galil and Giuseppe F. Italiano Data Structures and Algorithms for Disjoint Set Union Problems . . . . . . 319--344 Franz Aurenhammer Voronoi Diagrams: a Survey of a Fundamental Geometric Data Structure . . 345--405 Lorenzo Strigini Surveyor's Forum: ``Resourceful Systems for Fault Tolerance, Reliability, and Safety'' . . . . . . . . . . . . . . . . 407--409 Russell Abbott Surveyor's Forum: ``Resourceful Systems for Fault Tolerance, Reliability, and Safety'' . . . . . . . . . . . . . . . . 409--411 David Goldberg Corrigendum: ``What Every Computer Scientist Should Know About Floating-Point Arithmetic'' . . . . . . 413--413
Salvatore T. March About This Issue \ldots . . . . . . . . 417--418 Salvatore T. March About the Authors \ldots . . . . . . . . 419--419 M. R. Stytz and G. Frieder and O. Frieder Three-Dimensional Medical Imaging: Algorithms and Computer Systems . . . . 421--499 L. Edwin McKenzie, Jr. and Richard Thomas Snodgrass Evaluation of Relational Algebras Incorporating the Time Dimension in Databases . . . . . . . . . . . . . . . 501--543
Salvatore T. March About This Issue \ldots . . . . . . . . 1--2 Salvatore T. March About the Authors \ldots . . . . . . . . 3--3 Paul Suetens and Pascal Fua and Andrew J. Hanson Computational Strategies for Object Recognition . . . . . . . . . . . . . . 5--61 Priti Mishra and Margaret H. Eich Join Processing in Relational Databases 63--113
Salvatore T. March Editorial Policy . . . . . . . . . . . . 117--125 Salvatore T. March About This Issue \ldots . . . . . . . . 127--128 Salvatore T. March About the Authors \ldots . . . . . . . . 129--129 Charles W. Krueger Software Reuse . . . . . . . . . . . . . 131--183 Per Brinch Hansen Householder Reduction of Linear Equations . . . . . . . . . . . . . . . 185--194 Catherine McGeoch Analyzing Algorithms by Simulation: Variance Reduction Techniques and Simulation Speedups . . . . . . . . . . 195--212
Richard R. Muntz A Personal Note . . . . . . . . . . . . 213--214 Richard R. Muntz About This Issue \ldots . . . . . . . . 215--215 Richard R. Muntz About the Authors \ldots . . . . . . . . 217--217 Yong K. Hwang and Narendra Ahuja Gross Motion Planning --- a Survey . . . 219--291 Randal E. Bryant Symbolic Boolean Manipulation with Ordered Binary-Decision Diagrams . . . . 293--318 Charles B. Dunham Surveyor's Forum: ``What Every Computer Scientist Should Know About Floating-Point Arithmetic'' . . . . . . 319--319 Brian A. Wichmann Surveyor's Forum: ``What Every Computer Scientist Should Know About Floating-Point Arithmetic'' . . . . . . 319--319
Richard R. Muntz About This Issue \ldots . . . . . . . . 321--322 Richard R. Muntz About the Authors \ldots . . . . . . . . 323--323 Lisa Gottesfeld Brown A Survey of Image Registration Techniques . . . . . . . . . . . . . . . 325--376 Karen Kukich Techniques for Automatically Correcting Words in Text . . . . . . . . . . . . . 377--439 Vladimir Estivill-Castro and Derick Wood A Survey of Adaptive Sorting Algorithms 441--476
Richard R. Muntz About This Issue \ldots . . . . . . . . 1--2 Richard R. Muntz About the Authors \ldots . . . . . . . . 3--3 Farshid Arman and J. K. Aggarwal Model-Based Object Recognition in Dense-Range Images --- a Review . . . . 5--43 Marco Schneider Self-Sta\-bi\-li\-za\-tion . . . . . . . 45--67
Richard R. Muntz About This Issue \ldots . . . . . . . . 69--70 Richard R. Muntz About the Authors \ldots . . . . . . . . 71--72 Goetz Graefe Query Evaluation Techniques for Large Databases . . . . . . . . . . . . . . . 73--170 Michael Barborak and Miroslaw Malek and Anton Dahbura The Consensus Problem in Fault-Tolerant Computing . . . . . . . . . . . . . . . 171--220
Richard R. Muntz About This Issue \ldots . . . . . . . . 221--222 Richard R. Muntz About the Authors \ldots . . . . . . . . 223--223 A. Udaya Shankar An Introduction to Assertional Reasoning for Concurrent Systems . . . . . . . . . 225--262 Michael G. Norman and Peter Thanisch Models of Machines and Computation for Mapping in Multicomputers . . . . . . . 263--302 David J. Lilja Cache Coherence in Large-Scale Shared-Memory Multiprocessors: Issues and Comparisons . . . . . . . . . . . . 303--338 Randolph D. Nelson The Mathematics of Product Form Queuing Networks . . . . . . . . . . . . . . . . 339--369
Richard R. Muntz About This Issue \ldots . . . . . . . . 371--372 Richard R. Muntz About the Authors \ldots . . . . . . . . 373--373 Richard Baskerville Information Systems Security Design Methods: Implications for Information Systems Development . . . . . . . . . . 375--414 Bernhard Eschermann State Assignment for Hardwired VLSI Control Units . . . . . . . . . . . . . 415--436 James C. Brancheau and Carol V. Brown The Management of End-User Computing: Status and Directions . . . . . . . . . 437--482
Rajiv Gupta and Scott A. Smolka and Shaji Bhaskar On Randomization in Sequential and Distributed Algorithms . . . . . . . . . 7--86 Thomas W. Malone and Kevin Crowston The Interdisciplinary Study of Coordination . . . . . . . . . . . . . . 87--119 Sunggu Lee and Kang Geun Shin Probabilistic Diagnosis of Multiprocessor Systems . . . . . . . . . 121--139
Richard R. Muntz About This Issue \ldots . . . . . . . . 141--142 Richard R. Muntz About This Issue \ldots . . . . . . . . 143--144 Peter M. Chen and Edward K. Lee and Garth A. Gibson and Randy H. Katz and David A. Patterson RAID: High-Performance, Reliable Secondary Storage . . . . . . . . . . . 145--185 Tim J. Harris A Survey of PRAM Simulation Techniques 187--206
Richard R. Muntz About This Issue \ldots . . . . . . . . 207--207 Richard R. Muntz About the Authors \ldots . . . . . . . . 209--210 Carl E. Landwehr and Alan R. Bull and John P. McDermott and William S. Choi A Taxonomy of Computer Program Security Flaws . . . . . . . . . . . . . . . . . 211--254 Mary L. Bailey and Jack V. Briner, Jr. and Roger D. Chamberlain Parallel Logic Simulation of VLSI Systems . . . . . . . . . . . . . . . . 255--294 Jacques Chassin de Kergommeaux and Philippe Codognet Parallel Logic Programming Systems . . . 295--336
Peter Wegner and Marvin Israel Editorial Directions . . . . . . . . . . 337--339 Richard R. Muntz About This Issue . . . . . . . . . . . . 341--341 Richard R. Muntz About The Authors . . . . . . . . . . . 343--343 David F. Bacon and Susan L. Graham and Oliver J. Sharp Compiler Transformations for High-Performance Computing . . . . . . . 345--420 Ji\vrí Matou\vsek Geometric Range Searching . . . . . . . 421--461
Peter Wegner and Marvin Israel About This Issue \ldots . . . . . . . . 1--2 Juris Hartmanis Turing Award Lecture: On Computational Complexity and the Nature of Computer Science . . . . . . . . . . . . . . . . 7--16 Laszlo A. Belady The Disappearance of the ``Pure'' Software Industry . . . . . . . . . . . 17--18 Gilles Brassard Time for Another Paradigm Shift . . . . 19--21 Peter J. Denning Can there be a science of information? 23--25 Peter A. Freeman Effective Computer Science . . . . . . . 27--29 Michael C. Loui Computer Science is a New Engineering Discipline . . . . . . . . . . . . . . . 31--32 John Plaice Computer Science is an Experimental Science . . . . . . . . . . . . . . . . 33--33 John E. Savage Will computer science become irrelevant? 35--37 N. F. Stewart Science and Computer Science . . . . . . 39--41 Jeffrey D. Ullman The Role of Theory Today . . . . . . . . 43--44 Peter Wegner Interaction as a Basis for Empirical Computer Science . . . . . . . . . . . . 45--48 Fred Weingarten Government Funding and Computing Research Priorities . . . . . . . . . . 49--54 W. A. Wulf Are we scientists or engineers? . . . . 55--57 Juris Hartmanis Response to the Essays ``On Computational Complexity and the Nature of Computer Science'' . . . . . . . . . 59--61 Peter A. Buhr and Michel Fortier and Michael H. Coffin Monitor Classification . . . . . . . . . 63--107 Ricardo A. Baeza-Yates Fringe Analysis Revisited . . . . . . . 109--119 Various The Scope and Tutorial Needs of the ACM SIGs . . . . . . . . . . . . . . . . . . 121--137
Peter Wegner and Marvin Israel About This Issue . . . . . . . . . . . . 139--140 Evaggelia Pitoura and Omran Bukhres and Ahmed Elmagarmid Object Orientation in Multidatabase Systems . . . . . . . . . . . . . . . . 141--195 Jukka Paakki Attribute Grammar Paradigms --- a High-Level Methodology in Language Implementation . . . . . . . . . . . . . 196--255 David Garlan Research Directions in Software Architecture . . . . . . . . . . . . . . 257--261 Oscar Nierstrasz and Theo Dirk Meijler Research Directions in Software Composition . . . . . . . . . . . . . . 262--264 Gio Wiederhold Mediation in Information Systems . . . . 265--267 Frank Manola Interoperability Issues in Large-Scale Distributed Object Systems . . . . . . . 268--270 Sandra Heiler Semantic Interoperability . . . . . . . 271--273 Jeff Sutherland Business Objects in Corporate Information Systems . . . . . . . . . . 274--276 Efstratios Gallopoulos and Elias N. Houstis and John R. Rice Workshop on Problem-Solving Environments: Findings and Recommendations . . . . . . . . . . . . 277--279 Arnold L. Rosenberg Thoughts on Parallelism and Concurrency in Computing Curricula . . . . . . . . . 280--283 P. Takis Metaxas Fundamental Ideas for a Parallel Computing Course . . . . . . . . . . . . 284--286 Faron Moller and Scott A. Smolka On the Computational Complexity of Bisimulation . . . . . . . . . . . . . . 287--289 Ron K. Cytron and Brent Hailpern SIGPLAN Scope and Tutorial Needs . . . . 290--291 Alexander Thomasian Surveyors' forum --- high-performance secondary memory . . . . . . . . . . . . 292--295
Peter Wegner and Marvin Israel About This Issue . . . . . . . . . . . . 297--297 Raj Reddy Grand Challenges in AI . . . . . . . . . 301--303 Narendra Ahuja On Detection and Representation of Multiscale Low-Level Image Structure . . 304--306 Yiannis Aloimonos and C. Fermüller and A. Rosenfeld Seeing and Understanding: Representing the Visual World . . . . . . . . . . . . 307--309 Ruzena Bajcsy Signal-to-Symbol Transformation and Vice Versa: From Fundamental Processes to Representation . . . . . . . . . . . . . 310--313 Ronald J. Brachman and Hector J. Levesque Undirected Behavior Without Unbounded Search . . . . . . . . . . . . . . . . . 314--316 Eugene Charniak Natural Language Learning . . . . . . . 317--319 William J. Clancey AI: Inventing a New Kind of Machine . . 320--322 A. G. Cohn The Challenge of Qualitative Spatial Reasoning . . . . . . . . . . . . . . . 323--325 Tom Dietterich Overfitting and Undercomputing in Machine Learning . . . . . . . . . . . . 326--327 Didier Dubois and Henri Prade What Does Fuzzy Logic Bring to AI? . . . 328--330 Matthew L. Ginsberg Epistemological and Heuristic Adequacy Revisited . . . . . . . . . . . . . . . 331--333 Subbarao Kambhampati AI Planning: a Prospectus on Theory and Applications . . . . . . . . . . . . . . 334--336 Richard E. Korf Space-Efficient Search Algorithms . . . 337--339 Victor R. Lesser Multiagent Systems: An Emerging Subdiscipline of AI . . . . . . . . . . 340--342 Vladimir Lifschitz The Logic of Common Sense . . . . . . . 343--345 R. P. Loui Models of Deliberation in the Social Sciences . . . . . . . . . . . . . . . . 346--348 Jacques Pitrat AI Systems are Dumb Because AI Researchers Are Too Clever . . . . . . . 349--350 Austin Tate Don't Leave Your Plan on the Shelf . . . 351--352 Pietro Torasso and Luca Console and Luigi Portinale and Daniele Theseider Dupré On the Role of Abduction . . . . . . . . 353--355 David Waltz and Simon Kasif On Reasoning From Data . . . . . . . . . 356--359 Michael P. Wellman The Economic Approach to Artificial Intelligence . . . . . . . . . . . . . . 360--362 Kenneth Yip and Feng Zhao and Elisha Sacks Imagistic Reasoning . . . . . . . . . . 363--365 Vicki H. Allan and Reese B. Jones and Randall M. Lee and Stephen J. Allan Software Pipelining . . . . . . . . . . 367--432 S. S. Beauchemin and J. L. Barron The Computation of Optical Flow . . . . 433--467
Raymond Greenlaw and Rossella Petreschi Cubic Graphs . . . . . . . . . . . . . . 471--495 Ronald E. Prather Design and Analysis of Hierarchical Software Metrics . . . . . . . . . . . . 497--518 Dilip Sarkar Methods to Speed Up Error Back-Propagation Learning Algorithm . . 519--542 Anonymous Computing Surveys Symposium on Multimedia . . . . . . . . . . . . . . . 543--544 Venkat N. Gudivada Multimedia Systems --- An Interdisciplinary Perspective . . . . . 545--548 Edward A. Fox and Linda M. Kieffer Multimedia Curricula, Courses, and Knowledge Modules . . . . . . . . . . . 549--551 Borko Furht Where Are Information Superhighways Headed? . . . . . . . . . . . . . . . . 554--556 Jenny Preece and Ben Shneiderman Survival of the Fittest: The Evolution of Multimedia User Interfaces . . . . . 557--559 Elisabeth André Intellimedia: Making Multimedia Usable by Exploiting AI Methods . . . . . . . . 560--563 Walid G. Aref and Ibrahim Kamel and Daniel P. Lopresti On Handling Electronic Ink . . . . . . . 564--567 James E. Baker and Isabel F. Cruz and Giuseppe Liotta and Roberto Tamassia A New Model for Algorithm Animation Over the WWW . . . . . . . . . . . . . . . . 568--572 Shih-Fu Chang Exploring Functionalities in the Compressed Image/Video Domain . . . . . 573--575 Stavros Christodoulakis and Peter Triantafillou Research and Development Issues for Large-Scale Multimedia Information Systems . . . . . . . . . . . . . . . . 576--579 Crispin Cowan and Shanwei Cen and Jonathan Walpole and Calton Pu Adaptive Methods for Distributed Video Presentation . . . . . . . . . . . . . . 580--583 Nevenka Dimitrova The Myth of Semantic Video Retrieval . . 584--586 Sharon Flank The Role of Natural-Language Processing in Multimedia . . . . . . . . . . . . . 587--589 Minos N. Garofalakis and Yannis E. Ioannidis Scheduling Issues in Multimedia Query Optimization . . . . . . . . . . . . . . 590--592 Arif Ghafoor Multimedia Database Management Systems 593--598 Wendy Hall The Role of Hypermedia in Multimedia Information Systems . . . . . . . . . . 599--601 Qing Li and Liu Sheng Huang A Dynamic Data Model for a Video Database Management System . . . . . . . 602--606 Alistair Moffat and Justin Zobel Index Organization for Multimedia Database Systems . . . . . . . . . . . . 607--609 Daniel Mossé Resource Reservations in Networked Multimedia Systems . . . . . . . . . . . 610--612 Klara Nahrstedt End-to-End QoS Guarantees in Networked Multimedia Systems . . . . . . . . . . . 613--616 Banu Özden and Rajeev Rastogi and Avi Silberschatz Research Issues in Multimedia Storage Servers . . . . . . . . . . . . . . . . 617--620 Rosalind W. Picard Computer Learning of Subjectivity . . . 621--623 Teresa Roselli Artificial Intelligence Can Improve Hypermedia Instructional Technologies for Learning . . . . . . . . . . . . . . 624--626 Daniela Rus and Devika Subramanian Customizing Multimedia Information Access . . . . . . . . . . . . . . . . . 627--629 Hanan Samet General Research Issues in Multimedia Database Systems . . . . . . . . . . . . 630--632 Roger C. Schank and Michael Korcuska and Menachem Jona Multimedia Applications for Education and Training: Revolution or Red Herring? 633--635 Prashant J. Shenoy and Pawan Goyal and Harrick M. Vin Issues in Multimedia Server Design . . . 636--639 Richard Staehli and Jonathan Walpole and David Maier Device and Physical-Data Independence for Multimedia Presentations . . . . . . 640--642 HongJiang Zhang and Qi Tian Digital Video Analysis and Recognition for Content-Based Access . . . . . . . . 643--644 Anonymous Contents: Author Index: Vols. 23--27 (1991--1995) . . . . . . . . . . . . . . 645--650 Anonymous Contents: Subject index: Vols. 23--27 (1991--1995) . . . . . . . . . . . . . . 650--653
Serge Abiteboul and Gabriel M. Kuper and Harry G. Mairson and Alexander A. Shvartsman and Moshe Y. Vardi In memoriam Paris C. Kanellakis . . . . 3--15 Edward M. Reingold Basic techniques for design and analysis of algorithms . . . . . . . . . . . . . 19--21 Allen Tucker and Peter Wegner ACM 50th-Anniversary Symposium: Perspectives in Computer Science . . . . 19--286 Roberto Tamassia Data structures . . . . . . . . . . . . 23--26 D. T. Lee Computational geometry . . . . . . . . . 27--31 Rajeev Motwani and Prabhakar Raghavan Randomized algorithms . . . . . . . . . 33--37 Maxime Crochemore and Thierry Lecroq Pattern-matching and text-compression algorithms . . . . . . . . . . . . . . . 39--41 Samir Khuller and Balaji Raghavachari Graph and network algorithms . . . . . . 43--45 Michael C. Loui Computational complexity theory . . . . 47--49 Guy E. Blelloch and Bruce M. Maggs Parallel algorithms . . . . . . . . . . 51--54 Vijay Chandru and M. R. Rao Combinatorial optimization: an integer programming perspective . . . . . . . . 55--58 Andrea S. Lapaugh Layout algorithm for VLSI design . . . . 59--61 Doug Burger Memory systems . . . . . . . . . . . . . 63--65 Michael J. Flynn and Kevin W. Rudd Parallel architectures . . . . . . . . . 67--70 J. R. Quinlan Learning decision tree classifiers . . . 71--72 Michael I. Jordan and Christopher M. Bishop Neural networks . . . . . . . . . . . . 73--75 Stephanie Forrest Genetic algorithms . . . . . . . . . . . 77--80 F. L. Lewis and M. Fitzgerald and K. Liu Robotics . . . . . . . . . . . . . . . . 81--83 Thomas Dean Automated planning . . . . . . . . . . . 85--87 Judea Pearl Decision making under uncertainty . . . 89--92 Pasquale Cinnella Numerical simulations of reactive flows 93--96 Joseph S. Shang Computational electromagnetics . . . . . 97--99 David T. Kingsbury Computational biology . . . . . . . . . 101--103 Avi Silberschatz and Henry F. Korth and S. Sudarshan Data models . . . . . . . . . . . . . . 105--108 Stefano Ceri and Raghu Ramakrishnan Rules in database systems . . . . . . . 109--111 Dennis Shasha Tuning databases for high performance 113--115 Betty Salzberg Access methods . . . . . . . . . . . . . 117--120 Yannis E. Ioannidis Query optimization . . . . . . . . . . . 121--123 M. Tamer Özsu and Patrick Valduriez Distributed and parallel database systems . . . . . . . . . . . . . . . . 125--128 Sushil Jajodia Database security and privacy . . . . . 129--131 Ellen Riloff and Lee Hollaar Text databases and information retrieval 133--135 François Bancilhon Object databases . . . . . . . . . . . . 137--140 Jim Melton SQL language summary . . . . . . . . . . 141--143 Donald H. House Overview of three-dimensional computer graphics . . . . . . . . . . . . . . . . 145--148 A. P. Rockwood Geometric primitives . . . . . . . . . . 149--151 David S. Ebert Advanced modeling techniques for computer graphics . . . . . . . . . . . 153--156 Alan Watt Rendering techniques: past, present and future . . . . . . . . . . . . . . . . . 157--159 Nadia Magnenat Thalmann and Daniel Thalmann Computer animation . . . . . . . . . . . 161--163 Arie E. Kaufman Volume visualization . . . . . . . . . . 165--167 Jonathan Grudin The organizational contexts of development and use . . . . . . . . . . 169--171 Wolfgang Dzida International usability standards . . . 173--175 Robert J. K. Jacob Human-computer interaction: input devices . . . . . . . . . . . . . . . . 177--179 Colin Ware Multimedia output devices and techniques 181--183 Jürgen Ziegler Interactive techniques . . . . . . . . . 185--187 Brad A. Myers User interface software technology . . . 189--191 Mary Beth Rosson Human factors in programming and software development . . . . . . . . . . 193--195 Stuart A. Selber and Johndan Johnson-Eilola and Brad Mehlenbacher Online support systems . . . . . . . . . 197--200 Raphel A. Finkel Operating systems . . . . . . . . . . . 201--203 John A. Stankovic Real-time and embedded systems . . . . . 205--208 Craig E. Wills Process synchronization and IPC . . . . 209--211 Peter J. Denning Virtual memory . . . . . . . . . . . . . 213--216 Marshall Kirk McKusick Secondary storage and filesystems . . . 217--219 William Stallings Advances in high-speed networking . . . 221--223 Sape J. Mullender Distributed operating systems . . . . . 225--227 Thomas W. Doeppner, Jr. Distributed file systems and distributed memory . . . . . . . . . . . . . . . . . 229--231 Steve J. Chapin Distributed and multiprocessor scheduling . . . . . . . . . . . . . . . 233--235 Howard Jay Siegel and Henry G. Dietz and John K. Antonio Software support for heterogeneous computing . . . . . . . . . . . . . . . 237--239 Ravi Sandhu and Pierangela Samarati Authentication, access control, and audit . . . . . . . . . . . . . . . . . 241--243 Kim B. Bruce Progress in programming languages . . . 245--247 Benjamin Goldberg Functional programming languages . . . . 249--251 Stuart Hirshfield and Raimund K. Ege Object-oriented programming . . . . . . 253--255 Jacques Cohen Logic programming and constraint logic programming . . . . . . . . . . . . . . 257--259 Michael Wolfe Parallelizing compilers . . . . . . . . 261--262 Luca Cardelli Type systems . . . . . . . . . . . . . . 263--264 David A. Schmidt Programming language semantics . . . . . 265--267 Ian Sommerville Software process models . . . . . . . . 269--271 Ian M. Holland and Karl J. Lieberherr Object-oriented design . . . . . . . . . 273--275 Stephen R. Schach Testing: principles and practice . . . . 277--279 Steven P. Reiss Software tools and environments . . . . 281--284 Peter Wegner Interoperability . . . . . . . . . . . . 285--287
Chris Hankin and Hanne Riis Nielson Computing Surveys Symposium on Models of Programming Languages and Computation 293--294 Gul A. Agha Linguistic Paradigms for Programming Complex Distributed Systems . . . . . . 295--296 Jean-Marc Andreoli and Remo Pareschi Integrated Computational Paradigms for Flexible Client-Server Communication . . 297--299 Paolo Ciancarini Coordination Models and Languages as Software Integrators . . . . . . . . . . 300--302 David Gilbert Can Computational Logic Provide a Paradigm for Both the Specification and Implementation of Concurrent Systems? 303--305 Michael Hanus and Herbert Kuchen Integration of Functional and Logic Programming . . . . . . . . . . . . . . 306--308 Alan Mycroft On Integration of Programming Paradigms 309--311 U. S. Reddy Imperative Functional Programming . . . 312--314 Dennis Volpano and Geoffrey Smith On the Systematic Design of Web Languages . . . . . . . . . . . . . . . 315--317 Philip Wadler Lazy Versus Strict . . . . . . . . . . . 318--320 P. N. Benton On the Relationship Between Formal Semantics and Static Analysis . . . . . 321--323 Patrick Cousot Abstract Interpretation . . . . . . . . 324--328 Olivier Danvy and Nevin Hentze and Karoline Malmkjær Resource-bounded partial evaluation . . 329--332 Gilberto Filé and Roberto Giacobazzi and Francesco Ranzato A Unifying View of Abstract Domain Design . . . . . . . . . . . . . . . . . 333--336 Suresh Jagannathan and Andrew Wright Compiling Functional Languages with Flow Analysis . . . . . . . . . . . . . . . . 337--339 Daniel Le Métayer and David Schmidt Structural Operational Semantics as a Basis for Static Program Analysis . . . 340--343 Flemming Nielson Annotated Type and Effect Systems . . . 344--345 Mads Dam Modalities in Analysis and Verification 346--348 Robert Cartwright and Matthias Felleisen Program Verification Through Soft Typing 349--351 Pierpaolo Degano and Corrado Priami Enhanced Operational Semantics . . . . . 352--354 C. Barry Jay Shape in Computing . . . . . . . . . . . 355--357 Jens Palsberg Type Inference for Objects . . . . . . . 358--359 Alberto Pettorossi and Maurizio Proietti Rules and Strategies for Transforming Functional and Logic Programs . . . . . 360--414 William Frakes and Carol Terry Software Reuse: Metrics and Models . . . 415--435
Antero Taivalsaari On the Notion of Inheritance . . . . . . 438--479 Neil D. Jones An Introduction to Partial Evaluation 480--503 Joseph A. Gallian Error Detection Methods . . . . . . . . 504--517 Peter Soderquist and Miriam Leeser Area and Performance Tradeoffs in Floating-Point Divide and Square-Root Implementations . . . . . . . . . . . . 518--564
Peter Wegner and Jon Doyle Editorial: Strategic directions in computing research . . . . . . . . . . . 565--574 Anonymous ACM 50th Anniversary Issue --- Strategic Directions in Computing Research . . . . 565--845 Michael C. Loui and Anne Condon and Faith Fich and Greg N. Frederickson and Andrew V. Goldberg and David S. Johnson and Steven Mahney and Prabhakar Raghavan and John Savage and Alan L. Selman and David B. Shmoys Strategic directions in research in theory of computing . . . . . . . . . . 575--590 Roberto Tamassia and Pankaj K. Agarwal and Nancy Amato and Danny Z. Chen and David Dobkin and Scot Drysdale and Steven Fortune and Michael T. Goodrich and John Hershberger and Joseph O'Rourke and Franco P. Preparata and Joerg-Rudiger Sack and Subhash Suri and Ioannis Tollis and Jeffrey S. Vitter and Sue Whitesides Strategic directions in computational geometry . . . . . . . . . . . . . . . . 591--606 Rance Cleaveland and Scott A. Smolka and Rajeev Alur and Jos Baeten and Jan A. Bergstra and Eike Best and Rocco De Nicola and Helen Gill and Roberto Gorrieri and Mohamed G. Gouda and Jan Friso Groote and Tom A. Henzinger and C. A. R. Hoare and Maj. David Luginbuhl and Albert Meyer and Dale Miller and Jayadev Misra and Faron Moller and Ugo Montanari and Amir Pnueli and Sanjiva Prasad and Vaughan R. Pratt and Joseph Sifakis and Bernhard Steffen and Bent Thomsen and Frits Vaandrager and Moshe Vardi and Pierre Wolper Strategic directions in concurrency research . . . . . . . . . . . . . . . . 607--625 Edmund M. Clarke and Jeannette M. Wing and Rajeev Alur and Rance Cleaveland and David Dill and Allen Emerson and Stephen Garland and Steven German and John Guttag and Anthony Hall and Thomas Henzinger and Gerard Holzmann and Cliff Jones and Robert Kurshan and Nancy Leveson and Kenneth McMillan and J. Moore and Doron Peled and Amir Pnueli and John Rushby and Natarajan Shankar and Joseph Sifakis and Prasad Sistla and Bernhard Steffen and Pierre Wolper and Jim Woodcock and Pamela Zave Formal methods: state of the art and future directions . . . . . . . . . . . 626--643 Chris Hankin and Hanne Riis Nielson and Jens Palsberg and others Strategic directions in research on programming languages . . . . . . . . . 644--652 Jon Doyle and Thomas Dean and others Strategic directions in artificial intelligence . . . . . . . . . . . . . . 653--670 Trevor Mudge Strategic directions in computer architecture . . . . . . . . . . . . . . 671--678 David Clark and Joseph Pasquale and others Strategic directions in networks and telecommunications . . . . . . . . . . . 679--690 Rachid Guerraoui and others Strategic directions in object-oriented programming . . . . . . . . . . . . . . 691--700 Pascal Van Hentenryck and Vijay Saraswat and others Strategic directions in constraint programming . . . . . . . . . . . . . . 701--726 Carl Gunter and John Mitchell and David Notkin Strategic directions in software engineering and programming languages 727--737 Leon Osterweil and others Strategic directions in software quality 738--750 John A. Stankovic and others Strategic directions in real-time and embedded systems . . . . . . . . . . . . 751--763 Avi Silberschatz and Stan Zdonik and others Strategic directions in database systems --- breaking out of the box . . . . . . 764--778 Garth A. Gibson and Jeffrey Scott Vitter and John Wilkes and others Strategic directions in storage I/O issues in large-scale computing . . . . 779--793 Brad Myers and Jim Hollan and Isabel Cruz and Steve Bryson and Dick Bulterman and Tiziana Catarci and Wayne Citrin and Ephraim Glinert and Jonathan Grudin and Rob Jacob and Bonnie John and David Kurlander and Dan Olsen and Randy Pausch and Stuart Shieber and Ben Shneiderman and John Stasko and Gary Strong and Kent Wittenburg Strategic directions in human-computer interaction . . . . . . . . . . . . . . 794--809 A. Sameh and G. Cybenko and M. Kalos and K. Neves and J. Rice and D. Sorensen and F. Sullivan Computational science and engineering 810--817 Nabil Adam and Yelena Yesha and others Strategic directions in electronic commerce and digital libraries: towards a digital agora . . . . . . . . . . . . 818--835 Allen B. Tucker and others Strategic directions in computer science education . . . . . . . . . . . . . . . 836--845 Anonymous Author Index: Vols. 24--28 (1992--1996) 846--854 Anonymous Subject Index: Vols. 24--28 (1992--1996) 854--859
Ronald J. Brachman and Hector J. Levesque Undirected behavior without unbounded search . . . . . . . . . . . . . . . . . 1:1--1:?? Thomas L. Dean Integrating theory and practice in planning . . . . . . . . . . . . . . . . 2:1--2:?? Tom Dietterich Machine learning . . . . . . . . . . . . 3:1--3:?? Jon Doyle Cleaving (unto) artificial intelligence 4:1--4:?? Cordell Green Formality helps scalability and robustness . . . . . . . . . . . . . . . 5:1--5:?? Barbara J. Grosz The importance of integration for AI . . 6:1--6:?? Ian Horswill Integrated systems and naturalistic tasks . . . . . . . . . . . . . . . . . 7:1--7:?? Daphne Koller Structured representations and intractability . . . . . . . . . . . . . 8:1--8:?? Fernando Pereira Language, computation and artificial intelligence . . . . . . . . . . . . . . 9:1--9:?? Bart Selman Computational challenges in artificial intelligence . . . . . . . . . . . . . . 10:1--10:?? Yoav Shoham The open scientific borders of AI, and the case of economics . . . . . . . . . 11:1--11:?? Howard E. Shrobe Two challenging domains . . . . . . . . 12:1--12:?? William R. Swartout Future directions in knowledge-based systems . . . . . . . . . . . . . . . . 13:1--13:?? Michael P. Wellman The economic approach to artificial intelligence . . . . . . . . . . . . . . 14:1--14:?? Shlomo Zilberstein Resource-bounded reasoning in intelligent systems . . . . . . . . . . 15:1--15:?? Pankaj K. Agarwal and Subhash Suri Simple and practical geometric algorithms . . . . . . . . . . . . . . . 16:1--16:?? Nancy M. Amato Equipping CAD/CAM systems with geometric intelligence . . . . . . . . . . . . . . 17:1--17:?? Danny Z. Chen Developing algorithms and software for geometric path planning problems . . . . 18:1--18:?? Ioannis G. Tollis Graph drawing and information visualization . . . . . . . . . . . . . 19:1--19:?? Jeffrey S. Vitter Communication issues in large-scale geometric computation . . . . . . . . . 20:1--20:?? George Cybenko Large-scope computing: the industrial challenges . . . . . . . . . . . . . . . 21:1--21:?? Melvin Kalos Challenges in computational science . . 22:1--22:?? Kenneth Neves Thoughts on CSE candidates for industrial positions . . . . . . . . . . 23:1--23:?? John R. Rice Computational science as one driving force for all aspects of computing research . . . . . . . . . . . . . . . . 24:1--24:?? Francis Sullivan From theory to practice . . . . . . . . 25:1--25:?? Tom Conte Importance of profiling and compatibility . . . . . . . . . . . . . 26:1--26:?? Joel Emer Incremental versus revolutionary research . . . . . . . . . . . . . . . . 27:1--27:?? Matt Farrens Distributed decentralized computing . . 28:1--28:?? Dirk Grunwald Embedded, general-purpose, and high-performance systems . . . . . . . . 29:1--29:?? Kai Li Applications, storage hierarchy, and integration . . . . . . . . . . . . . . 30:1--30:?? Jack Mills An industrial perspective on computer architecture . . . . . . . . . . . . . . 31:1--31:?? David Nagle Synergy between software and hardware 32:1--32:?? Yale Patt Microarchitecture, compilers and algorithms . . . . . . . . . . . . . . . 33:1--33:?? Jim Smith Multiscalar as a new architecture paradigm . . . . . . . . . . . . . . . . 34:1--34:?? Wen-Hann Wang Microprocessor architecture challenges --- the best is yet to come! . . . . . . 35:1--35:?? David Wood Problems, challenges and the importance of performance evaluation . . . . . . . 36:1--36:?? Robert Yung The importance of process technology to microarchitecture . . . . . . . . . . . 37:1--37:?? Jos C. M. Baeten and Jan A. Bergstra Six issues concerning future directions in concurrency research . . . . . . . . 39:1--39:?? Eike Best Some major dichotomies relating to future research in concurrency . . . . . 40:1--40:?? Rance Cleaveland Semantic theories and system design . . 41:1--41:?? Roberto Gorrieri On the power of concurrency theory . . . 42:1--42:?? Mohamed G. Gouda Network protocols between exact specifications and pragmatic implementations . . . . . . . . . . . . 43:1--43:?? Jan Friso Groote Concurrency theory will set standards for description and analysis of software 44:1--44:?? C. A. R. Hoare Unifying theories: a personal statement 46:1--46:?? David Luginbuhl Issues in concurrent systems research 47:1--47:?? Dale Miller Logical foundations for open system design . . . . . . . . . . . . . . . . . 48:1--48:?? Jayadev Misra A discipline of multiprogramming . . . . 49:1--49:?? Faron Moller Logics for concurrency: structure versus automata . . . . . . . . . . . . . . . . 50:1--50:?? Ugo Montanari Causal computing . . . . . . . . . . . . 51:1--51:?? Rocco De Nicola and Scott A. Smolka Concurrency: theory and practice . . . . 52:1--52:?? Sanjiva Prasad Models for mobile computing agents . . . 53:1--53:?? Vaughan R. Pratt Concurrency concepts: an ongoing search 54:1--54:?? Joseph Sifakis Research directions for concurrency . . 55:1--55:?? Bernhard Steffen and Tiziana Margaria Method engineering for real-life concurrent systems . . . . . . . . . . . 56:1--56:?? Bent Thomsen Programming languages, analysis tools, and concurrency theory . . . . . . . . . 57:1--57:?? Pierre Wolper Where is the algorithmic support? . . . 58:1--58:?? Alexander Brodsky Constraint databases: promising technology or just intellectual exercise? . . . . . . . . . . . . . . . 59:1--59:?? Philippe Codognet The virtuality of constraints and the constraints of virtuality . . . . . . . 60:1--60:?? R. Dechter Bucket elimination: a unifying framework for processing hard and soft constraints 61:1--61:?? M. Dincbas Constraint programming . . . . . . . . . 62:1--62:?? E. Freuder In pursuit of the holy grail . . . . . . 63:1--63:?? Manuel Hermenegildo Some challenges for constraint programming . . . . . . . . . . . . . . 64:1--64:?? J. Jaffar and R. Yap Constraint programming 2000 . . . . . . 65:1--65:?? S. Kasif Towards a constraint-based engineering framework for algorithm design and application . . . . . . . . . . . . . . 66:1--66:?? Alan Mackworth Constraint-based design of embedded intelligent systems . . . . . . . . . . 67:1--67:?? D. McAllester The rise of nonlinear mathematical programming . . . . . . . . . . . . . . 68:1--68:?? Ken McAloon Constraint-based programming . . . . . . 69:1--69:?? Ugo Montanari and Francesca Rossi Constraint solving and programming: what's next? . . . . . . . . . . . . . . 70:1--70:?? William J. Older CLP (intervals) . . . . . . . . . . . . 71:1--71:?? Jean-François Puget Future of constraint programming . . . . 72:1--72:?? R. Ramakrishnan Constraints in databases . . . . . . . . 73:1--73:?? Vijay Saraswat Compositional computing . . . . . . . . 74:1--74:?? Gert Smolka Constraints in OZ . . . . . . . . . . . 75:1--75:?? Pascal Van Hentenryck Constraint programming for combinatorial search problems . . . . . . . . . . . . 76:1--76:?? José Blakeley Thoughts on directions in database research . . . . . . . . . . . . . . . . 77:1--77:?? Umeshwar Dayal Database technology at a crossroads . . 78:1--78:?? Sushil Jajodia Managing security and privacy of information . . . . . . . . . . . . . . 79:1--79:?? Henry F. Korth New focal points for research in database systems . . . . . . . . . . . . 80:1--80:?? Guy M. Lohman You think your DBMS is complex now\ldots? . . . . . . . . . . . . . . . 81:1--81:?? David Lomet A role for research in the database industry . . . . . . . . . . . . . . . . 82:1--82:?? David Maier Repackaging database systems . . . . . . 83:1--83:?? Frank Manola Transforming the database system into an open service concept . . . . . . . . . . 84:1--84:?? M. Tamer Özsu Future of database systems: changing applications and technological developments . . . . . . . . . . . . . . 85:1--85:?? Raghu Ramakrishnan Some promising directions for database research . . . . . . . . . . . . . . . . 86:1--86:?? Krithi Ramamritham Application-oriented database support 87:1--87:?? Hans-J. Schek Improving the role of future database systems . . . . . . . . . . . . . . . . 88:1--88:?? Richard Thomas Snodgrass The inefficiency of misalignment . . . . 89:1--89:?? Jeff Ullman Moving database theory into database practice . . . . . . . . . . . . . . . . 90:1--90:?? Jennifer Widom Integrating heterogeneous databases: lazy or eager? . . . . . . . . . . . . . 91:1--91:?? Owen Astrachan Education goals and priorities . . . . . 92:1--92:?? Kim Bruce Thoughts on computer science education 93:1--93:?? Robert Cupper A revised curriculum framework . . . . . 94:1--94:?? Peter Denning Business designs of the university . . . 95:1--95:?? Scot Drysdale What should we teach? . . . . . . . . . 96:1--96:?? Charles Kelemen First courses for nonmajors and public understanding of computer science . . . 97:1--97:?? Catherine McGeoch Research in the curriculum, and the Web 98:1--98:?? Yale Patt First courses and fundamentals . . . . . 99:1--99:?? Richard Proulx and Richard Rosala The future of computer science education 100:1--100:?? Roy Rada Calling for a virtual computing college 101:1--101:?? Eric Roberts Directions in computer science education 102:1--102:?? Lynn Andrea Stein Interactive programming: revolutionizing introductory computer science . . . . . 103:1--103:?? Allen Tucker Crisis in computer science education . . 104:1--104:?? Nabil R. Adam and Shamim Naqvi Universal access in digital libraries 105:1--105:?? Baruch Awerbuch Maximizing gross network product (GNP): resource management on the GII . . . . . 106:1--106:?? Alex Brodsky Constraint database technology for electronic trade with complex objectives 107:1--107:?? Robert Grossman Database mining challenges for digital libraries . . . . . . . . . . . . . . . 108:1--108:?? Jim Johnson The physics of politics in the information age . . . . . . . . . . . . 109:1--109:?? Barbara T. Blaustein and Catherine McCollum and Arnon Rosenthal Flexible security policies for digital libraries . . . . . . . . . . . . . . . 110:1--110:?? Anna-Lena Neches The future of electronic commerce: a pragmatic view . . . . . . . . . . . . . 111:1--111:?? Karen Bennet and Jacob Slonim The electronic commerce position paper 112:1--112:?? Ouri Wolfson Infrastructure and cost models for digital libraries . . . . . . . . . . . 113:1--113:?? Howard D. Wactlar The next generation electronic library --- capturing the experience . . . . . . 114:1--114:?? Rajeev Alur Next steps in formal verification . . . 115:1--115:?? Edmund Clarke and Jeannette M. Wing Tools and partial analysis . . . . . . . 116:1--116:?? Rance Cleaveland Formality and software design . . . . . 117:1--117:?? Steven German Research goals for formal methods . . . 118:1--118:?? Thomas A. Henzinger Some myths about formal verification . . 119:1--119:?? Gerard Holzmann On-the-fly model checking . . . . . . . 120:1--120:?? Cliff Jones Formal methods light . . . . . . . . . . 121:1--121:?? Doron Peled User interfaces for formal methods . . . 122:1--122:?? John Rushby Enhancing the utility of formal methods 123:1--123:?? Joseph Sifakis Safety, security and quality . . . . . . 124:1--124:?? Prasad Sistla Hybrid and incremental modelchecking techniques . . . . . . . . . . . . . . . 125:1--125:?? Bernhard Steffen and Tiziana Margaria Tools get formal methods into practice 126:1--126:?? Pierre Wolper The meaning of ``formal'' . . . . . . . 127:1--127:?? Jim Woodcock Software engineering research directions 128:1--128:?? Steve Bryson Implications of near-real-time three-dimensional interfaces . . . . . . 129:1--129:?? Dick C. A. Bulterman Making the technology serve the user . . 130:1--130:?? Tiziana Catarci Databases and the Web: new requirements for an easy access . . . . . . . . . . . 131:1--131:?? Wayne Citrin Strategic directions in visual languages research . . . . . . . . . . . . . . . . 132:1--132:?? Isabel F. Cruz Tailorable information visualization . . 133:1--133:?? Ephraim P. Glinert and R. Lindsay Todd and G. Bowden Wise The adaptive multi-interface multimodal environment . . . . . . . . . . . . . . 134:1--134:?? Jonathan Grudin The end of exile . . . . . . . . . . . . 135:1--135:?? James D. Hollan Strategic issues for human-computer interaction . . . . . . . . . . . . . . 136:1--136:?? Yannis E. Ioannidis Visual user interfaces for database systems . . . . . . . . . . . . . . . . 137:1--137:?? Robert J. K. Jacob The future of input devices . . . . . . 138:1--138:?? Bonnie E. John Evaluating usability evaluation techniques . . . . . . . . . . . . . . . 139:1--139:?? David Kurlander Thoughts on user interface processes and agendas . . . . . . . . . . . . . . . . 140:1--140:?? Brad A. Myers Programmability and heuristics in the user interfaces . . . . . . . . . . . . 141:1--141:?? Dan R. Olsen, Jr. Computational resources and the Internet 142:1--142:?? Stuart M. Shieber A call for collaborative interfaces . . 143:1--143:?? Ben Shneiderman Advanced graphic user interfaces: elastic and tightly coupled windows . . 144:1--144:?? John Stasko Future research directions in human-computer interaction . . . . . . . 145:1--145:?? Gary W. Strong Human-centered information systems (HCIS) . . . . . . . . . . . . . . . . . 146:1--146:?? Kent Wittenburg The WWW information glut: implications for next-generation HCI technologies . . 147:1--147:?? M. Aksit Separation and composition of concerns in the object-oriented model . . . . . . 148:1--148:?? A. P. Black Object-oriented languages: the next generation . . . . . . . . . . . . . . . 149:1--149:?? L. Cardelli Bad engineering properties of object-orient languages . . . . . . . . 150:1--150:?? P. Cointe Reflective languages and metalevel architectures . . . . . . . . . . . . . 151:1--151:?? J. Coplien Broadening beyond objects to patterns and to other paradigms . . . . . . . . . 152:1--152:?? R. Guerraoui Distributed programming abstractions . . 153:1--153:?? G. Kiczales Aspect-oriented programming . . . . . . 154:1--154:?? D. Lea Specification, architecture, and interoperability . . . . . . . . . . . . 155:1--155:?? K. Lieberherr From transience to persistence in object-oriented programming: architectures and patterns . . . . . . . 156:1--156:?? O. Madsen Strategic research directions in object-oriented programming . . . . . . 157:1--157:?? B. Magnusson Technology integration . . . . . . . . . 158:1--158:?? José Meseguer Why OOP needs new semantic foundations 159:1--159:?? H. Mössenböck Trends in object-oriented programming 160:1--160:?? J. Palsberg Compiler technology for object-oriented languages . . . . . . . . . . . . . . . 161:1--161:?? D. Schmidt Using design patterns to guide the development of reusable object-oriented software . . . . . . . . . . . . . . . . 162:1--162:?? Luca Cardelli Global computation . . . . . . . . . . . 163:1--163:?? Charles Consel Program adaptation based on program transformation . . . . . . . . . . . . . 164:1--164:?? Patrick Cousot Program analysis: the abstract interpretation perspective . . . . . . . 165:1--165:?? Michael Hanus Integration of declarative paradigms: benefits and challenges . . . . . . . . 166:1--166:?? Daniel Le Métayer Program analysis for software engineering: new applications, new requirements, new tools . . . . . . . . 167:1--167:?? Flemming Nielson Perspectives on program analysis . . . . 168:1--168:?? Martin Odersky Challenges in type systems research . . 169:1--169:?? Robert Paige Future directions in program transformations . . . . . . . . . . . . 170:1--170:?? Alberto Pettorossi and Maurizio Proietti Future directions in program transformation . . . . . . . . . . . . . 171:1--171:?? John Reynolds Beyond ML . . . . . . . . . . . . . . . 172:1--172:?? Jon G. Riecke Semantics: the description of computational structures . . . . . . . . 173:1--173:?? Barbara Ryder The future of program analysis . . . . . 174:1--174:?? David A. Schmidt On the need for a popular formal semantics . . . . . . . . . . . . . . . 175:1--175:?? Dennis Volpano Provably secure programming languages for remote evaluation . . . . . . . . . 176:1--176:?? Reinhard Wilhelm Program analysis --- a toolmaker's perspective . . . . . . . . . . . . . . 177:1--177:?? Alan Burns Broadening real-time systems research 178:1--178:?? Kevin Jeffay Technical and educational challenges for real-time computing . . . . . . . . . . 179:1--179:?? Mike Jones Consumer real-time systems . . . . . . . 180:1--180:?? Gary Koob Large-scale distributed real-time systems . . . . . . . . . . . . . . . . 181:1--181:?? Insup Lee Formal verification, testing and checking of real-time systems . . . . . 182:1--182:?? John Lehoczky Analytical methods for real-time computing . . . . . . . . . . . . . . . 183:1--183:?? Jane Liu Validation of timing properties . . . . 184:1--184:?? Al Mok Firm real-time systems . . . . . . . . . 185:1--185:?? Krithi Ramamritham Predictability: demonstrating real-time properties . . . . . . . . . . . . . . . 186:1--186:?? Lui Sha Real-time in the real world . . . . . . 187:1--187:?? Jack Stankovic The pervasiveness of real-time computing 188:1--188:?? Andre van Tilborg Real-time research in the Department of Defense . . . . . . . . . . . . . . . . 189:1--189:?? Gregory Abowd Software engineering and programming language considerations for ubiquitous computing . . . . . . . . . . . . . . . 190:1--190:?? Craig Chambers Towards reusable, extensible components 192:1--192:?? Lori A. Clarke and Peri Tarr New functionality for programming languages . . . . . . . . . . . . . . . 193:1--193:?? William G. Griswold and Richard Wolski and Scott B. Baden and Stephen J. Fink and Scott R. Kohn Programming language requirements for the next millennium . . . . . . . . . . 194:1--194:?? Robert Harper and Peter Lee Research in programming languages for composability, safety, and performance 195:1--195:?? Paul Hudak Building domain-specific embedded languages . . . . . . . . . . . . . . . 196:1--196:?? Sam Kamin The challenge of language technology transfer . . . . . . . . . . . . . . . . 197:1--197:?? Melody M. Moore Representation issues for reengineering interactive systems . . . . . . . . . . 199:1--199:?? Jens Palsberg Software evolution and integration . . . 200:1--200:?? Bill Scherlis Beyond coding . . . . . . . . . . . . . 201:1--201:?? Jack Wileden Programming languages and software engineering: past, present and future 202:1--202:?? Lori A. Clarke How do we improve software quality and how do we show that it matters? . . . . 203:1--203:?? Richard A. DeMillo Mission-critical applications, commercial value and software quality 204:1--204:?? William McKeeman Separating concerns in software quality 205:1--205:?? Edward F. Miller, Jr. Getting quality methods into practice 206:1--206:?? Alok Choudhary and David Kotz Large-scale file systems with the flexibility of databases . . . . . . . . 207:1--207:?? Thomas H. Cormen and Michael T. Goodrich A bridging model for parallel computation, communication, and I/O . . 208:1--208:?? Garth A. Gibson and John Wilkes Self-managing network-attached storage 209:1--209:?? Richard R. Muntz and Joseph Pasquale System-level design issues for storage I/O . . . . . . . . . . . . . . . . . . 210:1--210:?? M. Satyanarayanan and Carla Schlatter Ellis Adaptation: the key to mobile I/O . . . 211:1--211:?? Darren Erik Vengroff and Jeffrey Scott Vitter I/O-efficient algorithms and environments . . . . . . . . . . . . . . 212:1--212:?? Paul Green The impact of the Web on networking research . . . . . . . . . . . . . . . . 213:1--213:?? Jim Kurose Future directions in networking research 214:1--214:?? Joseph Pasquale Towards Internet computing . . . . . . . 215:1--215:?? Dana Angluin A 1996 snapshot of computational learning theory . . . . . . . . . . . . 216:1--216:?? Faith Fich Infrastructure issues related to theory of computing research . . . . . . . . . 217:1--217:?? Oded Goldreich and Avi Wigderson Theory of computing: a scientific perspective . . . . . . . . . . . . . . 218:1--218:?? Robert Harper and John Mitchell ML and beyond . . . . . . . . . . . . . 219:1--219:??
Peter Wegner Editorial Statement . . . . . . . . . . 1--2 M. M. Reid and R. J. Millar and N. D. Black Second-Generation Image Coding: An Overview . . . . . . . . . . . . . . . . 3--29 Micha\l Walicki and Sigurd Meldal Algebraic approaches to nondeterminism --- an overview . . . . . . . . . . . . 30--81 Fong Pong and Michel Dubois Verification Techniques for Cache Coherence Protocols . . . . . . . . . . 82--126
Peter Wegner About this Issue \ldots . . . . . . . . 127--127 Richard A. Uhlig and Trevor N. Mudge Trace-Driven Memory Simulation: a Survey 128--170 Vangelis T. Paschos A Survey of Approximately Optimal Solutions to Some Covering and Packing Problems . . . . . . . . . . . . . . . . 171--209
Tommy Thorn Programming languages for mobile code 213--239 Philip Wadler How to declare an imperative . . . . . . 240--263 Qiang Ji and Michael M. Marefat Machine interpretation of CAD data for manufacturing applications . . . . . . . 264--311
Pamela Zave Classification of research efforts in requirements engineering . . . . . . . . 315--321 Hyacinth S. Nwana Is computer science education in crisis? 322--324 Frederick M. Weinhaus and Venkat Devarajan Texture mapping $3$D models of real-world scenes . . . . . . . . . . . 325--365 Hong Zhu and Patrick A. V. Hall and John H. R. May Software unit test coverage and adequacy 366--427 Anonymous Errata . . . . . . . . . . . . . . . . . 428--428 Anonymous Author index: Vols. 25--29 (1993--1997) 429--437 Anonymous Author index . . . . . . . . . . . . . . 429--437 Anonymous Subject index: Vols. 25--29 (1993--1997) 437--442 Subject index Subject index . . . . . . . . . . . . . 437--442
Peter Wegner About this issue . . . . . . . . . . . . 1--1 Scott M. Lewandowski Frameworks for component-based client/server computing . . . . . . . . 3--27 Ran El-Yaniv Competitive solutions for online financial problems . . . . . . . . . . . 28--69 Alexander Thomasian Concurrency control: methods, performance, and analysis . . . . . . . 70--119
David B. Skillicorn and Domenico Talia Models and languages for parallel computation . . . . . . . . . . . . . . 123--169 Volker Gaede and Oliver Günther Multidimensional access methods . . . . 170--231 Reidar Conradi and Bernhard Westfechtel Version models for software configuration management . . . . . . . . 232--282
Anonymous Contents: Computing Surveys' Electronic Symposium on Partial Evaluating: \path=http://www.acm.org:80/pubs/citations/journals/surveys/1998-30-3es/= 283--283 Anonymous Editorial . . . . . . . . . . . . . . . 284--284 Peter Wegner and Marvin Israel Editorial . . . . . . . . . . . . . . . 284--284 Olivier Danvy and Robert Glück and Peter Thiemann 1998 Symposium on Partial Evaluation . . 285--290 Jean-Pierre Briot and Rachid Guerraoui and Klaus-Peter Lohr Concurrency and Distribution in Object-Oriented Programming . . . . . . 291--329 Saleh E. Abdullahi and Graem A. Ringwood Garbage Collecting the Internet: a Survey of Distributed Garbage Collection 330--373 Prasant Mohapatra Wormhole Routing Techniques for Directly Connected Multicomputer Systems . . . . 374--410
David Basin Logical framework based program development . . . . . . . . . . . . . . 1:1--1:?? J. Field and J. Heering and T. B. Dinesh Equations as a uniform framework for partial evaluation and abstract interpretation . . . . . . . . . . . . . 2:1--2:?? Andrei Klimov Program specialization vs. program composition . . . . . . . . . . . . . . 3:1--3:?? Michael Leuschel and B. Martens and D. de Schreye Some achievements and prospects in partial deduction . . . . . . . . . . . 4:1--4:?? Torben Mogensen Inherited limits . . . . . . . . . . . . 5:1--5:?? Alberto Pettorossi and Maurizio Proietti Program specialization via algorithmic unfold/fold transformations . . . . . . 6:1--6:?? Akihiko Takano and Zhenjiang Hu and Masato Takeichi Program transformation in calculational form . . . . . . . . . . . . . . . . . . 7:1--7:?? Philip Wickline and Peter Lee and Frank Pfenning and Rowan Davies Modal types as staging specifications for run-time code generation . . . . . . 8:1--8:?? Maria Alpuente and Moreno Falaschi and German Vidal A unifying view of functional and logic program specialization . . . . . . . . . 9:1--9:?? Michele Bugliesi and Anna Ciampolini and Evelina Lamma and Paola Mello Optimizing modular logic languages . . . 10:1--10:?? Sandro Etalle and Maurizio Gabbrieli Partial evaluation of concurrent constraint languages . . . . . . . . . . 11:1--11:?? J. P. Gallagher and L. Lafave The role of trace abstractions in program specialization algorithms . . . 12:1--12:?? John Hatcliff Foundations for partial evaluation of functional programs with computational effects . . . . . . . . . . . . . . . . 13:1--13:?? John Hughes Type specialization . . . . . . . . . . 14:1--14:?? L. Lafave and J. P. Gallagher Extending the power of automatic constraint-based partial evaluators . . 15:1--15:?? Konstantinos Sagonas and Michael Leuschel Extending partial deduction to tabled execution: some results and open issues 16:1--16:?? Sandrine Blazy and Philippe Facon Partial evaluation for program comprehension . . . . . . . . . . . . . 17:1--17:?? Tristan Cazenave Synthesis of an efficient tactical theorem prover for the game of go . . . 18:1--18:?? C. Consel and L. Hornof and R. Marlet and G. Muller and S. Thibault and E.-N. Volanschi and J. Lawall and J. Noyé Tempo: specializing systems applications and beyond . . . . . . . . . . . . . . . 19:1--19:?? C. Consel and L. Hornof and R. Marlet and G. Muller and S. Thibault and E.-N. Volanschi and J. Lawall and J. Noyé Partial evaluation for software engineering . . . . . . . . . . . . . . 20:1--20:?? Scott Draves Partial evaluation for media processing 21:1--21:?? Matthew Dwyer and John Hatcliff and Muhammad Nanda Using partial evaluation to enable verification of concurrent software . . 22:1--22:?? Mark Leone and Peter Lee Dynamic specialization in the Fabius system . . . . . . . . . . . . . . . . . 23:1--23:?? Oscar Waddell and R. Kent Dybvig Visualizing partial evaluation . . . . . 24:1--24:?? Yuan Chang Liou and Yih Nen Jeng A transfinite interpolation method of grid generation based on multipoints . . 105--113
Peter Wegner About this issue\ldots . . . . . . . . . 411--411 Pankaj K. Agarwal and Micha Sharir Efficient algorithms for geometric optimization . . . . . . . . . . . . . . 412--458 Roel Wieringa A survey of structured and object-oriented software specification methods and techniques . . . . . . . . . 459--527 Fabio Crestani and Mounia Lalmas and Cornelis J. Van Rijsbergen and Iain Campbell ``Is this document relevant? \ldots probably'': a survey of probabilistic models in information retrieval . . . . 528--552
Felix C. Gärtner Fundamentals of fault-tolerant distributed computing in asynchronous environments . . . . . . . . . . . . . . 1--26 Mengchi Liu Deductive database languages: problems and solutions . . . . . . . . . . . . . 27--62 Norman W. Paton and Oscar Díaz Active database systems . . . . . . . . 63--103
Kevin L. Mills Introduction to the Electronic Symposium on Computer-Supported Cooperative Work 105--115 Anonymous Table of Contents: Electronic Symposium on Computer-Supported Cooperative Work 116--116 Jin Jing and Abdelsalam Sumi Helal and Ahmed Elmagarmid Client-server computing in mobile environments . . . . . . . . . . . . . . 117--157 Betty Salzberg and Vassilis J. Tsotras Comparison of access methods for time-evolving data . . . . . . . . . . . 158--221
Kevin L. Mills Introduction to the Electronic Symposium on Computer-Supported Cooperative Work 1:1--1:?? Steven McCanne and Eric Brewer and Randy Katz and Elan Amir and Yatin Chawathe and Todd Hodes and Ketan Mayer-Patel and Suchitra Raman and Cynthia Romer and Angela Schuett and Andrew Swan and Teck-Lee Tung and Tina Wong and Kristin Wright MASH: enabling scalable multipoint collaboration . . . . . . . . . . . . . 2:1--2:?? Son Dao and Eddie Shek and Asha Vellaikal and Richard R. Muntz and Lixia Zhang and Miodrag Potkonjak and Ouri Wolfson Semantic multicast: intelligently sharing collaborative sessions . . . . . 3:1--3:?? Ivan Marsic DISCIPLE: a framework for multimodal collaboration in heterogeneous environments . . . . . . . . . . . . . . 4:1--4:?? Daniel A. Reed and Simon M. Kaplan Orbit/Virtue: collaboration and visualization toolkits . . . . . . . . . 5:1--5:?? Kevin Martin Creation and performance analysis of user representations in collaborative virtual environments . . . . . . . . . . 6:1--6:?? Francis Kubala and Sean Colbath and Daben Liu and John Makhoul Rough'n'Ready: a meeting recorder and browser . . . . . . . . . . . . . . . . 7:1--7:?? David Payton and Mike Daily and Kevin Martin Dynamic collaborator discovery in information intensive environments . . . 8:1--8:?? Howard D. Wactlar and Michael G. Christel and Alexander G. Hauptmann and Yihong Gong Informedia Experience-on-Demand: capturing, integrating and communicating experiences across people, time and space . . . . . . . . . . . . . . . . . 9:1--9:?? Michael Wolverton Task-based information management . . . 10:1--10:?? James H. Morris and Christine M. Neuwirth and Susan Harkness Regli and Ravinder Chandhok and Geoffrey C. Wenger Interface issues in computer support for asynchronous communication . . . . . . . 11:1--11:?? Larry S. Jackson and Ed Grossman Integration of synchronous and asynchronous collaboration activities 12:1--12:?? Jonathan Rees and Sarah Ferguson and Sankar Virdhagriswaran Consistency management for distributed collaboration . . . . . . . . . . . . . 13:1--13:?? Craig Thompson and Paul Pazandak and Venu Vasudevan and Frank Manola and Mark Palmer and Gil Hansen and Tom Bannon Intermediary Architecture: Interposing middleware object services between Web client and server . . . . . . . . . . . 14:1--14:?? Laurie Damianos and Lynette Hirschman and Robyn Kozierok and Jeffrey Kurtz and Andrew Greenberg and Kimberley Walls and Sharon Laskowski and Jean Scholtz Evaluation for collaborative systems . . 15:1--15:?? M. Ranganathan and Laurent Andrey and Virginie Schaal and Jean-Philippe Favreau Re-configurable distributed scripting 16:1--16:?? Samuel Bayer and Laurie E. Damianos and Robyn Kozierok and James Mokwa The MITRE Multi-Modal Logger: its use in evaluation of collaborative systems . . 17:1--17:?? Jeffrey L. Kurtz and Laurie E. Damianos and Robyn Kozierok and Lynette Hirschman The MITRE map navigation experiment . . 18:1--18:??
P. Degano and R. Gorrieri and A. Marchetti-Spaccamela and P. Wegner Computing Surveys' Electronic Symposium on the Theory of Computation . . . . . . 223--225 Anonymous Symposium on the Theory of Computation: Table of Contents . . . . . . . . . . . 226--226 Piero Fraternali Tools and approaches for developing data-intensive Web applications: a survey . . . . . . . . . . . . . . . . . 227--263 A. K. Jain and M. N. Murty and P. J. Flynn Data clustering: a review . . . . . . . 264--323
P. Degano and R. Gorrieri and A. Marchetti-Spaccamela and P. Wegner Computing surveys' electronic symposium on the theory of computation . . . . . . 1:1--1:?? H. Noltemeier and H.-C. Wirth and S. O. Krumke Network design and improvement . . . . . 2:1--2:?? Giuseppe Cattaneo and Giuseppe Italiano Algorithm engineering . . . . . . . . . 3:1--3:?? Susanne Albers and Stefano Leonardi On-line algorithms . . . . . . . . . . . 4:1--4:?? Chris Hankin and Pasquale Malacaria Program analysis games . . . . . . . . . 5:1--5:?? Patric Cousot Directions for research in approximate system analysis . . . . . . . . . . . . 6:1--6:?? Marco Bernardo Let's evaluate performance algebraically 7:1--7:?? Juraj Hromkovi\vc Some contributions of the study of abstract communication complexity to other areas of computer science . . . . 8:1--8:?? Hartmut Ehrig and Gabriele Taentzer Graphical representation and graph transformation . . . . . . . . . . . . . 9:1--9:?? Donald Sannella and Andrzei Tarlecki Algebraic methods for specification and formal development of programs . . . . . 10:1--10:?? Dale Miller and Catuscia Palmidessi Foundational aspects of syntax . . . . . 11:1--11:?? Dora Giammarresi and Antonio Restivo Extending formal language hierarchies to higher dimensions . . . . . . . . . . . 12:1--12:?? Corrado Priami Operational methods in theoretical computer science . . . . . . . . . . . . 13:1--13:?? Kohei Honda Semantics study and reality of computing 14:1--14:?? Rusins Freivalds How to simulate free will in a computational device . . . . . . . . . . 15:1--15:?? Jiri Wiedermann Simulating the mind: a gauntlet thrown to computer science . . . . . . . . . . 16:1--16:??
Helen Ashman and Rosemary Michelle Simpson Computing Surveys' Electronic Symposium on Hypertext and Hypermedia: Editorial 325--334 Grigoris Antoniou A tutorial on default logics . . . . . . 337--359 Sami Iren and Paul D. Amer and Phillip T. Conrad The transport layer: tutorial and survey 360--404 Yu-Kwong Kwok and Ishfaq Ahmad Static scheduling algorithms for allocating directed task graphs to multiprocessors . . . . . . . . . . . . 406--471
Helen Ashman and Rosemary Michelle Simpson Computing Surveys' Electronic Symposium on Hypertext and Hypermedia: Editorial 1:1--1:?? Uffe K. Wiil and Peter J. Nürnberg and John J. Leggett Hypermedia research directions: an infrastructure perspective . . . . . . . 2:1--2:?? Andrew E. Treloar Applying hypertext and hypermedia to scholarly journals enables both product and process innovation . . . . . . . . . 3:1--3:?? Douglas Tudhope and Daniel Cunliffe Semantically indexed hypermedia: linking information disciplines . . . . . . . . 4:1--4:?? Jon M. Kleinberg Hubs, authorities, and communities . . . 5:1--5:?? Sougata Mukherjea Information visualization for hypermedia systems . . . . . . . . . . . . . . . . 6:1--6:?? Harri Oinas-Kukkonen Flexible CASE and hypertext . . . . . . 7:1--7:?? Gustavo Rossi and Fernando Daniel Lyardet and Daniel Schwabe Developing hypermedia applications with methods and patterns . . . . . . . . . . 8:1--8:?? Leslie Carr and Wendy Hall and David De Roure The evolution of hypertext link services 9:1--9:?? Paul H. Lewis and Wendy Hall and Leslie A. Carr and David De Roure The significance of linking . . . . . . 10:1--10:?? Siegfried Reich and Leslie Carr and David De Roure and Wendy Hall Where have you been from here? Trials in hypertext systems . . . . . . . . . . . 11:1--11:?? Paul De Bra and Peter Brusilovsky and Geert-Jan Houben Adaptive hypermedia: from systems to framework . . . . . . . . . . . . . . . 12:1--12:?? Wen-Syan Li and K. Selçuk Candan Integrating content search with structure analysis for hypermedia retrieval and management . . . . . . . . 13:1--13:?? Frank M. Shipman, III and Catherine C. Marshall Spatial hypertext: an alternative to navigational and semantic links . . . . 14:1--14:?? Richard Bodner and Mark Chignell Dynamic hypertext: querying and linking 15:1--15:?? Richard W. Kopak Functional link typing in hypertext . . 16:1--16:?? Soumen Chakrabarti Recent results in automatic Web resource discovery . . . . . . . . . . . . . . . 17:1--17:?? Jonathan Furner and David Ellis and Peter Willett Inter-linker consistency in the manual construction of hypertext documents . . 18:1--18:?? Mark Bernstein Structural patterns and hypertext rhetoric . . . . . . . . . . . . . . . . 19:1--19:?? Kenneth M. Anderson Supporting software engineering with open hypermedia . . . . . . . . . . . . 20:1--20:?? Steven J. DeRose XML linking . . . . . . . . . . . . . . 21:1--21:?? Stephen J. Green Lexical semantics and automatic hypertext construction . . . . . . . . . 22:1--22:?? Lynda Hardman and Jacco van Ossenbruggen and Lloyd Rutledge and Dick C. A. Bulterman Hypermedia: the link with time . . . . . 23:1--23:?? Fabio Vitali Versioning hypermedia . . . . . . . . . 24:1--24:?? Steve Benford and Ian Taylor and David Brailsford and Boriana Koleva and Mike Craven and Mike Fraser and Gail Reynard and Chris Greenhalgh Three dimensional visualization of the World Wide Web . . . . . . . . . . . . . 25:1--25:?? Megan Quentin-Baxter Quantitative evidence for differences between learners making use of passive hypermedia learning environments . . . . 26:1--26:?? Ross Wilkinson and Alan F. Smeaton Automatic link generation . . . . . . . 27:1--27:?? Hugh C. Davis Hypertext link integrity . . . . . . . . 28:1--28:?? Michael Bieber and Joonhee Yoo Hypermedia: a design philosophy . . . . 29:1--29:?? David F. Brailsford Separable hyperstructure and delayed link binding . . . . . . . . . . . . . . 30:1--30:?? Fabio Vitali and Michael Bieber Hypermedia on the Web: what will it take? . . . . . . . . . . . . . . . . . 31:1--31:?? Michael Bieber and Harri Oinas-Kukkonen and V. Balasubramanian Hypertext functionality . . . . . . . . 32:1--32:?? Theodor Holm Nelson Xanalogical structure, needed now more than ever: parallel documents, deep links to content, deep versioning, and deep re-use . . . . . . . . . . . . . . 33:1--33:?? Janet Verbyla Unlinking the link . . . . . . . . . . . 34:1--34:?? Robert Cailliau and Helen Ashman Hypertext in the Web --- a history . . . 35:1--35:?? Andries van Dam Education: the unfinished revolution . . 36:1--36:?? Theodor Holm Nelson The unfinished revolution and Xanadu . . 37:1--37:?? Douglas Engelbart and Jeff Ruilifson Bootstrapping our collective intelligence . . . . . . . . . . . . . . 38:1--38:??
P. Bellini and R. Mattolini and P. Nesi Temporal logics for real-time system specification . . . . . . . . . . . . . 12--42 Wilhelm Hasselbring Programming languages and systems for prototyping concurrent applications . . 43--79 Palash Sarkar A brief history of cellular automata . . 80--107
Mohamed E. Fayad Introduction to the Computing Surveys' Electronic Symposium on Object-Oriented Application Frameworks . . . . . . . . . 1:1--1:?? Davide Brugali and Katia Sycara Frameworks and pattern languages: an intriguing relationship . . . . . . . . 2:1--2:?? Jan Bosch and Peter Molin and Michael Mattsson and PerOlof Bengtsson Object-oriented framework-based software development: problems and experiences 3:1--3:?? Mohamed E. Fayad and David S. Hamu Enterprise frameworks: guidelines for selection . . . . . . . . . . . . . . . 4:1--4:?? Dirk Bäumer and Guido Gryczan and Rolf Knoll and Carola Lilienthal and Dirk Riehle and Heinz Züllighoven Domain-driven framework layering in large systems . . . . . . . . . . . . . 5:1--5:?? Wolfgang Pree and Kai Koskimies Framelets --- small and loosely coupled frameworks . . . . . . . . . . . . . . . 6:1--6:?? Yingwu Wang and Dilip Patel and Graham King and Ian Court and Geoff Staples and Maraget Ross and Mohamad Fayad On built-in test reuse in object-oriented framework design . . . . 7:1--7:?? Görel Hedin and Jòrgen Lindskov Knudsen On the role of language constructs for framework design . . . . . . . . . . . . 8:1--8:?? James E. Carey and Brent A. Carlson Deferring design decisions in an application framework . . . . . . . . . 9:1--9:?? Dirk Riehle and Roger Brudermann and Thomas Gross and Kai-Uwe Mätzel Pattern density and role modeling of an object transport service . . . . . . . . 10:1--10:?? Mehmet Aksit and Francesco Marcelloni and Bedir Tekinerdogan Developing object-oriented frameworks using domain models . . . . . . . . . . 11:1--11:?? Giancarlo Succi and Andrea Valerio and Tullio Vernazza and Massimo Fenaroli and Paolo Predonzani Framework extraction with domain analysis . . . . . . . . . . . . . . . . 12:1--12:?? Pierre Roy and Anne Liret and François Pachet The framework approach for constraint satisfaction . . . . . . . . . . . . . . 13:1--13:?? Neelam Soundarajan Documenting framework behavior . . . . . 14:1--14:?? Greg Butler and Rudolf K. Keller and Hafedh Mili A framework for framework documentation 15:1--15:?? António Rito Silva and Francisco Assis Rosa and Teresa Gonçalves Framework description using concern-specific design patterns composition . . . . . . . . . . . . . . 16:1--16:?? Garry Froehlich and H. James Hoover and Paul G. Sorenson Choosing an object-oriented domain framework . . . . . . . . . . . . . . . 17:1--17:?? Jagdish Bansiya Evaluating framework architecture structural stability . . . . . . . . . . 18:1--18:?? Zakaria Maamar and Bernard Moulin An overview of software agent-oriented frameworks . . . . . . . . . . . . . . . 19:1--19:?? Elizabeth A. Kendall and P. V. Murali Krishna and C. B. Suresh and Chira G. V. Pathak An application framework for intelligent and mobile agents . . . . . . . . . . . 20:1--20:?? Davide Brugali and Katia Sycara Towards agent oriented application frameworks . . . . . . . . . . . . . . . 21:1--21:?? Beno\^\it Garbinato and Rachid Guerraoui An open framework for reliable distributed computing . . . . . . . . . 22:1--22:?? John Michaloski and Sushil Birla and C. Jerry Yen and Richard Igou and George Weinert An open system framework for component-based CNC machines . . . . . . 23:1--23:?? Lidia Fuentes and Josée M. Troya Towards an open multimedia service framework . . . . . . . . . . . . . . . 24:1--24:?? Verlyn Johnson The San Francisco Project: Business process components and infrastructure 25:1--25:?? Riccardo Capobianchi and Alberto Coen-Porisini and Dino Mandrioli and Angelo Morzenti A framework architecture for supervision and control systems . . . . . . . . . . 26:1--26:?? Gerti Kappel and Stefan Rausch-Schott and Werner Retschitzegger A framework for workflow management systems based on objects, rules and roles . . . . . . . . . . . . . . . . . 27:1--27:?? Michael Koch and Jürgen Koch Application of frameworks in groupware --- the Iris group editor environment 28:1--28:?? Partha Pratim Pal A Framework for Isolating Connection Exception Management . . . . . . . . . . 29:1--29:10 Partha pratim Pal A framework for isolating connection exception management . . . . . . . . . . 29:1--29:?? Gustavo Rossi and Alejandra Garrido and Daniel Schwabe Navigating between objects. Lessons from an object-oriented framework perspective 30:1--30:?? J.-M. Jézéquel An object-oriented framework for data parallelism . . . . . . . . . . . . . . 31:1--31:?? Raman Kannan PAcceptor and SConnector frameworks: combining concurrency and communication 32:1--32:?? Jürgen Buchner HotDoc: a framework for compound documents . . . . . . . . . . . . . . . 33:1--33:?? Serge Demeyer and Koen De Hondt and Patrick Steyaert Consistent framework documentation with computed links and framework contracts 34:1--34:?? Peter T. Whelan Experiences and issues with SEMATECH's CIM framework . . . . . . . . . . . . . 35:1--35:?? Raja Harinath and Jaideep Srivastava and Jim Richardson and Mark Foresti Experiences with an object oriented framework for distributed control applications . . . . . . . . . . . . . . 36:1--36:?? Ehab Al-Shaer and Mohamed Fayed and Hussein Abdel-Wahab Adaptive object-oriented filtering framework for event management applications . . . . . . . . . . . . . . 37:1--37:?? Volker Luckas and Ralf Dörner Experience form the future --- using object-orientation concepts for $3$D visualization and validation of industrial scenarios . . . . . . . . . . 38:1--38:?? Douglas C. Schmidt and James C. Hu Developing flexible and high-performance Web servers with frameworks and patterns 39:1--39:?? Ezra Ebner and Weiguang Shao and Wei-Tek Tsai The five-module framework for Internet application development . . . . . . . . 40:1--40:?? Constantinos A. Constantinides and Atef Bader and Tzilla H. Elrad and P. Netinant and Mohamed E. Fayad Designing an aspect-oriented framework in an object-oriented environment . . . 41:1--41:??
Carlos A. Coello An updated survey of GA-based multiobjective optimization techniques 109--143 Mei Kobayashi and Koichi Takeda Information retrieval on the Web . . . . 144--173 Steven P. Vanderwiel and David J. Lilja Data prefetch mechanisms . . . . . . . . 174--199
Helen Ashman Electronic document addressing: dealing with change . . . . . . . . . . . . . . 201--212 Iffat H. Kazi and Howard H. Chen and Berdenia Stanley and David J. Lilja Techniques for obtaining high performance in Java programs . . . . . . 213--240 Dejan S. Miloji\vci\'c and Fred Douglis and Yves Paindaveine and Richard Wheeler and Songnian Zhou Process migration . . . . . . . . . . . 241--299 Eleanor Rieffel and Wolfgang Polak An introduction to quantum computing for non-physicists . . . . . . . . . . . . . 300--335
Carlos Iván Chesñevar and Ana Gabriela Maguitman and Ronald Prescott Loui Logical models of argument . . . . . . . 337--383 David M. Hilbert and David F. Redmiles Extracting usability information from user interface events . . . . . . . . . 384--421 Donald Kossmann The state of the art in distributed query processing . . . . . . . . . . . . 422--469
Russell Greiner and Christian Darken and N. Iwan Santoso Efficient reasoning . . . . . . . . . . 1--30 Gonzalo Navarro A guided tour to approximate string matching . . . . . . . . . . . . . . . . 31--88 Karsten Weihe A software engineering perspective on algorithmics . . . . . . . . . . . . . . 89--134
Pierpaolo Degano and Corrado Priami Enhanced operational semantics: a tool for describing and analyzing concurrent systems . . . . . . . . . . . . . . . . 135--176 Bev Littlewood and Peter Popov and Lorenzo Strigini Modeling software design diversity: a review . . . . . . . . . . . . . . . . . 177--208 Jeffrey Scott Vitter External memory algorithms and data structures: dealing with massive data 209--271
Edgar Chávez and Gonzalo Navarro and Ricardo Baeza-Yates and José Luis Marroquín Searching in metric spaces . . . . . . . 273--321 Christian Böhm and Stefan Berchtold and Daniel A. Keim Searching in high-dimensional spaces: Index structures for improving the performance of multimedia databases . . 322--373 Evgeny Dantsin and Thomas Eiter and Georg Gottlob and Andrei Voronkov Complexity and expressive power of logic programming . . . . . . . . . . . . . . 374--425
Gregory V. Chockler and Idit Keidar and Roman Vitenberg Group communication specifications: a comprehensive study . . . . . . . . . . 427--469 Melody Y. Ivory and Marti A. Hearst The state of the art in automating usability evaluation of user interfaces 470--516 Pieter H. Hartel and Luc Moreau Formalizing the safety of Java, the Java Virtual Machine, and Java card . . . . . 517--558
Fabrizio Sebastiani Machine learning in automated text categorization . . . . . . . . . . . . . 1--47 Weiyi Meng and Clement Yu and King-Lup Liu Building efficient and effective metasearch engines . . . . . . . . . . . 48--89 Michael F. McTear Spoken dialogue technology: enabling the conversational user interface . . . . . 90--169
Katherine Compton and Scott Hauck Reconfigurable computing: a survey of systems and software . . . . . . . . . . 171--210 Sylvain Petitjean A survey of methods for recovering quadrics in triangle meshes . . . . . . 211--262 Valeria Cardellini and Emiliano Casalicchio and Michele Colajanni and Philip S. Yu The state of the art in locally distributed Web-server systems . . . . . 263--311
Josep Díaz and Jordi Petit and Maria Serna A survey of graph layout problems . . . 313--356 Hala Elaarag Improving TCP performance over mobile networks . . . . . . . . . . . . . . . . 357--374 E. N. (Mootaz) Elnozahy and Lorenzo Alvisi and Yi-Min Wang and David B. Johnson A survey of rollback-recovery protocols in message-passing systems . . . . . . . 375--408
Yuri Leontiev and M. Tamer Özsu and Duane Szafron On type systems for object-oriented database programming languages . . . . . 409--449 G. Denys and F. Piessens and F. Matthijs A survey of customizability in operating systems research . . . . . . . . . . . . 450--468 Devanshu Dhyani and Wee Keong Ng and Sourav S. Bhowmick A survey of Web metrics . . . . . . . . 469--503 Jörg Rothe Some facets of complexity theory and cryptography: a five-lecture tutorial 504--549 Pankaj K. Agarwal and Leonidas J. Guibas and Herbert Edelsbrunner and Jeff Erickson and Michael Isard and Sariel Har-Peled and John Hershberger and Christian Jensen and Lydia Kavraki and Patrice Koehl and Ming Lin and Dinesh Manocha and Dimitris Metaxas and Brian Mirtich and David Mount and S. Muthukrishnan and Dinesh Pai and Elisha Sacks and Jack Snoeyink and Subhash Suri and Ouri Wolefson Algorithmic issues in modeling motion 550--572
Jason Dedrick and Vijay Gurbaxani and Kenneth L. Kraemer Information technology and economic performance: a critical review of the empirical evidence . . . . . . . . . . . 1--28 Theo Ungerer and Borut Robi\vc and Jurij \vSilc A survey of processors with explicit multithreading . . . . . . . . . . . . . 29--63 William R. Scott and Gerhard Roth and Jean-François Rivest View planning for automated three-dimensional object reconstruction and inspection . . . . . . . . . . . . . 64--96
John Aycock A brief history of just-in-time . . . . 97--113 Patrick Th. Eugster and Pascal A. Felber and Rachid Guerraoui and Anne-Marie Kermarrec The many faces of publish/subscribe . . 114--131 William N. Robinson and Suzanne D. Pawlowski and Vecheslav Volkov Requirements interaction management . . 132--190 Sandeep Purao and Vijay Vaishnavi Product metrics for object-oriented systems . . . . . . . . . . . . . . . . 191--221
Árpád Beszédes and Rudolf Ferenc and Tibor Gyimóthy and André Dolenc and Konsta Karsisto Survey of code-size reduction methods 223--267 Christian Blum and Andrea Roli Metaheuristics in combinatorial optimization: Overview and conceptual comparison . . . . . . . . . . . . . . . 268--308 Sandro Rafaeli and David Hutchison A survey of key management for secure group communication . . . . . . . . . . 309--329
Utz Westermann and Wolfgang Klas An analysis of XML database solutions for the management of MPEG-7 media descriptions . . . . . . . . . . . . . . 331--373 Stefan Podlipnig and Laszlo Böszörmenyi A survey of Web cache replacement strategies . . . . . . . . . . . . . . . 374--398 W. Zhao and R. Chellappa and P. J. Phillips and A. Rosenfeld Face recognition: a literature survey 399--458
Wesley M. Johnston and J. R. Paul Hanna and Richard J. Millar Advances in dataflow programming languages . . . . . . . . . . . . . . . 1--34 M. L. Kherfi and D. Ziou and A. Bernardi Image Retrieval from the World Wide Web: Issues, Techniques, and Systems . . . . 35--67 Mitchell A. Harris and Edward M. Reingold Line drawing, leap years, and Euclid . . 68--80
Cemil Kirbas and Francis Quek A review of vessel extraction techniques and algorithms . . . . . . . . . . . . . 81--121 Jacques Cohen Bioinformatics --- an introduction for computer scientists . . . . . . . . . . 122--158 Hanan Samet Object-based and image-based object representations . . . . . . . . . . . . 159--217
Stefan Pleisch and André Schiper Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view . . . . 219--262 Anna Formica and Michele Missikoff Inheritance processing and conflicts in structural generalization hierarchies 263--290 Swaminathan Sivasubramanian and Michal Szymaniak and Guillaume Pierre and Maarten van Steen Replication for Web hosting systems . . 291--334
Stephanos Androutsellis-Theotokis and Diomidis Spinellis A survey of peer-to-peer content distribution technologies . . . . . . . 335--371 Xavier Défago and André Schiper and Péter Urbán Total order broadcast and multicast algorithms: Taxonomy and survey . . . . 372--421 Reuven Bar-Yehuda and Keren Bendel and Ari Freund and Dror Rawitz Local ratio: a unified framework for approximation algorithms. In Memoriam: Shimon Even 1935--2004 . . . . . . . . . 422--463
Rajendra Bose and James Frew Lineage retrieval for scientific data processing: a survey . . . . . . . . . . 1--28 William Tolone and Gail-Joon Ahn and Tanusree Pai and Seng-Phil Hong Access control in collaborative systems 29--41 Yasushi Saito and Marc Shapiro Optimistic replication . . . . . . . . . 42--81
Caitlin Kelleher and Randy Pausch Lowering the barriers to programming: a taxonomy of programming environments and languages for novice programmers . . . . 83--137 Eran Gal and Sivan Toledo Algorithms and data structures for flash memories . . . . . . . . . . . . . . . . 138--163 Paolo Santi Topology control in wireless ad hoc and sensor networks . . . . . . . . . . . . 164--194
Vasanth Venkatachalam and Michael Franz Power reduction techniques for microprocessor systems . . . . . . . . . 195--237 David E. Taylor Survey and taxonomy of packet classification techniques . . . . . . . 238--275
Marco Eichelberg and Thomas Aden and Jörg Riesmeier and Asuman Dogac and Gokce B. Laleci A survey and analysis of Electronic Healthcare Record standards . . . . . . 277--315 Marjan Mernik and Jan Heering and Anthony M. Sloane When and how to develop domain-specific languages . . . . . . . . . . . . . . . 316--344 Benjamin Bustos and Daniel A. Keim and Dietmar Saupe and Tobias Schreck and Dejan V. Vrani\'c Feature-based similarity search in $3$D object databases . . . . . . . . . . . . 345--387
Tobias Bjerregaard and Shankar Mahadevan A survey of research and practices of Network-on-Chip . . . . . . . . . . . . 1:1--1:51 Deepayan Chakrabarti and Christos Faloutsos Graph mining: Laws, generators, and algorithms . . . . . . . . . . . . . . . 2:1--2:69 Srikumar Venugopal and Rajkumar Buyya and Kotagiri Ramamohanarao A taxonomy of Data Grids for distributed data sharing, management, and processing 3:1--3:53
Jordi Turmo and Alicia Ageno and Neus Catal\`a Adaptive information extraction . . . . 4:1--4:47 Aaron Ceglar and John F. Roddick Association mining . . . . . . . . . . . 5:1--5:42 Justin Zobel and Alistair Moffat Inverted files for text search engines 6:1--6:56
Jing Ma and Jeffrey V. Nickerson Hands-on, simulated, and remote laboratories: a comparative literature review . . . . . . . . . . . . . . . . . 7:1--7:24 Alice Miller and Alastair Donaldson and Muffy Calder Symmetry in temporal logic model checking . . . . . . . . . . . . . . . . 8:1--8:36 Liqiang Geng and Howard J. Hamilton Interestingness measures for data mining: a survey . . . . . . . . . . . . 9:1--9:32 Goetz Graefe Implementing sorting in database systems 10:1--10:37
Richard A. Frost Realization of natural language interfaces using lazy functional programming . . . . . . . . . . . . . . 11:1--11:54 Lucas Bordeaux and Youssef Hamadi and Lintao Zhang Propositional Satisfiability and Constraint Programming: a comparative survey . . . . . . . . . . . . . . . . . 12:1--12:54 Alper Yilmaz and Omar Javed and Mubarak Shah Object tracking: a survey . . . . . . . 13:1--13:45
Johann Van Der Merwe and Dawoud Dawoud and Stephen McDonald A survey on peer-to-peer key management for mobile ad hoc networks . . . . . . . 1:1--1:45 Gonzalo Navarro and Veli Mäkinen Compressed full-text indexes . . . . . . 2:1--2:61 Tao Peng and Christopher Leckie and Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems . . . . . . . . . . . . . . . . 3:1--3:42
Simon J. Puglisi and W. F. Smyth and Andrew H. Turpin A taxonomy of suffix array construction algorithms . . . . . . . . . . . . . . . 4:1--4:31 Dong Zheng and Yan Liu and Jiying Zhao and Abdulmotaleb El Saddik A survey of RST invariant image watermarking algorithms . . . . . . . . 5:1--5:91 Dagmar Bruss and Gábor Erdélyi and Tim Meyer and Tobias Riege and Jörg Rothe Quantum cryptography: a survey . . . . . 6:1--6:27
Suleyman Uludag and King-Shan Lui and Klara Nahrstedt and Gregory Brewster Analysis of Topology Aggregation techniques for QoS routing . . . . . . . 7:1--7:31 Mark Truran and James Goulding and Helen Ashman Autonomous authoring tools for hypertext 8:1--8:30 Eduardo F. Nakamura and Antonio A. F. Loureiro and Alejandro C. Frery Information fusion for wireless sensor networks: Methods, models, and classifications . . . . . . . . . . . . 9:1--9:55
Akrivi Katifori and Constantin Halatsis and George Lepouras and Costas Vassilakis and Eugenia Giannopoulou Ontology visualization methods --- a survey . . . . . . . . . . . . . . . . . 10:1--10:43 David B. Thomas and Wayne Luk and Philip H. W. Leong and John D. Villasenor Gaussian random number generators . . . 11:1--11:38 Konstantinos Morfonios and Stratis Konakas and Yannis Ioannidis and Nikolaos Kotsis ROLAP implementations of the data cube 12:1--12:53
Renzo Angles and Claudio Gutierrez Survey of graph database models . . . . 1:1--1:39 Ricardo Fabbri and Luciano Da F. Costa and Julio C. Torelli and Odemir M. Bruno $2$D Euclidean distance transform algorithms: a comparative survey . . . . 2:1--2:44 Raman Ramsin and Richard F. Paige Process-centered review of object oriented software development methodologies . . . . . . . . . . . . . 3:1--3:89
Iwan Vosloo and Derrick G. Kourie Server-centric Web frameworks: an overview . . . . . . . . . . . . . . . . 4:1--4:33 Ritendra Datta and Dhiraj Joshi and Jia Li and James Z. Wang Image retrieval: Ideas, influences, and trends of the new age . . . . . . . . . 5:1--5:60 Vincenzo De Florio and Chris Blondia A survey of linguistic structures for application-level fault tolerance . . . 6:1--6:37
Markus C. Huebscher and Julie A. McCann A survey of autonomic computing --- degrees, models, and applications . . . 7:1--7:28 Adam Lopez Statistical machine translation . . . . 8:1--8:49 Peter C. Chapin and Christian Skalka and X. Sean Wang Authorization in trust management: Features and foundations . . . . . . . . 9:1--9:48 Stefan Miltchev and Jonathan M. Smith and Vassilis Prevelakis and Angelos Keromytis and Sotiris Ioannidis Decentralized access control in distributed file systems . . . . . . . . 10:1--10:30
Ihab F. Ilyas and George Beskales and Mohamed A. Soliman A survey of top-$k$ query processing techniques in relational database systems . . . . . . . . . . . . . . . . 11:1--11:58 S. Biasotti and L. De Floriani and B. Falcidieno and P. Frosini and D. Giorgi and C. Landi and L. Papaleo and M. Spagnuolo Describing shapes by geometrical-topological properties of real functions . . . . . . . . . . . . . 12:1--12:87
Jens Bleiholder and Felix Naumann Data fusion . . . . . . . . . . . . . . 1:1--1:41 Andy Cockburn and Amy Karlson and Benjamin B. Bederson A review of overview+detail, zooming, and focus+context interfaces . . . . . . 2:1--2:31 Michael Benedikt and Christoph Koch XPath leashed . . . . . . . . . . . . . 3:1--3:54 Richard B. Borie and R. Gary Parker and Craig A. Tovey Solving problems on recursively constructed graphs . . . . . . . . . . . 4:1--4:51 Jose A. Onieva and Jianying Zhou and Javier Lopez Multiparty nonrepudiation: a survey . . 5:1--5:43 Kate A. Smith-Miles Cross-disciplinary perspectives on meta-learning for algorithm selection 6:1--6:25 Besma R. Abidi and Nash R. Aragam and Yi Yao and Mongi A. Abidi Survey and analysis of multimodal sensor planning and integration for wide area surveillance . . . . . . . . . . . . . . 7:1--7:36
Nathan Brown Chemoinformatics --- an introduction for computer scientists . . . . . . . . . . 8:1--8:38 Robert M. Hierons and Kirill Bogdanov and Jonathan P. Bowen and Rance Cleaveland and John Derrick and Jeremy Dick and Marian Gheorghe and Mark Harman and Kalpesh Kapoor and Paul Krause and Gerald Lüttgen and Anthony J. H. Simons and Sergiy Vilkomir and Martin R. Woodward and Hussein Zedan Using formal specifications to support testing . . . . . . . . . . . . . . . . 9:1--9:76 Roberto Navigli Word sense disambiguation: a survey . . 10:1--10:69 Alicia Iriberri and Gondy Leroy A life-cycle perspective on online community success . . . . . . . . . . . 11:1--11:29 Xiaoguang Qi and Brian D. Davison Web page classification: Features and algorithms . . . . . . . . . . . . . . . 12:1--12:31 Carlo A. Furia and Matteo Pradella and Matteo Rossi Comments on temporal logics for real-time system specification . . . . . 13:1--13:5
Gary H. Sockut and Balakrishna R. Iyer Online reorganization of databases . . . 14:1--14:136 Varun Chandola and Arindam Banerjee and Vipin Kumar Anomaly detection: a survey . . . . . . 15:1--15:58 Carlo Batini and Cinzia Cappiello and Chiara Francalanci and Andrea Maurino Methodologies for data quality assessment and improvement . . . . . . . 16:1--16:52 Claudio Carpineto and Stanislaw Osi\'nski and Giovanni Romano and Dawid Weiss A survey of Web clustering engines . . . 17:1--17:38
C. A. R. Hoare and Jayadev Misra Preface to special issue on software verification . . . . . . . . . . . . . . 18:1--18:3 Jim Woodcock and Peter Gorm Larsen and Juan Bicarregui and John Fitzgerald Formal methods: Practice and experience 19:1--19:36 Natarajan Shankar Automated deduction for verification . . 20:1--20:56 Ranjit Jhala and Rupak Majumdar Software model checking . . . . . . . . 21:1--21:54 C. A. R. Hoare and Jayadev Misra and Gary T. Leavens and Natarajan Shankar The verified software initiative: a manifesto . . . . . . . . . . . . . . . 22:1--22:8
Kevin Hoffman and David Zage and Cristina Nita-Rotaru A survey of attack and defense techniques for reputation systems . . . 1:1--1:31 Hubie Chen A rendezvous of logic, complexity, and algebra . . . . . . . . . . . . . . . . 2:1--2:32 Alexis Kirke and Eduardo Reck Miranda A survey of computer systems for expressive music performance . . . . . . 3:1--3:41 James A. Muir and Paul C. Van Oorschot Internet geolocation: Evasion and counterevasion . . . . . . . . . . . . . 4:1--4:23 Matthew Edman and Bülent Yener On anonymity in an electronic society: a survey of anonymous communication systems . . . . . . . . . . . . . . . . 5:1--5:35
Carlo A. Furia and Dino Mandrioli and Angelo Morzenti and Matteo Rossi Modeling time in computing: a taxonomy and a comparative survey . . . . . . . . 6:1--6:59 Bernhard Haslhofer and Wolfgang Klas A survey of techniques for achieving metadata interoperability . . . . . . . 7:1--7:37 Zhiwen Yu and Yuichi Nakamura Smart meeting systems: a survey of state-of-the-art and open issues . . . . 8:1--8:20 Jaume Abella and Xavier Vera Electromigration for microarchitects . . 9:1--9:18
Felix Salfner and Maren Lenk and Miroslaw Malek A survey of online failure prediction methods . . . . . . . . . . . . . . . . 10:1--10:42 Yildiray Kabak and Asuman Dogac A survey and analysis of electronic business document standards . . . . . . 11:1--11:31 Sergio Ilarri and Eduardo Mena and Arantza Illarramendi Location-dependent query processing: Where we are and where we are heading 12:1--12:73
João M. P. Cardoso and Pedro C. Diniz and Markus Weinhardt Compiling for reconfigurable computing: a survey . . . . . . . . . . . . . . . . 13:1--13:65 Benjamin C. M. Fung and Ke Wang and Rui Chen and Philip S. Yu Privacy-preserving data publishing: a survey of recent developments . . . . . 14:1--14:53 Wen Gao and Yonghong Tian and Tiejun Huang and Qiang Yang Vlogging: a survey of videoblogging technology on the Web . . . . . . . . . 15:1--15:57
Mario Cannataro and Pietro H. Guzzi and Pierangelo Veltri Protein-to-protein interactions: Technologies, databases, and algorithms 1:1--1:36 Sarah M. Diesburg and An-I Andy Wang A survey of confidential data storage and deletion methods . . . . . . . . . . 2:1--2:37 Nizar R. Mabroukeh and C. I. Ezeife A taxonomy of sequential pattern mining algorithms . . . . . . . . . . . . . . . 3:1--3:41 Hafedh Mili and Guy Tremblay and Guitta Bou Jaoude and Éric Lefebvre and Lamia Elabed and Ghizlane El Boussaidi Business process modeling languages: Sorting through the alphabet soup . . . 4:1--4:56 Jinu Kurian and Kamil Sarac A survey on the design, applications, and enhancements of application-layer overlay networks . . . . . . . . . . . . 5:1--5:34
Pimwadee Chaovalit and Aryya Gangopadhyay and George Karabatis and Zhiyuan Chen Discrete wavelet transform-based time series analysis and mining . . . . . . . 6:1--6:37 Aline Carneiro Viana and Stephane Maag and Fatiha Zaidi One step forward: Linking wireless self-organizing network validation techniques with formal testing approaches . . . . . . . . . . . . . . . 7:1--7:36 Guido Urdaneta and Guillaume Pierre and Maarten Van Steen A survey of DHT security techniques . . 8:1--8:49 Felix C. Freiling and Rachid Guerraoui and Petr Kuznetsov The failure detector abstraction . . . . 9:1--9:40 Simon Parsons and Juan A. Rodriguez-Aguilar and Mark Klein Auctions and bidding: a guide for computer scientists . . . . . . . . . . 10:1--10:59 Changhai Nie and Hareton Leung A survey of combinatorial testing . . . 11:1--11:29 Wei Jie and Junaid Arshad and Richard Sinnott and Paul Townend and Zhou Lei A review of grid authentication and authorization technologies and support for federated access control . . . . . . 12:1--12:26
Clémence Magnien and Matthieu Latapy and Jean-Loup Guillaume Impact of random failures and attacks on Poisson and power-law random networks 13:1--13:31 Patricia Beatty and Ian Reay and Scott Dick and James Miller Consumer trust in e-commerce Web sites: a meta-study . . . . . . . . . . . . . . 14:1--14:46 Kathleen Mcgill and Stephen Taylor Robot algorithms for localization of multiple emission sources . . . . . . . 15:1--15:25 J. K. Aggarwal and M. S. Ryoo Human activity analysis: a review . . . 16:1--16:43 Sarvnaz Karimi and Falk Scholer and Andrew Turpin Machine transliteration survey . . . . . 17:1--17:46 Roland Ducournau Implementing statically typed object-oriented programming languages 18:1--18:48 Luca Mottola and Gian Pietro Picco Programming wireless sensor networks: Fundamental concepts and state of the art . . . . . . . . . . . . . . . . . . 19:1--19:51 Steffen Van Bakel Strict intersection types for the Lambda Calculus . . . . . . . . . . . . . . . . 20:1--20:49 Andrew J. Ko and Robin Abraham and Laura Beckwith and Alan Blackwell and Margaret Burnett and Martin Erwig and Chris Scaffidi and Joseph Lawrance and Henry Lieberman and Brad Myers and Mary Beth Rosson and Gregg Rothermel and Mary Shaw and Susan Wiedenbeck The state of the art in end-user software engineering . . . . . . . . . . 21:1--21:44 Elias P. Duarte, Jr. and Roverli P. Ziwich and Luiz C. P. Albini A survey of comparison-based system-level diagnosis . . . . . . . . . 22:1--22:56 Yuhui Deng What is the future of disk drives, death or rebirth? . . . . . . . . . . . . . . 23:1--23:27
Laurie McLeod and Stephen G. MacDonell Factors that affect software systems development project outcomes: a survey of research . . . . . . . . . . . . . . 24:1--24:56 Alsayed Algergawy and Marco Mesiti and Richi Nayak and Gunter Saake XML data clustering: an overview . . . . 25:1--25:41 Anderson Rocha and Walter Scheirer and Terrance Boult and Siome Goldenstein Vision of the unseen: Current trends and challenges in digital image and video forensics . . . . . . . . . . . . . . . 26:1--26:42 Sergio Damas and Oscar Cordón and Oscar Ibáñez and Jose Santamaría and Inmaculada Alemán and Miguel Botella and Fernando Navarro Forensic identification by computer-aided craniofacial superimposition: a survey . . . . . . . 27:1--27:27 Manuel Wimmer and Andrea Schauerhuber and Gerti Kappel and Werner Retschitzegger and Wieland Schwinger and Elizabeth Kapsammer A survey on UML-based aspect-oriented design modeling . . . . . . . . . . . . 28:1--28:33 Ferdous A. Sohel and Gour C. Karmakar and Laurence S. Dooley and Mohammed Bennamoun Geometric distortion measurement for shape coding: a contemporary review . . 29:1--29:22 Torsten Anders and Eduardo R. Miranda Constraint programming systems for modeling music theories and composition 30:1--30:38 Matthew G. Parris and Carthik A. Sharma and Ronald F. Demara Progress in autonomous fault recovery of field programmable gate arrays . . . . . 31:1--31:30 Bang Wang Coverage problems in sensor networks: a survey . . . . . . . . . . . . . . . . . 32:1--32:53 Davide Falessi and Giovanni Cantone and Rick Kazman and Philippe Kruchten Decision-making techniques for software architecture design: a comparative survey . . . . . . . . . . . . . . . . . 33:1--33:28 Tomá\vs Skopal and Benjamin Bustos On nonmetric similarity search problems in complex domains . . . . . . . . . . . 34:1--34:50 Robert I. Davis and Alan Burns A survey of hard real-time scheduling for multiprocessor systems . . . . . . . 35:1--35:44 Fariba Sadri Ambient intelligence: a survey . . . . . 36:1--36:66
Claudio Carpineto and Giovanni Romano A Survey of Automatic Query Expansion in Information Retrieval . . . . . . . . . 1:1--1:50 David Zhang and Wangmeng Zuo and Feng Yue A Comparative Study of Palmprint Recognition Algorithms . . . . . . . . . 2:1--2:37 Hanne Riis Nielson and Flemming Nielson and Henrik Pilegaard Flow Logic for Process Calculi . . . . . 3:1--3:39 Songbo Song and Hassnaa Moustafa and Hossam Afifi A Survey on Personalized TV and NGN Services through Context-Awareness . . . 4:1--4:18 Robert Wójcik and Andrzej Jajszczyk Flow Oriented Approaches to QoS Assurance . . . . . . . . . . . . . . . 5:1--5:37
Manuel Egele and Theodoor Scholte and Engin Kirda and Christopher Kruegel A survey on automated dynamic malware-analysis techniques and tools 6:1--6:42 Kevin Crowston and Kangning Wei and James Howison and Andrea Wiggins Free\slash Libre open-source software development: What we know and what we do not know . . . . . . . . . . . . . . . . 7:1--7:35 Pedro Antunes and Valeria Herskovic and Sergio F. Ochoa and Jose A. Pino Structuring dimensions for collaborative systems evaluation . . . . . . . . . . . 8:1--8:28 Godwin Caruana and Maozhen Li A survey of emerging approaches to spam filtering . . . . . . . . . . . . . . . 9:1--9:27
Jan Midtgaard Control-flow analysis of functional programs . . . . . . . . . . . . . . . . 10:1--10:33 Hossain Shahriar and Mohammad Zulkernine Mitigating program security vulnerabilities: Approaches and challenges . . . . . . . . . . . . . . . 11:1--11:46 Josep Silva A vocabulary of program slicing-based techniques . . . . . . . . . . . . . . . 12:1--12:41 Joonho Kong and Sung Woo Chung and Kevin Skadron Recent thermal management techniques for microprocessors . . . . . . . . . . . . 13:1--13:42 Syed M. S. Islam and Mohammed Bennamoun and Robyn A. Owens and Rowan Davies A review of recent advances in $3$D ear- and expression-invariant face biometrics 14:1--14:34 Gianpaolo Cugola and Alessandro Margara Processing flows of information: From data stream to complex event processing 15:1--15:62 John Hatcliff and Gary T. Leavens and K. Rustan M. Leino and Peter Müller and Matthew Parkinson Behavioral interface specification languages . . . . . . . . . . . . . . . 16:1--16:58 Yves Younan and Wouter Joosen and Frank Piessens Runtime countermeasures for code injection attacks against C and C++ programs . . . . . . . . . . . . . . . . 17:1--17:28
Lukasz Budzisz and Johan Garcia and Anna Brunstrom and Ramon Ferrús A taxonomy and survey of SCTP research 18:1--18:36 Robert Biddle and Sonia Chiasson and P. C. Van Oorschot Graphical passwords: Learning from the first twelve years . . . . . . . . . . . 19:1--19:41 Wilson Wong and Wei Liu and Mohammed Bennamoun Ontology learning from text: a look back and into the future . . . . . . . . . . 20:1--20:36 Huaiyu Liu and Mic Bowman and Francis Chang Survey of state melding in virtual worlds . . . . . . . . . . . . . . . . . 21:1--21:25 Pedro Gonnet A review of error estimation in adaptive quadrature . . . . . . . . . . . . . . . 22:1--22:36 Cigdem Sengul and Aline Carneiro Viana and Artur Ziviani A survey of adaptive services to cope with dynamics in wireless self-organizing networks . . . . . . . . 23:1--23:35 Paolo Bellavista and Antonio Corradi and Mario Fanelli and Luca Foschini A survey of context data distribution for mobile ubiquitous systems . . . . . 24:1--24:45 Meng Wang and Bingbing Ni and Xian-Sheng Hua and Tat-Seng Chua Assistive tagging: a survey of multimedia tagging with human-computer joint exploration . . . . . . . . . . . 25:1--25:24 Luca Cittadini and Giuseppe Di Battista and Massimo Rimondini On the stability of interdomain routing 26:1--26:40
Dong Zhou and Mark Truran and Tim Brailsford and Vincent Wade and Helen Ashman Translation techniques in cross-language information retrieval . . . . . . . . . 1:1--1:44 Simona Bernardi and José Merseguer and Dorina C. Petriu Dependability modeling and analysis of software systems specified with UML . . 2:1--2:48 Sasikanth Avancha and Amit Baxi and David Kotz Privacy in mobile technology for personal healthcare . . . . . . . . . . 3:1--3:54 Sergey Zhuravlev and Juan Carlos Saez and Sergey Blagodurov and Alexandra Fedorova and Manuel Prieto Survey of scheduling techniques for addressing shared resources in multicore processors . . . . . . . . . . . . . . . 4:1--4:28 Anisa Al-Hafeedh and Maxime Crochemore and Lucian Ilie and Evguenia Kopylova and W. F. Smyth and German Tischler and Munina Yusufu A comparison of index-based Lempel--Ziv LZ77 factorization algorithms . . . . . 5:1--5:17 Boris Danev and Davide Zanetti and Srdjan Capkun On physical-layer identification of wireless devices . . . . . . . . . . . . 6:1--6:29 Yi Zhi Zhao and Chunyan Miao and Maode Ma and Jing Bing Zhang and Cyril Leung A survey and projection on medium access control protocols for wireless sensor networks . . . . . . . . . . . . . . . . 7:1--7:37 Glenn I. Hawe and Graham Coates and Duncan T. Wilson and Roger S. Crouch Agent-based simulation for large-scale emergency response: a survey of usage and implementation . . . . . . . . . . . 8:1--8:51 R. Annie Uthra and S. V. Kasmir Raja QoS routing in wireless sensor networks --- a survey . . . . . . . . . . . . . . 9:1--9:12 João Mendes-Moreira and Carlos Soares and Alípio Mário Jorge and Jorge Freire De Sousa Ensemble approaches for regression: a survey . . . . . . . . . . . . . . . . . 10:1--10:40 Mark Harman and S. Afshin Mansouri and Yuanyuan Zhang Search-based software engineering: Trends, techniques and applications . . 11:1--11:61 Philippe Esling and Carlos Agon Time-series data mining . . . . . . . . 12:1--12:34
Simone Faro and Thierry Lecroq The exact online string matching problem: a review of the most recent results . . . . . . . . . . . . . . . . 13:1--13:42 Angeliki Kritikakou and Francky Catthoor and Vasilios Kelefouras and Costas Goutis A systematic approach to classify design-time global scheduling techniques 14:1--14:30 Marco Attene and Marcel Campen and Leif Kobbelt Polygon mesh repairing: an application perspective . . . . . . . . . . . . . . 15:1--15:33 Susan Lomax and Sunil Vadera A survey of cost-sensitive decision tree induction algorithms . . . . . . . . . . 16:1--16:35 Michael Pearce and Sherali Zeadally and Ray Hunt Virtualization: Issues, security threats, and solutions . . . . . . . . . 17:1--17:39 Maria Elena Acevedo-Mosqueda and Cornelio Yáñez-Márquez and Marco Antonio Acevedo-Mosqueda Bidirectional Associative Memories: Different approaches . . . . . . . . . . 18:1--18:30 Carl H. Mooney and John F. Roddick Sequential pattern mining --- approaches and algorithms . . . . . . . . . . . . . 19:1--19:39 Timo Koskela and Otso Kassinen and Erkki Harjula and Mika Ylianttila P2P group management systems: a conceptual analysis . . . . . . . . . . 20:1--20:25 Mehdi Saeedi and Igor L. Markov Synthesis and optimization of reversible circuits --- a survey . . . . . . . . . 21:1--21:34 Ayman Abaza and Arun Ross and Christina Hebert and Mary Ann F. Harrison and Mark S. Nixon A survey on ear biometrics . . . . . . . 22:1--22:35 Mohammad Tanvir Parvez and Sabri A. Mahmoud Offline Arabic handwritten text recognition: a survey . . . . . . . . . 23:1--23:35 Jukka Suomela Survey of local algorithms . . . . . . . 24:1--24:40
Mohammad Hossein Manshaei and Quanyan Zhu and Tansu Alpcan and Tamer Bacsar and Jean-Pierre Hubaux Game theory meets network security and privacy . . . . . . . . . . . . . . . . 25:1--25:39 James Stanier and Des Watson Intermediate representations in imperative compilers: a survey . . . . . 26:1--26:27 Seyed Amir Hoseini-Tabatabaei and Alexander Gluhak and Rahim Tafazolli A survey on smartphone-based systems for opportunistic user context recognition 27:1--27:51 Christian Colombo and Gordon J. Pace Recovery within long-running transactions . . . . . . . . . . . . . . 28:1--28:35 Omer Zilberberg and Shlomo Weiss and Sivan Toledo Phase-change memory: an architectural perspective . . . . . . . . . . . . . . 29:1--29:33 João V. Gomes and Pedro R. M. Inácio and Manuela Pereira and Mário M. Freire and Paulo P. Monteiro Detection and classification of peer-to-peer traffic: a survey . . . . . 30:1--30:40 Floarea Serban and Joaquin Vanschoren and Jörg-Uwe Kietz and Abraham Bernstein A survey of intelligent assistants for data analysis . . . . . . . . . . . . . 31:1--31:35 Wei Zang and Ann Gordon-Ross A survey on cache tuning from a power/energy perspective . . . . . . . . 32:1--32:49 Tom Bostoen and Sape Mullender and Yolande Berbers Power-reduction techniques for data-center storage systems . . . . . . 33:1--33:38 John David N. Dionisio and William G. Burns III and Richard Gilbert $3$D Virtual worlds and the metaverse: Current status and future possibilities 34:1--34:38 Matej Crepinsek and Shih-Hsi Liu and Marjan Mernik Exploration and exploitation in evolutionary algorithms: a survey . . . 35:1--35:33 Leandro Silva Galvão De Carvalho and Edjair De Souza Mota Survey on application-layer mechanisms for speech quality adaptation in VoIP 36:1--36:31 Xavier Grehant and Isabelle Demeure and Sverre Jarp A survey of task mapping on production grids . . . . . . . . . . . . . . . . . 37:1--37:25 Abbas Eslami Kiasari and Axel Jantsch and Zhonghai Lu Mathematical formalisms for performance evaluation of networks-on-chip . . . . . 38:1--38:41 Andrew Newell and Jing Dong and Cristina Nita-Rotaru On the practicality of cryptographic defences against pollution attacks in wireless network coding . . . . . . . . 39:1--39:26 Gábor Pék and Levente Butty'an and Boldizsár Bencsáth A survey of security issues in hardware virtualization . . . . . . . . . . . . . 40:1--40:34
Lilian Bossuet and Michael Grand and Lubos Gaspar and Viktor Fischer and Guy Gogniat Architectures of flexible symmetric key crypto engines --- a survey: From hardware coprocessor to multi-crypto-processor system on chip 41:1--41:32 Christine Parent and Stefano Spaccapietra and Chiara Renso and Gennady Andrienko and Natalia Andrienko and Vania Bogorny and Maria Luisa Damiani and Aris Gkoulalas-Divanis and Jose Macedo and Nikos Pelekis and Yannis Theodoridis and Zhixian Yan Semantic trajectories modeling and analysis . . . . . . . . . . . . . . . . 42:1--42:32 Jierui Xie and Stephen Kelley and Boleslaw K. Szymanski Overlapping community detection in networks: The state-of-the-art and comparative study . . . . . . . . . . . 43:1--43:35 Jiajun Liu and Zi Huang and Hongyun Cai and Heng Tao Shen and Chong Wah Ngo and Wei Wang Near-duplicate video retrieval: Current research and future trends . . . . . . . 44:1--44:23 Rafael A. Rodríguez-Gómez and Gabriel Maciá-Fernández and Pedro García-Teodoro Survey and taxonomy of botnet research through life-cycle . . . . . . . . . . . 45:1--45:33 Anirban Basu and Simon Fleming and James Stanier and Stephen Naicken and Ian Wakeman and Vijay K. Gurbani The state of peer-to-peer network simulators . . . . . . . . . . . . . . . 46:1--46:25 Wanita Sherchan and Surya Nepal and Cecile Paris A survey of trust in social networks . . 47:1--47:33 Rajshekar Kalayappan and Smruti R. Sarangi A survey of checker architectures . . . 48:1--48:34 Jian Chang and Krishna K. Venkatasubramanian and Andrew G. West and Insup Lee Analyzing and defending against Web-based malware . . . . . . . . . . . 49:1--49:35 Anne Benoit and Ümit V. Çatalyürek and Yves Robert and Erik Saule A survey of pipelined workflow scheduling: Models and algorithms . . . 50:1--50:36 Arnaud Hubaux and Thein Than Tun and Patrick Heymans Separation of concerns in feature diagram languages: a systematic survey 51:1--51:23 Engineer Bainomugisha and Andoni Lombide Carreton and Tom van Cutsem and Stijn Mostinckx and Wolfgang de Meuter A survey on reactive programming . . . . 52:1--52:34 Kelly Androutsopoulos and David Clark and Mark Harman and Jens Krinke and Laurence Tratt State-based model slicing: a survey . . 53:1--53:36 Daniel Lazaro and Joan Manuel Marques and Josep Jorba and Xavier Vilajosana Decentralized resource discovery mechanisms for distributed computing in peer-to-peer environments . . . . . . . 54:1--54:54 Levi Shaul and Doron Tauber Critical success factors in enterprise resource planning systems: Review of the last decade . . . . . . . . . . . . . . 55:1--55:39
Kyriakos Kritikos and Barbara Pernici and Pierluigi Plebani and Cinzia Cappiello and Marco Comuzzi and Salima Benrernou and Ivona Brandic and Attila Kertész and Michael Parkin and Manuel Carro A survey on service quality description 1:1--1:?? Sibel Yenikaya and Gökhan Yenikaya and Ekrem Düven Keeping the vehicle on the road: a survey on on-road lane detection systems 2:1--2:?? Damian A. Tamburri and Patricia Lago and Hans van Vliet Organizational social structures for software engineering . . . . . . . . . . 3:1--3:?? Kevin A. Roundy and Barton P. Miller Binary-code obfuscations in prevalent packer tools . . . . . . . . . . . . . . 4:1--4:?? Rocco de Nicola and Diego Latella and Michele Loreti and Mieke Massink A uniform definition of stochastic process calculi . . . . . . . . . . . . 5:1--5:?? Flavio Esposito and Ibrahim Matta and Vatche Ishakian Slice embedding solutions for distributed service architectures . . . 6:1--6:?? Aluizio F. R. Araujo and Renata L. M. E. Rego Self-organizing maps with a time-varying structure . . . . . . . . . . . . . . . 7:1--7:?? Martin Radetzki and Chaochao Feng and Xueqian Zhao and Axel Jantsch Methods for fault tolerance in networks-on-chip . . . . . . . . . . . . 8:1--8:?? Amir Yahyavi and Bettina Kemme Peer-to-peer architectures for massively multiplayer online games: a survey . . . 9:1--9:?? Xin Zhang and Yee-Hong Yang and Zhiguang Han and Hui Wang and Chao Gao Object class detection: a survey . . . . 10:1--10:?? Sherif Sakr and Anna Liu and Ayman G. Fayoumi The family of MapReduce and large-scale data processing systems . . . . . . . . 11:1--11:?? Talal H. Noor and Quan Z. Sheng and Sherali Zeadally and Jian Yu Trust management of services in cloud environments: obstacles and solutions 12:1--12:?? Jonathan A. Silva and Elaine R. Faria and Rodrigo C. Barros and Eduardo R. Hruschka and André C. P. L. F. de Carvalho and João Gama Data stream clustering: a survey . . . . 13:1--13:?? Kanthaiah Sivapragasam Vijayalayan and Aaron Harwood and Shanika Karunasekera Distributed scheduling schemes for wireless mesh networks: a survey . . . . 14:1--14:??
Soumya Sen and Carlee Joe-Wong and Sangtae Ha and Mung Chiang A survey of smart data pricing: Past proposals, current plans, and future trends . . . . . . . . . . . . . . . . . 15:1--15:?? Anne-Marie Kermarrec and Peter Triantafillou XL peer-to-peer pub/sub systems . . . . 16:1--16:?? Pablo Samuel Castro and Daqing Zhang and Chao Chen and Shijian Li and Gang Pan From taxi GPS traces to social and community dynamics: a survey . . . . . . 17:1--17:?? Qiong Wu and Chunyan Miao Curiosity: From psychology to computation . . . . . . . . . . . . . . 18:1--18:?? Ádám Csapó and György Wersényi Overview of auditory representations in human-machine interfaces . . . . . . . . 19:1--19:?? Wojciech Mazurczyk VoIP steganography and its detection --- a survey . . . . . . . . . . . . . . . . 20:1--20:?? Peter Gammie Synchronous digital circuits as functional programs . . . . . . . . . . 21:1--21:?? Subir K. Ghosh and Partha P. Goswami Unsolved problems in visibility graphs of points, segments, and polygons . . . 22:1--22:?? Rebekka S. Renner and Boris M. Velichkovsky and Jens R. Helmert The perception of egocentric distances in virtual environments --- a review . . 23:1--23:?? Karim Barkati and Pierre Jouvelot Synchronous programming in audio processing: a lookup table oscillator case study . . . . . . . . . . . . . . . 24:1--24:?? Zheng Yang and Zimu Zhou and Yunhao Liu From RSSI to CSI: Indoor localization via channel response . . . . . . . . . . 25:1--25:?? Ricardo Wandré Dias Pedro and Fátima L. S. Nunes and Ariane Machado-Lima Using grammars for pattern recognition in images: a systematic review . . . . . 26:1--26:?? Orlando R. E. Pereira and Joel J. P. C. Rodrigues Survey and analysis of current mobile learning applications and technologies 27:1--27:?? Israel Herraiz and Daniel Rodriguez and Gregorio Robles and Jesus M. Gonzalez-Barahona The evolution of the laws of software evolution: a discussion based on a systematic literature review . . . . . . 28:1--28:?? Roberto Vezzani and Davide Baltieri and Rita Cucchiara People reidentification in surveillance and forensics: a survey . . . . . . . . 29:1--29:??
Violeta Medina and Juan Manuel García A survey of migration mechanisms of virtual machines . . . . . . . . . . . . 30:1--30:?? Feng Li and Beng Chin Ooi and M. Tamer Özsu and Sai Wu Distributed data management using MapReduce . . . . . . . . . . . . . . . 31:1--31:?? Andrea Bellucci and Alessio Malizia and Ignacio Aedo Light on horizontal interactive surfaces: Input space for tabletop computing . . . . . . . . . . . . . . . 32:1--32:?? Andreas Bulling and Ulf Blanke and Bernt Schiele A tutorial on human activity recognition using body-worn inertial sensors . . . . 33:1--33:?? Carlo A. Furia and Bertrand Meyer and Sergey Velder Loop invariants: Analysis, classification, and examples . . . . . . 34:1--34:?? Bin Li and Steven C. H. Hoi Online portfolio selection: a survey . . 35:1--35:?? Dongzhe Ma and Jianhua Feng and Guoliang Li A survey of address translation technologies for flash memories . . . . 36:1--36:?? Mardé Helbig and Andries P. Engelbrecht Benchmarks for dynamic multi-objective optimisation algorithms . . . . . . . . 37:1--37:?? Tao Mei and Yong Rui and Shipeng Li and Qi Tian Multimedia search reranking: a literature survey . . . . . . . . . . . 38:1--38:?? Peter Fontana and Rance Cleaveland A menagerie of timed automata . . . . . 40:1--40:?? Arlind Kopliku and Karen Pinel-Sauvagnat and Mohand Boughanem Aggregated search: a new information retrieval paradigm . . . . . . . . . . . 41:1--41:?? Marta R. Costa-Juss\`a and Mireia Farrús Statistical machine translation enhancements through linguistic levels: a survey . . . . . . . . . . . . . . . . 42:1--42:??
Natalia Díaz Rodríguez and M. P. Cuéllar and Johan Lilius and Miguel Delgado Calvo-Flores A survey on ontologies for human behavior recognition . . . . . . . . . . 43:1--43:?? Martin Hirzel and Robert Soulé and Scott Schneider and Bugra Gedik and Robert Grimm A catalog of stream processing optimizations . . . . . . . . . . . . . 46:1--46:?? Anne-Cecile Orgerie and Marcos Dias de Assuncao and Laurent Lefevre A survey on techniques for improving the energy efficiency of large-scale distributed systems . . . . . . . . . . 47:1--47:?? C. M. Krishna Fault-tolerant scheduling in homogeneous real-time systems . . . . . . . . . . . 48:1--48:?? Héctor Pérez and J. Javier Gutiérrez A survey on standards for real-time distribution middleware . . . . . . . . 49:1--49:?? Gonzalo Navarro Spaces, Trees, and Colors: The algorithmic landscape of document retrieval on sequences . . . . . . . . . 52:1--52:?? Michael Henson and Stephen Taylor Memory encryption: a survey of existing techniques . . . . . . . . . . . . . . . 53:1--53:?? Robert Mitchell and Ing-Ray Chen A survey of intrusion detection techniques for cyber-physical systems 55:1--55:??
Yao-Yi Chiang and Stefan Leyk and Craig A. Knoblock A Survey of Digital Map Processing Techniques . . . . . . . . . . . . . . . 1:1--1:?? Thomas Winkler and Bernhard Rinner Security and Privacy Protection in Visual Sensor Networks: a Survey . . . . 2:1--2:?? Yue Shi and Martha Larson and Alan Hanjalic Collaborative Filtering beyond the User-Item Matrix: a Survey of the State of the Art and Future Challenges . . . . 3:1--3:?? Catherine Howard and Markus Stumptner A Survey of Directed Entity-Relation--Based First-Order Probabilistic Languages . . . . . . . . 4:1--4:?? Adel Nadjaran Toosi and Rodrigo N. Calheiros and Rajkumar Buyya Interconnected Cloud Computing Environments: Challenges, Taxonomy, and Survey . . . . . . . . . . . . . . . . . 7:1--7:?? Ming Ki Chong and Rene Mayrhofer and Hans Gellersen A Survey of User Interaction for Spontaneous Device Association . . . . . 8:1--8:?? Pierre A. Akiki and Arosha K. Bandara and Yijun Yu Adaptive Model-Driven User Interface Development Systems . . . . . . . . . . 9:1--9:?? Charu Aggarwal and Karthik Subbian Evolutionary Network Analysis: a Survey 10:1--10:?? João Paulo and José Pereira A Survey and Classification of Storage Deduplication Systems . . . . . . . . . 11:1--11:?? You-Chiun Wang Mobile Sensor Networks: System Hardware and Dispatch Software . . . . . . . . . 12:1--12:?? Alessandra De Paola and Marco Ortolani and Giuseppe Lo Re and Giuseppe Anastasi and Sajal K. Das Intelligent Management Systems for Energy Efficiency in Buildings: a Survey 13:1--13:?? Joanne Treurniet A Taxonomy and Survey of Microscopic Mobility Models from the Mobile Networking Domain . . . . . . . . . . . 14:1--14:??
Ricardo Campos and Gaël Dias and Alípio M. Jorge and Adam Jatowt Survey of Temporal Information Retrieval and Related Applications . . . . . . . . 15:1--15:?? Roswitha Gostner and Bianca Baldacci and Melissa J. Morine and Corrado Priami Graphical Modeling Tools for Systems Biology . . . . . . . . . . . . . . . . 16:1--16:?? Alexander Thomasian Analysis of Fork/Join and Related Queueing Systems . . . . . . . . . . . . 17:1--17:?? Christoph Bösch and Pieter Hartel and Willem Jonker and Andreas Peter A Survey of Provably Secure Searchable Encryption . . . . . . . . . . . . . . . 18:1--18:?? Sparsh Mittal and Jeffrey S. Vetter A Survey of Methods for Analyzing and Improving GPU Energy Efficiency . . . . 19:1--19:?? Shahbaz Akhtar Abid and Mazliza Othman and Nadir Shah A Survey on DHT-Based Routing for Large-Scale Mobile Ad Hoc Networks . . . 20:1--20:?? Dong Qiu and Bixin Li and Shunhui Ji and Hareton Leung Regression Testing of Web Service: a Systematic Mapping Study . . . . . . . . 21:1--21:?? Azzedine Boukerche and Amir Darehshoorzadeh Opportunistic Routing in Wireless Networks: Models, Algorithms, and Classifications . . . . . . . . . . . . 22:1--22:?? Aron Laszka and Mark Felegyhazi and Levente Buttyan A Survey of Interdependent Information Security Games . . . . . . . . . . . . . 23:1--23:?? Andrew Newell and Hongyi Yao and Alex Ryker and Tracey Ho and Cristina Nita-Rotaru Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols . . . . . . . . . . . . . . . 24:1--24:?? Francesco Calabrese and Laura Ferrari and Vincent D. Blondel Urban Sensing Using Mobile Phone Network Data: a Survey of Research . . . . . . . 25:1--25:?? Geoffray Bonnin and Dietmar Jannach Automated Generation of Music Playlists: Survey and Experiments . . . . . . . . . 26:1--26:?? Nachikethas A. Jagadeesan and Bhaskar Krishnamachari Software-Defined Networking Paradigms in Wireless Networks: a Survey . . . . . . 27:1--27:?? Emanuela Marasco and Arun Ross A Survey on Antispoofing Schemes for Fingerprint Recognition Systems . . . . 28:1--28:?? Pujan Ziaie A Model for Context in the Design of Open Production Communities . . . . . . 29:1--29:?? Fanxin Kong and Xue Liu A Survey on Green-Energy-Aware Power Management for Datacenters . . . . . . . 30:1--30:?? Andy Cockburn and Carl Gutwin and Joey Scarr and Sylvain Malacria Supporting Novice to Expert Transitions in User Interfaces . . . . . . . . . . . 31:1--31:?? Jose Caceres-Cruz and Pol Arias and Daniel Guimarans and Daniel Riera and Angel A. Juan Rich Vehicle Routing Problem: Survey . . 32:1--32:?? Toni Mastelic and Ariel Oleksiak and Holger Claussen and Ivona Brandic and Jean-Marc Pierson and Athanasios V. Vasilakos Cloud Computing: Survey on Energy Efficiency . . . . . . . . . . . . . . . 33:1--33:?? Xin Li and S. S. Iyengar On Computing Mapping of $3$D Objects: a Survey . . . . . . . . . . . . . . . . . 34:1--34:?? Daniel Borrajo and Anna Roubícková and Ivan Serina Progress in Case-Based Planning . . . . 35:1--35:?? Xiaowei Zhou and Can Yang and Hongyu Zhao and Weichuan Yu Low-Rank Modeling and Its Applications in Image Analysis . . . . . . . . . . . 36:1--36:?? Felix Siegle and Tanya Vladimirova and Jòrgen Ilstad and Omar Emam Mitigation of Radiation Effects in SRAM-Based FPGAs for Space Applications 37:1--37:??
Dimitrios Rodopoulos and Georgia Psychou and Mohamed M. Sabry and Francky Catthoor and Antonis Papanikolaou and Dimitrios Soudris and Tobias G. Noll and David Atienza Classification Framework for Analysis and Modeling of Physically Induced Reliability Violations . . . . . . . . . 38:1--38:?? Muhammad Tayyab Chaudhry and Teck Chaw Ling and Atif Manzoor and Syed Asad Hussain and Jongwon Kim Thermal-Aware Scheduling in Green Data Centers . . . . . . . . . . . . . . . . 39:1--39:?? Johan Fabry and Tom Dinkelaker and Jacques Noyé and Éric Tanter A Taxonomy of Domain-Specific Aspect Languages . . . . . . . . . . . . . . . 40:1--40:?? Arpan Roy and Santonu Sarkar and Rajeshwari Ganesan and Geetika Goel Secure the Cloud: From the Perspective of a Service-Oriented Organization . . . 41:1--41:?? Robbert Van Renesse and Deniz Altinbuken Paxos Made Moderately Complex . . . . . 42:1--42:?? Sidney K. D'Mello and Jacqueline Kory A Review and Meta-Analysis of Multimodal Affect Detection Systems . . . . . . . . 43:1--43:?? Adrien Maglo and Guillaume Lavoué and Florent Dupont and Céline Hudelot $3$D Mesh Compression: Survey, Comparisons, and Emerging Trends . . . . 44:1--44:?? Yago Díez and Ferran Roure and Xavier Lladó and Joaquim Salvi A Qualitative Review on $3$D Coarse Registration Methods . . . . . . . . . . 45:1--45:?? Carmelo Ardito and Paolo Buono and Maria Francesca Costabile and Giuseppe Desolda Interaction with Large Displays: a Survey . . . . . . . . . . . . . . . . . 46:1--46:?? Veljko Pejovic and Mirco Musolesi Anticipatory Mobile Computing: a Survey of the State of the Art and Research Challenges . . . . . . . . . . . . . . . 47:1--47:?? Olga Zoidi and Eftychia Fotiadou and Nikos Nikolaidis and Ioannis Pitas Graph-Based Label Propagation in Digital Media: a Review . . . . . . . . . . . . 48:1--48:?? Nidhi Tiwari and Santonu Sarkar and Umesh Bellur and Maria Indrawan Classification Framework of MapReduce Scheduling Algorithms . . . . . . . . . 49:1--49:?? Steffen Wendzel and Sebastian Zander and Bernhard Fechner and Christian Herdin Pattern-Based Survey and Categorization of Network Covert Channel Techniques . . 50:1--50:?? Ahmad Fadzil M. Hani and Irving Vitra Paputungan and Mohd Fadzil Hassan Renegotiation in Service Level Agreement Management for a Cloud-Based System . . 51:1--51:?? Eva Gibaja and Sebastián Ventura A Tutorial on Multilabel Learning . . . 52:1--52:?? Aggeliki Sgora and Dimitrios J. Vergados and Dimitrios D. Vergados A Survey of TDMA Scheduling Schemes in Wireless Multihop Networks . . . . . . . 53:1--53:?? Zheng Yang and Chenshu Wu and Zimu Zhou and Xinglin Zhang and Xu Wang and Yunhao Liu Mobility Increases Localizability: a Survey on Wireless Indoor Localization using Inertial Sensors . . . . . . . . . 54:1--54:??
Emmanouil Vasilomanolakis and Shankar Karuppayah and Max Mühlhäuser and Mathias Fischer Taxonomy and Survey of Collaborative Intrusion Detection . . . . . . . . . . 55:1--55:?? Sarvnaz Karimi and Chen Wang and Alejandro Metke-Jimenez and Raj Gaire and Cecile Paris Text and Data Mining Techniques in Adverse Drug Reaction Detection . . . . 56:1--56:?? Shu Shi and Cheng-Hsin Hsu A Survey of Interactive Remote Rendering Systems . . . . . . . . . . . . . . . . 57:1--57:?? Sufatrio and Darell J. J. Tan and Tong-Wei Chua and Vrizlynn L. L. Thing Securing Android: a Survey, Taxonomy, and Challenges . . . . . . . . . . . . . 58:1--58:?? Diarmuid Ó Coileáin and Donal O'Mahony Accounting and Accountability in Content Distribution Architectures: a Survey . . 59:1--59:?? B. R. de Araújo and Daniel S. Lopes and Pauline Jepp and Joaquim A. Jorge and Brian Wyvill A Survey on Implicit Surface Polygonization . . . . . . . . . . . . . 60:1--60:?? Anirban Mukhopadhyay and Ujjwal Maulik and Sanghamitra Bandyopadhyay A Survey of Multiobjective Evolutionary Clustering . . . . . . . . . . . . . . . 61:1--61:?? Mattias De Wael and Stefan Marr and Bruno De Fraine and Tom Van Cutsem and Wolfgang De Meuter Partitioned Global Address Space Languages . . . . . . . . . . . . . . . 62:1--62:?? Zhi-Hui Zhan and Xiao-Fang Liu and Yue-Jiao Gong and Jun Zhang and Henry Shu-Hung Chung and Yun Li Cloud Computing Resource Scheduling and a Survey of Its Evolutionary Approaches 63:1--63:?? Fahimeh Alizadeh Moghaddam and Patricia Lago and Paola Grosso Energy-Efficient Networking Solutions in Cloud-Based Environments: a Systematic Literature Review . . . . . . . . . . . 64:1--64:?? Mehdi Sookhak and Abdullah Gani and Hamid Talebian and Adnan Akhunzada and Samee U. Khan and Rajkumar Buyya and Albert Y. Zomaya Remote Data Auditing in Cloud Computing Environments: a Survey, Taxonomy, and Open Issues . . . . . . . . . . . . . . 65:1--65:?? Andrzej Kamisi\'nski and Piotr Cholda and Andrzej Jajszczyk Assessing the Structural Complexity of Computer and Communication Networks . . 66:1--66:?? Muhammad Imran and Carlos Castillo and Fernando Diaz and Sarah Vieweg Processing Social Media Messages in Mass Emergency: a Survey . . . . . . . . . . 67:1--67:?? Wei Huang and Afshar Ganjali and Beom Heyn Kim and Sukwon Oh and David Lie The State of Public Infrastructure-as-a-Service Cloud Security . . . . . . . . . . . . . . . . 68:1--68:?? Sparsh Mittal and Jeffrey S. Vetter A Survey of CPU--GPU Heterogeneous Computing Techniques . . . . . . . . . . 69:1--69:?? Tianyin Xu and Yuanyuan Zhou Systems Approaches to Tackling Configuration Errors: a Survey . . . . . 70:1--70:??
Guozhu Meng and Yang Liu and Jie Zhang and Alexander Pokluda and Raouf Boutaba Collaborative Security: a Survey and Taxonomy . . . . . . . . . . . . . . . . 1:1--1:?? Claudio A. Ardagna and Rasool Asal and Ernesto Damiani and Quang Hieu Vu From Security to Assurance in the Cloud: a Survey . . . . . . . . . . . . . . . . 2:1--2:?? Stefan Mitsch and André Platzer and Werner Retschitzegger and Wieland Schwinger Logic-Based Modeling Approaches for Qualitative and Hybrid Reasoning in Dynamic Spatial Systems . . . . . . . . 3:1--3:?? Olumuyiwa Ibidunmoye and Francisco Hernández-Rodriguez and Erik Elmroth Performance Anomaly Detection and Bottleneck Identification . . . . . . . 4:1--4:?? Bisan Alsalibi and Ibrahim Venkat and K. G. Subramanian and Syaheerah Lebai Lutfi and Philippe De Wilde The Impact of Bio-Inspired Approaches Toward the Advancement of Face Recognition . . . . . . . . . . . . . . 5:1--5:?? Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and Xiaofeng Wang Privacy in the Genomic Era . . . . . . . 6:1--6:?? Bin Guo and Zhu Wang and Zhiwen Yu and Yu Wang and Neil Y. Yen and Runhe Huang and Xingshe Zhou Mobile Crowd Sensing and Computing: The Review of an Emerging Human-Powered Sensing Paradigm . . . . . . . . . . . . 7:1--7:?? Patricia Ruiz and Pascal Bouvry Survey on Broadcast Algorithms for Mobile Ad Hoc Networks . . . . . . . . . 8:1--8:?? Hyejeong Hong and Jaeil Lim and Hyunyul Lim and Sungho Kang Lifetime Reliability Enhancement of Microprocessors: Mitigating the Impact of Negative Bias Temperature Instability 9:1--9:?? Erick Bauman and Gbadebo Ayoade and Zhiqiang Lin A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions 10:1--10:?? Zoltán Ádám Mann Allocation of Virtual Machines in Cloud Data Centers --- A Survey of Problem Models and Optimization Algorithms . . . 11:1--11:?? Aleksandar Milenkoski and Marco Vieira and Samuel Kounev and Alberto Avritzer and Bryan D. Payne Evaluating Computer Intrusion Detection Systems: a Survey of Common Practices 12:1--12:?? Bingdong Li and Jinlong Li and Ke Tang and Xin Yao Many-Objective Evolutionary Algorithms: a Survey . . . . . . . . . . . . . . . . 13:1--13:?? Klaus Schoeffmann and Marco A. Hudelist and Jochen Huber Video Interaction Tools: a Survey of Recent Work . . . . . . . . . . . . . . 14:1--14:?? Matthew Edwards and Awais Rashid and Paul Rayson A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement . . . . . . . . . . . . . . 15:1--15:?? Benoit Baudry and Martin Monperrus The Multiple Facets of Software Diversity: Recent Developments in Year 2000 and Beyond . . . . . . . . . . . . 16:1--16:??
Yunji Chen and Shijin Zhang and Qi Guo and Ling Li and Ruiyang Wu and Tianshi Chen Deterministic Replay: a Survey . . . . . 17:1--17:47 Claus Ballegaard Nielsen and Peter Gorm Larsen and John Fitzgerald and Jim Woodcock and Jan Peleska Systems of Systems Engineering: Basic Concepts, Model-Based Techniques, and Research Directions . . . . . . . . . . 18:1--18:41 Brijesh Dongol and John Derrick Verifying Linearisability: a Comparative Survey . . . . . . . . . . . . . . . . . 19:1--19:43 Naveed Ul Hassan and Aqsa Naeem and Muhammad Adeel Pasha and Tariq Jadoon and Chau Yuen Indoor Positioning Using Visible LED Lights: a Survey . . . . . . . . . . . . 20:1--20:32 Eduardo Velloso and Dominik Schmidt and Jason Alexander and Hans Gellersen and Andreas Bulling The Feet in Human--Computer Interaction: a Survey of Foot-Based Interaction . . . 21:1--21:35 Tarandeep Kaur and Inderveer Chana Energy Efficiency Techniques in Cloud Computing: a Survey and Taxonomy . . . . 22:1--22:46 Mingming Guo and Xinyu Jin and Niki Pissinou and Sebastian Zanlongo and Bogdan Carbunar and S. S. Iyengar In-Network Trajectory Privacy Preservation . . . . . . . . . . . . . . 23:1--23:29 Vittorio P. Illiano and Emil C. Lupu Detecting Malicious Data Injections in Wireless Sensor Networks: a Survey . . . 24:1--24:33 Robert Ryan McCune and Tim Weninger and Greg Madey Thinking Like a Vertex: a Survey of Vertex-Centric Frameworks for Large-Scale Distributed Graph Processing 25:1--25:39 Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede A Survey on Lightweight Entity Authentication with Strong PUFs . . . . 26:1--26:42 Jones Granatyr and Vanderson Botelho and Otto Robert Lessing and Edson Emílio Scalabrin and Jean-Paul Barth\`es and Fabrício Enembreck Trust and Reputation Models for Multiagent Systems . . . . . . . . . . . 27:1--27:42 Jin-Hee Cho and Kevin Chan and Sibel Adali A Survey on Trust Modeling . . . . . . . 28:1--28:40 Mukesh Saini and Abdulhameed Alelaiwi and Abdulmotaleb El Saddik How Close are We to Realizing a Pragmatic VANET Solution? A Meta-Survey 29:1--29:40 Roy Shilkrot and Jochen Huber and Jürgen Steimle and Suranga Nanayakkara and Pattie Maes Digital Digits: a Comprehensive Survey of Finger Augmentation Devices . . . . . 30:1--30:29 Ramon Hugo De Souza and Mário Antônio Ribeiro Dantas Mapping QoE through QoS in an Approach to DDB Architectures: Research Analysis and Conceptualization . . . . . . . . . 31:1--31:41 Giovani Gracioli and Ahmed Alhammad and Renato Mancuso and Antônio Augusto Fröhlich and Rodolfo Pellizzoni A Survey on Cache Management Mechanisms for Real-Time Embedded Systems . . . . . 32:1--32:36
Angel Lagares Lemos and Florian Daniel and Boualem Benatallah Web Service Composition: a Survey of Techniques and Tools . . . . . . . . . . 33:1--33:?? Asma Benmansour and Abdelhamid Bouchachia and Mohammed Feham Multioccupant Activity Recognition in Pervasive Smart Home Environments . . . 34:1--34:?? Eleni Koutrouli and Aphrodite Tsalgatidou Reputation Systems Evaluation Survey . . 35:1--35:?? Simone Brienza and Sena Efsun Cebeci and Seyed Saeid Masoumzadeh and Helmut Hlavacs and Öznur Özkasap and Giuseppe Anastasi A Survey on Energy Efficiency in P2P Systems: File Distribution, Content Streaming, and Epidemics . . . . . . . . 36:1--36:?? Ryan Heartfield and George Loukas A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks . . . . . . . . . . 37:1--37:?? Andrea Hess and Karin Anna Hummel and Wilfried N. Gansterer and Günter Haring Data-driven Human Mobility Modeling: a Survey and Engineering Guidance for Mobile Networking . . . . . . . . . . . 38:1--38:?? Mohammad Ashraful Hoque and Matti Siekkinen and Kashif Nizam Khan and Yu Xiao and Sasu Tarkoma Modeling, Profiling, and Debugging the Energy Consumption of Mobile Devices . . 39:1--39:?? John Narayan and Sandeep K. Shukla and T. Charles Clancy A Survey of Automatic Protocol Reverse Engineering Tools . . . . . . . . . . . 40:1--40:?? Elaheh Momeni and Claire Cardie and Nicholas Diakopoulos A Survey on Assessment and Ranking Methodologies for User-Generated Content on the Web . . . . . . . . . . . . . . . 41:1--41:?? Sukhpal Singh and Inderveer Chana QoS-Aware Autonomic Resource Management in Cloud Computing: a Systematic Review 42:1--42:?? Funmilade Faniyi and Rami Bahsoon A Systematic Review of Service Level Management in the Cloud . . . . . . . . 43:1--43:?? Roberto Natella and Domenico Cotroneo and Henrique S. Madeira Assessing Dependability with Software Fault Injection: a Survey . . . . . . . 44:1--44:?? Sparsh Mittal A Survey of Techniques for Architecting and Managing Asymmetric Multicore Processors . . . . . . . . . . . . . . . 45:1--45:?? Daniele Sgandurra and Emil Lupu Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems . . . 46:1--46:?? Gildas Avoine and Antonin Beaujeant and Julio Hernandez-Castro and Louis Demay and Philippe Teuwen A Survey of Security and Privacy Issues in ePassport Protocols . . . . . . . . . 47:1--47:?? Maria Carla Calzarossa and Luisa Massari and Daniele Tessera Workload Characterization: a Survey Revisited . . . . . . . . . . . . . . . 48:1--48:??
Yi Ren and Ling Liu and Qi Zhang and Qingbo Wu and Jianbo Guan and Jinzhu Kong and Huadong Dai and Lisong Shao Shared-Memory Optimizations for Inter-Virtual-Machine Communication . . 49:1--49:?? Barsha Mitra and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri A Survey of Role Mining . . . . . . . . 50:1--50:?? Claudio M. De Farias and Wei Li and Flávia C. Delicato and Luci Pirmez and Albert Y. Zomaya and Paulo F. Pires and José N. De Souza A Systematic Review of Shared Sensor Networks . . . . . . . . . . . . . . . . 51:1--51:?? Marco Crocco and Marco Cristani and Andrea Trucco and Vittorio Murino Audio Surveillance: a Systematic Review 52:1--52:?? Halgurd S. Maghdid and Ihsan Alshahib Lami and Kayhan Zrar Ghafoor and Jaime Lloret Seamless Outdoors-Indoors Localization Solutions on Smartphones: Implementation and Challenges . . . . . . . . . . . . . 53:1--53:?? Sparsh Mittal A Survey of Architectural Techniques for Managing Process Variation . . . . . . . 54:1--54:?? Bernd Carsten Stahl and Job Timmermans and Brent Daniel Mittelstadt The Ethics of Computing: a Survey of the Computing-Oriented Literature . . . . . 55:1--55:?? Niall Murray and Brian Lee and Yuansong Qiao and Gabriel-Miro Muntean Olfaction-Enhanced Multimedia: a Survey of Application Domains, Displays, and Research Challenges . . . . . . . . . . 56:1--56:?? Niklas Palaghias and Seyed Amir Hoseinitabatabaei and Michele Nati and Alexander Gluhak and Klaus Moessner A Survey on Mobile Social Signal Processing . . . . . . . . . . . . . . . 57:1--57:?? David C. Harrison and Winston K. G. Seah and Ramesh Rayudu Rare Event Detection and Propagation in Wireless Sensor Networks . . . . . . . . 58:1--58:?? Sebastian Werner and Javier Navaridas and Mikel Luján A Survey on Design Approaches to Circumvent Permanent Faults in Networks-on-Chip . . . . . . . . . . . . 59:1--59:?? Liang Hu and Xilong Che and Si-Qing Zheng A Closer Look at GPGPU . . . . . . . . . 60:1--60:?? Marco Platania and Daniel Obenshain and Thomas Tantillo and Yair Amir and Neeraj Suri On Choosing Server- or Client-Side Solutions for BFT . . . . . . . . . . . 61:1--61:?? Sparsh Mittal A Survey of Techniques for Approximate Computing . . . . . . . . . . . . . . . 62:1--62:?? Edans Flavius De Oliveira Sandes and Azzedine Boukerche and Alba Cristina Magalhaes Alves De Melo Parallel Optimal Pairwise Biological Sequence Comparison: Algorithms, Platforms, and Classification . . . . . 63:1--63:?? Desmond Schmidt and Kenneth Radke and Seyit Camtepe and Ernest Foo and Michal Ren A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures . . 64:1--64:?? Juan Caballero and Zhiqiang Lin Type Inference on Executables . . . . . 65:1--65:??
Junaid Shuja and Abdullah Gani and Kashif Bilal and Atta Ur Rehman Khan and Sajjad A. Madani and Samee U. Khan and Albert Y. Zomaya A Survey of Mobile Device Virtualization: Taxonomy and State of the Art . . . . . . . . . . . . . . . . 1:1--1:?? Muhammad Raisul Alam and Marc St-Hilaire and Thomas Kunz Computational Methods for Residential Energy Cost Optimization in Smart Grids: a Survey . . . . . . . . . . . . . . . . 2:1--2:?? Hans Hüttel and Ivan Lanese and Vasco T. Vasconcelos and Luís Caires and Marco Carbone and Pierre-Malo Deniélou and Dimitris Mostrous and Luca Padovani and António Ravara and Emilio Tuosto and Hugo Torres Vieira and Gianluigi Zavattaro Foundations of Session Types and Behavioural Contracts . . . . . . . . . 3:1--3:?? Sebastian Schrittwieser and Stefan Katzenbeisser and Johannes Kinder and Georg Merzdovnik and Edgar Weippl Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? . . . . . . . . . . . . . . . 4:1--4:?? Buke Ao and Yongcai Wang and Lu Yu and Richard R. Brooks and S. S. Iyengar On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms 5:1--5:?? Junbin Liu and Sridha Sridharan and Clinton Fookes Recent Advances in Camera Planning for Large Area Surveillance: a Comprehensive Review . . . . . . . . . . . . . . . . . 6:1--6:?? Suleman Khan and Abdullah Gani and Ainuddin Wahid Abdul Wahab and Mustapha Aminu Bagiwa and Muhammad Shiraz and Samee U. Khan and Rajkumar Buyya and Albert Y. Zomaya Cloud Log Forensics: Foundations, State of the Art, and Future Directions . . . 7:1--7:?? Dada Emmanuel Gbenga and Effirul Ikhwan Ramlan Understanding the Limitations of Particle Swarm Algorithm for Dynamic Optimization Tasks: a Survey Towards the Singularity of PSO for Swarm Robotic Applications . . . . . . . . . . . . . . 8:1--8:?? Xiang Zuo and Adriana Iamnitchi A Survey of Socially Aware Peer-to-Peer Systems . . . . . . . . . . . . . . . . 9:1--9:?? Wenjun Jiang and Guojun Wang and Md Zakirul Alam Bhuiyan and Jie Wu Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges . . . . . . 10:1--10:?? Fabrício A. Silva and Azzedine Boukerche and Thais R. M. Braga Silva and Linnyer B. Ruiz and Eduardo Cerqueira and Antonio A. F. Loureiro Vehicular Networks: a New Challenge for Content-Delivery-Based Applications . . 11:1--11:?? Ruogu Fang and Samira Pouyanfar and Yimin Yang and Shu-Ching Chen and S. S. Iyengar Computational Health Informatics in the Big Data Age: a Survey . . . . . . . . . 12:1--12:?? Jun Tang and Yong Cui and Qi Li and Kui Ren and Jiangchuan Liu and Rajkumar Buyya Ensuring Security and Privacy Preservation for Cloud Data Services . . 13:1--13:?? Xirong Li and Tiberio Uricchio and Lamberto Ballan and Marco Bertini and Cees G. M. Snoek and Alberto Del Bimbo Socializing the Semantic Gap: a Comparative Survey on Image Tag Assignment, Refinement, and Retrieval 14:1--14:?? Nadia Felix F. Da Silva and Luiz F. S. Coletta and Eduardo R. Hruschka A Survey and Comparative Study of Tweet Sentiment Analysis via Semi-Supervised Learning . . . . . . . . . . . . . . . . 15:1--15:?? Durgesh Samant and Umesh Bellur Handling Boot Storms in Virtualized Data Centers --- A Survey . . . . . . . . . . 16:1--16:?? Kaveh Hassani and Won-Sook Lee Visualizing Natural Language Descriptions: a Survey . . . . . . . . . 17:1--17:?? Ovidiu Dan and Brian D. Davison Measuring and Predicting Search Engine Users' Satisfaction . . . . . . . . . . 18:1--18:?? Paolo Viotti and Marko Vukoli\'c Consistency in Non-Transactional Distributed Storage Systems . . . . . . 19:1--19:?? Junbin Liang and Jiannong Cao and Rui Liu and Tao Li Distributed Intelligent MEMS: a Survey and a Real-Time Programming Framework 20:1--20:?? Salman Khwaja and Mohammad Alshayeb Survey On Software Design-Pattern Specification Languages . . . . . . . . 21:1--21:??
Alvaro Estebanez and Diego R. Llanos and Arturo Gonzalez-Escribano A Survey on Thread-Level Speculation Techniques . . . . . . . . . . . . . . . 22:1--22:?? Brent Carrara and Carlisle Adams Out-of-Band Covert Channels --- A Survey 23:1--23:?? Ruggero Donida Labati and Angelo Genovese and Enrique Muñoz and Vincenzo Piuri and Fabio Scotti and Gianluca Sforza Biometric Recognition in Automated Border Control: a Survey . . . . . . . . 24:1--24:?? Jiang Xiao and Zimu Zhou and Youwen Yi and Lionel M. Ni A Survey on Wireless Indoor Localization from the Device Perspective . . . . . . 25:1--25:?? Panagiotis Kokkinos and Dimitris Kalogeras and Anna Levin and Emmanouel Varvarigos Survey: Live Migration and Disaster Recovery over Long-Distance Networks . . 26:1--26:?? Emanuel Onica and Pascal Felber and Hugues Mercier and Etienne Rivi\`ere Confidentiality-Preserving Publish/Subscribe: a Survey . . . . . . 27:1--27:?? Anastasia Giachanou and Fabio Crestani Like It or Not: a Survey of Twitter Sentiment Analysis Methods . . . . . . . 28:1--28:?? Vini Kanvar and Uday P. Khedker Heap Abstractions for Static Analysis 29:1--29:?? Éfren L. Souza and Eduardo F. Nakamura and Richard W. Pazzi Target Tracking for Sensor Networks: a Survey . . . . . . . . . . . . . . . . . 30:1--30:?? Paula Branco and Luís Torgo and Rita P. Ribeiro A Survey of Predictive Modeling on Imbalanced Domains . . . . . . . . . . . 31:1--31:?? Mashael Alsabah and Ian Goldberg Performance and Security Improvements for Tor: a Survey . . . . . . . . . . . 32:1--32:?? Shadi Khalifa and Yehia Elshater and Kiran Sundaravarathan and Aparna Bhat and Patrick Martin and Fahim Imam and Dan Rope and Mike Mcroberts and Craig Statchuk The Six Pillars for Building Big Data Analytics Ecosystems . . . . . . . . . . 33:1--33:?? Sparsh Mittal A Survey of Recent Prefetching Techniques for Processor Caches . . . . 35:1--35:?? Christoph Kofler and Martha Larson and Alan Hanjalic User Intent in Multimedia Search: a Survey of the State of the Art and Future Challenges . . . . . . . . . . . 36:1--36:?? Efthalia Karydi and Konstantinos Margaritis Parallel and Distributed Collaborative Filtering: a Survey . . . . . . . . . . 37:1--37:?? Meng Xu and Chengyu Song and Yang Ji and Ming-Wei Shih and Kangjie Lu and Cong Zheng and Ruian Duan and Yeongjin Jang and Byoungyoung Lee and Chenxiong Qian and Sangho Lee and Taesoo Kim Toward Engineering a Secure Android Ecosystem: a Survey of Existing Techniques . . . . . . . . . . . . . . . 38:1--38:?? Emerson M. A. Xavier and Francisco J. Ariza-López and Manuel A. Ureña-Cámara A Survey of Measures and Methods for Matching Geospatial Vector Datasets . . 39:1--39:?? Tahir Maqsood and Osman Khalid and Rizwana Irfan and Sajjad A. Madani and Samee U. Khan Scalability Issues in Online Social Networks . . . . . . . . . . . . . . . . 40:1--40:??
Robert A. Bridges and Neena Imam and Tiffany M. Mintz Understanding GPU Power: a Survey of Profiling, Modeling, and Simulation Methods . . . . . . . . . . . . . . . . 41:1--41:?? Jiliang Tang and Yi Chang and Charu Aggarwal and Huan Liu A Survey of Signed Network Mining in Social Media . . . . . . . . . . . . . . 42:1--42:?? Jorge Blasco and Thomas M. Chen and Juan Tapiador and Pedro Peris-Lopez A Survey of Wearable Biometric Recognition Systems . . . . . . . . . . 43:1--43:?? Roman Trobec and Radivoje Vasiljevi\'c and Milo Tomasevi\'c and Veljko Milutinovi\'c and Ramon Beivide and Mateo Valero Interconnection Networks in Petascale Computer Systems: a Survey . . . . . . . 44:1--44:?? Jasmeet Singh and Vishal Gupta Text Stemming: Approaches, Applications, and Challenges . . . . . . . . . . . . . 45:1--45:?? Riccardo Coppola and Maurizio Morisio Connected Car: Technologies, Issues, Future Trends . . . . . . . . . . . . . 46:1--46:?? Keewon Cho and Wooheon Kang and Hyungjun Cho and Changwook Lee and Sungho Kang A Survey of Repair Analysis Algorithms for Memories . . . . . . . . . . . . . . 47:1--47:?? Mateus L. Ribeiro and Henrique Manoel Lederman and Simone Elias and Fátima L. S. Nunes Techniques and Devices Used in Palpation Simulation with Haptic Feedback . . . . 48:1--48:?? Ilia Pietri and Rizos Sakellariou Mapping Virtual Machines onto Physical Machines in Cloud Computing: a Survey 49:1--49:?? Rui Shu and Peipei Wang and Sigmund A. Gorski III and Benjamin Andow and Adwait Nadkarni and Luke Deshotels and Jason Gionta and William Enck and Xiaohui Gu A Study of Security Isolation Techniques 50:1--50:?? Rodrigo Vieira Steiner and Emil Lupu Attestation in Wireless Sensor Networks: a Survey . . . . . . . . . . . . . . . . 51:1--51:?? Pedro Henriques Abreu and Miriam Seoane Santos and Miguel Henriques Abreu and Bruno Andrade and Daniel Castro Silva Predicting Breast Cancer Recurrence Using Machine Learning Techniques: a Systematic Review . . . . . . . . . . . 52:1--52:?? Jamshaid Sarwar Malik and Ahmed Hemani Gaussian Random Number Generation: a Survey on Hardware Architectures . . . . 53:1--53:?? Johann Brault-Baron Hypergraph Acyclicity Revisited . . . . 54:1--54:?? Bradley Reaves and Jasmine Bowers and Sigmund Albert Gorski III and Olabode Anise and Rahul Bobhate and Raymond Cho and Hiranava Das and Sharique Hussain and Hamza Karachiwala and Nolen Scaife and Byron Wright and Kevin Butler and William Enck and Patrick Traynor *droid: Assessment and Evaluation of Android Application Analysis Tools . . . 55:1--55:?? Aldeida Aleti and Irene Moser A Systematic Literature Review of Adaptive Parameter Control Methods for Evolutionary Algorithms . . . . . . . . 56:1--56:?? Tuo Li and Jude Angelo Ambrose and Roshan Ragel and Sri Parameswaran Processor Design for Soft Errors: Challenges and State of the Art . . . . 57:1--57:?? Gabriel Martins Dias and Boris Bellalta and Simon Oechsner A Survey About Prediction-Based Data Reduction in Wireless Sensor Networks 58:1--58:?? Joseph Gardiner and Shishir Nagaraja On the Security of Machine Learning in Malware C&C Detection: a Survey . . . . . 59:1--59:??
Gilles Bailly and Eric Lecolinet and Laurence Nigay Visual Menu Techniques . . . . . . . . . 60:1--60:?? Sven Kiljan and Koen Simoens and Danny De Cock and Marko Van Eekelen and Harald Vranken A Survey of Authentication and Communications Security in Online Banking . . . . . . . . . . . . . . . . 61:1--61:?? Marcus Pendleton and Richard Garcia-Lebron and Jin-Hee Cho and Shouhuai Xu A Survey on Systems Security Metrics . . 62:1--62:?? Ilche Georgievski and Marco Aiello Automated Planning for Ubiquitous Computing . . . . . . . . . . . . . . . 63:1--63:?? Matthias Diener and Eduardo H. M. Cruz and Marco A. Z. Alves and Philippe O. A. Navaux and Israel Koren Affinity-Based Thread and Data Mapping in Shared Memory Systems . . . . . . . . 64:1--64:?? Daniel Servos and Sylvia L. Osborn Current Research and Open Problems in Attribute-Based Access Control . . . . . 65:1--65:?? Chee Sun Liew and Malcolm P. Atkinson and Michelle Galea and Tan Fong Ang and Paul Martin and Jano I. Van Hemert Scientific Workflows: Moving Across Paradigms . . . . . . . . . . . . . . . 66:1--66:?? Maximilian Capraro and Dirk Riehle Inner Source Definition, Benefits, and Challenges . . . . . . . . . . . . . . . 67:1--67:?? Mohammad Hanif Jhaveri and Orcun Cetin and Carlos Gañán and Tyler Moore and Michel Van Eeten Abuse Reporting and the Fight Against Cybercrime . . . . . . . . . . . . . . . 68:1--68:?? Víctor Martínez and Fernando Berzal and Juan-Carlos Cubero A Survey of Link Prediction in Complex Networks . . . . . . . . . . . . . . . . 69:1--69:?? Chii Chang and Satish Narayana Srirama and Rajkumar Buyya Mobile Cloud Business Process Management System for the Internet of Things: a Survey . . . . . . . . . . . . . . . . . 70:1--70:?? Peratham Wiriyathammabhum and Douglas Summers-Stay and Cornelia Fermüller and Yiannis Aloimonos Computer Vision and Natural Language Processing: Recent Approaches in Multimedia and Robotics . . . . . . . . 71:1--71:?? G. Pavai and T. V. Geetha A Survey on Crossover Operators . . . . 72:1--72:?? Azzedine Boukerche and Alexander Magnano and Noura Aljeri Mobile IP Handover for Vehicular Networks: Methods, Models, and Classifications . . . . . . . . . . . . 73:1--73:?? Youngjoo Shin and Dongyoung Koo and Junbeom Hur A Survey of Secure Data Deduplication Schemes for Cloud Storage Systems . . . 74:1--74:?? Nour Abura'ed and Faisal Shah Khan and Harish Bhaskar Advances in the Quantum Theoretical Approach to Image Processing Applications . . . . . . . . . . . . . . 75:1--75:?? Kimberly Tam and Ali Feizollah and Nor Badrul Anuar and Rosli Salleh and Lorenzo Cavallaro The Evolution of Android Malware and Android Analysis Techniques . . . . . . 76:1--76:??
Tao Li and Ning Xie and Chunqiu Zeng and Wubai Zhou and Li Zheng and Yexi Jiang and Yimin Yang and Hsin-Yu Ha and Wei Xue and Yue Huang and Shu-Ching Chen and Jainendra Navlakha and S. S. Iyengar Data-Driven Techniques in Disaster Information Management . . . . . . . . . 1:1--1:?? Marcello La Rosa and Wil M. P. Van Der Aalst and Marlon Dumas and Fredrik P. Milani Business Process Variability Modeling: a Survey . . . . . . . . . . . . . . . . . 2:1--2:?? Marwa Salayma and Ahmed Al-Dubai and Imed Romdhani and Youssef Nasser Wireless Body Area Network (WBAN): a Survey on Reliability, Fault Tolerance, and Technologies Coexistence . . . . . . 3:1--3:?? Sayantan Nath and Sonali Agarwal and G. N. Pandey Evaluation of Knowledge Gaps in Mathematical Applications of Thermal Image Processing Techniques for Fire Prevention . . . . . . . . . . . . . . . 4:1--4:?? Ting Su and Ke Wu and Weikai Miao and Geguang Pu and Jifeng He and Yuting Chen and Zhendong Su A Survey on Data-Flow Testing . . . . . 5:1--5:?? Arnab Kumar Biswas and Dipak Ghosal and Shishir Nagaraja A Survey of Timing Channels and Countermeasures . . . . . . . . . . . . 6:1--6:?? Frank Dylla and Jae Hee Lee and Till Mossakowski and Thomas Schneider and André Van Delden and Jasper Van De Ven and Diedrich Wolter A Survey of Qualitative Spatial and Temporal Calculi: Algebraic and Computational Properties . . . . . . . . 7:1--7:?? Raghavendra Ramachandra and Christoph Busch Presentation Attack Detection Methods for Face Recognition Systems: a Comprehensive Survey . . . . . . . . . . 8:1--8:?? Britta Meixner Hypervideos and Interactive Multimedia Presentations . . . . . . . . . . . . . 9:1--9:?? Admela Jukan and Xavi Masip-Bruin and Nina Amla Smart Computing and Sensing Technologies for Animal Welfare: a Systematic Review 10:1--10:?? Lianhua Chi and Xingquan Zhu Hashing Techniques: a Survey and Taxonomy . . . . . . . . . . . . . . . . 11:1--11:36 Milena Tsvetkova and Taha Yasseri and Eric T. Meyer and J. Brian Pickering and Vegard Engen and Paul Walland and Marika Lüders and Asbjòrn Fòlstad and George Bravos Understanding Human-Machine Networks: a Cross-Disciplinary Survey . . . . . . . 12:1--12:?? Stefano Calzavara and Riccardo Focardi and Marco Squarcina and Mauro Tempesta Surviving the Web: a Journey into Web Session Security . . . . . . . . . . . . 13:1--13:?? Rabih Bashroush and Muhammad Garba and Rick Rabiser and Iris Groher and Goetz Botterweck CASE Tool Support for Variability Management in Software Product Lines . . 14:1--14:?? Amparo Soler-Dominguez and Angel A. Juan and Renatas Kizys A Survey on Financial Applications of Metaheuristics . . . . . . . . . . . . . 15:1--15:?? Nathan Burow and Scott A. Carr and Joseph Nash and Per Larsen and Michael Franz and Stefan Brunthaler and Mathias Payer Control-Flow Integrity: Precision, Security, and Performance . . . . . . . 16:1--16:??
Faiz ul Muram and Huy Tran and Uwe Zdun Systematic Review of Software Behavioral Model Consistency Checking . . . . . . . 17:1--17:?? Quinten David Soetens and Romain Robbes and Serge Demeyer Changes as First-Class Citizens: a Research Perspective on Modern Software Tooling . . . . . . . . . . . . . . . . 18:1--18:?? Joan Boyar and Lene M. Favrholdt and Christian Kudahl and Kim S. Larsen and Jesper W. Mikkelsen Online Algorithms with Advice: a Survey 19:1--19:?? Anastasia Ioannidou and Elisavet Chatzilari and Spiros Nikolopoulos and Ioannis Kompatsiaris Deep Learning Advances in Computer Vision with $3$D Data: a Survey . . . . 20:1--20:?? Ahmed Hussein and Mohamed Medhat Gaber and Eyad Elyan and Chrisina Jayne Imitation Learning: a Survey of Learning Methods . . . . . . . . . . . . . . . . 21:1--21:?? Joachim Gudmundsson and Michael Horton Spatio-Temporal Analysis of Team Sports 22:1--22:?? Heitor Murilo Gomes and Jean Paul Barddal and Fabrício Enembreck and Albert Bifet A Survey on Ensemble Learning for Data Stream Classification . . . . . . . . . 23:1--23:?? Amit Kumar Singh and Piotr Dziurzanski and Hashan Roshantha Mendis and Leandro Soares Indrusiak A Survey and Comparative Study of Hard and Soft Real-Time Dynamic Resource Allocation Strategies for Multi-\slash Many-Core Systems . . . . . . . . . . . 24:1--24:?? Ali Yadollahi and Ameneh Gholipour Shahraki and Osmar R. Zaiane Current State of Text Sentiment Analysis from Opinion to Emotion Mining . . . . . 25:1--25:?? Denis Weerasiri and Moshe Chai Barukh and Boualem Benatallah and Quan Z. Sheng and Rajiv Ranjan A Taxonomy and Survey of Cloud Resource Orchestration Techniques . . . . . . . . 26:1--26:?? Sparsh Mittal A Survey of Techniques for Cache Partitioning in Multicore Processors . . 27:1--27:?? Hanjiang Luo and Kaishun Wu and Rukhsana Ruby and Feng Hong and Zhongwen Guo and Lionel M. Ni Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks: Advancements and Challenges . . . . . . 28:1--28:?? Rafaqut Kazmi and Dayang N. A. Jawawi and Radziah Mohamad and Imran Ghani Effective Regression Test Case Selection: a Systematic Literature Review . . . . . . . . . . . . . . . . . 29:1--29:?? Cuong T. Do and Nguyen H. Tran and Choongseon Hong and Charles A. Kamhoua and Kevin A. Kwiat and Erik Blasch and Shaolei Ren and Niki Pissinou and Sundaraja Sitharama Iyengar Game Theory for Cyber Security and Privacy . . . . . . . . . . . . . . . . 30:1--30:?? Mohamed Amine Kafi and Jalel Ben Othman and Nadjib Badache A Survey on Reliability Protocols in Wireless Sensor Networks . . . . . . . . 31:1--31:??
Charith Perera and Yongrui Qin and Julio C. Estrella and Stephan Reiff-Marganiec and Athanasios V. Vasilakos Fog Computing for Sustainable Smart Cities: a Survey . . . . . . . . . . . . 32:1--32:?? Baligh M. Al-Helali and Sabri A. Mahmoud Arabic Online Handwriting Recognition (AOHR): a Survey . . . . . . . . . . . . 33:1--33:?? Kok-Lim Alvin Yau and Junaid Qadir and Hooi Ling Khoo and Mee Hong Ling and Peter Komisarczuk A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control . . . . . . . . . . . . . . . . 34:1--34:?? Cheol-Ho Hong and Ivor Spence and Dimitrios S. Nikolopoulos GPU Virtualization and Scheduling Methods: a Comprehensive Survey . . . . 35:1--35:?? Muhammad Murad Khan and Roliana Ibrahim and Imran Ghani Cross Domain Recommender Systems: a Systematic Literature Review . . . . . . 36:1--36:?? Kenneth O'Brien and Ilia Pietri and Ravi Reddy and Alexey Lastovetsky and Rizos Sakellariou A Survey of Power and Energy Predictive Models in HPC Systems and Applications 37:1--37:?? Astrid Rheinländer and Ulf Leser and Goetz Graefe Optimization of Complex Dataflows with User-Defined Functions . . . . . . . . . 38:1--38:?? Ahmad Barforoush and Hossein Shirazi and Hojjat Emami A New Classification Framework to Evaluate the Entity Profiling on the Web: Past, Present and Future . . . . . 39:1--39:?? Geong Sen Poh and Ji-Jian Chin and Wei-Chuen Yau and Kim-Kwang Raymond Choo and Moesfa Soeheila Mohamad Searchable Symmetric Encryption: Designs and Challenges . . . . . . . . . . . . . 40:1--40:?? Yanfang Ye and Tao Li and Donald Adjeroh and S. Sitharama Iyengar A Survey on Malware Detection Using Data Mining Techniques . . . . . . . . . . . 41:1--41:?? Jeroen J. A. Keiren and Peter Fontana and Rance Cleaveland Corrections to ``A Menagerie of Timed Automata'' . . . . . . . . . . . . . . . 42:1--42:?? Longbing Cao Data Science: a Comprehensive Overview 43:1--43:?? Alessandro Acquisti and Idris Adjerid and Rebecca Balebako and Laura Brandimarte and Lorrie Faith Cranor and Saranga Komanduri and Pedro Giovanni Leon and Norman Sadeh and Florian Schaub and Manya Sleeper and Yang Wang and Shomir Wilson Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online . . . . . . . . . . . . . 44:1--44:?? Tao Li and Chunqiu Zeng and Yexi Jiang and Wubai Zhou and Liang Tang and Zheng Liu and Yue Huang Data-Driven Techniques in Computing System Management . . . . . . . . . . . 45:1--45:?? Pat Morin and Wolfgang Mulzer and Tommy Reddad Encoding Arguments . . . . . . . . . . . 46:1--46:??
Tim Storer Bridging the Chasm: a Survey of Software Engineering Practice in Scientific Programming . . . . . . . . . . . . . . 47:1--47:?? Jones Granatyr and Nardine Osman and João Dias and Maria Augusta Silveira Netto Nunes and Judith Masthoff and Fabrício Enembreck and Otto Robert Lessing and Carles Sierra and Ana Maria Paiva and Edson Emílio Scalabrin The Need for Affective Trust Applied to Trust and Reputation Models . . . . . . 48:1--48:?? Kiranbir Kaur and Sandeep Sharma and Karanjeet Singh Kahlon Interoperability and Portability Approaches in Inter-Connected Clouds: a Review . . . . . . . . . . . . . . . . . 49:1--49:?? Georgia Psychou and Dimitrios Rodopoulos and Mohamed M. Sabry and Tobias Gemmeke and David Atienza and Tobias G. Noll and Francky Catthoor Classification of Resilience Techniques Against Functional Errors at Higher Abstraction Layers of Digital Systems 50:1--50:?? Laure Soulier and Lynda Tamine On the Collaboration Support in Information Retrieval . . . . . . . . . 51:1--51:?? Andreas Schoknecht and Tom Thaler and Peter Fettke and Andreas Oberweis and Ralf Laue Similarity of Business Process Models --- A State-of-the-Art Analysis . . . . 52:1--52:?? Michael Stein and Mathias Fischer and Immanuel Schweizer and Max Mühlhäuser A Classification of Locality in Network Research . . . . . . . . . . . . . . . . 53:1--53:?? Tanmoy Chakraborty and Ayushi Dalmia and Animesh Mukherjee and Niloy Ganguly Metrics for Community Analysis: a Survey 54:1--54:?? Nguyen Khoi Tran and Quan Z. Sheng and Muhammad Ali Babar and Lina Yao Searching the Web of Things: State of the Art, Challenges, and Solutions . . . 55:1--55:?? Seyed Mohammad Ghaffarian and Hamid Reza Shahriari Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: a Survey . . . . 56:1--56:?? Zain Bin Tariq and Dost Muhammad Cheema and Muhammad Zahir Kamran and Ijaz Haider Naqvi Non-GPS Positioning Systems: a Survey 57:1--57:?? Yangdong Deng and Yufei Ni and Zonghui Li and Shuai Mu and Wenjun Zhang Toward Real-Time Ray Tracing: a Survey on Hardware Acceleration and Microarchitecture Techniques . . . . . . 58:1--58:?? Kwangwon Sun and Sukyoung Ryu Analysis of JavaScript Programs: Challenges and Research Trends . . . . . 59:1--59:?? Rafael Caballero and Adrián Riesco and Josep Silva A Survey of Algorithmic Debugging . . . 60:1--60:?? Padma Jayaraman and Ranjani Parthasarathi A Survey on Post-Silicon Functional Validation for Multicore Architectures 61:1--61:??
Azzedine Boukerche and Abdul Jabbar Siddiqui and Abdelhamid Mammeri Automated Vehicle Detection and Classification: Models, Methods, and Techniques . . . . . . . . . . . . . . . 62:1--62:?? Changtao Zhong and Nishanth Sastry Systems Applications of Social Networks 63:1--63:?? Radim Baca and Michal Krátký and Irena Holubová and Martin Necaský and Tomás Skopal and Martin Svoboda and Sherif Sakr Structural XML Query Processing . . . . 64:1--64:?? Pallavi Bagga and Rahul Hans Mobile Agents System Security: a Systematic Survey . . . . . . . . . . . 65:1--65:?? Esben Andreasen and Liang Gong and Anders Mòller and Michael Pradel and Marija Selakovic and Koushik Sen and Cristian-Alexandru Staicu A Survey of Dynamic Analysis and Test Generation for JavaScript . . . . . . . 66:1--66:?? Niall Murray and Oluwakemi A. Ademoye and Gheorghita Ghinea and Gabriel-Miro Muntean A Tutorial for Olfaction-Based Multisensorial Media Application Design and Evaluation . . . . . . . . . . . . . 67:1--67:?? Renzo Angles and Marcelo Arenas and Pablo Barceló and Aidan Hogan and Juan Reutter and Domagoj Vrgoc Foundations of Modern Query Languages for Graph Databases . . . . . . . . . . 68:1--68:?? Dorien Herremans and Ching-Hua Chuan and Elaine Chew A Functional Taxonomy of Music Generation Systems . . . . . . . . . . . 69:1--69:?? Oscar Pulido-Prieto and Ulises Juárez-Martínez A Survey of Naturalistic Programming Technologies . . . . . . . . . . . . . . 70:1--70:?? Elias Alevizos and Anastasios Skarlatidis and Alexander Artikis and Georgios Paliouras Probabilistic Complex Event Recognition: a Survey . . . . . . . . . . . . . . . . 71:1--71:?? Francisco Martinez-Gil and Miguel Lozano and Ignacio García-Fernández and Fernando Fernández Modeling, Evaluation, and Scale on Artificial Pedestrians: a Literature Review . . . . . . . . . . . . . . . . . 72:1--72:?? Aditya Joshi and Pushpak Bhattacharyya and Mark J. Carman Automatic Sarcasm Detection: a Survey 73:1--73:?? Pablo González and Alberto Castaño and Nitesh V. Chawla and Juan José Del Coz A Review on Quantification Learning . . 74:1--74:?? Jordi Mongay Batalla and Athanasios Vasilakos and Mariusz Gajewski Secure Smart Homes: Opportunities and Challenges . . . . . . . . . . . . . . . 75:1--75:?? Frank De Boer and Vlad Serbanescu and Reiner Hähnle and Ludovic Henrio and Justine Rochas and Crystal Chang Din and Einar Broch Johnsen and Marjan Sirjani and Ehsan Khamespanah and Kiko Fernandez-Reyes and Albert Mingkun Yang A Survey of Active Object Languages . . 76:1--76:?? Stefan Laube and Rainer Böhme Strategic Aspects of Cyber Risk Information Sharing . . . . . . . . . . 77:1--77:??
Eduardo Felipe Zambom Santana and Ana Paula Chaves and Marco Aurelio Gerosa and Fabio Kon and Dejan S. Milojicic Software Platforms for Smart Cities: Concepts, Requirements, Challenges, and a Unified Reference Architecture . . . . 78:1--78:?? Onur Tunali and Mustafa Altun A Survey of Fault-Tolerance Algorithms for Reconfigurable Nano-Crossbar Arrays 79:1--79:?? Irina Tal and Gabriel-Miro Muntean Towards Reasoning Vehicles: a Survey of Fuzzy Logic-Based Solutions in Vehicular Networks . . . . . . . . . . . . . . . . 80:1--80:?? Xuanhua Shi and Zhigao Zheng and Yongluan Zhou and Hai Jin and Ligang He and Bo Liu and Qiang-Sheng Hua Graph Processing on GPUs: a Survey . . . 81:1--81:?? Alan Burns and Robert I. Davis A Survey of Research into Mixed Criticality Systems . . . . . . . . . . 82:1--82:?? Paulo Martins and Leonel Sousa and Artur Mariano A Survey on Fully Homomorphic Encryption: an Engineering Perspective 83:1--83:?? Alejandro Torreño and Eva Onaindia and Antonín Komenda and Michal Stolba Cooperative Multi-Agent Planning: a Survey . . . . . . . . . . . . . . . . . 84:1--84:?? Pranjul Yadav and Michael Steinbach and Vipin Kumar and Gyorgy Simon Mining Electronic Health Records (EHRs): a Survey . . . . . . . . . . . . . . . . 85:1--85:?? Tempestt Neal and Kalaivani Sundararajan and Aneez Fatima and Yiming Yan and Yingfei Xiang and Damon Woodard Surveying Stylometry Techniques and Applications . . . . . . . . . . . . . . 86:1--86:?? Artem Voronkov and Leonardo Horn Iwaya and Leonardo A. Martucci and Stefan Lindskog Systematic Literature Review on Usability of Firewall Configuration . . 87:1--87:?? Elif Bilge Kavun and Hristina Mihajloska and Tolga Yalçin A Survey on Authenticated Encryption--ASIC Designer's Perspective 88:1--88:?? Sebastian Werner and Javier Navaridas and Mikel Luján A Survey on Optical Network-on-Chip Architectures . . . . . . . . . . . . . 89:1--89:?? Danial Hooshyar and Moslem Yousefi and Heuiseok Lim Data-Driven Approaches to Game Player Modeling: a Systematic Literature Review 90:1--90:?? Yaser Mansouri and Adel Nadjaran Toosi and Rajkumar Buyya Data Storage Management in Cloud Environments: Taxonomy, Survey, and Future Directions . . . . . . . . . . . 91:1--91:?? Prakash Shrestha and Nitesh Saxena An Offensive and Defensive Exposition of Wearable Computing . . . . . . . . . . . 92:1--92:?? Niels Van Berkel and Denzil Ferreira and Vassilis Kostakos The Experience Sampling Method on Mobile Devices . . . . . . . . . . . . . . . . 93:1--93:?? Jundong Li and Kewei Cheng and Suhang Wang and Fred Morstatter and Robert P. Trevino and Jiliang Tang and Huan Liu Feature Selection: a Data Perspective 94:1--94:?? Viivi Uurtio and João M. Monteiro and Jaz Kandola and John Shawe-Taylor and Delmiro Fernandez-Reyes and Juho Rousu A Tutorial on Canonical Correlation Methods . . . . . . . . . . . . . . . . 95:1--95:?? Richard Skarbez and Frederick P. Brooks, Jr. and Mary C. Whitton A Survey of Presence and Related Concepts . . . . . . . . . . . . . . . . 96:1--96:?? Suining He and Kang G. Shin Geomagnetism for Smartphone-Based Indoor Localization: Challenges, Advances, and Comparisons . . . . . . . . . . . . . . 97:1--97:?? Jhonny Mertz and Ingrid Nunes Understanding Application-Level Caching in Web Applications: a Comprehensive Introduction and Survey of State-of-the-Art Approaches . . . . . . 98:1--98:??
Filipe Betzel and Karen Khatamifard and Harini Suresh and David J. Lilja and John Sartori and Ulya Karpuzcu Approximate Communication: Techniques for Reducing Communication Bottlenecks in Large-Scale Parallel Systems . . . . 1:1--1:?? Miriam Sturdee and Jason Alexander Analysis and Classification of Shape-Changing Interfaces for Design and Application-based Research . . . . . . . 2:1--2:?? Szymon Wasik and Maciej Antczak and Jan Badura and Artur Laskowski and Tomasz Sternal A Survey on Online Judge Systems and Their Applications . . . . . . . . . . . 3:1--3:?? Tsong Yueh Chen and Fei-Ching Kuo and Huai Liu and Pak-Lok Poon and Dave Towey and T. H. Tse and Zhi Quan Zhou Metamorphic Testing: a Review of Challenges and Opportunities . . . . . . 4:1--4:?? Unaizah Obaidellah and Mohammed Al Haek and Peter C.-H. Cheng A Survey on the Usage of Eye-Tracking in Computer Programming . . . . . . . . . . 5:1--5:?? Federica Paci and Anna Squicciarini and Nicola Zannone Survey on Access Control for Community-Centered Collaborative Systems 6:1--6:?? Florian Daniel and Pavel Kucherbaev and Cinzia Cappiello and Boualem Benatallah and Mohammad Allahbakhsh Quality Control in Crowdsourcing: a Survey of Quality Attributes, Assessment Techniques, and Assurance Actions . . . 7:1--7:?? Marco A. S. Netto and Rodrigo N. Calheiros and Eduardo R. Rodrigues and Renato L. F. Cunha and Rajkumar Buyya HPC Cloud for Scientific and Business Applications: Taxonomy, Vision, and Research Challenges . . . . . . . . . . 8:1--8:?? Eliahu Khalastchi and Meir Kalech On Fault Detection and Diagnosis in Robotic Systems . . . . . . . . . . . . 9:1--9:?? Samira Pouyanfar and Yimin Yang and Shu-Ching Chen and Mei-Ling Shyu and S. S. Iyengar Multimedia Big Data Analytics: a Survey 10:1--10:?? Dimitris Gritzalis and Giulia Iseppi and Alexios Mylonas and Vasilis Stavrou Exiting the Risk Assessment Maze: a Meta-Survey . . . . . . . . . . . . . . 11:1--11:?? Dalia Nashat and Ali A. Amer A Comprehensive Taxonomy of Fragmentation and Allocation Techniques in Distributed Database Design . . . . . 12:1--12:?? Bowen Zhou and Rajkumar Buyya Augmentation Techniques for Mobile Cloud Computing: a Taxonomy, Survey, and Future Directions . . . . . . . . . . . 13:1--13:?? Jeremy A. Marvel and Roger Bostelman and Joe Falco Multi-Robot Assembly Strategies and Metrics . . . . . . . . . . . . . . . . 14:1--14:?? Michal Gaziel-Yablowitz and David G. Schwartz A Review and Assessment Framework for Mobile-Based Emergency Intervention Apps 15:1--15:?? Mohammed Ali Al-Garadi and Kasturi Dewi Varathan and Sri Devi Ravana and Ejaz Ahmed and Ghulam Mujtaba and Muhammad Usman Shahid Khan and Samee U. Khan Analysis of Online Social Network Connections for Identification of Influential Users: Survey and Open Research Issues . . . . . . . . . . . . 16:1--16:?? Martin Monperrus Automatic Software Repair: a Bibliography . . . . . . . . . . . . . . 17:1--17:?? Zhijun Ding and Xiaolun Li and Changjun Jiang and Mengchu Zhou Objectives and State-of-the-Art of Location-Based Social Network Recommender Systems . . . . . . . . . . 18:1--18:?? Rodolfo W. L. Coutinho and Azzedine Boukerche and Luiz F. M. Vieira and Antonio A. F. Loureiro Underwater Wireless Sensor Networks: a New Challenge for Topology Control-Based Systems . . . . . . . . . . . . . . . . 19:1--19:?? Rodrigo Bruno and Paulo Ferreira A Study on Garbage Collection Algorithms for Big Data Environments . . . . . . . 20:1--20:?? Adriana Draghici and Maarten Van Steen A Survey of Techniques for Automatically Sensing the Behavior of a Crowd . . . . 21:1--21:?? Alexander Bergmayr and Uwe Breitenbücher and Nicolas Ferry and Alessandro Rossini and Arnor Solberg and Manuel Wimmer and Gerti Kappel and Frank Leymann A Systematic Review of Cloud Modeling Languages . . . . . . . . . . . . . . . 22:1--22:??
Francieli Zanon Boito and Eduardo C. Inacio and Jean Luca Bez and Philippe O. A. Navaux and Mario A. R. Dantas and Yves Denneulin A Checkpoint of Research on Parallel I/O for High-Performance Computing . . . . . 23:1--23:?? Ivan Brugere and Brian Gallagher and Tanya Y. Berger-Wolf Network Structure Inference, A Survey: Motivations, Methods, and Applications 24:1--24:?? Ligang Zhang and Brijesh Verma and Dian Tjondronegoro and Vinod Chandran Facial Expression Analysis under Partial Occlusion: a Survey . . . . . . . . . . 25:1--25:?? Mohamad Gebai and Michel R. Dagenais Survey and Analysis of Kernel and Userspace Tracers on Linux: Design, Implementation, and Overhead . . . . . . 26:1--26:?? Elisa Rojas and Roberto Doriguzzi-Corin and Sergio Tamurejo and Andres Beato and Arne Schwabe and Kevin Phemius and Carmen Guerrero Are We Ready to Drive Software-Defined Networks? A Comprehensive Survey on Management Tools and Techniques . . . . 27:1--27:?? Carolyn Lamb and Daniel G. Brown and Charles L. A. Clarke Evaluating Computational Creativity: an Interdisciplinary Tutorial . . . . . . . 28:1--28:?? Yasmin Fathy and Payam Barnaghi and Rahim Tafazolli Large-Scale Indexing, Discovery, and Ranking for the Internet of Things (IoT) 29:1--29:?? Willington Siabato and Christophe Claramunt and Sergio Ilarri and Miguel Angel Manso-Callejo A Survey of Modelling Trends in Temporal GIS . . . . . . . . . . . . . . . . . . 30:1--30:?? Zihao Shan and Kui Ren and Marina Blanton and Cong Wang Practical Secure Computation Outsourcing: a Survey . . . . . . . . . 31:1--31:?? Arkaitz Zubiaga and Ahmet Aker and Kalina Bontcheva and Maria Liakata and Rob Procter Detection and Resolution of Rumours in Social Media: a Survey . . . . . . . . . 32:1--32:?? Miyuru Dayarathna and Srinath Perera Recent Advancements in Event Processing 33:1--33:?? Wooi King Soo and Teck-Chaw Ling and Aung Htein Maw and Su Thawda Win Survey on Load-Balancing Methods in 802.11 Infrastructure Mode Wireless Networks for Improving Quality of Service . . . . . . . . . . . . . . . . 34:1--34:?? Giulio Rossetti and Rémy Cazabet Community Discovery in Dynamic Networks: a Survey . . . . . . . . . . . . . . . . 35:1--35:?? Eran Toch and Claudio Bettini and Erez Shmueli and Laura Radaelli and Andrea Lanzi and Daniele Riboni and Bruno Lepri The Privacy Implications of Cyber Security Systems: a Technological Survey 36:1--36:?? Muhamad Risqi U. Saputra and Andrew Markham and Niki Trigoni Visual SLAM and Structure from Motion in Dynamic Environments: a Survey . . . . . 37:1--37:?? Hadi Ghanbari and Tero Vartiainen and Mikko Siponen Omission of Quality Software Development Practices: a Systematic Literature Review . . . . . . . . . . . . . . . . . 38:1--38:?? Chao Li and Yushu Xue and Jing Wang and Weigong Zhang and Tao Li Edge-Oriented Computing Paradigms: a Survey on Architecture Design and System Management . . . . . . . . . . . . . . . 39:1--39:?? Ali Davoudian and Liu Chen and Mengchi Liu A Survey on NoSQL Stores . . . . . . . . 40:1--40:43 Davi Silva Rodrigues and Márcio Eduardo Delamaro and Cléber Gimenez Corrêa and Fátima L. S. Nunes Using Genetic Algorithms in Test Data Generation: a Critical Systematic Mapping . . . . . . . . . . . . . . . . 41:1--41:?? Rodolfo S. Antunes and Lucas A. Seewald and Vinicius F. Rodrigues and Cristiano A. Da Costa and Luiz Gonzaga, Jr. and Rodrigo R. Righi and Andreas Maier and Björn Eskofier and Malte Ollenschläger and Farzad Naderi and Rebecca Fahrig and Sebastian Bauer and Sigrun Klein and Gelson Campanatti A Survey of Sensors in Healthcare Workflow Monitoring . . . . . . . . . . 42:1--42:?? Matteo Turilli and Mark Santcroos and Shantenu Jha A Comprehensive Perspective on Pilot-Job Systems . . . . . . . . . . . . . . . . 43:1--43:??
Tobias Brandt and Marco Grawunder GeoStreams: a Survey . . . . . . . . . . 44:1--44:?? Y. V. Srinivasa Murthy and Shashidhar G. Koolagudi Content-Based Music Information Retrieval (CB-MIR) and Its Applications toward the Music Industry: a Review . . 45:1--45:?? Konstantia Barmpatsalou and Tiago Cruz and Edmundo Monteiro and Paulo Simoes Current and Future Trends in Mobile Device Forensics: a Survey . . . . . . . 46:1--46:?? Nasir Saeed and Haewoon Nam and Mian Imtiaz Ul Haq and Dost Bhatti Muhammad Saqib A Survey on Multidimensional Scaling . . 47:1--47:?? Paulo Angelo Alves Resende and André Costa Drummond A Survey of Random Forest Based Methods for Intrusion Detection Systems . . . . 48:1--48:?? Cláudio Gomes and Casper Thule and David Broman and Peter Gorm Larsen and Hans Vangheluwe Co-Simulation: a Survey . . . . . . . . 49:1--49:?? Roberto Baldoni and Emilio Coppa and Daniele Cono D'Elia and Camil Demetrescu and Irene Finocchi A Survey of Symbolic Execution Techniques . . . . . . . . . . . . . . . 50:1--50:?? Fatemeh Shirazi and Milivoj Simeonovski and Muhammad Rizwan Asghar and Michael Backes and Claudia Diaz A Survey on Routing in Anonymous Communication Protocols . . . . . . . . 51:1--51:?? Niels Van Dijkhuizen and Jeroen Van Der Ham A Survey of Network Traffic Anonymisation Techniques and Implementations . . . . . . . . . . . . 52:1--52:?? Wellington Oliveira and Daniel De Oliveira and Vanessa Braganholo Provenance Analytics for Workflow-Based Computational Experiments: a Survey . . 53:1--53:?? Nathan Hanford and Vishal Ahuja and Matthew K. Farrens and Brian Tierney and Dipak Ghosal A Survey of End-System Optimizations for High-Speed Networks . . . . . . . . . . 54:1--54:?? Ali Ahmadian Ramaki and Abbas Rasoolzadegan and Abbas Ghaemi Bafghi A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems . . . . . . . . . . . . . . . . 55:1--55:?? Stylianos I. Venieris and Alexandros Kouris and Christos-Savvas Bouganis Toolflows for Mapping Convolutional Neural Networks on FPGAs: a Survey and Future Directions . . . . . . . . . . . 56:1--56:?? Isabel Wagner and David Eckhoff Technical Privacy Metrics: a Systematic Survey . . . . . . . . . . . . . . . . . 57:1--57:?? Ayman Meidan and Julián A. García-García and Isabel Ramos and María José Escalona Measuring Software Process: a Systematic Mapping Study . . . . . . . . . . . . . 58:1--58:?? Jungmin Son and Rajkumar Buyya A Taxonomy of Software-Defined Networking (SDN)-Enabled Cloud Computing 59:1--59:?? Safiollah Heidari and Yogesh Simmhan and Rodrigo N. Calheiros and Rajkumar Buyya Scalable Graph Processing Frameworks: a Taxonomy and Open Challenges . . . . . . 60:1--60:?? Tao Chen and Rami Bahsoon and Xin Yao A Survey and Taxonomy of Self-Aware and Self-Adaptive Cloud Autoscaling Systems 61:1--61:?? Yike Liu and Tara Safavi and Abhilash Dighe and Danai Koutra Graph Summarization Methods and Applications: a Survey . . . . . . . . . 62:1--62:?? Peter Ivie and Douglas Thain Reproducibility in Scientific Computing 63:1--63:?? Jianzhong Qi and Rui Zhang and Christian S. Jensen and Kotagiri Ramamohanarao and Jiayuan He Continuous Spatial Query Processing: a Survey of Safe Region Based Techniques 64:1--64:?? Kalaivani Sundararajan and Damon L. Woodard Deep Learning for Biometrics: a Survey 65:1--65:??
Massimo Quadrana and Paolo Cremonesi and Dietmar Jannach Sequence-Aware Recommender Systems . . . 66:1--66:?? Yury Zhauniarovich and Issa Khalil and Ting Yu and Marc Dacier A Survey on Malicious Domains Detection through DNS Data Analysis . . . . . . . 67:1--67:?? Mireia FarrÚs Voice Disguise in Automatic Speaker Recognition . . . . . . . . . . . . . . 68:1--68:?? Marcus Botacin and Paulo Lício De Geus and André Grégio Who Watches the Watchmen: a Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms . . . . . . . . . . 69:1--69:?? Keman Huang and Michael Siegel and Stuart Madnick Systematically Understanding the Cyber Attack Business: a Survey . . . . . . . 70:1--70:?? Zahraa S. Abdallah and Mohamed Medhat Gaber and Bala Srinivasan and Shonali Krishnaswamy Activity Recognition with Evolving Data Streams: a Review . . . . . . . . . . . 71:1--71:?? Kizheppatt Vipin and Suhaib A. Fahmy FPGA Dynamic and Partial Reconfiguration: a Survey of Architectures, Methods, and Applications 72:1--72:?? Chenhao Qu and Rodrigo N. Calheiros and Rajkumar Buyya Auto-Scaling Web Applications in Clouds: a Taxonomy and Survey . . . . . . . . . 73:1--73:?? Eugene Siow and Thanassis Tiropanis and Wendy Hall Analytics for the Internet of Things: a Survey . . . . . . . . . . . . . . . . . 74:1--74:?? Peter Ochieng and Swaib Kyanda Large-Scale Ontology Matching: State-of-the-Art Analysis . . . . . . . 75:1--75:?? Jairo Giraldo and David Urbina and Alvaro Cardenas and Junia Valente and Mustafa Faisal and Justin Ruths and Nils Ole Tippenhauer and Henrik Sandberg and Richard Candell A Survey of Physics-Based Attack Detection in Cyber-Physical Systems . . 76:1--76:?? Edward Toth and Sanjay Chawla Group Deviation Detection Methods: a Survey . . . . . . . . . . . . . . . . . 77:1--77:?? Lynda Tamine and Mariam Daoud Evaluation in Contextual Information Retrieval: Foundations and Recent Advances within the Challenges of Context Dynamicity and Data Privacy . . 78:1--78:?? Abbas Acar and Hidayet Aksu and A. Selcuk Uluagac and Mauro Conti A Survey on Homomorphic Encryption Schemes: Theory and Implementation . . . 79:1--79:?? Xiao Han and Nizar Kheir and Davide Balzarotti Deception Techniques in Computer Security: a Research Perspective . . . . 80:1--80:?? Miltiadis Allamanis and Earl T. Barr and Premkumar Devanbu and Charles Sutton A Survey of Machine Learning for Big Code and Naturalness . . . . . . . . . . 81:1--81:?? Harcharan Jit Singh and Seema Bawa Scalable Metadata Management Techniques for Ultra-Large Distributed Storage Systems --- A Systematic Review . . . . 82:1--82:?? Gowtham Atluri and Anuj Karpatne and Vipin Kumar Spatio-Temporal Data Mining: a Survey of Problems and Methods . . . . . . . . . . 83:1--83:?? Marcin Wylot and Manfred Hauswirth and Philippe Cudré-Mauroux and Sherif Sakr RDF Data Storage and Query Processing Schemes: a Survey . . . . . . . . . . . 84:1--84:?? Paula Fortuna and Sérgio Nunes A Survey on Automatic Detection of Hate Speech in Text . . . . . . . . . . . . . 85:1--85:?? Adam Czajka and Kevin W. Bowyer Presentation Attack Detection for Iris Recognition: an Assessment of the State-of-the-Art . . . . . . . . . . . . 86:1--86:?? Nishant Gupta and Vibhash Yadav and Mayank Singh Automated Regression Test Case Generation for Web Application: a Survey 87:1--87:??
Mohammad Naim Rastgoo and Bahareh Nakisa and Andry Rakotonirainy and Vinod Chandran and Dian Tjondronegoro A Critical Review of Proactive Detection of Driver Stress Levels Based on Multimodal Measurements . . . . . . . . 88:1--88:?? Changsheng Wan and Li Wang and Vir V. Phoha A Survey on Gait Recognition . . . . . . 89:1--89:?? Christophe Kiennert and Ziad Ismail and Herve Debar and Jean Leneutre A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization . . . . . . . . . . . . . . 90:1--90:?? Alexandra Covaci and Longhao Zou and Irina Tal and Gabriel-Miro Muntean and Gheorghita Ghinea Is Multimedia Multisensorial? --- A Review of Mulsemedia Systems . . . . . . 91:1--91:?? Samira Pouyanfar and Saad Sadiq and Yilin Yan and Haiman Tian and Yudong Tao and Maria Presa Reyes and Mei-Ling Shyu and Shu-Ching Chen and S. S. Iyengar A Survey on Deep Learning: Algorithms, Techniques, and Applications . . . . . . 92:1--92:?? Riccardo Guidotti and Anna Monreale and Salvatore Ruggieri and Franco Turini and Fosca Giannotti and Dino Pedreschi A Survey of Methods for Explaining Black Box Models . . . . . . . . . . . . . . . 93:1--93:?? Gildas Avoine and Muhammed Ali Bingöl and Ioana Boureanu and Srdjan Capkun and Gerhard Hancke and Süleyman Kardas and Chong Hee Kim and Cédric Lauradoux and Benjamin Martin and Jorge Munilla and Alberto Peinado and Kasper Bonne Rasmussen and Dave Singelée and Aslan Tchamkerten and Rolando Trujillo-Rasua and Serge Vaudenay Security of Distance-Bounding: a Survey 94:1--94:?? Rui Henriques and Sara C. Madeira Triclustering Algorithms for Three-Dimensional Data Analysis: a Comprehensive Survey . . . . . . . . . . 95:1--95:?? Amir H. Ashouri and William Killian and John Cavazos and Gianluca Palermo and Cristina Silvano A Survey on Compiler Autotuning using Machine Learning . . . . . . . . . . . . 96:1--96:?? Dileep Kumar and Akash Gandhamal and Sanjay Talbar and Ahmad Fadzil Mohd Hani Knee Articular Cartilage Segmentation from MR Images: a Review . . . . . . . . 97:1--97:?? Ming Liu and Zhi Xue and Xianghua Xu and Changmin Zhong and Jinjun Chen Host-Based Intrusion Detection System with System Calls: Review and Future Trends . . . . . . . . . . . . . . . . . 98:1--98:?? Kevin Doherty and Gavin Doherty Engagement in HCI: Conception, Theory and Measurement . . . . . . . . . . . . 99:1--99:?? Giannis Tziakouris and Rami Bahsoon and Muhammad Ali Babar A Survey on Self-Adaptive Security for Large-scale Open Environments . . . . . 100:1--100:?? Diego De Siqueira Braga and Marco Niemann and Bernd Hellingrath and Fernando Buarque De Lima Neto Survey on Computational Trust and Reputation Models . . . . . . . . . . . 101:1--101:?? Felipe Grando and Lisandro Z. Granville and Luis C. Lamb Machine Learning in Network Centrality Measures: Tutorial and Outlook . . . . . 102:1--102:?? Vaia Moustaka and Athena Vakali and Leonidas G. Anthopoulos A Systematic Review for Smart City Data Analytics . . . . . . . . . . . . . . . 103:1--103:?? Sukhpal Singh Gill and Rajkumar Buyya A Taxonomy and Future Directions for Sustainable Cloud Computing: 360 Degree View . . . . . . . . . . . . . . . . . . 104:1--104:?? Rajkumar Buyya and Satish Narayana Srirama and Giuliano Casale and Rodrigo Calheiros and Yogesh Simmhan and Blesson Varghese and Erol Gelenbe and Bahman Javadi and Luis Miguel Vaquero and Marco A. S. Netto and Adel Nadjaran Toosi and Maria Alejandra Rodriguez and Ignacio M. Llorente and Sabrina De Capitani Di Vimercati and Pierangela Samarati and Dejan Milojicic and Carlos Varela and Rami Bahsoon and Marcos Dias De Assunção and Omer Rana and Wanlei Zhou and Hai Jin and Wolfgang Gentzsch and Albert Y. Zomaya and Haiying Shen A Manifesto for Future Generation Cloud Computing: Research Directions for the Next Decade . . . . . . . . . . . . . . 105:1--105:?? Alisa Smirnova and Philippe Cudré-Mauroux Relation Extraction Using Distant Supervision: a Survey . . . . . . . . . 106:1--106:?? M. Ziad Nayyer and Imran Raza and Syed Asad Hussain A Survey of Cloudlet-Based Mobile Augmentation Approaches for Resource Optimization . . . . . . . . . . . . . . 107:1--107:?? Andreas Biòrn-Hansen and Tor-Morten Grònli and Gheorghita Ghinea A Survey and Taxonomy of Core Concepts and Research Challenges in Cross-Platform Mobile Development . . . 108:1--108:?? Yasir Imtiaz Khan and Alexandros Konios and Nicolas Guelfi A Survey of Petri Nets Slicing . . . . . 109:1--109:??
Ping Wang and Yan Li and Chandan K. Reddy Machine Learning for Survival Analysis: a Survey . . . . . . . . . . . . . . . . 110:1--110:?? Ana Juan Ferrer and Joan Manuel Marqu\`es and Josep Jorba Towards the Decentralised Cloud: Survey on Approaches and Challenges for Mobile, Ad hoc, and Edge Computing . . . . . . . 111:1--111:?? Qiong Gui and Maria V. Ruiz-Blondet and Sarah Laszlo and Zhanpeng Jin A Survey on Brain Biometrics . . . . . . 112:1--112:?? Brett W. Israelsen and Nisar R. Ahmed ``Dave \ldots I can assure you \ldots that it's going to be all right \ldots'' A Definition, Case for, and Survey of Algorithmic Assurances in Human--Autonomy Trust Relationships . . 113:1--113:?? Michel S. Bonfim and Kelvin L. Dias and Stenio F. L. Fernandes Integrated NFV/SDN Architectures: a Systematic Literature Review . . . . . . 114:1--114:?? Janibul Bashir and Eldhose Peter and Smruti R. Sarangi A Survey of On-Chip Optical Interconnects . . . . . . . . . . . . . 115:1--115:?? Jasenka Dizdarevi\'c and Francisco Carpio and Admela Jukan and Xavi Masip-Bruin A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration . . . . . . . . . . . . . . 116:1--116:?? Moises Diaz and Miguel A. Ferrer and Donato Impedovo and Muhammad Imran Malik and Giuseppe Pirlo and Réjean Plamondon A Perspective Analysis of Handwritten Signature Technology . . . . . . . . . . 117:1--117:?? MD. Zakir Hossain and Ferdous Sohel and Mohd Fairuz Shiratuddin and Hamid Laga A Comprehensive Survey of Deep Learning for Image Captioning . . . . . . . . . . 118:1--118:?? Abdessalam Elhabbash and Faiza Samreen and James Hadley and Yehia Elkhatib Cloud Brokerage: a Systematic Survey . . 119:1--119:?? Pawan Kumar and Rakesh Kumar Issues and Challenges of Load Balancing Techniques in Cloud Computing: a Survey 120:1--120:?? Amani Abu Jabal and Maryam Davari and Elisa Bertino and Christian Makaya and Seraphin Calo and Dinesh Verma and Alessandra Russo and Christopher Williams Methods and Tools for Policy Analysis 121:1--121:?? Abdul Manazir and Khalid Raza Recent Developments in Cartesian Genetic Programming and its Variants . . . . . . 122:1--122:?? Shirin Tavara Parallel Computing of Support Vector Machines: a Survey . . . . . . . . . . . 123:1--123:?? Rafael Luiz Testa and Cléber Gimenez Corrêa and Ariane Machado-Lima and Fátima L. S. Nunes Synthesis of Facial Expressions in Photographs: Characteristics, Approaches, and Challenges . . . . . . . 124:1--124:?? Marco Patrignani and Amal Ahmed and Dave Clarke Formal Approaches to Secure Compilation: a Survey of Fully Abstract Compilation and Related Work . . . . . . . . . . . . 125:1--125:?? Juan A. Rico-Gallego and Juan C. Díaz-Martín and Ravi Reddy Manumachu and Alexey L. Lastovetsky A Survey of Communication Performance Models for High-Performance Computing 126:1--126:?? Niklas Kolbe and Sylvain Kubler and Jérémy Robert and Yves Le Traon and Arkady Zaslavsky Linked Vocabulary Recommendation Tools for Internet of Things: a Survey . . . . 127:1--127:?? Jin-Hee Cho and Shouhuai Xu and Patrick M. Hurley and Matthew Mackay and Trevor Benjamin and Mark Beaumont STRAM: Measuring the Trustworthiness of Computer-Based Systems . . . . . . . . . 128:1--128:?? Hamid Nejatollahi and Nikil Dutt and Sandip Ray and Francesco Regazzoni and Indranil Banerjee and Rosario Cammarota Post-Quantum Lattice-Based Cryptography Implementations: a Survey . . . . . . . 129:1--129:?? Sandro Pinto and Nuno Santos Demystifying Arm TrustZone: a Comprehensive Survey . . . . . . . . . . 130:1--130:?? Jiajian Xiao and Philipp Andelfinger and David Eckhoff and Wentong Cai and Alois Knoll A Survey on Agent-based Simulation Using Hardware Accelerators . . . . . . . . . 131:1--131:??
Sulav Malla and Ken Christensen A Survey on Power Management Techniques for Oversubscription of Multi-Tenant Data Centers . . . . . . . . . . . . . . 1:1--1:?? Jianyu Wang and Jianli Pan and Flavio Esposito and Prasad Calyam and Zhicheng Yang and Prasant Mohapatra Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives . . . 2:1--2:?? Vaibhavi Kalgutkar and Ratinder Kaur and Hugo Gonzalez and Natalia Stakhanova and Alina Matyukhina Code Authorship Attribution: Methods and Challenges . . . . . . . . . . . . . . . 3:1--3:?? Walter Didimo and Giuseppe Liotta and Fabrizio Montecchiani A Survey on Graph Drawing Beyond Planarity . . . . . . . . . . . . . . . 4:1--4:?? Shuai Zhang and Lina Yao and Aixin Sun and Yi Tay Deep Learning Based Recommender System: a Survey and New Perspectives . . . . . 5:1--5:?? Matheus R. F. MendonÇa and Artur Ziviani and AndrÉ M. S. Barreto Graph-Based Skill Acquisition For Reinforcement Learning . . . . . . . . . 6:1--6:?? Jing Zhang and Wanqing Li and Philip Ogunbona and Dong Xu Recent Advances in Transfer Learning for Cross-Dataset Visual Recognition: a Problem-Oriented Perspective . . . . . . 7:1--7:?? Minxian Xu and Rajkumar Buyya Brownout Approach for Adaptive Management of Resources and Applications in Cloud Computing Systems: a Taxonomy and Future Directions . . . . . . . . . 8:1--8:?? Ping Xiao and Hannu Toivonen and Oskar Gross and Amílcar Cardoso and João Correia and Penousal Machado and Pedro Martins and Hugo Goncalo Oliveira and Rahul Sharma and Alexandre Miguel Pinto and Alberto Díaz and Virginia Francisco and Pablo Gervás and Raquel Hervás and Carlos León and Jamie Forth and Matthew Purver and Geraint A. Wiggins and Dragana Miljkovi\'c and Vid Podpecan and Senja Pollak and Jan Kralj and Martin Znidarsic and Marko Bohanec and Nada Lavrac and Tanja Urbancic and Frank Van Der Velde and Stuart Battersby Conceptual Representations for Computational Concept Creation . . . . . 9:1--9:?? Yongjun Hong and Uiwon Hwang and Jaeyoon Yoo and Sungroh Yoon How Generative Adversarial Networks and Their Variants Work: an Overview . . . . 10:1--10:?? Azzedine Boukerche and Shichao Guan and Robson E. De Grande Sustainable Offloading in Mobile Cloud Computing: Algorithmic Design and Implementation . . . . . . . . . . . . . 11:1--11:?? Rajendra Patil and Chirag Modi An Exhaustive Survey on Security Concerns and Solutions at Different Components of Virtualization . . . . . . 12:1--12:?? Junyu Xuan and Jie Lu and Guangquan Zhang A Survey on Bayesian Nonparametric Learning . . . . . . . . . . . . . . . . 13:1--13:?? Francisco J. Cazorla and Leonidas Kosmidis and Enrico Mezzetti and Carles Hernandez and Jaume Abella and Tullio Vardanega Probabilistic Worst-Case Timing Analysis: Taxonomy and Comprehensive Survey . . . . . . . . . . . . . . . . . 14:1--14:?? Karam Abdulahhad and Catherine Berrut and Jean-Pierre Chevallet and Gabriella Pasi Modeling Information Retrieval by Formal Logic: a Survey . . . . . . . . . . . . 15:1--15:?? Graham Cormode and Hossein Jowhari $ L_p $ Samplers and Their Applications: a Survey . . . . . . . . . . . . . . . . 16:1--16:?? Thiago H. Silva and Aline Carneiro Viana and Fabrício Benevenuto and Leandro Villas and Juliana Salles and Antonio Loureiro and Daniele Quercia Urban Computing Leveraging Location-Based Social Network Data: a Survey . . . . . . . . . . . . . . . . . 17:1--17:?? Federico Reghenzani and Giuseppe Massari and William Fornaciari The Real-Time Linux Kernel: a Survey on PREEMPT\_RT . . . . . . . . . . . . . . 18:1--18:?? Usama Ahmed and Imran Raza and Syed Asad Hussain Trust Evaluation in Cross-Cloud Federation: Survey and Requirement Analysis . . . . . . . . . . . . . . . . 19:1--19:?? Annushree Bablani and Damodar Reddy Edla and Diwakar Tripathi and Ramalingaswamy Cheruku Survey on Brain-Computer Interface: an Emerging Computational Intelligence Paradigm . . . . . . . . . . . . . . . . 20:1--20:?? Parnika Bhat and Kamlesh Dutta A Survey on Various Threats and Current State of Security in Android Platform 21:1--21:?? Ranran Bian and Yun Sing Koh and Gillian Dobbie and Anna Divoli Identifying Top-$k$ Nodes in Social Networks: a Survey . . . . . . . . . . . 22:1--22:??
Sai Manoj Pudukotai Dinakarrao and Axel Jantsch and Muhammad Shafique Computer-aided Arrhythmia Diagnosis with Bio-signal Processing: a Survey of Trends and Techniques . . . . . . . . . 23:1--23:?? Djamel Djenouri and Roufaida Laidi and Youcef Djenouri and Ilangko Balasingham Machine Learning for Smart Building Applications: Review and Taxonomy . . . 24:1--24:?? Mihai Gabriel Constantin and Miriam Redi and Gloria Zen and Bogdan Ionescu Computational Understanding of Visual Interestingness Beyond Semantics: Literature Survey and Analysis of Covariates . . . . . . . . . . . . . . . 25:1--25:?? Miqing Li and Xin Yao Quality Evaluation of Solution Sets in Multiobjective Optimisation: a Survey 26:1--26:?? Isil Oz and Sanem Arslan A Survey on Multithreading Alternatives for Soft Error Fault Tolerance . . . . . 27:1--27:?? Rochak Swami and Mayank Dave and Virender Ranga Software-defined Networking-based DDoS Defense Mechanisms . . . . . . . . . . . 28:1--28:?? Yara Rizk and Mariette Awad and Edward W. Tunstel Cooperative Heterogeneous Multi-Robot Systems: a Survey . . . . . . . . . . . 29:1--29:?? Ivan Homoliak and Flavio Toffalini and Juan Guarnizo and Yuval Elovici and Martín Ochoa Insight Into Insiders and IT: a Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures . . . . . 30:1--30:?? Thiago Rateke and Karla A. Justen and Vito F. Chiarella and Antonio C. Sobieranski and Eros Comunello and Aldo Von Wangenheim Passive Vision Region-Based Road Detection: a Literature Review . . . . . 31:1--31:?? Wei Wang and Longbing Cao Negative Sequence Analysis: a Review . . 32:1--32:?? Athira Nambiar and Alexandre Bernardino and Jacinto C. Nascimento Gait-based Person Re-identification: a Survey . . . . . . . . . . . . . . . . . 33:1--33:?? Azzedine Boukerche and Qi Zhang Countermeasures against Worm Spreading: a New Challenge for Vehicular Networks 34:1--34:?? Milad Afzalan and Farrokh Jazizadeh Indoor Positioning Based on Visible Light Communication: a Performance-based Survey of Real-world Prototypes . . . . 35:1--35:?? Henriette Röger and Ruben Mayer A Comprehensive Survey on Parallelization and Elasticity in Stream Processing . . . . . . . . . . . . . . . 36:1--36:?? Chadni Islam and Muhammad Ali Babar and Surya Nepal A Multi-Vocal Review of Security Orchestration . . . . . . . . . . . . . 37:1--37:?? Ayman Taha and Ali S. Hadi Anomaly Detection Methods for Categorical Data: a Review . . . . . . . 38:1--38:?? Aditya Sundararajan and Arif I. Sarwat and Alexander Pons A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems . . . . . . . . . . . 39:1--39:?? Erwei Wang and James J. Davis and Ruizhe Zhao and Ho-Cheung Ng and Xinyu Niu and Wayne Luk and Peter Y. K. Cheung and George A. Constantinides Deep Neural Network Approximation for Custom Hardware: Where We've Been, Where We're Going . . . . . . . . . . . . . . 40:1--40:?? Hadi Habibzadeh and Cem Kaptan and Tolga Soyata and Burak Kantarci and Azzedine Boukerche Smart City System Design: a Comprehensive Study of the Application and Data Planes . . . . . . . . . . . . 41:1--41:?? Hameedah Sultan and Anjali Chauhan and Smruti R. Sarangi A Survey of Chip-level Thermal Simulators . . . . . . . . . . . . . . . 42:1--42:?? Mustansar Fiaz and Arif Mahmood and Sajid Javed and Soon Ki Jung Handcrafted and Deep Trackers: Recent Visual Object Tracking Approaches and Trends . . . . . . . . . . . . . . . . . 43:1--43:??
Elisa Mannes and Carlos Maziero Naming Content on the Network Layer: a Security Analysis of the Information-Centric Network Model . . . 44:1--44:?? Tommi Gröndahl and N. Asokan Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? 45:1--45:?? Yongsen Ma and Gang Zhou and Shuangquan Wang WiFi Sensing with Channel State Information: a Survey . . . . . . . . . 46:1--46:?? João Felipe Pimentel and Juliana Freire and Leonardo Murta and Vanessa Braganholo A Survey on Collecting, Managing, and Analyzing Provenance from Scripts . . . 47:1--47:?? Lucian José Gonçales and Kleinner Farias and Toacy Cavalcante De Oliveira and Murilo Scholl Comparison of Software Design Models: an Extended Systematic Mapping Study . . . 48:1--48:?? Matthias Wenzl and Georg Merzdovnik and Johanna Ullrich and Edgar Weippl From Hack to Elaborate Technique --- a Survey on Binary Rewriting . . . . . . . 49:1--49:37 Katerina El Raheb and Marina Stergiou and Akrivi Katifori and Yannis Ioannidis Dance Interactive Learning Systems: a Study on Interaction Workflow and Teaching Approaches . . . . . . . . . . 50:1--50:?? Rui Zhang and Rui Xue and Ling Liu Security and Privacy on Blockchain . . . 51:1--51:?? Mohammad Bakhshalipour and Seyedali Tabaeiaghdaei and Pejman Lotfi-Kamran and Hamid Sarbazi-Azad Evaluation of Hardware Data Prefetchers on Server Processors . . . . . . . . . . 52:1--52:?? Lorena Gonzalez-Manzano and Jose M. De Fuentes and Arturo Ribagorda Leveraging User-related Internet of Things for Continuous Authentication: a Survey . . . . . . . . . . . . . . . . . 53:1--53:?? Muhammad Usman and Mian Ahmad Jan and Xiangjian He and Jinjun Chen A Survey on Big Multimedia Data Processing and Management in Smart Cities . . . . . . . . . . . . . . . . . 54:1--54:?? Jiaheng Lu and Irena Holubová Multi-model Databases: a New Journey to Handle the Variety of Data . . . . . . . 55:1--55:?? Claire Maiza and Hamza Rihani and Juan M. Rivas and Joël Goossens and Sebastian Altmeyer and Robert I. Davis A Survey of Timing Verification Techniques for Multi-Core Real-Time Systems . . . . . . . . . . . . . . . . 56:1--56:?? Hu Xiong and Yan Wu and Zhenyu Lu A Survey of Group Key Agreement Protocols with Constant Rounds . . . . . 57:1--57:?? Estêvão B. Saleme and Alexandra Covaci and Gebremariam Mesfin and Celso A. S. Santos and Gheorghita Ghinea Mulsemedia DIY: a Survey of Devices and a Tutorial for Building Your Own Mulsemedia Environment . . . . . . . . . 58:1--58:?? Tessema M. Mengistu and Dunren Che Survey and Taxonomy of Volunteer Computing . . . . . . . . . . . . . . . 59:1--59:?? Samia Oukemeni and Helena Rif\`a-Pous and Joan Manuel Marqu\`es Puig Privacy Analysis on Microblogging Online Social Networks: a Survey . . . . . . . 60:1--60:?? Stephan Winter and Martin Tomko and Maria Vasardani and Kai-Florian Richter and Kourosh Khoshelham and Mohsen Kalantari Infrastructure-Independent Indoor Localization and Navigation . . . . . . 61:1--61:?? Roberto Castañeda Lozano and Christian Schulte Survey on Combinatorial Register Allocation and Instruction Scheduling 62:1--62:?? S. Chandrakala and S. L. Jayalakshmi Environmental Audio Scene and Sound Event Recognition for Autonomous Surveillance: a Survey and Comparative Studies . . . . . . . . . . . . . . . . 63:1--63:?? Fuqiang Gu and Xuke Hu and Milad Ramezani and Debaditya Acharya and Kourosh Khoshelham and Shahrokh Valaee and Jianga Shang Indoor Localization Improved by Spatial Context --- a Survey . . . . . . . . . . 64:1--64:??
Tal Ben-Nun and Torsten Hoefler Demystifying Parallel and Distributed Deep Learning: an In-depth Concurrency Analysis . . . . . . . . . . . . . . . . 65:1--65:?? Xiaofeng Liao and Zhiming Zhao Unsupervised Approaches for Textual Semantic Annotation, A Survey . . . . . 66:1--66:?? Parminder Kaur and Husanbir Singh Pannu and Avleen Kaur Malhi Comprehensive Study of Continuous Orthogonal Moments --- a Systematic Review . . . . . . . . . . . . . . . . . 67:1--67:?? Mainak Adhikari and Tarachand Amgoth and Satish Narayana Srirama A Survey on Scheduling Strategies for Workflows in Cloud Environment and Emerging Trends . . . . . . . . . . . . 68:1--68:?? Rob Van Glabbeek and Peter Höfner Progress, Justness, and Fairness . . . . 69:1--69:?? Melinda McDaniel and Veda C. Storey Evaluating Domain Ontologies: Clarification, Classification, and Challenges . . . . . . . . . . . . . . . 70:1--70:?? Ching-Ling Fan and Wen-Chih Lo and Yu-Tung Pai and Cheng-Hsin Hsu A Survey on $ 360^\circ $ Video Streaming: Acquisition, Transmission, and Display . . . . . . . . . . . . . . 71:1--71:?? Madalena Ribeiro and Abel J. P. Gomes Recoloring Algorithms for Colorblind People: a Survey . . . . . . . . . . . . 72:1--72:?? Swarnendu Ghosh and Nibaran Das and Ishita Das and Ujjwal Maulik Understanding Deep Learning Techniques for Image Segmentation . . . . . . . . . 73:1--73:?? Z. Berkay Celik and Earlence Fernandes and Eric Pauley and Gang Tan and Patrick McDaniel Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities . . . . . . 74:1--74:?? Wojciech Wide\l and Maxime Audinot and Barbara Fila and Sophie Pinchinat Beyond 2014: Formal Methods for Attack Tree-based Security Modeling . . . . . . 75:1--75:?? Saeed Rashidi and Majid Jalili and Hamid Sarbazi-Azad A Survey on PCM Lifetime Enhancement Schemes . . . . . . . . . . . . . . . . 76:1--76:?? Joanna Bergström and Kasper Hornbæk Human--Computer Interaction on the Skin 77:1--77:?? Davide Maiorca and Battista Biggio and Giorgio Giacinto Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks 78:1--78:?? Harsurinder Kaur and Husanbir Singh Pannu and Avleen Kaur Malhi A Systematic Review on Imbalanced Data Challenges in Machine Learning: Applications and Solutions . . . . . . . 79:1--79:?? Patricia Arias-Cabarcos and Christian Krupitzer and Christian Becker A Survey on Adaptive Authentication . . 80:1--80:?? Stefanos Georgiou and Stamatia Rizou and Diomidis Spinellis Software Development Lifecycle for Energy Efficiency: Techniques and Tools 81:1--81:?? Jeffrey Pawlick and Edward Colbert and Quanyan Zhu A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy . . . . . . . . . . . . . . 82:1--82:?? Sam Fletcher and Md. Zahidul Islam Decision Tree Classification with Differential Privacy: a Survey . . . . . 83:1--83:?? Sara Kardani Moghaddam and Rajkumar Buyya and Kotagiri Ramamohanarao Performance-Aware Management of Cloud Resources: a Taxonomy and Future Directions . . . . . . . . . . . . . . . 84:1--84:?? Alistair Moffat Huffman Coding . . . . . . . . . . . . . 85:1--85:35 Maria De Marsico and Alessio Mecca A Survey on Gait Recognition via Wearable Sensors . . . . . . . . . . . . 86:1--86:??
Mashael Almoqbel and Songhua Xu Computational Mining of Social Media to Curb Terrorism . . . . . . . . . . . . . 87:1--87:?? Ori Or-Meir and Nir Nissim and Yuval Elovici and Lior Rokach Dynamic Malware Analysis in the Modern Era --- a State of the Art Survey . . . 88:1--88:?? Vincent Labatut and Xavier Bost Extraction and Analysis of Fictional Character Networks: a Survey . . . . . . 89:1--89:?? Zeineb Rejiba and Xavier Masip-Bruin and Eva Marín-Tordera A Survey on Mobility-Induced Service Migration in the Fog, Edge, and Related Computing Paradigms . . . . . . . . . . 90:1--90:?? Farha Jahan and Weiqing Sun and Quamar Niyaz and Mansoor Alam Security Modeling of Autonomous Systems: a Survey . . . . . . . . . . . . . . . . 91:1--91:?? Weiqing Min and Shuqiang Jiang and Linhu Liu and Yong Rui and Ramesh Jain A Survey on Food Computing . . . . . . . 92:1--92:?? Antonia Bertolino and Guglielmo De Angelis and Micael Gallego and Boni García and Francisco Gortázar and Francesca Lonetti and Eda Marchetti A Systematic Review on Cloud Testing . . 93:1--93:?? Thang Le Duc and Rafael García Leiva and Paolo Casari and Per-Olov Östberg Machine Learning Methods for Reliable Resource Provisioning in Edge-Cloud Computing: a Survey . . . . . . . . . . 94:1--94:?? Mutaz Barika and Saurabh Garg and Albert Y. Zomaya and Lizhe Wang and Aad Van Moorsel and Rajiv Ranjan Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions . . . . . . . . . . . . . . . 95:1--95:?? Rodrigo Gonçalves and Carina Friedrich Dorneles Automated Expertise Retrieval: a Taxonomy-Based Survey and Open Issues 96:1--96:?? Cheol-Ho Hong and Blesson Varghese Resource Management in Fog/Edge Computing: a Survey on Architectures, Infrastructure, and Algorithms . . . . . 97:1--97:?? Ka-Chun Wong and Jiao Zhang and Shankai Yan and Xiangtao Li and Qiuzhen Lin and Sam Kwong and Cheng Liang DNA Sequencing Technologies: Sequencing Data Protocols and Bioinformatics Tools 98:1--98:?? Hong-Ning Dai and Raymond Chi-Wing Wong and Hao Wang and Zibin Zheng and Athanasios V. Vasilakos Big Data Analytics for Large-scale Wireless Networks: Challenges and Opportunities . . . . . . . . . . . . . 99:1--99:?? Matt Luckcuck and Marie Farrell and Louise A. Dennis and Clare Dixon and Michael Fisher Formal Specification and Verification of Autonomous Robotic Systems: a Survey . . 100:1--100:?? Mike Maksimov and Sahar Kokaly and Marsha Chechik A Survey of Tool-supported Assurance Case Assessment Techniques . . . . . . . 101:1--101:?? Paulo Henrique Pisani and Abir Mhenni and Romain Giot and Estelle Cherrier and Norman Poh and André Carlos Ponce de Leon Ferreira de Carvalho and Christophe Rosenberger and Najoua Essoukri Ben Amara Adaptive Biometric Systems: Review and Perspectives . . . . . . . . . . . . . . 102:1--102:?? Michalis Mountantonakis and Yannis Tzitzikas Large-scale Semantic Integration of Linked Data: a Survey . . . . . . . . . 103:1--103:?? Hrishav Bakul Barua and Kartick Chandra Mondal A Comprehensive Survey on Cloud Data Mining (CDM) Frameworks and Algorithms 104:1--104:?? Ioannis Mademlis and Nikos Nikolaidis and Anastasios Tefas and Ioannis Pitas and Tilman Wagner and Alberto Messina Autonomous UAV Cinematography: a Tutorial and a Formalized Shot-Type Taxonomy . . . . . . . . . . . . . . . . 105:1--105:?? Vivekraj V. K. and Debashis Sen and Balasubramanian Raman Video Skimming: Taxonomy and Comprehensive Survey . . . . . . . . . . 106:1--106:?? Ana C. Lorena and Luís P. F. Garcia and Jens Lehmann and Marcilio C. P. Souto and Tin Kam Ho How Complex Is Your Classification Problem?: a Survey on Measuring Classification Complexity . . . . . . . 107:1--107:??
Caesar Wu and Rajkumar Buyya and Kotagiri Ramamohanarao Cloud Pricing Models: Taxonomy, Survey, and Interdisciplinary Challenges . . . . 108:1--108:?? Galal M. Binmakhashen and Sabri A. Mahmoud Document Layout Analysis: a Comprehensive Survey . . . . . . . . . . 109:1--109:?? Jaybie A. De Guzman and Kanchana Thilakarathna and Aruna Seneviratne Security and Privacy Approaches in Mixed Reality: a Literature Survey . . . . . . 110:1--110:?? Muhammad Usman and Mian Ahmad Jan and Xiangjian He and Jinjun Chen A Survey on Representation Learning Efforts in Cybersecurity Domain . . . . 111:1--111:?? Tomás Foltýnek and Norman Meuschke and Bela Gipp Academic Plagiarism Detection: a Systematic Literature Review . . . . . . 112:1--112:?? Yannis Lilis and Anthony Savidis A Survey of Metaprogramming Languages 113:1--113:?? Anh Cat Le Ngo and Raphaël C.-W. Phan Seeing the Invisible: Survey of Video Motion Magnification and Small Motion Analysis . . . . . . . . . . . . . . . . 114:1--114:?? Nayyer Aafaq and Ajmal Mian and Wei Liu and Syed Zulqarnain Gilani and Mubarak Shah Video Description: a Survey of Methods, Datasets, and Evaluation Metrics . . . . 115:1--115:?? Madhushree Basavarajaiah and Priyanka Sharma Survey of Compressed Domain Video Summarization Techniques . . . . . . . . 116:1--116:29 Mario Gleirscher and Simon Foster and Jim Woodcock New Opportunities for Integrated Formal Methods . . . . . . . . . . . . . . . . 117:1--117:?? Leibo Liu and Jianfeng Zhu and Zhaoshi Li and Yanan Lu and Yangdong Deng and Jie Han and Shouyi Yin and Shaojun Wei A Survey of Coarse-Grained Reconfigurable Architecture and Design: Taxonomy, Challenges, and Applications 118:1--118:?? Aditya Joshi and Sarvnaz Karimi and Ross Sparks and Cécile Paris and C. Raina Macintyre Survey of Text-based Epidemic Intelligence: a Computational Linguistics Perspective . . . . . . . . 119:1--119:?? Mathias Humbert and Benjamin Trubert and Kévin Huguenin A Survey on Interdependent Privacy . . . 122:1--122:?? Ju Ren and Deyu Zhang and Shiwen He and Yaoxue Zhang and Tao Li A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet . . . . . . . . 125:1--125:?? Amir Afianian and Salman Niksefat and Babak Sadeghiyan and David Baptiste Malware Dynamic Analysis Evasion Techniques: a Survey . . . . . . . . . . 1--28 Leonardo Leite and Carla Rocha and Fabio Kon and Dejan Milojicic and Paulo Meirelles A Survey of DevOps Concepts and Challenges . . . . . . . . . . . . . . . 1--35 Robert A. Bridges and Tarrah R. Glass-Vanderlan and Michael D. Iannacone and Maria S. Vincent and Qian (Guenevere) Chen A Survey of Intrusion Detection Systems Leveraging Host Data . . . . . . . . . . 1--35 Menasha Thilakaratne and Katrina Falkner and Thushari Atapattu A Systematic Review on Literature-based Discovery: General Overview, Methodology, & Statistical Analysis . . . 1--34 Mukesh Kumar Saini and Neeraj Goel How Smart Are Smart Classrooms? A Review of Smart Classroom Technologies . . . . 1--28 Mikhail Drobyshevskiy and Denis Turdakov Random Graph Modeling: a Survey of the Concepts . . . . . . . . . . . . . . . . 1--36
Juhee Bae and Tove Helldin and Maria Riveiro and S\lawomir Nowaczyk and Mohamed-Rafik Bouguelia and Göran Falkman Interactive Clustering: a Comprehensive Review . . . . . . . . . . . . . . . . . 1:1--1:39 Xinxin Fan and Ling Liu and Rui Zhang and Quanliang Jing and Jingping Bi Decentralized Trust Management: Risk Analysis and Trust Aggregation . . . . . 2:1--2:33 Ruben Mayer and Hans-Arno Jacobsen Scalable Deep Learning on Distributed Infrastructures: Challenges, Techniques, and Tools . . . . . . . . . . . . . . . 3:1--3:37 Junjie Chen and Jibesh Patra and Michael Pradel and Yingfei Xiong and Hongyu Zhang and Dan Hao and Lu Zhang A Survey of Compiler Testing . . . . . . 4:1--4:36 Allison Randal The Ideal Versus the Real: Revisiting the History of Virtual Machines and Containers . . . . . . . . . . . . . . . 5:1--5:31 Nuno Paulino and João Canas Ferreira and João M. P. Cardoso Improving Performance and Energy Consumption in Embedded Systems via Binary Acceleration: a Survey . . . . . 6:1--6:36 Gerasimos Razis and Ioannis Anagnostopoulos and Sherali Zeadally Modeling Influence with Semantics in Social Networks: a Survey . . . . . . . 7:1--7:38 Mohammad Etemad and Alptekin Küpçü Generic Dynamic Data Outsourcing Framework for Integrity Verification . . 8:1--8:32 John Kolb and Moustafa AbdelBaky and Randy H. Katz and David E. Culler Core Concepts, Challenges, and Future Directions in Blockchain: a Centralized Tutorial . . . . . . . . . . . . . . . . 9:1--9:39 Muhammad H. Hilman and Maria A. Rodriguez and Rajkumar Buyya Multiple Workflows Scheduling in Multi-tenant Distributed Systems: a Taxonomy and Future Directions . . . . . 10:1--10:39 Dong Liu and Yue Li and Jianping Lin and Houqiang Li and Feng Wu Deep Learning-Based Video Coding: a Review and a Case Study . . . . . . . . 11:1--11:35 Dilek Küçük and Fazli Can Stance Detection: a Survey . . . . . . . 12:1--12:37 Yuri D. V. Yasuda and Luiz Eduardo G. Martins and Fabio A. M. Cappabianco Autonomous Visual Navigation for Mobile Robots: a Systematic Literature Review 13:1--13:34 Shweta Suran and Vishwajeet Pattanaik and Dirk Draheim Frameworks for Collective Intelligence: a Systematic Literature Review . . . . . 14:1--14:36 Vijini Mallawaarachchi and Lakmal Meegahapola and Roshan Madhushanka and Eranga Heshan and Dulani Meedeniya and Sampath Jayarathna Change Detection and Notification of Web Pages: a Survey . . . . . . . . . . . . 15:1--15:35 Marcos A. M. Vieira and Matheus S. Castanho and Racyus D. G. Pacífico and Elerson R. S. Santos and Eduardo P. M. Câmara Júnior and Luiz F. M. Vieira Fast Packet Processing with eBPF and XDP: Concepts, Code, Challenges, and Applications . . . . . . . . . . . . . . 16:1--16:36 Ofir Landau and Rami Puzis and Nir Nissim Mind Your Mind: EEG-Based Brain--Computer Interfaces and Their Security in Cyber Space . . . . . . . . 17:1--17:38 Laphou Lao and Zecheng Li and Songlin Hou and Bin Xiao and Songtao Guo and Yuanyuan Yang A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling . . . . 18:1--18:32 Hadi Brais and Rajshekar Kalayappan and Preeti Ranjan Panda A Survey of Cache Simulators . . . . . . 19:1--19:32 Nektaria Kaloudi and Jingyue Li The AI-Based Cyber Threat Landscape: a Survey . . . . . . . . . . . . . . . . . 20:1--20:34 Chu Luo and Jorge Goncalves and Eduardo Velloso and Vassilis Kostakos A Survey of Context Simulation for Testing Mobile Context-Aware Applications . . . . . . . . . . . . . . 21:1--21:39 Nevin Cini and Gulay Yalcin A Methodology for Comparing the Reliability of GPU-Based and CPU-Based HPCs . . . . . . . . . . . . . . . . . . 22:1--22:33
Stijn Heldens and Pieter Hijma and Ben Van Werkhoven and Jason Maassen and Adam S. Z. Belloum and Rob V. Van Nieuwpoort The Landscape of Exascale Research: a Data-Driven Literature Analysis . . . . 23:1--23:43 Sartaj Sahni and Albert Y. Zomaya In Memoriam Eliezer Dekel (1948--2020) 23:1--23:2 Sunny Rai and Shampa Chakraverty A Survey on Computational Metaphor Processing . . . . . . . . . . . . . . . 24:1--24:37 João B. F. Sequeiros and Francisco T. Chimuco and Musa G. Samaila and Mário M. Freire and Pedro R. M. Inácio Attack and System Modeling Applied to IoT, Cloud, and Mobile Ecosystems: Embedding Security by Design . . . . . . 25:1--25:32 Peijin Cong and Guo Xu and Tongquan Wei and Keqin Li A Survey of Profit Optimization Techniques for Cloud Providers . . . . . 26:1--26:35 Erikson Júlio De Aguiar and Bruno S. Faiçal and Bhaskar Krishnamachari and Jó Ueyama A Survey of Blockchain-Based Strategies for Healthcare . . . . . . . . . . . . . 27:1--27:27 Jian Wu and Victor S. Sheng and Jing Zhang and Hua Li and Tetiana Dadakova and Christine Leon Swisher and Zhiming Cui and Pengpeng Zhao Multi-Label Active Learning Algorithms for Image Classification: Overview and Future Promise . . . . . . . . . . . . . 28:1--28:35 Jesús Guillermo Falcón-Cardona and Carlos A. Coello Coello Indicator-based Multi-objective Evolutionary Algorithms: a Comprehensive Survey . . . . . . . . . . . . . . . . . 29:1--29:35 Joost Verbraeken and Matthijs Wolting and Jonathan Katzy and Jeroen Kloppenburg and Tim Verbelen and Jan S. Rellermeyer A Survey on Distributed Machine Learning 30:1--30:33 George Papadakis and Dimitrios Skoutas and Emmanouil Thanos and Themis Palpanas Blocking and Filtering Techniques for Entity Resolution: a Survey . . . . . . 31:1--31:42 Erdem Sahin and Elena Stoykova and Jani Mäkinen and Atanas Gotchev Computer-Generated Holograms for $3$D Imaging: a Survey . . . . . . . . . . . 32:1--32:35 Stefano Cherubin and Giovanni Agosta Tools for Reduced Precision Computation: a Survey . . . . . . . . . . . . . . . . 33:1--33:35 Behrouz Zolfaghari and Gautam Srivastava and Swapnoneel Roy and Hamid R. Nemati and Fatemeh Afghah and Takeshi Koshiba and Abolfazl Razi and Khodakhast Bibak and Pinaki Mitra and Brijesh Kumar Rai Content Delivery Networks: State of the Art, Trends, and Future Roadmap . . . . 34:1--34:34 Iqbal Alam and Kashif Sharif and Fan Li and Zohaib Latif and M. M. Karim and Sujit Biswas and Boubakr Nour and Yu Wang A Survey of Network Virtualization Techniques for Internet of Things Using SDN and NFV . . . . . . . . . . . . . . 35:1--35:40 Angela Bonifati and Irena Holubová and Arnau Prat-Pérez and Sherif Sakr Graph Generators: State of the Art and Open Challenges . . . . . . . . . . . . 36:1--36:30 Ying Lu and Lingkun Luo and Di Huang and Yunhong Wang and Liming Chen Knowledge Transfer in Vision Recognition: a Survey . . . . . . . . . 37:1--37:35 Peijin Cong and Junlong Zhou and Liying Li and Kun Cao and Tongquan Wei and Keqin Li A Survey of Hierarchical Energy Optimization for Mobile Edge Computing: a Perspective from End Devices to the Cloud . . . . . . . . . . . . . . . . . 38:1--38:44 Alan Valejo and Vinícius Ferreira and Renato Fabbri and Maria Cristina Ferreira de Oliveira and Alneu de Andrade Lopes A Critical Survey of the Multilevel Method in Complex Networks . . . . . . . 39:1--39:35 Jakapan Suaboot and Adil Fahad and Zahir Tari and John Grundy and Abdun Naser Mahmood and Abdulmohsen Almalawi and Albert Y. Zomaya and Khalil Drira A Taxonomy of Supervised Learning for IDSs in SCADA Environments . . . . . . . 40:1--40:37 Guangjie Li and Hui Liu and Ally S. Nyamawe A Survey on Renamings of Software Entities . . . . . . . . . . . . . . . . 41:1--41:38 Niclas Kannengießer and Sebastian Lins and Tobias Dehling and Ali Sunyaev Trade-offs between Distributed Ledger Technology Characteristics . . . . . . . 42:1--42:37 Herodotos Herodotou and Yuxing Chen and Jiaheng Lu A Survey on Automatic Parameter Tuning for Big Data Processing Systems . . . . 43:1--43:37 Santiago Figueroa-Lorenzo and Javier Añorga and Saioa Arrizabalaga A Survey of IIoT Protocols: a Measure of Vulnerability Risk Analysis Based on CVSS . . . . . . . . . . . . . . . . . . 44:1--44:53 Federico Sierra-Arriaga and Rodrigo Branco and Ben Lee Security Issues and Challenges for Virtualization Technologies . . . . . . 45:1--45:37
Xuezhi Zeng and Saurabh Garg and Mutaz Barika and Albert Y. Zomaya and Lizhe Wang and Massimo Villari and Dan Chen and Rajiv Ranjan SLA Management for Big Data Analytical Applications in Clouds: a Taxonomy Study 46:1--46:40 Charulata Patil and Manasi Patwardhan Visual Question Generation: The State of the Art . . . . . . . . . . . . . . . . 47:1--47:22 Ricardo Macedo and João Paulo and José Pereira and Alysson Bessani A Survey and Classification of Software-Defined Storage Systems . . . . 48:1--48:38 A'Aeshah Alhakamy and Mihran Tuceryan Real-time Illumination and Visual Coherence for Photorealistic Augmented/Mixed Reality . . . . . . . . 49:1--49:34 Xunyun Liu and Rajkumar Buyya Resource Management and Scheduling in Distributed Stream Processing Systems: a Taxonomy, Review, and Future Directions 50:1--50:41 Phillip Stanley-Marbell and Armin Alaghi and Michael Carbin and Eva Darulova and Lara Dolecek and Andreas Gerstlauer and Ghayoor Gillani and Djordje Jevdjic and Thierry Moreau and Mattia Cacciotti and Alexandros Daglis and Natalie Enright Jerger and Babak Falsafi and Sasa Misailovic and Adrian Sampson and Damien Zufferey Exploiting Errors for Efficiency: a Survey from Circuits to Applications . . 51:1--51:39 Elgìn Akpinar and Yelìz Yesìlada and Selìm Temìzer The Effect of Context on Small Screen and Wearable Device Users' Performance --- A Systematic Review . . . . . . . . 52:1--52:44 J. Stanley Warford and David Vega and Scott M. Staley A Calculational Deductive System for Linear Temporal Logic . . . . . . . . . 53:1--53:38 Rangan Das and Sagnik Sen and Ujjwal Maulik A Survey on Fuzzy Deep Neural Networks 54:1--54:25 Azzedine Boukerche and Lining Zheng and Omar Alfandi Outlier Detection: Methods, Models, and Classification . . . . . . . . . . . . . 55:1--55:37 Olivier Beaumont and Louis-Claude Canon and Lionel Eyraud-Dubois and Giorgio Lucarelli and Loris Marchal and Clément Mommessin and Bertrand Simon and Denis Trystram Scheduling on Two Types of Resources: a Survey . . . . . . . . . . . . . . . . . 56:1--56:36 Bardh Prenkaj and Paola Velardi and Giovanni Stilo and Damiano Distante and Stefano Faralli A Survey of Machine Learning Approaches for Student Dropout Prediction in Online Courses . . . . . . . . . . . . . . . . 57:1--57:34 Leila Ismail and Huned Materwala Computing Server Power Modeling in a Data Center: Survey, Taxonomy, and Performance Evaluation . . . . . . . . . 58:1--58:34 Thomas Welsh and Elhadj Benkhelifa On Resilience in Cloud Computing: a Survey of Techniques across the Cloud Domain . . . . . . . . . . . . . . . . . 59:1--59:36 Saeed Anwar and Salman Khan and Nick Barnes A Deep Journey into Super-resolution: a Survey . . . . . . . . . . . . . . . . . 60:1--60:34 Bert-Jan Butijn and Damian A. Tamburri and Willem-Jan van den Heuvel Blockchains: a Systematic Multivocal Literature Review . . . . . . . . . . . 61:1--61:37 Triet H. M. Le and Hao Chen and Muhammad Ali Babar Deep Learning for Source Code Modeling and Generation: Models, Applications, and Challenges . . . . . . . . . . . . . 62:1--62:38 Yaqing Wang and Quanming Yao and James T. Kwok and Lionel M. Ni Generalizing from a Few Examples: a Survey on Few-shot Learning . . . . . . 63:1--63:34 Sebastian Zepf and Javier Hernandez and Alexander Schmitt and Wolfgang Minker and Rosalind W. Picard Driver Emotion Recognition for Intelligent Vehicles: a Survey . . . . . 64:1--64:30 Farah A\"\it Salaht and Frédéric Desprez and Adrien Lebre An Overview of Service Placement Problem in Fog and Edge Computing . . . . . . . 65:1--65:35 Alex Serban and Erik Poll and Joost Visser Adversarial Examples on Object Recognition: a Comprehensive Survey . . 66:1--66:38 Huashan Chen and Marcus Pendleton and Laurent Njilla and Shouhuai Xu A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses 67:1--67:43
Bin Guo and Yasan Ding and Lina Yao and Yunji Liang and Zhiwen Yu The Future of False Information Detection on Social Media: New Perspectives and Trends . . . . . . . . 68:1--68:36 Patrick Emami and Panos M. Pardalos and Lily Elefteriadou and Sanjay Ranka Machine Learning Methods for Data Association in Multi-Object Tracking . . 69:1--69:34 Alexander Wood and Kayvan Najarian and Delaram Kahrobaei Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics 70:1--70:35 Kan Ngamakeur and Sira Yongchareon and Jian Yu and Saeed Ur Rehman A Survey on Device-free Indoor Localization and Tracking in the Multi-resident Environment . . . . . . . 71:1--71:29 Isra Mohamed Ali and Maurantonio Caprolu and Roberto Di Pietro Foundations, Properties, and Security Applications of Puzzles: a Survey . . . 72:1--72:38 Xincai Fei and Fangming Liu and Qixia Zhang and Hai Jin and Hongxin Hu Paving the Way for NFV Acceleration: a Taxonomy, Survey and Future Directions 73:1--73:42 Michael Feldmann and Christian Scheideler and Stefan Schmid Survey on Algorithms for Self-stabilizing Overlay Networks . . . 74:1--74:24 Ruocheng Guo and Lu Cheng and Jundong Li and P. Richard Hahn and Huan Liu A Survey of Learning Causality with Data: Problems and Methods . . . . . . . 75:1--75:37 Angeliki Kritikakou and Rafail Psiakis and Francky Catthoor and Olivier Sentieys Binary Tree Classification of Rigid Error Detection and Correction Techniques . . . . . . . . . . . . . . . 76:1--76:38 Jorge Calvo-Zaragoza and Jan Hajic Jr. and Alexander Pacha Understanding Optical Music Recognition 77:1--77:35 Salvador Lucas Context-sensitive Rewriting . . . . . . 78:1--78:36 Jon Perez Cerrolaza and Roman Obermaisser and Jaume Abella and Francisco J. Cazorla and Kim Grüttner and Irune Agirre and Hamidreza Ahmadian and Imanol Allende Multi-core Devices for Safety-critical Systems: a Survey . . . . . . . . . . . 79:1--79:38 Azzedine Boukerche and Victor Soto Computation Offloading and Retrieval for Vehicular Edge Computing: Algorithms, Models, and Classification . . . . . . . 80:1--80:35 Pascal Weisenburger and Johannes Wirth and Guido Salvaneschi A Survey of Multitier Programming . . . 81:1--81:35 Bin Qian and Jie Su and Zhenyu Wen and Devki Nandan Jha and Yinhao Li and Yu Guan and Deepak Puthal and Philip James and Renyu Yang and Albert Y. Zomaya and Omer Rana and Lizhe Wang and Maciej Koutny and Rajiv Ranjan Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications: a Taxonomy and Survey . . 82:1--82:47 Yinghui Zhang and Robert H. Deng and Shengmin Xu and Jianfei Sun and Qi Li and Dong Zheng Attribute-based Encryption for Cloud Computing Access Control: a Survey . . . 83:1--83:41 Yanjiao Chen and Baolin Zheng and Zihan Zhang and Qian Wang and Chao Shen and Qian Zhang Deep Learning on Mobile and Embedded Devices: State-of-the-art, Challenges, and Future Directions . . . . . . . . . 84:1--84:37 Saad Khan and Simon Parkinson and Liam Grant and Na Liu and Stephen Mcguire Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security 85:1--85:29 Tomohiro Harada and Enrique Alba Parallel Genetic Algorithms: a Useful Survey . . . . . . . . . . . . . . . . . 86:1--86:39 Adrian Pekar and Jozef Mocnej and Winston K. G. Seah and Iveta Zolotova Application Domain-Based Overview of IoT Network Traffic Characteristics . . . . 87:1--87:33 Redowan Mahmud and Kotagiri Ramamohanarao and Rajkumar Buyya Application Management in Fog Computing Environments: a Taxonomy, Review and Future Directions . . . . . . . . . . . 88:1--88:43 Pratima Sharma and Rajni Jindal and Malaya Dutta Borah Blockchain Technology for Cloud Storage: a Systematic Literature Review . . . . . 89:1--89:32 Gexiang Zhang and Zeyi Shang and Sergey Verlan and Miguel Á. Martínez-del-Amor and Chengxun Yuan and Luis Valencia-Cabrera and Mario J. Pérez-Jiménez An Overview of Hardware Implementation of Membrane Computing Models . . . . . . 90:1--90:38
Juan A. Álvarez-García and Bozidara Cvetkovi\'c and Mitja Lustrek A Survey on Energy Expenditure Estimation Using Wearable Devices . . . 91:1--91:35 Noura Aljeri and Azzedine Boukerche Mobility Management in $5$G-enabled Vehicular Networks: Models, Protocols, and Classification . . . . . . . . . . . 92:1--92:35 Mariam Khader and Ghazi Al-Naymat Density-based Algorithms for Big Data Clustering Using MapReduce Framework: a Comprehensive Study . . . . . . . . . . 93:1--93:38 Roniel S. De Sousa and Azzedine Boukerche and Antonio A. F. Loureiro Vehicle Trajectory Similarity: Models, Methods, and Applications . . . . . . . 94:1--94:32 Ramon Canal and Carles Hernandez and Rafa Tornero and Alessandro Cilardo and Giuseppe Massari and Federico Reghenzani and William Fornaciari and Marina Zapater and David Atienza and Ariel Oleksiak and Wojciech PiAtek and Jaume Abella Predictive Reliability and Fault Management in Exascale Systems: State of the Art and Perspectives . . . . . . . . 95:1--95:32 Miralem Mehic and Marcin Niemiec and Stefan Rass and Jiajun Ma and Momtchil Peev and Alejandro Aguado and Vicente Martin and Stefan Schauer and Andreas Poppe and Christoph Pacher and Miroslav Voznak Quantum Key Distribution: a Networking Perspective . . . . . . . . . . . . . . 96:1--96:41 Zeyad A. Al-Odat and Mazhar Ali and Assad Abbas and Samee U. Khan Secure Hash Algorithms and the Corresponding FPGA Optimization Techniques . . . . . . . . . . . . . . . 97:1--97:36 Sagar Uprety and Dimitris Gkoumas and Dawei Song A Survey of Quantum Theory Inspired Approaches to Information Retrieval . . 98:1--98:39 Raj Dabre and Chenhui Chu and Anoop Kunchukuttan A Survey of Multilingual Neural Machine Translation . . . . . . . . . . . . . . 99:1--99:38 Weiwei Lin and Fang Shi and Wentai Wu and Keqin Li and Guangxin Wu and Al-Alas Mohammed A Taxonomy and Survey of Power Models and Power Modeling for Cloud Servers . . 100:1--100:41 Deya Chatterjee and Shrisha Rao Computational Sustainability: a Socio-technical Perspective . . . . . . 101:1--101:29 Maram Bani Younes and Azzedine Boukerche Traffic Efficiency Applications over Downtown Roads: a New Challenge for Intelligent Connected Vehicles . . . . . 102:1--102:30 María A. Cornejo-Lupa and Regina P. Ticona-Herrera and Yudith Cardinale and Dennis Barrios-Aranibar A Survey of Ontologies for Simultaneous Localization and Mapping in Mobile Robots . . . . . . . . . . . . . . . . . 103:1--103:26 Kai Bu and Avery Laird and Yutian Yang and Linfeng Cheng and Jiaqing Luo and Yingjiu Li and Kui Ren Unveiling the Mystery of Internet Packet Forwarding: a Survey of Network Path Validation . . . . . . . . . . . . . . . 104:1--104:34 Gonzalo Navarro and Javiel Rojas-Ledesma Predecessor Search . . . . . . . . . . . 105:1--105:35 Yashar Deldjoo and Markus Schedl and Paolo Cremonesi and Gabriella Pasi Recommender Systems Leveraging Multimedia Content . . . . . . . . . . . 106:1--106:38 Jingwen Wang and Xuyang Jing and Zheng Yan and Yulong Fu and Witold Pedrycz and Laurence T. Yang A Survey on Trust Evaluation Based on Machine Learning . . . . . . . . . . . . 107:1--107:36 Hao Wang and Dit-Yan Yeung A Survey on Bayesian Deep Learning . . . 108:1--108:37 Xinyi Zhou and Reza Zafarani A Survey of Fake News: Fundamental Theories, Detection Methods, and Opportunities . . . . . . . . . . . . . 109:1--109:40 Ali Davoudian and Mengchi Liu Big Data Systems: a Software Engineering Perspective . . . . . . . . . . . . . . 110:1--110:39 Kui Yu and Xianjie Guo and Lin Liu and Jiuyong Li and Hao Wang and Zhaolong Ling and Xindong Wu Causality-based Feature Selection: Methods and Evaluations . . . . . . . . 111:1--111:36 Furkan Alaca and Paul C. Van Oorschot Comparative Analysis and Framework Evaluating Web Single Sign-on Systems 112:1--112:34
Peter J. Denning Working Set Analytics . . . . . . . . . 113:1--113:36 Albert Y. Zomaya In Memoriam Sherif Sakr (1979--2020) . . 113e:1--113e:1 Aditya Singh Rathore and Zhengxiong Li and Weijin Zhu and Zhanpeng Jin and Wenyao Xu A Survey on Heart Biometrics . . . . . . 114:1--114:38 Sara N. Matheu and José L. Hernández-Ramos and Antonio F. Skarmeta and Gianmarco Baldini A Survey of Cybersecurity Certification for the Internet of Things . . . . . . . 115:1--115:36 Jide S. Edu and Jose M. Such and Guillermo Suarez-Tangil Smart Home Personal Assistants: a Security and Privacy Review . . . . . . 116:1--116:36 Marimuthu C. and K. Chandrasekaran and Sridhar Chimalakonda Energy Diagnosis of Android Applications: a Thematic Taxonomy and Survey . . . . . . . . . . . . . . . . . 117:1--117:36 Pamela Zave and Jennifer Rexford Patterns and Interactions in Network Security . . . . . . . . . . . . . . . . 118:1--118:37 K. K. Santhosh and D. P. Dogra and P. P. Roy Anomaly Detection in Road Traffic Using Visual Surveillance: a Survey . . . . . 119:1--119:26 Elakkiya Ellavarason and Richard Guest and Farzin Deravi and Raul Sanchez-Riello and Barbara Corsetti Touch-dynamics based Behavioural Biometrics on Mobile Devices --- A Review from a Usability and Performance Perspective . . . . . . . . . . . . . . 120:1--120:36 Marco Zimmerling and Luca Mottola and Silvia Santini Synchronous Transmissions in Low-Power Wireless: a Survey of Communication Protocols and Network Services . . . . . 121:1--121:39 Nazar Waheed and Xiangjian He and Muhammad Ikram and Muhammad Usman and Saad Sajid Hashmi and Muhammad Usman Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures . . . . . . . . . . 122:1--122:37 Riemer van Rozen Languages of Games and Play: a Systematic Mapping Study . . . . . . . . 123:1--123:37 Michele Coscia and Andres Gomez-Lievano and James Mcnerney and Frank Neffke The Node Vector Distance Problem in Complex Networks . . . . . . . . . . . . 124:1--124:27 Giulio Ermanno Pibiri and Rossano Venturini Techniques for Inverted Index Compression . . . . . . . . . . . . . . 125:1--125:36 Junyang Qiu and Jun Zhang and Wei Luo and Lei Pan and Surya Nepal and Yang Xiang A Survey of Android Malware Detection with Deep Neural Models . . . . . . . . 126:1--126:36 Vassilis Christophides and Vasilis Efthymiou and Themis Palpanas and George Papadakis and Kostas Stefanidis An Overview of End-to-End Entity Resolution for Big Data . . . . . . . . 127:1--127:42 Furkan Turan and Ingrid Verbauwhede Trust in FPGA-accelerated Cloud Computing . . . . . . . . . . . . . . . 128:1--128:28 Ruba Skaik and Diana Inkpen Using Social Media for Mental Health Surveillance: a Review . . . . . . . . . 129:1--129:31 Sarah Masud Preum and Sirajum Munir and Meiyi Ma and Mohammad Samin Yasar and David J. Stone and Ronald Williams and Homa Alemzadeh and John A. Stankovic A Review of Cognitive Assistants for Healthcare: Trends, Prospects, and Future Directions . . . . . . . . . . . 130:1--130:37 Maggi Bansal and Inderveer Chana and Siobhán Clarke A Survey on IoT Big Data: Current Status, 13 V's Challenges, and Future Directions . . . . . . . . . . . . . . . 131:1--131:59 Suzanne Tolmeijer and Markus Kneer and Cristina Sarasua and Markus Christen and Abraham Bernstein Implementations in Machine Ethics: a Survey . . . . . . . . . . . . . . . . . 132:1--132:38 Liehuang Zhu and Md M. Karim and Kashif Sharif and Chang Xu and Fan Li and Xiaojiang Du and Mohsen Guizani SDN Controllers: a Comprehensive Analysis and Performance Evaluation Study . . . . . . . . . . . . . . . . . 133:1--133:40 Azzedine Boukerche and Peng Sun Design of Algorithms and Protocols for Underwater Acoustic Wireless Sensor Networks . . . . . . . . . . . . . . . . 134:1--134:34
Miljana Mladenovi\'c and Vera Osmjanski and Stasa Vujici\'c Stankovi\'c Cyber-aggression, Cyberbullying, and Cyber-grooming: a Survey and Research Challenges . . . . . . . . . . . . . . . 1:1--1:42 Avani Vyas and Sujata Pal and Barun Kumar Saha Relay-based Communications in WBANs: a Comprehensive Survey . . . . . . . . . . 2:1--2:34 Ángel Jesús Varela-Vaca and Antonia M. Reina Quintero Smart Contract Languages: a Multivocal Mapping Study . . . . . . . . . . . . . 3:1--3:38 Hongbo Jiang and Jie Li and Ping Zhao and Fanzi Zeng and Zhu Xiao and Arun Iyengar Location Privacy-preserving Mechanisms in Location-based Services: a Comprehensive Survey . . . . . . . . . . 4:1--4:36 Christopher Wright and William A. Moeglein and Saurabh Bagchi and Milind Kulkarni and Abraham A. Clements Challenges in Firmware Re-Hosting, Emulation, and Analysis . . . . . . . . 5:1--5:36 Renjie Gu and Chaoyue Niu and Fan Wu and Guihai Chen and Chun Hu and Chengfei Lyu and Zhihua Wu From Server-Based to Client-Based Machine Learning: a Comprehensive Survey 6:1--6:36 Yisroel Mirsky and Wenke Lee The Creation and Detection of Deepfakes: a Survey . . . . . . . . . . . . . . . . 7:1--7:41 Joan Boyar and Lene M. Favrholdt and Kim S. Larsen Relative Worst-order Analysis: a Survey 8:1--8:21 Prasanna Ravi and James Howe and Anupam Chattopadhyay and Shivam Bhasin Lattice-based Key-sharing Schemes: a Survey . . . . . . . . . . . . . . . . . 9:1--9:39 Behroz Mirza and Tahir Q. Syed and Behraj Khan and Yameen Malik Potential Deep Learning Solutions to Persistent and Emerging Big Data Challenges --- a Practitioners' Cookbook 10:1--10:39 Sergio López Bernal and Alberto Huertas Celdrán and Gregorio Martínez Pérez and Michael Taynnan Barros and Sasitharan Balasubramaniam Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges . . . . . . . . . . . 11:1--11:35 Leah Zhang-Kennedy and Sonia Chiasson A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education . . . . . . . . . . . . . . . 12:1--12:39 Shengming Jiang Networking in Oceans: a Survey . . . . . 13:1--13:33 Weitao Xu and Junqing Zhang and Shunqi Huang and Chengwen Luo and Wei Li Key Generation for Internet of Things: a Contemporary Survey . . . . . . . . . . 14:1--14:37 Paolo Bellavista and Luca Foschini and Alessio Mora Decentralised Learning in Federated Deployment Environments: a System-Level Survey . . . . . . . . . . . . . . . . . 15:1--15:38 Zarin Tasnim Sandhie and Jill Arvindbhai Patel and Farid Uddin Ahmed and Masud H. Chowdhury Investigation of Multiple-valued Logic Technologies for Beyond-binary Era . . . 16:1--16:30 Rayan Chikhi and Jan Holub and Paul Medvedev Data Structures to Represent a Set of $k$-long DNA Sequences . . . . . . . . . 17:1--17:22 Víctor Adrián Sosa Hernández and Raúl Monroy and Miguel Angel Medina-Pérez and Octavio Loyola-González and Francisco Herrera A Practical Tutorial for Decision Tree Induction: Evaluation Measures for Candidate Splits and Opportunities . . . 18:1--18:38 Stefano Mariani and Giacomo Cabri and Franco Zambonelli Coordination of Autonomous Vehicles: Taxonomy and Survey . . . . . . . . . . 19:1--19:33 Zara Nasar and Syed Waqar Jaffry and Muhammad Kamran Malik Named Entity Recognition and Relation Extraction: State-of-the-Art . . . . . . 20:1--20:39 Emad Aliwa and Omer Rana and Charith Perera and Peter Burnap Cyberattacks and Countermeasures for In-Vehicle Networks . . . . . . . . . . 21:1--21:37 Bosheng Song and Kenli Li and David Orellana-Martín and Mario J. Pérez-Jiménez and Ignacio PéRez-Hurtado A Survey of Nature-Inspired Computing: Membrane Computing . . . . . . . . . . . 22:1--22:31 Anna Minaeva and Zdenek Hanzálek Survey on Periodic Scheduling for Time-triggered Hard Real-time Systems 23:1--23:32 Tobias Distler Byzantine Fault-tolerant State-machine Replication from a Systems Perspective 24:1--24:38
Abdullah Qasem and Paria Shirani and Mourad Debbabi and Lingyu Wang and Bernard Lebel and Basile L. Agba Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies . . . . . . . . . 25:1--25:42 Gonzalo Navarro Indexing Highly Repetitive String Collections, Part II: Compressed Indexes 26:1--26:32 Fan Zhou and Xovee Xu and Goce Trajcevski and Kunpeng Zhang A Survey of Information Cascade Analysis: Models, Predictions, and Recent Advances . . . . . . . . . . . . 27:1--27:36 Pedro Ribeiro and Pedro Paredes and Miguel E. P. Silva and David Aparicio and Fernando Silva A Survey on Subgraph Counting: Concepts, Algorithms, and Applications to Network Motifs and Graphlets . . . . . . . . . . 28:1--28:36 Gonzalo Navarro Indexing Highly Repetitive String Collections, Part I: Repetitiveness Measures . . . . . . . . . . . . . . . . 29:1--29:31 Azzedine Boukerche and Zhijun Hou Object Detection Using Deep Learning Methods in Traffic Scenarios . . . . . . 30:1--30:35 Bo Liu and Ming Ding and Sina Shaham and Wenny Rahayu and Farhad Farokhi and Zihuai Lin When Machine Learning Meets Privacy: a Survey and Outlook . . . . . . . . . . . 31:1--31:36 Chenning Li and Zhichao Cao and Yunhao Liu Deep AI Enabled Ubiquitous Wireless Sensing: a Survey . . . . . . . . . . . 32:1--32:35 Kelsey Harley and Rodney Cooper Information Integrity: Are We There Yet? 33:1--33:35 El-Ghazali Talbi Automated Design of Deep Neural Networks: a Survey and Unified Taxonomy 34:1--34:37 Yashar Deldjoo and Tommaso Di Noia and Felice Antonio Merra A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks . . . 35:1--35:38 Sarra Bouhenni and Sa\"\id Yahiaoui and Nadia Nouali-Taboudjemat and Hamamache Kheddouci A Survey on Distributed Graph Pattern Matching in Massive Graphs . . . . . . . 36:1--36:35 Zhengwei Wang and Qi She and Tomás E. Ward Generative Adversarial Networks in Computer Vision: a Survey and Taxonomy 37:1--37:38 Guansong Pang and Chunhua Shen and Longbing Cao and Anton Van Den Hengel Deep Learning for Anomaly Detection: a Review . . . . . . . . . . . . . . . . . 38:1--38:38 Sheng Wang and Zhifeng Bao and J. Shane Culpepper and Gao Cong A Survey on Trajectory Data Management, Analytics, and Learning . . . . . . . . 39:1--39:36 Christian Meurisch and Max Mühlhäuser Data Protection in AI Services: a Survey 40:1--40:38 Dhivya Chandrasekaran and Vijay Mago Evolution of Semantic Similarity --- a Survey . . . . . . . . . . . . . . . . . 41:1--41:37 Xiaoxue Chen and Lianwen Jin and Yuanzhi Zhu and Canjie Luo and Tianwei Wang Text Recognition in the Wild: a Survey 42:1--42:35 Suha S. Al-Thanyyan and Aqil M. Azmi Automated Text Simplification: a Survey 43:1--43:36 Huawei Huang and Wei Kong and Sicong Zhou and Zibin Zheng and Song Guo A Survey of State-of-the-Art on Blockchains: Theories, Modelings, and Tools . . . . . . . . . . . . . . . . . 44:1--44:42 Sameen Maruf and Fahimeh Saleh and Gholamreza Haffari A Survey on Document-level Neural Machine Translation: Methods and Evaluation . . . . . . . . . . . . . . . 45:1--45:36 Arlino Magalhaes and Jose Maria Monteiro and Angelo Brayner Main Memory Database Recovery: a Survey 46:1--46:36
Mohammed Hassanin and Salman Khan and Murat Tahtali Visual Affordance and Function Understanding: a Survey . . . . . . . . 47:1--47:35 Matteo Magnani and Obaida Hanteer and Roberto Interdonato and Luca Rossi and Andrea Tagarelli Community Detection in Multiplex Networks . . . . . . . . . . . . . . . . 48:1--48:35 Clayson Celes and Azzedine Boukerche and Antonio A. F. Loureiro Mobility Trace Analysis for Intelligent Vehicular Networks: Methods, Models, and Applications . . . . . . . . . . . . . . 49:1--49:38 Bushra Sabir and Faheem Ullah and M. Ali Babar and Raj Gaire Machine Learning for Detecting Data Exfiltration: a Review . . . . . . . . . 50:1--50:47 Irfan Ul Haq and Juan Caballero A Survey of Binary Code Similarity . . . 51:1--51:38 Shyamali Mitra and Nibaran Das and Soumyajyoti Dey and Sukanta Chakraborty and Mita Nasipuri and Mrinal Kanti Naskar Cytology Image Analysis Techniques Toward Automation: Systematically Revisited . . . . . . . . . . . . . . . 52:1--52:41 Ilona Bluemke and Agnieszka Malanowska Software Testing Effort Estimation and Related Problems: a Systematic Literature Review . . . . . . . . . . . 53:1--53:38 Wenjie Xiong and Jakub Szefer Survey of Transient Execution Attacks and Their Mitigations . . . . . . . . . 54:1--54:36 Liping Zhao and Waad Alhoshan and Alessio Ferrari and Keletso J. Letsholo and Muideen A. Ajagbe and Erol-Valeriu Chioasca and Riza T. Batista-Navarro Natural Language Processing for Requirements Engineering: a Systematic Mapping Study . . . . . . . . . . . . . 55:1--55:41 Ane Blázquez-García and Angel Conde and Usue Mori and Jose A. Lozano A Review on Outlier/Anomaly Detection in Time Series Data . . . . . . . . . . . . 56:1--56:33 Syed Wasif Abbas Hamdani and Haider Abbas and Abdul Rehman Janjua and Waleed Bin Shahid and Muhammad Faisal Amjad and Jahanzaib Malik and Malik Hamza Murtaza and Mohammed Atiquzzaman and Abdul Waheed Khan Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons . . . . . . . 57:1--57:36 Xi Li and Zehua Wang and Victor C. M. Leung and Hong Ji and Yiming Liu and Heli Zhang Blockchain-empowered Data-driven Networks: a Survey and Outlook . . . . . 58:1--58:38 Petr Spelda and Vit Stritecky Human Induction in Machine Learning: a Survey of the Nexus . . . . . . . . . . 59:1--59:18 Jun Huang and Debiao He and Mohammad S. Obaidat and Pandi Vijayakumar and Min Luo and Kim-Kwang Raymond Choo The Application of the Blockchain Technology in Voting Systems: a Review 60:1--60:28 Boubakr Nour and Hakima Khelifi and Rasheed Hussain and Spyridon Mastorakis and Hassine Moungla Access Control Mechanisms in Named Data Networks: a Comprehensive Survey . . . . 61:1--61:35 Shervin Minaee and Nal Kalchbrenner and Erik Cambria and Narjes Nikzad and Meysam Chenaghlu and Jianfeng Gao Deep Learning--based Text Classification: a Comprehensive Review 62:1--62:40 Divya Saxena and Jiannong Cao Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions . . . . . . . . . . . . . . . 63:1--63:42 Zhabiz Gharibshah and Xingquan Zhu User Response Prediction in Online Advertising . . . . . . . . . . . . . . 64:1--64:43 Gilberto Astolfi and Fábio Prestes Cesar Rezende and João Vitor De Andrade Porto and Edson Takashi Matsubara and Hemerson Pistori Syntactic Pattern Recognition in Computer Vision: a Systematic Review . . 65:1--65:35 Blesson Varghese and Nan Wang and David Bermbach and Cheol-Ho Hong and Eyal De Lara and Weisong Shi and Christopher Stewart A Survey on Edge Performance Benchmarking . . . . . . . . . . . . . . 66:1--66:33 Danilo Avola and Luigi Cinque and Alessio Fagioli and Gianluca Foresti and Alessio Mecca Ultrasound Medical Imaging Techniques: a Survey . . . . . . . . . . . . . . . . . 67:1--67:38 Khan Muhammad and Mohammad S. Obaidat and Tanveer Hussain and Javier Del Ser and Neeraj Kumar and Mohammad Tanveer and Faiyaz Doctor Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions . . 68:1--68:33 Ahmed Alharbi and Hai Dong and Xun Yi and Zahir Tari and Ibrahim Khalil Social Media Identity Deception Detection: a Survey . . . . . . . . . . 69:1--69:35
Felipe L. Gewers and Gustavo R. Ferreira and Henrique F. De Arruda and Filipi N. Silva and Cesar H. Comin and Diego R. Amancio and Luciano Da F.Costa Principal Component Analysis: a Natural Approach to Data Exploration . . . . . . 70:1--70:34 Aidan Hogan and Eva Blomqvist and Michael Cochez and Claudia D'amato and Gerard De Melo and Claudio Gutierrez and Sabrina Kirrane and José Emilio Labra Gayo and Roberto Navigli and Sebastian Neumaier and Axel-Cyrille Ngonga Ngomo and Axel Polleres and Sabbir M. Rashid and Anisa Rula and Lukas Schmelzeisen and Juan Sequeda and Steffen Staab and Antoine Zimmermann Knowledge Graphs . . . . . . . . . . . . 71:1--71:37 Wen-Huang Cheng and Sijie Song and Chieh-Yun Chen and Shintami Chusnul Hidayati and Jiaying Liu Fashion Meets Computer Vision: a Survey 72:1--72:41 Rob Dunne and Tim Morris and Simon Harper A Survey of Ambient Intelligence . . . . 73:1--73:27 H. M. Dipu Kabir and Abbas Khosravi and Subrota K. Mondal and Mustaneer Rahman and Saeid Nahavandi and Rajkumar Buyya Uncertainty-aware Decisions in Cloud Computing: Foundations and Future Directions . . . . . . . . . . . . . . . 74:1--74:30 Fei Chen and Duming Luo and Tao Xiang and Ping Chen and Junfeng Fan and Hong-Linh Truong IoT Cloud Security Review: a Case Study Approach Using Emerging Consumer-oriented Applications . . . . . 75:1--75:36 Pengzhen Ren and Yun Xiao and Xiaojun Chang and Po-yao Huang and Zhihui Li and Xiaojiang Chen and Xin Wang A Comprehensive Survey of Neural Architecture Search: Challenges and Solutions . . . . . . . . . . . . . . . 76:1--76:34 Kaixuan Chen and Dalin Zhang and Lina Yao and Bin Guo and Zhiwen Yu and Yunhao Liu Deep Learning for Sensor-based Human Activity Recognition: Overview, Challenges, and Opportunities . . . . . 77:1--77:40 Daniel Russo and Klaas-Jan Stol PLS-SEM for Software Engineering Research: an Introduction and Survey . . 78:1--78:38 Abdus Salam and Rolf Schwitter and Mehmet A. Orgun Probabilistic Rule Learning Systems: a Survey . . . . . . . . . . . . . . . . . 79:1--79:16 Elena Almaraz Luengo and Luis Javier García Villalba Recommendations on Statistical Randomness Test Batteries for Cryptographic Purposes . . . . . . . . . 80:1--80:34 Katie Seaborn and Norihisa P. Miyake and Peter Pennefather and Mihoko Otake-Matsuura Voice in Human-Agent Interaction: a Survey . . . . . . . . . . . . . . . . . 81:1--81:43 Oliver Michel and Roberto Bifulco and Gábor Rétvári and Stefan Schmid The Programmable Data Plane: Abstractions, Architectures, Algorithms, and Applications . . . . . . . . . . . . 82:1--82:36 Wei Hu and Armaiti Ardeshiricham and Ryan Kastner Hardware Information Flow Tracking . . . 83:1--83:39 Azzedine Boukerche and Xiren Ma Vision-based Autonomous Vehicle Recognition: a New Challenge for Deep Learning-based Systems . . . . . . . . . 84:1--84:37 Bekir Afsar and Kaisa Miettinen and Francisco Ruiz Assessing the Performance of Interactive Multiobjective Optimization Methods: a Survey . . . . . . . . . . . . . . . . . 85:1--85:27 Nikhil Tripathi and Neminath Hubballi Application Layer Denial-of-Service Attacks and Defense Mechanisms: a Survey 86:1--86:33 Yunbo Tang and Dan Chen and Xiaoli Li Dimensionality Reduction Methods for Brain Imaging Data Analysis . . . . . . 87:1--87:36 Matteo Ridolfi and Abdil Kaya and Rafael Berkvens and Maarten Weyn and Wout Joseph and Eli De Poorter Self-calibration and Collaborative Localization for UWB Positioning Systems: a Survey and Future Research Directions . . . . . . . . . . . . . . . 88:1--88:27 Nuno Laranjeiro and João Agnelo and Jorge Bernardino A Systematic Review on Software Robustness Assessment . . . . . . . . . 89:1--89:65 Boyuan Chen and Zhen Ming (Jack) Jiang A Survey of Software Log Instrumentation 90:1--90:34 Varsha S. Lalapura and J. Amudha and Hariramn Selvamuruga Satheesh Recurrent Neural Networks for Edge Intelligence: a Survey . . . . . . . . . 91:1--91:38
Antonia Bertolino and Pietro Braione and Guglielmo De Angelis and Luca Gazzola and Fitsum Kifetew and Leonardo Mariani and Matteo Orr\`u and Mauro Pezz\`e and Roberto Pietrantuono and Stefano Russo and Paolo Tonella A Survey of Field-based Testing Techniques . . . . . . . . . . . . . . . 92:1--92:39 Jean-Michel Bruel and Sophie Ebersold and Florian Galinier and Manuel Mazzara and Alexandr Naumchev and Bertrand Meyer The Role of Formalism in System Requirements . . . . . . . . . . . . . . 93:1--93:36 Liang Zhao Event Prediction in the Big Data Era: a Systematic Survey . . . . . . . . . . . 94:1--94:37 Sin Kit Lo and Qinghua Lu and Chen Wang and Hye-Young Paik and Liming Zhu A Systematic Literature Review on Federated Machine Learning: From a Software Engineering Perspective . . . . 95:1--95:39 Abdulaziz Alashaikh and Eisa Alanazi and Ala Al-Fuqaha A Survey on the Use of Preferences for Virtual Machine Placement in Cloud Data Centers . . . . . . . . . . . . . . . . 96:1--96:39 Xing Huang and Tsung-Yi Ho and Wenzhong Guo and Bing Li and Krishnendu Chakrabarty and Ulf Schlichtmann Computer-aided Design Techniques for Flow-based Microfluidic Lab-on-a-chip Systems . . . . . . . . . . . . . . . . 97:1--97:29 Jana Dunfield and Neel Krishnaswami Bidirectional Typing . . . . . . . . . . 98:1--98:38 Mohanad Abukmeil and Stefano Ferrari and Angelo Genovese and Vincenzo Piuri and Fabio Scotti A Survey of Unsupervised Generative Models for Exploratory Data Analysis and Representation Learning . . . . . . . . 99:1--99:40 Adilla Susungi and Claude Tadonki Intermediate Representations for Explicitly Parallel Programs . . . . . . 100:1--100:24 Subodha Charles and Prabhat Mishra A Survey of Network-on-Chip Security Attacks and Countermeasures . . . . . . 101:1--101:36 Atheer Aljeraisy and Masoud Barati and Omer Rana and Charith Perera Privacy Laws and Privacy by Design Schemes for the Internet of Things: a Developer's Perspective . . . . . . . . 102:1--102:38 Arwa I. Alhussain and Aqil M. Azmi Automatic Story Generation: a Survey of Approaches . . . . . . . . . . . . . . . 103:1--103:38 Marie Al-Ghossein and Talel Abdessalem and Anthony Barré A Survey on Stream-Based Recommender Systems . . . . . . . . . . . . . . . . 104:1--104:36 Dietmar Jannach and Ahtsham Manzoor and Wanling Cai and Li Chen A Survey on Conversational Recommender Systems . . . . . . . . . . . . . . . . 105:1--105:36 Yuan Luo and Ya Xiao and Long Cheng and Guojun Peng and Danfeng (Daphne) Yao Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities . . . . . . . . . . . . . 106:1--106:36 Maya Dotan and Yvonne-Anne Pignolet and Stefan Schmid and Saar Tochner and Aviv Zohar Survey on Blockchain Networking: Context, State-of-the-Art, Challenges 107:1--107:34 Ishai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain . . . . . . . . . . . . . . . . . 108:1--108:36 Shubham Pateria and Budhitama Subagdja and Ah-hwee Tan and Chai Quek Hierarchical Reinforcement Learning: a Comprehensive Survey . . . . . . . . . . 109:1--109:35 Vimal Dwivedi and Vishwajeet Pattanaik and Vipin Deval and Abhishek Dixit and Alex Norta and Dirk Draheim Legally Enforceable Smart-Contract Languages: a Systematic Literature Review . . . . . . . . . . . . . . . . . 110:1--110:34 Rob Ashmore and Radu Calinescu and Colin Paterson Assuring the Machine Learning Lifecycle: Desiderata, Methods, and Challenges . . 111:1--111:39
Peter Kietzmann and Thomas C. Schmidt and Matthias Wählisch A Guideline on Pseudorandom Number Generation (PRNG) in the IoT . . . . . . 112:1--112:38 Eman Badr Images in Space and Time: Real Big Data in Healthcare . . . . . . . . . . . . . 113:1--113:38 Swati Jaiswal and Uday P. Khedker and Alan Mycroft A Unified Model for Context-Sensitive Program Analyses:: The Blind Men and the Elephant . . . . . . . . . . . . . . . . 114:1--114:37 Ninareh Mehrabi and Fred Morstatter and Nripsuta Saxena and Kristina Lerman and Aram Galstyan A Survey on Bias and Fairness in Machine Learning . . . . . . . . . . . . . . . . 115:1--115:35 Harley Vera-Olivera and Ruizhe Guo and Ruben Cruz Huacarpuma and Ana Paula Bernardi Da Silva and Ari Melo Mariano and Maristela Holanda Data Modeling and NoSQL Databases --- a Systematic Mapping Review . . . . . . . 116:1--116:26 Routa Moussaileb and Nora Cuppens and Jean-Louis Lanet and Hél\`ene Le Bouder A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms . . . 117:1--117:36 Ratnabali Pal and Arif Ahmed Sekh and Debi Prosad Dogra and Samarjit Kar and Partha Pratim Roy and Dilip K. Prasad Topic-based Video Analysis: a Survey . . 118:1--118:34 Andreia P. Guerreiro and Carlos M. Fonseca and Luís Paquete The Hypervolume Indicator: Computational Problems and Algorithms . . . . . . . . 119:1--119:42 Yuta Itoh and Tobias Langlotz and Jonathan Sutton and Alexander Plopski Towards Indistinguishable Augmented Reality: a Survey on Optical See-through Head-mounted Displays . . . . . . . . . 120:1--120:36 Bilal Rauf and Haider Abbas and Muhammad Usman and Tanveer A. Zia and Waseem Iqbal and Yawar Abbas and Hammad Afzal Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks . . . . . . . 121:1--121:36 Xiaoxuan Lou and Tianwei Zhang and Jun Jiang and Yinqian Zhang A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography . . . . . . 122:1--122:37 Eva Papadogiannaki and Sotiris Ioannidis A Survey on Encrypted Network Traffic Analysis Applications, Techniques, and Countermeasures . . . . . . . . . . . . 123:1--123:35 Thi Tuyet Hai Nguyen and Adam Jatowt and Mickael Coustaty and Antoine Doucet Survey of Post-OCR Processing Approaches 124:1--124:37 Panagiotis Oikonomou and Anna Karanika and Christos Anagnostopoulos and Kostas Kolomvatsos On the Use of Intelligent Models towards Meeting the Challenges of the Edge Mesh 125:1--125:42 Shufan Fei and Zheng Yan and Wenxiu Ding and Haomeng Xie Security Vulnerabilities of SGX and Countermeasures: a Survey . . . . . . . 126:1--126:36 Sindhu Padakandla A Survey of Reinforcement Learning Algorithms for Dynamically Varying Environments . . . . . . . . . . . . . . 127:1--127:25 Pádraig Cunningham and Sarah Jane Delany $k$-Nearest Neighbour Classifiers --- a Tutorial . . . . . . . . . . . . . . . . 128:1--128:25 El-Ghazali Talbi Machine Learning into Metaheuristics: a Survey and Taxonomy . . . . . . . . . . 129:1--129:32 Shilin He and Pinjia He and Zhuangbin Chen and Tianyi Yang and Yuxin Su and Michael R. Lyu A Survey on Automated Log Analysis for Reliability Engineering . . . . . . . . 130:1--130:37 Xuefei Yin and Yanming Zhu and Jiankun Hu A Comprehensive Survey of Privacy-preserving Federated Learning: a Taxonomy, Review, and Future Directions 131:1--131:36 Zhipeng Cai and Zuobin Xiong and Honghui Xu and Peng Wang and Wei Li and Yi Pan Generative Adversarial Networks: a Survey Toward Private and Secure Applications . . . . . . . . . . . . . . 132:1--132:38 Azzedine Boukerche and Mingzhi Sha Design Guidelines on Deep Learning-based Pedestrian Detection Methods for Supporting Autonomous Vehicles . . . . . 133:1--133:36 Thomas PlÖtz Applying Machine Learning for Sensor Data Analysis in Interactive Systems: Common Pitfalls of Pragmatic Use and Ways to Avoid Them . . . . . . . . . . . 134:1--134:25
Ankur Lohachab and Saurabh Garg and Byeong Kang and Muhammad Bilal Amin and Junmin Lee and Shiping Chen and Xiwei Xu Towards Interconnected Blockchains: a Comprehensive Review of the Role of Interoperability among Disparate Blockchains . . . . . . . . . . . . . . 135:1--135:39 Lefeng Zhang and Tianqing Zhu and Ping Xiong and Wanlei Zhou and Philip S. Yu More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design . . . . . . . . . . . . . . . . . 136:1--136:37 Michael Braun and Florian Weber and Florian Alt Affective Automotive User Interfaces-Reviewing the State of Driver Affect Research and Emotion Regulation in the Car . . . . . . . . . . . . . . . 137:1--137:26 Sophie Dramé-Maigné and Maryline Laurent and Laurent Castillo and Hervé Ganem Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the IoT . . . . . . . . . 138:1--138:34 Yuantian Miao and Chao Chen and Lei Pan and Qing-Long Han and Jun Zhang and Yang Xiang Machine Learning-based Cyber Attacks Targeting on Controlled Information: a Survey . . . . . . . . . . . . . . . . . 139:1--139:36 Luciano Ignaczak and Guilherme Goldschmidt and Cristiano André Da Costa and Rodrigo Da Rosa Righi Text Mining in Cybersecurity: a Systematic Literature Review . . . . . . 140:1--140:36 Tharindu Fernando and Harshala Gammulle and Simon Denman and Sridha Sridharan and Clinton Fookes Deep Learning for Medical Anomaly Detection --- a Survey . . . . . . . . . 141:1--141:37 Salonik Resch and Ulya R. Karpuzcu Benchmarking Quantum Computers and the Impact of Quantum Noise . . . . . . . . 142:1--142:35 Hugo B. Lima and Carlos G. R. Dos Santos and Bianchi S. Meiguins A Survey of Music Visualization Techniques . . . . . . . . . . . . . . . 143:1--143:29 Yohan Bonescki Gumiel and Lucas Emanuel Silva e Oliveira and Vincent Claveau and Natalia Grabar and Emerson Cabrera Paraiso and Claudia Moro and Deborah Ribeiro Carvalho Temporal Relation Extraction in Clinical Texts: a Systematic Review . . . . . . . 144:1--144:36 Uttam Chauhan and Apurva Shah Topic Modeling Using Latent Dirichlet allocation: a Survey . . . . . . . . . . 145:1--145:35 Lynda Tamine and Lorraine Goeuriot Semantic Information Retrieval on Medical Texts: Research Challenges, Survey, and Open Issues . . . . . . . . 146:1--146:38 Christian Berger and Philipp Eichhammer and Hans P. Reiser and Jörg Domaschka and Franz J. Hauck and Gerhard Habiger A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms . . . . . . . . 147:1--147:39 Palina Tolmach and Yi Li and Shang-Wei Lin and Yang Liu and Zengxiang Li A Survey of Smart Contract Formal Specification and Verification . . . . . 148:1--148:38 Jihyeok Park and Hongki Lee and Sukyoung Ryu A Survey of Parametric Static Analysis 149:1--149:37 Douglas Paulo De Mattos and Débora C. Muchaluat-Saade and Gheorghita Ghinea Beyond Multimedia Authoring: On the Need for Mulsemedia Authoring Tools . . . . . 150:1--150:31 Jie Zhang and Zhihao Qu and Chenxi Chen and Haozhao Wang and Yufeng Zhan and Baoliu Ye and Song Guo Edge Learning: The Enabling Technology for Distributed Big Data Analytics in the Edge . . . . . . . . . . . . . . . . 151:1--151:36 Alexandro Baldassin and João Barreto and Daniel Castro and Paolo Romano Persistent Memory: a Survey of Programming Support and Implementations 152:1--152:37 Julio Juárez and Cipriano (Pano) Santos and Carlos A. Brizuela A Comprehensive Review and a Taxonomy Proposal of Team Formation Problems . . 153:1--153:33 Shoujin Wang and Longbing Cao and Yan Wang and Quan Z. Sheng and Mehmet A. Orgun and Defu Lian A Survey on Session-based Recommender Systems . . . . . . . . . . . . . . . . 154:1--154:38 Nathan Magrofuoco and Paolo Roselli and Jean Vanderdonckt Two-dimensional Stroke Gesture Recognition: a Survey . . . . . . . . . 155:1--155:36 Djalel Chefrour One-Way Delay Measurement From Traditional Networks to SDN: a Survey 156:1--156:35
Abdul Jabbar and Xi Li and Bourahla Omar A Survey on Generative Adversarial Networks: Variants, Applications, and Training . . . . . . . . . . . . . . . . 157:1--157:49 Jianguo Chen and Kenli Li and Zhaolei Zhang and Keqin Li and Philip S. Yu A Survey on Applications of Artificial Intelligence in Fighting Against COVID-19 . . . . . . . . . . . . . . . . 158:1--158:32 Xingwei Zhang and Xiaolong Zheng and Wenji Mao Adversarial Perturbation Defense on Deep Neural Networks . . . . . . . . . . . . 159:1--159:36 Jinglin Zou and Debiao He and Sherali Zeadally and Neeraj Kumar and Huaqun Wang and Kkwang Raymond Choo Integrated Blockchain and Cloud Computing Systems: a Systematic Survey, Solutions, and Challenges . . . . . . . 160:1--160:36 Akbar Telikani and Amirhessam Tahmassebi and Wolfgang Banzhaf and Amir H. Gandomi Evolutionary Machine Learning: a Survey 161:1--161:35 Weijia Zhang and Jiuyong Li and Lin Liu A Unified Survey of Treatment Effect Heterogeneity Modelling and Uplift Modelling . . . . . . . . . . . . . . . 162:1--162:36 Vinicius Souza and Anderson Maciel and Luciana Nedel and Regis Kopper Measuring Presence in Virtual Environments: a Survey . . . . . . . . . 163:1--163:37 Gopika Ajaykumar and Maureen Steele and Chien-Ming Huang A Survey on End-User Robot Programming 164:1--164:36 Lik-Hang Lee and Tristan Braud and Simo Hosio and Pan Hui Towards Augmented Reality Driven Human-City Interaction: Current Research on Mobile Headsets and Future Challenges 165:1--165:38 Satyaki Roy and Preetam Ghosh and Nirnay Ghosh and Sajal K. Das Transcriptional Regulatory Network Topology with Applications to Bio-inspired Networking: a Survey . . . 166:1--166:36 Haiman Tian and Maria Presa-Reyes and Yudong Tao and Tianyi Wang and Samira Pouyanfar and Alonso Miguel and Steven Luis and Mei-Ling Shyu and Shu-Ching Chen and Sundaraja Sitharama Iyengar Data Analytics for Air Travel Data: a Survey and New Perspectives . . . . . . 167:1--167:35 Rafael Belchior and André Vasconcelos and Sérgio Guerreiro and Miguel Correia A Survey on Blockchain Interoperability: Past, Present, and Future Trends . . . . 168:1--168:41 Royson Lee and Stylianos I. Venieris and Nicholas D. Lane Deep Neural Network-based Enhancement for Image and Video Streaming Systems: a Survey and Future Directions . . . . . . 169:1--169:30 M. G. Sarwar Murshed and Christopher Murphy and Daqing Hou and Nazar Khan and Ganesh Ananthanarayanan and Faraz Hussain Machine Learning at the Network Edge: a Survey . . . . . . . . . . . . . . . . . 170:1--170:37 Maxime Lamothe and Yann-Gaël Guéhéneuc and Weiyi Shang A Systematic Review of API Evolution Literature . . . . . . . . . . . . . . . 171:1--171:36 Jessica McBroom and Irena Koprinska and Kalina Yacef A Survey of Automated Programming Hint Generation: The HINTS Framework . . . . 172:1--172:27 Giuseppe Desolda and Lauren S. Ferro and Andrea Marrella and Tiziana Catarci and Maria Francesca Costabile Human Factors in Phishing Attacks: a Systematic Literature Review . . . . . . 173:1--173:35 Ye Tian and Langchun Si and Xingyi Zhang and Ran Cheng and Cheng He and Kay Chen Tan and Yaochu Jin Evolutionary Large-Scale Multi-Objective Optimization: a Survey . . . . . . . . . 174:1--174:34 Shubhra Kanti Karmaker (``Santu'') and Md. Mahadi Hassan and Micah J. Smith and Lei Xu and Chengxiang Zhai and Kalyan Veeramachaneni AutoML to Date and Beyond: Challenges and Opportunities . . . . . . . . . . . 175:1--175:36 Alexandre H. T. Dias and Luiz. H. A. Correia and Neumar Malheiros A Systematic Literature Review on Virtual Machine Consolidation . . . . . 176:1--176:38 Fuqiang Gu and Mu-Huan Chung and Mark Chignell and Shahrokh Valaee and Baoding Zhou and Xue Liu A Survey on Deep Learning for Human Activity Recognition . . . . . . . . . . 177:1--177:34
Konstantinos Arakadakis and Pavlos Charalampidis and Antonis Makrogiannakis and Alexandros Fragkiadakis Firmware Over-the-air Programming Techniques for IoT Networks --- A Survey 178:1--178:36 Lázaro Bustio-Martínez and René Cumplido and Martín Letras and Raudel Hernández-León and Claudia Feregrino-Uribe and José Hernández-Palancar FPGA/GPU-based Acceleration for Frequent Itemsets Mining: a Comprehensive Review 179:1--179:35 Pengzhen Ren and Yun Xiao and Xiaojun Chang and Po-Yao Huang and Zhihui Li and Brij B. Gupta and Xiaojiang Chen and Xin Wang A Survey of Deep Active Learning . . . . 180:1--180:40 Efstratios Kakaletsis and Charalampos Symeonidis and Maria Tzelepi and Ioannis Mademlis and Anastasios Tefas and Nikos Nikolaidis and Ioannis Pitas Computer Vision for Autonomous UAV Flight Safety: an Overview and a Vision-based Safe Landing Pipeline Example . . . . . . . . . . . . . . . . 181:1--181:37 Dylan Chou and Meng Jiang A Survey on Data-driven Network Intrusion Detection . . . . . . . . . . 182:1--182:36 Lingxi Xie and Xin Chen and Kaifeng Bi and Longhui Wei and Yuhui Xu and Lanfei Wang and Zhengsu Chen and An Xiao and Jianlong Chang and Xiaopeng Zhang and Qi Tian Weight-Sharing Neural Architecture Search: a Battle to Shrink the Optimization Gap . . . . . . . . . . . . 183:1--183:37 Carlos Bermejo and Pan Hui A Survey on Haptic Technologies for Mobile Augmented Reality . . . . . . . . 184:1--184:35 Ismaeel Al Ridhawi and Ouns Bouachir and Moayad Aloqaily and Azzedine Boukerche Design Guidelines for Cooperative UAV-supported Services and Applications 185:1--185:35 Pasika Ranaweera and Anca Jurcut and Madhusanka Liyanage MEC-enabled 5G Use Cases: a Survey on Security Vulnerabilities and Countermeasures . . . . . . . . . . . . 186:1--186:37 Xiongkuo Min and Ke Gu and Guangtao Zhai and Xiaokang Yang and Wenjun Zhang and Patrick Le Callet and Chang Wen Chen Screen Content Quality Assessment: Overview, Benchmark, and Beyond . . . . 187:1--187:36 Frank Siqueira and Joseph G. Davis Service Computing for Industry 4.0: State of the Art, Challenges, and Research Opportunities . . . . . . . . . 188:1--188:38 Denise Maria Vecino Sato and Sheila Cristiana De Freitas and Jean Paul Barddal and Edson Emilio Scalabrin A Survey on Concept Drift in Process Mining . . . . . . . . . . . . . . . . . 189:1--189:38 Bing Zhang and Jingyue Li and Jiadong Ren and Guoyan Huang Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: a Review . . . . . . . . . . 190:1--190:35 Sergi Abadal and Akshay Jain and Robert Guirado and Jorge López-Alonso and Eduard Alarcón Computing Graph Neural Networks: a Survey from Algorithms to Accelerators 191:1--191:38 Meriem Guerar and Luca Verderame and Mauro Migliardi and Francesco Palmieri and Alessio Merlo Gotta CAPTCHA 'Em All: a Survey of 20 Years of the Human-or-computer Dilemma 192:1--192:33 José Mena and Oriol Pujol and Jordi Vitri\`a A Survey on Uncertainty Estimation in Deep Learning Classification Systems from a Bayesian Perspective . . . . . . 193:1--193:35 Josef Schmid and Alfred Höss and Björn W. Schuller A Survey on Client Throughput Prediction Algorithms in Wired and Wireless Networks . . . . . . . . . . . . . . . . 194:1--194:33 Asma Aloufi and Peizhao Hu and Yongsoo Song and Kristin Lauter Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: a Survey . . . . . . . . . . . . . 195:1--195:37 Chao Liu and Xin Xia and David Lo and Cuiyun Gao and Xiaohu Yang and John Grundy Opportunities and Challenges in Code Search Tools . . . . . . . . . . . . . . 196:1--196:40 Timothy McIntosh and A. S. M. Kayes and Yi-Ping Phoebe Chen and Alex Ng and Paul Watters Ransomware Mitigation in the Modern Era: a Comprehensive Review, Research Challenges, and Future Directions . . . 197:1--197:36 René Mayrhofer and Stephan Sigg Adversary Models for Mobile Device Authentication . . . . . . . . . . . . . 198:1--198:35 Gábor E. Gévay and Juan Soto and Volker Markl Handling Iterations in Distributed Dataflow Systems . . . . . . . . . . . . 199:1--199:38
Salman Khan and Muzammal Naseer and Munawar Hayat and Syed Waqas Zamir and Fahad Shahbaz Khan and Mubarak Shah Transformers in Vision: a Survey . . . . 200:1--200:?? Géraldin Nanfack and Paul Temple and Beno\^\it Frénay Constraint Enforcement on Decision Trees: a Survey . . . . . . . . . . . . 201:1--201:?? Nhu-Ngoc Dao and Anh-Tien Tran and Ngo Hoang Tu and Tran Thien Thanh and Vo Nguyen Quoc Bao and Sungrae Cho A Contemporary Survey on Live Video Streaming from a Computation-Driven Perspective . . . . . . . . . . . . . . 202:1--202:?? Pablo Messina and Pablo Pino and Denis Parra and Alvaro Soto and Cecilia Besa and Sergio Uribe and Marcelo And\'ìa and Cristian Tejos and Claudia Prieto and Daniel Capurro A Survey on Deep Learning and Explainability for Automatic Report Generation from Medical Images . . . . . 203:1--203:?? Ross Gruetzemacher and David Paradice Deep Transfer Learning & Beyond: Transformer Language Models in Information Systems Research . . . . . . 204:1--204:?? Isaac Ronald Ward and Jack Joyner and Casey Lickfold and Yulan Guo and Mohammed Bennamoun A Practical Tutorial on Graph Neural Networks . . . . . . . . . . . . . . . . 205:1--205:?? Yanming Yang and Xin Xia and David Lo and John Grundy A Survey on Deep Learning for Software Engineering . . . . . . . . . . . . . . 206:1--206:?? Ying Zhao and Jinjun Chen A Survey on Differential Privacy for Unstructured Data Content . . . . . . . 207:1--207:?? Ms. Aayushi Bansal and Dr. Rewa Sharma and Dr. Mamta Kathuria A Systematic Review on Data Scarcity Problem in Deep Learning: Solution and Applications . . . . . . . . . . . . . . 208:1--208:?? Xin Wang and Sisi Duan and James Clavin and Haibin Zhang BFT in Blockchains: From Protocols to Use Cases . . . . . . . . . . . . . . . 209:1--209:?? Torsten Schlett and Christian Rathgeb and Olaf Henniger and Javier Galbally and Julian Fierrez and Christoph Busch Face Image Quality Assessment: a Literature Survey . . . . . . . . . . . 210:1--210:?? Vijay Kumar Yadav and Nitish Andola and Shekhar Verma and S. Venkatesan A Survey of Oblivious Transfer Protocol 211:1--211:?? Hang Du and Hailin Shi and Dan Zeng and Xiao-Ping Zhang and Tao Mei The Elements of End-to-end Deep Face Recognition: a Survey of Recent Advances 212:1--212:?? Claudio Filipi Gonçalves Dos Santos and João Paulo Papa Avoiding Overfitting: a Survey on Regularization Methods for Convolutional Neural Networks . . . . . . . . . . . . 213:1--213:?? Misael C. Júnior and Domenico Amalfitano and Lina Garcés and Anna Rita Fasolino and Stevão A. Andrade and Márcio Delamaro Dynamic Testing Techniques of Non-functional Requirements in Mobile Apps: a Systematic Mapping Study . . . . 214:1--214:?? Rob Churchill and Lisa Singh The Evolution of Topic Modeling . . . . 215:1--215:?? Daniel Martin and Sandra Malpica and Diego Gutierrez and Belen Masia and Ana Serrano Multimodality in VR: a Survey . . . . . 216:1--216:?? Zhiheng Zhong and Minxian Xu and Maria Alejandra Rodriguez and Chengzhong Xu and Rajkumar Buyya Machine Learning-based Orchestration of Containers: a Taxonomy and Future Directions . . . . . . . . . . . . . . . 217:1--217:?? Farkhanda Zafar and Hasan Ali Khattak and Moayad Aloqaily and Rasheed Hussain Carpooling in Connected and Autonomous Vehicles: Current Solutions and Future Directions . . . . . . . . . . . . . . . 218:1--218:?? Md Mahbub Alam and Luis Torgo and Albert Bifet A Survey on Spatio-temporal Data Analytics Systems . . . . . . . . . . . 219:1--219:?? Zijun Li and Linsong Guo and Jiagan Cheng and Quan Chen and Bingsheng He and Minyi Guo The Serverless Computing Survey: a Technical Primer for Design Architecture 220:1--220:?? Peng Liu and Lizhe Wang and Rajiv Ranjan and Guojin He and Lei Zhao A Survey on Active Deep Learning: From Model Driven to Data Driven . . . . . . 221:1--221:??
Anupama Mampage and Shanika Karunasekera and Rajkumar Buyya A Holistic View on Resource Management in Serverless Computing Environments: Taxonomy and Future Directions . . . . . 222:1--222:?? Pablo Sánchez and Alejandro Bellogín Point-of-Interest Recommender Systems Based on Location-Based Social Networks: a Survey from an Experimental Perspective . . . . . . . . . . . . . . 223:1--223:?? Paula Delgado-Santos and Giuseppe Stragapede and Ruben Tolosana and Richard Guest and Farzin Deravi and Ruben Vera-Rodriguez A Survey of Privacy Vulnerabilities of Mobile Device Sensors . . . . . . . . . 224:1--224:?? Hasini Witharana and Yangdi Lyu and Subodha Charles and Prabhat Mishra A Survey on Assertion-based Hardware Verification . . . . . . . . . . . . . . 225:1--225:?? Fabian Fagerholm and Michael Felderer and Davide Fucci and Michael Unterkalmsteiner and Bogdan Marculescu and Markus Martini and Lars Göran Wallgren Tengberg and Robert Feldt and Bettina Lehtelä and Balázs Nagyváradi and Jehan Khattak Cognition in Software Engineering: a Taxonomy and Survey of a Half-Century of Research . . . . . . . . . . . . . . . . 226:1--226:?? Wenhao Yu and Chenguang Zhu and Zaitang Li and Zhiting Hu and Qingyun Wang and Heng Ji and Meng Jiang A Survey of Knowledge-enhanced Text Generation . . . . . . . . . . . . . . . 227:1--227:?? Harindu Korala and Dimitrios Georgakopoulos and Prem Prakash Jayaraman and Ali Yavari A Survey of Techniques for Fulfilling the Time-Bound Requirements of Time-Sensitive IoT Applications . . . . 228:1--228:?? Hakan Kayan and Matthew Nunes and Omer Rana and Pete Burnap and Charith Perera Cybersecurity of Industrial Cyber-Physical Systems: a Review . . . . 229:1--229:?? Xiaogang Zhu and Sheng Wen and Seyit Camtepe and Yang Xiang Fuzzing: a Survey for Roadmap . . . . . 230:1--230:?? Jakub \vZádn\'ìk and Markku Mäkitalo and Jarno Vanne and Pekka Jääskeläinen Image and Video Coding Techniques for Ultra-low Latency . . . . . . . . . . . 231:1--231:?? Anirudh Chandramouli and Ashish Choudhury and Arpita Patra A Survey on Perfectly Secure Verifiable Secret-sharing . . . . . . . . . . . . . 232:1--232:?? Bushra Jamil and Humaira Ijaz and Mohammad Shojafar and Kashif Munir and Rajkumar Buyya Resource Allocation and Task Scheduling in Fog Computing and Internet of Everything Environments: a Taxonomy, Review, and Future Directions . . . . . 233:1--233:?? Ajay Mittal and Sabrina Dhalla and Savita Gupta and Aastha Gupta Automated Analysis of Blood Smear Images for Leukemia Detection: a Comprehensive Review . . . . . . . . . . . . . . . . . 234:1--234:?? Hongsheng Hu and Zoran Salcic and Lichao Sun and Gillian Dobbie and Philip S. Yu and Xuyun Zhang Membership Inference Attacks on Machine Learning: a Survey . . . . . . . . . . . 235:1--235:?? Rajeev Muralidhar and Renata Borovica-Gajic and Rajkumar Buyya Energy Efficient Computing Systems: Architectures, Abstractions and Modeling to Techniques and Standards . . . . . . 236:1--236:?? Valeria Cardellini and Francesco Lo Presti and Matteo Nardelli and Gabriele Russo Russo Runtime Adaptation of Data Stream Processing Systems: The State of the Art 237:1--237:?? Harun Oz and Ahmet Aris and Albert Levi and A. Selcuk Uluagac A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions . . . . 238:1--238:?? Hossein Shafiei and Ahmad Khonsari and Payam Mousavi Serverless Computing: a Survey of Opportunities, Challenges, and Applications . . . . . . . . . . . . . . 239:1--239:?? Sabah Suhail and Rasheed Hussain and Raja Jurdak and Alma Oracevic and Khaled Salah and Choong Seon Hong and Raimundas Matulevi\vcius Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges 240:1--240:?? Matheus A. O. Ribeiro and Fátima L. S. Nunes Left Ventricle Segmentation in Cardiac MR: a Systematic Mapping of the Past Decade . . . . . . . . . . . . . . . . . 241:1--241:?? Simone Antonelli and Danilo Avola and Luigi Cinque and Donato Crisostomi and Gian Luca Foresti and Fabio Galasso and Marco Raoul Marini and Alessio Mecca and Daniele Pannone Few-Shot Object Detection: a Survey . . 242:1--242:?? Shengmei Liu and Xiaokun Xu and Mark Claypool A Survey and Taxonomy of Latency Compensation Techniques for Network Computer Games . . . . . . . . . . . . . 243:1--243:??
Shuren Qi and Yushu Zhang and Chao Wang and Jiantao Zhou and Xiaochun Cao A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation . . . . . . . . . . . . . 1:1--1:?? Kinza Sarwar and Sira Yongchareon and Jian Yu and Saeed Ur Rehman A Survey on Privacy Preservation in Fog-Enabled Internet of Things . . . . . 2:1--2:?? Fabrizio Cicala and Weicheng Wang and Tianhao Wang and Ninghui Li and Elisa Bertino and Faming Liang and Yang Yang PURE: a Framework for Analyzing Proximity-based Contact Tracing Protocols . . . . . . . . . . . . . . . 3:1--3:?? Rodolfo Meneguette and Robson De Grande and Jo Ueyama and Geraldo P. Rocha Filho and Edmundo Madeira Vehicular Edge Computing: Architecture, Resource Management, Security, and Challenges . . . . . . . . . . . . . . . 4:1--4:?? Chao Yu and Jiming Liu and Shamim Nemati and Guosheng Yin Reinforcement Learning in Healthcare: a Survey . . . . . . . . . . . . . . . . . 5:1--5:?? Fan Xu and Victor S. Sheng and Mingwen Wang A Unified Perspective for Disinformation Detection and Truth Discovery in Social Sensing: a Survey . . . . . . . . . . . 6:1--6:?? Massimiliano Luca and Gianni Barlacchi and Bruno Lepri and Luca Pappalardo A Survey on Deep Learning for Human Mobility . . . . . . . . . . . . . . . . 7:1--7:?? Gabriel Resende Machado and Eugênio Silva and Ronaldo Ribeiro Goldschmidt Adversarial Machine Learning in Image Classification: a Survey Toward the Defender's Perspective . . . . . . . . . 8:1--8:?? Abhishek Hazra and Mainak Adhikari and Tarachand Amgoth and Satish Narayana Srirama A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions . . . . 9:1--9:?? Claudio D. T. Barros and Matheus R. F. Mendonça and Alex B. Vieira and Artur Ziviani A Survey on Embedding Dynamic Graphs . . 10:1--10:?? Viktor Rosenfeld and Sebastian Breß and Volker Markl Query Processing on Heterogeneous CPU/GPU Systems . . . . . . . . . . . . 11:1--11:?? Giannis Bekoulis and Christina Papagiannopoulou and Nikos Deligiannis A Review on Fact Extraction and Verification . . . . . . . . . . . . . . 12:1--12:?? Junjun Jiang and Chenyang Wang and Xianming Liu and Jiayi Ma Deep Learning-based Face Super-resolution: a Survey . . . . . . . 13:1--13:?? Wenbo Ge and Pooia Lalbakhsh and Leigh Isai and Artem Lenskiy and Hanna Suominen Neural Network-Based Financial Volatility Forecasting: a Systematic Review . . . . . . . . . . . . . . . . . 14:1--14:?? Deqiang Li and Qianmu Li and Yanfang (Fanny) Ye and Shouhuai Xu Arms Race in Adversarial Malware Detection: a Survey . . . . . . . . . . 15:1--15:?? Roberto Amadini A Survey on String Constraint Solving 16:1--16:?? Christopher Brant and Prakash Shrestha and Benjamin Mixon-Baca and Kejun Chen and Said Varlioglu and Nelly Elsayed and Yier Jin and Jedidiah Crandall and Daniela Oliveira Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking . . . . . . . 17:1--17:?? Alison Fernandez Blanco and Alexandre Bergel and Juan Pablo Sandoval Alcocer Software Visualizations to Analyze Memory Consumption: a Literature Review 18:1--18:?? Saed Alrabaee and Mourad Debbabi and Lingyu Wang A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features . . . . . . . . . . . . . . . . 19:1--19:?? Yupeng Hu and Wenxin Kuang and Zheng Qin and Kenli Li and Jiliang Zhang and Yansong Gao and Wenjia Li and Keqin Li Artificial Intelligence Security: Threats and Countermeasures . . . . . . 20:1--20:?? Alessio Rugo and Claudio A. Ardagna and Nabil El Ioini A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis . . . . . . . . . . . . . . . . 21:1--21:?? Huacheng Li and Chunhe Xia and Tianbo Wang and Sheng Wen and Chao Chen and Yang Xiang Capturing Dynamics of Information Diffusion in SNS: a Survey of Methodology and Techniques . . . . . . . 22:1--22:?? Thanh Tuan Nguyen and Thanh Phuong Nguyen A Comprehensive Taxonomy of Dynamic Texture Representation . . . . . . . . . 23:1--23:??
Federico Ciccozzi and Lorenzo Addazi and Sara Abbaspour Asadollah and Björn Lisper and Abu Naser Masud and Saad Mubeen A Comprehensive Exploration of Languages for Parallel Computing . . . . . . . . . 24:1--24:?? Zhao-Rong Lai and Haisheng Yang A Survey on Gaps between Mean-Variance Approach and Exponential Growth Rate Approach for Portfolio Optimization . . 25:1--25:?? Ananya B. Sai and Akash Kumar Mohankumar and Mitesh M. Khapra A Survey of Evaluation Metrics Used for NLG Systems . . . . . . . . . . . . . . 26:1--26:?? Manzoor Ahmed Khan and Hesham El Sayed and Sumbal Malik and Talha Zia and Jalal Khan and Najla Alkaabi and Henry Ignatious Level-5 Autonomous Driving-Are We There Yet? A Review of Research Literature . . 27:1--27:?? Oluwamayowa Ade Adeleke and Nicholas Bastin and Deniz Gurkan Network Traffic Generation: a Survey and Methodology . . . . . . . . . . . . . . 28:1--28:?? Breno Costa and Joao Bachiega and Leonardo Rebouças de Carvalho and Aleteia P. F. Araujo Orchestration in Fog Computing: a Comprehensive Survey . . . . . . . . . . 29:1--29:?? Nuha Aldausari and Arcot Sowmya and Nadine Marcus and Gelareh Mohammadi Video Generative Adversarial Networks: a Review . . . . . . . . . . . . . . . . . 30:1--30:?? Libing Deng and Guoqi Xie and Hong Liu and Yunbo Han and Renfa Li and Keqin Li A Survey of Real-Time Ethernet Modeling and Design Methodologies: From AVB to TSN . . . . . . . . . . . . . . . . . . 31:1--31:?? Omar Hasan and Lionel Brunie and Elisa Bertino Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: a Survey 32:1--32:?? Tabinda Sarwar and Sattar Seifollahi and Jeffrey Chan and Xiuzhen Zhang and Vural Aksakalli and Irene Hudson and Karin Verspoor and Lawrence Cavedon The Secondary Use of Electronic Health Records for Data Mining: Data Characteristics and Challenges . . . . . 33:1--33:?? Claudio Filipi Gonçalves dos Santos and Diego de Souza Oliveira and Leandro A. Passos and Rafael Gonçalves Pires and Daniel Felipe Silva Santos and Lucas Pascotti Valem and Thierry P. Moreira and Marcos Cleison S. Santana and Mateus Roder and Jo Paulo Papa and Danilo Colombo Gait Recognition Based on Deep Learning: a Survey . . . . . . . . . . . . . . . . 34:1--34:?? Qiao Jin and Zheng Yuan and Guangzhi Xiong and Qianlan Yu and Huaiyuan Ying and Chuanqi Tan and Mosha Chen and Songfang Huang and Xiaozhong Liu and Sheng Yu Biomedical Question Answering: a Survey of Approaches and Challenges . . . . . . 35:1--35:?? Yiqun Xie and Shashi Shekhar and Yan Li Statistically-Robust Clustering Techniques for Mapping Spatial Hotspots: a Survey . . . . . . . . . . . . . . . . 36:1--36:?? J. Alemany and E. Del Val and A. García-Fornes A Review of Privacy Decision-making Mechanisms in Online Social Networks . . 37:1--37:?? Jingya Zhou and Ling Liu and Wenqi Wei and Jianxi Fan Network Representation Learning: From Preprocessing, Feature Extraction to Node Embedding . . . . . . . . . . . . . 38:1--38:?? Davinder Kaur and Suleyman Uslu and Kaley J. Rittichier and Arjan Durresi Trustworthy Artificial Intelligence: a Review . . . . . . . . . . . . . . . . . 39:1--39:?? Conor Fahy and Shengxiang Yang and Mario Gongora Scarcity of Labels in Non-Stationary Data Streams: a Survey . . . . . . . . . 40:1--40:?? José Marcelo Fernandes and Jorge Sá Silva and André Rodrigues and Fernando Boavida A Survey of Approaches to Unobtrusive Sensing of Humans . . . . . . . . . . . 41:1--41:?? David Rolnick and Priya L. Donti and Lynn H. Kaack and Kelly Kochanski and Alexandre Lacoste and Kris Sankaran and Andrew Slavin Ross and Nikola Milojevic-Dupont and Natasha Jaques and Anna Waldman-Brown and Alexandra Sasha Luccioni and Tegan Maharaj and Evan D. Sherwin and S. Karthik Mukkavilli and Konrad P. Kording and Carla P. Gomes and Andrew Y. Ng and Demis Hassabis and John C. Platt and Felix Creutzig and Jennifer Chayes and Yoshua Bengio Tackling Climate Change with Machine Learning . . . . . . . . . . . . . . . . 42:1--42:?? Shallu Sharma and Pravat Kumar Mandal A Comprehensive Report on Machine Learning-based Early Detection of Alzheimer's Disease using Multi-modal Neuroimaging Data . . . . . . . . . . . 43:1--43:?? Ankur O. Bang and Udai Pratap Rao and Pallavi Kaliyar and Mauro Conti Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: a Survey . . . . . . . . . . . 44:1--44:??
Sanjay Kumar Anand and Suresh Kumar Experimental Comparisons of Clustering Approaches for Data Representation . . . 45:1--45:?? Tasniem Nasser Alyahya and Mohamed El Bachir Menai and Hassan Mathkour On the Structure of the Boolean Satisfiability Problem: a Survey . . . . 46:1--46:?? Marcos Roberto e Souza and Helena de Almeida Maia and Helio Pedrini Survey on Digital Video Stabilization: Concepts, Methods, and Challenges . . . 47:1--47:?? Tukaram Muske and Alexander Serebrenik Survey of Approaches for Postprocessing of Static Analysis Alarms . . . . . . . 48:1--48:?? Danula Hettiachchi and Vassilis Kostakos and Jorge Goncalves A Survey on Task Assignment in Crowdsourcing . . . . . . . . . . . . . 49:1--49:?? Raj Mohan Singh and Lalit Kumar Awasthi and Geeta Sikka Towards Metaheuristic Scheduling Techniques in Cloud and Fog: an Extensive Taxonomic Review . . . . . . . 50:1--50:?? Dana Pessach and Erez Shmueli A Review on Fairness in Machine Learning 51:1--51:?? Chenning Li and Zhichao Cao LoRa Networking Techniques for Large-scale and Long-term IoT: a Down-to-top Survey . . . . . . . . . . . 52:1--52:?? Alexander Plopski and Teresa Hirzle and Nahal Norouzi and Long Qian and Gerd Bruder and Tobias Langlotz The Eye in Extended Reality: a Survey on Gaze Interaction and Eye Tracking in Head-worn Extended Reality . . . . . . . 53:1--53:?? Nan Wu and Yuan Xie A Survey of Machine Learning for Computer Architecture and Systems . . . 54:1--54:?? Thomas Reisinger and Isabel Wagner and Eerke Albert Boiten Security and Privacy in Unified Communication . . . . . . . . . . . . . 55:1--55:?? Ruiqi Li and Xiang Zhao and Marie-Francine Moens A Brief Overview of Universal Sentence Representation Methods: a Linguistic View . . . . . . . . . . . . . . . . . . 56:1--56:?? Huan Li and Hua Lu and Christian S. Jensen and Bo Tang and Muhammad Aamir Cheema Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects . . . . . . . . . . . . . . . 57:1--57:?? Dina G. Mahmoud and Vincent Lenders and Mirjana Stojilovi\'c Electrical-Level Attacks on CPUs, FPGAs, and GPUs: Survey and Implications in the Heterogeneous Era . . . . . . . . . . . 58:1--58:?? Jacopo Soldani and Antonio Brogi Anomaly Detection and Failure Root Cause Analysis in (Micro) Service-Based Cloud Applications: a Survey . . . . . . . . . 59:1--59:?? Dinh C. Nguyen and Quoc-Viet Pham and Pubudu N. Pathirana and Ming Ding and Aruna Seneviratne and Zihuai Lin and Octavia Dobre and Won-Joo Hwang Federated Learning for Smart Healthcare: a Survey . . . . . . . . . . . . . . . . 60:1--60:?? Anna Berenberg and Brad Calder Deployment Archetypes for Cloud Applications . . . . . . . . . . . . . . 61:1--61:?? Voica Gavrilut and Aleksander Pruski and Michael Stübert Berger Constructive or Optimized: an Overview of Strategies to Design Networks for Time-Critical Applications . . . . . . . 62:1--62:?? Susanne Barth and Dan Ionita and Pieter Hartel Understanding Online Privacy --- a Systematic Review of Privacy Visualizations and Privacy by Design Guidelines . . . . . . . . . . . . . . . 63:1--63:?? Longbing Cao AI in Finance: Challenges, Techniques, and Opportunities . . . . . . . . . . . 64:1--64:??
Gianni Brauwers and Flavius Frasincar A Survey on Aspect-Based Sentiment Classification . . . . . . . . . . . . . 65:1--65:?? Jared Willard and Xiaowei Jia and Shaoming Xu and Michael Steinbach and Vipin Kumar Integrating Scientific Knowledge with Machine Learning for Engineering and Environmental Systems . . . . . . . . . 66:1--66:?? Daniel S. Santos and Brauner R. N. Oliveira and Rick Kazman and Elisa Y. Nakagawa Evaluation of Systems-of-Systems Software Architectures: State of the Art and Future Perspectives . . . . . . . . 67:1--67:?? Thiago L. T. da Silveira and Paulo G. L. Pinto and Jeffri Murrugarra-Llerena and Cláudio R. Jung $3$D Scene Geometry Estimation from 360${}^\circ $ Imagery: a Survey . . . . 68:1--68:?? Alessio Ferrari and Maurice H. Ter Beek Formal Methods in Railways: a Systematic Mapping Study . . . . . . . . . . . . . 69:1--69:?? Youyang Qu and Md Palash Uddin and Chenquan Gan and Yong Xiang and Longxiang Gao and John Yearwood Blockchain-enabled Federated Learning: a Survey . . . . . . . . . . . . . . . . . 70:1--70:?? Marios Evangelos Kanakis and Ramin Khalili and Lin Wang Machine Learning for Computer Systems and Networking: a Survey . . . . . . . . 71:1--71:?? Javier Troya and Sergio Segura and Lola Burgueño and Manuel Wimmer Model Transformation Testing and Debugging: a Survey . . . . . . . . . . 72:1--72:?? Arif Husen and Muhammad Hasanain Chaudary and Farooq Ahmad A Survey on Requirements of Future Intelligent Networks: Solutions and Future Research Directions . . . . . . . 73:1--73:?? Yingan Cui and Xue Li and Junhuai Li and Huaijun Wang and Xiaogang Chen A Survey of Sampling Method for Social Media Embeddedness Relationship . . . . 74:1--74:?? Heitor Murilo Gomes and Maciej Grzenda and Rodrigo Mello and Jesse Read and Minh Huong Le Nguyen and Albert Bifet A Survey on Semi-supervised Learning for Delayed Partially Labelled Data Streams 75:1--75:?? Shouyong Jiang and Juan Zou and Shengxiang Yang and Xin Yao Evolutionary Dynamic Multi-objective Optimisation: a Survey . . . . . . . . . 76:1--76:?? Rabindra Lamsal and Aaron Harwood and Maria Rodriguez Read Socially Enhanced Situation Awareness from Microblogs Using Artificial Intelligence: a Survey . . . . . . . . . 77:1--77:?? Krishna Teja Chitty-Venkata and Arun K. Somani Neural Architecture Search Survey: a Hardware Perspective . . . . . . . . . . 78:1--78:?? Xiang Li and Yazhou Zhang and Prayag Tiwari and Dawei Song and Bin Hu and Meihong Yang and Zhigang Zhao and Neeraj Kumar and Pekka Marttinen EEG Based Emotion Recognition: a Tutorial and Review . . . . . . . . . . 79:1--79:?? Wu Liu and Qian Bao and Yu Sun and Tao Mei Recent Advances of Monocular $2$D and $3$D Human Pose Estimation: a Deep Learning Perspective . . . . . . . . . . 80:1--80:?? Zhaoxin Fan and Yazhi Zhu and Yulin He and Qi Sun and Hongyan Liu and Jun He Deep Learning on Monocular Object Pose Detection and Tracking: a Comprehensive Overview . . . . . . . . . . . . . . . . 81:1--81:?? Matthew J. Vowels and Necati Cihan Camgoz and Richard Bowden D'ya Like DAGs? A Survey on Structure Learning and Causal Discovery . . . . . 82:1--82:?? Giorgos Armeniakos and Georgios Zervakis and Dimitrios Soudris and Jörg Henkel Hardware Approximate Techniques for Deep Neural Network Accelerators: a Survey 83:1--83:?? Chen Yan and Xiaoyu Ji and Kai Wang and Qinhong Jiang and Zizhi Jin and Wenyuan Xu A Survey on Voice Assistant Security: Attacks and Countermeasures . . . . . . 84:1--84:?? Elena Almaraz Luengo Gamma Pseudo Random Number Generators 85:1--85:33 Anubhab Baksi and Shivam Bhasin and Jakub Breier and Dirmanto Jap and Dhiman Saha A Survey on Fault Attacks on Symmetric Key Cryptosystems . . . . . . . . . . . 86:1--86:??
Kalia Orphanou and Jahna Otterbacher and Styliani Kleanthous and Khuyagbaatar Batsuren and Fausto Giunchiglia and Veronika Bogina and Avital Shulner Tal and Alan Hartman and Tsvi Kuflik Mitigating Bias in Algorithmic Systems --- a Fish-eye View . . . . . . . . . . 87:1--87:?? Jiang Xiao and Huichuwu Li and Minrui Wu and Hai Jin and M. Jamal Deen and Jiannong Cao A Survey on Wireless Device-free Human Sensing: Application Scenarios, Current Solutions, and Open Issues . . . . . . . 88:1--88:?? Yuan He and Xiuzhen Guo and Xiaolong Zheng and Zihao Yu and Jia Zhang and Haotian Jiang and Xin Na and Jiacheng Zhang Cross-Technology Communication for the Internet of Things: a Survey . . . . . . 89:1--89:?? Yoshitomo Matsubara and Marco Levorato and Francesco Restuccia Split Computing and Early Exiting for Deep Learning Applications: Survey and Research Challenges . . . . . . . . . . 90:1--90:?? Quim Motger and Xavier Franch and Jordi Marco Software-Based Dialogue Systems: Survey, Taxonomy, and Challenges . . . . . . . . 91:1--91:?? George A. Vouros Explainable Deep Reinforcement Learning: State of the Art and Challenges . . . . 92:1--92:?? Bushra Alhijawi and Arafat Awajan and Salam Fraihat Survey on the Objectives of Recommender Systems: Measures, Solutions, Evaluation Methodology, and New Perspectives . . . 93:1--93:?? Amina Kammoun and Rim Slama and Hedi Tabia and Tarek Ouni and Mohmed Abid Generative Adversarial Networks for Face Generation: a Survey . . . . . . . . . . 94:1--94:?? Amir-Hossein Karimi and Gilles Barthe and Bernhard Schölkopf and Isabel Valera A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations . . . . . 95:1--95:?? Manal Alamir and Manal Alghamdi The Role of Generative Adversarial Network in Medical Image Analysis: an In-depth Survey . . . . . . . . . . . . 96:1--96:?? Shiwen Wu and Fei Sun and Wentao Zhang and Xu Xie and Bin Cui Graph Neural Networks in Recommender Systems: a Survey . . . . . . . . . . . 97:1--97:?? Fabio Valerio Massoli and Lucia Vadicamo and Giuseppe Amato and Fabrizio Falchi A Leap among Quantum Computing and Quantum Neural Networks: a Survey . . . 98:1--98:?? Pedro Cruz and Nadjib Achir and Aline Carneiro Viana On the Edge of the Deployment: a Survey on Multi-access Edge Computing . . . . . 99:1--99:?? Triet H. M. Le and Huaming Chen and M. Ali Babar A Survey on Data-driven Software Vulnerability Assessment and Prioritization . . . . . . . . . . . . . 100:1--100:?? Darren Yates and Md Zahidul Islam Data Mining on Smartphones: an Introduction and Survey . . . . . . . . 101:1--101:?? Congbo Ma and Wei Emma Zhang and Mingyu Guo and Hu Wang and Quan Z. Sheng Multi-document Summarization via Deep Learning Techniques: a Survey . . . . . 102:1--102:?? Julia El Zini and Mariette Awad On the Explainability of Natural Language Processing Deep Models . . . . 103:1--103:?? Hansoo Lee and Joonyoung Park and Uichin Lee A Systematic Survey on Android API Usage for Data-driven Analytics with Smartphones . . . . . . . . . . . . . . 104:1--104:?? Zhiyan Chen and Jinxin Liu and Yu Shen and Murat Simsek and Burak Kantarci and Hussein T. Mouftah and Petar Djukic Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats . . . . . . 105:1--105:?? Emanuele Del Sozzo and Davide Conficconi and Alberto Zeni and Mirko Salaris and Donatella Sciuto and Marco D. Santambrogio Pushing the Level of Abstraction of Digital System Design: a Survey on How to Program FPGAs . . . . . . . . . . . . 106:1--106:?? Hooman Alavizadeh and Julian Jang-Jaccard and Simon Yusuf Enoch and Harith Al-Sahaf and Ian Welch and Seyit A. Camtepe and Dan Dongseong Kim A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights . . . . . . . . . . . . . . . . 107:1--107:?? Trivikram Muralidharan and Aviad Cohen and Noa Gerson and Nir Nissim File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements . . . . . . . . . . . . . . 108:1--108:??
Yi Tay and Mostafa Dehghani and Dara Bahri and Donald Metzler Efficient Transformers: a Survey . . . . 109:1--109:?? Mahdi Fahmideh and John Grundy and Aakash Ahmad and Jun Shen and Jun Yan and Davoud Mougouei and Peng Wang and Aditya Ghose and Anuradha Gunawardana and Uwe Aickelin and Babak Abedin Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions . . . . . . . . . . . . . . . 110:1--110:?? Binglei Guo and Jiong Yu and Dexian Yang and Hongyong Leng and Bin Liao Energy-Efficient Database Systems: a Systematic Survey . . . . . . . . . . . 111:1--111:?? Shanto Roy and Nazia Sharmin and Jaime C. Acosta and Christopher Kiekintveld and Aron Laszka Survey and Taxonomy of Adversarial Reconnaissance Techniques . . . . . . . 112:1--112:?? Dan Xia and Chun Jiang and Jiafu Wan and Jiong Jin and Victor C. M. Leung and Miguel Martínez-García Heterogeneous Network Access and Fusion in Smart Factory: a Survey . . . . . . . 113:1--113:?? Andrei Paleyes and Raoul-Gabriel Urma and Neil D. Lawrence Challenges in Deploying Machine Learning: a Survey of Case Studies . . . 114:1--114:?? Guilherme Gonçalves and Hugo Coelho and Pedro Monteiro and Miguel Melo and Maximino Bessa Systematic Review of Comparative Studies of the Impact of Realism in Immersive Virtual Experiences . . . . . . . . . . 115:1--115:?? Alexander Schäfer and Gerd Reis and Didier Stricker A Survey on Synchronous Augmented, Virtual, and Mixed Reality Remote Collaboration Systems . . . . . . . . . 116:1--116:?? Meike Zehlike and Ke Yang and Julia Stoyanovich Fairness in Ranking, Part II: Learning-to-Rank and Recommender Systems 117:1--117:?? Meike Zehlike and Ke Yang and Julia Stoyanovich Fairness in Ranking, Part I: Score-Based Ranking . . . . . . . . . . . . . . . . 118:1--118:?? Hakan Erdogmus Bayesian Hypothesis Testing Illustrated: an Introduction for Software Engineering Researchers . . . . . . . . . . . . . . 119:1--119:?? Luke K. Topham and Wasiq Khan and Dhiya Al-Jumeily and Abir Hussain Human Body Pose Estimation for Gait Identification: a Comprehensive Survey of Datasets and Models . . . . . . . . . 120:1--120:?? Konstantinos Benidis and Syama Sundar Rangapuram and Valentin Flunkert and Yuyang Wang and Danielle Maddix and Caner Turkmen and Jan Gasthaus and Michael Bohlke-Schneider and David Salinas and Lorenzo Stella and François-Xavier Aubet and Laurent Callot and Tim Januschowski Deep Learning for Time Series Forecasting: Tutorial and Literature Survey . . . . . . . . . . . . . . . . . 121:1--121:?? Jongkil Jay Jeong and Yevhen Zolotavkin and Robin Doss Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis . . . . . . . 122:1--122:?? Simon Parkinson and Saad Khan A Survey on Empirical Security Analysis of Access-control Systems: a Real-world Perspective . . . . . . . . . . . . . . 123:1--123:?? Samuel Jero and Nathan Burow and Bryan Ward and Richard Skowyra and Roger Khazan and Howard Shrobe and Hamed Okhravi TAG: Tagged Architecture Guide . . . . . 124:1--124:?? Rodrigo Branco and Ben Lee Cache-related Hardware Capabilities and Their Impact on Information Security . . 125:1--125:?? Temitayo Olugbade and Marta Bie\'nkiewicz and Giulia Barbareschi and Vincenzo D'amato and Luca Oneto and Antonio Camurri and Catherine Holloway and Mårten Björkman and Peter Keller and Martin Clayton and Amanda C. De C. Williams and Nicolas Gold and Cristina Becchio and Beno\^\it Bardy and Nadia Bianchi-Berthouze Human Movement Datasets: an Interdisciplinary Scoping Review . . . . 126:1--126:?? Johan Arcile and Étienne André Timed Automata as a Formalism for Expressing Security: a Survey on Theory and Practice . . . . . . . . . . . . . . 127:1--127:?? Lu Chen and Yunjun Gao and Xuan Song and Zheng Li and Yifan Zhu and Xiaoye Miao and Christian S. Jensen Indexing Metric Spaces for Exact Similarity Search . . . . . . . . . . . 128:1--128:?? Kimiya Keyvan and Jimmy Xiangji Huang How to Approach Ambiguous Queries in Conversational Search: a Survey of Techniques, Approaches, Tools, and Challenges . . . . . . . . . . . . . . . 129:1--129:?? Denis Kleyko and Dmitri A. Rachkovskij and Evgeny Osipov and Abbas Rahimi A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part I: Models and Data Transformations . . . 130:1--130:??
Lucas H. Sallaberry and Romero Tori and Fátima L. S. Nunes Automatic Performance Assessment in Three-dimensional Interactive Haptic Medical Simulators: a Systematic Review 131:1--131:?? Siva Uday Sampreeth Chebolu and Paolo Rosso and Sudipta Kar and Thamar Solorio Survey on Aspect Category Detection . . 132:1--132:?? Deepak Adhikari and Wei Jiang and Jinyu Zhan and Zhiyuan He and Danda B. Rawat and Uwe Aickelin and Hadi A. Khorshidi A Comprehensive Survey on Imputation of Missing Data in Internet of Things . . . 133:1--133:?? Zhibo Wang and Jingjing Ma and Xue Wang and Jiahui Hu and Zhan Qin and Kui Ren Threats to Training: a Survey of Poisoning Attacks and Defenses on Machine Learning Systems . . . . . . . . 134:1--134:?? Michael Zipperle and Florian Gottwalt and Elizabeth Chang and Tharam Dillon Provenance-based Intrusion Detection Systems: a Survey . . . . . . . . . . . 135:1--135:?? Rong Han and Zheng Yan and Xueqin Liang and Laurence T. Yang How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey . . . . . . . . . . . . . . . . . 136:1--136:?? Joobeom Yun and Fayozbek Rustamov and Juhwan Kim and Youngjoo Shin Fuzzing of Embedded Systems: a Survey 137:1--137:?? Carmen Carrión Kubernetes Scheduling: Taxonomy, Ongoing Issues and Challenges . . . . . . . . . 138:1--138:?? Ahmed Benmoussa and Chaker Abdelaziz Kerrache and Nasreddine Lagraa and Spyridon Mastorakis and Abderrahmane Lakas and Abdou El Karim Tahari Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements, and Future Directions . . . . . . . . . 139:1--139:?? Andreas L. Opdahl and Tareq Al-Moslmi and Duc-Tien Dang-Nguyen and Marc Gallofré Ocaña and Bjòrnar Tessem and Csaba Veres Semantic Knowledge Graphs for the News: a Review . . . . . . . . . . . . . . . . 140:1--140:?? Yudong Tao and Chuang Yang and Tianyi Wang and Erik Coltey and Yanxiu Jin and Yinghao Liu and Renhe Jiang and Zipei Fan and Xuan Song and Ryosuke Shibasaki and Shu-Ching Chen and Mei-Ling Shyu and Steven Luis A Survey on Data-driven COVID-19 and Future Pandemic Management . . . . . . . 141:1--141:?? Hoda Naghibijouybari and Esmaeil Mohammadian Koruyeh and Nael Abu-Ghazaleh Microarchitectural Attacks in Heterogeneous Systems: a Survey . . . . 142:1--142:?? Zhanna Sarsenbayeva and Niels Van Berkel and Eduardo Velloso and Jorge Goncalves and Vassilis Kostakos Methodological Standards in Accessibility Research on Motor Impairments: a Survey . . . . . . . . . 143:1--143:?? Samuel Idowu and Daniel Strüber and Thorsten Berger Asset Management in Machine Learning: State-of-research and State-of-practice 144:1--144:?? M. Mehdi Afsar and Trafford Crump and Behrouz Far Reinforcement Learning based Recommender Systems: a Survey . . . . . . . . . . . 145:1--145:?? Markus Bayer and Marc-André Kaufhold and Christian Reuter A Survey on Data Augmentation for Text Classification . . . . . . . . . . . . . 146:1--146:?? Jon Perez-Cerrolaza and Jaume Abella and Leonidas Kosmidis and Alejandro J. Calderon and Francisco Cazorla and Jose Luis Flores GPU Devices for Safety-Critical Systems: a Survey . . . . . . . . . . . . . . . . 147:1--147:?? Tung Minh Tran and Tu N. Vu and Nguyen D. Vo and Tam V. Nguyen and Khang Nguyen Anomaly Analysis in Images and Videos: a Comprehensive Review . . . . . . . . . . 148:1--148:?? Li Liu and Fanzhang Li A Survey on Dynamic Fuzzy Machine Learning . . . . . . . . . . . . . . . . 149:1--149:?? William C. Sleeman and Rishabh Kapoor and Preetam Ghosh Multimodal Classification: Current Landscape, Taxonomy and Future Directions . . . . . . . . . . . . . . . 150:1--150:?? Zeineb Rejiba and Javad Chamanara Custom Scheduling in Kubernetes: a Survey on Common Problems and Solution Approaches . . . . . . . . . . . . . . . 151:1--151:?? Mohammad Goudarzi and Marimuthu Palaniswami and Rajkumar Buyya Scheduling IoT Applications in Edge and Fog Computing Environments: a Taxonomy and Future Directions . . . . . . . . . 152:1--152:??
Yue Liu and Chakkrit Tantithamthavorn and Li Li and Yepang Liu Deep Learning for Android Malware Defenses: a Systematic Literature Review 153:1--153:?? Huan Yee Koh and Jiaxin Ju and Ming Liu and Shirui Pan An Empirical Survey on Long Document Summarization: Datasets, Models, and Metrics . . . . . . . . . . . . . . . . 154:1--154:?? Andreas Madsen and Siva Reddy and Sarath Chandar Post-hoc Interpretability for Neural NLP: a Survey . . . . . . . . . . . . . 155:1--155:?? Henry Weld and Xiaoqi Huang and Siqu Long and Josiah Poon and Soyeon Caren Han A Survey of Joint Intent Detection and Slot Filling Models in Natural Language Understanding . . . . . . . . . . . . . 156:1--156:?? Sina Mohseni and Haotao Wang and Chaowei Xiao and Zhiding Yu and Zhangyang Wang and Jay Yadawa Taxonomy of Machine Learning Safety: a Survey and Primer . . . . . . . . . . . 157:1--157:?? Nishan Gunawardena and Jeewani Anupama Ginige and Bahman Javadi Eye-tracking Technologies in Mobile Devices Using Edge Computing: a Systematic Review . . . . . . . . . . . 158:1--158:?? Tariq Abdullah and Ahmed Ahmet Deep Learning in Sentiment Analysis: Recent Architectures . . . . . . . . . . 159:1--159:?? Alberto Blanco-Justicia and David Sánchez and Josep Domingo-Ferrer and Krishnamurty Muralidhar A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning . . . . . . . . . . . . 160:1--160:?? Chi Liu and Tianqing Zhu and Jun Zhang and Wanlei Zhou Privacy Intelligence: a Survey on Image Privacy in Online Social Networks . . . 161:1--161:?? Minzhao Lyu and Hassan Habibi Gharakheili and Vijay Sivaraman A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques . . . . . . . . . . 162:1--162:?? Shuai Zhou and Chi Liu and Dayong Ye and Tianqing Zhu and Wanlei Zhou and Philip S. Yu Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity . . . . . . . . . . . . . 163:1--163:?? Manuel A. Serrano and José A. Cruz-Lemus and Ricardo Perez-Castillo and Mario Piattini Quantum Software Components and Platforms: Overview and Quality Assessment . . . . . . . . . . . . . . . 164:1--164:?? Divya Velayudhan and Taimur Hassan and Ernesto Damiani and Naoufel Werghi Recent Advances in Baggage Threat Detection: a Comprehensive and Systematic Survey . . . . . . . . . . . 165:1--165:?? Zhiyi Tian and Lei Cui and Jie Liang and Shui Yu A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning . . . . . . . . . . . . . . . . 166:1--166:?? Michael P. Heinl and Simon Gölz and Christoph Bösch Remote Electronic Voting in Uncontrolled Environments: a Classifying Survey . . . 167:1--167:?? Sarah Roscoe and Minal Khatri and Adam Voshall and Surinder Batra and Sukhwinder Kaur and Jitender Deogun Formal Concept Analysis Applications in Bioinformatics . . . . . . . . . . . . . 168:1--168:?? Nilesh Chakraborty and Jianqiang Li and Victor C. M. Leung and Samrat Mondal and Yi Pan and Chengwen Luo and Mithun Mukherjee Honeyword-based Authentication Techniques for Protecting Passwords: a Survey . . . . . . . . . . . . . . . . . 169:1--169:?? Eva Zangerle and Christine Bauer Evaluating Recommender Systems: Survey and Framework . . . . . . . . . . . . . 170:1--170:?? André Lu\'ìs Barroso Almeida and Joubert de Castro Lima and Marco Antonio M. Carvalho Systematic Literature Review on Parallel Trajectory-based Metaheuristics . . . . 171:1--171:?? Tianbao Yang and Yiming Ying AUC Maximization in the Era of Big Data and AI: a Survey . . . . . . . . . . . . 172:1--172:?? Chenhe Dong and Yinghui Li and Haifan Gong and Miaoxin Chen and Junxin Li and Ying Shen and Min Yang A Survey of Natural Language Generation 173:1--173:?? Linghe Kong and Jinlin Tan and Junqin Huang and Guihai Chen and Shuaitian Wang and Xi Jin and Peng Zeng and Muhammad Khan and Sajal K. Das Edge-computing-driven Internet of Things: a Survey . . . . . . . . . . . . 174:1--174:??
Denis Kleyko and Dmitri Rachkovskij and Evgeny Osipov and Abbas Rahimi A Survey on Hyperdimensional Computing aka Vector Symbolic Architectures, Part II: Applications, Cognitive Models, and Challenges . . . . . . . . . . . . . . . 175:1--175:?? Daniel McDuff Camera Measurement of Physiological Vital Signs . . . . . . . . . . . . . . 176:1--176:?? Bo Li and Peng Qi and Bo Liu and Shuai Di and Jingen Liu and Jiquan Pei and Jinfeng Yi and Bowen Zhou Trustworthy AI: From Principles to Practices . . . . . . . . . . . . . . . 177:1--177:?? Luca Benedetto and Paolo Cremonesi and Andrew Caines and Paula Buttery and Andrea Cappelli and Andrea Giussani and Roberto Turrin A Survey on Recent Approaches to Question Difficulty Estimation from Text 178:1--178:?? Kai North and Marcos Zampieri and Matthew Shardlow Lexical Complexity Prediction: an Overview . . . . . . . . . . . . . . . . 179:1--179:?? Nandita Pattnaik and Shujun Li and Jason R. C. Nurse A Survey of User Perspectives on Security and Privacy in a Home Networking Environment . . . . . . . . . 180:1--180:?? Eun Hee Park and Veda C. Storey Emotion Ontology Studies: a Framework for Expressing Feelings Digitally and its Application to Sentiment Analysis 181:1--181:?? Lidia Fotia and Flávia Delicato and Giancarlo Fortino Trust in Edge-based Internet of Things Architectures: State of the Art and Research Challenges . . . . . . . . . . 182:1--182:?? Ron Bitton and Nadav Maman and Inderjeet Singh and Satoru Momiyama and Yuval Elovici and Asaf Shabtai Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems . . . . . . . . . . . . . . . . 183:1--183:?? Haochen Hua and Yutong Li and Tonghe Wang and Nanqing Dong and Wei Li and Junwei Cao Edge Computing with Artificial Intelligence: a Machine Learning Perspective . . . . . . . . . . . . . . 184:1--184:?? Takahito Yoshizawa and Dave Singelée and Jan Tobias Muehlberg and Stephane Delbruel and Amir Taherkordi and Danny Hughes and Bart Preneel A Survey of Security and Privacy Issues in V2X Communication Systems . . . . . . 185:1--185:?? Athanasios Liatifis and Panagiotis Sarigiannidis and Vasileios Argyriou and Thomas Lagkas Advancing SDN from OpenFlow to P4: a Survey . . . . . . . . . . . . . . . . . 186:1--186:?? Janaka Senanayake and Harsha Kalutarage and Mhd Omar Al-Kadri and Andrei Petrovski and Luca Piras Android Source Code Vulnerability Detection: a Systematic Literature Review . . . . . . . . . . . . . . . . . 187:1--187:?? Meng Liu and Liqiang Nie and Yunxiao Wang and Meng Wang and Yong Rui A Survey on Video Moment Localization 188:1--188:?? Jacky Cao and Kit-Yung Lam and Lik-Hang Lee and Xiaoli Liu and Pan Hui and Xiang Su Mobile Augmented Reality: User Interfaces, Frameworks, and Intelligence 189:1--189:?? Junsik Sim and Beomjoong Kim and Kiseok Jeon and Moonho Joo and Jihun Lim and Junghee Lee and Kim-Kwang Raymond Choo Technical Requirements and Approaches in Personal Data Control . . . . . . . . . 190:1--190:?? Wael Issa and Nour Moustafa and Benjamin Turnbull and Nasrin Sohrabi and Zahir Tari Blockchain-Based Federated Learning for Securing Internet of Things: a Comprehensive Survey . . . . . . . . . . 191:1--191:?? Hussain Ahmad and Isuru Dharmadasa and Faheem Ullah and Muhammad Ali Babar A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures . . . . . . . . . . . . 192:1--192:?? Junhai Luo and Zhiyan Wang and Ming Xia and Linyong Wu and Yuxin Tian and Yu Chen Path Planning for UAV Communication Networks: Related Technologies, Solutions, and Opportunities . . . . . . 193:1--193:?? Rudresh Dwivedi and Devam Dave and Het Naik and Smiti Singhal and Rana Omer and Pankesh Patel and Bin Qian and Zhenyu Wen and Tejal Shah and Graham Morgan and Rajiv Ranjan Explainable AI (XAI): Core Ideas, Techniques, and Solutions . . . . . . . 194:1--194:?? Pengfei Liu and Weizhe Yuan and Jinlan Fu and Zhengbao Jiang and Hiroaki Hayashi and Graham Neubig Pre-train, Prompt, and Predict: a Systematic Survey of Prompting Methods in Natural Language Processing . . . . . 195:1--195:?? Ping Wang and Haichang Gao and Xiaoyan Guo and Chenxuan Xiao and Fuqi Qi and Zheng Yan An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness . . . . . . . . . . . . . . . 196:1--196:??
Anna Rogers and Matt Gardner and Isabelle Augenstein QA Dataset Explosion: a Taxonomy of NLP Resources for Question Answering and Reading Comprehension . . . . . . . . . 197:1--197:?? Giacomo Chiarot and Claudio Silvestri Time Series Compression Survey . . . . . 198:1--198:?? Eoin Brophy and Zhengwei Wang and Qi She and Tomás Ward Generative Adversarial Networks in Time Series: a Systematic Literature Review 199:1--199:?? Fath U Min Ullah and Mohammad S. Obaidat and Amin Ullah and Khan Muhammad and Mohammad Hijji and Sung Wook Baik A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos . . . . . . . . . . . . . . . . . 200:1--200:?? Yunhua Zhao and Kostadin Damevski and Hui Chen A Systematic Survey of Just-in-Time Software Defect Prediction . . . . . . . 201:1--201:?? Antonio Quiña-Mera and Pablo Fernandez and José Mar\'ìa Garc\'ìa and Antonio Ruiz-Cortés GraphQL: a Systematic Mapping Study . . 202:1--202:?? Nils Rethmeier and Isabelle Augenstein A Primer on Contrastive Pretraining in Language Processing: Methods, Lessons Learned, and Perspectives . . . . . . . 203:1--203:?? Iyyakutti Iyappan Ganapathi and Syed Sadaf Ali and Surya Prakash and Ngoc-Son Vu and Naoufel Werghi A Survey of $3$D Ear Recognition Techniques . . . . . . . . . . . . . . . 204:1--204:?? Jitendra Parmar and Satyendra Chouhan and Vaskar Raychoudhury and Santosh Rathore Open-world Machine Learning: Applications, Challenges, and Opportunities . . . . . . . . . . . . . 205:1--205:?? Rami Ibrahim and M. Omair Shafiq Explainable Convolutional Neural Networks: a Taxonomy, Review, and Future Directions . . . . . . . . . . . . . . . 206:1--206:?? Ling Sun and Yuan Rao and Lianwei Wu and Xiangbo Zhang and Yuqian Lan and Ambreen Nazir Fighting False Information from Propagation Process: a Survey . . . . . 207:1--207:?? Amirmohammad Pasdar and Young Choon Lee and Zhongli Dong Connect API with Blockchain: a Survey on Blockchain Oracle Implementation . . . . 208:1--208:?? Fabio Catania and Micol Spitale and Franca Garzotto Conversational Agents in Therapeutic Interventions for Neurodevelopmental Disorders: a Survey . . . . . . . . . . 209:1--209:?? Laure Gonnord and Ludovic Henrio and Lionel Morel and Gabriel Radanne A Survey on Parallelism and Determinism 210:1--210:?? Fatai Sado and Chu Kiong Loo and Wei Shiung Liew and Matthias Kerzel and Stefan Wermter Explainable Goal-driven Agents and Robots --- a Comprehensive Review . . . 211:1--211:?? Jou-An Chen and Wei Niu and Bin Ren and Yanzhi Wang and Xipeng Shen Survey: Exploiting Data Redundancy for Optimization of Deep Learning . . . . . 212:1--212:?? Luke Antonyshyn and Jefferson Silveira and Sidney Givigi and Joshua Marshall Multiple Mobile Robot Task and Motion Planning: a Survey . . . . . . . . . . . 213:1--213:?? Tainã Ribeiro de Oliveira and Brenda Biancardi Rodrigues and Matheus Moura da Silva and Rafael Antonio N. Spinassé and Gabriel Giesen Ludke and Mateus Ruy Soares Gaudio and Guilherme Iglesias Rocha Gomes and Luan Guio Cotini and Daniel da Silva Vargens and Marcelo Queiroz Schimidt and Rodrigo Varejão Andreão and Mário Mestria Virtual Reality Solutions Employing Artificial Intelligence Methods: a Systematic Literature Review . . . . . . 214:1--214:?? Muhammad Nouman Nafees and Neetesh Saxena and Alvaro Cardenas and Santiago Grijalva and Pete Burnap Smart Grid Cyber-Physical Situational Awareness of Complex Operational Technology Attacks: a Review . . . . . . 215:1--215:?? Kostas Papagiannopoulos and Ognjen Glamo\vcanin and Melissa Azouaoui and Dorian Ros and Francesco Regazzoni and Mirjana Stojilovi\'c The Side-channel Metrics Cheat Sheet . . 216:1--216:?? Elyssa Boulila and Marc Dacier WPAD: Waiting Patiently for an Announced Disaster . . . . . . . . . . . . . . . . 217:1--217:?? Gongsheng Yuan and Jiaheng Lu and Zhengtong Yan and Sai Wu A Survey on Mapping Semi-Structured Data and Graph Data to Relational Data . . . 218:1--218:??
Dimitrios Georgoulias and Jens Myrup Pedersen and Morten Falch and Emmanouil Vasilomanolakis Botnet Business Models, Takedown Attempts, and the Darkweb Market: a Survey . . . . . . . . . . . . . . . . . 219:1--219:?? Luca Di Grazia and Michael Pradel Code Search: a Survey of Techniques for Finding Code . . . . . . . . . . . . . . 220:1--220:?? Roberto Viola and Ángel Mart\'ìn and Mikel Zorrilla and Jon Montalbán and Pablo Angueira and Gabriel-Miro Muntean A Survey on Virtual Network Functions for Media Streaming: Solutions and Future Challenges . . . . . . . . . . . 221:1--221:?? José Mar\'ìa Jorquera Valero and Pedro Miguel Sánchez Sánchez and Manuel Gil Pérez and Alberto Huertas Celdrán and Gregorio Martinez Perez Cutting-Edge Assets for Trust in 5G and Beyond: Requirements, State of the Art, Trends, and Challenges . . . . . . . . . 222:1--222:?? Priyankar Choudhary and Neeraj Goel and Mukesh Saini A Survey on Seismic Sensor based Target Detection, Localization, Identification, and Activity Recognition . . . . . . . . 223:1--223:?? Ghodai Abdelrahman and Qing Wang and Bernardo Nunes Knowledge Tracing: a Survey . . . . . . 224:1--224:?? Jonas Dann and Daniel Ritter and Holger Fröning Non-relational Databases on FPGAs: Survey, Design Decisions, Challenges . . 225:1--225:?? Yang Li and Michael Purcell and Thierry Rakotoarivelo and David Smith and Thilina Ranbaduge and Kee Siong Ng Private Graph Data Release: a Survey . . 226:1--226:?? Stjepan Picek and Guilherme Perin and Luca Mariot and Lichao Wu and Lejla Batina SoK: Deep Learning-based Physical Side-channel Analysis . . . . . . . . . 227:1--227:?? Michael Seifert and Stephan Kuehnel and Stefan Sackmann Hybrid Clouds Arising from Software as a Service Adoption: Challenges, Solutions, and Future Research Directions . . . . . 228:1--228:?? Surangika Ranathunga and En-Shiun Annie Lee and Marjana Prifti Skenduli and Ravi Shekhar and Mehreen Alam and Rishemjit Kaur Neural Machine Translation for Low-resource Languages: a Survey . . . . 229:1--229:?? Bo Huang and Mengchu Zhou and Xiaoyu Sean Lu and Abdullah Abusorrah Scheduling of Resource Allocation Systems with Timed Petri Nets: a Survey 230:1--230:?? Chen Chen and Gang Zhou and Youfang Lin Cross-Domain WiFi Sensing with Channel State Information: a Survey . . . . . . 231:1--231:?? Ziqiang Li and Muhammad Usman and Rentuo Tao and Pengfei Xia and Chaoyue Wang and Huanhuan Chen and Bin Li A Systematic Survey of Regularization and Normalization in GANs . . . . . . . 232:1--232:?? Rahul Mishra and Hari Gupta Transforming Large-Size to Lightweight Deep Neural Networks for IoT Applications . . . . . . . . . . . . . . 233:1--233:?? Michael Jones and Soufiene Djahel and Kristopher Welsh Path-Planning for Unmanned Aerial Vehicles with Environment Complexity Considerations: a Survey . . . . . . . . 234:1--234:?? Li-Hsiang Shen and Kai-Ten Feng and Lajos Hanzo Five Facets of 6G: Research Challenges and Opportunities . . . . . . . . . . . 235:1--235:?? Christian Legaard and Thomas Schranz and Gerald Schweiger and Ján Drgo\vna and Basak Falay and Cláudio Gomes and Alexandros Iosifidis and Mahdi Abkar and Peter Larsen Constructing Neural Network Based Models for Simulating Dynamical Systems . . . . 236:1--236:?? Sampath Rajapaksha and Harsha Kalutarage and M. Omar Al-Kadri and Andrei Petrovski and Garikayi Madzudzo and Madeline Cheah AI-Based Intrusion Detection Systems for In-Vehicle Networks: a Survey . . . . . 237:1--237:?? Jiahua Xu and Krzysztof Paruch and Simon Cousaert and Yebo Feng SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols 238:1--238:?? Pieter Hijma and Stijn Heldens and Alessio Sclocco and Ben van Werkhoven and Henri E. Bal Optimization Techniques for GPU Programming . . . . . . . . . . . . . . 239:1--239:?? Juncen Zhu and Jiannong Cao and Divya Saxena and Shan Jiang and Houda Ferradi Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions . . . . . . . . . . . . . . . 240:1--240:??
Md Rayhanur Rahman and Rezvan Mahdavi Hezaveh and Laurie Williams What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: a Survey . . 241:1--241:?? Rathinaraja Jeyaraj and Anandkumar Balasubramaniam and Ajay Kumara M. A. and Nadra Guizani and Anand Paul Resource Management in Cloud and Cloud-influenced Technologies for Internet of Things Applications . . . . 242:1--242:?? Nitin Rathi and Indranil Chakraborty and Adarsh Kosta and Abhronil Sengupta and Aayush Ankit and Priyadarshini Panda and Kaushik Roy Exploring Neuromorphic Computing Based on Spiking Neural Networks: Algorithms to Hardware . . . . . . . . . . . . . . 243:1--243:?? Jianhua Gao and Weixing Ji and Fangli Chang and Shiyu Han and Bingxin Wei and Zeming Liu and Yizhuo Wang A Systematic Survey of General Sparse Matrix--Matrix Multiplication . . . . . 244:1--244:?? Yun Zhang and Linwei Zhu and Gangyi Jiang and Sam Kwong and C.-C. Jay Kuo A Survey on Perceptually Optimized Video Coding . . . . . . . . . . . . . . . . . 245:1--245:?? Jayashree Dey and Ratna Dutta Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions . . . . . . . . . . 246:1--246:?? Arash Heidari and Nima Jafari Navimipour and Mehmet Unal and Guodao Zhang Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues . . 247:1--247:?? Ziwei Ji and Nayeon Lee and Rita Frieske and Tiezheng Yu and Dan Su and Yan Xu and Etsuko Ishii and Ye Jin Bang and Andrea Madotto and Pascale Fung Survey of Hallucination in Natural Language Generation . . . . . . . . . . 248:1--248:?? Antonio López Mart\'ìnez and Manuel Gil Pérez and Antonio Ruiz-Mart\'ìnez A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare . . . . . . . . . . 249:1--249:?? Caesar Wu and Rui Zhang and Ramamohanarao Kotagiri and Pascal Bouvry Strategic Decisions: Survey, Taxonomy, and Future Directions from Artificial Intelligence Perspective . . . . . . . . 250:1--250:?? Maxime Buser and Rafael Dowsley and Muhammed Esgin and Clémentine Gritti and Shabnam Kasra Kermanshahi and Veronika Kuchta and Jason Legrow and Joseph Liu and Raphaël Phan and Amin Sakzad and Ron Steinfeld and Jiangshan Yu A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions . . . . . . . . . . 251:1--251:?? Hans Jakob Damsgaard and Aleksandr Ometov and Jari Nurmi Approximation Opportunities in Edge Computing Hardware: a Systematic Literature Review . . . . . . . . . . . 252:1--252:?? Ümit Çatalyürek and Karen Devine and Marcelo Faraj and Lars Gottesbüren and Tobias Heuer and Henning Meyerhenke and Peter Sanders and Sebastian Schlag and Christian Schulz and Daniel Seemaier and Dorothea Wagner More Recent Advances in (Hyper)Graph Partitioning . . . . . . . . . . . . . . 253:1--253:?? Weiwei Lin and Chennian Xiong and Wentai Wu and Fang Shi and Keqin Li and Minxian Xu Performance Interference of Virtual Machines: a Survey . . . . . . . . . . . 254:1--254:?? Kate Smith-Miles and Mario Andrés Muñoz Instance Space Analysis for Algorithm Testing: Methodology and Software Tools 255:1--255:?? Zoe Kotti and Rafaila Galanopoulou and Diomidis Spinellis Machine Learning for Software Engineering: a Tertiary Study . . . . . 256:1--256:?? Tong Sha and Wei Zhang and Tong Shen and Zhoujun Li and Tao Mei Deep Person Generation: a Survey from the Perspective of Face, Pose, and Cloth Synthesis . . . . . . . . . . . . . . . 257:1--257:?? Wei Xiang and Bang Wang A Survey of Implicit Discourse Relation Recognition . . . . . . . . . . . . . . 258:1--258:?? Gaurav Menghani Efficient Deep Learning: a Survey on Making Deep Learning Models Smaller, Faster, and Better . . . . . . . . . . . 259:1--259:?? Robert Hertel and Rachid Benlamri Deep Learning Techniques for COVID-19 Diagnosis and Prognosis Based on Radiological Imaging . . . . . . . . . . 260:1--260:?? Qin Wang and Jiangshan Yu and Shiping Chen and Yang Xiang SoK: DAG-based Blockchain Systems . . . 261:1--261:?? Behrouz Zolfaghari and Leila Mirsadeghi and Khodakhast Bibak and Kaveh Kavousi Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning . . . . . . . 262:1--262:??
Xiaojie Wang and Jiameng Li and Zhaolong Ning and Qingyang Song and Lei Guo and Song Guo and Mohammad S. Obaidat Wireless Powered Mobile Edge Computing Networks: a Survey . . . . . . . . . . . 263:1--263:?? Tanmay Garg and Sarah Masud and Tharun Suresh and Tanmoy Chakraborty Handling Bias in Toxic Speech Detection: a Survey . . . . . . . . . . . . . . . . 264:1--264:?? Washington Cunha and Felipe Viegas and Celso França and Thierson Rosa and Leonardo Rocha and Marcos André Gonçalves A Comparative Survey of Instance Selection Methods applied to Non-Neural and Transformer-Based Text Classification . . . . . . . . . . . . . 265:1--265:?? Mingyu Liu and Li Pan and Shijun Liu Cost Optimization for Cloud Storage from User Perspectives: Recent Advances, Taxonomy, and Survey . . . . . . . . . . 266:1--266:?? Jovani Dalzochio and Rafael Kunst and Jorge Luis Victória Barbosa and Pedro Clarindo da Silva Neto and Edison Pignaton and Carla Schwengber ten Caten and Alex de Lima Teodoro da Penha Predictive Maintenance in the Military Domain: a Systematic Review of the Literature . . . . . . . . . . . . . . . 267:1--267:?? Salma P. González-Sabbagh and Antonio Robles-Kelly A Survey on Underwater Computer Vision 268:1--268:?? Xavier de Carné de Carnavalet and Paul C. van Oorschot A Survey and Analysis of TLS Interception Mechanisms and Motivations: Exploring how end-to-end TLS is made ``end-to-me'' for web traffic . . . . . 269:1--269:?? Ringki Das and Thoudam Doren Singh Multimodal Sentiment Analysis: a Survey of Methods, Trends, and Challenges . . . 270:1--270:?? Yisheng Song and Ting Wang and Puyu Cai and Subrota K. Mondal and Jyoti Prakash Sahoo A Comprehensive Survey of Few-shot Learning: Evolution, Applications, Challenges, and Opportunities . . . . . 271:1--271:?? Harshala Gammulle and David Ahmedt-Aristizabal and Simon Denman and Lachlan Tychsen-Smith and Lars Petersson and Clinton Fookes Continuous Human Action Recognition for Human-machine Interaction: a Review . . 272:1--272:?? Haider Abbas and Naina Emmanuel and Muhammad Faisal Amjad and Tahreem Yaqoob and Mohammed Atiquzzaman and Zafar Iqbal and Narmeen Shafqat and Waleed Bin Shahid and Ali Tanveer and Umer Ashfaq Security Assessment and Evaluation of VPNs: a Comprehensive Survey . . . . . . 273:1--273:?? Renan Greca and Breno Miranda and Antonia Bertolino State of Practical Applicability of Regression Testing Research: a Live Systematic Literature Review . . . . . . 274:1--274:?? Roberto Casadei Macroprogramming: Concepts, State of the Art, and Opportunities of Macroscopic Behaviour Modelling . . . . . . . . . . 275:1--275:?? JunKyu Lee and Lev Mukhanov and Amir Sabbagh Molahosseini and Umar Minhas and Yang Hua and Jesus Martinez del Rincon and Kiril Dichev and Cheol-Ho Hong and Hans Vandierendonck Resource-Efficient Convolutional Networks: a Survey on Model-, Arithmetic-, and Implementation-Level Techniques . . . . . . . . . . . . . . . 276:1--276:?? Étienne André and Shuang Liu and Yang Liu and Christine Choppy and Jun Sun and Jin Song Dong Formalizing UML State Machines for Automated Verification --- a Survey . . 277:1--277:?? Jie Xu and Cong Wang and Xiaohua Jia A Survey of Blockchain Consensus Protocols . . . . . . . . . . . . . . . 278:1--278:?? Jie Gui and Xiaofeng Cong and Yuan Cao and Wenqi Ren and Jun Zhang and Jing Zhang and Jiuxin Cao and Dacheng Tao A Comprehensive Survey and Taxonomy on Single Image Dehazing Based on Deep Learning . . . . . . . . . . . . . . . . 279:1--279:?? Tiago Veiga and Jennifer Renoux From Reactive to Active Sensing: a Survey on Information Gathering in Decision-theoretic Planning . . . . . . 280:1--280:?? Tian Wang and Yuzhu Liang and Xuewei Shen and Xi Zheng and Adnan Mahmood and Quan Z. Sheng Edge Computing and Sensor-Cloud: Overview, Solutions, and Directions . . 281:1--281:?? Visal Rajapakse and Ishan Karunanayake and Nadeem Ahmed Intelligence at the Extreme Edge: a Survey on Reformable TinyML . . . . . . 282:1--282:?? Thomas Kosch and Jakob Karolus and Johannes Zagermann and Harald Reiterer and Albrecht Schmidt and Pawe\l W. Wo\'zniak A Survey on Measuring Cognitive Workload in Human-Computer Interaction . . . . . 283:1--283:?? Ma\lgorzata B. Starzy\'nska-Grze\'s and Robin Roussel and Sam Jacoby and Ali Asadipour Computer Vision-based Analysis of Buildings and Built Environments: a Systematic Review of Current Approaches 284:1--284:?? Chang Liu and Han Yu AI-Empowered Persuasive Video Generation: a Survey . . . . . . . . . . 285:1--285:?? Md Rezwan Hasan and Richard Guest and Farzin Deravi Presentation-level Privacy Protection Techniques for Automated Face Recognition --- a Survey . . . . . . . . 286:1--286:?? Xilu Wang and Yaochu Jin and Sebastian Schmitt and Markus Olhofer Recent Advances in Bayesian Optimization 287:1--287:?? Madeline C. Schiappa and Yogesh S. Rawat and Mubarak Shah Self-Supervised Learning for Videos: a Survey . . . . . . . . . . . . . . . . . 288:1--288:?? Huihui Guo and Fan Wu and Yunchuan Qin and Ruihui Li and Keqin Li and Kenli Li Recent Trends in Task and Motion Planning for Robotics: a Survey . . . . 289:1--289:?? Gang Wang and Qin Wang and Shiping Chen Exploring Blockchains Interoperability: a Systematic Survey . . . . . . . . . . 290:1--290:?? Xiaojie Zhang and Saptarshi Debroy Resource Management in Mobile Edge Computing: a Comprehensive Survey . . . 291:1--291:?? Yogesh Sharma and Deval Bhamare and Nishanth Sastry and Bahman Javadi and Rajkumar Buyya SLA Management in Intent-Driven Service Management Systems: a Taxonomy and Future Directions . . . . . . . . . . . 292:1--292:??
Brian Felipe Keith Norambuena and Tanushree Mitra and Chris North A Survey on Event-Based News Narrative Extraction . . . . . . . . . . . . . . . 300:1--300:?? Zhiwei Zhong and Xianming Liu and Junjun Jiang and Debin Zhao and Xiangyang Ji Guided Depth Map Super-Resolution: a Survey . . . . . . . . . . . . . . . . . 301:1--301:?? Vijay Kumar and Kolin Paul Device Fingerprinting for Cyber-Physical Systems: a Survey . . . . . . . . . . . 302:1--302:?? Mu-Huan Chung and Yuhong Yang and Lu Wang and Greg Cento and Khilan Jerath and Abhay Raman and David Lie and Mark H. Chignell Implementing Data Exfiltration Defense in Situ: a Survey of Countermeasures and Human Involvement . . . . . . . . . . . 303:1--303:?? Quentin Fournier and Gaétan Marceau Caron and Daniel Aloise A Practical Survey on Faster and Lighter Transformers . . . . . . . . . . . . . . 304:1--304:?? Karl Olson and Jack Wampler and Eric Keller Doomed to Repeat with IPv6? Characterization of NAT-centric Security in SOHO Routers . . . . . . . . . . . . 305:1--305:?? Federico Reghenzani and Zhishan Guo and William Fornaciari Software Fault Tolerance in Real-Time Systems: Identifying the Future Research Questions . . . . . . . . . . . . . . . 306:1--306:?? Jiepin Ding and Mingsong Chen and Ting Wang and Junlong Zhou and Xin Fu and Keqin Li A Survey of AI-enabled Dynamic Manufacturing Scheduling: From Directed Heuristics to Autonomous Learning . . . 307:1--307:?? Cornelius Ihle and Dennis Trautwein and Moritz Schubotz and Norman Meuschke and Bela Gipp Incentive Mechanisms in Peer-to-Peer Networks --- a Systematic Literature Review . . . . . . . . . . . . . . . . . 308:1--308:?? Tânia Carvalho and Nuno Moniz and Pedro Faria and Lu\'ìs Antunes Survey on Privacy-Preserving Techniques for Microdata Publication . . . . . . . 309:1--309:?? Tommaso Fulcini and Riccardo Coppola and Luca Ardito and Marco Torchiano A Review on Tools, Mechanics, Benefits, and Challenges of Gamified Software Testing . . . . . . . . . . . . . . . . 310:1--310:?? Arun Kumar Kalakanti and Shrisha Rao Computational Challenges and Approaches for Electric Vehicles . . . . . . . . . 311:1--311:?? Nikiforos Pittaras and George Giannakopoulos and Panagiotis Stamatopoulos and Vangelis Karkaletsis Content-based and Knowledge-enriched Representations for Classification Across Modalities: a Survey . . . . . . 312:1--312:?? Anna Breit and Laura Waltersdorfer and Fajar J. Ekaputra and Marta Sabou and Andreas Ekelhart and Andreea Iana and Heiko Paulheim and Jan Portisch and Artem Revenko and Annette Ten Teije and Frank Van Harmelen Combining Machine Learning and Semantic Web: a Systematic Mapping Study . . . . 313:1--313:?? Abdulaziz Al-Meer and Saif Al-Kuwari Physical Unclonable Functions (PUF) for IoT Devices . . . . . . . . . . . . . . 314:1--314:?? Shalini Saini and Nitesh Saxena A Survey of Threats to Research Literature-dependent Medical AI Solutions . . . . . . . . . . . . . . . 315:1--315:?? Badis Hammi and Sherali Zeadally and Jamel Nebhen Security Threats, Countermeasures, and Challenges of Digital Supply Chains . . 316:1--316:?? Veda C. Storey and Roman Lukyanenko and Arturo Castellanos Conceptual Modeling: Topics, Themes, and Technology Trends . . . . . . . . . . . 317:1--317:?? Sahraoui Dhelim and Liming Chen and Sajal K. Das and Huansheng Ning and Chris Nugent and Gerard Leavey and Dirk Pesch and Eleanor Bantry-White and Devin Burns Detecting Mental Distresses Using Social Behavior Analysis in the Context of COVID-19: a Survey . . . . . . . . . . . 318:1--318:?? Jarod Govers and Philip Feldman and Aaron Dant and Panos Patros Down the Rabbit Hole: Detecting Online Extremism, Radicalisation, and Politicised Hate Speech . . . . . . . . 319:1--319:?? Leysan Nurgalieva and Alisa Frik and Gavin Doherty A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development . . . . . . . . . . . . . . 320:1--320:?? Samodha Pallewatta and Vassilis Kostakos and Rajkumar Buyya Placement of Microservices-based IoT Applications in Fog Computing: a Taxonomy and Future Directions . . . . . 321:1--321:?? Newton C. Will and Carlos A. Maziero Intel Software Guard Extensions Applications: a Survey . . . . . . . . . 322:1--322:?? Bofeng Pan and Natalia Stakhanova and Suprio Ray Data Provenance in Security and Privacy 323:1--323:?? Daryna Oliynyk and Rudolf Mayer and Andreas Rauber I Know What You Trained Last Summer: a Survey on Stealing Machine Learning Models and Defences . . . . . . . . . . 324:1--324:?? Davide Zoni and Andrea Galimberti and William Fornaciari A Survey on Run-time Power Monitors at the Edge . . . . . . . . . . . . . . . . 325:1--325:?? Nikolay Ivanov and Chenning Li and Qiben Yan and Zhiyuan Sun and Zhichao Cao and Xiapu Luo Security Threat Mitigation for Smart Contracts: a Comprehensive Survey . . . 326:1--326:?? Arda Goknil and Phu Nguyen and Sagar Sen and Dimitra Politaki and Harris Niavis and Karl John Pedersen and Abdillah Suyuthi and Abhilash Anand and Amina Ziegenbein A Systematic Review of Data Quality in CPS and IoT for Industry 4.0 . . . . . . 327:1--327:?? Sicong Han and Chenhao Lin and Chao Shen and Qian Wang and Xiaohong Guan Interpreting Adversarial Examples in Deep Learning: a Review . . . . . . . . 328:1--328:?? Xiao Zhang and Griffin Klevering and Xinyu Lei and Yiwen Hu and Li Xiao and Guan-Hua Tu The Security in Optical Wireless Communication: a Survey . . . . . . . . 329:1--329:??
Janice Klaiber and Clemens Van Dinther Deep Learning for Variable Renewable Energy: a Systematic Review . . . . . . 1:1--1:?? Héléne Coullon and Ludovic Henrio and Frédéric Loulergue and Simon Robillard Component-based Distributed Software Reconfiguration: a Verification-oriented Survey . . . . . . . . . . . . . . . . . 2:1--2:?? Mohamed Ahzam Amanullah and Seng W. Loke and Mohan Baruwal Chhetri and Robin Doss A Taxonomy and Analysis of Misbehaviour Detection in Cooperative Intelligent Transport Systems: a Systematic Review 3:1--3:?? Sabine Houy and Philipp Schmid and Alexandre Bartel Security Aspects of Cryptocurrency Wallets --- a Systematic Literature Review . . . . . . . . . . . . . . . . . 4:1--4:?? Prasenjeet Roy and Suman Kundu Review on Query-focused Multi-document Summarization (QMDS) with Comparative Analysis . . . . . . . . . . . . . . . . 5:1--5:?? Jana Vatter and Ruben Mayer and Hans-Arno Jacobsen The Evolution of Distributed Systems for Graph Neural Networks and Their Origin in Graph Processing and Deep Learning: a Survey . . . . . . . . . . . . . . . . . 6:1--6:?? Shulei Ji and Xinyu Yang and Jing Luo A Survey on Deep Learning for Symbolic Music Generation: Representations, Algorithms, Evaluations, and Challenges 7:1--7:?? Mario Brcic and Roman V. Yampolskiy Impossibility Results in AI: a Survey 8:1--8:?? Heng Xu and Tianqing Zhu and Lefeng Zhang and Wanlei Zhou and Philip S. Yu Machine Unlearning: a Survey . . . . . . 9:1--9:?? Samaneh Zolfaghari and Sumaiya Suravee and Daniele Riboni and Kristina Yordanova Sensor-Based Locomotion Data Mining for Supporting the Diagnosis of Neurodegenerative Disorders: a Survey 10:1--10:?? Ce Zheng and Wenhan Wu and Chen Chen and Taojiannan Yang and Sijie Zhu and Ju Shen and Nasser Kehtarnavaz and Mubarak Shah Deep Learning-based Human Pose Estimation: a Survey . . . . . . . . . . 11:1--11:?? Bayzid Ashik Hossain and Md. Saddam Hossain Mukta and Md Adnanul Islam and Akib Zaman and Rolf Schwitter Natural Language-Based Conceptual Modelling Frameworks: State of the Art and Future Opportunities . . . . . . . . 12:1--12:?? Zhaolong Ning and Hao Hu and Xiaojie Wang and Lei Guo and Song Guo and Guoyin Wang and Xinbo Gao Mobile Edge Computing and Machine Learning in the Internet of Unmanned Aerial Vehicles: a Survey . . . . . . . 13:1--13:?? Chi-Wei Lien and Sudip Vhaduri Challenges and Opportunities of Biometric User Authentication in the Age of IoT: a Survey . . . . . . . . . . . . 14:1--14:?? Yaochen Liu and Qiuchi Li and Benyou Wang and Yazhou Zhang and Dawei Song A Survey of Quantum-cognitively Inspired Sentiment Analysis Models . . . . . . . 15:1--15:?? Alessandro Margara and Gianpaolo Cugola and Nicol\`o Felicioni and Stefano Cilloni A Model and Survey of Distributed Data-Intensive Systems . . . . . . . . . 16:1--16:?? Zeinab Zabihi and Amir Masoud Eftekhari Moghadam and Mohammad Hossein Rezvani Reinforcement Learning Methods for Computation Offloading: a Systematic Review . . . . . . . . . . . . . . . . . 17:1--17:?? Ricardo Parizotto and Bruno Loureiro Coelho and Diego Cardoso Nunes and Israat Haque and Alberto Schaeffer-Filho Offloading Machine Learning to Programmable Data Planes: a Systematic Survey . . . . . . . . . . . . . . . . . 18:1--18:?? Zhe Fu and Xi Niu and Mary Lou Maher Deep Learning Models for Serendipity Recommendations: a Survey and New Perspectives . . . . . . . . . . . . . . 19:1--19:?? Rui Xu and Sheng Ma and Yang Guo and Dongsheng Li A Survey of Design and Optimization for Systolic Array-based DNN Accelerators 20:1--20:?? Guoqing Xiao and Chuanghui Yin and Tao Zhou and Xueqi Li and Yuedan Chen and Kenli Li A Survey of Accelerating Parallel Sparse Linear Algebra . . . . . . . . . . . . . 21:1--21:?? Diego Donoso and Jose M. Saavedra Survey on Sketch-to-photo Translation 22:1--22:?? Zhishu Shen and Jiong Jin and Cheng Tan and Atsushi Tagami and Shangguang Wang and Qing Li and Qiushi Zheng and Jingling Yuan A Survey of Next-generation Computing Technologies in Space-air-ground Integrated Networks . . . . . . . . . . 23:1--23:?? Alessia Antelmi and Gennaro Cordasco and Mirko Polato and Vittorio Scarano and Carmine Spagnuolo and Dingqi Yang A Survey on Hypergraph Representation Learning . . . . . . . . . . . . . . . . 24:1--24:?? Kisub Kim and Sankalp Ghatpande and Dongsun Kim and Xin Zhou and Kui Liu and Tegawendé F. Bissyandé and Jacques Klein and Yves Le Traon Big Code Search: a Bibliography . . . . 25:1--25:??
Afzal Badshah and Anwar Ghani and Ali Daud and Ateeqa Jalal and Muhammad Bilal and Jon Crowcroft Towards Smart Education through Internet of Things: a Survey . . . . . . . . . . 26:1--26:?? Maud Ehrmann and Ahmed Hamdi and Elvys Linhares Pontes and Matteo Romanello and Antoine Doucet Named Entity Recognition and Classification in Historical Documents: a Survey . . . . . . . . . . . . . . . . 27:1--27:?? Marco Brohet and Francesco Regazzoni A Survey on Thwarting Memory Corruption in RISC-V . . . . . . . . . . . . . . . 28:1--28:?? Alireza Alaei and Vinh Bui and David Doermann and Umapada Pal Document Image Quality Assessment: a Survey . . . . . . . . . . . . . . . . . 29:1--29:?? Bonan Min and Hayley Ross and Elior Sulem and Amir Pouran Ben Veyseh and Thien Huu Nguyen and Oscar Sainz and Eneko Agirre and Ilana Heintz and Dan Roth Recent Advances in Natural Language Processing via Large Pre-trained Language Models: a Survey . . . . . . . 30:1--30:?? Maciej Besta and Robert Gerstenberger and Emanuel Peter and Marc Fischer and Micha\l Podstawski and Claude Barthels and Gustavo Alonso and Torsten Hoefler Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries . . . 31:1--31:?? Jan Pennekamp and Roman Matzutt and Christopher Klinkmüller and Lennart Bader and Martin Serror and Eric Wagner and Sidra Malik and Maria Spiß and Jessica Rahn and Tan Gürpinar and Eduard Vlad and Sander J. J. Leemans and Salil S. Kanhere and Volker Stich and Klaus Wehrle An Interdisciplinary Survey on Information Flows in Supply Chains . . . 32:1--32:?? Takuya Fujihashi and Toshiaki Koike-Akino and Takashi Watanabe Soft Delivery: Survey on a New Paradigm for Wireless and Mobile Multimedia Streaming . . . . . . . . . . . . . . . 33:1--33:?? Yaxiong Lei and Shijing He and Mohamed Khamis and Juan Ye An End-to-End Review of Gaze Estimation and its Interactive Applications on Handheld Mobile Devices . . . . . . . . 34:1--34:?? Oceane Destras and Sébastien Le Beux and Felipe Gohring De Magalhães and Gabriela Nicolescu Survey on Activation Functions for Optical Neural Networks . . . . . . . . 35:1--35:?? Fatemeh Deldar and Mahdi Abadi Deep Learning for Zero-day Malware Detection and Classification: a Survey 36:1--36:?? Sahar Mehrpour and Thomas D. Latoza A Survey of Tool Support for Working with Design Decisions in Code . . . . . 37:1--37:?? Satyaki Roy and Nirnay Ghosh and Nitish Uplavikar and Preetam Ghosh Towards a Unified Pandemic Management Architecture: Survey, Challenges, and Future Directions . . . . . . . . . . . 38:1--38:?? Huiqiang Chen and Tianqing Zhu and Tao Zhang and Wanlei Zhou and Philip S. Yu Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff 39:1--39:?? Abdelouahab Amira and Abdelouahid Derhab and Elmouatez Billah Karbab and Omar Nouali A Survey of Malware Analysis Using Community Detection Algorithms . . . . . 40:1--40:?? Nan Li and Lianbo Ma and Guo Yu and Bing Xue and Mengjie Zhang and Yaochu Jin Survey on Evolutionary Deep Learning: Principles, Algorithms, Applications, and Open Issues . . . . . . . . . . . . 41:1--41:?? Tara Ghasempouri and Jaan Raik and Cezar Reinbrecht and Said Hamdioui and Mottaqiallah Taouil Survey on Architectural Attacks: a Unified Classification and Attack Model 42:1--42:?? Carlos Barrios and Mohan Kumar Service Caching and Computation Reuse Strategies at the Edge: a Survey . . . . 43:1--43:?? Rongxin Xu and Qiujun Lan and Shiva Raj Pokhrel and Gang Li A Knowledge Graph-Based Survey on Distributed Ledger Technology for IoT Verticals . . . . . . . . . . . . . . . 44:1--44:?? Youssef Yamout and Tashaffi Samin Yeasar and Shahrear Iqbal and Mohammad Zulkernine Beyond Smart Homes: an In-Depth Analysis of Smart Aging Care System Security . . 45:1--45:?? Jean Luca Bez and Suren Byna and Shadi Ibrahim I/O Access Patterns in HPC Applications: a $ 360$-Degree Survey . . . . . . . . . 46:1--46:?? Stefan Buchner and Dirk Riehle The Business Impact of Inner Source and How to Quantify It . . . . . . . . . . . 47:1--47:?? Maryam Amini and Razvan Stanica and Catherine Rosenberg Where Are the (Cellular) Data? . . . . . 48:1--48:?? Essam Debie and Kathryn Kasmarik and Matt Garratt Swarm Robotics: a Survey from a Multi-Tasking Perspective . . . . . . . 49:1--49:?? Danfeng Sun and Junjie Hu and Huifeng Wu and Jia Wu and Jian Yang and Quan Z. Sheng and Schahram Dustdar A Comprehensive Survey on Collaborative Data-access Enablers in the IIoT . . . . 50:1--50:?? Asma Ameur and Sana Hamdi and Sadok Ben Yahia Sentiment Analysis for Hotel Reviews: a Systematic Literature Review . . . . . . 51:1--51:?? Benjamin Smith and Anahita Khojandi and Rama Vasudevan Bias in Reinforcement Learning: a Review in Healthcare Applications . . . . . . . 52:1--52:?? Ryan Schuerkamp and Philippe J. Giabbanelli Extensions of Fuzzy Cognitive Maps: a Systematic Review . . . . . . . . . . . 53:1--53:??
Yulan Guo and Hanyun Wang and Longguang Wang and Yinjie Lei and Li Liu and Mohammed Bennamoun $3$D Face Recognition: Two Decades of Progress and Prospects . . . . . . . . . 54:1--54:?? Benyou Wang and Qianqian Xie and Jiahuan Pei and Zhihong Chen and Prayag Tiwari and Zhao Li and Jie Fu Pre-trained Language Models in Biomedical Domain: a Systematic Survey 55:1--55:?? Tianzhang He and Rajkumar Buyya A Taxonomy of Live Migration Management in Cloud Computing . . . . . . . . . . . 56:1--56:?? Daniele Bringhenti and Guido Marchetto and Riccardo Sisto and Fulvio Valenza Automation for Network Security Configuration: State of the Art and Research Trends . . . . . . . . . . . . 57:1--57:?? Domenico Amalfitano and Stefano Faralli and Jean Carlo Rossa Hauck and Santiago Matalonga and Damiano Distante Artificial Intelligence Applied to Software Testing: a Tertiary Study . . . 58:1--58:?? Rui Queiroz and Tiago Cruz and Jérôme Mendes and Pedro Sousa and Paulo Simões Container-based Virtualization for Real-time Industrial Systems --- a Systematic Review . . . . . . . . . . . 59:1--59:?? Guoying Qiu and Guoming Tang and Chuandong Li and Lailong Luo and Deke Guo and Yulong Shen Differentiated Location Privacy Protection in Mobile Communication Services: a Survey from the Semantic Perception Perspective . . . . . . . . . 60:1--60:?? Kheng Leong Tan and Chi-Hung Chi and Kwok-Yan Lam Survey on Digital Sovereignty and Identity: From Digitization to Digitalization . . . . . . . . . . . . . 61:1--61:?? Taraneh Ghandi and Hamidreza Pourreza and Hamidreza Mahyar Deep Learning Approaches on Image Captioning: a Review . . . . . . . . . . 62:1--62:?? Haiqin Wu and Boris Düdder and Liangmin Wang and Zhenfu Cao and Jun Zhou and Xia Feng Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture . . . . 63:1--63:?? Hanqing Zhang and Haolin Song and Shaoyu Li and Ming Zhou and Dawei Song A Survey of Controllable Text Generation Using Transformer-based Pre-trained Language Models . . . . . . . . . . . . 64:1--64:?? Oscar Castro and Pierrick Bruneau and Jean-Sébastien Sottet and Dario Torregrossa Landscape of High-Performance Python to Develop Data Science and Machine Learning Applications . . . . . . . . . 65:1--65:?? Dulani Meedeniya and Isuru Ariyarathne and Meelan Bandara and Roshinie Jayasundara and Charith Perera A Survey on Deep Learning Based Forest Environment Sound Classification at the Edge . . . . . . . . . . . . . . . . . . 66:1--66:?? Qi Jia and Yizhu Liu and Siyu Ren and Kenny Q. Zhu Taxonomy of Abstractive Dialogue Summarization: Scenarios, Approaches, and Future Directions . . . . . . . . . 67:1--67:?? Asma Hamissi and Amine Dhraief A Survey on the Unmanned Aircraft System Traffic Management . . . . . . . . . . . 68:1--68:?? Adán José-Garc\'ìa and Julie Jacques and Vincent Sobanski and Clarisse Dhaenens Metaheuristic Biclustering Algorithms: From State-of-the-art to Future Opportunities . . . . . . . . . . . . . 69:1--69:?? Felix Gemeinhardt and Antonio Garmendia and Manuel Wimmer and Benjamin Weder and Frank Leymann Quantum Combinatorial Optimization in the NISQ Era: a Systematic Mapping Study 70:1--70:?? Sanoop Mallissery and Yu-Sung Wu Demystify the Fuzzing Methods: a Comprehensive Survey . . . . . . . . . . 71:1--71:?? Arnav Arora and Preslav Nakov and Momchil Hardalov and Sheikh Muhammad Sarwar and Vibha Nayak and Yoan Dinkov and Dimitrina Zlatkova and Kyle Dent and Ameya Bhatawdekar and Guillaume Bouchard and Isabelle Augenstein Detecting Harmful Content on Online Platforms: What Platforms Need vs. Where Research Efforts Go . . . . . . . . . . 72:1--72:?? Peter Christen and David J. Hand and Nishadi Kirielle A Review of the $F$-Measure: Its History, Properties, Criticism, and Alternatives . . . . . . . . . . . . . . 73:1--73:?? Luís Fiolhais and Leonel Sousa Transient-Execution Attacks: a Computer Architect Perspective . . . . . . . . . 74:1--74:?? Vincenzo Scotti and Licia Sbattella and Roberto Tedesco A Primer on Seq2Seq Models for Generative Chatbots . . . . . . . . . . 75:1--75:?? Ayse Ünsal and Melek Önen Information-Theoretic Approaches to Differential Privacy . . . . . . . . . . 76:1--76:?? Simone Maurizio La Cava and Giulia Orr\`u and Martin Drahansky and Gian Luca Marcialis and Fabio Roli $3$D Face Reconstruction: The Road to Forensics . . . . . . . . . . . . . . . 77:1--77:?? Xiaoyu Xia and Sheik Mohammad Mostakim Fattah and Muhammad Ali Babar A Survey on UAV-Enabled Edge Computing: Resource Management Perspective . . . . 78:1--78:?? Mang Ye and Xiuwen Fang and Bo Du and Pong C. Yuen and Dacheng Tao Heterogeneous Federated Learning: State-of-the-art and Research Challenges 79:1--79:?? Guoyang Xie and Yawen Huang and Jinbao Wang and Jiayi Lyu and Feng Zheng and Yefeng Zheng and Yaochu Jin Cross-modality Neuroimage Synthesis: a Survey . . . . . . . . . . . . . . . . . 80:1--80:??
Ernest Davis Benchmarks for Automated Commonsense Reasoning: a Survey . . . . . . . . . . 81:1--81:?? Marcel André Hoffmann and Rainer Lasch Tackling Industrial Downtimes with Artificial Intelligence in Data-Driven Maintenance . . . . . . . . . . . . . . 82:1--82:?? Jonas Auda and Uwe Gruenefeld and Sarah Faltaous and Sven Mayer and Stefan Schneegass A Scoping Survey on Cross-reality Systems . . . . . . . . . . . . . . . . 83:1--83:?? Josu Diaz-de-Arcaya and Ana I. Torre-Bastida and Gorka Zárate and Raúl Miñón and Aitor Almeida A Joint Study of the Challenges, Opportunities, and Roadmap of MLOps and AIOps: a Systematic Survey . . . . . . . 84:1--84:?? Cristiano Patrício and João C. Neves and Luís F. Teixeira Explainable Deep Learning Methods in Medical Image Classification: a Survey 85:1--85:?? Damien Wohwe Sambo and Anna Förster Wireless Underground Sensor Networks: a Comprehensive Survey and Tutorial . . . 86:1--86:?? Yashar Deldjoo and Fatemeh Nazary and Arnau Ramisa and Julian McAuley and Giovanni Pellegrini and Alejandro Bellogin and Tommaso Di Noia A Review of Modern Fashion Recommender Systems . . . . . . . . . . . . . . . . 87:1--87:?? Muhammad Okky Ibrohim and Cristina Bosco and Valerio Basile Sentiment Analysis for the Natural Environment: a Systematic Review . . . . 88:1--88:?? Meng Qin and Dit-Yan Yeung Temporal Link Prediction: a Unified Framework, Taxonomy, and Review . . . . 89:1--89:?? Weihao Xia and Jing-Hao Xue A Survey on Deep Generative $3$D-aware Image Synthesis . . . . . . . . . . . . 90:1--90:?? Chenhan Zhang and Shui Yu and Zhiyi Tian and James J. Q. Yu Generative Adversarial Networks: a Survey on Attack and Defense Perspective 91:1--91:?? Li Hu and Anli Yan and Hongyang Yan and Jin Li and Teng Huang and Yingying Zhang and Changyu Dong and Chunsheng Yang Defenses to Membership Inference Attacks: a Survey . . . . . . . . . . . 92:1--92:?? Alexandra Kapp and Julia Hansmeyer and Helena Mihaljevi\'c Generative Models for Synthetic Urban Mobility Data: a Systematic Literature Review . . . . . . . . . . . . . . . . . 93:1--93:?? Lingfeng Zhong and Jia Wu and Qian Li and Hao Peng and Xindong Wu A Comprehensive Survey on Automatic Knowledge Graph Construction . . . . . . 94:1--94:?? Pedro Miguel Moás and Carla Teixeira Lopes Automatic Quality Assessment of Wikipedia Articles --- a Systematic Literature Review . . . . . . . . . . . 95:1--95:?? Edan Habler and Ron Bitton and Asaf Shabtai Assessing Aircraft Security: a Comprehensive Survey and Methodology for Evaluation . . . . . . . . . . . . . . . 96:1--96:?? S. Mojtaba Marvasti-Zadeh and Devin Goodsman and Nilanjan Ray and Nadir Erbilgin Early Detection of Bark Beetle Attack Using Remote Sensing and Machine Learning: a Review . . . . . . . . . . . 97:1--97:?? Julio C. S. Dos Anjos and Kassiano J. Matteussi and Fernanda C. Orlandi and Jorge L. V. Barbosa and Jorge Sá Silva and Luiz F. Bittencourt and Cláudio F. R. Geyer A Survey on Collaborative Learning for Intelligent Autonomous Systems . . . . . 98:1--98:?? Huang Huawei and Zhang Qinnan and Li Taotao and Yang Qinglin and Yin Zhaokang and Wu Junhao and Zehui Xiong and Zhu Jianming and Jiajing Wu and Zibin Zheng Economic Systems in the Metaverse: Basics, State of the Art, and Challenges 99:1--99:?? Ronnie De Souza Santos and Paul Ralph and Arham Arshad and Klaas-Jan Stol Distributed Scrum: a Case Meta-analysis 100:1--100:?? Maria Rigaki and Sebastian Garcia A Survey of Privacy Attacks in Machine Learning . . . . . . . . . . . . . . . . 101:1--101:?? Norman W. Paton and Jiaoyan Chen and Zhenyu Wu Dataset Discovery and Exploration: a Survey . . . . . . . . . . . . . . . . . 102:1--102:?? Zhipeng Su and Yixiong Zhang and Jianghong Shi and Xiao-Ping Zhang A Survey of Single Image Rain Removal Based on Deep Learning . . . . . . . . . 103:1--103:?? Akond Rahman and Dibyendu Brinto Bose and Farhat Lamia Barsha and Rahul Pandita Defect Categorization in Compilers: a Multi-vocal Literature Review . . . . . 104:1--104:?? Ling Yang and Zhilong Zhang and Yang Song and Shenda Hong and Runsheng Xu and Yue Zhao and Wentao Zhang and Bin Cui and Ming-Hsuan Yang Diffusion Models: a Comprehensive Survey of Methods and Applications . . . . . . 105:1--105:?? Marvin Wyrich and Justus Bogner and Stefan Wagner 40 Years of Designing Code Comprehension Experiments: a Systematic Mapping Study 106:1--106:?? Thomas Heinis and Roman Sokolovskii and Jamie J. Alnasir Survey of Information Encoding Techniques for DNA . . . . . . . . . . . 107:1--107:??
Amin Hosseiny Marani and Eric P. S. Baumer A Review of Stability in Topic Modeling: Metrics for Assessing and Techniques for Improving Stability . . . . . . . . . . 108:1--108:?? Cigdem Beyan and Alessandro Vinciarelli and Alessio Del Bue Co-Located Human-Human Interaction Analysis Using Nonverbal Cues: a Survey 109:1--109:?? Artur Becker and Carla M. Dal Sasso Freitas Evaluation of XR Applications: a Tertiary Review . . . . . . . . . . . . 110:1--110:?? Wen Fei and Hiroyuki Ohno and Srinivas Sampalli A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions . . . . . . . . . . . 111:1--111:?? Xuke Hu and Zhiyong Zhou and Hao Li and Yingjie Hu and Fuqiang Gu and Jens Kersten and Hongchao Fan and Friederike Klan Location Reference Recognition from Texts: a Survey and Comparison . . . . . 112:1--112:?? Qihan Huang and Haofei Zhang and Mengqi Xue and Jie Song and Mingli Song A Survey of Deep Learning for Low-shot Object Detection . . . . . . . . . . . . 113:1--113:?? Ville Paananen and Mohammad Sina Kiarostami and Lee Lik-Hang and Tristan Braud and Simo Hosio From Digital Media to Empathic Spaces: a Systematic Review of Empathy Research in Extended Reality Environments . . . . . 114:1--114:?? Azra Seyyedi and Mahdi Bohlouli and Seyedehsan Nedaaee Oskoee Machine Learning and Physics: a Survey of Integrated Models . . . . . . . . . . 115:1--115:?? Johann Li and Guangming Zhu and Cong Hua and Mingtao Feng and Basheer Bennamoun and Ping Li and Xiaoyuan Lu and Juan Song and Peiyi Shen and Xu Xu and Lin Mei and Liang Zhang and Syed Afaq Ali Shah and Mohammed Bennamoun A Systematic Collection of Medical Image Datasets for Deep Learning . . . . . . . 116:1--116:?? Zoltán Ádám Mann and Christian Weinert and Daphnee Chabal and Joppe W. Bos Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead . . . . . . . . . . . . . . . 117:1--117:?? Jiayun Luo and Boyang Li and Cyril Leung A Survey of Computer Vision Technologies in Urban and Controlled-environment Agriculture . . . . . . . . . . . . . . 118:1--118:?? Feng Li and Jianfeng Ma and Yinbin Miao and Ximeng Liu and Jianting Ning and Robert H. Deng A Survey on Searchable Symmetric Encryption . . . . . . . . . . . . . . . 119:1--119:?? Vaibhav Jain and Devendra Kumar Sharma and Hari Mohan Gaur and Ashutosh Kumar Singh and Xiaoqing Wen Comprehensive and Comparative Analysis of QCA-based Circuit Designs for Next-generation Computation . . . . . . 120:1--120:?? Yujuan Ding and Zhihui Lai and P. Y. Mok and Tat-Seng Chua Computational Technologies for Fashion Recommendation: a Survey . . . . . . . . 121:1--121:?? Bing Huang and Dipankar Chaki and Athman Bouguettaya and Kwok-Yan Lam A Survey on Conflict Detection in IoT-based Smart Homes . . . . . . . . . 122:1--122:?? Dawei Zhou and Jingrui He Rare Category Analysis for Complex Data: a Review . . . . . . . . . . . . . . . . 123:1--123:?? Adnan Khalid and Zohaib Mushtaq and Saad Arif and Kamran Zeb and Muhammad Attique Khan and Sambit Bakshi Control Schemes for Quadrotor UAV: Taxonomy and Survey . . . . . . . . . . 124:1--124:?? Thomas Hickling and Abdelhafid Zenati and Nabil Aouf and Phillippa Spencer Explainability in Deep Reinforcement Learning: a Review into Current Methods and Applications . . . . . . . . . . . . 125:1--125:?? Zhiqian Chen and Fanglan Chen and Lei Zhang and Taoran Ji and Kaiqun Fu and Liang Zhao and Feng Chen and Lingfei Wu and Charu Aggarwal and Chang-Tien Lu Bridging the Gap between Spatial and Spectral Domains: a Unified Framework for Graph Neural Networks . . . . . . . 126:1--126:?? Debo Cheng and Jiuyong Li and Lin Liu and Jixue Liu and Thuc Duy Le Data-Driven Causal Effect Estimation Based on Graphical Causal Modelling: a Survey . . . . . . . . . . . . . . . . . 127:1--127:?? Santiago Villarreal-Narvaez and Arthur Sluÿters and Jean Vanderdonckt and Radu-Daniel Vatavu Brave New GES World: a Systematic Literature Review of Gestures and Referents in Gesture Elicitation Studies 128:1--128:?? Fangjian Liao and Xingxing Zou and Waikeung Wong Appearance and Pose-guided Human Generation: a Survey . . . . . . . . . . 129:1--129:?? Shiwei Li and Huifeng Guo and Xing Tang and Ruiming Tang and Lu Hou and Ruixuan Li and Rui Zhang Embedding Compression in Recommender Systems: a Survey . . . . . . . . . . . 130:1--130:?? Victor R. Kebande and Ali Ismail Awad Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions . . . . . . . . . . . 131:1--131:?? Aruna Jayasena and Prabhat Mishra Directed Test Generation for Hardware Validation: a Survey . . . . . . . . . . 132:1--132:?? Melike Gecer and Benoit Garbinato Federated Learning for Mobility Applications . . . . . . . . . . . . . . 133:1--133:?? Gengrui Zhang and Fei Pan and Yunhao Mao and Sofia Tijanic and Michael Dang'ana and Shashank Motepalli and Shiquan Zhang and Hans-Arno Jacobsen Reaching Consensus in the Byzantine Empire: a Comprehensive Review of BFT Consensus Algorithms . . . . . . . . . . 134:1--134:??
Marco De Vincenzi and Gianpiero Costantino and Ilaria Matteucci and Florian Fenzl and Christian Plappert and Roland Rieke and Daniel Zelle A Systematic Review on Security Attacks and Countermeasures in Automotive Ethernet . . . . . . . . . . . . . . . . 135:1--135:?? Andrew Wei-Loong Wong and Say Leng Goh and Mohammad Kamrul Hasan and Salmah Fattah Multi-Hop and Mesh for LoRa Networks: Recent Advancements, Issues, and Recommended Applications . . . . . . . . 136:1--136:?? Yanbin Liu and Girish Dwivedi and Farid Boussaid and Mohammed Bennamoun $3$D Brain and Heart Volume Generative Models: a Survey . . . . . . . . . . . . 137:1--137:?? Yanjie Li and Bin Xie and Songtao Guo and Yuanyuan Yang and Bin Xiao A Survey of Robustness and Safety of $2$D and $3$D Deep Learning Models against Adversarial Attacks . . . . . . 138:1--138:?? Changlin Yang and Kwan-Wu Chin and Jiguang Wang and Xiaodong Wang and Ying Liu and Zibin Zheng Scaling Blockchains with Error Correction Codes: a Survey on Coded Blockchains . . . . . . . . . . . . . . 139:1--139:?? Sk Maidul Islam and Subhankar Joardar and Arif Ahmed Sekh A Survey on Fashion Image Retrieval . . 140:1--140:?? Mohammad Hasan Ahmadilivani and Mahdi Taheri and Jaan Raik and Masoud Daneshtalab and Maksim Jenihhin A Systematic Literature Review on Hardware Reliability Assessment Methods for Deep Neural Networks . . . . . . . . 141:1--141:?? Ghareeb Falazi and Uwe Breitenbücher and Frank Leymann and Stefan Schulte Cross-Chain Smart Contract Invocations: a Systematic Multi-Vocal Literature Review . . . . . . . . . . . . . . . . . 142:1--142:?? João Eduardo Costa Gomes and Ricardo Rodrigues Ehlert and Rodrigo Murillo Boesche and Vinicius Santosde Lima and Jorgito Matiuzzi Stocchero and Dante A. C. Barone and JulianoAraujo Wickboldt and Edison Pignaton de Freitas and Julio C. S. dos Anjos and Ricardo Queiroz de Araujo Fernandes Surveying Emerging Network Approaches for Military Command and Control Systems 143:1--143:?? Sabina Szymoniak Key Distribution and Authentication Protocols in Wireless Sensor Networks: a Survey . . . . . . . . . . . . . . . . . 144:1--144:?? Pascal Maniriho and Abdun Naser Mahmood and Mohammad Jabed Morshed Chowdhury A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms . . . . . . 145:1--145:?? Zhisheng Ye and Wei Gao and Qinghao Hu and Peng Sun and Xiaolin Wang and Yingwei Luo and Tianwei Zhang and Yonggang Wen Deep Learning Workload Scheduling in GPU Datacenters: a Survey . . . . . . . . . 146:1--146:?? Ghadeer O. Ghosheh and Jin Li and Tingting Zhu A Survey of Generative Adversarial Networks for Synthesizing Structured Electronic Health Records . . . . . . . 147:1--147:?? Matthew G. Gaber and Mohiuddin Ahmed and Helge Janicke Malware Detection with Artificial Intelligence: a Systematic Literature Review . . . . . . . . . . . . . . . . . 148:1--148:?? Matilde Pato and Márcia Barros and Francisco M. Couto Survey on Recommender Systems for Biomedical Items in Life and Health Sciences . . . . . . . . . . . . . . . . 149:1--149:?? Simon Razniewski and Hiba Arnaout and Shrestha Ghosh and Fabian Suchanek Completeness, Recall, and Negation in Open-world Knowledge Bases: a Survey . . 150:1--150:?? Huaming Chen and M. Ali Babar Security for Machine Learning-based Software Systems: a Survey of Threats, Practices, and Challenges . . . . . . . 151:1--151:?? Kanghua Mo and Peigen Ye and Xiaojun Ren and Shaowei Wang and Wenjun Li and Jin Li Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures . . . . . . . . . . . . 152:1--152:?? Jianping Yao and Son N. Tran and Saurabh Garg and Samantha Sawyer Deep Learning for Plant Identification and Disease Classification from Leaf Images: Multi-prediction Approaches . . 153:1--153:?? Simon Khan and Charles Devlen and Michael Manno and Daqing Hou Mouse Dynamics Behavioral Biometrics: a Survey . . . . . . . . . . . . . . . . . 154:1--154:?? Jack Hughes and Sergio Pastrana and Alice Hutchings and Sadia Afroz and Sagar Samtani and Weifeng Li and Ericsson Santana Marin The Art of Cybercrime Community Research 155:1--155:?? Budhitama Subagdja and D. Shanthoshigaa and Zhaoxia Wang and Ah-Hwee Tan Machine Learning for Refining Knowledge Graphs: a Survey . . . . . . . . . . . . 156:1--156:?? Maryam Zahid and Alessio Bucaioni and Francesco Flammini Model-based Trustworthiness Evaluation of Autonomous Cyber-Physical Production Systems: a Systematic Mapping Study . . 157:1--157:?? Mingliang Dou and Jijun Tang and Prayag Tiwari and Yijie Ding and Fei Guo Drug-Drug Interaction Relation Extraction Based on Deep Learning: a Review . . . . . . . . . . . . . . . . . 158:1--158:?? Jiahang Cao and Jinyuan Fang and Zaiqiao Meng and Shangsong Liang Knowledge Graph Embedding: a Survey from the Perspective of Representation Spaces 159:1--159:?? Marius Becherer and Omar Khadeer Hussain and Yu Zhang and Frank den Hartog and Elizabeth Chang On Trust Recommendations in the Social Internet of Things --- A Survey . . . . 160:1--160:?? Giovanni Ciatto and Federico Sabbatini and Andrea Agiollo and Matteo Magnini and Andrea Omicini Symbolic Knowledge Extraction and Injection with Sub-symbolic Predictors: a Systematic Literature Review . . . . . 161:1--161:??
Roberta Calegari and Fosca Giannotti and Francesca Pratesi and Michela Milano Introduction to Special Issue on Trustworthy Artificial Intelligence . . 162:1--162:?? Peiyun Zhang and Song Ding and Qinglin Zhao Exploiting Blockchain to Make AI Trustworthy: a Software Development Lifecycle View . . . . . . . . . . . . . 163:1--163:?? Nicholas Conlon and Nisar R. Ahmed and Daniel Szafir A Survey of Algorithmic Methods for Competency Self-Assessments in Human-Autonomy Teaming . . . . . . . . . 164:1--164:?? Xiaodan Xing and Huanjun Wu and Lichao Wang and Iain Stenson and May Yong and Javier Del Ser and Simon Walsh and Guang Yang Non-imaging Medical Data Synthesis for Trustworthy AI: a Comprehensive Survey 165:1--165:?? Simon Caton and Christian Haas Fairness in Machine Learning: a Survey 166:1--166:?? Ana C. Lorena and Pedro Y. A. Paiva and Ricardo B. C. Prudêncio Trusting My Predictions: On the Value of Instance-Level Analysis . . . . . . . . 167:1--167:?? Stephanie Milani and Nicholay Topin and Manuela Veloso and Fei Fang Explainable Reinforcement Learning: a Survey and Comparative Review . . . . . 168:1--168:?? Rachid Guerraoui and Nirupam Gupta and Rafael Pinot Byzantine Machine Learning: a Primer . . 169:1--169:?? Adnan Qayyum and Muhammad Atif Butt and Hassan Ali and Muhammad Usman and Osama Halabi and Ala Al-Fuqaha and Qammer H. Abbasi and Muhammad Ali Imran and Junaid Qadir Secure and Trustworthy Artificial Intelligence-extended Reality (AI-XR) for Metaverses . . . . . . . . . . . . . 170:1--170:?? Mario Alfonso Prado-Romero and Bardh Prenkaj and Giovanni Stilo and Fosca Giannotti A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation, and Research Challenges . . 171:1--171:?? Zhijing Wan and Zhixiang Wang and Cheukting Chung and Zheng Wang A Survey of Dataset Refinement for Problems in Computer Vision Datasets . . 172:1--172:?? Qinghua Lu and Liming Zhu and Xiwei Xu and Jon Whittle and Didar Zowghi and Aurelie Jacquet Responsible AI Pattern Catalogue: a Collection of Best Practices for AI Governance and Engineering . . . . . . . 173:1--173:?? Peiyu Xiong and Michael Tegegn and Jaskeerat Singh Sarin and Shubhraneel Pal and Julia Rubin It Is All about Data: a Survey on the Effects of Data on Adversarial Robustness . . . . . . . . . . . . . . . 174:1--174:?? Tarek Chaalan and Shaoning Pang and Joarder Kamruzzaman and Iqbal Gondal and Xuyun Zhang The Path to Defence: a Roadmap to Characterising Data Poisoning Attacks on Victim Models . . . . . . . . . . . . . 175:1--175:?? Jon Perez-Cerrolaza and Jaume Abella and Markus Borg and Carlo Donzella and Jesús Cerquides and Francisco J. Cazorla and Cristofer Englund and Markus Tauber and George Nikolakopoulos and Jose Luis Flores Artificial Intelligence for Safety-Critical Systems in Industrial and Transportation Domains: a Survey . . 176:1--176:?? Chuanjun Zhao and Meiling Wu and Xinyi Yang and Wenyue Zhang and Shaoxia Zhang and Suge Wang and Deyu Li A Systematic Review of Cross-Lingual Sentiment Analysis: Tasks, Strategies, and Prospects . . . . . . . . . . . . . 177:1--177:?? Jiliang Zhang and Congcong Chen and Jinhua Cui and Keqin Li Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures . . . . . . . . . . . 178:1--178:?? Jun Wook Heo and Gowri Sankar Ramachandran and Ali Dorri and Raja Jurdak Blockchain Data Storage Optimisations: a Comprehensive Survey . . . . . . . . . . 179:1--179:?? Cheng Zhang and Bo Ou and Fei Peng and Yao Zhao and Keqin Li A Survey on Reversible Data Hiding for Uncompressed Images . . . . . . . . . . 180:1--180:?? Arian Bakhtiarnia and Qi Zhang and Alexandros Iosifidis Efficient High-Resolution Deep Learning: a Survey . . . . . . . . . . . . . . . . 181:1--181:?? Andrey Rodrigues and Maria Lúcia Villela and Eduardo Feitosa A Systematic Mapping Study on Social Network Privacy: Threats and Solutions 182:1--182:?? Kavous Salehzadeh Niksirat and Lev Velykoivanenko and Noé Zufferey and Mauro Cherubini and Kévin Huguenin and Mathias Humbert Wearable Activity Trackers: a Survey on Utility, Privacy, and Security . . . . . 183:1--183:?? Leila Methnani and Manolis Chiou and Virginia Dignum and Andreas Theodorou Who's in Charge Here? A Survey on Trustworthy AI in Variable Autonomy Robotic Systems . . . . . . . . . . . . 184:1--184:?? Jiajia Wang and Jimmy Xiangji Huang and Xinhui Tu and Junmei Wang and Angela Jennifer Huang and Md Tahmid Rahman Laskar and Amran Bhuiyan Utilizing BERT for Information Retrieval: Survey, Applications, Resources, and Challenges . . . . . . . 185:1--185:?? Ali Shahidinejad and Jemal Abawajy An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT . . . . . . 186:1--186:?? Lihua Zhou and Guowang Du and Kevin Lü and Lizheng Wang and Jingwei Du A Survey and an Empirical Evaluation of Multi-View Clustering Approaches . . . . 187:1--187:?? Yuyang Gao and Siyi Gu and Junji Jiang and Sungsoo Ray Hong and Dazhou Yu and Liang Zhao Going Beyond XAI: a Systematic Survey for Explanation-Guided Learning . . . . 188:1--188:?? Yang Liu and Dingkang Yang and Yan Wang and Jing Liu and Jun Liu and Azzedine Boukerche and Peng Sun and Liang Song Generalized Video Anomaly Event Detection: Systematic Taxonomy and Comparison of Deep Models . . . . . . . 189:1--189:?? Luyao Yang and Osama Amin and Basem Shihada Intelligent Wearable Systems: Opportunities and Challenges in Health and Sports . . . . . . . . . . . . . . . 190:1--190:??
Yingxia Shao and Hongzheng Li and Xizhi Gu and Hongbo Yin and Yawen Li and Xupeng Miao and Wentao Zhang and Bin Cui and Lei Chen Distributed Graph Neural Network Training: a Survey . . . . . . . . . . . 191:1--191:?? Shashank Sheshar Singh and Samya Muhuri and Shivansh Mishra and Divya Srivastava and Harish Kumar Shakya and Neeraj Kumar Social Network Analysis: a Survey on Process, Tools, and Application . . . . 192:1--192:?? Ruchika Malhotra and Anjali Bansal and Marouane Kessentini A Systematic Literature Review on Maintenance of Software Containers . . . 193:1--193:?? Marco Kurzweg and Yannick Weiss and Marc O. Ernst and Albrecht Schmidt and Katrin Wolf Survey on Haptic Feedback through Sensory Illusions in Interactive Systems 194:1--194:?? K. J. Jyothish and Subhankar Mishra A Survey on Robotic Prosthetics: Neuroprosthetics, Soft Actuators, and Control Strategies . . . . . . . . . . . 195:1--195:?? Saleh Mohamed Alhidaifi and Muhammad Rizwan Asghar and Imran Shafique Ansari A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions . . . . . . . . . . . 196:1--196:?? Karen Carrasco and Lenin Tomalá and Eileen Ramírez Meza and Doris Meza Bolaños and Washington Ramírez Montalvan Computational Techniques in PET/CT Image Processing for Breast Cancer: a Systematic Mapping Review . . . . . . . 197:1--197:?? Navin Keizer and Onur Ascigil and Michal Król and Dirk Kutscher and George Pavlou A Survey on Content Retrieval on the Decentralised Web . . . . . . . . . . . 198:1--198:?? Ying Zhao and Jia Tina Du and Jinjun Chen Scenario-based Adaptations of Differential Privacy: a Technical Survey 199:1--199:?? Isabela Borlido Barcelos and Felipe De Castro Belém and Leonardo De Melo João and Zenilton K. G. Do Patrocínio and Alexandre Xavier Falcão and Silvio Jamil Ferzoli Guimarães A Comprehensive Review and New Taxonomy on Superpixel Segmentation . . . . . . . 200:1--200:?? Weiwei Jiang and Jorge Goncalves and Vassilis Kostakos Mobile Near-infrared Sensing --- a Systematic Review on Devices, Data, Modeling, and Applications . . . . . . . 201:1--201:?? Mariana Segovia-Ferreira and Jose Rubio-Hernan and Ana Cavalli and Joaquin Garcia-Alfaro A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems . . . . . . . 202:1--202:?? Bing Zhang and Xuyang Zhao and Jiangtian Nie and Jianhang Tang and Yuling Chen and Yang Zhang and Dusit Niyato Epidemic Model-based Network Influential Node Ranking Methods: a Ranking Rationality Perspective . . . . . . . . 203:1--203:?? Raza Nowrozy and Khandakar Ahmed and A. S. M. Kayes and Hua Wang and Timothy R. McIntosh Privacy Preservation of Electronic Health Records in the Modern Era: a Systematic Survey . . . . . . . . . . . 204:1--204:?? Sarah Elder and Md Rayhanur Rahman and Gage Fringer and Kunal Kapoor and Laurie Williams A Survey on Software Vulnerability Exploitability Assessment . . . . . . . 205:1--205:?? Andre Rodrigues Oliveira and Klairton Lima Brito and Alexsandro Oliveira Alexandrino and Gabriel Siqueira and Ulisses Dias and Zanoni Dias Rearrangement Distance Problems: an updated survey . . . . . . . . . . . . . 206:1--206:?? Shubhra Jain and Rahul Kumar Verma A Taxonomy and Survey on Grid-Based Routing Protocols Designed for Wireless Sensor Networks . . . . . . . . . . . . 207:1--207:?? Tommaso Lanciano and Atsushi Miyauchi and Adriano Fazzone and Francesco Bonchi A Survey on the Densest Subgraph Problem and its Variants . . . . . . . . . . . . 208:1--208:?? Maroua Masmoudi and Sana Ben Abdallah Ben Lamine and Mohamed Hedi Karray and Bernard Archimede and Hajer Baazaoui Zghal Semantic Data Integration and Querying: a Survey and Challenges . . . . . . . . 209:1--209:?? Ahmed Amine Chafik and Jaafar Gaber and Souad Tayane and Mohamed Ennaji and Julien Bourgeois and Tarek El Ghazawi From Conventional to Programmable Matter Systems: a Review of Design, Materials, and Technologies . . . . . . . . . . . . 210:1--210:?? Pengyuan Lu and Lin Zhang and Mengyu Liu and Kaustubh Sridhar and Oleg Sokolsky and Fanxin Kong and Insup Lee Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory Works . . . . . . . . . 211:1--211:?? Jason Gray and Daniele Sgandurra and Lorenzo Cavallaro and Jorge Blasco Alis Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets 212:1--212:?? Akrati Saxena and George Fletcher and Mykola Pechenizkiy FairSNA: Algorithmic Fairness in Social Network Analysis . . . . . . . . . . . . 213:1--213:?? Anna Angelogianni and Ilias Politis and Christos Xenakis How many FIDO protocols are needed? Analysing the technology, security and compliance . . . . . . . . . . . . . . . 214:1--214:?? Yazan Otoum and Navya Gottimukkala and Neeraj Kumar and Amiya Nayak Machine Learning in Metaverse Security: Current Solutions and Future Challenges 215:1--215:??
Fei Zhao and Chengcui Zhang and Baocheng Geng Deep Multimodal Data Fusion . . . . . . 216:1--216:?? Navid Mohammadi Foumani and Lynn Miller and Chang Wei Tan and Geoffrey I. Webb and Germain Forestier and Mahsa Salehi Deep Learning for Time Series Classification and Extrinsic Regression: a Current Survey . . . . . . . . . . . . 217:1--217:?? Monowar Hasan and Ashish Kashinath and Chien-Ying Chen and Sibin Mohan SoK: Security in Real-Time Systems . . . 218:1--218:?? Jasmina Gajcin and Ivana Dusparic Redefining Counterfactual Explanations for Reinforcement Learning: Overview, Challenges and Opportunities . . . . . . 219:1--219:?? Kelvin Du and Frank Xing and Rui Mao and Erik Cambria Financial Sentiment Analysis: Techniques and Applications . . . . . . . . . . . . 220:1--220:?? Na Li and Rui Zhou and Bharath Krishna and Ashirbad Pradhan and Hyowon Lee and Jiayuan He and Ning Jiang Non-invasive Techniques for Muscle Fatigue Monitoring: a Comprehensive Survey . . . . . . . . . . . . . . . . . 221:1--221:?? Cristian Daniele and Seyed Behnam Andarzian and Erik Poll Fuzzers for Stateful Systems: Survey and Research Directions . . . . . . . . . . 222:1--222:?? Kien Nguyen and Hugo Proença and Fernando Alonso-Fernandez Deep Learning for Iris Recognition: a Survey . . . . . . . . . . . . . . . . . 223:1--223:?? Anita Khadka and Saurav Sthapit and Gregory Epiphaniou and Carsten Maple Resilient Machine Learning: Advancement, Barriers, and Opportunities in the Nuclear Industry . . . . . . . . . . . . 224:1--224:?? Shuai Huo and Dong Liu and Haotian Zhang and Li Li and Siwei Ma and Feng Wu and Wen Gao Towards Hybrid-Optimization Video Coding 225:1--225:?? Najah Abed Abu Ali and Mubashir Rehman and Shahid Mumtaz and Muhammad Bilal Khan and Mohammad Hayajneh and Farman Ullah and Raza Ali Shah Contactless Diseases Diagnoses Using Wireless Communication Sensing: Methods and Challenges Survey . . . . . . . . . 226:1--226:?? Upendra Singh and Kumar Abhishek and Hiteshwar Kumar Azad A Survey of Cutting-edge Multimodal Sentiment Analysis . . . . . . . . . . . 227:1--227:?? Shiyu Wang and Yuanqi Du and Xiaojie Guo and Bo Pan and Zhaohui Qin and Liang Zhao Controllable Data Generation by Deep Learning: a Review . . . . . . . . . . . 228:1--228:?? Felix Truger and Johanna Barzen and Marvin Bechtold and Martin Beisel and Frank Leymann and Alexander Mandl and Vladimir Yussupov Warm-Starting and Quantum Computing: a Systematic Mapping Study . . . . . . . . 229:1--229:?? Junyi Li and Tianyi Tang and Wayne Xin Zhao and Jian-Yun Nie and Ji-Rong Wen Pre-Trained Language Models for Text Generation: a Survey . . . . . . . . . . 230:1--230:?? Ricardo Amaro and Rúben Pereira and Miguel Mira da Silva DevOps Metrics and KPIs: a Multivocal Literature Review . . . . . . . . . . . 231:1--231:?? Siwen Luo and Hamish Ivison and Soyeon Caren Han and Josiah Poon Local Interpretations for Explainable Natural Language Processing: a Survey 232:1--232:?? Saima Sultana and Muhammad Mansoor Alam and Mazliham Mohd Su'ud and Jawahir Che Mustapha and Mukesh Prasad A Deep Dive into Robot Vision --- an Integrative Systematic Literature Review Methodologies and Research Endeavor Practices . . . . . . . . . . . . . . . 233:1--233:?? Laércio Pioli and Douglas D. J. de Macedo and Daniel G. Costa and Mario A. R. Dantas Intelligent Edge-powered Data Reduction: a Systematic Literature Review . . . . . 234:1--234:?? Weiqi Li Optimizing with Attractor: a Tutorial 235:1--235:?? Gyuwon Jung and Sangjun Park and Eun-Yeol Ma and Heeyoung Kim and Uichin Lee Tutorial on Matching-based Causal Analysis of Human Behaviors Using Smartphone Sensor Data . . . . . . . . . 236:1--236:?? A'aeshah Alhakamy Extended Reality (XR) Toward Building Immersive Solutions: The Key to Unlocking Industry 4.0 . . . . . . . . . 237:1--237:?? Pau-Chen Cheng and Wojciech Ozga and Enriquillo Valdez and Salman Ahmed and Zhongshu Gu and Hani Jamjoom and Hubertus Franke and James Bottomley Intel TDX Demystified: a Top-Down Approach . . . . . . . . . . . . . . . . 238:1--238:?? Giovanni Maria Biancofiore and Yashar Deldjoo and Tommaso Di Noia and Eugenio Di Sciascio and Fedelucio Narducci Interactive Question Answering Systems: Literature Review . . . . . . . . . . . 239:1--239:?? Lingyun Wang and Hanlin Zhou and Yinwei Bao and Xiaoran Yan and Guojiang Shen and Xiangjie Kong Horizontal Federated Recommender System: a Survey . . . . . . . . . . . . . . . . 240:1--240:?? Priyanshu Priya and Mauajama Firdaus and Asif Ekbal Computational Politeness in Natural Language Processing: a Survey . . . . . 241:1--241:?? Minghui Xu and Yihao Guo and Chunchi Liu and Qin Hu and Dongxiao Yu and Zehui Xiong and Niyato, Dusit (Tao) and Xiuzhen Cheng Exploring Blockchain Technology through a Modular Lens: a Survey . . . . . . . . 242:1--242:??
Jean-Gabriel Gaudreault and Paula Branco A Systematic Literature Review of Novelty Detection in Data Streams: Challenges and Opportunities . . . . . . 243:1--243:?? Huiyuan Lai and Malvina Nissim A Survey on Automatic Generation of Figurative Language: From Rule-based Systems to Large Language Models . . . . 244:1--244:?? Xiaojie Wang and Qi Guo and Zhaolong Ning and Lei Guo and Guoyin Wang and Xinbo Gao and Yan Zhang Integration of Sensing, Communication, and Computing for Metaverse: a Survey 245:1--245:?? Alvaro Novo and Francisco Lobon and Hector Garcia de Marina and Samuel Romero and Francisco Barranco Neuromorphic Perception and Navigation for Mobile Robots: a Review . . . . . . 246:1--246:?? Meng Shen and Zhehui Tan and Dusit Niyato and Yuzhi Liu and Jiawen Kang and Zehui Xiong and Liehuang Zhu and Wei Wang and Shen, Xuemin (Sherman) Artificial Intelligence for Web 3.0: a Comprehensive Survey . . . . . . . . . . 247:1--247:?? Max Sponner and Bernd Waschneck and Akash Kumar Adapting Neural Networks at Runtime: Current Trends in At-Runtime Optimizations for Deep Learning . . . . 248:1--248:?? Juncheng Li and Zehua Pei and Wenjie Li and Guangwei Gao and Longguang Wang and Yingqian Wang and Tieyong Zeng A Systematic Survey of Deep Learning-Based Single-Image Super-Resolution . . . . . . . . . . . . 249:1--249:?? Hilda Hadan and Lydia Choong and Leah Zhang-Kennedy and Lennart E. Nacke Deceived by Immersion: a Systematic Analysis of Deceptive Design in Extended Reality . . . . . . . . . . . . . . . . 250:1--250:?? Muhammad Adil and Houbing Song and Mian Ahmad Jan and Muhammad Khurram Khan and Xiangjian He and Ahmed Farouk and Zhanpeng Jin UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions . . . . . . . . . . 251:1--251:?? Yoosof Mashayekhi and Nan Li and Bo Kang and Jefrey Lijffijt and Tijl De Bie A Challenge-based Survey of E-recruitment Recommendation Systems . . 252:1--252:?? Paul Kiyambu Mvula and Paula Branco and Guy-Vincent Jourdan and Herna Lydia Viktor A Survey on the Applications of Semi-supervised Learning to Cyber-security . . . . . . . . . . . . . 253:1--253:?? Rita Suzana Pitangueira Maciel and Pedro Henrique Dias Valle and Kécia Souza Santos and Elisa Yumi Nakagawa Systems Interoperability Types: a Tertiary Study . . . . . . . . . . . . . 254:1--254:?? Gita Sarafraz and Armin Behnamnia and Mehran Hosseinzadeh and Ali Balapour and Amin Meghrazi and Hamid R. Rabiee Domain Adaptation and Generalization of Functional Medical Data: a Systematic Survey of Brain Data . . . . . . . . . . 255:1--255:?? Paulo Souza and Tiago Ferreto and Rodrigo Calheiros Maintenance Operations on Cloud, Edge, and IoT Environments: Taxonomy, Survey, and Research Challenges . . . . . . . . 256:1--256:?? James Halvorsen and Clemente Izurieta and Haipeng Cai and Assefaw Gebremedhin Applying Generative Machine Learning to Intrusion Detection: a Systematic Mapping Study and Review . . . . . . . . 257:1--257:?? Yanna Jiang and Baihe Ma and Xu Wang and Guangsheng Yu and Ping Yu and Zhe Wang and Wei Ni and Ren Ping Liu Blockchained Federated Learning for Internet of Things: a Comprehensive Survey . . . . . . . . . . . . . . . . . 258:1--258:?? Vasileios Tsoukas and Anargyros Gkogkidis and Eleni Boumpa and Athanasios Kakarountas A Review on the emerging technology of TinyML . . . . . . . . . . . . . . . . . 259:1--259:?? Mishri AlMarshoud and Mehmet Sabir Kiraz and Ali H. Al-Bayatti Security, Privacy, and Decentralized Trust Management in VANETs: a Review of Current Research and Future Directions 260:1--260:?? Jiani Huang and Haihua Chen and Fengchang Yu and Wei Lu From Detection to Application: Recent Advances in Understanding Scientific Tables and Figures . . . . . . . . . . . 261:1--261:?? Jiajun Wu and Fan Dong and Henry Leung and Zhuangdi Zhu and Jiayu Zhou and Steve Drew Topology-aware Federated Learning in Edge Computing: a Comprehensive Survey 262:1--262:?? Mostafa Haghir Chehreghani A Review on the Impact of Data Representation on Model Explainability 263:1--263:?? Paul Pu Liang and Amir Zadeh and Louis-Philippe Morency Foundations & Trends in Multimodal Machine Learning: Principles, Challenges, and Open Questions . . . . . 264:1--264:?? Kartik Sharma and Yeon-Chang Lee and Sivagami Nambi and Aditya Salian and Shlok Shah and Sang-Wook Kim and Srijan Kumar A Survey of Graph Neural Networks for Social Recommender Systems . . . . . . . 265:1--265:?? Chamara Sandeepa and Bartlomiej Siniarski and Nicolas Kourtellis and Shen Wang and Madhusanka Liyanage A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks . . 266:1--266:?? Hou-I Liu and Marco Galindo and Hongxia Xie and Lai-Kuan Wong and Hong-Han Shuai and Yung-Hui Li and Wen-Huang Cheng Lightweight Deep Learning for Resource-Constrained Environments: a Survey . . . . . . . . . . . . . . . . . 267:1--267:?? Shangsong Liang and Zhou Pan and wei liu and Jian Yin and Maarten de Rijke A Survey on Variational Autoencoders in Recommender Systems . . . . . . . . . . 268:1--268:??
Jirat Pasuksmit and Patanamon Thongtanunam and Shanika Karunasekera A Systematic Literature Review on Reasons and Approaches for Accurate Effort Estimations in Agile . . . . . . 269:1--269:?? Alexandre Heuillet and Ahmad Nasser and Hichem Arioui and Hedi Tabia Efficient Automation of Neural Network Design: a Survey on Differentiable Neural Architecture Search . . . . . . . 270:1--270:?? Anthony Paproki and Olivier Salvado and Clinton Fookes Synthetic Data for Deep Learning in Computer Vision & Medical Imaging: a Means to Reduce Data Bias . . . . . . . 271:1--271:?? Carlos Núñez-Molina and Pablo Mesejo and Juan Fernández-Olivares A Review of Symbolic, Subsymbolic and Hybrid Methods for Sequential Decision Making . . . . . . . . . . . . . . . . . 272:1--272:?? Wanying Liang and Pasquale De Meo and Yong Tang and Jia Zhu A Survey of Multi-modal Knowledge Graphs: Technologies and Trends . . . . 273:1--273:?? Karolina Selwon and Julian Szyma\'nski A Review of Explainable Fashion Compatibility Modeling Methods . . . . . 274:1--274:?? Shashikiran Venkatesha and Ranjani Parthasarathi Survey on Redundancy Based-Fault tolerance methods for Processors and Hardware accelerators --- Trends in Quantum Computing, Heterogeneous Systems and Reliability . . . . . . . . . . . . 275:1--275:?? Jordan Tewell and Nimesha Ranasinghe A Review of Olfactory Display Designs for Virtual Reality Environments . . . . 276:1--276:?? Maryam Mozaffari and Anton Dignös and Johann Gamper and Uta Störl Self-tuning Database Systems: a Systematic Literature Review of Automatic Database Schema Design and Tuning . . . . . . . . . . . . . . . . . 277:1--277:?? Tristan Bilot and Nour El Madhoun and Khaldoun Al Agha and Anis Zouaoui A Survey on Malware Detection with Graph Representation Learning . . . . . . . . 278:1--278:?? Zhen Jia and Zhang Zhang and Liang Wang and Tieniu Tan Human Image Generation: a Comprehensive Survey . . . . . . . . . . . . . . . . . 279:1--279:?? Ankur Gupta and Sahil Sawhney and Kashyap Kompella The First Principles: Setting the Context for a Safe and Secure Metaverse 280:1--280:?? Fan Mo and Zahra Tarkhani and Hamed Haddadi Machine Learning with Confidential Computing: a Systematization of Knowledge . . . . . . . . . . . . . . . 281:1--281:?? Francesco Periti and Stefano Montanelli Lexical Semantic Change through Large Language Models: a Survey . . . . . . . 282:1--282:?? Giorgio Franceschelli and Mirco Musolesi Creativity and Machine Learning: a Survey . . . . . . . . . . . . . . . . . 283:1--283:?? Nilotpal Biswas and Anamitra Mukherjee and Samit Bhattacharya ``Are you feeling sick?'' --- a systematic literature review of cybersickness in virtual reality . . . . 284:1--284:?? Luís Manuel Meruje Ferreira and Fabio Coelho and José Pereira Databases in Edge and Fog Environments: a Survey . . . . . . . . . . . . . . . . 285:1--285:?? Behrouz Zolfaghari and Mostafa Abbasmollaei and Fahimeh Hajizadeh and Naoto Yanai and Khodakhast Bibak Secure UAV (Drone) and the Great Promise of AI . . . . . . . . . . . . . . . . . 286:1--286:?? Adyasha Dash and Kathleen Agres AI-Based Affective Music Generation Systems: a Review of Methods and Challenges . . . . . . . . . . . . . . . 287:1--287:?? Yiming Wang and Bin Zhang and Lamei Di Research Progress of EEG-Based Emotion Recognition: a Survey . . . . . . . . . 288:1--288:?? Jessica Woodgate and Nirav Ajmeri Macro Ethics Principles for Responsible AI Systems: Taxonomy and Directions . . 289:1--289:?? Debendra Das Sharma and Robert Blankenship and Daniel Berger An Introduction to the Compute Express Link (CXL) Interconnect . . . . . . . . 290:1--290:?? Fabio De Sousa Ribeiro and Kevin Duarte and Miles Everett and Georgios Leontidis and Mubarak Shah Object-centric Learning with Capsule Networks: a Survey . . . . . . . . . . . 291:1--291:?? Katrin Hartwig and Frederic Doell and Christian Reuter The Landscape of User-centered Misinformation Interventions --- a Systematic Literature Review . . . . . . 292:1--292:?? Xiaoyan Zhao and Yang Deng and Min Yang and Lingzhi Wang and Rui Zhang and Hong Cheng and Wai Lam and Ying Shen and Ruifeng Xu A Comprehensive Survey on Relation Extraction: Recent Advances and New Frontiers . . . . . . . . . . . . . . . 293:1--293:??
Hassan Gharoun and Fereshteh Momenifar and Fang Chen and Amir Gandomi Meta-learning Approaches for Few-Shot Learning: a Survey of Recent Advances 294:1--294:?? Shijie Chen and Yu Zhang and Qiang Yang Multi-Task Learning in Natural Language Processing: an Overview . . . . . . . . 295:1--295:?? Jiaxu Leng and Yongming Ye and Mengjingcheng Mo and Chenqiang Gao and Ji Gan and Bin Xiao and Xinbo Gao Recent Advances for Aerial Object Detection: a Survey . . . . . . . . . . 296:1--296:?? Bruce X. B. Yu and Jianlong Chang and Haixin Wang and Lingbo Liu and Shijie Wang and Zhiyu Wang and Junfan Lin and Lingxi Xie and Haojie Li and Zhouchen Lin and Qi Tian and Chang Wen Chen Visual Tuning . . . . . . . . . . . . . 297:1--297:?? Wei Liang and Yaqin Liu and Ce Yang and Songyou Xie and Kuanching Li and Willy Susilo On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: a Comprehensive Survey . . . . . . . . . . 298:1--298:?? Zain Ul Abideen and Sumathi Gokulanathan and Muayad J. Aljafar and Samuel Pagliarini An Overview of FPGA-inspired Obfuscation Techniques . . . . . . . . . . . . . . . 299:1--299:?? Jacob Krüger and Yi Li and Kirill Lossev and Chenguang Zhu and Marsha Chechik and Thorsten Berger and Julia Rubin A Meta-Study of Software-Change Intentions . . . . . . . . . . . . . . . 300:1--300:?? Katie Seaborn and Jaqueline Urakami and Peter Pennefather and Norihisa Miyake Qualitative Approaches to Voice UX . . . 301:1--301:?? Agnaldo de Souza Batista and Aldri Luiz Dos Santos A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques . . . . . . . . . . . 302:1--302:?? Raphael Elikplim Nkrow and Bruno Silva and Dutliff Boshoff and Gerhard Hancke and Mikael Gidlund and Adnan Abu-Mahfouz NLOS Identification and Mitigation for Time-based Indoor Localization Systems: Survey and Future Research Directions 303:1--303:?? Fei Yu and Hongbo Zhang and Prayag Tiwari and Benyou Wang Natural Language Reasoning, A Survey . . 304:1--304:?? Mahmoud Salaheldin Kasem and Abdelrahman Abdallah and Alexander Berendeyev and Ebrahem Elkady and Mohamed Mahmoud and Mahmoud Abdalla and Mohamed Hamada and Sebastiano Vascon and Daniyar Nurseitov and Islam Taj-Eddin Deep Learning for Table Detection and Structure Recognition: a Survey . . . . 305:1--305:?? Shaoxiong Ji and Xiaobo Li and Wei Sun and Hang Dong and Ara Taalas and Yijia Zhang and Honghan Wu and Esa Pitkänen and Pekka Marttinen A Unified Review of Deep Learning for Automated Medical Coding . . . . . . . . 306:1--306:?? Huandong Wang and Huan Yan and Can Rong and Yuan Yuan and Fenyu Jiang and Zhenyu Han and Hongjie Sui and Depeng Jin and Yong Li Multi-scale Simulation of Complex Systems: a Perspective of Integrating Knowledge and Data . . . . . . . . . . . 307:1--307:?? Nirupama Ravi and C. Mani Krishna and Israel Koren Mix-Zones as an Effective Privacy Enhancing Technique in Mobile and Vehicular Ad-hoc Networks . . . . . . . 308:1--308:?? Yao Wan and Zhangqian Bi and Yang He and Jianguo Zhang and Hongyu Zhang and Yulei Sui and Guandong Xu and Hai Jin and Philip Yu Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit . . . . . 309:1--309:?? Pietro Melzi and Christian Rathgeb and Ruben Tolosana and Ruben Vera-Rodriguez and Christoph Busch An Overview of Privacy-Enhancing Technologies in Biometric Recognition 310:1--310:?? Lianying Zhao and He Shuang and Shengjie Xu and Wei Huang and Rongzhen Cui and Pushkar Bettadpur and David Lie A Survey of Hardware Improvements to Secure Program Execution . . . . . . . . 311:1--311:?? Sahil Verma and Varich Boonsanong and Minh Hoang and Keegan Hines and John Dickerson and Chirag Shah Counterfactual Explanations and Algorithmic Recourses for Machine Learning: a Review . . . . . . . . . . . 312:1--312:?? Miguel G. Silva and Sara C. Madeira and Rui Henriques A Comprehensive Survey on Biclustering-based Collaborative Filtering . . . . . . . . . . . . . . . 313:1--313:?? Mohd Saqib and Samaneh Mahdavifar and Benjamin C. M. Fung and Philippe Charland A Comprehensive Analysis of Explainable AI for Malware Hunting . . . . . . . . . 314:1--314:?? Uchitha Rajapaksha and Ferdous Sohel and Hamid Laga and Dean Diepeveen and Mohammed Bennamoun Deep Learning-based Depth Estimation Methods from Monocular Image and Videos: a Comprehensive Survey . . . . . . . . . 315:1--315:?? Junxue Zhang and Xiaodian Cheng and Liu Yang and Jinbin Hu and Ximeng Liu and Kai Chen SoK: Fully Homomorphic Encryption Accelerators . . . . . . . . . . . . . . 316:1--316:?? Yuecong Xu and Haozhi Cao and Lihua Xie and Xiao-li Li and Zhenghua Chen and Jianfei Yang Video Unsupervised Domain Adaptation with Deep Learning: a Comprehensive Survey . . . . . . . . . . . . . . . . . 317:1--317:?? Hannes Mandler and Bernhard Weigand A review and benchmark of feature importance methods for neural networks 318:1--318:?? Jingxue Chen and Hang Yan and Zhiyuan Liu and Min Zhang and Hu Xiong and Shui Yu When Federated Learning Meets Privacy-Preserving Computation . . . . . 319:1--319:??
Hakimeh Mazaheri and Salman Goli and Ali Nourollah A survey of $3$D Space Path-Planning Methods and Algorithms . . . . . . . . . 1:1--1:?? Ziyao Liu and Yu Jiang and Jiyuan Shen and Minyi Peng and Kwok-Yan Lam and Xingliang Yuan and Xiaoning Liu A Survey on Federated Unlearning: Challenges, Methods, and Future Directions . . . . . . . . . . . . . . . 2:1--2:?? Thanh Toan Nguyen and Nguyen Quoc Viet hung and Thanh Tam Nguyen and Thanh Trung Huynh and Thanh Thi Nguyen and Matthias Weidlich and Hongzhi Yin Manipulating Recommender Systems: a Survey of Poisoning Attacks and Countermeasures . . . . . . . . . . . . 3:1--3:?? Can Rong and Jingtao Ding and Yong Li An Interdisciplinary Survey on Origin-destination Flows Modeling: Theory and Techniques . . . . . . . . . 4:1--4:?? Imran Ashraf and Yousaf Bin Zikria and Sahil Garg and Soojung Hur and Yongwan Park and Mohsen Guizani Enabling Technologies and Techniques for Floor Identification . . . . . . . . . . 5:1--5:?? Chamath Amarasinghe and Nimesha Ranasinghe Digital Food Sensing and Ingredient Analysis Techniques to Facilitate Human-Food Interface Designs . . . . . . 6:1--6:?? Ansam Khraisat and Ammar Alazab and Sarabjot Singh and Tony Jan and Alfredo Jr. Gomez Survey on Federated Learning for Intrusion Detection System: Concept, Architectures, Aggregation Strategies, Challenges, and Future Directions . . . 7:1--7:?? Yao Zhao and Youyang Qu and Yong Xiang and Md Palash Uddin and Dezhong Peng and Longxiang Gao A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends . . . . . . . . . . . . . 8:1--8:?? Gayathri T. and Mamatha HR How to Improve Video Analytics with Action Recognition: a Survey . . . . . . 9:1--9:?? Longbing Cao and Qing Liu COVID-19 Modeling: a Review . . . . . . 10:1--10:?? Abel Goedegebuure and Indika Kumara and Stefan Driessen and Willem-Jan Van Den Heuvel and Geert Monsieur and Damian Andrew Tamburri and Dario Di Nucci Data Mesh: a Systematic Gray Literature Review . . . . . . . . . . . . . . . . . 11:1--11:?? Bader Al-Sada and Alireza Sadighian and Gabriele Oligeri MITRE ATT&CK: State of the Art and Way Forward . . . . . . . . . . . . . . . . 12:1--12:?? Abdul Razzaq and Jim Buckley and Qin Lai and Tingting Yu and Goetz Botterweck A Systematic Literature Review on the Influence of Enhanced Developer Experience on Developers' Productivity: Factors, Practices, and Recommendations 13:1--13:?? Kathryn Kasmarik and Mahtab Khani and Shadi Abpeikar and Michael Barlow and Olivia Carter and Muireann Irish Competence Awareness for Humans and Machines: a Survey and Future Research Directions from Psychology . . . . . . . 14:1--14:?? Zahra Zamanzadeh Darban and Geoffrey I. Webb and Shirui Pan and Charu Aggarwal and Mahsa Salehi Deep Learning for Time Series Anomaly Detection: a Survey . . . . . . . . . . 15:1--15:?? Farhana Sharief and Humaira Ijaz and Mohammad Shojafar and Muhammad Asif Naeem Multi-Class Imbalanced Data Handling with Concept Drift in Fog Computing: a Taxonomy, Review, and Future Directions 16:1--16:?? Chayan Banerjee and Kien Nguyen and Clinton Fookes and Karniadakis George Physics-Informed Computer Vision: a Review and Perspectives . . . . . . . . 17:1--17:?? Timothy McIntosh and Teo Susnjak and Tong Liu and Dan Xu and Paul Watters and Dongwei Liu and Yaqi Hao and Alex Ng and Malka Halgamuge Ransomware Reloaded: Re-examining Its Trend, Research and Mitigation in the Era of Data Exfiltration . . . . . . . . 18:1--18:?? Branislav Pecher and Ivan Srba and Maria Bielikova A Survey on Stability of Learning with Limited Labelled Data and its Sensitivity to the Effects of Randomness 19:1--19:?? Bakary Badjie and José Cecílio and Antonio Casimiro Adversarial Attacks and Countermeasures on Image Classification-based Deep Learning Models in Autonomous Driving Systems: a Systematic Review . . . . . . 20:1--20:?? Ahmed Fahmin and Muhammad Aamir Cheema and Mohammed Eunus Ali and Adel Nadjaran Toosi and Hua Lu and Huan Li and David Taniar and Hesham A. Rakha and Bojie Shen Eco-Friendly Route Planning Algorithms: Taxonomies, Literature Review and Future Directions . . . . . . . . . . . . . . . 21:1--21:?? Daniela Pais and Susana Brás and Raquel Sebastião A Review on the Use of Physiological Signals for Assessing Postoperative Pain 22:1--22:?? Ruyan Lin and Yulong Fu and Wei Yi and Jincheng Yang and Jin Cao and Zhiqiang Dong and Fei Xie and Hui Li Vulnerabilities and Security Patches Detection in OSS: a Survey . . . . . . . 23:1--23:?? Leandro Lanzieri and Gianluca Martino and Goerschwin Fey and Holger Schlarb and Thomas C. Schmidt and Matthias Wählisch A Review of Techniques for Ageing Detection and Monitoring on Embedded Systems . . . . . . . . . . . . . . . . 24:1--24:?? Matineh Pooshideh and Amin Beheshti and Yuankai Qi and Helia Farhood and Mike Simpson and Nick Gatland and Mehdi Soltany Presentation Attack Detection: a Systematic Literature Review . . . . . . 25:1--25:??
Qidong Liu and Jiaxi Hu and Yutian Xiao and Xiangyu Zhao and Jingtong Gao and Wanyu Wang and Qing Li and Jiliang Tang Multimodal Recommender Systems: a Survey 26:1--26:?? Lingkai Meng and Yu Shao and Long Yuan and Longbin Lai and Peng Cheng and Xue Li and Wenyuan Yu and Wenjie Zhang and Xuemin Lin and Jingren Zhou A Survey of Distributed Graph Algorithms on Massive Graphs . . . . . . . . . . . 27:1--27:?? Zhenyu Yang and Ge Zhang and Jia Wu and Jian Yang and Quan Z. Sheng and Shan Xue and Chuan Zhou and Charu Aggarwal and Hao Peng and Wenbin Hu and Edwin Hancock and Pietro Li\`o State of the Art and Potentialities of Graph-level Learning . . . . . . . . . . 28:1--28:?? Anqi Wang and Jiahua Dong and Lik-Hang Lee and Jiachuan Shen and Pan Hui A Survey on Deep Learning for Design and Generation of Virtual Architecture . . . 29:1--29:?? Tianyu Zhang and Gang Wang and Chuanyu Xue and Jiachen Wang and Mark Nixon and Song Han Time-Sensitive Networking (TSN) for Industrial Automation: Current Advances and Future Directions . . . . . . . . . 30:1--30:?? Sravan S. S. and Susmita Mandal and PJA Alphonse and P. L. Ramesh A Partial Offline Payment System for Connecting the Unconnected Using Internet of Things: a Survey . . . . . . 31:1--31:?? Zhiyuan Wei and Jing Sun and Zijian Zhang and Xianhao Zhang and Xiaoxuan Yang and Liehuang Zhu Survey on Quality Assurance of Smart Contracts . . . . . . . . . . . . . . . 32:1--32:?? Meike Helena Kombrink and Zeno Jean Marius Hubert Geradts and Marcel Worring Image Steganography Approaches and Their Detection Strategies: a Survey . . . . . 33:1--33:?? Manali Patel and Krupa Jariwala and Chiranjoy Chattopadhyay A Systematic Review on Graph Neural Network-based Methods for Stock Market Forecasting . . . . . . . . . . . . . . 34:1--34:?? Xiaohan Zhang and Cen Zhang and Xinghua Li and Zhengjie Du and Bing Mao and Yuekang Li and Yaowen Zheng and Yeting Li and Li Pan and Yang Liu and Robert Deng A Survey of Protocol Fuzzing . . . . . . 35:1--35:?? Kai Huang and Zhengzi Xu and Su Yang and Hongyu Sun and Xuejun Li and Zheng Yan and Yuqing Zhang Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities . . . . . . . . . . . . . 36:1--36:?? Chengtai Cao and Fan Zhou and Yurou Dai and Jianping Wang and Kunpeng Zhang A Survey of Mix-based Data Augmentation: Taxonomy, Methods, Applications, and Explainability . . . . . . . . . . . . . 37:1--37:?? Rahul Kumar and Manish Bhanu and João Mendes-Moreira and Joydeep Chandra Spatio-Temporal Predictive Modeling Techniques for Different Domains: a Survey . . . . . . . . . . . . . . . . . 38:1--38:?? Xiuting Ge and Chunrong Fang and Xuanye Li and Weisong Sun and Daoyuan Wu and Juan Zhai and Shang-Wei Lin and Zhihong Zhao and Yang Liu and Zhenyu Chen Machine Learning for Actionable Warning Identification: a Comprehensive Survey 39:1--39:?? Zihao Li and Chao Yang and Yakun Chen and Xianzhi Wang and Hongxu Chen and Guandong Xu and Lina Yao and Michael Sheng Graph and Sequential Neural Networks in Session-based Recommendation: a Survey 40:1--40:?? Zhen Xing and Qijun Feng and Haoran Chen and Qi Dai and Han Hu and Hang Xu and Zuxuan Wu and Yu-Gang Jiang A Survey on Video Diffusion Models . . . 41:1--41:?? Fatemeh Jalalvand and Mohan Baruwal Chhetri and Surya Nepal and Cecile Paris Alert Prioritisation in Security Operations Centres: a Systematic Survey on Criteria and Methods . . . . . . . . 42:1--42:?? Francisco Silva and Hélder P. Oliveira and Tania Pereira Causal representation learning through higher-level information extraction . . 43:1--43:?? Álvaro Sobrinho and Matheus Vilarim and Amanda Barbosa and Edmar Candeia Gurjão and Danilo F. S. Santos and Dalton Valadares and Leandro Dias da Silva Challenges and Opportunities in Mobile Network Security for Vertical Applications: a Survey . . . . . . . . . 44:1--44:?? Yousra Javed and Ayesha Sajid A Systematic Review of Privacy Policy Literature . . . . . . . . . . . . . . . 45:1--45:?? Huiming Chen and Huandong Wang and Qingyue Long and Depeng Jin and Yong Li Advancements in Federated Learning: Models, Methods, and Privacy . . . . . . 46:1--46:?? Aiwei Liu and Leyi Pan and Yijian Lu and Jingjing Li and Xuming Hu and Xi Zhang and Lijie Wen and Irwin King and Hui Xiong and Philip Yu A Survey of Text Watermarking in the Era of Large Language Models . . . . . . . . 47:1--47:?? Elena Battaglia and Federico Peiretti and Ruggero Gaetano Pensa Co-clustering: a Survey of the Main Methods, Recent Trends, and Open Problems . . . . . . . . . . . . . . . . 48:1--48:?? Tao Chen and Liang Lv and Di Wang and Jing Zhang and Yue Yang and Zeyang Zhao and Chen Wang and Xiaowei Guo and Hao Chen and Qingye Wang and Yufei Xu and Qiming Zhang and Bo Du and Liangpei Zhang and Dacheng Tao Empowering Agrifood System with Artificial Intelligence: a Survey of the Progress, Challenges and Opportunities 49:1--49:?? Adrien Bennetot and Ivan Donadello and Ayoub El Qadi El Haouari and Mauro Dragoni and Thomas Frossard and Benedikt Wagner and Anna Sarranti and Silvia Tulli and Maria Trocan and Raja Chatila and Andreas Holzinger and Artur Davila Garcez and Natalia Díaz-Rodríguez A Practical Tutorial on Explainable AI Techniques . . . . . . . . . . . . . . . 50:1--50:?? Paulo Sérgio Almeida Approaches to Conflict-free Replicated Data Types . . . . . . . . . . . . . . . 51:1--51:??
Bohan Liu and Gongyuan Li and He Zhang and Yuzhe Jin and Zikuan Wang and Dong Shao The Gap Between Trustworthy AI Research and Trustworthy Software Research: a Tertiary Study . . . . . . . . . . . . . 52:1--52:?? Azhar Alsufyani and Omer Rana and Charith Perera Knowledge-based Cyber Physical Security at Smart Home: a Review . . . . . . . . 53:1--53:?? Pranab Das and Dilwar Hussain Mazumder A Comprehensive Survey of Studies on Predicting Anatomical Therapeutic Chemical Classes of Drugs . . . . . . . 54:1--54:?? Nima Shiri Harzevili and Alvine Boaye Belle and Junjie Wang and Song Wang and Jiang, Zhen Ming (Jack) and Nachiappan Nagappan A Systematic Literature Review on Automated Software Vulnerability Detection Using Machine Learning . . . . 55:1--55:?? Mariano Albaladejo-González and José A. Ruipérez-Valiente and Félix Gmez Mármol Artificial Intelligence to Support the Training and Assessment of Professionals: a Systematic Literature Review . . . . . . . . . . . . . . . . . 56:1--56:?? Li Shen and Yan Sun and Zhiyuan Yu and Liang Ding and Xinmei Tian and Dacheng Tao On Efficient Training of Large-Scale Deep Learning Models . . . . . . . . . . 57:1--57:?? Tianyi Wang and Xin Liao and Kam Pui Chow and Xiaodong Lin and Yinglong Wang Deepfake Detection: a Comprehensive Survey from the Reliability Perspective 58:1--58:?? Song Wang and Yaochen Zhu and Haochen Liu and Zaiyi Zheng and Chen Chen and Jundong Li Knowledge Editing for Large Language Models: a Survey . . . . . . . . . . . . 59:1--59:?? Abishek Rao and Shivani Aithal and Sanjay Singh Single-Document Abstractive Text Summarization: a Systematic Literature Review . . . . . . . . . . . . . . . . . 60:1--60:?? Pankaj Dadure and Partha Pakray and Sivaji Bandyopadhyay Mathematical Information Retrieval: a Review . . . . . . . . . . . . . . . . . 61:1--61:?? Bo Zhang and Yansong Gao and Boyu Kuang and Changlong Yu and Anmin Fu and Willy Susilo A Survey on Advanced Persistent Threat Detection: a Unified Framework, Challenges, and Countermeasures . . . . 62:1--62:?? Muhammad Tariq and Sohail Ahmad and Mian Ahmad Jan and Houbing Song Deep Learning Aided Intelligent Reflective Surfaces for 6G: a Survey . . 63:1--63:?? María Gutiérrez and M${}^a$ Ángeles Moraga and Félix García and Coral Calero Green IN Artificial Intelligence from a Software Perspective: State-of-the-Art and Green Decalogue . . . . . . . . . . 64:1--64:?? Muhammed Golec and Guneet Kaur Walia and Mohit Kumar and Felix Cuadrado and Sukhpal Singh Gill and Steve Uhlig Cold Start Latency in Serverless Computing: a Systematic Review, Taxonomy, and Future Directions . . . . 65:1--65:?? Cláudio Gomes and João Paulo Fernandes and Gabriel Falcao and Soummya Kar and Sridhar Tayur A Systematic Mapping Study on Quantum and Quantum-inspired Algorithms in Operations Research . . . . . . . . . . 66:1--66:?? Bin Jiang and Jiacheng Feng and Xuerong Cui and Jian Wang and Yongxin Liu and Houbing Song Security and Reliability of Internet of Underwater Things: Architecture, Challenges, and Opportunities . . . . . 67:1--67:?? Athira K. A. and Divya Udayan J. and Umashankar Subramaniam A Systematic Literature Review on Multi-Robot Task Allocation . . . . . . 68:1--68:?? Sheng Zhou and Hongjia Xu and Zhuonan Zheng and Jiawei Chen and Zhao Li and Jiajun Bu and Jia Wu and Xin Wang and Wenwu Zhu and Martin Ester A Comprehensive Survey on Deep Clustering: Taxonomy, Challenges, and Future Directions . . . . . . . . . . . 69:1--69:?? Chathurangi Shyalika and Ruwan Wickramarachchi and Amit P. Sheth A Comprehensive Survey on Rare Event Prediction . . . . . . . . . . . . . . . 70:1--70:?? Qian Wang and Hong-Ning Dai and Jinghua Yang and Cai Guo and Peter Childs and Maaike Kleinsmann and Yike Guo and Pan Wang Learning-based Artificial Intelligence Artwork: Methodology Taxonomy and Quality Evaluation . . . . . . . . . . . 71:1--71:?? Yogeswaranathan Kalyani and Rem Collier The Role of Multi-Agents in Digital Twin Implementation: Short Survey . . . . . . 72:1--72:?? Moetez Abdelhamid and Layth Sliman and Raoudha Ben Djemaa and Guido Perboli A Review on Blockchain Technology, Current Challenges, and AI-Driven Solutions . . . . . . . . . . . . . . . 73:1--73:?? Xiaojie Wang and Zhonghui Zhao and Ling Yi and Zhaolong Ning and Lei Guo and F. Richard Yu and Song Guo A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures 74:1--74:?? Haseena Rahmath P and Vishal Srivastava and Kuldeep Chaurasia and Roberto G. Pacheco and Rodrigo S. Couto Early-Exit Deep Neural Network --- a Comprehensive Survey . . . . . . . . . . 75:1--75:?? Sara Abdali and Sina Shaham and Bhaskar Krishnamachari Multi-modal Misinformation Detection: Approaches, Challenges and Opportunities 76:1--76:?? Mohamed Mostafa and Ahmad S Almogren and Muhammad Al-Qurishi and Majed Alrubaian Modality Deep-learning Frameworks for Fake News Detection on Social Networks: a Systematic Literature Review . . . . . 77:1--77:?? Baochen Yan and Jiahe Lan and Zheng Yan Backdoor Attacks against Voice Recognition Systems: a Survey . . . . . 78:1--78:?? Junhao Dong and Junxi Chen and Xiaohua Xie and Jianhuang Lai and Hao Chen Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges . . . . . . . . . . . . . . . 79:1--79:??
Fatma-Zohra Hannou and Maxime Lefrançois and Pierre Jouvelot and Victor Charpenay and Antoine Zimmermann A Survey on IoT Programming Platforms: a Business-Domain Experts Perspective . . 80:1--80:?? Paola G. Vinueza-Naranjo and Janneth Chicaiza and Ruben Rumipamba-Zambrano Fog Computing Technology Research: a Retrospective Overview and Bibliometric Analysis . . . . . . . . . . . . . . . . 81:1--81:?? Tao Wang and Yushu Zhang and Shuren Qi and Ruoyu Zhao and Zhihua Xia and Jian Weng Security and Privacy on Generative Data in AIGC: a Survey . . . . . . . . . . . 82:1--82:?? Sabrina Sicari and Jesus F. Cevallos M. and Alessandra Rizzardi and Alberto Coen-Porisini Open-Ethical AI: Advancements in Open-Source Human-Centric Neural Language Models . . . . . . . . . . . . 83:1--83:?? Hamed Alqahtani and Gulshan Kumar Cybersecurity in Electric and Flying Vehicles: Threats, Challenges, AI Solutions & Future Directions . . . . . . 84:1--84:?? Shamsher Ullah and Jianqiang Li and Jie Chen and Ikram Ali and Salabat Khan and Abdul Ahad and Farhan Ullah and Victor C. M. Leung A Survey on Emerging Trends and Applications of 5G and 6G to Healthcare Environments . . . . . . . . . . . . . . 85:1--85:?? Bjorn De Sutter and Sebastian Schrittwieser and Bart Coppens and Patrick Kochberger Evaluation Methodologies in Software Protection Research . . . . . . . . . . 86:1--86:?? Shaobo Zhang and Yimeng Pan and Qin Liu and Zheng Yan and Kim-Kwang Raymond Choo and Guojun Wang Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: a Comprehensive Review . . . . . . . . . . . . . . . . . 87:1--87:?? Aulia Arif Wardana and Parman Sukarno Taxonomy and Survey of Collaborative Intrusion Detection System using Federated Learning . . . . . . . . . . . 88:1--88:?? Li Bai and Haibo Hu and Qingqing Ye and Haoyang Li and Leixia Wang and Jianliang Xu Membership Inference Attacks and Defenses in Federated Learning: a Survey 89:1--89:?? Anton Danholt Lautrup and Tobias Hyrup and Arthur Zimek and Peter Schneider-Kamp Systematic Review of Generative Modelling Tools and Utility Metrics for Fully Synthetic Tabular Data . . . . . . 90:1--90:?? Zhihong Liu and Xin Xu and Peng Qiao and Dongsheng Li Acceleration for Deep Reinforcement Learning using Parallel and Distributed Computing: a Survey . . . . . . . . . . 91:1--91:?? Corinne Allaart and Saba Amiri and Henri Bal and Adam Belloum and Leon Gommans and Aart van Halteren and Sander Klous Private and Secure Distributed Deep Learning: a Survey . . . . . . . . . . . 92:1--92:?? Stefano Lambiase and Gemma Catolino and Fabio Palomba and Filomena Ferrucci Motivations, Challenges, Best Practices, and Benefits for Bots and Conversational Agents in Software Engineering: a Multivocal Literature Review . . . . . . 93:1--93:?? Naeem Ullah and Javed Ali Khan and Ivanoe De Falco and Giovanna Sannino Explainable Artificial Intelligence: Importance, Use Domains, Stages, Output Shapes, and Challenges . . . . . . . . . 94:1--94:?? David Jin and Niclas Kannengießer and Sascha Rank and Ali Sunyaev Collaborative Distributed Machine Learning . . . . . . . . . . . . . . . . 95:1--95:?? Bingqiao Luo and Zhen Zhang and Qian Wang and Anli Ke and Shengliang Lu and Bingsheng He AI-powered Fraud Detection in Decentralized Finance: a Project Life Cycle Perspective . . . . . . . . . . . 96:1--96:?? Wissem Soussi and Gürkan Gür and Burkhard Stiller Democratizing Container Live Migration for Enhanced Future Networks --- A Survey . . . . . . . . . . . . . . . . . 97:1--97:?? Difeng Yu and Tilman Dingler and Eduardo Velloso and Jorge Goncalves Object Selection and Manipulation in VR Headsets: Research Challenges, Solutions, and Success Measurements . . 98:1--98:?? Yu Zheng and Qianyue Hao and Jingwei Wang and Changzheng Gao and Jinwei Chen and Depeng Jin and Yong Li A Survey of Machine Learning for Urban Decision Making: Applications in Planning, Transportation, and Healthcare 99:1--99:?? Chang Gong and Chuzhe Zhang and Di Yao and Jingping Bi and Wenbin Li and YongJun Xu Causal Discovery from Temporal Data: an Overview and New Perspectives . . . . . 100:1--100:?? Yujia Qin and Shengding Hu and Yankai Lin and Weize Chen and Ning Ding and Ganqu Cui and Zheni Zeng and Xuanhe Zhou and Yufei Huang and Chaojun Xiao and Chi Han and Yi Ren Fung and Yusheng Su and Huadong Wang and Cheng Qian and Runchu Tian and Kunlun Zhu and Shihao Liang and Xingyu Shen and Bokai Xu and Zhen Zhang and Yining Ye and Bowen Li and Ziwei Tang and Jing Yi and Yuzhang Zhu and Zhenning Dai and Lan Yan and Xin Cong and Yaxi Lu and Weilin Zhao and Yuxiang Huang and Junxi Yan and Xu Han and Xian Sun and Dahai Li and Jason Phang and Cheng Yang and Tongshuang Wu and Heng Ji and Guoliang Li and Zhiyuan Liu and Maosong Sun Tool Learning with Foundation Models . . 101:1--101:?? Sakuna Harinda Jayasundara and Nalin Asanka Gamagedara Arachchilage and Giovanni Russello SoK: Access Control Policy Generation from High-level Natural Language Requirements . . . . . . . . . . . . . . 102:1--102:?? Dan Tang and Rui Dai and Yudong Yan and Keqin Li and Wei Liang and Zheng Qin When SDN Meets Low-rate Threats: a Survey of Attacks and Countermeasures in Programmable Networks . . . . . . . . . 103:1--103:?? Ahmet Oztoprak and Reza Hassanpour and Aysegul Ozkan and Kasim Oztoprak Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: a Review . . . 104:1--104:?? Seyma Yucer and Furkan Tektas and Noura Al Moubayed and Toby Breckon Racial Bias within Face Recognition: a Survey . . . . . . . . . . . . . . . . . 105:1--105:??
Fucheng Miao and Youxiang Huang and Zhiyi Lu and Tomoaki Ohtsuki and Guan Gui and Hikmet Sari Wi-Fi Sensing Techniques for Human Activity Recognition: Brief Survey, Potential Challenges, and Research Directions . . . . . . . . . . . . . . . 107:1--107:?? Luke Koch and Edmon Begoli Adversarial Binaries: AI-guided Instrumentation Methods for Malware Detection Evasion . . . . . . . . . . . 108:1--108:?? Phani Krishna Bulasara and Somya Sahoo and Nitin Gupta and Zhu Han and Neeraj Kumar The Internet of Bio-Nano Things with Insulin--Glucose, Security and Research Challenges: a Survey . . . . . . . . . . 109:1--109:?? Mengwei Xu and Dongqi Cai and Wangsong Yin and Shangguang Wang and Xin Jin and Xuanzhe Liu Resource-efficient Algorithms and Systems of Foundation Models: a Survey 110:1--110:?? Zhaozheng Chen and Qianru Sun Weakly-supervised Semantic Segmentation with Image-level Labels: From Traditional Models to Foundation Models 111:1--111:?? Yutao Yang and Jie Zhou and Xuanwen Ding and Tianyu Huai and Shunyu Liu and Qin Chen and Yuan Xie and Liang He Recent Advances of Foundation Language Models-based Continual Learning: a Survey . . . . . . . . . . . . . . . . . 112:1--112:?? Norbert Rudolf Busch and Andrzej Zalewski A Systematic Literature Review of Enterprise Architecture Evaluation Methods . . . . . . . . . . . . . . . . 113:1--113:?? Xianzhi Zhang and Yipeng Zhou and Di Wu and Quan Z. Sheng and Shazia Riaz and Miao Hu and Linchang Xiao A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges . . . . . . . 114:1--114:?? Ruyue Xin and Jingye Wang and Peng Chen and Zhiming Zhao Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: a Review . . . . . . . . . 115:1--115:?? Amar N. Alsheavi and Ammar Hawbani and Wajdy Othman and Xingfu Wang and Gamil Qaid and Liang Zhao and Ahmed Al-Dubai and Liu Zhi and A.s. Ismail and Rutvij Jhaveri and Saeed Alsamhi and Mohammed A. A. Al-Qaness IoT Authentication Protocols: Challenges, and Comparative Analysis . . 116:1--116:?? Zhifan Lai and Zikai Chang and Mingrui Sha and Qihong Zhang and Ning Xie and Changsheng Chen and Niyato, Dusit (Tao) A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches 117:1--117:?? Kaisei Fukaya and Damon Daylamani-Zad and Harry Agius Intelligent Generation of Graphical Game Assets: a Conceptual Framework and Systematic Review of the State of the Art . . . . . . . . . . . . . . . . . . 118:1--118:?? Waqar Ali and Xiangmin Zhou and Jie Shao Privacy-preserved and Responsible Recommenders: From Conventional Defense to Federated Learning and Blockchain . . 119:1--119:?? Antonio Longa and Steve Azzolin and Gabriele Santin and Giulia Cencetti and Pietro Lio and Bruno Lepri and Andrea Passerini Explaining the Explainers in Graph Neural Networks: a Comparative Study . . 120:1--120:?? Firas Bayram and Bestoun S. Ahmed Towards Trustworthy Machine Learning in Production: an Overview of the Robustness in MLOps Approach . . . . . . 121:1--121:?? Ruoyu Zhao and Yushu Zhang and Tao Wang and Wenying Wen and Yong Xiang and Xiaochun Cao Visual Content Privacy Protection: a Survey . . . . . . . . . . . . . . . . . 122:1--122:?? Yanhong Fei and Yingjie Liu and Chentao Jia and Zhengyu Li and Xian Wei and Mingsong Chen A Survey of Geometric Optimization for Deep Learning: From Euclidean Space to Riemannian Manifold . . . . . . . . . . 123:1--123:?? Maxwell Standen and Junae Kim and Claudia Szabo Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning . . . . . . . . . . . . . . . . 124:1--124:?? Yihan Cao and Siyu Li and Yixin Liu and Zhiling Yan and Yutong Dai and Philip Yu and Lichao Sun A Survey of AI-Generated Content (AIGC) 125:1--125:?? Tayssir Bouraffa and Kai-Lung Hui Regulating Information and Network Security: Review and Challenges . . . . 126:1--126:?? Claudio Filipi Goncalves dos Santos and Rodrigo Reis Arrais and Jhessica Victoria Santos da Silva and Matheus Henrique Marques da Silva and Wladimir Barroso Guedes de Araujo Neto and Leonardo Tadeu Lopes and Guilherme Augusto Bileki and Iago Oliveira Lima and Lucas Borges Rondon and Bruno Melo de Souza and Mayara Costa Regazio and Rodolfo Coelho Dalapicola and Arthur Alves Tasca ISP Meets Deep Learning: a Survey on Deep Learning Methods for Image Signal Processing . . . . . . . . . . . . . . . 127:1--127:?? Mohammed Jubur and Prakash Shrestha and Nitesh Saxena An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools . . . . . . . . . . . . . . . . . 128:1--128:?? Daochen Zha and Zaid Pervaiz Bhat and Kwei-Herng Lai and Fan Yang and Zhimeng Jiang and Shaochen Zhong and Xia Hu Data-centric Artificial Intelligence: a Survey . . . . . . . . . . . . . . . . . 129:1--129:?? Tejpal Sharma and Dhavleesh Rattan Characterization of Android Malwares and their families . . . . . . . . . . . . . 130:1--130:?? Xuyan Li and Jie Wang and Zheng Yan Can Graph Neural Networks be Adequately Explained? A Survey . . . . . . . . . . 131:1--131:?? Jingke Tu and Lei Yang and Jiannong Cao Distributed Machine Learning in Edge Computing: Challenges, Solutions and Future Directions . . . . . . . . . . . 132:1--132:??
Yongjun Zhang and Pengcheng Shi and Jiayuan Li LiDAR-Based Place Recognition For Autonomous Driving: a Survey . . . . . . 106:1--106:??
Sanderson L. Gonzaga de Oliveira A Survey of Heuristics for Profile and Wavefront Reductions . . . . . . . . . . 133:1--133:??