ACM Computing Survey 2019

ACM Computing Survey 2019

  1. A Survey on Power Management Techniques for Oversubscription of Multi-Tenant Data Centers
    1.多租户数据中心超额订阅的电源管理技术综述

  2. Edge Cloud Offloading Algorithms: Issues, Methods, and Perspectives
    2.边缘云卸载算法: 问题、方法和视角

  3. Code Authorship Attribution: Methods and Challenges
    3.代码作者归属: 方法与挑战

  4. A Survey on Graph Drawing Beyond Planarity
    4.超越平面的图形绘制综述

  5. Deep Learning Based Recommender System: A Survey and New Perspectives
    5.基于深度学习的推荐系统: 调查与新视角

  6. Graph-Based Skill Acquisition For Reinforcement Learning
    6.基于图形的强化学习技能获取

  7. Recent Advances in Transfer Learning for Cross-Dataset Visual Recognition: A Problem-Oriented Perspective
    7.跨数据集视觉识别迁移学习的最新进展: 面向问题的视角

  8. Brownout Approach for Adaptive Management of Resources and Applications in Cloud Computing Systems: A Taxonomy and Future Directions
    8.云计算系统中资源和应用适应性管理的布朗方法: 分类和未来方向

  9. Conceptual Representations for Computational Concept Creation
    9.计算概念创建的概念表示

  10. How Generative Adversarial Networks and Their Variants Work: An Overview
    10.生成性对抗性网络及其变体如何工作: 概述

  11. Sustainable Offloading in Mobile Cloud Computing: Algorithmic Design and Implementation
    11.移动云计算的可持续卸载: 算法设计与实现

  12. An Exhaustive Survey on Security Concerns and Solutions at Different Components of Virtualization
    12.关于虚拟化不同组件的安全问题和解决方案的详尽调查

  13. A Survey on Bayesian Nonparametric Learning
    13.贝叶斯非参数学习综述

  14. Probabilistic Worst-Case Timing Analysis: Taxonomy and Comprehensive Survey
    14.概率最坏情况时机分析: 分类与综合调查

  15. Modeling Information Retrieval by Formal Logic: A Survey
    15.用形式逻辑建模信息检索: 一个综述

  16. Lp Samplers and Their Applications: A Survey
    16.Lp 采样器及其应用: 综述

  17. Urban Computing Leveraging Location-Based Social Network Data: A Survey
    17.利用基于位置的社交网络数据的城市计算: 一项调查

  18. The Real-Time Linux Kernel: A Survey on PREEMPT_RT
    18.实时 linux内核: 对 PREEMPT_RT 的调查

  19. Trust Evaluation in Cross-Cloud Federation: Survey and Requirement Analysis
    19.跨云联盟中的信任评估: 调查与需求分析

  20. Survey on Brain-Computer Interface: An Emerging Computational Intelligence Paradigm
    20.脑-机接口综述: 一个新兴的计算智能范式

  21. A Survey on Various Threats and Current State of Security in Android Platform
    21.Android 平台中各种威胁及安全现状调查

  22. Identifying Top-k Nodes in Social Networks: A Survey
    22.识别社交网络中的 Top-k 节点: 一项调查

  23. Computer-aided Arrhythmia Diagnosis with Bio-signal Processing: A Survey of Trends and Techniques
    23 生物信号处理的计算机辅助心律失常诊断: 趋势和技术综述

  24. Machine Learning for Smart Building Applications: Review and Taxonomy
    24 智能建筑应用的机器学习: 回顾和分类

  25. Computational Understanding of Visual Interestingness Beyond Semantics: Literature Survey and Analysis of Covariates
    25 语义之外的视觉兴趣的计算理解: 文献调查和协变量分析

  26. Quality Evaluation of Solution Sets in Multiobjective Optimisation: A Survey
    26.多目标优化解决方案集的质量评价: 综述

  27. A Survey on Multithreading Alternatives for Soft Error Fault Tolerance
    27 软错误容错性的多线程方案综述

  28. Software-defined Networking-based DDoS Defense Mechanisms
    28 基于软件定义网络的 DDoS 防御机制

  29. Cooperative Heterogeneous Multi-Robot Systems: A Survey
    29 合作异构多机器人系统综述

  30. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
    30 洞察内部人员和信息技术: 内部威胁分类、分析、建模和对策调查

  31. Passive Vision Region-Based Road Detection: A Literature Review
    31 基于被动视觉区域的道路检测: 文献综述

  32. Negative Sequence Analysis: A Review
    32 负序分析: 综述

  33. Gait-based Person Re-identification: A Survey
    33 基于步态的人重新识别: 一项调查

  34. Countermeasures against Worm Spreading: A New Challenge for Vehicular Networks
    34 蠕虫传播对策: 车载网络面临的新挑战

  35. Indoor Positioning Based on Visible Light Communication: A Performance-based Survey of Real-world Prototypes
    35 基于可见光通信的室内定位: 基于性能的真实世界原型调查

  36. A Comprehensive Survey on Parallelization and Elasticity in Stream Processing
    36 流处理中并行化和弹性的综合综述

  37. A Multi-Vocal Review of Security Orchestration
    37 安全编排的多声音评论

  38. Anomaly Detection Methods for Categorical Data: A Review
    38 分类数据异常检测方法综述

  39. A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems
    39.传统和可穿戴生物识别系统的形态特征、性能评估指标和安全性调查

  40. Deep Neural Network Approximation for Custom Hardware: Where We've Been, Where We're Going
    40 定制硬件的深度神经网络近似: 我们去过哪里,我们要去哪里

  41. Smart City System Design: A Comprehensive Study of the Application and Data Planes
    41 智慧城市系统设计: 应用和数据平面的综合研究

  42. A Survey of Chip-level Thermal Simulators
    42 芯片级热模拟器综述

  43. Handcrafted and Deep Trackers: Recent Visual Object Tracking Approaches and Trends
    43 手工和深度跟踪器: 最近的视觉对象跟踪方法和趋势

  44. Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model

  45. 网络层的命名内容:以信息为中心的网络模型的安全性分析

  46. Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?

  47. 对抗性语境下的文本分析:欺骗是否留下了文体痕迹?

  48. WiFi Sensing with Channel State Information: A Survey

  49. 带有通道状态信息的WiFi感知:调查

  50. A Survey on Collecting, Managing, and Analyzing Provenance from Scripts

  51. 关于从脚本收集、管理和分析起源的调查

  52. Comparison of Software Design Models: An Extended Systematic Mapping Study

  53. 软件设计模型的比较:一个扩展的系统映射研究

  54. From Hack to Elaborate Technique—A Survey on Binary Rewriting

  55. 从破解到复杂的技术——关于二进制重写的一个调查

  56. Dance Interactive Learning Systems: A Study on Interaction Workflow and Teaching Approaches

  57. 舞蹈互动学习系统:交互工作流程与教学方法研究

  58. Security and Privacy on Blockchain

  59. 区块链的安全和隐私

  60. Evaluation of Hardware Data Prefetchers on Server Processors

  61. 服务器处理器上硬件数据预取器的评估

  62. Leveraging User-related Internet of Things for Continuous Authentication: A Survey

  63. 利用与用户相关的物联网进行持续身份验证:调查

  64. A Survey on Big Multimedia Data Processing and Management in Smart Cities

  65. 智慧城市大多媒体数据处理与管理研究综述

  66. Multi-model Databases: A New Journey to Handle the Variety of Data

  67. 多模型数据库:处理各种数据的新旅程

  68. A Survey of Timing Verification Techniques for Multi-Core Real-Time Systems

  69. 多核实时系统定时验证技术综述

  70. A Survey of Group Key Agreement Protocols with Constant Rounds

  71. 常轮组密钥协议协议的研究

  72. Mulsemedia DIY: A Survey of Devices and a Tutorial for Building Your Own Mulsemedia Environment

  73. 多媒体DIY:一个设备调查和一个建立自己的多媒体环境的教程

  74. Survey and Taxonomy of Volunteer Computing

  75. 计算机志愿者调查与分类

  76. Privacy Analysis on Microblogging Online Social Networks: A Survey

  77. 微博社交网络隐私分析:一项调查

  78. Infrastructure-Independent Indoor Localization and Navigation

  79. 与基础设施无关的室内定位和导航

  80. Survey on Combinatorial Register Allocation and Instruction Scheduling

  81. 组合寄存器分配与指令调度研究综述

  82. Environmental Audio Scene and Sound Event Recognition for Autonomous Surveillance: A Survey and Comparative Studies

  83. 自主监控环境音频场景与声音事件识别:调查与比较研究

  84. Indoor Localization Improved by Spatial Context—A Survey

  85. 空间情境-调查法改善室内定位

  86. Demystifying Parallel and Distributed Deep Learning: An In-depth Concurrency Analysis

  87. 解密并行和分布式深度学习:深入的并发性分析

  88. Unsupervised Approaches for Textual Semantic Annotation, A Survey

  89. 文本语义注释的无监督方法,综述

  90. Comprehensive Study of Continuous Orthogonal Moments—A Systematic Review

  91. 连续正交矩的综合研究——系统综述

  92. A Survey on Scheduling Strategies for Workflows in Cloud Environment and Emerging Trends

  93. 云环境下工作流调度策略与趋势研究

  94. Progress, Justness, and Fairness

  95. 进步、公正和公平

  96. Evaluating Domain Ontologies: Clarification, Classification, and Challenges

  97. 评估领域本体:澄清、分类和挑战

  98. A Survey on 360° Video Streaming: Acquisition, Transmission, and Display

  99. 360°视频流的调查:采集、传输和显示

  100. Recoloring Algorithms for Colorblind People: A Survey

  101. 为色盲人群重新上色的算法:一项调查

  102. Understanding Deep Learning Techniques for Image Segmentation

  103. 了解图像分割的深度学习技术

  104. Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

  105. 安全与隐私的商品物联网应用程序分析:挑战与机遇

  106. Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

  107. 2014年以后:基于攻击树的安全建模的正式方法

  108. A Survey on PCM Lifetime Enhancement Schemes

  109. PCM延长寿命计划的调查

  110. Human--Computer Interaction on the Skin

  111. 皮肤上的人机交互

  112. Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

  113. 对抗式恶意软件检测:基于pdf的攻击的经验教训

  114. A Systematic Review on Imbalanced Data Challenges in Machine Learning: Applications and Solutions

  115. 对机器学习中不平衡数据挑战的系统回顾:应用和解决方案

  116. A Survey on Adaptive Authentication

  117. 自适应身份验证的研究

  118. Software Development Lifecycle for Energy Efficiency: Techniques and Tools

  119. 软件开发生命周期的能源效率:技术和工具

  120. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

  121. 网络安全和隐私防御欺骗的博弈论分类和调查

  122. Decision Tree Classification with Differential Privacy: A Survey

  123. 具有差异隐私的决策树分类:一个调查

  124. Performance-Aware Management of Cloud Resources: A Taxonomy and Future Directions

  125. 云资源的性能感知管理:分类和未来方向

  126. Huffman Coding

  127. 霍夫曼编码

  128. A Survey on Gait Recognition via Wearable Sensors

  129. 基于可穿戴传感器的步态识别研究综述

  130. Computational Mining of Social Media to Curb Terrorism
    87 社交媒体的计算挖掘以遏制恐怖主义

  131. Dynamic Malware Analysis in the Modern Era—A State of the Art Survey
    88 现代动态恶意软件分析 -- 一项最新调查

  132. Extraction and Analysis of Fictional Character Networks: A Survey
    89 虚构人物网络的提取与分析: 综述

  133. A Survey on Mobility-Induced Service Migration in the Fog, Edge, and Related Computing Paradigms
    90 雾、边缘和相关计算范式中移动性诱导的服务迁移调查

  134. Security Modeling of Autonomous Systems: A Survey

  135. 自治系统的安全性建模:综述

  136. A Survey on Food Computing

  137. 关于食品计算的调查

  138. A Systematic Review on Cloud Testing

  139. 对云测试的系统回顾

  140. Machine Learning Methods for Reliable Resource Provisioning in Edge-Cloud Computing: A Survey

  141. 边缘云计算中可靠资源供应的机器学习方法:调查

  142. Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions

  143. 协调云中的大数据分析工作流:研究挑战、调查和未来方向

  144. Automated Expertise Retrieval: A Taxonomy-Based Survey and Open Issues

  145. 自动专业知识检索:基于分类法的调查和开放问题

  146. Resource Management in Fog/Edge Computing: A Survey on Architectures, Infrastructure, and Algorithms

  147. 雾/边缘计算中的资源管理:架构、基础设施和算法的调查

  148. DNA Sequencing Technologies: Sequencing Data Protocols and Bioinformatics Tools

  149. DNA测序技术:测序数据协议和生物信息学工具

  150. Big Data Analytics for Large-scale Wireless Networks: Challenges and Opportunities

  151. 大型无线网络的大数据分析:挑战与机遇

  152. Formal Specification and Verification of Autonomous Robotic Systems: A Survey
    100.自治机器人系统的形式规范与验证:综述

  153. A Survey of Tool-supported Assurance Case Assessment Techniques

  154. 工具支持的保证案例评估技术的调查

  155. Adaptive Biometric Systems: Review and Perspectives

  156. 自适应生物计量系统:综述与展望

  157. Large-scale Semantic Integration of Linked Data: A Survey

  158. 链接数据的大规模语义集成:调查

  159. A Comprehensive Survey on Cloud Data Mining (CDM) Frameworks and Algorithms

  160. 云数据挖掘(CDM)框架和算法的全面调查

  161. Autonomous UAV Cinematography: A Tutorial and a Formalized Shot-Type Taxonomy

  162. 自动无人机摄影:教程和正式的射击类型分类

  163. Video Skimming: Taxonomy and Comprehensive Survey

  164. 视频浏览:分类与综合调查

  165. How Complex Is Your Classification Problem?: A Survey on Measuring Classification Complexity

  166. 你的分类问题有多复杂?:测量分类复杂度的调查

  167. Cloud Pricing Models: Taxonomy, Survey, and Interdisciplinary Challenges

  168. 云定价模型:分类、调查和跨学科挑战

  169. Document Layout Analysis: A Comprehensive Survey

  170. 文件布局分析:全面调查

  171. Security and Privacy Approaches in Mixed Reality: A Literature Survey

  172. 安全与隐私:一个文献调查

  173. A Survey on Representation Learning Efforts in Cybersecurity Domain

  174. 网络安全领域代表性学习研究现状调查

  175. Academic Plagiarism Detection: A Systematic Literature Review

  176. 学术剽窃检测:系统的文献综述

  177. A Survey of Meta programming Languages

  178. 元编程语言的概述

  179. Seeing the Invisible: Survey of Video Motion Magnification and Small Motion Analysis

  180. 看不见的:视频运动放大和小运动分析的调查

  181. Video Description: A Survey of Methods, Datasets, and Evaluation Metrics

  182. 视频描述:方法、数据集和评估指标的调查

  183. Survey of Compressed Domain Video Summarization Techniques

  184. 压缩域视频摘要技术综述

  185. New Opportunities for Integrated Formal Methods

  186. 集成正式方法的新机会

  187. A Survey of Coarse-Grained Reconfigurable Architecture and Design: Taxonomy, Challenges, and Applications

  188. 对粗粒度可重构体系结构和设计的研究:分类法、挑战和应用程序

  189. Survey of Text-based Epidemic Intelligence: A Computational Linguistics Perspective

  190. 基于文本的流行情报调查:一个计算语言学的视角

  191. Applications of Distributed Ledger Technologies to the Internet of Things: A Survey

  192. 分布式账本技术在物联网中的应用:综述

  193. A Comprehensive Review of the Fireworks Algorithm

  194. 全面审查烟花算法

  195. A Survey on Interdependent Privacy

  196. 相互依赖的隐私调查

  197. Model-driven Game Development: A Literature Review

  198. 模型驱动的游戏开发:文献综述

  199. A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions

  200. 一个关于云取证的挑战、解决方案和未来方向的系统调查

  201. A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet

  202. 关于端-边缘云协调的网络计算范例的调查:透明计算、移动边缘计算、雾计算和Cloudlet

  203. Malware Dynamic Analysis Evasion Techniques: A Survey

  204. 恶意软件动态分析逃避技术:调查

  205. A Survey of DevOps Concepts and Challenges

  206. DevOps概念和挑战的概述

  207. A Survey of Intrusion Detection Systems Leveraging Host Data

  208. 利用主机数据的入侵检测系统的调查

你可能感兴趣的:(ACM Computing Survey 2019)