Catálogo de publicaciones - revistas

Compartir en
redes sociales


ACM Computing Surveys (CSUR)

Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.
Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No detectada desde mar. 1969 / hasta dic. 2023 ACM Digital Library

Información

Tipo de recurso:

revistas

ISSN impreso

0360-0300

ISSN electrónico

1557-7341

Editor responsable

Association for Computing Machinery (ACM)

País de edición

Estados Unidos

Fecha de publicación

Tabla de contenidos

Interestingness measures for data mining

Liqiang Geng; Howard J. Hamilton

<jats:p>Interestingness measures play an important role in data mining, regardless of the kind of patterns being mined. These measures are intended for selecting and ranking patterns according to their potential interest to the user. Good measures also allow the time and space costs of the mining process to be reduced. This survey reviews the interestingness measures for rules and summaries, classifies them from several perspectives, compares their properties, identifies their roles in the data mining process, gives strategies for selecting appropriate measures for applications, and identifies opportunities for future research in this area.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 9

Implementing sorting in database systems

Goetz Graefe

<jats:p>Most commercial database systems do (or should) exploit many sorting techniques that are publicly known, but not readily available in the research literature. These techniques improve both sort performance on modern computer systems and the ability to adapt gracefully to resource fluctuations in multiuser operations. This survey collects many of these techniques for easy reference by students, researchers, and product developers. It covers in-memory sorting, disk-based external sorting, and considerations that apply specifically to sorting in database systems.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 10

Realization of natural language interfaces using lazy functional programming

Richard A. Frost

<jats:p>The construction of natural language interfaces to computers continues to be a major challenge. The need for such interfaces is growing now that speech recognition technology is becoming more readily available, and people cannot speak those computer-oriented formal languages that are frequently used to interact with computer applications. Much of the research related to the design and implementation of natural language interfaces has involved the use of high-level declarative programming languages. This is to be expected as the task is extremely difficult, involving syntactic and semantic analysis of potentially ambiguous input. The use of LISP and Prolog in this area is well documented. However, research involving the relatively new lazy functional programming paradigm is less well known. This paper provides a comprehensive survey of that research.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 11

Propositional Satisfiability and Constraint Programming

Lucas Bordeaux; Youssef Hamadi; Lintao Zhang

<jats:p>Propositional Satisfiability (SAT) and Constraint Programming (CP) have developed as two relatively independent threads of research cross-fertilizing occasionally. These two approaches to problem solving have a lot in common as evidenced by similar ideas underlying the branch and prune algorithms that are most successful at solving both kinds of problems. They also exhibit differences in the way they are used to state and solve problems since SAT's approach is, in general, a black-box approach, while CP aims at being tunable and programmable. This survey overviews the two areas in a comparative way, emphasizing the similarities and differences between the two and the points where we feel that one technology can benefit from ideas or experience acquired from the other.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 12

Object tracking

Alper Yilmaz; Omar Javed; Mubarak Shah

<jats:p>The goal of this article is to review the state-of-the-art tracking methods, classify them into different categories, and identify new trends. Object tracking, in general, is a challenging problem. Difficulties in tracking objects can arise due to abrupt object motion, changing appearance patterns of both the object and the scene, nonrigid object structures, object-to-object and object-to-scene occlusions, and camera motion. Tracking is usually performed in the context of higher-level applications that require the location and/or shape of the object in every frame. Typically, assumptions are made to constrain the tracking problem in the context of a particular application. In this survey, we categorize the tracking methods on the basis of the object and motion representations used, provide detailed descriptions of representative methods in each category, and examine their pros and cons. Moreover, we discuss the important issues related to tracking including the use of appropriate image features, selection of motion models, and detection of objects.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 13

A survey on peer-to-peer key management for mobile ad hoc networks

Johann Van Der Merwe; Dawoud Dawoud; Stephen McDonald

<jats:p>The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs). The protocols are subdivided into groups based on their design strategy or main characteristic. The article discusses and provides comments on the strategy of each group separately. The discussions give insight into open research problems in the area of pairwise key management.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 1

Compressed full-text indexes

Gonzalo Navarro; Veli Mäkinen

<jats:p> Full-text indexes provide fast substring search over large text collections. A serious problem of these indexes has traditionally been their space consumption. A recent trend is to develop indexes that exploit the compressibility of the text, so that their size is a function of the compressed text length. This concept has evolved into <jats:italic>self-indexes</jats:italic> , which in addition contain enough information to reproduce any text portion, so they <jats:italic>replace</jats:italic> the text. The exciting possibility of an index that takes space close to that of the compressed text, replaces it, and in addition provides fast search over it, has triggered a wealth of activity and produced surprising results in a very short time, which radically changed the status of this area in less than 5 years. The most successful indexes nowadays are able to obtain almost optimal space and search time simultaneously. </jats:p> <jats:p>In this article we present the main concepts underlying (compressed) self-indexes. We explain the relationship between text entropy and regularities that show up in index structures and permit compressing them. Then we cover the most relevant self-indexes, focusing on how they exploit text compressibility to achieve compact structures that can efficiently solve various search problems. Our aim is to give the background to understand and follow the developments in this area.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 2

Survey of network-based defense mechanisms countering the DoS and DDoS problems

Tao Peng; Christopher Leckie; Kotagiri Ramamohanarao

<jats:p>This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in the Internet that have created the potential for denial of service attacks. We review the state-of-art mechanisms for defending against denial of service attacks, compare the strengths and weaknesses of each proposal, and discuss potential countermeasures against each defense mechanism. We conclude by highlighting opportunities for an integrated solution to solve the problem of distributed denial of service attacks.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 3

A taxonomy of suffix array construction algorithms

Simon J. Puglisi; W. F. Smyth; Andrew H. Turpin

<jats:p>In 1990, Manber and Myers proposed suffix arrays as a space-saving alternative to suffix trees and described the first algorithms for suffix array construction and use. Since that time, and especially in the last few years, suffix array construction algorithms have proliferated in bewildering abundance. This survey paper attempts to provide simple high-level descriptions of these numerous algorithms that highlight both their distinctive features and their commonalities, while avoiding as much as possible the complexities of implementation details. New hybrid algorithms are also described. We provide comparisons of the algorithms' worst-case time complexity and use of additional space, together with results of recent experimental test runs on many of their implementations.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 4

A survey of RST invariant image watermarking algorithms

Dong Zheng; Yan Liu; Jiying Zhao; Abdulmotaleb El Saddik

<jats:p>In this article, we review the algorithms for rotation, scaling and translation (RST) invariant image watermarking. There are mainly two categories of RST invariant image watermarking algorithms. One is to rectify the RST transformed image before conducting watermark detection. Another is to embed and detect watermark in an RST invariant or semi-invariant domain. In order to help readers understand, we first introduce the fundamental theories and techniques used in the existing RST invariant image watermarking algorithms. Then, we discuss in detail the work principles, embedding process, and detection process of the typical RST invariant image watermarking algorithms. Finally, we analyze and evaluate these typical algorithms through implementation, and point out their advantages and disadvantages.</jats:p>

Palabras clave: General Computer Science; Theoretical Computer Science.

Pp. 5