Catálogo de publicaciones - revistas
ACM Computing Surveys (CSUR)
Resumen/Descripción – provisto por la editorial en inglés
A journal of the Association for Computing Machinery (ACM), which publishes surveys, tutorials, and special reports on all areas of computing research. Volumes are published yearly in four issues appearing in March, June, September, and December.Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Período | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | desde mar. 1969 / hasta dic. 2023 | ACM Digital Library |
Información
Tipo de recurso:
revistas
ISSN impreso
0360-0300
ISSN electrónico
1557-7341
Editor responsable
Association for Computing Machinery (ACM)
País de edición
Estados Unidos
Fecha de publicación
1969-
Cobertura temática
Tabla de contenidos
Strategic directions in human-computer interaction
Brad Myers; Jim Hollan; Isabel Cruz; Steve Bryson; Dick Bulterman; Tiziana Catarci; Wayne Citrin; Ephraim Glinert; Jonathan Grudin; Yannis Ioannidis
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 794-809
Computational science and engineering
A. Sameh; G. Cybenko; M. Kalos; K. Neves; J. Rice; D. Sorensen; F. Sullivan
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 810-817
Strategic directions in electronic commerce and digital libraries
Nabil Adam; Yelena Yesha
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 818-835
Strategic directions in computer science education
Allen B. Tucker
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 836-845
Editorial statement
Peter Wegner (eds.)
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 1-2
Second-generation image coding
M. M. Reid; R. J. Millar; N. D. Black
<jats:p>This article gives an overview of a diverse selection of currently used second-generation image coding techniques. These techniques have been grouped into similar categories in order to allow a direct comparison among the varying methods. An attempt has been made, where possible, to expand upon and clarify the details given by the original authors. The relative merits ans shortcomings of each of the techniques are compared and contrasted.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 3-29
Algebraic approaches to nondeterminism—an overview
Michał Walicki; Sigurd Meldal
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 30-81
Verification techniques for cache coherence protocols
Fong Pong; Michel Dubois
<jats:p> In this article we present a comprehensive survey of various approaches for the verification of cache coherence protocols based on <jats:italic>state enumeration, (symbolic model checking</jats:italic> , and <jats:italic>symbolic state models</jats:italic> . Since these techniques search the state space of the protocol exhaustively, the amount of memory required to manipulate that state information and the verification time grow very fast with the number of processors and the complexity of the protocol mechanisms. To be successful for systems of arbitrary complexity, a verification technique must solve this so-called <jats:italic>state space explosion</jats:italic> problem. The emphasis of our discussion is onthe underlying theory in each method of handling the state space exposion problem, and formulationg and checking the <jats:italic>safety</jats:italic> properties (e.g., data consistency) and the <jats:italic>liveness</jats:italic> properties (absence of deadlock and livelock). We compare the efficiency and discuss the limitations of each technique in terms of memory and computation time. Also, we discuss issues of <jats:italic>generality, applicability, automaticity, and amenity</jats:italic> for existing tools in each class of methods. No method is truly superior because each method has its own strengths and weaknesses. Finally, refinements that can further reduce the verification time and/or the memory requirement are also discussed. </jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 82-126
Editorial
Peter Wegner (eds.)
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 127
Trace-driven memory simulation
Richard A. Uhlig; Trevor N. Mudge
<jats:p>As the gap between processor and memory speeds continues to widen, methods for evaluating memory system designs before they are implemented in hardware are becoming increasingly important. One such method, trace-driven memory simulation, has been the subject of intense interest among researchers and has, as a result, enjoyed rapid development and substantial improvements during the past decade. This article surveys and analyzes these developments by establishing criteria for evaluating trace-driven methods, and then applies these criteria to describe, categorize, and compare over 50 trace-driven simulation tools. We discuss the strengths and weaknesses of different approaches and show that no single method is best when all criteria, including accuracy, speed, memory, flexibility, portability, expense, and ease of use are considered. In a concluding section, we examine fundamental limitations to trace-driven simulation, and survey some recent developments in memory simulation that may overcome these bottlenecks.</jats:p>
Palabras clave: General Computer Science; Theoretical Computer Science.
Pp. 128-170