Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
ACM Computing Surveys
ACM Press
  1-10 of 198 reviews Date Reviewed 
  Data science: a comprehensive overview
Cao L.  ACM Computing Surveys 50(3): 1-42, 2017. Type: Article, Reviews: (2 of 2)

I’ve been reviewing computing literature for almost two decades, have submitted over 100 reviews, and the survey format used by this paper is very common. However, at 42 pages, this is the largest survey I ever remember reading. Given how mu...

Feb 26 2018
  Data science: a comprehensive overview
Cao L.  ACM Computing Surveys 50(3): 1-42, 2017. Type: Article, Reviews: (1 of 2)

This paper brings together a cohesive picture of data science, a new interdisciplinary academic field, from many different perspectives....

Jan 11 2018
  A functional taxonomy of music generation systems
Herremans D., Chuan C., Chew E.  ACM Computing Surveys 50(5): 1-30, 2017. Type: Article

This paper attempts to provide a framework for automatic music generation. It correctly identifies a fundamental problem with automatic music generation in that there is no agreed upon standard for what an automatic music generation system should ...

Dec 18 2017
  Bridging the chasm: a survey of software engineering practice in scientific programming
Storer T.  ACM Computing Surveys 50(4): 1-32, 2017. Type: Article

Software is notoriously difficult to get right even for experienced, professional software developers using modern software engineering practices. If these experts can’t produce correct programs, what chance do mere scientists have of writin...

Nov 2 2017
   Fog computing for sustainable smart cities: a survey
Perera C., Qin Y., Estrella J., Reiff-Marganiec S., Vasilakos A.  ACM Computing Surveys 50(3): 1-43, 2017. Type: Article

Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising way to support large clusters of s...

Oct 5 2017
  A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S.  ACM Computing Surveys 50(3): 1-40, 2017. Type: Article

It is not new that software is eating the world [1]. Industries and businesses everywhere are being “softwareized.” Meanwhile, we cannot deny that malware (malicious software) is also having a feast. This paper provides a comprehensive...

Sep 22 2017
  A taxonomy and survey of cloud resource orchestration techniques
Weerasiri D., Barukh M., Benatallah B., Sheng Q., Ranjan R.  ACM Computing Surveys 50(2): 1-41, 2017. Type: Article

Cloud services provide computing resources (for example, infrastructure, platform, and software) as services. Utilizing these cloud resources requires a complex life cycle process that involves select, describe, configure, deploy, and manage steps...

Aug 9 2017
  A survey on systems security metrics
Pendleton M., Garcia-Lebron R., Cho J., Xu S.  ACM Computing Surveys 49(4): 1-35, 2017. Type: Article

As information security becomes a mainstream discipline and is talked about on primetime news and in cafes, among the first questions after the dust around the breach of the day settles would be whether we are secure, and how we measure whether we...

Aug 3 2017
  A survey on ensemble learning for data stream classification
Gomes H., Barddal J., Enembreck F., Bifet A.  ACM Computing Surveys 50(2): 1-36, 2017. Type: Article

The automation of several processes, such as business transactions, smartphones, and various types of sensors, has severely increased the number of data stream generators. In data stream classification, data items are represented by a vector of fe...

Jun 16 2017
  Presentation attack detection methods for face recognition systems: a comprehensive survey
Ramachandra R., Busch C.  ACM Computing Surveys 50(1): 1-37, 2017. Type: Article

This paper deals in general with biometric technology and specifically with facial recognition. In this offering, the authors present an exhaustive review of all pioneering efforts on facial presentation attack detection (PAD) algorithms. Accordin...

May 30 2017
Display per column
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy