The following pages link to ACM Computing Surveys (Q59986):
Displaying 50 items.
- Anomaly detection (Q59990) (← links)
- Discrete Bayesian Network Classifiers (Q89109) (← links)
- How Complex Is Your Classification Problem? (Q142803) (← links)
- Discrete wavelet transform-based time series analysis and mining (Q2875036) (← links)
- One step forward: linking wireless self-organizing network validation techniques with formal testing approaches (Q2875039) (← links)
- A survey of DHT security techniques (Q2875041) (← links)
- The failure detector abstraction (Q2875042) (← links)
- Auctions and bidding: a guide for computer scientists (Q2875044) (← links)
- A survey of combinatorial testing (Q2875046) (← links)
- A review of grid authentication and authorization technologies and support for federated access control (Q2875050) (← links)
- Impact of random failures and attacks on Poisson and power-law random networks (Q2875051) (← links)
- Robot algorithms for localization of multiple emission sources (Q2875052) (← links)
- Machine transliteration survey (Q2875055) (← links)
- Implementing statically typed object-oriented programming languages (Q2875056) (← links)
- Strict intersection types for the lambda calculus (Q2875057) (← links)
- A survey of comparison-based system-level diagnosis (Q2875060) (← links)
- XML data clustering: an overview (Q2875063) (← links)
- Geometric distortion measurement for shape coding: a contemporary review (Q2875064) (← links)
- Constraint programming systems for modeling music theories and composition (Q2875067) (← links)
- Progress in autonomous fault recovery of field programmable gate arrays (Q2875071) (← links)
- Coverage problems in sensor networks: a survey (Q2875072) (← links)
- On nonmetric similarity search problems in complex domains (Q2875073) (← links)
- A survey of hard real-time scheduling for multiprocessor systems (Q2875074) (← links)
- A survey of automatic query expansion in information retrieval (Q2875076) (← links)
- Flow logic for process calculi (Q2875077) (← links)
- Flow oriented approaches to QoS assurance (Q2875079) (← links)
- Control-flow analysis of functional programs (Q2875080) (← links)
- A vocabulary of program slicing-based techniques (Q2875081) (← links)
- Behavioral interface specification languages (Q2875082) (← links)
- Graphical passwords: learning from the first twelve years (Q2875084) (← links)
- Ontology learning from text: a look back and into the future (Q2875085) (← links)
- A review of error estimation in adaptive quadrature (Q2875086) (← links)
- On the stability of interdomain routing (Q2875089) (← links)
- Dependability modeling and analysis of software systems specified with UML (Q2875090) (← links)
- Survey of scheduling techniques for addressing shared resources in multicore processors (Q2875091) (← links)
- A comparison of index-based Lempel-Ziv LZ77 factorization algorithms (Q2875093) (← links)
- A survey and projection on medium access control protocols for wireless sensor networks (Q2875095) (← links)
- QoS routing in wireless sensor networks -- a survey (Q2875098) (← links)
- Ensemble approaches for regression: a survey (Q2875099) (← links)
- Time-series data mining (Q2875101) (← links)
- The exact online string matching problem: a review of the most recent results (Q2875102) (← links)
- A systematic approach to classify design-time global scheduling techniques (Q2875103) (← links)
- Polygon mesh repairing: an application perspective (Q2875104) (← links)
- A survey of cost-sensitive decision tree induction algorithms (Q2875106) (← links)
- Sequential pattern mining -- approaches and algorithms (Q2875108) (← links)
- P2P group management systems: a conceptual analysis (Q2875109) (← links)
- Synthesis and optimization of reversible circuits -- a survey (Q2875110) (← links)
- Offline Arabic handwritten text recognition: a survey (Q2875111) (← links)
- Survey of local algorithms (Q2875112) (← links)
- Game theory meets network security and privacy (Q2875114) (← links)