Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

ACM Computing Surveys

Known as: ACM Comp. Surveys, ACM Comput. Surv., Computing Surveys 
ACM Computing Surveys (CSUR) is a peer reviewed scientific journal published by the Association for Computing Machinery. The journal publishes survey… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
With the high demand for wireless data traffic, WiFi networks have experienced very rapid growth, because they provide high… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Review
2019
Review
2019
Generating a description of an image is called image captioning. Image captioning requires recognizing the important objects… Expand
  • figure 1
  • table 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
Review
2017
Review
2017
Software security vulnerabilities are one of the critical issues in the realm of computer security. Due to their potential high… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The scope and enforcement of intellectual property (IP) laws are becoming salient, for the first time, to a wide cohort of U.S… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Logic simulation is a critical component of the design tool flow in modern hardware development efforts. It is used widely from… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Within the scope of the upcoming launch of a new water related satellite mission (SMOS) a global evaluation study was performed… Expand
  • figure 1
  • table 2
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Many commercial organizations routinely gather large numbers of databases for various marketing and business analysis functions… Expand
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Disconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures… Expand
  • figure 3
  • figure 4
  • table I
  • figure 5
Is this relevant?
Highly Cited
1983
Highly Cited
1983
The implications of adding security mechanisms to high-level network protocols operating in an open-system environment are… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?