ACM Computing Surveys
About
- This is a curated and experimental site, offering historical and visual index of all collected sources.
- The site does not host any of the files. It only provides an index and links to full text files.
- Full text of many sources is behind a paywall. You may need to obtain a subscription to read full text.
Latest Issue
2025
| ![]() | Latest Issue:
|
History
| · | ||
2024
| ![]() | A Year Ago:
|
| · · · · | ||
2020
| ![]() | 5 Years Ago:
|
| · · · · · | ||
2015
| ![]() | 10 Years Ago:
|
| · · · · · | ||
2010
| ![]() | 15 Years Ago:
|
| · · · · · | ||
2005
| ![]() | 20 Years Ago:
|
| · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · · | ||
1968
| ![]() | Premiere Issue: |
History of Ideas
This report provides a chronological overview of key research trends and developments in computer science, as reflected in the titles of academic articles from 1969 to 2025. By analyzing thematic shifts and continuities, we can trace the evolution of the field from its foundational principles to the cutting-edge frontiers of artificial intelligence and distributed systems.
1969-1975: The Dawn of Computing: Foundations and First Principles
This initial period showcases the foundational concerns of early computer science, with a strong emphasis on core system components, programming paradigms, and emerging applications.
Key Themes and Trends:
- System Architecture and Performance: Early research focused on the fundamental building blocks of computing, including internal organization and efficiency. Titles like "Contemporary Concepts of Microprogramming and Emulation" (1969) and "Computer Interconnection Structures: Taxonomy, Characteristics, and Examples" (1975) highlight efforts to understand and optimize hardware. Performance evaluation was also critical, with "A Survey of Analytical Time-Sharing Models" (1969) and "Computer System Simulation: An Introduction" (1970) indicating an early focus on system behavior.
- Core Algorithms and Data Structures: Essential algorithmic problems and data organization were central. "Sorting" (1971), "Table Lookup Techniques" (1971), and "Binary Search Trees and File Organisation" (1974) demonstrate the focus on efficient data handling.
- Programming Language Development: The evolution of programming languages was a significant area. "A Structural View of PL/I" (1970) and "New Programming Languages for Artificial Intelligence Research" (1974) reflect the creation of languages tailored for specific domains.
- Early Software Engineering and Quality: As software grew in complexity, concerns about its structure, quality, and maintainability emerged. "On the Composition of Well-Structured Programs" (1974), "Structured Programming with go to Statements" (1974), and "An Approach to Program Testing" (1975) indicate the nascent field of software engineering.
- Graphics and Early AI: Computer graphics saw foundational work in image processing and rendering. "Picture Processing by Computer" (1969) and "A Characterization of Ten Hidden-Surface Algorithms" (1974) point to early efforts in visual computing. AI also appeared, though in fundamental forms, with the aforementioned "New Programming Languages for Artificial Intelligence Research."
- Societal Implications: Even in this early stage, the societal impact of computing was recognized, as seen in "Computers and Privacy: A Survey" (1969) and "Computer Software and Copyright" (1975).
Notable Shifts and Continuities: This period laid the groundwork for almost all future developments. The shift from pure hardware concerns towards programming methodologies and software quality is evident. While "privacy" emerged early, it was then overshadowed by technical challenges, only to resurface much later. The iterative nature of research is seen in recurring themes like performance and architectural optimization.
1976-1982: Systematization and Early Specialization
This period marks a deepening of research into specific sub-disciplines, particularly database management, software reliability, and the nascent fields of computer security and artificial intelligence.
Key Themes and Trends:
- Database Management Systems (DBMS) Maturation: A significant focus on the architecture and functionality of database systems is evident. "CODASYL Data-Base Management Systems," "Relational Data-Base Management Systems," and "A Comparison of the Relational and CODASYL Approaches to Data-Base Management" (all 1976) highlight the crucial debate and development of database paradigms. This continued with "Database Reorganization - Principles and Practice" (1979) and "Backend Database Systems" (1980).
- Software Reliability and Fault Tolerance: Ensuring software quality and resilience became a primary concern. Titles like "Fault-Tolerant Software for Real-Time Applications" and "An Introduction to Proving the Correctness of Programs" (both 1976) show efforts to build robust and verifiable software. This extends to "Validation, Verification, and Testing of Computer Software" (1982).
- Computer Security Emergence: Cryptography and secure systems started to gain prominence. "Encryption and Secure Computer Networks" and "Symmetric and Asymmetric Encryption" (both 1979) marked a clear recognition of the importance of data protection, followed by "Formal Models for Computer Security" (1981).
- Performance Modeling with Queueing Networks: Analytical models for understanding system performance became more sophisticated. A cluster of papers in 1978, such as "Queueing Network Modeling of Computer Communication Networks" and "The Operational Analysis of Queueing Network Models," demonstrates this dedicated focus.
- Early AI and Graphics Applications: AI continued its specialized development with "The Hearsay-II Speech-Understanding System" (1980) and "Computational Stereo" (1982). Graphics also matured with "Planar Geometric Projection and Viewing Transformations" (1978) and "Representation of Three-Dimensional Digital Images" (1981).
- Distributed Systems Fundamentals: The complexity of managing distributed systems began to be addressed with "A Survey of Techniques for Synchronization and Recovery in Decentralized Computer Systems" and "Concurrency Control in Distributed Database Systems" (both 1981).
- Human Factors in Computing: The human element in interaction with computers gained attention, as seen in "The Psychological Study of Programming" and "Human Factors Studies of Database Query Languages: A Survey and Assessment" (both 1981).
Notable Shifts and Continuities: This period witnessed a clear shift from broad foundational exploration to deeper, specialized research within emerging subfields. The emphasis on relational databases marked a significant paradigm shift in data management. Security and distributed systems began their long journey of increasing complexity, which would continue for decades. The human-computer interaction aspect also took root, laying the groundwork for user-centered design.
1983-1991: Distributed Systems, Programming Paradigms, and Expanding Applications
This era solidified distributed computing as a central theme, explored various programming paradigms, and saw the application of computing in diverse new domains, particularly in scientific and medical fields.
Key Themes and Trends:
- Dominance of Distributed Systems: Research into distributed computing intensified significantly. "Distributed Operating Systems" (1985), "Distributed File Systems: Concepts and Examples" (1990), "Distributed Query Processing" (1984), and "Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases" (1990) reflect the growing complexity and necessity of managing networked systems. Fault tolerance in these systems was also a strong focus, as seen in "The Consensus Problem in Fault-Tolerant Computing" (1993) and "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial" (1990).
- Programming Language Evolution and Paradigms: Beyond traditional imperative languages, alternative programming models gained traction. "On Understanding Types, Data Abstraction, and Polymorphism" (1985) delved into fundamental language theory. "The Family of Concurrent Logic Programming Languages" (1989) and "Conception, Evolution, and Application of Functional Programming Languages" (1989) highlight the exploration of concurrency and functional programming.
- AI Beyond Early Recognition: AI research began to explore more abstract concepts like "Inductive Inference: Theory and Methods" (1983) and "Explanation-Based Learning: A Survey of Programs and Perspectives" (1989), showing a move towards knowledge representation and learning mechanisms.
- Scientific and Medical Computing: The application of computing to scientific and medical problems became more prominent. "Three-Dimensional Medical Imaging: Algorithms and Computer Systems" (1991) indicates the growing interdisciplinary nature of computer science.
- Human-Computer Interaction (HCI) Refinement: HCI expanded beyond basic interaction to consider user experience in detail, as exemplified by "Reading Text from Computer Screens" (1987) and "Human-Computer Interface Development: Concepts and Systems for Its Management" (1989).
- Performance and Architecture Optimization: Continued work on system efficiency remained crucial, with "Dataflow Machine Architecture" (1986), "Cache Memories" (1982), and "High-Speed Local Area Networks and Their Performance: A Survey" (1991) reflecting hardware and networking advancements.
Notable Shifts and Continuities: This period saw distributed systems become a cornerstone of computing research, moving beyond basic networking to complex interoperability and fault tolerance. The diversification of programming paradigms indicated a search for more effective ways to build software. AI research started to tackle more complex learning and reasoning problems. The application of computing power to specialized scientific and medical problems foreshadowed the interdisciplinary explosion to come.
1992-1998: The Multimedia and Web Revolution: Introspection and Interconnectivity
This transformative period saw the explosive emergence of multimedia systems and the World Wide Web, leading to extensive introspection within the computer science community about its future directions, alongside a strong emphasis on formal methods and object-oriented programming.
Key Themes and Trends:
- Multimedia Systems Explosion: This was the defining characteristic of the period. A significant cluster of articles in 1995, including "Large-Scale Multimedia Information Systems," "Multimedia User Interfaces," "Multimedia Database Management Systems," and "QoS Guarantees in Networked Multimedia Systems," demonstrates a comprehensive engagement with storing, processing, and delivering multimedia content. This included AI's role ("Intellimedia: Making Multimedia Usable by Exploiting AI Methods") and core technologies like "Digital Video Analysis and Recognition" (1995).
- The Rise of the World Wide Web: The internet began its pervasive influence, fundamentally changing how information was accessed and shared. "Information Superhighways Headed?" (1995) and "Databases and the Web: New Requirements for Easy Access" (1996) show the early efforts to understand and leverage this new infrastructure. "Hypertext in the Web - a history" (1999) though published slightly later, indicates the foundational influence.
- Strategic Directions and Introspection (1996): The year 1996 stands out with a massive collection of "Strategic Directions" papers, spanning nearly every subfield of computer science. This reflects a period of intense self-assessment and future planning, driven by the emergence of the Web and new paradigms. Topics ranged from "Strategic Directions in Artificial Intelligence" to "Strategic Directions in Human-Computer Interaction" and "Strategic Directions in Electronic Commerce and Digital Libraries."
- Formal Methods and Program Analysis: Formal rigor gained significant traction, especially for ensuring correctness and security. "Formal Verification, Testing and Checking of Real-Time Systems" (1996), "Research Goals for Formal Methods" (1996), and various papers on "Partial Evaluation" (1998) highlight the commitment to building more reliable software.
- Object-Oriented Programming (OOP) Maturation: OOP concepts became deeply integrated into research. "Using Design Patterns to Guide the Development of Reusable Object-Oriented Software" (1996) and "Trends in Object-Oriented Programming" (1996) show its widespread adoption and refinement.
- Security Concerns: Security remained a critical area, adapting to new challenges. "A Taxonomy of Computer Program Security Flaws" (1994) and discussions on "Provably Secure Programming Languages for Remote Evaluation" (1996) indicate ongoing efforts.
Notable Shifts and Continuities: This period was a clear inflection point. The Web and multimedia introduced entirely new research challenges and opportunities, shifting focus from traditional systems to networked, content-rich applications. The pervasive "Strategic Directions" series in 1996 signifies a collective effort to adapt to these changes. While foundational concepts continued, the context of application dramatically broadened. The emphasis on formal methods and software quality remained a strong continuity, adapting to the complexities of distributed and multimedia systems.
1999-2008: The Internet Era: Data Management, Security, and Early ML/AI Convergence
This decade saw the full realization of the internet's impact, with research heavily focused on web technologies, distributed data management, and the increasing convergence of AI and machine learning techniques with large datasets. Security became an ever-present concern in the networked world.
Key Themes and Trends:
- Web and Collaborative Systems: The internet continued its dominance, with extensive work on hypertext, hypermedia, and collaborative tools. "Hypertext on the Web: what will it take?" (1999), "Semantic Multicast: Intelligently Sharing Collaborative Sessions" (1999), and "Automating Usability Evaluation of User Interfaces" (2001) demonstrate efforts to enhance web content, enable real-time collaboration, and improve user experience online.
- Data Management and Information Retrieval: The proliferation of data led to intensive research in managing and retrieving information, especially from heterogeneous sources. "Large-Scale Semantic Integration of Linked Data" (2008), "Data Clustering: A Review" (1999), "XML Data Clustering" (2011), and "Image Retrieval: Ideas, Influences, and Trends of the New Age" (2008) show a shift towards handling diverse, unstructured, and large datasets.
- Computer Security and Privacy: With increased connectivity, security became a broader and more critical area. "Internet geolocation: Evasion and counterevasion" (2009), "A Survey on Peer-to-peer Key Management for Mobile Ad Hoc Networks" (2007), and "Network-based DDoS Defense Mechanisms" (2007) highlight the arms race in network security. "Privacy-preserving data publishing: A survey of recent developments" (2010) indicates an early but growing awareness of data privacy challenges.
- Emerging AI/Machine Learning Applications: Machine learning began to be applied more broadly, moving beyond theoretical foundations. "Machine learning in automated text categorization" (2002) and "Statistical machine translation" (2008) signify concrete applications of AI techniques to real-world problems involving large datasets.
- Distributed Systems and Architectures: The complexity of distributed systems continued to be a major theme, with new architectural patterns and challenges. "Frameworks for Component-Based Client/Server Computing" (1998) and "Application-layer overlay networks" (2010) explore ways to build scalable and flexible distributed software. "Autonomic Computing" (2008) also emerged, focusing on self-managing systems.
- Quantum Computing: While still nascent, the theoretical groundwork for quantum computing appeared, as seen in "An introduction to quantum computing for non-physicists" (2000) and "Quantum cryptography: A survey" (2007).
Notable Shifts and Continuities: This decade saw the cementing of the internet as the primary platform for computing, driving much of the research agenda. The focus shifted from how to build networked systems to how to manage and secure them effectively at scale. Machine learning started its journey from a specialized AI subfield to a practical tool applied across various domains. Privacy concerns began to evolve from basic data security to more complex issues of data publishing and anonymity. The concept of "frameworks" as reusable software structures became a dominant design paradigm.
2009-2013: Cloud, Mobile, and Big Data Take Center Stage
This period witnessed a profound shift in computing infrastructure, with the rise of cloud computing, the explosion of mobile devices, and the pervasive challenge of "Big Data." Cybersecurity and privacy continued to adapt to these new paradigms, and social networks became a significant area of analysis.
Key Themes and Trends:
- Cloud Computing Emergence: Cloud computing became a central theme, addressing resource management, energy efficiency, and new service models. "Energy Efficiency (Large-Scale Distributed Systems)" (2013), "Cloud Computing Resource Scheduling" (2015 - though it spans slightly outside, the focus emerged strongly here), and "Trust Management of Services in Cloud Environments" (2013) reflect this.
- Mobile Computing Dominance: The widespread adoption of smartphones and mobile devices drove significant research into mobile application development, context awareness, and user interaction. "Smartphone-based systems for opportunistic user context recognition" (2013) and "Mobile Learning Applications" (2013) illustrate this trend.
- Big Data Processing: The sheer volume and velocity of data generated by internet and mobile usage necessitated new processing paradigms. "The family of mapreduce and large-scale data processing systems" (2013) and "Data stream clustering: A survey" (2013) highlight the emergence of "Big Data" as a distinct field.
- Cybersecurity Evolution: Security concerns escalated with new threats and attack vectors in the cloud and mobile environments. "Botnet research through life-cycle" (2013), "Web-based malware" (2013), and "Security Issues (Hardware Virtualization)" (2013) demonstrate the increasing sophistication of cyber threats.
- Social Network Analysis: Social media platforms became rich sources of data for analysis, leading to research on trust, community detection, and information flow. "Trust in Social Networks" (2013) and "Overlapping community detection in networks" (2013) exemplify this.
- Privacy in New Contexts: Privacy adapted to the new realities of mobile and cloud data. "Privacy in mobile technology for personal healthcare" (2012) showcases a shift to domain-specific privacy concerns.
- Early Metaverse Discussions: Hints of future immersive environments appeared with "3D Virtual worlds and the metaverse: Current status and future possibilities" (2013).
Notable Shifts and Continuities: This period represents a major leap in the scale and distribution of computing. Cloud and mobile transformed infrastructure, making "Big Data" a pervasive challenge that required new processing models. Security and privacy research became more complex, dealing with distributed threats and personal data collection. The emergence of social network analysis as a research area reflected the changing landscape of human interaction online. The continuity lies in the persistent need for efficient algorithms, robust systems, and secure operations, but now applied to massively scaled and interconnected environments.
2014-2018: Pervasive Machine Learning, IoT, and Advanced Cybersecurity
This period is characterized by the accelerating dominance of Machine Learning and Deep Learning as powerful tools across diverse applications, the rapid expansion of the Internet of Things (IoT) and Edge Computing, and increasingly sophisticated cybersecurity and privacy challenges.
Key Themes and Trends:
- Pervasive Machine Learning and Deep Learning: ML, and specifically Deep Learning, began to saturate almost all domains of computer science. "Deep Learning for Biometrics" (2018), "Predicting Breast Cancer Recurrence Using Machine Learning Techniques" (2016), "Machine Learning for Big Code and Naturalness" (2018), and "Automated Design of Deep Neural Networks" (2022 - though the trend started much earlier) show the widespread application.
- Internet of Things (IoT) and Edge Computing: These concepts became major areas of research, focusing on distributed intelligence and processing closer to data sources. "Large-Scale Indexing, Discovery, and Ranking for the Internet of Things (IoT)" (2018), "Edge-Oriented Computing Paradigms" (2018), and "Analytics for the Internet of Things" (2018) highlight the expansion into ubiquitous sensing and computing.
- Advanced Cybersecurity and Privacy: The sophistication of attacks and defenses grew, encompassing a wider range of targets and techniques. "Ransomware Mitigation in the Modern Era" (2022), "Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain" (2022), "Technical Privacy Metrics" (2018), and "Homomorphic Encryption Schemes" (2018) reflect complex challenges in protecting data and systems. Initial mentions of "Blockchain" in security and data integrity also appeared.
- Human-Computer Interaction (HCI) with New Technologies: HCI adapted to wearables, AR/VR, and other novel interfaces. "Wearable Biometric Recognition Systems" (2016), "Haptic Technologies for Mobile Augmented Reality" (2022), and "Usage of Eye-Tracking (Computer Programming)" (2018) exemplify this.
- Smart Systems and Applications: The integration of computing into everyday environments led to research in smart cities, smart homes, and intelligent transportation. "Software Platforms for Smart Cities" (2018) and "Connected Car" (2016) are representative.
- Big Data Continued: While foundational, Big Data continued to be an underlying theme, with increased focus on analytics and processing models, such as "Multimedia Big Data Analytics" (2018) and "Edge Learning: The Enabling Technology for Distributed Big Data Analytics in the Edge" (2022).
Notable Shifts and Continuities: The most significant shift was the mainstream adoption and rapid advancement of Machine Learning and Deep Learning, transforming them from academic interests into pervasive technological drivers. IoT and Edge Computing emerged as new architectural paradigms, pushing processing capabilities to the network's periphery. Cybersecurity and privacy concerns became more intertwined with the technologies themselves, requiring novel cryptographic and defensive strategies. The continuity lies in the persistent pursuit of efficiency, scalability, and security, but applied to increasingly complex and interconnected ecosystems.
2019-2022: The Era of Trustworthy AI, Federated Learning, and Generative Models
This period is characterized by the maturation and pervasive adoption of Deep Learning, the explicit emergence of "Trustworthy AI" as a critical area, and the significant rise of decentralized learning paradigms like Federated Learning and transformative Generative Models. Security and privacy issues intensified, directly challenging these new AI frontiers.
Key Themes and Trends:
- Trustworthy AI Takes Center Stage: A dominant theme, emphasizing ethical, fair, explainable, and robust AI systems. Titles like "Trustworthy AI: From Principles to Practices" (2023), "Explainable AI (XAI): Core Ideas, Techniques, and Solutions" (2023), and "Fairness in Machine Learning" (2024) reflect a concerted effort to address the societal impact and reliability of AI. The specific issue of "AI Robustness" also gained prominence (e.g., "AI Robustness: a Human-Centered Perspective" 2025).
- Federated Learning and Decentralized AI: As privacy became more critical and data increasingly distributed, federated learning emerged as a key paradigm. "Blockchain-empowered Federated Learning" (2019), "Privacy-preserving Federated Learning" (2022), and "Decentralised Learning in Federated Deployment Environments" (2022) showcase this shift towards collaborative, privacy-preserving machine learning.
- Generative Models and AI-Generated Content (AIGC): The ability of AI to create content became a significant research area. "Generative Adversarial Networks (GANs): Challenges, Solutions, and Future Directions" (2022), "Video Generative Adversarial Networks" (2023), and "A Survey of AI-Generated Content (AIGC)" (2025) mark the rise of these powerful models. This also brought new security and privacy challenges, e.g., "Security and Privacy on Generative Data in AIGC" (2025).
- Enhanced Cybersecurity and Privacy for AI: The intersection of AI and security became highly complex. "Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity" (2023), "Poisoning Attacks and Countermeasures in Machine Learning" (2023), and "Membership Inference Attacks and Defenses in Federated Learning" (2025) indicate a deep dive into AI-specific vulnerabilities.
- IoT and Edge Computing Optimization: Research continued to optimize resource management, security, and performance at the network edge. "Scheduling IoT Applications in Edge and Fog Computing Environments" (2023) and "Edge Learning: The Enabling Technology for Distributed Big Data Analytics in the Edge" (2022) are examples.
- AI for Health and Medical Applications: AI's potential in healthcare grew rapidly, with specific applications like disease diagnosis, treatment, and medical data analysis. "Deep Learning for Medical Anomaly Detection" (2022) and "ML-based Early Detection of Alzheimer's Disease" (2023) exemplify this.
- Next-Generation Networking (5G/6G): Future network architectures and their integration with AI became a focus. "Five Facets of 6G: Research Challenges and Opportunities" (2019) is a prime example.
Notable Shifts and Continuities: The most pronounced shift was the explicit and critical focus on "Trustworthy AI," moving beyond just performance to consider the broader ethical and societal implications of AI systems. Federated learning and generative models emerged as groundbreaking paradigms, each bringing new security and privacy challenges that became central research problems. While core themes like security, privacy, and distributed systems remained, they were recontextualized and deepened by the pervasive influence of advanced AI. COVID-19 related research also appeared, demonstrating the field's responsiveness to global crises.
2023-2025: Frontier of AI: Foundation Models, Green AI, and Advanced Autonomy
This ongoing period represents the cutting edge of computer science, heavily influenced by the ascent of large-scale AI models, particularly Large Language Models, and a growing emphasis on sustainability, advanced autonomy, and comprehensive security for emerging technologies. "Trustworthy AI" continues to be a paramount concern, now specifically addressing issues like AI hallucination and bias in generative models.
Key Themes and Trends:
- Foundation Models and Large Language Models (LLMs): This is perhaps the most defining trend, indicating a significant leap in AI capabilities and the challenges they present. Titles like "Towards Lifelong Learning of Large Language Models" (2025), "Knowledge Editing for Large Language Models" (2025), "Natural Language Understanding and Inference with MLLM in Visual Question Answering" (2025), and "Tool Learning with Foundation Models" (2025) showcase the intense research activity around these powerful, general-purpose models.
- Trustworthy AI Deepened: The concept of trustworthy AI evolves to address specific challenges posed by generative and large models. "Hallucination Detection in Foundation Models for Decision-Making" (2025), "Fairness in Deep Learning: A Survey on Vision and Language Research" (2025), "Security and Privacy Challenges of Large Language Models" (2025), and "Causality for Trustworthy Artificial Intelligence" (2025) demonstrate a commitment to making these complex systems reliable, safe, and ethical.
- Green AI and Sustainability: A new and significant theme emerges, focusing on the environmental impact of computing, especially large-scale AI. "Green Federated Learning: A New Era of Green Aware AI" (2025) and "Green IN Artificial Intelligence from a Software Perspective" (2025) highlight the drive towards energy-efficient AI.
- Advanced Generative AI Applications: Beyond basic content generation, generative models are applied to complex domains. "Generative AI Empowered Network Digital Twins" (2025), "Deep Generative Models for Therapeutic Peptide Discovery" (2025), and "Deep Learning for Design and Generation of Virtual Architecture" (2025) show innovative uses in networking, medicine, and design.
- Cybersecurity and Privacy at Scale: Security research continues to be highly specialized, addressing vulnerabilities in new AI models and distributed systems. "Adversarial Patterns: Building Robust Android Malware Classifiers" (2025), "Attacks and Defenses for Generative Diffusion Models" (2025), and "AI Agents Under Threat: A Survey of Key Security Challenges" (2025) indicate the ongoing arms race. Privacy topics like "Pseudonym Change Strategies for Location Privacy" (2025) and "Privacy-Preserving Face Recognition System" (2025) remain crucial.
- Autonomous Systems and Robotics: AI's role in autonomous systems, from vehicles to robots, continues to expand. "Revisiting Delay Optimization for Connected Autonomous Vehicles" (2025), "LiDAR-Based Place Recognition For Autonomous Driving" (2025), and "Embodied Intelligence: A Synergy of Morphology, Action, Perception and Learning" (2025) reflect this.
- AI for Health and Societal Impact: AI applications in healthcare broaden, including "Machine Learning for Infectious Disease Risk Prediction" (2025) and "Facial Expression Analysis in Parkinsons's Disease Using Machine Learning" (2025). The use of AI for societal good, like "Tackling Climate Change with Machine Learning" (2023), also appears.
Notable Shifts and Continuities: The most striking shift is the central role of Foundation Models and LLMs, which are not just a sub-topic but seem to fundamentally reshape research across multiple domains, from NLP to vision. The emergence of Green AI signifies a growing awareness of sustainability as a design principle. "Trustworthy AI" remains a critical and evolving continuity, now specifically tackling the unique challenges of large-scale, generative models. Cybersecurity and privacy are no longer just about protecting data but about ensuring the integrity and safety of intelligent systems themselves. The interdisciplinary application of AI, particularly in health, transportation, and industrial production, continues to accelerate, often leveraging advanced network infrastructures like 6G and digital twins.
A searchable index (by theme and year) of all 273 ACM Computing Surveys cover pages (from 1968 to present).
2025

2024

2023

2022

2021

2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

2004

2003

2002

2001

2000

1999

1998

1997

1996

1995

1994

1993

1992

1991

1990

1989

1988

1987

1986

1985

1984

1983

1982

1981

1980

1979

1978

1977

1976

1975

1974

1973

1972

1971

1970

1969

1968

A searchable index (title, author, year) of all 3243 ACM Computing Surveys articles (excluding table of contents, front covers, commercials).
Common themes: software; security; privacy; data; information;
A searchable index of 8963 ACM Computing Surveys authors. 1237 authors published multiple articles.
| Rajkumar Buyya | 29 articles |
| Azzedine Boukerche | 21 articles |
| Keqin Li | 17 articles |
| Peter Denning | 14 articles |
| Philip Yu | 12 articles |
| Albert Zomaya | 11 articles |
| Muhammad Ali Babar | 10 articles |
| Omer Rana | 10 articles |
| Charith Perera | 9 articles |
| Quan Sheng | 9 articles |
| Zheng Yan | 8 articles |
| Mohammed Bennamoun | 8 articles |
| Peter Wegner | 8 articles |
| Surveyors' Forum | 8 articles |
| Sherali Zeadally | 7 articles |
| Muhammad Usman | 7 articles |
| Rachid Guerraoui | 7 articles |
| Gonzalo Navarro | 7 articles |
| Sparsh Mittal | 7 articles |
| Song Guo | 6 articles |
| Yong Li | 6 articles |
| Gheorghita Ghinea | 6 articles |
| Yang Liu | 6 articles |
| Yang Xiang | 6 articles |
| Kenli Li | 6 articles |
| Neeraj Kumar | 6 articles |
| Kim-Kwang Raymond Choo | 6 articles |
| Longbing Cao | 6 articles |
| Rui Zhang | 6 articles |
| Mubarak Shah | 6 articles |
| Rodrigo Calheiros | 6 articles |
| Vassilis Kostakos | 6 articles |
| Jaume Abella | 6 articles |
| Wanlei Zhou | 6 articles |
| Rajiv Ranjan | 6 articles |
| Shu-Ching Chen | 6 articles |
| Kotagiri Ramamohanarao | 6 articles |
| Tao Li | 6 articles |
| Rance Cleaveland | 6 articles |
| Helen Ashman | 6 articles |
| Andries van Dam | 6 articles |
| Xiaojie Wang | 5 articles |
| Zhaolong Ning | 5 articles |
| Lik-Hang Lee | 5 articles |
| Yaochu Jin | 5 articles |
| Yong Xiang | 5 articles |
| Victor Leung | 5 articles |
| Surya Nepal | 5 articles |
| Cécile Paris | 5 articles |
| Mian Ahmad Jan | 5 articles |
| Qian Wang | 5 articles |
| Ling Liu | 5 articles |
| Jiannong Cao | 5 articles |
| Liang Zhao | 5 articles |
| Jorge Gonçalves | 5 articles |
| Charu Aggarwal | 5 articles |
| Lina Yao | 5 articles |
| Clinton Fookes | 5 articles |
| Hai Jin | 5 articles |
| Jinjun Chen | 5 articles |
| Tianqing Zhu | 5 articles |
| Jun Zhang | 5 articles |
| Paul van Oorschot | 5 articles |
| Gabriel-Miro Muntean | 5 articles |
| Fátima Nunes | 5 articles |
| Antonio Loureiro | 5 articles |
| Samee Khan | 5 articles |
| S. Iyengar | 5 articles |
| Yannis Ioannidis | 5 articles |
| Wendy Hall | 5 articles |
| Jacques Cohen | 5 articles |
| Mohamed Fayad | 5 articles |
| Abraham Silberschatz | 5 articles |
| Andrew Tanenbaum | 5 articles |
| Shui Yu | 4 articles |
| Jean Luca Bez | 4 articles |
| Danda Rawat | 4 articles |
| Peng Sun | 4 articles |
| Weiwei Lin | 4 articles |
| Shiping Chen | 4 articles |
| Dimitrios Soudris | 4 articles |
| Depeng Jin | 4 articles |
| Fosca Giannotti | 4 articles |
| Eduardo Velloso | 4 articles |
| Dacheng Tao | 4 articles |
| Lei Guo | 4 articles |
| Jia Wu | 4 articles |
| Jing Zhang | 4 articles |
| Pan Hui | 4 articles |
| Adel Nadjaran Toosi | 4 articles |
| Qi Tian | 4 articles |
| Prayag Tiwari | 4 articles |
| Xiangjian He | 4 articles |
| Frank Leymann | 4 articles |
| Yashar Deldjoo | 4 articles |
| Francisco Cazorla | 4 articles |
| Zibin Zheng | 4 articles |
| Manuel Wimmer | 4 articles |
| Dawei Song | 4 articles |
| Dirk Riehle | 4 articles |
| Zahir Tari | 4 articles |
| William Fornaciari | 4 articles |
| Sajal Das | 4 articles |
| Cheol-Ho Hong | 4 articles |
| Mohammad Obaidat | 4 articles |
| Tao Mei | 4 articles |
| Peter Gorm Larsen | 4 articles |
| Wei Li | 4 articles |
| Yuval Elovici | 4 articles |
| Mei-Ling Shyu | 4 articles |
| Kui Ren | 4 articles |
| John Grundy | 4 articles |
| Christian Jensen | 4 articles |
| Aline Carneiro Viana | 4 articles |
| Albert Bifet | 4 articles |
| Xin Yao | 4 articles |
| Vipin Kumar | 4 articles |
| Satish Narayana Srirama | 4 articles |
| Shouhuai Xu | 4 articles |
| Lizhe Wang | 4 articles |
| Samira Pouyanfar | 4 articles |
| Zhiwen Yu | 4 articles |
| Yunhao Liu | 4 articles |
| John Stankovic | 4 articles |
| Francky Catthoor | 4 articles |
| Sherif Sakr | 4 articles |
| Randy Katz | 4 articles |
| Dejan Milojicic | 4 articles |
| Jim Woodcock | 4 articles |
| Athanasios Vasilakos | 4 articles |
| Rami Bahsoon | 4 articles |
| David Lilja | 4 articles |
| M. Tamer Özsu | 4 articles |
| Corrado Priami | 4 articles |
| Brad Myers | 4 articles |
| C. Hoare | 4 articles |
| Jayadev Misra | 4 articles |
| Hanan Samet | 4 articles |
| Azriel Rosenfeld | 4 articles |
| Jeffrey Scott Vitter | 4 articles |
| Richard Muntz | 4 articles |
| Luca Cardelli | 4 articles |
| Scott Smolka | 4 articles |
| Jens Palsberg | 4 articles |
| James Fry | 4 articles |
| James Peterson | 4 articles |
| Jeffrey Buzen | 4 articles |
| Henry Ledgard | 4 articles |
| Mohamed Medhat Gaber | 3 articles |
| Bang Wang | 3 articles |
| Daqing Hou | 3 articles |
| Zhenyu Wen | 3 articles |
| Xin Xia | 3 articles |
| David Lo | 3 articles |
| Valeria Cardellini | 3 articles |
| Md. Palash Uddin | 3 articles |
| Yao Zhao | 3 articles |
| Longxiang Gao | 3 articles |
| Suren Byna | 3 articles |
| Yan Wang | 3 articles |
| Debiao He | 3 articles |
| Saeid Nahavandi | 3 articles |
| Mitesh Khapra | 3 articles |
| Uwe Aickelin | 3 articles |
| Bo Du | 3 articles |
| Wentai Wu | 3 articles |
| Mohan Baruwal Chhetri | 3 articles |
| Nitesh Chawla | 3 articles |
| Li Liu | 3 articles |
| João Paulo Papa | 3 articles |
| Ying Shen | 3 articles |
| Bin Qian | 3 articles |
| Qin Wang | 3 articles |
| Qinghua Lu | 3 articles |
| Xiwei Xu | 3 articles |
| Liming Zhu | 3 articles |
| Chao Shen | 3 articles |
| Qi Li | 3 articles |
| Sheng Wen | 3 articles |
| Giorgos Armeniakos | 3 articles |
| Xiao-Ping Zhang | 3 articles |
| Marc Dacier | 3 articles |
| Ning Xie | 3 articles |
| Dusit Tao Niyato | 3 articles |
| Debi Prosad Dogra | 3 articles |
| Aditya Joshi | 3 articles |
| Mohsen Guizani | 3 articles |
| Prakash Shrestha | 3 articles |
| Nitesh Saxena | 3 articles |
| Bruno Lepri | 3 articles |
| Yushu Zhang | 3 articles |
| Henri Bal | 3 articles |
| Houbing Song | 3 articles |
| Hao Chen | 3 articles |
| Bhaskar Krishnamachari | 3 articles |
| Chen Chen | 3 articles |
| Jundong Li | 3 articles |
| Xin Wang | 3 articles |
| Cláudio Gomes | 3 articles |
| Tianyi Wang | 3 articles |
| Chen Wang | 3 articles |
| Qing Li | 3 articles |
| Jiliang Tang | 3 articles |
| Robert Deng | 3 articles |
| Liehuang Zhu | 3 articles |
| Kwok-Yan Lam | 3 articles |
| Timothy McIntosh | 3 articles |
| David Lie | 3 articles |
| Christoph Busch | 3 articles |
| Bin Xiao | 3 articles |
| Xinbo Gao | 3 articles |
| Benyou Wang | 3 articles |
| Behrouz Zolfaghari | 3 articles |
| Khodakhast Bibak | 3 articles |
| José Pereira | 3 articles |
| Shanika Karunasekera | 3 articles |
| Zehui Xiong | 3 articles |
| Wei Wang | 3 articles |
| Zhanpeng Jin | 3 articles |
| Wei Liu | 3 articles |
| Paula Branco | 3 articles |
| Tommaso Di Noia | 3 articles |
| Wentao Zhang | 3 articles |
| Bin Cui | 3 articles |
| Insup Lee | 3 articles |
| Jon Pérez-Cerrolaza | 3 articles |
| Qi Zhang | 3 articles |
| Jin Li | 3 articles |
| Saurabh Kumar Garg | 3 articles |
| Abdun Naser Mahmood | 3 articles |
| Jiuyong Li | 3 articles |
| Lin Liu | 3 articles |
| Hans-Arno Jacobsen | 3 articles |
| Prabhat Mishra | 3 articles |
| Fuqiang Gu | 3 articles |
| Asaf Shabtai | 3 articles |
| Isabelle Augenstein | 3 articles |
| Preetam Ghosh | 3 articles |
| Francesco Regazzoni | 3 articles |
| Ruben Mayer | 3 articles |
| Ludovic Henrio | 3 articles |
| Federico Reghenzani | 3 articles |
| Mark Chignell | 3 articles |
| Chenning Li | 3 articles |
| Zhichao Cao | 3 articles |
| Veda Storey | 3 articles |
| Richard Guest | 3 articles |
| Farzin Deravi | 3 articles |
| Haider Abbas | 3 articles |
| Antonia Bertolino | 3 articles |
| Bahman Javadi | 3 articles |
| Adam Jatowt | 3 articles |
| Diomidis Spinellis | 3 articles |
| Minxian Xu | 3 articles |
| Michael Pradel | 3 articles |
| Jiaheng Lu | 3 articles |
| Bo Liu | 3 articles |
| Paolo Cremonesi | 3 articles |
| Yong Rui | 3 articles |
| Yudong Tao | 3 articles |
| Nir Nissim | 3 articles |
| Pieter Hartel | 3 articles |
| Elisa Bertino | 3 articles |
| Artur Ziviani | 3 articles |
| Chao Chen | 3 articles |
| Mauro Conti | 3 articles |
| Jian Yu | 3 articles |
| Rasheed Hussain | 3 articles |
| Alessio Mecca | 3 articles |
| Maria Alejandra Rodriguez | 3 articles |
| Salman Khan | 3 articles |
| Nikos Nikolaidis | 3 articles |
| Ioannis Pitas | 3 articles |
| Edson Emílio Scalabrin | 3 articles |
| Lynda Tamine | 3 articles |
| Dietmar Jannach | 3 articles |
| Stefan Schmid | 3 articles |
| Bin Guo | 3 articles |
| Blesson Varghese | 3 articles |
| Max Mühlhäuser | 3 articles |
| Inderveer Chana | 3 articles |
| Hao Wang | 3 articles |
| Mengchi Liu | 3 articles |
| David Atienza | 3 articles |
| Huan Liu | 3 articles |
| Lionel Ni | 3 articles |
| Ujjwal Maulik | 3 articles |
| Irena Holubová | 3 articles |
| Sarvnaz Karimi | 3 articles |
| Sabri Mahmoud | 3 articles |
| Smruti Sarangi | 3 articles |
| Jin-Hee Cho | 3 articles |
| Syed Asad Hussain | 3 articles |
| Alistair Moffat | 3 articles |
| Robert Davis | 3 articles |
| Axel Jantsch | 3 articles |
| Alan Burns | 3 articles |
| Yimin Yang | 3 articles |
| Gerti Kappel | 3 articles |
| Maarten van Steen | 3 articles |
| Cinzia Cappiello | 3 articles |
| Boualem Benatallah | 3 articles |
| Fabrício Enembreck | 3 articles |
| S. Sitharama Iyengar | 3 articles |
| Goetz Graefe | 3 articles |
| Emil Lupu | 3 articles |
| Zimu Zhou | 3 articles |
| Abdullah Gani | 3 articles |
| Werner Retschitzegger | 3 articles |
| Carlo Furia | 3 articles |
| Cristina Nita-Rotaru | 3 articles |
| Alexander Thomasian | 3 articles |
| Mark Harman | 3 articles |
| John Hatcliff | 3 articles |
| Hanne Riis Nielson | 3 articles |
| Flemming Nielson | 3 articles |
| Miroslaw Malek | 3 articles |
| Pankaj Agarwal | 3 articles |
| Ouri Wolfson | 3 articles |
| Pierpaolo Degano | 3 articles |
| Ronald Prescott Loui | 3 articles |
| Michael Bieber | 3 articles |
| Les Carr | 3 articles |
| David De Roure | 3 articles |
| Patrick Cousot | 3 articles |
| Chris Hankin | 3 articles |
| Laurie Damianos | 3 articles |
| Robyn Kozierok | 3 articles |
| Frank Manola | 3 articles |
| Ahmed Elmagarmid | 3 articles |
| Alberto Pettorossi | 3 articles |
| Maurizio Proietti | 3 articles |
| Charles Consel | 3 articles |
| Peter Lee | 3 articles |
| Joseph Pasquale | 3 articles |
| Jon Doyle | 3 articles |
| David Schmidt | 3 articles |
| Garth Gibson | 3 articles |
| Isabel Cruz | 3 articles |
| Thomas Dean | 3 articles |
| Raghu Ramakrishnan | 3 articles |
| Roberto Tamassia | 3 articles |
| Ben Shneiderman | 3 articles |
| Nabil Adam | 3 articles |
| Narendra Ahuja | 3 articles |
| John Leslie King | 3 articles |
| Toby Teorey | 3 articles |
| Won Kim | 3 articles |
| George Nagy | 3 articles |
| Marvin Zelkowitz | 3 articles |
| Ingrid Carlbom | 3 articles |
| Bruce Weide | 3 articles |
| Michael Marcotty | 3 articles |
| Leon Presser | 3 articles |
| Udo Pooch | 3 articles |
| Robert Rosin | 3 articles |
| José Luis Hernández-Ramos | 2 articles |
| Chadni Islam | 2 articles |
| Sambit Bakshi | 2 articles |
| Jesse Read | 2 articles |
| Indre Zliobaite | 2 articles |
| Sylvain Kubler | 2 articles |
| Ling Yi | 2 articles |
| Yan Zhang | 2 articles |
| Huan Yan | 2 articles |
| Balaraman Ravindran | 2 articles |
| Haipeng Cai | 2 articles |
| Kleinner Farias | 2 articles |
| Haibo Hu | 2 articles |
| Vadlamani Ravi | 2 articles |
| Michael Manno | 2 articles |
| Faraz Hussain | 2 articles |
| Patricia Arias Cabarcos | 2 articles |
| Jianying Zhou | 2 articles |
| Jun Bai | 2 articles |
| Di Wu | 2 articles |
| Xiangyu Zhao | 2 articles |
| Youngjoo Shin | 2 articles |
| Jie Fu | 2 articles |
| Ji-Rong Wen | 2 articles |
| Yike Guo | 2 articles |
| Hui Xiong | 2 articles |
| Jean-Loup Guillaume | 2 articles |
| Walid Aref | 2 articles |
| Sandeep Sharma | 2 articles |
| Kui Liu | 2 articles |
| Ye Tian | 2 articles |
| Cheng He | 2 articles |
| Xingyi Zhang | 2 articles |
| Cristina Silvano | 2 articles |
| Adrián Riesco | 2 articles |
| Xiangmin Zhou | 2 articles |
| Xiuzhen Zhang | 2 articles |
| Xun Yi | 2 articles |
| Tor-Morten Grønli | 2 articles |
| Marcos Zampieri | 2 articles |
| Prasad Calyam | 2 articles |
| Jacopo Soldani | 2 articles |
| Beakcheol Jang | 2 articles |
| Jing Liu | 2 articles |
| Yang Liu 0246 | 2 articles |
| Liang Song | 2 articles |
| Miroslav Voznák | 2 articles |
| Miralem Mehic | 2 articles |
| Wei Jiang | 2 articles |
| Jinyu Zhan | 2 articles |
| Henrique Madeira | 2 articles |
| Ivanoe De Falco | 2 articles |
| Giovanna Sannino | 2 articles |
| Joaquín García-Alfaro | 2 articles |
| Judith Masthoff | 2 articles |
| Ibrahim Hossain | 2 articles |
| Sumanth Doddapaneni | 2 articles |
| Anoop Kunchukuttan | 2 articles |
| George Giannakopoulos | 2 articles |
| Georgios Paliouras | 2 articles |
| Abbas Khosravi | 2 articles |
| Pietro Lio | 2 articles |
| Zhu Xiao | 2 articles |
| Tong Li | 2 articles |
| Hongbo Jiang | 2 articles |
| Saurabh Bagchi | 2 articles |
| Kevin Chan | 2 articles |
| Ninghui Li | 2 articles |
| Yuan He | 2 articles |
| Jia Zhang | 2 articles |
| Jun Liu | 2 articles |
| Jingren Zhou | 2 articles |
| Tian Wang | 2 articles |
| Steffen Wendzel | 2 articles |
| Wojciech Mazurczyk | 2 articles |
| Mang Ye | 2 articles |
| Pong Yuen | 2 articles |
| Yang Wang | 2 articles |
| Claudia Szabo | 2 articles |
| Jennifer Rexford | 2 articles |
| Yijun Tian | 2 articles |
| Muhammad Adil | 2 articles |
| Adnan Anwar | 2 articles |
| Jiming Liu | 2 articles |
| Leandro Passos | 2 articles |
| Yiming Wang | 2 articles |
| Arif Mahmood | 2 articles |
| Yinghui Li | 2 articles |
| Nuno Moniz | 2 articles |
| Giancarlo Fortino | 2 articles |
| Sanjay Chawla | 2 articles |
| Frank Jiang | 2 articles |
| Arkady Zaslavsky | 2 articles |
| Paulo Angelo Alves Resende | 2 articles |
| André Costa Drummond | 2 articles |
| Stephanie Forrest | 2 articles |
| Chenhao Lin | 2 articles |
| Xiaohong Guan | 2 articles |
| Md. Redowan Mahmud | 2 articles |
| Vasileios Leon | 2 articles |
| Muhammad Abdullah Hanif | 2 articles |
| Xun Jiao | 2 articles |
| Kiamal Pekmestzi | 2 articles |
| Reza Hassanpour | 2 articles |
| Dorien Herremans | 2 articles |
| Lianbo Ma | 2 articles |
| Suman Kundu | 2 articles |
| Mauro Dragoni | 2 articles |
| Zikai Chang | 2 articles |
| Muhammad Shafique | 2 articles |
| Yuan Yuan | 2 articles |
| José Antonio Lozano | 2 articles |
| Soon Ki Jung | 2 articles |
| Qingyue Long | 2 articles |
| Fenyu Jiang | 2 articles |
| Dilip Prasad | 2 articles |
| Wenqi Wei | 2 articles |
| Roberta Calegari | 2 articles |
| Michela Milano | 2 articles |
| Francesca Pratesi | 2 articles |
| Han Yu | 2 articles |
| Xiaowei Li | 2 articles |
| Bin Hu | 2 articles |
| Rodrigo Barros | 2 articles |
| Joaquim Jorge | 2 articles |
| Yu Sun | 2 articles |
| Bosheng Song | 2 articles |
| Edward Tunstel | 2 articles |
| Raj Dabre | 2 articles |
| Gholamreza Haffari | 2 articles |
| Shangguang Wang | 2 articles |
| Yuan Xie | 2 articles |
| Claudio Filipi Goncalves dos Santos | 2 articles |
| Mingsong Chen | 2 articles |
| Ruoyu Zhao | 2 articles |
| Tao Wang | 2 articles |
| Xiaochun Cao | 2 articles |
| Zhiming Zhao | 2 articles |
| Lichao Sun | 2 articles |
| Ahmed Yassin Al-Dubai | 2 articles |
| Zhen Zhang | 2 articles |
| Heng Ji | 2 articles |
| Guoliang Li | 2 articles |
| Zhiyuan Liu | 2 articles |
A searchable selection of 0 interesting, educative, thought-provoking, or contraversial quotes.
Here you will find word clouds for each decade. Word clouds are generated from terms used in titles of articles.
Contact
![]() | This site is curated and maintained by Zeljko Obrenovic (@zeljko_obren). Contact him for any questions or suggestions. |
