Share
VIDEOS 1 TO 50
ACM Computing Classification System
ACM Computing Classification System
Published: 2016/01/22
Channel: WikiAudio
ACM Classification System
ACM Classification System
Published: 2014/11/18
Channel: Dan Morgan
ACM Classification System
ACM Classification System
Published: 2017/02/18
Channel: Husain Patel
How to Use the ACM Computation Classification System in ACM Digital Library
How to Use the ACM Computation Classification System in ACM Digital Library
Published: 2015/12/15
Channel: UAkronLibraries
ACM CCS 2017 - Hindsight: Understanding the Evolution of UI Vulnerabilities [...] - Meng Luo
ACM CCS 2017 - Hindsight: Understanding the Evolution of UI Vulnerabilities [...] - Meng Luo
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM Classification Scheme
ACM Classification Scheme
Published: 2017/11/02
Channel: Daniel Wright
ACM CCS 2017 - Deterministic Browser - Zhanhao Chen
ACM CCS 2017 - Deterministic Browser - Zhanhao Chen
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM classification system
ACM classification system
Published: 2016/03/25
Channel: Aqib Qureshi
11 1 17 ACM CCS   Xi He   Composing Differential Privacy Secure Computation
11 1 17 ACM CCS Xi He Composing Differential Privacy Secure Computation
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Detecting Structurally Anomalous Logins with Enterprise Networks - Hossein Siadati
ACM CCS 2017 - Detecting Structurally Anomalous Logins with Enterprise Networks - Hossein Siadati
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
acm classification scheme
acm classification scheme
Published: 2016/03/03
Channel: s ahmed
ACM CCS 2017 - SemFuzz: Semantics-Based Automatic Generation of [...] - Wei You
ACM CCS 2017 - SemFuzz: Semantics-Based Automatic Generation of [...] - Wei You
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Scaling ORAM for Secure Computation - Jack Doerner
ACM CCS 2017 - Scaling ORAM for Secure Computation - Jack Doerner
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - FreeGuard: A Faster Secure Heap Allocator - Sam Silvestro
ACM CCS 2017 - FreeGuard: A Faster Secure Heap Allocator - Sam Silvestro
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
11 1 17 ACM CCS   Doowon Kim   Certified Malware Measuring Breaches of Trust
11 1 17 ACM CCS Doowon Kim Certified Malware Measuring Breaches of Trust
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
CCS 2017
CCS 2017
Published: 2017/10/06
Channel: nursemilissa
11 1 17 ACM CCS   Aaron Segal   Practical Secure Aggregation Machine Learning
11 1 17 ACM CCS Aaron Segal Practical Secure Aggregation Machine Learning
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Object Flow Integrity - Wenhao Wang
ACM CCS 2017 - Object Flow Integrity - Wenhao Wang
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - A Type System for Privacy Properties - Joseph Lallemand
ACM CCS 2017 - A Type System for Privacy Properties - Joseph Lallemand
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Standardizing Bad Cryptographic Practice - IEEE P1735 [...] - Animesh Chhotaray
ACM CCS 2017 - Standardizing Bad Cryptographic Practice - IEEE P1735 [...] - Animesh Chhotaray
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
11 1 17 ACM CCS   Yizheng Chen   Practical Attacks Graph Based Clustering
11 1 17 ACM CCS Yizheng Chen Practical Attacks Graph Based Clustering
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - The TypTop System - Personalized Typo-Tolerant Password [...] - R. Chatterjee
ACM CCS 2017 - The TypTop System - Personalized Typo-Tolerant Password [...] - R. Chatterjee
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Private Information Retrieval - Ryan Henry
ACM CCS 2017 - Private Information Retrieval - Ryan Henry
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017. Pool: Scalable On-Demand Secure computation Service [...] - Ruiyu Zhu
ACM CCS 2017. Pool: Scalable On-Demand Secure computation Service [...] - Ruiyu Zhu
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Oblivious Neural Network Predictions via MiniONN Transformations - Jian Liu
ACM CCS 2017 - Oblivious Neural Network Predictions via MiniONN Transformations - Jian Liu
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Concurrency and Privacy with Payment Channel Networks - Giulio Malavolta
ACM CCS 2017 - Concurrency and Privacy with Payment Channel Networks - Giulio Malavolta
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Machine Learning Models that Remember Too Much - Congzheng Song
ACM CCS 2017 - Machine Learning Models that Remember Too Much - Congzheng Song
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - SGX Shielding Frameworks and Development Tools - Chia-Che Tsai
ACM CCS 2017 - SGX Shielding Frameworks and Development Tools - Chia-Che Tsai
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - S3ORAM: A Computation-Efficient and Constant Client Bandwidth [...] - Thang Hoang
ACM CCS 2017 - S3ORAM: A Computation-Efficient and Constant Client Bandwidth [...] - Thang Hoang
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Verifying Security Policies in Multi-Agent Workflows [...] - Christian Muller
ACM CCS 2017 - Verifying Security Policies in Multi-Agent Workflows [...] - Christian Muller
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Poised: Spotting Twitter Spam Off the Beaten Paths - Shirin Nilizadeh
ACM CCS 2017 - Poised: Spotting Twitter Spam Off the Beaten Paths - Shirin Nilizadeh
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Efficient, Constant Round and Actively Secure MPC [...] - Satya Vusirikala
ACM CCS 2017 - Efficient, Constant Round and Actively Secure MPC [...] - Satya Vusirikala
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Jasmin: High-Assurance and High-Speed Cryptography - Vincent Laporte
ACM CCS 2017 - Jasmin: High-Assurance and High-Speed Cryptography - Vincent Laporte
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - DUPLO: Unifying Cut-and-Choose for Garbled Circuits - Ni Trieu
ACM CCS 2017 - DUPLO: Unifying Cut-and-Choose for Garbled Circuits - Ni Trieu
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - REVIVE: Rebalancing Off-Blockchain Payment Networks - Rami Khalil
ACM CCS 2017 - REVIVE: Rebalancing Off-Blockchain Payment Networks - Rami Khalil
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Full Accounting for Verifiable Outsourcing - Riad Wahby
ACM CCS 2017 - Full Accounting for Verifiable Outsourcing - Riad Wahby
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Predicting the Risk of Cyber Incidents  - Leyla Bilge
ACM CCS 2017 - Predicting the Risk of Cyber Incidents - Leyla Bilge
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Rise of the HaCRS - Augmenting Atonomous Cyber Reasoning [...] - Yan Shoshitaishvili
ACM CCS 2017 - Rise of the HaCRS - Augmenting Atonomous Cyber Reasoning [...] - Yan Shoshitaishvili
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - A Large-Scale Empirical Study of Security Patches - Frank Li
ACM CCS 2017 - A Large-Scale Empirical Study of Security Patches - Frank Li
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - MagNet: A Two-Pronged Defense Against Adversarial Examples - Dongyu Meng
ACM CCS 2017 - MagNet: A Two-Pronged Defense Against Adversarial Examples - Dongyu Meng
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Attribute-Based Encryption in the Generic Group Model [...] - Miguel Ambrona
ACM CCS 2017 - Attribute-Based Encryption in the Generic Group Model [...] - Miguel Ambrona
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Keep Me Updated: An Empircal Study of Third-Party Library [...] - Erik Derr
ACM CCS 2017 - Keep Me Updated: An Empircal Study of Third-Party Library [...] - Erik Derr
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - AuthScope: Towards Automatic Discovery of Vulnerable [...] - Qingchuan Zhao
ACM CCS 2017 - AuthScope: Towards Automatic Discovery of Vulnerable [...] - Qingchuan Zhao
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Cliptography: Post-Snowden Cryptography - Part 2 - Presentation by Qiang Tang
ACM CCS 2017 - Cliptography: Post-Snowden Cryptography - Part 2 - Presentation by Qiang Tang
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - A Longitudinal Study of Combosquatting Abuse - Panagiotis Kintis
ACM CCS 2017 - A Longitudinal Study of Combosquatting Abuse - Panagiotis Kintis
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Security Issues on Intel SGX - Taesoo Kim
ACM CCS 2017 - Security Issues on Intel SGX - Taesoo Kim
Published: 2018/02/06
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Contactless Control Flow Monitoring [...] - Yi Han
ACM CCS 2017 - Contactless Control Flow Monitoring [...] - Yi Han
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Betrayal, Distrust, and Rationality: Smart Counter Collusion [...] - Changyu Dong
ACM CCS 2017 - Betrayal, Distrust, and Rationality: Smart Counter Collusion [...] - Changyu Dong
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Precise Detection of Side-Channel Vulnerabilities [...] - Jia Chen
ACM CCS 2017 - Precise Detection of Side-Channel Vulnerabilities [...] - Jia Chen
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
ACM CCS 2017 - Generic Semantic Security Against a Kleptographic Adversary - Qiang Tang
ACM CCS 2017 - Generic Semantic Security Against a Kleptographic Adversary - Qiang Tang
Published: 2018/02/08
Channel: Association of Computing Machinery 2017
NEXT
GO TO RESULTS [51 .. 100]

WIKIPEDIA ARTICLE

From Wikipedia, the free encyclopedia
Jump to: navigation, search

The ACM Computing Classification System (CCS) is a subject classification system for computing devised by the Association for Computing Machinery (ACM). The system is comparable to the Mathematics Subject Classification (MSC) in scope, aims, and structure, being used by the various ACM journals to organise subjects by area.

History[edit]

The system has gone through seven revisions, the first version being published in 1964, and revised versions appearing in 1982, 1983, 1987, 1991, 1998, and the now current version in 2012.

Structure[edit]

The ACM Computing Classification System, version 2012, has a revolutionary change in some areas, for example, in "Software" that now is called "Software and its engineering" which has three main subjects:

  • Software organization and properties. This subject addresses properties of the software itself.
  • Software notations and tools. This subject covers programming languages and other tools for writing programs.
  • Software creation and management. This subject covers human activities including software management.

It is hierarchically structured in four levels. Thus, for example, one branch of the hierarchy contains:

Computing methodologies
Artificial intelligence
Knowledge representation and reasoning
Ontology engineering

See also[edit]

References[edit]

External links[edit]

  • ACM Computing Classification System is the homepage of the system, including links to four complete versions of the system, for 1964 [1], 1991 [2], 1998 [3], and the current 2012 version [4].
  • The ACM Computing Research Repository uses a classification scheme that is much coarser than the ACM subject classification, and does not cover all areas of CS, but is intended to better cover active areas of research. In addition, papers in this repository are classified according to the ACM subject classification.



Disclaimer

None of the audio/visual content is hosted on this site. All media is embedded from other sites such as GoogleVideo, Wikipedia, YouTube etc. Therefore, this site has no control over the copyright issues of the streaming media.

All issues concerning copyright violations should be aimed at the sites hosting the material. This site does not host any of the streaming media and the owner has not uploaded any of the material to the video hosting servers. Anyone can find the same content on Google Video or YouTube by themselves.

The owner of this site cannot know which documentaries are in public domain, which has been uploaded to e.g. YouTube by the owner and which has been uploaded without permission. The copyright owner must contact the source if he wants his material off the Internet completely.

Powered by YouTube
Wikipedia content is licensed under the GFDL and (CC) license