acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Hiding Secrets in Programs
From Communications of the ACM

Technical Perspective: Hiding Secrets in Programs

"Indistinguishability Obfuscation from Well-Founded Assumptions," by Aayush Jain et al., gives a new construction of indistinguishability obfuscation that is provably...

Indistinguishability Obfuscation from Well-Founded Assumptions
From Communications of the ACM

Indistinguishability Obfuscation from Well-Founded Assumptions

We examine a formalization of the "one-way compiler" concept with the notion of indistinguishability obfuscation.

Technical Perspective: How Easy Is It to Describe Hard Polynomials?
From Communications of the ACM

Technical Perspective: How Easy Is It to Describe Hard Polynomials?

"Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits," by Nutan Limaye et al., achieves a landmark in the larger quest of understanding hardness,...

Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits
From Communications of the ACM

Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits

In this paper, we prove the first superpolynomial lower bounds against algebraic circuits of all constant depths over all fields of characteristic 0.

Technical Perspective: Bridging AI with Real-Time Systems
From Communications of the ACM

Technical Perspective: Bridging AI with Real-Time Systems

"Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines," by Shengzhong Liu et al., proposes a new methodology for overcoming the limitations...

Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines
From Communications of the ACM

Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines

This paper discusses algorithmic priority inversion in mission-critical machine inference pipelines used in modern neural-network-based perception subsystems and...

Technical Perspective: The User as a Key Ingredient in AAC Design
From Communications of the ACM

Technical Perspective: The User as a Key Ingredient in AAC Design

"Nonverbal Communication through Expressive Objects," by Stephanie Valencia et al., describes the design of a physical object to support communication and focuses...

Nonverbal Communication through Expressive Objects
From Communications of the ACM

Nonverbal Communication through Expressive Objects

In this work, we work closely with an Augmentative and Alternative Communication (AAC) user to understand how motion through a physical expressive object can support...

Technical Perspective: Maximum Flow through a Network: A Storied Problem and a Groundbreaking Solution
From Communications of the ACM

Technical Perspective: Maximum Flow through a Network: A Storied Problem and a Groundbreaking Solution

"Almost-Linear-Time Algorithms for Maximum Flow and Minimum-Cost Flow," by Li Chen et al., comes within striking distance of answering the question: "Does maximum...

Almost-Linear-Time Algorithms for Maximum Flow and Minimum-Cost Flow
From Communications of the ACM

Almost-Linear-Time Algorithms for Maximum Flow and Minimum-Cost Flow

We present an algorithm that computes exact maximum flows and minimum-cost flows on directed graphs with m edges and polynomially bounded integral demands, costs...

Technical Perspective: What's All the Fuss about Fuzzing?
From Communications of the ACM

Technical Perspective: What's All the Fuss about Fuzzing?

"Boosting Fuzzer Efficiency: An Information Theoretic Perspective," by Marcel Böhme, Valentin J.M. Manès, and Sang Kil Cha, presents a novel twist to fuzzing that...

Boosting Fuzzer Efficiency: An Information Theoretic Perspective
From Communications of the ACM

Boosting Fuzzer Efficiency: An Information Theoretic Perspective

In this paper, we take the fundamental perspective of fuzzing as a learning process.

Technical Perspective: Sensing Interaction with Everyday Objects Using Near-Field Communication in Textiles
From Communications of the ACM

Technical Perspective: Sensing Interaction with Everyday Objects Using Near-Field Communication in Textiles

"Locating Everyday Objects Using NFC Textiles," by Jingxian Wang et al., describes the potential of Near-Field Communication for advanced home automation.

Locating Everyday Objects Using NFC Textiles
From Communications of the ACM

Locating Everyday Objects Using NFC Textiles

This paper builds a Near-Field Communication-based localization system that allows ordinary surfaces to locate surrounding objects with high accuracy in the near...

Technical Perspective: A Rare Glimpse of Tracking Fake Reviews
From Communications of the ACM

Technical Perspective: A Rare Glimpse of Tracking Fake Reviews

"Leveraging Social Media to Buy Fake Reviews," by Sherry He et al., represents a breakthrough in our empirical understanding of fake reviews on Amazon.

Leveraging Social Media to Buy Fake Reviews
From Communications of the ACM

Leveraging Social Media to Buy Fake Reviews

We study the market for fake product reviews on Amazon.com.

Technical Perspective: Tapping the Link between Algorithmic Model Counting and Streaming
From Communications of the ACM

Technical Perspective: Tapping the Link between Algorithmic Model Counting and Streaming

"Model Counting Meets Distinct Elements," by A. Pavan et al., gives a surprising connection between model counting and streaming, providing a generic transformation...

Model Counting Meets Distinct Elements
From Communications of the ACM

Model Counting Meets Distinct Elements

In this work, we seek to investigate whether bridging the seeming communication gap between two different domains of computer science may pave the way to richer...

Technical Perspective: Can We Uncover Private Backbone Infrastructures?
From Communications of the ACM

Technical Perspective: Can We Uncover Private Backbone Infrastructures?

In "A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers," Salamatian et al. assemble techniques from the two broad strategies developed...

A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers
From Communications of the ACM

A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers

We present a new empirical approach for elucidating connectivity in privately owned and operated backbone networks.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account