acm-header
Sign In

Communications of the ACM

Latest Research



Measuring Security Practices
From Communications of the ACM

Measuring Security Practices

This paper seeks to make progress on the prevalence of popular security practices and their relationship to security outcomes via the longitudinal empirical measurement...

A Fistful of Bitcoins
From Communications of the ACM

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names

Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique...

Sora: High-Performance Software Radio Using General-Purpose Multi-Core Processors
From Communications of the ACM

Sora: High-Performance Software Radio Using General-Purpose Multi-Core Processors

Sora, a fully programmable software radio platform on commodity PC architectures, combines the performance and fidelity of hardware software-defined radio platforms...

Difference Engine: Harnessing Memory Redundancy in Virtual Machines
From Communications of the ACM

Difference Engine: Harnessing Memory Redundancy in Virtual Machines

Virtual machine monitors are a popular platform for Internet hosting centers and cloud-based compute services. But main memory is not amenable to multiplexed hardware...

Spamalytics: An Empirical Analysis of Spam Marketing Conversion
From Communications of the ACM

Spamalytics: An Empirical Analysis of Spam Marketing Conversion

We all receive spam advertisements, but few of us have encountered a person who admits to following through on an offer and making a purchase. And yet, the relentlessness...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account