acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Hiding Secrets in Programs
From Communications of the ACM

Technical Perspective: Hiding Secrets in Programs

"Indistinguishability Obfuscation from Well-Founded Assumptions," by Aayush Jain et al., gives a new construction of indistinguishability obfuscation that is provably...

Indistinguishability Obfuscation from Well-Founded Assumptions
From Communications of the ACM

Indistinguishability Obfuscation from Well-Founded Assumptions

We examine a formalization of the "one-way compiler" concept with the notion of indistinguishability obfuscation.

Technical Perspective: How Easy Is It to Describe Hard Polynomials?
From Communications of the ACM

Technical Perspective: How Easy Is It to Describe Hard Polynomials?

"Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits," by Nutan Limaye et al., achieves a landmark in the larger quest of understanding hardness,...

Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines
From Communications of the ACM

Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines

This paper discusses algorithmic priority inversion in mission-critical machine inference pipelines used in modern neural-network-based perception subsystems and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account