acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: What's All the Fuss about Fuzzing?
From Communications of the ACM

Technical Perspective: What's All the Fuss about Fuzzing?

"Boosting Fuzzer Efficiency: An Information Theoretic Perspective," by Marcel Böhme, Valentin J.M. Manès, and Sang Kil Cha, presents a novel twist to fuzzing that...

Boosting Fuzzer Efficiency: An Information Theoretic Perspective
From Communications of the ACM

Boosting Fuzzer Efficiency: An Information Theoretic Perspective

In this paper, we take the fundamental perspective of fuzzing as a learning process.

Technical Perspective: Sensing Interaction with Everyday Objects Using Near-Field Communication in Textiles
From Communications of the ACM

Technical Perspective: Sensing Interaction with Everyday Objects Using Near-Field Communication in Textiles

"Locating Everyday Objects Using NFC Textiles," by Jingxian Wang et al., describes the potential of Near-Field Communication for advanced home automation.

Locating Everyday Objects Using NFC Textiles
From Communications of the ACM

Locating Everyday Objects Using NFC Textiles

This paper builds a Near-Field Communication-based localization system that allows ordinary surfaces to locate surrounding objects with high accuracy in the near...

Technical Perspective: A Rare Glimpse of Tracking Fake Reviews
From Communications of the ACM

Technical Perspective: A Rare Glimpse of Tracking Fake Reviews

"Leveraging Social Media to Buy Fake Reviews," by Sherry He et al., represents a breakthrough in our empirical understanding of fake reviews on Amazon.

Leveraging Social Media to Buy Fake Reviews
From Communications of the ACM

Leveraging Social Media to Buy Fake Reviews

We study the market for fake product reviews on Amazon.com.

Technical Perspective: Tapping the Link between Algorithmic Model Counting and Streaming
From Communications of the ACM

Technical Perspective: Tapping the Link between Algorithmic Model Counting and Streaming

"Model Counting Meets Distinct Elements," by A. Pavan et al., gives a surprising connection between model counting and streaming, providing a generic transformation...

Model Counting Meets Distinct Elements
From Communications of the ACM

Model Counting Meets Distinct Elements

In this work, we seek to investigate whether bridging the seeming communication gap between two different domains of computer science may pave the way to richer...

Technical Perspective: Can We Uncover Private Backbone Infrastructures?
From Communications of the ACM

Technical Perspective: Can We Uncover Private Backbone Infrastructures?

In "A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers," Salamatian et al. assemble techniques from the two broad strategies developed...

A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers
From Communications of the ACM

A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers

We present a new empirical approach for elucidating connectivity in privately owned and operated backbone networks.

Technical Perspective: Pandemics, Remote Work, and Accessibility
From Communications of the ACM

Technical Perspective: Pandemics, Remote Work, and Accessibility

"Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship," by Kelly Mack et al., provides guidance on how to make remote...

Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship
From Communications of the ACM

Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship

Interns, full-time members, and affiliates of a Microsoft Research team focused on accessibility report on the experiences of virtual interns in 2020 navigating...

Technical Perspective: Opening the Door to SSD Algorithmics
From Communications of the ACM

Technical Perspective: Opening the Door to SSD Algorithmics

The authors of "Offline and Online Algorithms for SSD Management" propose a more accurate theoretical model of flash-based SSDs that views each page as containing...

Offline and Online Algorithms for SSD Management
From Communications of the ACM

Offline and Online Algorithms for SSD Management

We explore the problem of reducing high internal overhead of flash media which is referred to as write amplification from an algorithmic perspective, considering...

Technical Perspective: FoundationDB Performs Balancing Act
From Communications of the ACM

Technical Perspective: FoundationDB Performs Balancing Act

FoundationDB, as explored in "FoundationDB: A Distributed Key-Value Store," by Jingyu Zhou et al., pioneered the development of a scalable distributed key-value...

FoundationDB: A Distributed Key-Value Store
From Communications of the ACM

FoundationDB: A Distributed Key-Value Store

FoundationDB, an open-source transactional key-value store, is one of the first systems to combine the flexibility and scalability of NoSQL architectures with the...

Technical Perspective: What Does Provable Security Mean for Cryptographic Schemes?
From Communications of the ACM

Technical Perspective: What Does Provable Security Mean for Cryptographic Schemes?

For a given cryptographic scheme, as perfect security is almost never achievable, one requires a computational assumption. Computational assumptions are some well...

On the (In)Security of ElGamal in OpenPGP
From Communications of the ACM

On the (In)Security of ElGamal in OpenPGP

We reveal that in the interoperable world of OpenPGP, unforeseen cross-configuration attacks become possible.

Technical Perspective: Finding Connections between One-Way Functions and Kolmogorov Complexity
From Communications of the ACM

Technical Perspective: Finding Connections between One-Way Functions and Kolmogorov Complexity

"Toward Basing Cryptography on the Hardness of EXP," by Yanyi Liu and Rafael Pass, establishes surprisingly tight bidirectional connections between one-way functions...

Toward Basing Cryptography on the Hardness of EXP
From Communications of the ACM

Toward Basing Cryptography on the Hardness of EXP

We show that the only "gap" toward getting (infinitely-often) OWFs from the assumption that EXP ≠ BPP is the seemingly "minor" technical gap between two-sided error...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account