Securitization of cash flows using financial derivatives transformed the financial industry over the last three decades. Derivatives...Sanjeev Arora, Boaz Barak, Markus Brunnermeier, Rong Ge From Communications of the ACM | May 2011
This paper reports on the results of a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools...Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin From Communications of the ACM | April 2011
The paper by LeMétayer et al. addresses one technical issue in a large and serious problem in the production...Daniel M. Berry From Communications of the ACM | April 2011
VL2 is a practical network architecture that scales to support huge data centers with uniform high capacity between servers, performance isolation between services...Albert Greenberg, James R. Hamilton, Navendu Jain, Srikanth Kandula, Changhoon Kim, Parantap Lahiri, David A. Maltz, Parveen Patel, Sudipta Sengupta From Communications of the ACM | March 2011
The Internet is increasingly a platform for online services running on rack after rack of servers. With the advent of large data centers, the study of the networks...Jennifer Rexford From Communications of the ACM | March 2011
While a large body of work exists on DRAM in lab conditions, little has been reported on real DRAM failures in large production clusters. In this paper, we analyze...Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber From Communications of the ACM | February 2011
In order to advance the field, knowledge of the types of memory errors at the system level, their frequencies, and conditions that exacerbate or are unrelated to...Norman P. Jouppi From Communications of the ACM | February 2011
This paper studies data transfers under two classes of multipath control, coordinated control where the rates...Peter Key, Laurent Massoulié, Don Towsley From Communications of the ACM | January 2011
Multipath transmission for the Internet—that is, allowing users to send some of their packets along one path and...Damon Wischik From Communications of the ACM | January 2011
Sora, a fully programmable software radio platform on commodity PC architectures, combines the performance and fidelity of hardware software-defined radio platforms...Kun Tan, He Liu, Jiansong Zhang, Yongguang Zhang, Ji Fang, Geoffrey M. Voelker From Communications of the ACM | January 2011
The objective of Sora is to build a software defined radio that combines the performance and fidelity of hardware...Dina Katabi From Communications of the ACM | January 2011
Multithreaded programs are notoriously prone to race conditions. Prior work developed precise dynamic race detectors that never report false alarms. However, these...Cormac Flanagan, Stephen N. Freund From Communications of the ACM | November 2010
GOLDILOCKS is a Java runtime that monitors program executions and throws a DataRaceException when a data race...Tayfun Elmas, Shaz Qadeer, Serdar Tasiran From Communications of the ACM | November 2010
Exploiting parallelism has become the primary means to higher performance. Shared memory is a pervasively used programming...Sarita Adve From Communications of the ACM | November 2010
Virtual machine monitors are a popular platform for Internet hosting centers and cloud-based compute services. But main memory is not amenable to multiplexed hardware...Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, Amin Vahdat From Communications of the ACM | October 2010
The past decade has witnessed a renaissance in server virtualization. Diwaker Gupta et al. present a novel approach for significantly improving the efficiency of...Carl Waldspurger From Communications of the ACM | October 2010
Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis...Isil Dillig, Thomas Dillig, Alex Aiken From Communications of the ACM | August 2010
You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of...Fritz Henglein From Communications of the ACM | August 2010
Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...Hristo Bojinov, Elie Bursztein, Dan Boneh From Communications of the ACM | August 2010
A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...Helen Wang From Communications of the ACM | August 2010