acm-header
Sign In

Communications of the ACM

Latest Research



Computational Complexity and Information Asymmetry in Financial Products
From Communications of the ACM

Computational Complexity and Information Asymmetry in Financial Products

Securitization of cash flows using financial derivatives transformed the financial industry over the last three decades. Derivatives...

Liability Issues in Software Engineering
From Communications of the ACM

Liability Issues in Software Engineering: The Use of Formal Methods to Reduce Legal Uncertainties

This paper reports on the results of a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools...

From Communications of the ACM

Technical Perspective: Liability Issues in Software Engineering

The paper by LeMétayer et al. addresses one technical issue in a large and serious problem in the production...

VL2: A Scalable and Flexible Data Center Network
From Communications of the ACM

VL2: A Scalable and Flexible Data Center Network

VL2 is a practical network architecture that scales to support huge data centers with uniform high capacity between servers, performance isolation between services...

From Communications of the ACM

Technical Perspective: VL2

The Internet is increasingly a platform for online services running on rack after rack of servers. With the advent of large data centers, the study of the networks...

DRAM Errors in the Wild
From Communications of the ACM

DRAM Errors in the Wild: A Large-Scale Field Study

While a large body of work exists on DRAM in lab conditions, little has been reported on real DRAM failures in large production clusters. In this paper, we analyze...

From Communications of the ACM

Technical Perspective: DRAM Errors in the Wild

In order to advance the field, knowledge of the types of memory errors at the system level, their frequencies, and conditions that exacerbate or are unrelated to...

Path Selection and Multipath Congestion Control
From Communications of the ACM

Path Selection and Multipath Congestion Control

This paper studies data transfers under two classes of multipath control, coordinated control where the rates...

From Communications of the ACM

Technical Perspective: Multipath, A New Control Architecture For the Internet

Multipath transmission for the Internet—that is, allowing users to send some of their packets along one path and...

Sora: High-Performance Software Radio Using General-Purpose Multi-Core Processors
From Communications of the ACM

Sora: High-Performance Software Radio Using General-Purpose Multi-Core Processors

Sora, a fully programmable software radio platform on commodity PC architectures, combines the performance and fidelity of hardware software-defined radio platforms...

From Communications of the ACM

Technical Perspective: Sora Promises Lasting Impact

The objective of Sora is to build a software defined radio that combines the performance and fidelity of hardware...

FastTrack: Efficient and Precise Dynamic Race Detection
From Communications of the ACM

FastTrack: Efficient and Precise Dynamic Race Detection

Multithreaded programs are notoriously prone to race conditions. Prior work developed precise dynamic race detectors that never report false alarms. However, these...

Goldilocks: A Race-Aware Java Runtime
From Communications of the ACM

Goldilocks: A Race-Aware Java Runtime

GOLDILOCKS is a Java runtime that monitors program executions and throws a DataRaceException when a data race...

From Communications of the ACM

Technical Perspective: Data Races Are Evil with No Exceptions

Exploiting parallelism has become the primary means to higher performance. Shared memory is a pervasively used programming...

Difference Engine: Harnessing Memory Redundancy in Virtual Machines
From Communications of the ACM

Difference Engine: Harnessing Memory Redundancy in Virtual Machines

Virtual machine monitors are a popular platform for Internet hosting centers and cloud-based compute services. But main memory is not amenable to multiplexed hardware...

From Communications of the ACM

Technical Perspective: A VM 'Engine' That Makes a Difference

The past decade has witnessed a renaissance in server virtualization. Diwaker Gupta et al. present a novel approach for significantly improving the efficiency of...

Reasoning About the Unknown in Static Analysis
From Communications of the ACM

Reasoning About the Unknown in Static Analysis

Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis...

From Communications of the ACM

Technical Persepctive: Large-Scale Sound and Precise Program Analysis

You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of...

The Emergence of Cross Channel Scripting
From Communications of the ACM

The Emergence of Cross Channel Scripting

Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...

From Communications of the ACM

Technical Persepctive: Attacks Target Web Server Logic and Prey on XCS Weaknesses

A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account