There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?
Dan Suciu From Communications of the ACM | September 2012
An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data,...Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan From Communications of the ACM | September 2012
Like other IT fields, computer architects initially reported incomparable results. We quickly saw the folly of this approach. We then went through a sequence...David Patterson From Communications of the ACM | July 2012
The past 10 years have delivered two significant revolutions. Microprocessor design has been transformed — leading to multicore processors. And an entirely new...Hadi Esmaeilzadeh, Ting Cao, Xi Yang, Stephen M. Blackburn, Kathryn S. McKinley From Communications of the ACM | July 2012
Suppose that one observes an incomplete subset of entries selected from a low-rank matrix. When is it possible to complete the matrix and recover the entries that...Emmanuel Candès, Benjamin Recht From Communications of the ACM | June 2012
The problem of estimating or reconstructing an unknown structured object from incomplete, partial, noisy measurements is a fundamental one in scientific and technological...Pablo A. Parrilo From Communications of the ACM | June 2012
With Aardvark, a social search engine, users ask a question, either by IM, e-mail, Web input, text message, or voice. Aardvark then routes the question to the person...Damon Horowitz, Sepandar D. Kamvar From Communications of the ACM | April 2012
It is difficult to remember what people had to do to find the answer to a question before the Web. One option might be to call a friend who might know the answer...Ed H. Chi From Communications of the ACM | April 2012
Affordable personal computing hardware and the usable GUI-based PC operating systems made the vision of "a computer on every desktop and in every home" a reality...Steven D. Gribble From Communications of the ACM | March 2012
Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs...Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway From Communications of the ACM | March 2012
Much has changed in the 50 years since the invention of packet switching and the early network designs and deployments that...Jim Kurose From Communications of the ACM | January 2012
Current network use is dominated by content distribution and retrieval yet current networking protocols are designed for conversations between hosts. We present...Van Jacobson, Diana K. Smetters, James D. Thornton, Michael Plass, Nick Briggs, Rebecca Braynard From Communications of the ACM | January 2012
To better understand what improvement in processor efficiency is possible, we quantify the performance and energy overheads of a 720p HD H.264 encoder running on...Rehan Hameed, Wajahat Qadeer, Megan Wachs, Omid Azizi, Alex Solomatnikov, Benjamin C. Lee, Stephen Richardson, Christos Kozyrakis, Mark Horowitz From Communications of the ACM | October 2011
Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security...Christopher Kruegel From Communications of the ACM | September 2011
The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that...Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett From Communications of the ACM | September 2011
Two critical goals for mobile devices seem intrinsically in conflict. For carrying, the smaller the better. Yet for...Scott Klemmer From Communications of the ACM | August 2011
Skinput is a technology that appropriates the skin as an input surface by analyzing mechanical vibrations that propagate through the body. Specifically, we resolve...Chris Harrison, Desney Tan, Dan Morris From Communications of the ACM | August 2011
Are data synopses — such as the hash-based sketches discussed by Li and König — still needed for querying massive...Peter J. Haas From Communications of the ACM | August 2011
Efficient (approximate) computation of set similarity in very large datasets is a common task with many applications inminwise hashing...Ping Li, Arnd Christian König From Communications of the ACM | August 2011