acm-header
Sign In

Communications of the ACM

Latest Research



Sora: High-Performance Software Radio Using General-Purpose Multi-Core Processors
From Communications of the ACM

Sora: High-Performance Software Radio Using General-Purpose Multi-Core Processors

Sora, a fully programmable software radio platform on commodity PC architectures, combines the performance and fidelity of hardware software-defined radio platforms...

From Communications of the ACM

Technical Perspective: Sora Promises Lasting Impact

The objective of Sora is to build a software defined radio that combines the performance and fidelity of hardware...

CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples
From Communications of the ACM

CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples

Compressive sampling (CoSa) is a new paradigm for developing data sampling technologies. The main computational challenge in CoSa is to reconstruct a compressible...

From Communications of the ACM

Technical Perspective: Iterative Signal Recovery From Incomplete Samples

You are given a large set of data values, and you are requested to compress, clean, recover, recognize, and/or predict...

Privacy Integrated Queries
From Communications of the ACM

Privacy Integrated Queries: An Extensible Platform For Privacy-Preserving Data Analysis

Privacy Integrated Queries (PINQ) is an extensible data analysis platform designed to provide unconditional privacy guarantees for the records of the underlying...

From Communications of the ACM

Technical Perspective: Programming With Differential Privacy

Government agencies worldwide release statistical information about population, education, and health, crime...

Phase Change Memory Architecture and the Quest For Scalability
From Communications of the ACM

Phase Change Memory Architecture and the Quest For Scalability

Memory scaling is in jeopardy as charge storage and sensing mechanisms become less reliable for prevalent memory technologies. In contrast, phase change memory...

From Communications of the ACM

Technical Perspective: Technology Scaling Redirects Main Memories

As predicted by Intel's Gordon Moore in 1965, the number of transistors that can be integrated on one die continues to double approximately...

Toward Robotic Cars
From Communications of the ACM

Toward Robotic Cars

Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine...

From Communications of the ACM

Technical Perspective: New Bar Set For Intelligent Vehicles

Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries...

Collaborative Filtering with Temporal Dynamics
From Communications of the ACM

Collaborative Filtering with Temporal Dynamics

Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer...

From Communications of the ACM

Creativity Helps Influence Prediction Precision

The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of...

Using the Forest to See the Trees
From Communications of the ACM

Using the Forest to See the Trees: Exploiting Context For Visual Object Detection and Localization

Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search...

From Communications of the ACM

Technical Perspective: Seeing the Trees, the Forest, and Much More

Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and...

Computing Arbitrary Functions of Encrypted Data
From Communications of the ACM

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic"...

From Communications of the ACM

Technical Perspective: A First Glimpse of Cryptography's Holy Grail

We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect...

Post-Silicon Bug Localization For Processors Using IFRA
From Communications of the ACM

Post-Silicon Bug Localization For Processors Using IFRA

IFRA overcomes major challenges associated with a very expensive step in post-silicon validation of processors — pinpointing a bug location and the instruction...

From Communications of the ACM

Technical Perspective: Want to Be a Bug Buster?

Microprocessor performance has increased exponentially. These chips with ever increasing complexity are not always fully functional on...

Structural Characterizations of Schema-Mapping Languages
From Communications of the ACM

Structural Characterizations of Schema-Mapping Languages

Information integration is a key challenge faced by all major organizations, business and governmental ones alike. Two research...

From Communications of the ACM

Technical Perspective: Schema Mappings: Rules For Mixing Data

When you search for products on Amazon.com, you are seeing results from thousands of vendor databases that were developed before Amazon existed. Did you ever wonder...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account