In studying the genetic basis of a disease, it is now common to select a set of relevant genes G, and to measure how strongly...Sanjoy Dasgupta From Communications of the ACM | February 2010
Native Client is a sandbox for untrusted x86 native code. It aims to give browser-based applications the computational performance of native applications without...Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar From Communications of the ACM | January 2010
Google's Native Client is an intriguing new system that allows untrusted x86 binaries to run safely on bare metal.Dan Wallach From Communications of the ACM | January 2010
We introduce Plushie, an interactive system that allows nonprofessional users to design their own original plush toys. We successfully demonstrated that nonprofessional...Yuki Igarashi, Takeo Igarashi From Communications of the ACM | December 2009
There are many who believe we are on the verge of the biggest change in the way products are made since the Industrial...James A. Landay From Communications of the ACM | December 2009
Writing software for multicore processors is greatly simplified if we could automatically parallelize sequential programs. Although auto-parallelization has been...Milind Kulkarni, Keshav Pingali, Bruce Walter, Ganesh Ramanarayanan, Kavita Bala, L. Paul Chew From Communications of the ACM | September 2009
Looking for some new insight into an old problem? The familiar problem of writing parallel applications and a...Katherine Yelick From Communications of the ACM | September 2009
Existing literature on distributed development in software engineering and other fields discusses various challenges,...Christian Bird, Nachiappan Nagappan, Premkumar Devanbu, Harald Gall, Brendan Murphy From Communications of the ACM | August 2009
It was a problem that should not have taken three weeks to solve. The documentation claimed that if a function was called...James Herbsleb From Communications of the ACM | August 2009
This paper reports on the development and formal verification of CompCert, a compiler from Clight (a large subset of the C programming language) to PowerPC assembly...Xavier Leroy From Communications of the ACM | July 2009
In the early 1970s, pioneers like Floyd, Dijkstra, and Hoare argued that programs should be formally specified and proven...Greg Morrisett From Communications of the ACM | July 2009
Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical...Adam Coates, Pieter Abbeel, Andrew Y. Ng From Communications of the ACM | July 2009
In one scene from The Matrix, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither...Stuart Russell, Lawrence Saul From Communications of the ACM | July 2009
In a thread-safe concurrent queue, consumers typically wait for producers to make data available. In a synchronous queue, producers similarly wait for consumers...William N. Scherer, Doug Lea, Michael L. Scott From Communications of the ACM | May 2009
The advent of multicore architectures has produced a Renaissance in the study of highly concurrent data structures.Maurice Herlihy From Communications of the ACM | May 2009
DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and...J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten From Communications of the ACM | May 2009
Many systems rely on keeping a master key secret. But technological progress can undermine old assumptions.Ross Anderson From Communications of the ACM | May 2009
In this paper, we examine the use of Flash storage in the server domain. Wear-out has the potential to limit the use of Flash in this domain. To seriously consider...David Roberts, Taeho Kgil, Trevor Mudge From Communications of the ACM | April 2009
Flash memory nowadays seems to be in every discussion about system architecture. Sure enough, flash memory boasts...Goetz Graefe From Communications of the ACM | April 2009
Relative fitness is a new approach to modeling the performance of storage devices. In contrast to a conventional model, which predicts the performance of an application's...Michael P. Mesnier, Matthew Wachs, Raja R. Sambasivan, Alice X. Zheng, Gregory R. Ganger From Communications of the ACM | April 2009