acm-header
Sign In

Communications of the ACM

Latest Research



Hacking Nondeterminism with Induction and Coinduction
From Communications of the ACM

Hacking Nondeterminism with Induction and Coinduction

We introduce bisimulation up to congruence as a technique for proving language equivalence of nondeterministic finite automata.

From Communications of the ACM

Technical Perspective: Big Data Needs Approximate Computing

"Neural Acceleration for General-Purpose Approximate Programs" demonstrates the significant advantages in cost, power, and latency through approximate computing...

Neural Acceleration For General-Purpose Approximate Programs
From Communications of the ACM

Neural Acceleration For General-Purpose Approximate Programs

This paper describes a new approach that uses machine learning-based transformations to accelerate approximation-tolerant programs.

From Communications of the ACM

Technical Perspective: Rethinking Caches For Throughput Processors

As GPUs have become mainstream parallel processing engines, many applications targeting GPUs now have data locality more amenable to traditional caching. The...

Learning Your Limit
From Communications of the ACM

Learning Your Limit: Managing Massively Multithreaded Caches Through Scheduling

This paper studies the effect of accelerating highly parallel workloads with significant locality on a massively multithreaded GPU.

From Communications of the ACM

Technical Perspective: The Intricate Dance of Fabric and Light

For years, graphics programs have simulated fabric as a collection of fibers, requiring tweaks to algorithms for each new fabric. "Building Volumetric Appearance...

Building Volumetric Appearance Models of Fabric Using Micro CT Imaging
From Communications of the ACM

Building Volumetric Appearance Models of Fabric Using Micro CT Imaging

Visualizing and rendering cloth has been an important area of graphics research for decades. This paper proposes a new approach to acquiring volume models, based...

From Communications of the ACM

Technical Perspective: Attacking a Problem from the Middle

"Dissection: A New Paradigm for Solving Bicomposite Search Problems," by Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir, presents an elegant new algorithm...

Dissection
From Communications of the ACM

Dissection: A New Paradigm For Solving Bicomposite Search Problems

In this paper, we introduce the new notion of bicomposite search problems, and show that they can be solved with improved combinations of time and space complexities...

From Communications of the ACM

Technical Perspective: Portraiture in the Age of Big Data

"Moving Portraits" is, in some sense, part of the perpetual quest to capture the perfect portrait. Its principal contribution is in adapting this age-old problem...

Moving Portraits
From Communications of the ACM

Moving Portraits

We present an approach for generating face animations from large image collections of the same person. By optimizing the quantity and order in which photos are...

From Communications of the ACM

Technical Perspective: Getting Consensus For Data Replication

The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that was not written by one of the K most...

Quantifying Eventual Consistency with PBS
From Communications of the ACM

Quantifying Eventual Consistency with PBS

Eventual consistency is often "good enough" for practitioners given its latency and availability benefits. In this work, we explain this phenomenon and demonstrate...

From Communications of the ACM

Technical Perspective: The Power of Joint Multiuser Beamforming

Having multiple Wi-Fi Access Points with an overlapping coverage area operating on the same frequency may not be a problem anymore.

JMB
From Communications of the ACM

JMB: Scaling Wireless Capacity with User Demands

JMB, a joint multiuser beamforming system, enables independent access points (APs) to beamform their signals and communicate with their clients on the same channel...

From Communications of the ACM

Technical Perspective: Motion Fields For Interactive Character Animation

The following paper effectively treats motion clips as a set of independent motion vectors. In their ensemble, these high-dimensional motion vectors define a...

Motion Fields For Interactive Character Locomotion
From Communications of the ACM

Motion Fields For Interactive Character Locomotion

We propose a novel representation of motion data and control of virtual characters that gives highly agile responses to user input and allows a natural handling...

From Communications of the ACM

Technical Perspective: The Interplay of Neuroscience and Cryptography

An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is...

Neuroscience Meets Cryptography
From Communications of the ACM

Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks

We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow...

From Communications of the ACM

Technical Perspective: A 'Reasonable' Solution to Deformation Methods

Jacobson et al. construct a deformation method that allows a wide range of handle types (points, line segments, open and closed polygons) and produces deformations...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account