We describe a parallel fast multipole method for highly nonuniform distributions of particles. We employ both distributed memory parallelism and shared memory parallelism...Ilya Lashuk, Aparna Chandramowlishwaran, Harper Langston, Tuan-Anh Nguyen, Rahul Sampath, Aashay Shringarpure, Richard Vuduc, Lexing Ying, Denis Zorin, George Biros From Communications of the ACM | May 2012
With Aardvark, a social search engine, users ask a question, either by IM, e-mail, Web input, text message, or voice. Aardvark then routes the question to the person...Damon Horowitz, Sepandar D. Kamvar From Communications of the ACM | April 2012
It is difficult to remember what people had to do to find the answer to a question before the Web. One option might be to call a friend who might know the answer...Ed H. Chi From Communications of the ACM | April 2012
The ancient oriental game of Go has long been considered a grand challenge for artificial intelligence. However, computer Go programs based on Monte-Carlo tree...Sylvain Gelly, Levente Kocsis, Marc Schoenauer, Michèle Sebag, David Silver, Csaba Szepesvári, Olivier Teytaud From Communications of the ACM | March 2012
Researchers in artificial intelligence know that computers still lag far behind human levels of play in many games of strategy. One such contest of wits is Go...Michael L. Littman From Communications of the ACM | March 2012
Affordable personal computing hardware and the usable GUI-based PC operating systems made the vision of "a computer on every desktop and in every home" a reality...Steven D. Gribble From Communications of the ACM | March 2012
Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs...Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway From Communications of the ACM | March 2012
Data in high dimension is difficult to visualize and understand. This has always been the case and is even more apparent now with the availability of large high...Santosh S. Vempala From Communications of the ACM | February 2012
The Gaussian mixture model is one of the oldest and most widely used statistical models. Our work focuses on the case where the mixture consists of a small but...Adam Tauman Kalai, Ankur Moitra, Gregory Valiant From Communications of the ACM | February 2012
The following paper by Viktor Kuncak et al. integrates declarative programming into a general-purpose language, allowing one to escape the host language when...Rastislav Bodik From Communications of the ACM | February 2012
Automated synthesis of program fragments from specifications can make programs easier to write and easier to reason about. To integrate synthesis into programming...Viktor Kuncak, Mikaël Mayer, Ruzica Piskac, Philippe Suter From Communications of the ACM | February 2012
Much has changed in the 50 years since the invention of packet switching and the early network designs and deployments that...Jim Kurose From Communications of the ACM | January 2012
Current network use is dominated by content distribution and retrieval yet current networking protocols are designed for conversations between hosts. We present...Van Jacobson, Diana K. Smetters, James D. Thornton, Michael Plass, Nick Briggs, Rebecca Braynard From Communications of the ACM | January 2012
Computer graphics once focused exclusively on realism. The field eventually broadened to include other pictorial...Frédo Durand From Communications of the ACM | January 2012
This paper presents the results of a study in which artists made line drawings intended to convey specific 3D shapes.Forrester Cole, Aleksey Golovinskiy, Alex Limpaecher, Heather Stoddart Barros, Adam Finkelstein, Thomas Funkhouser, Szymon Rusinkiewicz From Communications of the ACM | January 2012
We live in an era of data abundance. Every aspect of our online and offline behavior is captured and analyzed. The companies holding our data face the responsibility...Vitaly Shmatikov From Communications of the ACM | December 2011
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. We describe a family of attacks such...Lars Backstrom, Cynthia Dwork, Jon Kleinberg From Communications of the ACM | December 2011
Software misbehaves all too often. This is a truism, but also the driving force behind many computing techniques intended to increase software reliability, safety...Xavier Leroy From Communications of the ACM | December 2011
High-level computer applications build on services provided by lower-level software layers. Unfortunately, today's low-level software still suffers from a steady...Jean Yang, Chris Hawblitzel From Communications of the ACM | December 2011
The following paper combines two important themes in secure computing: assurance and information flow control. For high assurance, a system's Trusted Computing...Butler Lampson From Communications of the ACM | November 2011