"Symbol-Synchronous Buses," by Jonathan Oostvogels et al., conceives a notion of a symbol-synchronous bus, which effectively makes a multi-hop wireless network...Luca Mottola From Communications of the ACM | April 2023
We describe a novel networking paradigm that aims to enable a new class of latency-sensitive applications by systematically breaking networking abstractions.
Jonathan Oostvogels, Fan Yang, Sam Michiels, Danny Hughes From Communications of the ACM | April 2023
The breakthrough of "Achieving High Performance the Functional Way," by Bastian Hagedorn et al., is in fundamentally rethinking the design of user-schedulable languages...Jonathan Ragan-Kelley From Communications of the ACM | March 2023
We show how to employ functional programming techniques to solve with elegance the challenge of using a high-level language to describe functionality and a separate...Bastian Hagedorn, Johannes Lenfers, Thomas KÅ“hler, Xueying Qin, Sergei Gorlatch, Michel Steuwer From Communications of the ACM | March 2023
"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al., addresses the challenge of processing an intractably large set of trained models...Martin Vechev From Communications of the ACM | February 2023
We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for...Samuel Drews, Aws Albarghouthi, Loris D'Antoni From Communications of the ACM | February 2023
"Actionable Auditing Revisited," by Inioluwa Deborah Raji and Joy Buolamwini, examines how companies producing commercial facial classification software responded...Vincent Conitzer, Gillian K. Hadfield, Shannon Vallor From Communications of the ACM | January 2023
This paper investigates the commercial impact of Gender Shades, the first algorithmic audit of gender- and skin-type performance disparities in commercial facial...Inioluwa Deborah Raji, Joy Buolamwini From Communications of the ACM | January 2023
"DIAMetrics," by Shaleen Deep et al., describes a versatile framework from Google for automatic extraction of benchmarks and their distributed execution and performance...Peter Boncz From Communications of the ACM | December 2022
This paper introduces DIAMetrics: a novel framework for end-to-end benchmarking and performance monitoring of query engines.
Shaleen Deep, Anja Gruenheid, Kruthi Nagaraj, Hiro Naito, Jeff Naughton, Stratis Viglas From Communications of the ACM | December 2022
The work explored in "Hummingbird," by Sujay Narayana et al., focuses on the energy consumption of a typical GPS receiver and its operational challenges in a nanosat...Karthik Dantu From Communications of the ACM | November 2022
In this work, we elucidate the design of a low-cost, low-power GPS receiver for small satellites.
Sujay Narayana, R. Venkatesha Prasad, Vijay S. Rao, Luca Mottola, T. V. Prabhakar From Communications of the ACM | November 2022
"Traffic Classification in an Increasingly Encrypted Web," by Iman Akbari et al., does a great job in reviewing related work in the network traffic classification...Athina Markopoulou From Communications of the ACM | October 2022
In this paper, we design a novel feature engineering approach used for encrypted Web protocols, and develop a neural network architecture based on stacked long...Iman Akbari, Mohammad A. Salahuddin, Leni Ven, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stephane Tuffin From Communications of the ACM | October 2022
"AuraRing: Precise Electromagnetic Finger Tracking," by Farshid Salemi Parizi, Eric Whitmire, and Shwetak Patel, details the AuraRing system's remarkable ability...Yang Zhang From Communications of the ACM | October 2022
We present AuraRing, a wearable magnetic tracking system designed for tracking fine-grained finger movement.
Farshid Salemi Parizi, Eric Whitmire, Shwetak Patel From Communications of the ACM | October 2022
"Measuring Security Practices," by Louis F. DeKoven et al., provide a unique perspective into how users choose to implement common security advice in practice.
...Nicolas Christin From Communications of the ACM | September 2022
This paper seeks to make progress on the prevalence of popular security practices and their relationship to security outcomes via the longitudinal empirical measurement...Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage From Communications of the ACM | September 2022
"Polymorphic Wireless Receivers," by Francesco Restuccia and Tommaso Melodia, tackles the problem of physical layer resilience in wireless systems from a completely...Falko Dressler From Communications of the ACM | September 2022
We introduce PolymoRF, a deep learning-based polymorphic receiver able to reconfigure itself in real time based on the inferred waveform parameters.
Francesco Restuccia, Tommaso Melodia From Communications of the ACM | September 2022