acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: The Effectiveness of Security Measures
From Communications of the ACM

Technical Perspective: The Effectiveness of Security Measures

"Measuring Security Practices," by Louis F. DeKoven et al., provide a unique perspective into how users choose to implement common security advice in practice. ...

Measuring Security Practices
From Communications of the ACM

Measuring Security Practices

This paper seeks to make progress on the prevalence of popular security practices and their relationship to security outcomes via the longitudinal empirical measurement...

Technical Perspective: Physical Layer Resilience through Deep Learning in Software Radios
From Communications of the ACM

Technical Perspective: Physical Layer Resilience through Deep Learning in Software Radios

"Polymorphic Wireless Receivers," by Francesco Restuccia and Tommaso Melodia, tackles the problem of physical layer resilience in wireless systems from a completely...

Polymorphic Wireless Receivers
From Communications of the ACM

Polymorphic Wireless Receivers

We introduce PolymoRF, a deep learning-based polymorphic receiver able to reconfigure itself in real time based on the inferred waveform parameters.

Technical Perspective: Personalized Recommendation of PoIs to People with Autism
From Communications of the ACM

Technical Perspective: Personalized Recommendation of PoIs to People with Autism

"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs
From Communications of the ACM

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs: An Inclusive Recommender System

We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...

Technical Perspective: A Recipe for Protecting Against Speculation Attacks
From Communications of the ACM

Technical Perspective: A Recipe for Protecting Against Speculation Attacks

"Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data," by Jiyong Yu et al., might be a beginning of an end to speculation...

Speculative Taint Tracking (STT)
From Communications of the ACM

Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data

This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism, to block speculative execution attacks.

Technical Perspective: On Proofs, Entanglement, and Games
From Communications of the ACM

Technical Perspective: On Proofs, Entanglement, and Games

"MIP* = RE," by Zhengfeng Ji et al., studies quantum interactive proofs.

MIP* = RE
From Communications of the ACM

MIP* = RE

In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design
From Communications of the ACM

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design

"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts...

Securing the Wireless Emergency Alerts System
From Communications of the ACM

Securing the Wireless Emergency Alerts System

We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available...

Technical Perspective: Tracking Pandemic-Driven Internet Traffic
From Communications of the ACM

Technical Perspective: Tracking Pandemic-Driven Internet Traffic

"A Year in Lockdown," by Anja Feldmann, et al., offers a detailed look at how Internet traffic changed during the COVID-19 pandemic.

A Year in Lockdown
From Communications of the ACM

A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic

We review the impact of the first year of the COVID-19 pandemic on Internet traffic in order to analyze its performance.

Technical Perspective: An Elegant Model for Deriving Equations
From Communications of the ACM

Technical Perspective: An Elegant Model for Deriving Equations

"Deriving Equations from Sensor Data Using Dimensional Function Synthesis," by Vasileios Tsoutsouras, et al., addresses the key problem of discovering relationships...

Deriving Equations from Sensor Data Using Dimensional Function Synthesis
From Communications of the ACM

Deriving Equations from Sensor Data Using Dimensional Function Synthesis

We present a new method, which we call dimensional function synthesis, for deriving functions that model the relationship between multiple signals in a physical...

From Communications of the ACM

Technical Perspective: Race Logic Presents a Novel Form of Encoding

"In-Sensor Classification With Boosted Race Trees," by Georgios Tzimpragos, et al., proposes a surprising, novel, and creative approach to post-Moore's Law computing...

In-Sensor Classification With Boosted Race Trees
From Communications of the ACM

In-Sensor Classification With Boosted Race Trees

We demonstrate the potential of a novel form of encoding, race logic, in which information is represented as the delay in the arrival of a signal.

From Communications of the ACM

Technical Perspective: Localizing Insects Outdoors

"3D Localization for Subcentimeter-Sized Devices," by Iyer, et al., neatly separates and solves the problems of robotic locomotion, sensing, localization, and communications...

3D Localization for Subcentimeter-Sized Devices
From Communications of the ACM

3D Localization for Subcentimeter-Sized Devices

We present the first localization system that consumes microwatts of power at a mobile device and can be localized across multiple rooms in settings such as homes...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account