acm-header
Sign In

Communications of the ACM

Latest Research



Where Do People Draw Lines?
From Communications of the ACM

Where Do People Draw Lines?

This paper presents the results of a study in which artists made line drawings intended to convey specific 3D shapes.

From Communications of the ACM

Technical Perspective: Anonymity Is Not Privacy

We live in an era of data abundance. Every aspect of our online and offline behavior is captured and analyzed. The companies holding our data face the responsibility...

Wherefore Art Thou R3579X?
From Communications of the ACM

Wherefore Art Thou R3579X?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography

In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. We describe a family of attacks such...

From Communications of the ACM

Technical Perspective: Safety First!

Software misbehaves all too often. This is a truism, but also the driving force behind many computing techniques intended to increase software reliability, safety...

Safe to the Last Instruction
From Communications of the ACM

Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System

High-level computer applications build on services provided by lower-level software layers. Unfortunately, today's low-level software still suffers from a steady...

From Communications of the ACM

Technical Perspective: A Perfect 'Match'

In a breakthrough contribution, the authors of the paper that follows have developed an efficient way to find approximate nearest neighbors for the case of database...

The Patchmatch Randomized Matching Algorithm For Image Manipulation
From Communications of the ACM

The Patchmatch Randomized Matching Algorithm For Image Manipulation

This paper presents a new randomized algorithm for quickly finding approximate nearest neighbor matches between image patches. Our algorithm offers substantial...

From Communications of the ACM

Technical Perspective: Making Untrusted Code Useful

The following paper combines two important themes in secure computing: assurance and information flow control. For high assurance, a system's Trusted Computing...

Making Information Flow Explicit in HiStar
From Communications of the ACM

Making Information Flow Explicit in HiStar

Features of the new HiStar operating system permit several novel applications, including privacy-preserving, untrusted virus scanners and a dynamic Web server with...

From Communications of the ACM

Technical Perspective: Power Efficiency as the #1 Design Constraint

Moore's Law, and associated observations by Bob Dennard, describe key technical...

Understanding Sources of Ineffciency in General-Purpose Chips
From Communications of the ACM

Understanding Sources of Ineffciency in General-Purpose Chips

To better understand what improvement in processor efficiency is possible, we quantify the performance and energy overheads of a 720p HD H.264 encoder running on...

From Communications of the ACM

Technical Perspective: A Better Way to Learn Features

A typical machine learning program uses weighted combinations of features to discriminate between classes or to predict...

Unsupervised Learning of Hierarchical Representations with Convolutional Deep Belief Networks
From Communications of the ACM

Unsupervised Learning of Hierarchical Representations with Convolutional Deep Belief Networks

There has been much interest in unsupervised learning of hierarchical generative models such as deep belief networks (DBNs); however, scaling such models to full...

From Communications of the ACM

Technical Perspective: Visual Reconstruction

Nearly 460,000 Flickr pictures were used to create detailed three-dimensional geometry and colors of famous landmarks and...

Building Rome in a Day
From Communications of the ACM

Building Rome in a Day

We present a system that can reconstruct 3D geometry from large, unorganized collections of photographs. Our experimental results demonstrate that it is possible...

From Communications of the ACM

Technical Perspective: Abstracting Abstract Machines

Semanticss-based program analysis requires one to (1) start from a "friendly" semantics; (2) design a "congenial" lattice...

Abstracting Abstract Machines
From Communications of the ACM

Abstracting Abstract Machines: A Systematic Approach to Higher-Order Program Analysis

Predictive models are fundamental to engineering reliable software systems. However, designing conservative, computable approximations for the behavior of programs...

From Communications of the ACM

Technical Perspective: Making Browser Extensions Secure

Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security...

Vetting Browser Extensions For Security Vulnerabilities with VEX
From Communications of the ACM

Vetting Browser Extensions For Security Vulnerabilities with VEX

The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that...

From Communications of the ACM

Technical Perspective: Skintroducing the Future

Two critical goals for mobile devices seem intrinsically in conflict. For carrying, the smaller the better. Yet for...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account