This paper presents the results of a study in which artists made line drawings intended to convey specific 3D shapes.Forrester Cole, Aleksey Golovinskiy, Alex Limpaecher, Heather Stoddart Barros, Adam Finkelstein, Thomas Funkhouser, Szymon Rusinkiewicz From Communications of the ACM | January 2012
We live in an era of data abundance. Every aspect of our online and offline behavior is captured and analyzed. The companies holding our data face the responsibility...Vitaly Shmatikov From Communications of the ACM | December 2011
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. We describe a family of attacks such...Lars Backstrom, Cynthia Dwork, Jon Kleinberg From Communications of the ACM | December 2011
Software misbehaves all too often. This is a truism, but also the driving force behind many computing techniques intended to increase software reliability, safety...Xavier Leroy From Communications of the ACM | December 2011
High-level computer applications build on services provided by lower-level software layers. Unfortunately, today's low-level software still suffers from a steady...Jean Yang, Chris Hawblitzel From Communications of the ACM | December 2011
In a breakthrough contribution, the authors of the paper that follows have developed an efficient way to find approximate nearest neighbors for the case of database...William T. Freeman From Communications of the ACM | November 2011
This paper presents a new randomized algorithm for quickly finding approximate nearest neighbor matches between image patches. Our algorithm offers substantial...Connelly Barnes, Dan B. Goldman, Eli Shechtman, Adam Finkelstein From Communications of the ACM | November 2011
The following paper combines two important themes in secure computing: assurance and information flow control. For high assurance, a system's Trusted Computing...Butler Lampson From Communications of the ACM | November 2011
Features of the new HiStar operating system permit several novel applications, including privacy-preserving, untrusted virus scanners and a dynamic Web server with...Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, David Mazières From Communications of the ACM | November 2011
To better understand what improvement in processor efficiency is possible, we quantify the performance and energy overheads of a 720p HD H.264 encoder running on...Rehan Hameed, Wajahat Qadeer, Megan Wachs, Omid Azizi, Alex Solomatnikov, Benjamin C. Lee, Stephen Richardson, Christos Kozyrakis, Mark Horowitz From Communications of the ACM | October 2011
A typical machine learning program uses weighted combinations of features to discriminate between classes or to predict...Geoffrey E. Hinton From Communications of the ACM | October 2011
There has been much interest in unsupervised learning of hierarchical generative models such as deep belief networks (DBNs); however, scaling such models to full...Honglak Lee, Roger Grosse, Rajesh Ranganath, Andrew Y. Ng From Communications of the ACM | October 2011
Nearly 460,000 Flickr pictures were used to create detailed three-dimensional geometry and colors of famous landmarks and...Carlo Tomasi From Communications of the ACM | October 2011
We present a system that can reconstruct 3D geometry from large, unorganized collections of photographs. Our experimental results demonstrate that it is possible...Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Ian Simon, Brian Curless, Steven M. Seitz, Richard Szeliski From Communications of the ACM | October 2011
Semanticss-based program analysis requires one to (1) start from a "friendly" semantics; (2) design a "congenial" lattice...Olivier Danvy, Jan Midtgaard From Communications of the ACM | September 2011
Predictive models are fundamental to engineering reliable software systems. However, designing conservative, computable approximations for the behavior of programs...David Van Horn, Matthew Might From Communications of the ACM | September 2011
Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security...Christopher Kruegel From Communications of the ACM | September 2011
The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that...Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett From Communications of the ACM | September 2011
Two critical goals for mobile devices seem intrinsically in conflict. For carrying, the smaller the better. Yet for...Scott Klemmer From Communications of the ACM | August 2011