acm-header
Sign In

Communications of the ACM

Latest Research



Skinput
From Communications of the ACM

Skinput: Appropriating the Skin as an Interactive Canvas

Skinput is a technology that appropriates the skin as an input surface by analyzing mechanical vibrations that propagate through the body. Specifically, we resolve...

From Communications of the ACM

Technical Perspective: Sketches Get Sketchier

Are data synopses — such as the hash-based sketches discussed by Li and König — still needed for querying massive...

Theory and Applications of <i>b</i>-Bit Minwise Hashing
From Communications of the ACM

Theory and Applications of b-Bit Minwise Hashing

Efficient (approximate) computation of set similarity in very large datasets is a common task with many applications inminwise hashing...

Debugging in the (Very) Large
From Communications of the ACM

Debugging in the (Very) Large: Ten Years of Implementation and Experience

Windows Error Reporting (WER) is a distributed system that automates the processing of error reports coming from an installed base of a billion machines. WER has...

From Communications of the ACM

Technical Perspective: Is Scale Your Enemy, Or Is Scale Your Friend?

Scale has been the single most important force driving changes in system software over the last decade. Its impact is...

From Communications of the ACM

Technical Perspective: FAWN: A Fast Array of Wimpy Nodes

The emergence of wimpy processors and FLASH met a promising deployment scenario in the field of large-scale data centers. The energy efficiency potential of these...

FAWN
From Communications of the ACM

FAWN: A Fast Array of Wimpy Nodes

This paper presents a fast array of wimpy nodes — FAWN — an approach for achieving low-power data-intensive data-center computing.

Dremel: Interactive Analysis of Web-Scale Datasets
From Communications of the ACM

Dremel: Interactive Analysis of Web-Scale Datasets

Dremel is a scalable, interactive ad hoc query system for analysis of read-only nested data. By combining multilevel execution trees and columnar data layout, it...

From Communications of the ACM

Technical Perspective: Data Analysis at Astonishing Speed

The importance of data analysis has never been clearer. Globe-spanning scientific collaborations are exploring...

From Communications of the ACM

Technical Perspective: The Quest For a Logic For Polynomial-Time Computation

The interaction between computation and logic goes back to the beginnings of computer science with the development of computability theory...

From Polynomial Time Queries to Graph Structure Theory
From Communications of the ACM

From Polynomial Time Queries to Graph Structure Theory

We give a logical characterization of the polynomial-time properties of graphs with excluded minors.

Self-Similarity-Based Image Denoising
From Communications of the ACM

Self-Similarity-Based Image Denoising

The search for efficient image denoising methods is still a valid challenge at the crossing of functional analysis and statistics. In spite of the sophistication...

From Communications of the ACM

Technical Perspective: Images Everywhere Looking For Models

About 5,000 images per minute are uploaded to the photo-sharing site http://www.flickr.com/; over...

From Communications of the ACM

Technical Perspective: Complex Financial Products: Caveat Emptor

CDOs are examples of financial derivatives, with a value that depends on the underlying assets with which they are linked. These kinds of complex financial products...

Computational Complexity and Information Asymmetry in Financial Products
From Communications of the ACM

Computational Complexity and Information Asymmetry in Financial Products

Securitization of cash flows using financial derivatives transformed the financial industry over the last three decades. Derivatives...

Poly-Logarithmic Independence Fools Bounded-Depth Boolean Circuits
From Communications of the ACM

Poly-Logarithmic Independence Fools Bounded-Depth Boolean Circuits

The question of determining which (weak) forms of randomness "fool" (or seem totally random to) a given algorithm is a basic...

From Communications of the ACM

Technical Perspective: Patterns Hidden from Simple Algorithms

Is the number 9021960864034418159813 random? To my limited mind, the string  appears random. Is there a way to use some formal mathematics...

Liability Issues in Software Engineering
From Communications of the ACM

Liability Issues in Software Engineering: The Use of Formal Methods to Reduce Legal Uncertainties

This paper reports on the results of a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools...

From Communications of the ACM

Technical Perspective: Liability Issues in Software Engineering

The paper by LeMétayer et al. addresses one technical issue in a large and serious problem in the production...

VL2: A Scalable and Flexible Data Center Network
From Communications of the ACM

VL2: A Scalable and Flexible Data Center Network

VL2 is a practical network architecture that scales to support huge data centers with uniform high capacity between servers, performance isolation between services...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account