acm-header
Sign In

Communications of the ACM

Latest Research



Censored Exploration and the Dark Pool Problem
From Communications of the ACM

Censored Exploration and the Dark Pool Problem

The success and proliferation of dark pool stock exchanges have created challenging and interesting problems in algorithmic trading—in particular, the problem of...

From Communications of the ACM

Technical Perspective: Learning to Act in Uncertain Environments

The problem of decision making in an uncertain environment arises in many diverse contexts. The key issue in effectively solving problems like this is known as...

Toward Robotic Cars
From Communications of the ACM

Toward Robotic Cars

Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine...

From Communications of the ACM

Technical Perspective: New Bar Set For Intelligent Vehicles

Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries...

Collaborative Filtering with Temporal Dynamics
From Communications of the ACM

Collaborative Filtering with Temporal Dynamics

Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer...

From Communications of the ACM

Creativity Helps Influence Prediction Precision

The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of...

Using the Forest to See the Trees
From Communications of the ACM

Using the Forest to See the Trees: Exploiting Context For Visual Object Detection and Localization

Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search...

From Communications of the ACM

Technical Perspective: Seeing the Trees, the Forest, and Much More

Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and...

Computing Arbitrary Functions of Encrypted Data
From Communications of the ACM

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic"...

From Communications of the ACM

Technical Perspective: A First Glimpse of Cryptography's Holy Grail

We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect...

Post-Silicon Bug Localization For Processors Using IFRA
From Communications of the ACM

Post-Silicon Bug Localization For Processors Using IFRA

IFRA overcomes major challenges associated with a very expensive step in post-silicon validation of processors — pinpointing a bug location and the instruction...

From Communications of the ACM

Technical Perspective: Want to Be a Bug Buster?

Microprocessor performance has increased exponentially. These chips with ever increasing complexity are not always fully functional on...

Faster Dimension Reduction
From Communications of the ACM

Faster Dimension Reduction

Data represented geometrically in high-dimensional vector spaces can be found in many applications. The need to manipulate such data in huge corpora and to support...

From Communications of the ACM

Technical Perspective: Strange Effects in High Dimension

In studying the genetic basis of a disease, it is now common to select a set of relevant genes G, and to measure how strongly...

Structural Characterizations of Schema-Mapping Languages
From Communications of the ACM

Structural Characterizations of Schema-Mapping Languages

Information integration is a key challenge faced by all major organizations, business and governmental ones alike. Two research...

From Communications of the ACM

Technical Perspective: Schema Mappings: Rules For Mixing Data

When you search for products on Amazon.com, you are seeing results from thousands of vendor databases that were developed before Amazon existed. Did you ever wonder...

Native Client: A Sandbox For Portable, -Untrusted X86 Native Code
From Communications of the ACM

Native Client: A Sandbox For Portable, -Untrusted X86 Native Code

Native Client is a sandbox for untrusted x86 native code. It aims to give browser-based applications the computational performance of native applications without...

From Communications of the ACM

Technical Perspective: Native Client: A Clever Alternative

Google's Native Client is an intriguing new system that allows untrusted x86 binaries to run safely on bare metal.

ThinSight: A Thin Form-Factor Interactive Surface Technology
From Communications of the ACM

ThinSight: A Thin Form-Factor Interactive Surface Technology

ThinSight is a thin form-factor interactive surface technology based on optical sensors embedded inside a regular LCD. These augment the display with the ability...

From Communications of the ACM

Technical Perspective: A Graphical Sense of Touch

One of the major innovations in computing was the invention of the graphical user interface at MIT, SRI, and Xerox PARC. The...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account