The success and proliferation of dark pool stock exchanges have created challenging and interesting problems in algorithmic trading—in particular, the problem of...Kuzman Ganchev, Yuriy Nevmyvaka, Michael Kearns, Jennifer Wortman Vaughan From Communications of the ACM | May 2010
The problem of decision making in an uncertain environment arises in many diverse contexts. The key issue in effectively solving problems like this is known as...Peter L. Bartlett From Communications of the ACM | May 2010
Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine...Sebastian Thrun From Communications of the ACM | April 2010
Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries...Leslie Pack Kaelbling From Communications of the ACM | April 2010
Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer...Yehuda Koren From Communications of the ACM | April 2010
The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of...Padhraic Smyth, Charles Elkan From Communications of the ACM | April 2010
Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search...A. Torralba, K. P. Murphy, W. T. Freeman From Communications of the ACM | March 2010
Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and...Pietro Perona From Communications of the ACM | March 2010
Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic"...Craig Gentry From Communications of the ACM | March 2010
We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect...Daniele Micciancio From Communications of the ACM | March 2010
IFRA overcomes major challenges associated with a very expensive step in post-silicon validation of processors — pinpointing a bug location and the instruction...Sung-Boem Park, Subhasish Mitra From Communications of the ACM | February 2010
Microprocessor performance has increased exponentially. These chips with ever increasing complexity are not always fully functional on...Shekhar Y. Borkar From Communications of the ACM | February 2010
Data represented geometrically in high-dimensional vector spaces can be found in many applications. The need to manipulate such data in huge corpora and to support...Nir Ailon, Bernard Chazelle From Communications of the ACM | February 2010
In studying the genetic basis of a disease, it is now common to select a set of relevant genes G, and to measure how strongly...Sanjoy Dasgupta From Communications of the ACM | February 2010
Information integration is a key challenge faced by all major organizations, business and governmental ones alike. Two research...Balder ten Cate, Phokion G. Kolaitis From Communications of the ACM | January 2010
When you search for products on Amazon.com, you are seeing results from thousands of vendor databases that were developed before Amazon existed. Did you ever wonder...Alon Halevy From Communications of the ACM | January 2010
Native Client is a sandbox for untrusted x86 native code. It aims to give browser-based applications the computational performance of native applications without...Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar From Communications of the ACM | January 2010
Google's Native Client is an intriguing new system that allows untrusted x86 binaries to run safely on bare metal.Dan Wallach From Communications of the ACM | January 2010
ThinSight is a thin form-factor interactive surface technology based on optical sensors embedded inside a regular LCD. These augment the display with the ability...Shahram Izadi, Steve Hodges, Alex Butler, Darren West, Alban Rrustemi, Mike Molloy, William Buxton From Communications of the ACM | December 2009
One of the major innovations in computing was the invention of the graphical user interface at MIT, SRI, and Xerox PARC. The...Pat Hanrahan From Communications of the ACM | December 2009