The inherent scalability of an interface is the focus of "The Scalable Commutativity Rule" by Austin T. Clements, et al.
Marc Shapiro From Communications of the ACM | August 2017
This paper introduces an interface-driven approach to building scalable software.
Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert T. Morris, Nickolai Zeldovich From Communications of the ACM | August 2017
"IronFleet: Proving Safety and Liveness of Practical Distributed Systems," by Chris Hawblitzel, et al., describes mechanically checked proofs for two non-trivial...Fred B. Schneider From Communications of the ACM | July 2017
We demonstrate the methodology on a complex implementation of a Paxos-based replicated state machine library and a lease-based sharded key-value store. With our...Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob R. Lorch, Bryan Parno, Michael L. Roberts, Srinath Setty, Brian Zill From Communications of the ACM | July 2017
In "Fast and Powerful Hashing Using Tabulation," Mikkel Thorup describes a variation of simple but surprisingly effective and powerful hash functions based on using...Michael Mitzenmacher From Communications of the ACM | July 2017
We survey recent results on how simple hashing schemes based on tabulation provide unexpectedly strong guarantees.
Mikkel Thorup From Communications of the ACM | July 2017
"DeepDive: Declarative Knowledge Base Construction" is a prime example of groundbreaking work in the area of Knowledge Base Construction.
Alon Halevy From Communications of the ACM | May 2017
We describe DeepDive, a system that combines database and machine learning ideas to help to develop knowledge base construction systems.
Ce Zhang, Christopher Ré, Michael Cafarella, Christopher De Sa, Alex Ratner, Jaeho Shin, Feiran Wang, Sen Wu From Communications of the ACM | May 2017
"Exploiting Vector Instructions with Generalized Stream Fusion" points out that stream fusion by itself is not well suited for generating bulk instructions such...Guy Blelloch From Communications of the ACM | May 2017
Programmers should not have to sacrifice code clarity or good software engineering practices to obtain performance. This work shows how to attain this goal for...Geoffrey Mainland, Roman Leshchinskiy, Simon Peyton Jones From Communications of the ACM | May 2017
The authors of "Guilt-Free Data Reuse" show there is a way to construct a safety net that goes around a fixed dataset so that it may be analyzed interactively without...Jonathan Ullman From Communications of the ACM | April 2017
In this work, we initiate a principled study of how to guarantee the validity of statistical inference in adaptive data analysis.
Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, Aaron Roth From Communications of the ACM | April 2017
"Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes" presents a big step toward real-world file systems that are crash-safe...Gernot Heiser From Communications of the ACM | April 2017
This paper introduces Crash Hoare logic, which extends traditional Hoare logic with a crash condition, a recovery procedure, and logical address spaces for specifying...Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler From Communications of the ACM | April 2017
What is the most drastic way to reduce the cost of communication for parallel data processing algorithms? This is the question studied in "Reasoning on Data Partitioning...Leonid Libkin From Communications of the ACM | March 2017
We introduce a framework for reasoning about data partitioning to detect when we can avoid the data reshuffling step.
Tom J. Ameloot, Gaetano Geck, Bas Ketsman, Frank Neven, Thomas Schwentick From Communications of the ACM | March 2017
One unfortunate fact about protocols is that as they get older and applied to more scenarios — and TLS is used basically everywhere — they tend to gain weight....Eric Rescorla From Communications of the ACM | February 2017
We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how...Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue From Communications of the ACM | February 2017
The authors of "Extracting 3D Objects from Photographs Using 3-Sweep" present an important step toward achieving 3D editing.
Takeo Igarashi From Communications of the ACM | December 2016
We introduce an interactive technique to extract and manipulate simple 3D shapes in a single photograph.
Tao Chen, Zhe Zhu, Shi-Min Hu, Daniel Cohen-Or, Ariel Shamir From Communications of the ACM | December 2016