acm-header
Sign In

Communications of the ACM

Latest Research



Asynchronous Contact Mechanics
From Communications of the ACM

Asynchronous Contact Mechanics

Physicists have long observed physical phenomena and developed mathematical models to describe them. The advent of computers has allowed us to implement these...

From Communications of the ACM

Technical Perspective: Building Robust Dynamical Simulation Systems

Computational power has been widely used to predict the behavior of dynamical systems using computer simulations, which are often used as an adjunct to or substitute...

The Grand Challenge of Computer Go
From Communications of the ACM

The Grand Challenge of Computer Go: Monte Carlo Tree Search and Extensions

The ancient oriental game of Go has long been considered a grand challenge for artificial intelligence. However, computer Go programs based on Monte-Carlo tree...

From Communications of the ACM

Technical Perspective: A New Way to Search Game Trees

Researchers in artificial intelligence know that computers still lag far behind human levels of play in many games of strategy. One such contest of wits is Go...

From Communications of the ACM

Technical Perspective: The Benefits of Capability-Based Protection

Affordable personal computing hardware and the usable GUI-based PC operating systems made the vision of "a computer on every desktop and in every home" a reality...

A Taste of Capsicum
From Communications of the ACM

A Taste of Capsicum: Practical Capabilities For Unix

Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs...

From Communications of the ACM

Technical Perspective: Where Do People Draw Lines?

Computer graphics once focused exclusively on realism. The field eventually broadened to include other pictorial...

Where Do People Draw Lines?
From Communications of the ACM

Where Do People Draw Lines?

This paper presents the results of a study in which artists made line drawings intended to convey specific 3D shapes.

Wherefore Art Thou R3579X?
From Communications of the ACM

Wherefore Art Thou R3579X?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography

In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. We describe a family of attacks such...

From Communications of the ACM

Technical Perspective: A Perfect 'Match'

In a breakthrough contribution, the authors of the paper that follows have developed an efficient way to find approximate nearest neighbors for the case of database...

The Patchmatch Randomized Matching Algorithm For Image Manipulation
From Communications of the ACM

The Patchmatch Randomized Matching Algorithm For Image Manipulation

This paper presents a new randomized algorithm for quickly finding approximate nearest neighbor matches between image patches. Our algorithm offers substantial...

From Communications of the ACM

Technical Perspective: Power Efficiency as the #1 Design Constraint

Moore's Law, and associated observations by Bob Dennard, describe key technical...

Understanding Sources of Ineffciency in General-Purpose Chips
From Communications of the ACM

Understanding Sources of Ineffciency in General-Purpose Chips

To better understand what improvement in processor efficiency is possible, we quantify the performance and energy overheads of a 720p HD H.264 encoder running on...

From Communications of the ACM

Technical Perspective: A Better Way to Learn Features

A typical machine learning program uses weighted combinations of features to discriminate between classes or to predict...

Unsupervised Learning of Hierarchical Representations with Convolutional Deep Belief Networks
From Communications of the ACM

Unsupervised Learning of Hierarchical Representations with Convolutional Deep Belief Networks

There has been much interest in unsupervised learning of hierarchical generative models such as deep belief networks (DBNs); however, scaling such models to full...

From Communications of the ACM

Technical Perspective: Visual Reconstruction

Nearly 460,000 Flickr pictures were used to create detailed three-dimensional geometry and colors of famous landmarks and...

Building Rome in a Day
From Communications of the ACM

Building Rome in a Day

We present a system that can reconstruct 3D geometry from large, unorganized collections of photographs. Our experimental results demonstrate that it is possible...

Self-Similarity-Based Image Denoising
From Communications of the ACM

Self-Similarity-Based Image Denoising

The search for efficient image denoising methods is still a valid challenge at the crossing of functional analysis and statistics. In spite of the sophistication...

From Communications of the ACM

Technical Perspective: Images Everywhere Looking For Models

About 5,000 images per minute are uploaded to the photo-sharing site http://www.flickr.com/; over...

From Communications of the ACM

Technical Perspective: Complex Financial Products: Caveat Emptor

CDOs are examples of financial derivatives, with a value that depends on the underlying assets with which they are linked. These kinds of complex financial products...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account