acm-header
Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Building a Better Hash Function

In "Fast and Powerful Hashing Using Tabulation," Mikkel Thorup describes a variation of simple but surprisingly effective and powerful hash functions based on using...

Fast and Powerful Hashing Using Tabulation
From Communications of the ACM

Fast and Powerful Hashing Using Tabulation

We survey recent results on how simple hashing schemes based on tabulation provide unexpectedly strong guarantees.

From Communications of the ACM

Technical Perspective: What Led Computer Vision to Deep Learning?

We are in the middle of the third wave of interest in artificial neural networks as the leading paradigm for machine learning. "ImageNet Classification with Deep...

ImageNet Classification with Deep Convolutional Neural Networks
From Communications of the ACM

ImageNet Classification with Deep Convolutional Neural Networks

In the 1980s backpropagation did not live up to the very high expectations of its advocates. Twenty years later, we know what went wrong: for deep neural networks...

From Communications of the ACM

Technical Perspective: Building Knowledge Bases from Messy Data

"DeepDive: Declarative Knowledge Base Construction" is a prime example of groundbreaking work in the area of Knowledge Base Construction.

DeepDive
From Communications of the ACM

DeepDive: Declarative Knowledge Base Construction

We describe DeepDive, a system that combines database and machine learning ideas to help to develop knowledge base construction systems.

From Communications of the ACM

Technical Perspective: Functional Compilers

"Exploiting Vector Instructions with Generalized Stream Fusion" points out that stream fusion by itself is not well suited for generating bulk instructions such...

Exploiting Vector Instructions with Generalized Stream Fusion
From Communications of the ACM

Exploiting Vector Instructions with Generalized Stream Fusion

Programmers should not have to sacrifice code clarity or good software engineering practices to obtain performance. This work shows how to attain this goal for...

From Communications of the ACM

Technical Perspective: Building a Safety Net For Data Reuse

The authors of "Guilt-Free Data Reuse" show there is a way to construct a safety net that goes around a fixed dataset so that it may be analyzed interactively without...

Guilt-Free Data Reuse
From Communications of the ACM

Guilt-Free Data Reuse

In this work, we initiate a principled study of how to guarantee the validity of statistical inference in adaptive data analysis.

From Communications of the ACM

Technical Perspective: Proving File Systems Meet Expectations

"Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes" presents a big step toward real-world file systems that are crash-safe...

Certifying a File System Using Crash Hoare Logic
From Communications of the ACM

Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes

This paper introduces Crash Hoare logic, which extends traditional Hoare logic with a crash condition, a recovery procedure, and logical address spaces for specifying...

From Communications of the ACM

Technical Perspective: Data Distribution For Fast Joins

What is the most drastic way to reduce the cost of communication for parallel data processing algorithms? This is the question studied in "Reasoning on Data Partitioning...

Reasoning on Data Partitioning For Single-Round Multi-Join Evaluation in Massively Parallel Systems
From Communications of the ACM

Reasoning on Data Partitioning For Single-Round Multi-Join Evaluation in Massively Parallel Systems

We introduce a framework for reasoning about data partitioning to detect when we can avoid the data reshuffling step. 

From Communications of the ACM

Technical Perspective: The Power of Wi-Fi to Deliver Power

The authors of "Powering the Next Billion Devices with Wi-Fi" turn the problem of powering wireless sensor networks on its head. Instead of focusing on energy harvesting...

Powering the Next Billion Devices with Wi-Fi
From Communications of the ACM

Powering the Next Billion Devices with Wi-Fi

We present the first power over Wi-Fi system that delivers power to low-power sensors and devices and works with existing Wi-Fi chipsets.

From Communications of the ACM

Technical Perspective: Cleaning Up Flaws in TLS Implementations

One unfortunate fact about protocols is that as they get older and applied to more scenarios — and TLS is used basically everywhere — they tend to gain weight....

A Messy State of the Union
From Communications of the ACM

A Messy State of the Union: Taming the Composite State Machines of TLS

We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how...

From Communications of the ACM

Technical Perspective: Mapping the Universe

"HACC: Extreme Scaling and Performance Across Diverse Architectures" describes the Hardware/Hybrid Accelerated Cosmology Code (HACC) framework, which uses a novel...

HACC
From Communications of the ACM

HACC: Extreme Scaling and Performance Across Diverse Architectures

In this Research Highlight, we demonstrate the success of HACC on two very different machines, the CPU/GPU system Titan and the BG/Q systems Sequoia and Mira, attaining...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account