Interest in machine learning can be traced back to the early days of computer science. Alan Turing himself conjectured that...John Shawe-Taylor From Communications of the ACM | November 2009
Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to...Boon Thau Loo, Tyson Condie, Minos Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica From Communications of the ACM | November 2009
In science, significant advances are often made when researchers from different communities join forces.Peter Druschel From Communications of the ACM | November 2009
Many data generation processes can be modeled as data streams. While this data may be archived and indexed within a data warehouse, it is also important to process...Graham Cormode, Marios Hadjieleftheriou From Communications of the ACM | October 2009
The database and systems communities have made great progress in developing database systems that allow us to store and query huge amounts of data. Real-time analysis...Johannes Gehrke From Communications of the ACM | October 2009
The task of estimating the number of distinct values (DVs) in a large dataset arises in a wide variety of settings in computer science and elsewhere. We provide...Kevin Beyer, Rainer Gemulla, Peter J. Haas, Berthold Reinwald, Yannis Sismanis From Communications of the ACM | October 2009
Relational systems have made it possible to query large collections of data in a declarative style through languages such as SQL. There is a key component that...Surajit Chaudhuri From Communications of the ACM | October 2009
We all receive spam advertisements, but few of us have encountered a person who admits to following through on an offer and making a purchase. And yet, the relentlessness...Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage From Communications of the ACM | September 2009
You never click on advertisements received in spam or in phishing messages, do you? Nobody does. So, if that is...Marc Dacier From Communications of the ACM | September 2009
Existing literature on distributed development in software engineering and other fields discusses various challenges,...Christian Bird, Nachiappan Nagappan, Premkumar Devanbu, Harald Gall, Brendan Murphy From Communications of the ACM | August 2009
Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical...Adam Coates, Pieter Abbeel, Andrew Y. Ng From Communications of the ACM | July 2009
In one scene from The Matrix, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither...Stuart Russell, Lawrence Saul From Communications of the ACM | July 2009
Many Web sites embed third-party content in frames, relying on the browser's security policy to protect against malicious content. However, frames provide insufficient...Adam Barth, Collin Jackson, John C. Mitchell From Communications of the ACM | June 2009
The web has brought exciting new functionality while simultaneously requiring new mechanisms to make it secure. We've...Andrew Myers From Communications of the ACM | June 2009
DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and...J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten From Communications of the ACM | May 2009
Many systems rely on keeping a master key secret. But technological progress can undermine old assumptions.Ross Anderson From Communications of the ACM | May 2009
This article describes mechanisms for asynchronous collaboration in the context of information visualization, recasting visualizations as not just analytic tools...Jeffrey Heer, Fernanda B. Viégas, Martin Wattenberg From Communications of the ACM | January 2009
Visual analysis, a powerful method for finding and telling stories with data, is moving from research into widespread use.Jock D. Mackinlay From Communications of the ACM | January 2009
Beginning in the early to mid-1980s the relational model of data has dominated the DBMS landscape. Moreover, descendents of...Michael Stonebraker From Communications of the ACM | December 2008
In this paper, we report how research around the MonetDB database system has led to a redesign of database architecture in order to take advantage of modern hardware...Peter A. Boncz, Martin L. Kersten, Stefan Manegold From Communications of the ACM | December 2008