acm-header
Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Schema Mappings: Rules For Mixing Data

When you search for products on Amazon.com, you are seeing results from thousands of vendor databases that were developed before Amazon existed. Did you ever wonder...

Predicting Structured Objects with Support Vector Machines
From Communications of the ACM

Predicting Structured Objects with Support Vector Machines

Machine Learning today offers a broad repertoire of methods for classification and regression. But what if we need to predict complex objects like trees, orderings...

From Communications of the ACM

Technical Perspective: Machine Learning For Complex Predictions

Interest in machine learning can be traced back to the early days of computer science. Alan Turing himself conjectured that...

From Communications of the ACM

Declarative Networking

Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to...

From Communications of the ACM

Technical Perspective: Narrowing the Semantic Gap in Distributed Programming

In science, significant advances are often made when researchers from different communities join forces.

Finding the Frequent Items in Streams of Data
From Communications of the ACM

Finding the Frequent Items in Streams of Data

Many data generation processes can be modeled as data streams. While this data may be archived and indexed within a data warehouse, it is also important to process...

From Communications of the ACM

Technical Perspective: Data Stream Processing - When You Only Get One Look

The database and systems communities have made great progress in developing database systems that allow us to store and query huge amounts of data. Real-time analysis...

Distinct-Value Synopses For Multiset Operations
From Communications of the ACM

Distinct-Value Synopses For Multiset Operations

The task of estimating the number of distinct values (DVs) in a large dataset arises in a wide variety of settings in computer science and elsewhere. We provide...

From Communications of the ACM

Technical Perspective: Relational Query Optimization: Data Management Meets Statistical Estimation

Relational systems have made it possible to query large collections of data in a declarative style through languages such as SQL. There is a key component that...

Spamalytics: An Empirical Analysis of Spam Marketing Conversion
From Communications of the ACM

Spamalytics: An Empirical Analysis of Spam Marketing Conversion

We all receive spam advertisements, but few of us have encountered a person who admits to following through on an offer and making a purchase. And yet, the relentlessness...

From Communications of the ACM

Technical Perspective: They Do Click, Don't They?

You never click on advertisements received in spam or in phishing messages, do you? Nobody does. So, if that is...

Statistical Analysis of Circuit Timing Using Majorization
From Communications of the ACM

Statistical Analysis of Circuit Timing Using Majorization

Future miniaturization of silicon transistors following Moore's Law may be in jeopardy as it becomes harder to precisely define the behavior and shape of nanoscale...

From Communications of the ACM

Technical Perspective: Where the Chips May Fall

The traditional approach to circuit design has been to build chips that work correctly at extreme-case process...

Apprenticeship Learning For Helicopter Control
From Communications of the ACM

Apprenticeship Learning For Helicopter Control

Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical...

From Communications of the ACM

Technical Perspective: The Ultimate Pilot Program

In one scene from The Matrix, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither...

Two Hardware-Based Approaches For Deterministic Multiprocessor Replay
From Communications of the ACM

Two Hardware-Based Approaches For Deterministic Multiprocessor Replay

Modern computer systems are inherently nondeterministic due to a variety of events that occur during an execution. The lack of repeatability that arises from this...

From Communications of the ACM

Technical Perspective: Software and Hardware Support For Deterministic Replay of Parallel Programs


Securing Frame Communication in Browsers
From Communications of the ACM

Securing Frame Communication in Browsers

Many Web sites embed third-party content in frames, relying on the browser's security policy to protect against malicious content. However, frames provide insufficient...

From Communications of the ACM

Technical Perspective: Reframing Security For the Web

The web has brought exciting new functionality while simultaneously requiring new mechanisms to make it secure. We've...

Lest We Remember
From Communications of the ACM

Lest We Remember: Cold-Boot Attacks on Encryption Keys

DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account