We introduce Pinocchio, a built system for efficiently verifying general computations while relying only on cryptographic assumptions.
Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova From Communications of the ACM | February 2016
An important contribution of "Answering Enumeration Queries with the Crowd" is the observation that by using the crowd for the collection of new data, we are departing...Tova Milo From Communications of the ACM | January 2016
Hybrid human/computer database systems promise to greatly expand the usefulness of query processing by incorporating the crowd. Such systems raise many implementation...Beth Trushkowsky, Tim Kraska, Michael J. Franklin, Purnamrita Sarkar From Communications of the ACM | January 2016
"Bare-Metal Performance for Virtual Machines with Exitless Interrupts" shows how to enable a virtual machine to attain "bare metal" performance from high-speed...Steve Hand From Communications of the ACM | January 2016
We present ExitLess Interrupts (ELI), a software-only approach for handling interrupts within guest virtual machines directly and securely.Nadav Amit, Abel Gordon, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, Dan Tsafrir From Communications of the ACM | January 2016
"NoDB: Efficient Query Execution on Raw Data Files" investigates extending a DBMS so it can use the file data in situ, without having to load it first.David Maier From Communications of the ACM | December 2015
We here present the design and roadmap of a new paradigm in database systems, called NoDB, which do not require data loading while still maintaining the whole feature...Ioannis Alagiannis, Renata Borovica-Gajic, Miguel Branco, Stratos Idreos, Anastasia Ailamaki From Communications of the ACM | December 2015
Can a computer automatically discover and tell us what makes Paris look so much like Paris? "What Makes Paris Look Like Paris?" offers a creative, inspiring new...Noah Snavely From Communications of the ACM | December 2015
Given a large repository of geo-tagged imagery, we seek to automatically find visual elements, for example windows, balconies, and street signs, that are most distinctive...Carl Doersch, Saurabh Singh, Abhinav Gupta, Josef Sivic, Alexei A. Efros From Communications of the ACM | December 2015
"Software Dataplane Verification" takes existing static checking of networks to a new level by checking the real code in the forwarding path of a Click router using...George Varghese From Communications of the ACM | November 2015
We present the result of working iteratively on two tasks: designing a domain-specific verification tool for packet-processing software, while trying to identify...Mihai Dobrescu, Katerina Argyraki From Communications of the ACM | November 2015
"Geometric Tools for Exploring Manifolds of Light Transport Paths" presents a technique to address the challenging problems of light transport.Frédo Durand From Communications of the ACM | November 2015
We provide a geometric solution to the longstanding problem of light simulations by representing light paths as points in an abstract high-dimensional configuration...Wenzel Jakob, Steve Marschner From Communications of the ACM | November 2015
Mathematics is not difficult to find in Chebfun, the subject of "Computing Numerically with Functions Instead of Numbers."
Cleve Moler From Communications of the ACM | October 2015
We present the Chebfun system for numerical computation with functions, which is based on a key idea: an analogy of floating-point arithmetic for functions rather...Lloyd N. Trefethen From Communications of the ACM | October 2015
The authors of "Guided Exploration of Physically Valid Shapes for Furniture Design" have found a way to provide the user with instant feedback on how to fix unstable...Marc Alexa From Communications of the ACM | September 2015
The authors propose an interactive design framework for the efficient and intuitive exploration of geometrically and physically valid shapes.Nobuyuki Umentani, Takeo Igarashi, Niloy J. Mitra From Communications of the ACM | September 2015
"Soylent: A Word Processor with a Crowd Inside," introduces an exciting vision of using crowd workers to power an interactive system — here, a word processor —...Aniket (Niki) Kittur From Communications of the ACM | August 2015
This paper introduces architectural and interaction patterns for integrating crowdsourced human contributions directly into user interfaces.Michael S. Bernstein, Greg Little, Robert C. Miller, Björn Hartmann, Mark S. Ackerman, David R. Karger, David Crowell, Katrina Panovich From Communications of the ACM | August 2015
In "Cache Efficient Functional Algorithms," Blelloch and Harper suggest we analyze the costs of functional algorithms by assuming objects are allocated sequentially...William D. Clinger From Communications of the ACM | July 2015