How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for...Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala From Communications of the ACM | January 2013
This lifting of data structure thinking to the relational level has long inspired computer scientists. In "An Introduction to Data Representation Synthesis," the...Yannis Smaragdakis From Communications of the ACM | December 2012
We consider the problem of specifying combinations of data structures with complex sharing in a manner that is declarative and results in provably correct code.Peter Hawkins, Martin Rinard, Alex Aiken, Mooly Sagiv, Kathleen Fisher From Communications of the ACM | December 2012
Buying residential broadband services seems relatively simple: pick among a small number of plans, and then compare similar plans by price. Unfortunately, reality...Henning Schulzinne From Communications of the ACM | November 2012
We present the results from the first study of Internet access link performance measured directly from home routers. Our findings provide a snapshot of access network...Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford, Antonio Pescapè From Communications of the ACM | November 2012
Algorithmic advances can come from the most unexpected places. The following paper describes an emerging approach to solving linear systems of equations that...Bruce Hendrickson From Communications of the ACM | October 2012
The solution of linear systems is a problem of fundamental theoretical importance but also one with a myriad of applications in numerical mathematics, engineering...Ioannis Koutis, Gary L. Miller, Richard Peng From Communications of the ACM | October 2012
High-dimensional space is a counterintuitive place, where natural geometric intuitions from the familiar three-dimensional world may lead us badly astray.Rocco A. Servedio From Communications of the ACM | October 2012
Foam problems are about how to best partition space into bubbles of minimal surface area. We investigate the case where one unit-volume bubble is required to tile...Guy Kindler, Anup Rao, Ryan O'Donnell, Avi Wigderson From Communications of the ACM | October 2012
There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?
Dan Suciu From Communications of the ACM | September 2012
An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data,...Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan From Communications of the ACM | September 2012
The history of the relationship between writing systems and technology is as long as it is varied. Likewise, the challenge of entering text using portable gadgets...William A. Buxton From Communications of the ACM | September 2012
As computing technologies expanded beyond the confines of the desktop, the need for effective text entry methods alternative to the ubiquitous desktop keyboards...Shumin Zhai, Per Ola Kristensson From Communications of the ACM | September 2012
Computer scientists have long believed that software is different from physical systems in one fundamental way: while the latter have continuous dynamics, the former...Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerman From Communications of the ACM | August 2012
As information technology has come to permeate our society, broader classes of users have developed the need for more sophisticated data manipulation and processing...Martin C. Rinard From Communications of the ACM | August 2012
Millions of computer end users need to perform tasks over large spreadsheet data, yet lack the programming knowledge to do such tasks automatically. We present...Sumit Gulwani, William R. Harris, Rishabh Singh From Communications of the ACM | August 2012
In 1999, Elias Koutsoupias and Christos Papadimitriou initiated the study of "How much worse off are we due to selfishness?" They compared the worst case pure...Amos Fiat From Communications of the ACM | July 2012
The price of anarchy, defined as the ratio of the worst-case objective function value of a Nash equilibrium of a game and that of an optimal outcome, quantifies...Tim Roughgarden From Communications of the ACM | July 2012
Like other IT fields, computer architects initially reported incomparable results. We quickly saw the folly of this approach. We then went through a sequence...David Patterson From Communications of the ACM | July 2012