acm-header
Sign In

Communications of the ACM

Latest Research



Moving Portraits
From Communications of the ACM

Moving Portraits

We present an approach for generating face animations from large image collections of the same person. By optimizing the quantity and order in which photos are...

From Communications of the ACM

Technical Perspective: Getting Consensus For Data Replication

The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that was not written by one of the K most...

Quantifying Eventual Consistency with PBS
From Communications of the ACM

Quantifying Eventual Consistency with PBS

Eventual consistency is often "good enough" for practitioners given its latency and availability benefits. In this work, we explain this phenomenon and demonstrate...

From Communications of the ACM

Technical Perspective: The Power of Joint Multiuser Beamforming

Having multiple Wi-Fi Access Points with an overlapping coverage area operating on the same frequency may not be a problem anymore.

JMB
From Communications of the ACM

JMB: Scaling Wireless Capacity with User Demands

JMB, a joint multiuser beamforming system, enables independent access points (APs) to beamform their signals and communicate with their clients on the same channel...

From Communications of the ACM

Technical Perspective: Motion Fields For Interactive Character Animation

The following paper effectively treats motion clips as a set of independent motion vectors. In their ensemble, these high-dimensional motion vectors define a...

Motion Fields For Interactive Character Locomotion
From Communications of the ACM

Motion Fields For Interactive Character Locomotion

We propose a novel representation of motion data and control of virtual characters that gives highly agile responses to user input and allows a natural handling...

From Communications of the ACM

Technical Perspective: The Interplay of Neuroscience and Cryptography

An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is...

Neuroscience Meets Cryptography
From Communications of the ACM

Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks

We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow...

From Communications of the ACM

Technical Perspective: A 'Reasonable' Solution to Deformation Methods

Jacobson et al. construct a deformation method that allows a wide range of handle types (points, line segments, open and closed polygons) and produces deformations...

Bounded Biharmonic Weights For Real-Time Deformation
From Communications of the ACM

Bounded Biharmonic Weights For Real-Time Deformation

Changing an object's shape is a basic operation in computer graphics. Our goal is to make the design and control of deformations simpler by allowing the user to...

From Communications of the ACM

Technical Perspective: Smartphone Security 'Taint' What It Used to Be

The TaintDroid project takes a runtime taint tracking approach toward analyzing Android apps.

TaintDroid
From Communications of the ACM

TaintDroid: An Information Flow Tracking System For Real-Time Privacy Monitoring on Smartphones

Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their privacy...

From Communications of the ACM

Technical Perspective: A New Spin on an Old Algorithm

A paper by Ballard, Demmel, Holtz, and Schwartz considers a fundamental problem, adopting a new perspective on an old algorithm that has for years occupied a peculiar...

Communication Costs of Strassen's Matrix Multiplication
From Communications of the ACM

Communication Costs of Strassen's Matrix Multiplication

Proving lower bounds on the communication of algorithms and finding algorithms that attain these bounds are fundamental goals. 

From Communications of the ACM

Technical Perspective: Silicon Stress

Moore's Law has been the mainstay of semiconductor electronics since the invention of the transistor and its application to the integrated circuit. Implicit in...

TSV Stress-Aware Full-Chip Mechanical Reliability Analysis and Optimization For 3D IC
From Communications of the ACM

TSV Stress-Aware Full-Chip Mechanical Reliability Analysis and Optimization For 3D IC

Three-dimensional integrated circuit (3D IC) with through-silicon-via (TSV) is believed to offer new levels of efficiency, power, performance, and form-factor advantages...

From Communications of the ACM

Technical Perspective: The Cleanest Garbage Collection

In quite a tour de force, the authors of the following paper have built a provably correct real-time garbage collector for reconfigurable hardware (field programmable...

And Then There Were None
From Communications of the ACM

And Then There Were None: A Stall-Free Real-Time Garbage Collector For Reconfigurable Hardware

We present a garbage collector synthesized directly to hardware, capable of collecting a heap of uniform objects completely concurrently. These heaps are composed...

From Communications of the ACM

Technical Perspective: Centip3De Demonstrates More Than Moore...

Exponentially increasing transistor integration also demands more interconnections, which have started hitting fundamental limits. The Centip3De design demonstrates...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account