We present an approach for generating face animations from large image collections of the same person. By optimizing the quantity and order in which photos are...Ira Kemelmacher-Shlizerman, Eli Shechtman, Rahul Garg, Steven M. Seitz From Communications of the ACM | September 2014
The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that was not written by one of the K most...Philip A. Bernstein From Communications of the ACM | August 2014
Eventual consistency is often "good enough" for practitioners given its latency and availability benefits. In this work, we explain this phenomenon and demonstrate...Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica From Communications of the ACM | August 2014
Having multiple Wi-Fi Access Points with an overlapping coverage area operating on the same frequency may not be a problem anymore.Konstantina (Dina) Papagiannaki From Communications of the ACM | July 2014
JMB, a joint multiuser beamforming system, enables independent access points (APs) to beamform their signals and communicate with their clients on the same channel...Hariharan Rahul, Swarun Kumar, Dina Katabi From Communications of the ACM | July 2014
The following paper effectively treats motion clips as a set of independent motion vectors. In their ensemble, these high-dimensional motion vectors define a...Michiel van de Panne From Communications of the ACM | June 2014
We propose a novel representation of motion data and control of virtual characters that gives highly agile responses to user input and allows a natural handling...Yongjoon Lee, Kevin Wampler, Gilbert Bernstein, Jovan Popović, Zoran Popović From Communications of the ACM | June 2014
An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is...Ari Juels, Bonnie Wong From Communications of the ACM | May 2014
We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow...Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln From Communications of the ACM | May 2014
Jacobson et al. construct a deformation method that allows a wide range of handle types (points, line segments, open and closed polygons) and produces deformations...Joe Warren From Communications of the ACM | April 2014
Changing an object's shape is a basic operation in computer graphics. Our goal is to make the design and control of deformations simpler by allowing the user to...Alec Jacobson, Ilya Baran, Jovan Popović, Olga Sorkine-Hornung From Communications of the ACM | April 2014
Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their privacy...William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol N. Sheth From Communications of the ACM | March 2014
A paper by Ballard, Demmel, Holtz, and Schwartz considers a fundamental problem, adopting a new perspective on an old algorithm that has for years occupied a peculiar...Michael W. Mahoney From Communications of the ACM | February 2014
Proving lower bounds on the communication of algorithms and finding algorithms that attain these bounds are fundamental goals. Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz From Communications of the ACM | February 2014
Moore's Law has been the mainstay of semiconductor electronics since the invention of the transistor and its application to the integrated circuit. Implicit in...Subramanian S. Iyer From Communications of the ACM | January 2014
Three-dimensional integrated circuit (3D IC) with through-silicon-via (TSV) is believed to offer new levels of efficiency, power, performance, and form-factor advantages...Moongon Jung, Joydeep Mitra, David Z. Pan, Sung Kyu Lim From Communications of the ACM | January 2014
In quite a tour de force, the authors of the following paper have built a provably correct real-time garbage collector for reconfigurable hardware (field programmable...Eliot Moss From Communications of the ACM | December 2013
We present a garbage collector synthesized directly to hardware, capable of collecting a heap of uniform objects completely concurrently. These heaps are composed...David F. Bacon, Perry Cheng, Sunil Shukla From Communications of the ACM | December 2013
Exponentially increasing transistor integration also demands more interconnections, which have started hitting fundamental limits. The Centip3De design demonstrates...Shekhar Borkar From Communications of the ACM | November 2013