acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: The Power of Low-Power GPS Receivers for Nanosats
From Communications of the ACM

Technical Perspective: The Power of Low-Power GPS Receivers for Nanosats

The work explored in "Hummingbird," by Sujay Narayana et al., focuses on the energy consumption of a typical GPS receiver and its operational challenges in a nanosat...

Hummingbird
From Communications of the ACM

Hummingbird: An Energy-Efficient GPS Receiver for Small Satellites

In this work, we elucidate the design of a low-cost, low-power GPS receiver for small satellites.

Technical Perspective: Traffic Classification in the Era of Deep Learning
From Communications of the ACM

Technical Perspective: Traffic Classification in the Era of Deep Learning

"Traffic Classification in an Increasingly Encrypted Web," by Iman Akbari et al., does a great job in reviewing related work in the network traffic classification...

Traffic Classification in an Increasingly Encrypted Web
From Communications of the ACM

Traffic Classification in an Increasingly Encrypted Web

In this paper, we design a novel feature engineering approach used for encrypted Web protocols, and develop a neural network architecture based on stacked long...

Technical Perspective: The Effectiveness of Security Measures
From Communications of the ACM

Technical Perspective: The Effectiveness of Security Measures

"Measuring Security Practices," by Louis F. DeKoven et al., provide a unique perspective into how users choose to implement common security advice in practice. ...

Measuring Security Practices
From Communications of the ACM

Measuring Security Practices

This paper seeks to make progress on the prevalence of popular security practices and their relationship to security outcomes via the longitudinal empirical measurement...

Technical Perspective: Physical Layer Resilience through Deep Learning in Software Radios
From Communications of the ACM

Technical Perspective: Physical Layer Resilience through Deep Learning in Software Radios

"Polymorphic Wireless Receivers," by Francesco Restuccia and Tommaso Melodia, tackles the problem of physical layer resilience in wireless systems from a completely...

Polymorphic Wireless Receivers
From Communications of the ACM

Polymorphic Wireless Receivers

We introduce PolymoRF, a deep learning-based polymorphic receiver able to reconfigure itself in real time based on the inferred waveform parameters.

Technical Perspective: Personalized Recommendation of PoIs to People with Autism
From Communications of the ACM

Technical Perspective: Personalized Recommendation of PoIs to People with Autism

"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs
From Communications of the ACM

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs: An Inclusive Recommender System

We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...

Technical Perspective: A Recipe for Protecting Against Speculation Attacks
From Communications of the ACM

Technical Perspective: A Recipe for Protecting Against Speculation Attacks

"Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data," by Jiyong Yu et al., might be a beginning of an end to speculation...

Speculative Taint Tracking (STT)
From Communications of the ACM

Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data

This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism, to block speculative execution attacks.

Technical Perspective: On Proofs, Entanglement, and Games
From Communications of the ACM

Technical Perspective: On Proofs, Entanglement, and Games

"MIP* = RE," by Zhengfeng Ji et al., studies quantum interactive proofs.

MIP* = RE
From Communications of the ACM

MIP* = RE

In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design
From Communications of the ACM

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design

"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts...

Securing the Wireless Emergency Alerts System
From Communications of the ACM

Securing the Wireless Emergency Alerts System

We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available...

Technical Perspective: Tracking Pandemic-Driven Internet Traffic
From Communications of the ACM

Technical Perspective: Tracking Pandemic-Driven Internet Traffic

"A Year in Lockdown," by Anja Feldmann, et al., offers a detailed look at how Internet traffic changed during the COVID-19 pandemic.

A Year in Lockdown
From Communications of the ACM

A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic

We review the impact of the first year of the COVID-19 pandemic on Internet traffic in order to analyze its performance.

Technical Perspective: An Elegant Model for Deriving Equations
From Communications of the ACM

Technical Perspective: An Elegant Model for Deriving Equations

"Deriving Equations from Sensor Data Using Dimensional Function Synthesis," by Vasileios Tsoutsouras, et al., addresses the key problem of discovering relationships...

Deriving Equations from Sensor Data Using Dimensional Function Synthesis
From Communications of the ACM

Deriving Equations from Sensor Data Using Dimensional Function Synthesis

We present a new method, which we call dimensional function synthesis, for deriving functions that model the relationship between multiple signals in a physical...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account