"Liquid Testing with Your Smartphone," by Shichao Yue and Dina Katabi, proposes a novel technique for determining the surface tension of a liquid by leveraging...Tam Vu From Communications of the ACM | October 2021
We show a simple and accurate approach to measuring surface tension that's available to anyone with a smartphone.
Shichao Yue, Dina Katabi From Communications of the ACM | October 2021
"WINOGRANDE" explores new methods of dataset development and adversarial filtering, expressly designed to prevent AI systems from making claims of smashing through...Leora Morgenstern From Communications of the ACM | September 2021
We introduce WinoGrande, a large-scale dataset of 44k problems, inspired by the original Winograd Schema Challenge, but adjusted to improve both the scale and the...Keisuke Sakaguchi, Ronan Le Bras, Chandra Bhagavatula, Yejin Choi From Communications of the ACM | September 2021
The automated blood pressure wearable system described in "eBP," by Nam Bui et al., is a sterling example of the third wave of mobile health tech to fill the preventative...Josiah D. Hester From Communications of the ACM | August 2021
We developed eBP to measure blood pressure from inside a user's ear aiming to minimize the measurement's impact on normal activities while maximizing its comfort...Nam Bui, Nhat Pham, Jessica Jacqueline Barnitz, Zhanan Zou, Phuc Nguyen, Hoang Truong, Taeho Kim, Nicholas Farrow, Anh Nguyen, Jianliang Xiao, Robin Deterding, Thang Dinh, Tam Vu From Communications of the ACM | August 2021
The authors of "Succinct Range Filters" make a critical and insightful observation: For a given set of queries, the upper levels of the trie incur many more accesses...Stratos Idreos From Communications of the ACM | April 2021
We present the Succinct Range Filter (SuRF), a fast and compact data structure for approximate membership tests.
Huanchen Zhang, Hyeontaek Lim, Viktor Leis, David G. Andersen, Michael Kaminsky, Kimberly Keeton, Andrew Pavlo From Communications of the ACM | April 2021
There are few algorithms for multi-flow graphs beyond flow accumulation. The authors of "Flood-Risk Analysis on Terrains" take a big step to fill this knowledge...Shashi Shekhar From Communications of the ACM | September 2020
In this paper, we study a number of flood-risk related problems, give an overview of efficient algorithms for them, as well as explore the efficacy and efficiency...Aaron Lowe, Pankaj K. Agarwal, Mathias Rav From Communications of the ACM | September 2020
"Computing Value of Spatiotemporal Information," by Heba Aly et al., describes a technique for computing the monetary value of a person's location data for a potential...Cyrus Shahabi From Communications of the ACM | September 2020
We investigate the intrinsic value of location data in the context of strong privacy, where location information is only available from end users via purchase.
...Heba Aly, John Krumm, Gireeja Ranade, Eric Horvitz From Communications of the ACM | September 2020
The authors of "OpenFab" propose to revisit the processing pipeline that turns a 3D model into machine instructions in light of the solutions developed in computer...Sylvain Lefebvre From Communications of the ACM | September 2019
We present OpenFab, a programmable pipeline for synthesis of multimaterial 3D printed objects that is inspired by RenderMan and modern GPU pipelines.
Kiril VidimĨe, Szu-Po Wang, Jonathan Ragan-Kelley, Wojciech Matusik From Communications of the ACM | September 2019
"Scalable Computation of High-Order Optimization Queries," by Brucato et al., makes a case for marrying the well-established paradigms of constrained optimization...Surajit Chaudhuri From Communications of the ACM | February 2019
We present a complete system that supports package queries, a new query model that extends traditional database queries to handle complex constraints and preferences...Matteo Brucato, Azza Abouzied, Alexandra Meliou From Communications of the ACM | February 2019
"LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study" provides a nice balance in terms of minimizing the burden on users and...Tanzeem Choudhury From Communications of the ACM | November 2018
We explore a new form of wearable systems, called LIBS, that can continuously record biosignals such as brain wave, eye movements, and facial muscle contractions...Anh Nguyen, Raghda Alqurashi, Zohreh Raghebi, Farnoush Banaei-Kashani, Ann C. Halbower, Tam Vu From Communications of the ACM | November 2018
"Majority Is Not Enough: Bitcoin Mining Is Vulnerable," by Eyal and Sirer, questions the 2009 Bitcoin white paper's implicit assumption of perfect information—that...Sharon Goldberg, Ethan Heilman From Communications of the ACM | July 2018
We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case.
Ittay Eyal, Emin GÜn Sirer From Communications of the ACM | July 2018