acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Liquid Testing Using Built-in Phone Sensors
From Communications of the ACM

Technical Perspective: Liquid Testing Using Built-in Phone Sensors

"Liquid Testing with Your Smartphone," by Shichao Yue and Dina Katabi, proposes a novel technique for determining the surface tension of a liquid by leveraging...

Liquid Testing with Your Smartphone
From Communications of the ACM

Liquid Testing with Your Smartphone

We show a simple and accurate approach to measuring surface tension that's available to anyone with a smartphone.

Technical Perspective: The Importance of WINOGRANDE
From Communications of the ACM

Technical Perspective: The Importance of WINOGRANDE

"WINOGRANDE" explores new methods of dataset development and adversarial filtering, expressly designed to prevent AI systems from making claims of smashing through...

WinoGrande
From Communications of the ACM

WinoGrande: An Adversarial Winograd Schema Challenge at Scale

We introduce WinoGrande, a large-scale dataset of 44k problems, inspired by the original Winograd Schema Challenge, but adjusted to improve both the scale and the...

Technical Perspective: eBP Rides the Third Wave of Mobile Health
From Communications of the ACM

Technical Perspective: eBP Rides the Third Wave of Mobile Health

The automated blood pressure wearable system described in "eBP," by Nam Bui et al., is a sterling example of the third wave of mobile health tech to fill the preventative...

eBP
From Communications of the ACM

eBP: An Ear-Worn Device for Frequent and Comfortable Blood Pressure Monitoring

We developed eBP to measure blood pressure from inside a user's ear aiming to minimize the measurement's impact on normal activities while maximizing its comfort...

From Communications of the ACM

Technical Perspective: The Strength of SuRF

The authors of "Succinct Range Filters" make a critical and insightful observation: For a given set of queries, the upper levels of the trie incur many more accesses...

Succinct Range Filters
From Communications of the ACM

Succinct Range Filters

We present the Succinct Range Filter (SuRF), a fast and compact data structure for approximate membership tests.

From Communications of the ACM

Technical Perspective: Progress in Spatial Computing for Flood Prediction

There are few algorithms for multi-flow graphs beyond flow accumulation. The authors of "Flood-Risk Analysis on Terrains" take a big step to fill this knowledge...

Flood-Risk Analysis on Terrains
From Communications of the ACM

Flood-Risk Analysis on Terrains

In this paper, we study a number of flood-risk related problems, give an overview of efficient algorithms for them, as well as explore the efficacy and efficiency...

From Communications of the ACM

Technical Perspective: Computing the Value of Location Data

"Computing Value of Spatiotemporal Information," by Heba Aly et al., describes a technique for computing the monetary value of a person's location data for a potential...

Computing Value of Spatiotemporal Information
From Communications of the ACM

Computing Value of Spatiotemporal Information

We investigate the intrinsic value of location data in the context of strong privacy, where location information is only available from end users via purchase. ...

From Communications of the ACM

Technical Perspective: From Virtual Worlds to Digital Fabrication

The authors of "OpenFab" propose to revisit the processing pipeline that turns a 3D model into machine instructions in light of the solutions developed in computer...

OpenFab
From Communications of the ACM

OpenFab: A Programmable Pipeline for Multimaterial Fabrication

We present OpenFab, a programmable pipeline for synthesis of multimaterial 3D printed objects that is inspired by RenderMan and modern GPU pipelines.

From Communications of the ACM

Technical Perspective: To Do or Not To Do: Extending SQL with Integer Linear Programming?

"Scalable Computation of High-Order Optimization Queries," by Brucato et al., makes a case for marrying the well-established paradigms of constrained optimization...

Scalable Computation of High-Order Optimization Queries
From Communications of the ACM

Scalable Computation of High-Order Optimization Queries

We present a complete system that supports package queries, a new query model that extends traditional database queries to handle complex constraints and preferences...

From Communications of the ACM

Technical Perspective: Making Sleep Tracking More User Friendly

"LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study" provides a nice balance in terms of minimizing the burden on users and...

LIBS
From Communications of the ACM

LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study

We explore a new form of wearable systems, called LIBS, that can continuously record biosignals such as brain wave, eye movements, and facial muscle contractions...

From Communications of the ACM

Technical Perspective: The Rewards of Selfish Mining

"Majority Is Not Enough: Bitcoin Mining Is Vulnerable," by Eyal and Sirer, questions the 2009 Bitcoin white paper's implicit assumption of perfect information—that...

Majority Is Not Enough
From Communications of the ACM

Majority Is Not Enough: Bitcoin Mining Is Vulnerable

We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account