We propose a new method to quickly and accurately predict human pose — the 3-D positions of body joints — from a single depth image, without depending on information...Jamie Shotton, Toby Sharp, Alex Kipman, Andrew Fitzgibbon, Mark Finocchio, Andrew Blake, Mat Cook, Richard Moore From Communications of the ACM | January 2013
Photographs capture the moment; paintings convey perception, impression, and feeling; illustrations tell stories. Computer graphics aims to enrich all these artistic...Doug DeCarlo, Matthew Stone From Communications of the ACM | January 2013
How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for...Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala From Communications of the ACM | January 2013
How do birds flock and fish school? How do individuals in a social network reach agreement, even though they are often only influenced by other like-minded individuals...Ali Jadbabaie From Communications of the ACM | December 2012
Algorithms lay the grounds for numerical simulations and, crucially, provide a powerful framework for their analysis. The new area of natural algorithms may reprise...Bernard Chazelle From Communications of the ACM | December 2012
This lifting of data structure thinking to the relational level has long inspired computer scientists. In "An Introduction to Data Representation Synthesis," the...Yannis Smaragdakis From Communications of the ACM | December 2012
We consider the problem of specifying combinations of data structures with complex sharing in a manner that is declarative and results in provably correct code.Peter Hawkins, Martin Rinard, Alex Aiken, Mooly Sagiv, Kathleen Fisher From Communications of the ACM | December 2012
Buying residential broadband services seems relatively simple: pick among a small number of plans, and then compare similar plans by price. Unfortunately, reality...Henning Schulzinne From Communications of the ACM | November 2012
We present the results from the first study of Internet access link performance measured directly from home routers. Our findings provide a snapshot of access network...Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford, Antonio Pescapè From Communications of the ACM | November 2012
A fundamental impediment to the widespread development and deployment of in-camera algorithms is the lack of a clean open architecture for controlling camera...Richard Szeliski From Communications of the ACM | November 2012
Progress in computational photography has been hampered by the lack of a portable, programmable camera with sufficient image quality and computing power. To address...Andrew Adams, David E. Jacobs, Jennifer Dolson, Marius Tico, Kari Pulli, Eino-Ville Talvala, Boris Ajdin, Daniel Vaquero, Hendrik P. A. Lensch, Mark Horowitz, Sung Hee Park, Natasha Gelfand, Jongmin Baek, Wojciech Matusik, Marc Levoy From Communications of the ACM | November 2012
Algorithmic advances can come from the most unexpected places. The following paper describes an emerging approach to solving linear systems of equations that...Bruce Hendrickson From Communications of the ACM | October 2012
The solution of linear systems is a problem of fundamental theoretical importance but also one with a myriad of applications in numerical mathematics, engineering...Ioannis Koutis, Gary L. Miller, Richard Peng From Communications of the ACM | October 2012
High-dimensional space is a counterintuitive place, where natural geometric intuitions from the familiar three-dimensional world may lead us badly astray.Rocco A. Servedio From Communications of the ACM | October 2012
Foam problems are about how to best partition space into bubbles of minimal surface area. We investigate the case where one unit-volume bubble is required to tile...Guy Kindler, Anup Rao, Ryan O'Donnell, Avi Wigderson From Communications of the ACM | October 2012
There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?
Dan Suciu From Communications of the ACM | September 2012
An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data,...Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan From Communications of the ACM | September 2012
The history of the relationship between writing systems and technology is as long as it is varied. Likewise, the challenge of entering text using portable gadgets...William A. Buxton From Communications of the ACM | September 2012
As computing technologies expanded beyond the confines of the desktop, the need for effective text entry methods alternative to the ubiquitous desktop keyboards...Shumin Zhai, Per Ola Kristensson From Communications of the ACM | September 2012