To better understand what improvement in processor efficiency is possible, we quantify the performance and energy overheads of a 720p HD H.264 encoder running on...Rehan Hameed, Wajahat Qadeer, Megan Wachs, Omid Azizi, Alex Solomatnikov, Benjamin C. Lee, Stephen Richardson, Christos Kozyrakis, Mark Horowitz From Communications of the ACM | October 2011
A typical machine learning program uses weighted combinations of features to discriminate between classes or to predict...Geoffrey E. Hinton From Communications of the ACM | October 2011
There has been much interest in unsupervised learning of hierarchical generative models such as deep belief networks (DBNs); however, scaling such models to full...Honglak Lee, Roger Grosse, Rajesh Ranganath, Andrew Y. Ng From Communications of the ACM | October 2011
Nearly 460,000 Flickr pictures were used to create detailed three-dimensional geometry and colors of famous landmarks and...Carlo Tomasi From Communications of the ACM | October 2011
We present a system that can reconstruct 3D geometry from large, unorganized collections of photographs. Our experimental results demonstrate that it is possible...Sameer Agarwal, Yasutaka Furukawa, Noah Snavely, Ian Simon, Brian Curless, Steven M. Seitz, Richard Szeliski From Communications of the ACM | October 2011
Semanticss-based program analysis requires one to (1) start from a "friendly" semantics; (2) design a "congenial" lattice...Olivier Danvy, Jan Midtgaard From Communications of the ACM | September 2011
Predictive models are fundamental to engineering reliable software systems. However, designing conservative, computable approximations for the behavior of programs...David Van Horn, Matthew Might From Communications of the ACM | September 2011
Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security...Christopher Kruegel From Communications of the ACM | September 2011
The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that...Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett From Communications of the ACM | September 2011
Two critical goals for mobile devices seem intrinsically in conflict. For carrying, the smaller the better. Yet for...Scott Klemmer From Communications of the ACM | August 2011
Skinput is a technology that appropriates the skin as an input surface by analyzing mechanical vibrations that propagate through the body. Specifically, we resolve...Chris Harrison, Desney Tan, Dan Morris From Communications of the ACM | August 2011
Are data synopses — such as the hash-based sketches discussed by Li and König — still needed for querying massive...Peter J. Haas From Communications of the ACM | August 2011
Efficient (approximate) computation of set similarity in very large datasets is a common task with many applications inminwise hashing...Ping Li, Arnd Christian König From Communications of the ACM | August 2011
Windows Error Reporting (WER) is a distributed system that automates the processing of error reports coming from an installed base of a billion machines. WER has...Kinshuman Kinshumann, Kirk Glerum, Steve Greenberg, Gabriel Aul, Vince Orgovan, Greg Nichols, David Grant, Gretchen Loihle, Galen Hunt From Communications of the ACM | July 2011
Scale has been the single most important force driving changes in system software over the last decade. Its impact is...John Ousterhout From Communications of the ACM | July 2011
The emergence of wimpy processors and FLASH met a promising deployment scenario in the field of large-scale data centers. The energy efficiency potential of these...Luiz André Barroso From Communications of the ACM | July 2011
This paper presents a fast array of wimpy nodes — FAWN — an approach for achieving low-power data-intensive data-center computing.
David G. Andersen, Jason Franklin, Michael Kaminsky, Amar Phanishayee, Lawrence Tan, Vijay Vasudevan From Communications of the ACM | July 2011
Dremel is a scalable, interactive ad hoc query system for analysis of read-only nested data. By combining multilevel execution trees and columnar data layout, it...Sergey Melnik, Andrey Gubarev, Jing Jing Long, Geoffrey Romer, Shiva Shivakumar, Matt Tolton, Theo Vassilakis From Communications of the ACM | June 2011
The importance of data analysis has never been clearer. Globe-spanning scientific collaborations are exploring...Michael J. Franklin From Communications of the ACM | June 2011
The interaction between computation and logic goes back to the beginnings of computer science with the development of computability theory...Phokion G. Kolaitis From Communications of the ACM | June 2011