acm-header
Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Sora Promises Lasting Impact

The objective of Sora is to build a software defined radio that combines the performance and fidelity of hardware...

QIP = PSPACE
From Communications of the ACM

QIP = PSPACE

The collection of computational problems having quantum interactive proof systems consists precisely of those problems solvable with an ordinary classical computer...

From Communications of the ACM

Technical Perspective: QIP = PSPACE Breakthrough

It is now clear that for a wide range of problems, quantum computers offer little or no advantage over their classical counterparts.

CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples
From Communications of the ACM

CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples

Compressive sampling (CoSa) is a new paradigm for developing data sampling technologies. The main computational challenge in CoSa is to reconstruct a compressible...

From Communications of the ACM

Technical Perspective: Iterative Signal Recovery From Incomplete Samples

You are given a large set of data values, and you are requested to compress, clean, recover, recognize, and/or predict...

FastTrack: Efficient and Precise Dynamic Race Detection
From Communications of the ACM

FastTrack: Efficient and Precise Dynamic Race Detection

Multithreaded programs are notoriously prone to race conditions. Prior work developed precise dynamic race detectors that never report false alarms. However, these...

Goldilocks: A Race-Aware Java Runtime
From Communications of the ACM

Goldilocks: A Race-Aware Java Runtime

GOLDILOCKS is a Java runtime that monitors program executions and throws a DataRaceException when a data race...

From Communications of the ACM

Technical Perspective: Data Races Are Evil with No Exceptions

Exploiting parallelism has become the primary means to higher performance. Shared memory is a pervasively used programming...

Nonparametric Belief Propagation
From Communications of the ACM

Nonparametric Belief Propagation

Probabilistic graphical models and algorithms for approximate inference have proven to be powerful tools in a wide range of applications in statistics and AI. However...

From Communications of the ACM

Technical Perspective: Belief Propagation

Nearly every modern tracking system is based on the seminal work of Rudolf Kalman who developed the optimal...

Difference Engine: Harnessing Memory Redundancy in Virtual Machines
From Communications of the ACM

Difference Engine: Harnessing Memory Redundancy in Virtual Machines

Virtual machine monitors are a popular platform for Internet hosting centers and cloud-based compute services. But main memory is not amenable to multiplexed hardware...

From Communications of the ACM

Technical Perspective: A VM 'Engine' That Makes a Difference

The past decade has witnessed a renaissance in server virtualization. Diwaker Gupta et al. present a novel approach for significantly improving the efficiency of...

Constraint Satisfaction Problems and Global Cardinality Constraints
From Communications of the ACM

Constraint Satisfaction Problems and Global Cardinality Constraints

In a constraint satisfaction problem (CSP) the goal is to find an assignment of a given set of variables subject to specified constraints. A global cardinality...

From Communications of the ACM

Technical Perspective: Constraint Satisfaction Problems and Computational Complexity

It takes little imagination to come up with a wealth of problems in scheduling and planning that can be expressed asConstraint Satisfaction...

Privacy Integrated Queries
From Communications of the ACM

Privacy Integrated Queries: An Extensible Platform For Privacy-Preserving Data Analysis

Privacy Integrated Queries (PINQ) is an extensible data analysis platform designed to provide unconditional privacy guarantees for the records of the underlying...

From Communications of the ACM

Technical Perspective: Programming With Differential Privacy

Government agencies worldwide release statistical information about population, education, and health, crime...

Reasoning About the Unknown in Static Analysis
From Communications of the ACM

Reasoning About the Unknown in Static Analysis

Static program analysis techniques cannot know certain values, such as the value of user input or network state, at analysis...

From Communications of the ACM

Technical Persepctive: Large-Scale Sound and Precise Program Analysis

You are given a program. Will it crash? Is it subject to a spoofing, buffer overflow, or injection attack? Is this part of...

The Emergence of Cross Channel Scripting
From Communications of the ACM

The Emergence of Cross Channel Scripting

Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...

From Communications of the ACM

Technical Persepctive: Attacks Target Web Server Logic and Prey on XCS Weaknesses

A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account