We all receive spam advertisements, but few of us have encountered a person who admits to following through on an offer and making a purchase. And yet, the relentlessness...Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage From Communications of the ACM | September 2009
You never click on advertisements received in spam or in phishing messages, do you? Nobody does. So, if that is...Marc Dacier From Communications of the ACM | September 2009
Writing software for multicore processors is greatly simplified if we could automatically parallelize sequential programs. Although auto-parallelization has been...Milind Kulkarni, Keshav Pingali, Bruce Walter, Ganesh Ramanarayanan, Kavita Bala, L. Paul Chew From Communications of the ACM | September 2009
Looking for some new insight into an old problem? The familiar problem of writing parallel applications and a...Katherine Yelick From Communications of the ACM | September 2009
Future miniaturization of silicon transistors following Moore's Law may be in jeopardy as it becomes harder to precisely define the behavior and shape of nanoscale...Michael Orshansky, Wei-Shen Wang From Communications of the ACM | August 2009
The traditional approach to circuit design has been to build chips that work correctly at extreme-case process...Sachin S. Sapatnekar From Communications of the ACM | August 2009
Existing literature on distributed development in software engineering and other fields discusses various challenges,...Christian Bird, Nachiappan Nagappan, Premkumar Devanbu, Harald Gall, Brendan Murphy From Communications of the ACM | August 2009
It was a problem that should not have taken three weeks to solve. The documentation claimed that if a function was called...James Herbsleb From Communications of the ACM | August 2009
This paper reports on the development and formal verification of CompCert, a compiler from Clight (a large subset of the C programming language) to PowerPC assembly...Xavier Leroy From Communications of the ACM | July 2009
In the early 1970s, pioneers like Floyd, Dijkstra, and Hoare argued that programs should be formally specified and proven...Greg Morrisett From Communications of the ACM | July 2009
Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical...Adam Coates, Pieter Abbeel, Andrew Y. Ng From Communications of the ACM | July 2009
In one scene from The Matrix, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither...Stuart Russell, Lawrence Saul From Communications of the ACM | July 2009
Modern computer systems are inherently nondeterministic due to a variety of events that occur during an execution. The lack of repeatability that arises from this...Derek R. Hower, Pablo Montesinos, Luis Ceze, Mark D. Hill, Josep Torrellas From Communications of the ACM | June 2009
Many Web sites embed third-party content in frames, relying on the browser's security policy to protect against malicious content. However, frames provide insufficient...Adam Barth, Collin Jackson, John C. Mitchell From Communications of the ACM | June 2009
The web has brought exciting new functionality while simultaneously requiring new mechanisms to make it secure. We've...Andrew Myers From Communications of the ACM | June 2009
In a thread-safe concurrent queue, consumers typically wait for producers to make data available. In a synchronous queue, producers similarly wait for consumers...William N. Scherer, Doug Lea, Michael L. Scott From Communications of the ACM | May 2009
The advent of multicore architectures has produced a Renaissance in the study of highly concurrent data structures.Maurice Herlihy From Communications of the ACM | May 2009
DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and...J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten From Communications of the ACM | May 2009
Many systems rely on keeping a master key secret. But technological progress can undermine old assumptions.Ross Anderson From Communications of the ACM | May 2009