acm-header
Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Making Sleep Tracking More User Friendly

"LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study" provides a nice balance in terms of minimizing the burden on users and...

LIBS
From Communications of the ACM

LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study

We explore a new form of wearable systems, called LIBS, that can continuously record biosignals such as brain wave, eye movements, and facial muscle contractions...

From Communications of the ACM

Technical Perspective: The Future of MPI

"Enabling Highly Scalable Remote Memory Access Programming with MPI-3 One Sided" convincingly shows that the potential of MPI one-sided communication can be realized...

Enabling Highly Scalable Remote Memory Access Programming with MPI-3 One Sided
From Communications of the ACM

Enabling Highly Scalable Remote Memory Access Programming with MPI-3 One Sided

In this work, we design and develop bufferless protocols that demonstrate how to implement the MPI-3 RMA interface and support scaling to millions of cores.

From Communications of the ACM

Technical Perspective: A Control Theorist's View on Reactive Control for Autonomous Drones

"Fundamental Concepts of Reactive Control for Autonomous Drones" introduces the notion of "reactive control" in which an autopilot's control logic is run only intermittently...

Fundamental Concepts of Reactive Control for Autonomous Drones
From Communications of the ACM

Fundamental Concepts of Reactive Control for Autonomous Drones

We conceive a notion of reactive control that allows drones to execute the low-level control logic only upon recognizing the need to, based on the influence of...

From Communications of the ACM

Technical Perspective: Graphs, Betweenness Centrality, and the GPU

"Accelerating GPU Betweenness Centrality" by McLaughlin and Bader ably addresses the challenges to authors of efficient graph implementations in the important context...

Accelerating GPU Betweenness Centrality
From Communications of the ACM

Accelerating GPU Betweenness Centrality

We present a hybrid GPU implementation that provides good performance on graphs of arbitrary structure rather than just scale-free graphs as was done previously...

From Communications of the ACM

Technical Perspective: Measuring Optimization Potential with Coz

In "Coz: Finding Code that Counts with Causal Profiling," Curtsinger and Berger describe causal profiling, which tell programmers exactly how much speed-up bang...

Coz
From Communications of the ACM

Coz: Finding Code that Counts with Causal Profiling

This paper introduces causal profiling. Unlike past profiling approaches, causal profiling indicates exactly where programmers should focus their optimization efforts...

From Communications of the ACM

Technical Perspective: A Gloomy Look at the Integrity of Hardware

"Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication)...

Exploiting the Analog Properties of Digital Circuits For Malicious Hardware
From Communications of the ACM

Exploiting the Analog Properties of Digital Circuits For Malicious Hardware

We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.

From Communications of the ACM

Technical Perspective: Unexpected Connections

The inherent scalability of an interface is the focus of "The Scalable Commutativity Rule" by Austin T. Clements, et al.

The Scalable Commutativity Rule
From Communications of the ACM

The Scalable Commutativity Rule: Designing Scalable Software For Multicore Processors

This paper introduces an interface-driven approach to building scalable software.

From Communications of the ACM

Technical Perspective: Ironfleet Simplifies Proving Safety and Liveness Properties

"IronFleet: Proving Safety and Liveness of Practical Distributed Systems," by Chris Hawblitzel, et al., describes mechanically checked proofs for two non-trivial...

Ironfleet
From Communications of the ACM

Ironfleet: Proving Safety and Liveness of Practical Distributed Systems

We demonstrate the methodology on a complex implementation of a Paxos-based replicated state machine library and a lease-based sharded key-value store. With our...

From Communications of the ACM

Technical Perspective: What Led Computer Vision to Deep Learning?

We are in the middle of the third wave of interest in artificial neural networks as the leading paradigm for machine learning. "ImageNet Classification with Deep...

ImageNet Classification with Deep Convolutional Neural Networks
From Communications of the ACM

ImageNet Classification with Deep Convolutional Neural Networks

In the 1980s backpropagation did not live up to the very high expectations of its advocates. Twenty years later, we know what went wrong: for deep neural networks...

From Communications of the ACM

Technical Perspective: The Power of Wi-Fi to Deliver Power

The authors of "Powering the Next Billion Devices with Wi-Fi" turn the problem of powering wireless sensor networks on its head. Instead of focusing on energy harvesting...

Powering the Next Billion Devices with Wi-Fi
From Communications of the ACM

Powering the Next Billion Devices with Wi-Fi

We present the first power over Wi-Fi system that delivers power to low-power sensors and devices and works with existing Wi-Fi chipsets.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account