"In-Sensor Classification With Boosted Race Trees," by Georgios Tzimpragos, et al., proposes a surprising, novel, and creative approach to post-Moore's Law computing...Abhishek Bhattacharjee From Communications of the ACM | June 2021
We demonstrate the potential of a novel form of encoding, race logic, in which information is represented as the delay in the arrival of a signal.
Georgios Tzimpragos, Advait Madhavan, Dilip Vasudevan, Dmitri Strukov, Timothy Sherwood From Communications of the ACM | June 2021
"3D Localization for Subcentimeter-Sized Devices," by Iyer, et al., neatly separates and solves the problems of robotic locomotion, sensing, localization, and communications...Prabal Dutta From Communications of the ACM | March 2021
We present the first localization system that consumes microwatts of power at a mobile device and can be localized across multiple rooms in settings such as homes...Rajalakshmi Nandakumar, Vikram Iyer, Shyamnath Gollakota From Communications of the ACM | March 2021
"Scalable Signal Reconstruction for a Broad Range of Applications," by Abolfazl Asudeh, et al. shows that algorithmic insights about SRP, combined with database...Zachary G. Ives From Communications of the ACM | February 2021
Most of the common approaches for solving signal reconstruction problem do not scale to large problem sizes. We propose a novel and scalable algorithm for solving...Abolfazl Asudeh, Jees Augustine, Saravanan Thirumuruganathan, Azade Nazi, Nan Zhang, Gautam Das, Divesh Srivastava From Communications of the ACM | February 2021
"SkyCore," by Mehrdad Moradi, et al., addresses an exciting use case for Unmanned Aerial Vehicles in which UAVs can act as mobile base stations for the cellular...Richard Han From Communications of the ACM | January 2021
We argue for and propose an alternate, radical edge evolved packet core design, called SkyCore, that pushes the EPC functionality to the extreme edge of the core...Mehrdad Moradi, Karthikeyan Sundaresan, Eugene Chai, Sampath Rangarajan, Z. Morley Mao From Communications of the ACM | January 2021
In "Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes," by Omar Fawzi, et al., the authors produce an algorithm that can rapidly deduce the...Daniel Gottesman From Communications of the ACM | January 2021
In this paper, we study the asymptotic scaling of the space overhead needed for fault-tolerant quantum computation.
Omar Fawzi, Antoine Grospellier, Anthony Leverrier From Communications of the ACM | January 2021
The system described in "SATURN: An Introduction to the Internet of Materials" works passively, energized essentially by static electricity generated as layers...Joseph A. Paradiso From Communications of the ACM | December 2020
We propose an Internet of Materials, where the very materials of objects and surfaces are augmented or manufactured to have computational capabilities.
Nivedita Arora, Thad Starner, Gregory D. Abowd From Communications of the ACM | December 2020
How to produce a convolutional neural net that is small enough to run on a mobile device, and accurate enough to be worth using? The strategies in "Enabling AI...David Alexander Forsyth From Communications of the ACM | December 2020
We present a novel approach to running state-of-the-art AI algorithms in edge devices, and propose two efficient approximations to standard convolutional neural...Mohammad Rastegari, Vicente Ordonez, Joseph Redmon, Ali Farhadi From Communications of the ACM | December 2020
Can we build purpose-built, warehouse-scale datacenters customized for large-scale arrays of ASIC accelerators or, to use a term coined in the paper by Michael...Parthasarathy Ranganathan From Communications of the ACM | July 2020
This paper distills lessons from Bitcoin ASIC Clouds and applies them to other large scale workloads, showing superior TCO (total cost of ownership) versus CPU...Michael Bedford Taylor, Luis Vega, Moein Khazraee, Ikuo Magaki, Scott Davidson, Dustin Richmond From Communications of the ACM | July 2020
"Spectre Attacks: Exploiting Speculative Execution," by Paul Kocher, et al., reviews how speculative execution and caches can be exploited, presents specific exploits...Mark D. Hill From Communications of the ACM | July 2020
This paper describes practical attacks that combine methodology from side-channel attacks, fault attacks, and return-oriented programming that can read arbitrary...Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom From Communications of the ACM | July 2020
"Measuring and Mitigating OAuth Access Token Abuse by Collusion Networks," by Shehroze Farooqi et al., explores a social-networking reputation manipulation ecosystem...Geoffrey M. Voelker From Communications of the ACM | May 2020
We carried out a comprehensive measurement study to understand how collusion networks exploited popular third-party Facebook applications with weak security settings...Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq From Communications of the ACM | May 2020