In this paper, we examine the use of Flash storage in the server domain. Wear-out has the potential to limit the use of Flash in this domain. To seriously consider...David Roberts, Taeho Kgil, Trevor Mudge From Communications of the ACM | April 2009
Flash memory nowadays seems to be in every discussion about system architecture. Sure enough, flash memory boasts...Goetz Graefe From Communications of the ACM | April 2009
Relative fitness is a new approach to modeling the performance of storage devices. In contrast to a conventional model, which predicts the performance of an application's...Michael P. Mesnier, Matthew Wachs, Raja R. Sambasivan, Alice X. Zheng, Gregory R. Ganger From Communications of the ACM | April 2009
Large disk arrays are everywhere. When we shop at an Internet retailer, the product and account data come from a disk...Arif Merchant From Communications of the ACM | April 2009
We address the problem of specifying and detecting emergent behavior in networks of cardiac myocytes, spiral electric waves in particular, a precursor to atrial...Radu Grosu, Scott A. Smolka, Flavio Corradini, Anita Wasilewska, Emilia Entcheva, Ezio Bartocci From Communications of the ACM | March 2009
Alan Turing died in 1954 in his laboratory after eating a cyanide-laced apple. During his last years, Turing had become interested in bio-chemical systems. He had...Bud Mishra From Communications of the ACM | March 2009
Ever since the birth of coding theory almost 60 years ago, researchers have been pursuing the elusive goal of constructing the "best codes," whose encoding introduces...Venkatesan Guruswami, Atri Rudra From Communications of the ACM | March 2009
Error-correcting codes are the means by which we compensate for interference in communication, and are essential for the accurate transmission and storage of digital...Daniel A. Spielman From Communications of the ACM | March 2009
Traditionally, computational problems fall into two classes: those that have a polynomial-time algorithm and those that are NP-hard. However, the concept of NP-hardness...Constantinos Daskalakis, Paul W. Goldberg, Christos H. Papadimitriou From Communications of the ACM | February 2009
Computer science and game theory go back to the same individual, John von Neumann, and both subjects deal with the...Ehud Kalai From Communications of the ACM | February 2009
Swift is a new, principled approach to building Web applications that are secure by construction. Swift automatically partitions application code while providing...Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, Xin Zheng From Communications of the ACM | February 2009
Back in the old days of the Web (before 1995), Web browsers were fairly simple devices. The server's Web interface was simple enough that an auditor could at least...Dan Wallach From Communications of the ACM | February 2009
This article describes mechanisms for asynchronous collaboration in the context of information visualization, recasting visualizations as not just analytic tools...Jeffrey Heer, Fernanda B. Viégas, Martin Wattenberg From Communications of the ACM | January 2009
Visual analysis, a powerful method for finding and telling stories with data, is moving from research into widespread use.Jock D. Mackinlay From Communications of the ACM | January 2009
Traditional image resizing techniques are oblivious to the content of the image when changing its width or height. In contrast, media (i.e., image and video) retargeting...Ariel Shamir, Shai Avidan From Communications of the ACM | January 2009
A mind-boggling array of displays differ greatly in resolutions and aspect ratios. But images and videos are captured at fixed resolutions and aspect ratios, and...Harry Shum From Communications of the ACM | January 2009
C programmers are are all too familiar with out-of-bounds memory errors. The paper here presents an intriguing technique for...Martin C. Rinard From Communications of the ACM | December 2008
Beginning in the early to mid-1980s the relational model of data has dominated the DBMS landscape. Moreover, descendents of...Michael Stonebraker From Communications of the ACM | December 2008
Programs written in C and C++ are susceptible to memory errors, including buffer overflows and dangling pointers. We present Exterminator, a system that automatically...Gene Novark, Emery D. Berger, Benjamin G. Zorn From Communications of the ACM | December 2008
In this paper, we report how research around the MonetDB database system has led to a redesign of database architecture in order to take advantage of modern hardware...Peter A. Boncz, Martin L. Kersten, Stefan Manegold From Communications of the ACM | December 2008