We here present the design and roadmap of a new paradigm in database systems, called NoDB, which do not require data loading while still maintaining the whole feature...Ioannis Alagiannis, Renata Borovica-Gajic, Miguel Branco, Stratos Idreos, Anastasia Ailamaki From Communications of the ACM | December 2015
"Soylent: A Word Processor with a Crowd Inside," introduces an exciting vision of using crowd workers to power an interactive system — here, a word processor —...Aniket (Niki) Kittur From Communications of the ACM | August 2015
This paper introduces architectural and interaction patterns for integrating crowdsourced human contributions directly into user interfaces.Michael S. Bernstein, Greg Little, Robert C. Miller, Björn Hartmann, Mark S. Ackerman, David R. Karger, David Crowell, Katrina Panovich From Communications of the ACM | August 2015
The authors of IllumiRoom investigate what AR/VR could look like in a truly social environment — the living room.Patrick Baudisch From Communications of the ACM | June 2015
IllumiRoom is a proof-of-concept system that surrounds a television with projected light, bringing video games, and film experiences out of the TV screen and into...Brett R. Jones, Hrvoje Benko, Eyal Ofek, Andrew D. Wilson From Communications of the ACM | June 2015
"Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications" advocates an appealing division of labor between a developer...James Larus From Communications of the ACM | May 2015
Current processor trends of integrating more cores with SIMD units have made it more to extract performance from applications. It is believed that traditional...Nadathur Satish, Changkyu Kim, Jatin Chhugani, Hideki Saito, Rakesh Krishnaiyer, Mikhail Smelyanskiy, Milind Girkar, Pradeep Dubey From Communications of the ACM | May 2015
The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that was not written by one of the K most...Philip A. Bernstein From Communications of the ACM | August 2014
Eventual consistency is often "good enough" for practitioners given its latency and availability benefits. In this work, we explain this phenomenon and demonstrate...Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica From Communications of the ACM | August 2014
Our visual system helps us carry out our daily business. Our eyes and brain help us by measuring shapes, trajectories, and distances in world around us, and by...Pietro Perona From Communications of the ACM | September 2013
We describe a state-of-the-art system for finding objects in cluttered images. Our system is based on deformable models that represent objects using local part...Pedro Felzenszwalb, Ross Girshick, David McAllester, Deva Ramanan From Communications of the ACM | September 2013
As Internet-based videos become mainstream, user expectation for high quality is constantly increasing. In this context, it is crucial for content providers to...Florin Dobrian, Asad Awan, Dilip Joseph, Aditya Ganjam, Jibin Zhan, Vyas Sekar, Ion Stoica, Hui Zhang From Communications of the ACM | March 2013
The following article by Shotton et al. describes a landmark computer vision system that takes a single depth image containing a person and automatically estimates...James M. Rehg From Communications of the ACM | January 2013
We propose a new method to quickly and accurately predict human pose — the 3-D positions of body joints — from a single depth image, without depending on information...Jamie Shotton, Toby Sharp, Alex Kipman, Andrew Fitzgibbon, Mark Finocchio, Andrew Blake, Mat Cook, Richard Moore From Communications of the ACM | January 2013
This lifting of data structure thinking to the relational level has long inspired computer scientists. In "An Introduction to Data Representation Synthesis," the...Yannis Smaragdakis From Communications of the ACM | December 2012
We consider the problem of specifying combinations of data structures with complex sharing in a manner that is declarative and results in provably correct code.Peter Hawkins, Martin Rinard, Alex Aiken, Mooly Sagiv, Kathleen Fisher From Communications of the ACM | December 2012
There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?
Dan Suciu From Communications of the ACM | September 2012
An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data,...Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan From Communications of the ACM | September 2012
The history of the relationship between writing systems and technology is as long as it is varied. Likewise, the challenge of entering text using portable gadgets...William A. Buxton From Communications of the ACM | September 2012
As computing technologies expanded beyond the confines of the desktop, the need for effective text entry methods alternative to the ubiquitous desktop keyboards...Shumin Zhai, Per Ola Kristensson From Communications of the ACM | September 2012