acm-header
Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Is Your WiFi a Sensor?

"Emotion Recognition Using Wireless Signals" shows that not only can the heartrate be counted with accuracy comparable to ECG devices, but the variabilities of...

Emotion Recognition Using Wireless Signals
From Communications of the ACM

Emotion Recognition Using Wireless Signals

This paper demonstrates a new technology that can infer a person's emotions from RF signals reflected off his body.

From Communications of the ACM

Technical Perspective: Graphs, Betweenness Centrality, and the GPU

"Accelerating GPU Betweenness Centrality" by McLaughlin and Bader ably addresses the challenges to authors of efficient graph implementations in the important context...

Accelerating GPU Betweenness Centrality
From Communications of the ACM

Accelerating GPU Betweenness Centrality

We present a hybrid GPU implementation that provides good performance on graphs of arbitrary structure rather than just scale-free graphs as was done previously...

From Communications of the ACM

Technical Perspective: The Rewards of Selfish Mining

"Majority Is Not Enough: Bitcoin Mining Is Vulnerable," by Eyal and Sirer, questions the 2009 Bitcoin white paper's implicit assumption of perfect information—that...

From Communications of the ACM

Technical Perspective: Measuring Optimization Potential with Coz

In "Coz: Finding Code that Counts with Causal Profiling," Curtsinger and Berger describe causal profiling, which tell programmers exactly how much speed-up bang...

Coz
From Communications of the ACM

Coz: Finding Code that Counts with Causal Profiling

This paper introduces causal profiling. Unlike past profiling approaches, causal profiling indicates exactly where programmers should focus their optimization efforts...

From Communications of the ACM

Technical Perspective: On Heartbleed: A Hard Beginnyng Makth a Good Endyng

When a serious security vulnerability is discovered in the SSL/TLS protocol, one would naturally expect a rapid response. "Analysis of SSL Certificate Reissues...

Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
From Communications of the ACM

Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

We use Heartbleed, a widespread OpenSSL vulnerability from 2014, as a natural experiment to determine whether administrators are properly managing their X.509 certificates...

From Communications of the ACM

Technical Perspective: Can High Performance Be Portable?

"Halide: Decoupling Algorithms from Schedules for High-Performance Image Processing" by Ragan-Kelley et al. on the image processing language Halide explores a substantially...

Halide
From Communications of the ACM

Halide: Decoupling Algorithms from Schedules For High-Performance Image Processing

We propose a new programming language for image processing pipelines, called Halide, that separates the algorithm from its schedule.

From Communications of the ACM

Technical Perspective: A Gloomy Look at the Integrity of Hardware

"Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication)...

Exploiting the Analog Properties of Digital Circuits For Malicious Hardware
From Communications of the ACM

Exploiting the Analog Properties of Digital Circuits For Malicious Hardware

We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.

From Communications of the ACM

Technical Perspective: The Power of Wi-Fi to Deliver Power

The authors of "Powering the Next Billion Devices with Wi-Fi" turn the problem of powering wireless sensor networks on its head. Instead of focusing on energy harvesting...

Powering the Next Billion Devices with Wi-Fi
From Communications of the ACM

Powering the Next Billion Devices with Wi-Fi

We present the first power over Wi-Fi system that delivers power to low-power sensors and devices and works with existing Wi-Fi chipsets.

Authentication Using Pulse-Response Biometrics
From Communications of the ACM

Authentication Using Pulse-Response Biometrics

We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response.

From Communications of the ACM

Technical Perspective: The Chemistry of Software-Defined Batteries

A time-tested principle in computer systems design is to use an interface to separate an abstraction from its implementation. "Software-Defined Batteries" represents...

Software-Defined Batteries
From Communications of the ACM

Software-Defined Batteries

In this paper, we present a new hardware-software system, called Software Defined Battery, which allows system designers to integrate batteries of different chemistries...

From Communications of the ACM

Technical Perspective: FPGA Compute Acceleration Is First About Energy Efficiency

"A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services" presents a research deployment of Field Programmable Gate Arrays (FPGAs) in a Microsoft...

A Reconfigurable Fabric For Accelerating Large-Scale Datacenter Services
From Communications of the ACM

A Reconfigurable Fabric For Accelerating Large-Scale Datacenter Services

We describe a medium-scale deployment of a composable, reconfigurable hardware fabric on a bed of 1,632 servers, and measure its effectiveness in accelerating the...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account