acm-header
Sign In

Communications of the ACM

Latest Research



Heads-Up Limit Hold'em Poker Is Solved
From Communications of the ACM

Heads-Up Limit Hold'em Poker Is Solved

This paper is an extended version of our original 2015 Science article, with additional results showing Cepheus' in-game performance against computer and human...

From Communications of the ACM

Technical Perspective: Shedding New Light on an Old Language Debate

"A Large-Scale Study of Programming Languages and Code Quality in GitHub," by Baishakhi Ray, et al., studies whether programming language choice and code quality...

A Large-Scale Study of Programming Languages and Code Quality in Github
From Communications of the ACM

A Large-Scale Study of Programming Languages and Code Quality in Github

What is the effect of programming languages on software quality? In this study, we gather a very large data set from GitHub in an attempt to shed some empirical...

From Communications of the ACM

Technical Perspective: Broadening and Deepening Query Optimization Yet Still Making Progress

"Multi-Objective Parametric Query Optimization," by Immanuel Trummer and Christoph Koch is a remarkable tour de force exploration of the combination of both parametric...

Multi-Objective Parametric Query Optimization
From Communications of the ACM

Multi-Objective Parametric Query Optimization

We propose a generalization of the classical database query optimization problem: multi-objective parametric query (MPQ) optimization.

From Communications of the ACM

Technical Perspective: A Gloomy Look at the Integrity of Hardware

"Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication)...

Exploiting the Analog Properties of Digital Circuits For Malicious Hardware
From Communications of the ACM

Exploiting the Analog Properties of Digital Circuits For Malicious Hardware

We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.

From Communications of the ACM

Technical Perspective: What Led Computer Vision to Deep Learning?

We are in the middle of the third wave of interest in artificial neural networks as the leading paradigm for machine learning. "ImageNet Classification with Deep...

ImageNet Classification with Deep Convolutional Neural Networks
From Communications of the ACM

ImageNet Classification with Deep Convolutional Neural Networks

In the 1980s backpropagation did not live up to the very high expectations of its advocates. Twenty years later, we know what went wrong: for deep neural networks...

From Communications of the ACM

Technical Perspective: Functional Compilers

"Exploiting Vector Instructions with Generalized Stream Fusion" points out that stream fusion by itself is not well suited for generating bulk instructions such...

Exploiting Vector Instructions with Generalized Stream Fusion
From Communications of the ACM

Exploiting Vector Instructions with Generalized Stream Fusion

Programmers should not have to sacrifice code clarity or good software engineering practices to obtain performance. This work shows how to attain this goal for...

From Communications of the ACM

Technical Perspective: Data Distribution For Fast Joins

What is the most drastic way to reduce the cost of communication for parallel data processing algorithms? This is the question studied in "Reasoning on Data Partitioning...

Reasoning on Data Partitioning For Single-Round Multi-Join Evaluation in Massively Parallel Systems
From Communications of the ACM

Reasoning on Data Partitioning For Single-Round Multi-Join Evaluation in Massively Parallel Systems

We introduce a framework for reasoning about data partitioning to detect when we can avoid the data reshuffling step. 

From Communications of the ACM

Technical Perspective: The Power of Wi-Fi to Deliver Power

The authors of "Powering the Next Billion Devices with Wi-Fi" turn the problem of powering wireless sensor networks on its head. Instead of focusing on energy harvesting...

Powering the Next Billion Devices with Wi-Fi
From Communications of the ACM

Powering the Next Billion Devices with Wi-Fi

We present the first power over Wi-Fi system that delivers power to low-power sensors and devices and works with existing Wi-Fi chipsets.

From Communications of the ACM

Technical Perspective: Mapping the Universe

"HACC: Extreme Scaling and Performance Across Diverse Architectures" describes the Hardware/Hybrid Accelerated Cosmology Code (HACC) framework, which uses a novel...

HACC
From Communications of the ACM

HACC: Extreme Scaling and Performance Across Diverse Architectures

In this Research Highlight, we demonstrate the success of HACC on two very different machines, the CPU/GPU system Titan and the BG/Q systems Sequoia and Mira, attaining...

From Communications of the ACM

Technical Perspective: The Chemistry of Software-Defined Batteries

A time-tested principle in computer systems design is to use an interface to separate an abstraction from its implementation. "Software-Defined Batteries" represents...

Software-Defined Batteries
From Communications of the ACM

Software-Defined Batteries

In this paper, we present a new hardware-software system, called Software Defined Battery, which allows system designers to integrate batteries of different chemistries...

From Communications of the ACM

Technical Perspective: FPGA Compute Acceleration Is First About Energy Efficiency

"A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services" presents a research deployment of Field Programmable Gate Arrays (FPGAs) in a Microsoft...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account