acm-header
Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Solving the Signal Reconstruction Problem at Scale

"Scalable Signal Reconstruction for a Broad Range of Applications," by Abolfazl Asudeh, et al. shows that algorithmic insights about SRP, combined with database...

Scalable Signal Reconstruction for a Broad Range of Applications
From Communications of the ACM

Scalable Signal Reconstruction for a Broad Range of Applications

Most of the common approaches for solving signal reconstruction problem do not scale to large problem sizes. We propose a novel and scalable algorithm for solving...

From Communications of the ACM

Technical Perspective: Programming Microfluidics to Execute Biological Protocols

The approach taken in "BioScript," by Jason Ott, et al., is an example of how programming languages can help develop executable protocols that are conforming, understandable...

BioScript
From Communications of the ACM

BioScript: Programming Safe Chemistry on Laboratories-on-a-Chip

This paper introduces BioScript, a domain-specific language for programmable biochemistry that executes on emerging microfluidic platforms.

From Communications of the ACM

Technical Perspective: SkyCore's Architecture Takes It to the 'Edge'

"SkyCore," by Mehrdad Moradi, et al., addresses an exciting use case for Unmanned Aerial Vehicles in which UAVs can act as mobile base stations for the cellular...

SkyCore
From Communications of the ACM

SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-Based LTE Networks

We argue for and propose an alternate, radical edge evolved packet core design, called SkyCore, that pushes the EPC functionality to the extreme edge of the core...

From Communications of the ACM

Technical Perspective: Deciphering Errors to Reduce the Cost of Quantum Computation

In "Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes," by Omar Fawzi, et al., the authors produce an algorithm that can rapidly deduce the...

Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes
From Communications of the ACM

Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes

In this paper, we study the asymptotic scaling of the space overhead needed for fault-tolerant quantum computation.

From Communications of the ACM

Technical Perspective: The Future of Large-Scale Embedded Sensing

The system described in "SATURN: An Introduction to the Internet of Materials" works passively, energized essentially by static electricity generated as layers...

SATURN
From Communications of the ACM

SATURN: An Introduction to the Internet of Materials

We propose an Internet of Materials, where the very materials of objects and surfaces are augmented or manufactured to have computational capabilities.

From Communications of the ACM

Technical Perspective: XNOR-Networks – Powerful but Tricky

How to produce a convolutional neural net that is small enough to run on a mobile device, and accurate enough to be worth using? The strategies in "Enabling AI...

Enabling AI at the Edge with XNOR-Networks
From Communications of the ACM

Enabling AI at the Edge with XNOR-Networks

We present a novel approach to running state-of-the-art AI algorithms in edge devices, and propose two efficient approximations to standard convolutional neural...

From Communications of the ACM

Technical Perspective: BLeak: Semantics-Aware Leak Detection in the Web

What is the right leak oracle that can precisely capture the behavior of leaks in Web applications? "BLeak: Automatically Debugging Memory Leaks in Web Applications...

BLeak
From Communications of the ACM

BLeak: Automatically Debugging Memory Leaks in Web Applications

This paper introduces BLeak (Browser Leak debugger), the first system for automatically debugging memory leaks in web applications.

From Communications of the ACM

Technical Perspective: When the Adversary Is Your Friend

The key insight of the "Generative Adversarial Networks," by Ian Goodfellow et al., is to learn a generative model's loss function at the same time as learning...

Generative Adversarial Networks
From Communications of the ACM

Generative Adversarial Networks

In this overview paper, we describe one particular approach to unsupervised learning via generative modeling called generative adversarial networks. We briefly...

From Communications of the ACM

Technical Perspective: Analyzing Smart Contracts with MadMax

"MadMax: Analyzing the Out-of-Gas World of Smart Contracts," by Neville Grech et al., effectively discovers a new smart contract vulnerability, and proposes a detection...

MadMax
From Communications of the ACM

MadMax: Analyzing the Out-of-Gas World of Smart Contracts

We identify gas-focused vulnerabilities and present MadMax: a static program analysis technique that automatically detects gas-focused vulnerabilities with very...

From Communications of the ACM

Technical Perspective: Two for the Price of One

"Lower Bounds for External Memory Integer Sorting via Network Coding" proves a remarkable connection between how efficiently computers can perform sorting and transmitting...

Lower Bounds for External Memory Integer Sorting via Network Coding
From Communications of the ACM

Lower Bounds for External Memory Integer Sorting via Network Coding

In this paper, we present a tight conditional lower bound on the complexity of external memory sorting of integers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account