"Indistinguishability Obfuscation from Well-Founded Assumptions," by Aayush Jain et al., gives a new construction of indistinguishability obfuscation that is provably...Daniel Wichs From Communications of the ACM | March 2024
We examine a formalization of the "one-way compiler" concept with the notion of indistinguishability obfuscation.
Aayush Jain, Huijia Lin, Amit Sahai From Communications of the ACM | March 2024
"Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits," by Nutan Limaye et al., achieves a landmark in the larger quest of understanding hardness,...Nitin Saxena From Communications of the ACM | February 2024
In this paper, we prove the first superpolynomial lower bounds against algebraic circuits of all constant depths over all fields of characteristic 0.
Nutan Limaye, Srikanth Srinivasan, Sébastien Tavenas From Communications of the ACM | February 2024
"Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines," by Shengzhong Liu et al., proposes a new methodology for overcoming the limitations...Giorgio Buttazzo From Communications of the ACM | February 2024
This paper discusses algorithmic priority inversion in mission-critical machine inference pipelines used in modern neural-network-based perception subsystems and...Shengzhong Liu, Shuochao Yao, Xinzhe Fu, Rohan Tabish, Simon Yu, Ayoosh Bansal, Heechul Yun, Lui Sha, Tarek Abdelzaher From Communications of the ACM | February 2024
"Almost-Linear-Time Algorithms for Maximum Flow and Minimum-Cost Flow," by Li Chen et al., comes within striking distance of answering the question: "Does maximum...Shang-Hua Teng From Communications of the ACM | December 2023
We present an algorithm that computes exact maximum flows and minimum-cost flows on directed graphs with m edges and polynomially bounded integral demands, costs...Li Chen, Rasmus Kyng, Yang P. Liu, Richard Peng, Maximilian Probst Gutenberg, Sushant Sachdeva From Communications of the ACM | December 2023
"Boosting Fuzzer Efficiency: An Information Theoretic Perspective," by Marcel Böhme, Valentin J.M. Manès, and Sang Kil Cha, presents a novel twist to fuzzing that...Gordon Fraser From Communications of the ACM | November 2023
In this paper, we take the fundamental perspective of fuzzing as a learning process.
Marcel Böhme, Valentin J. M. Manès, Sang Kil Cha From Communications of the ACM | November 2023
"Model Counting Meets Distinct Elements," by A. Pavan et al., gives a surprising connection between model counting and streaming, providing a generic transformation...David P. Woodruff From Communications of the ACM | September 2023
In this work, we seek to investigate whether bridging the seeming communication gap between two different domains of computer science may pave the way to richer...A. Pavan, N. V. Vinodchandran, Arnab Bhattacharyya, Kuldeep S. Meel From Communications of the ACM | September 2023
The authors of "Offline and Online Algorithms for SSD Management" propose a more accurate theoretical model of flash-based SSDs that views each page as containing...Ramesh K. Sitaraman From Communications of the ACM | July 2023
We explore the problem of reducing high internal overhead of flash media which is referred to as write amplification from an algorithmic perspective, considering...Tomer Lange, Joseph (Seffi) Naor, Gala Yadgar From Communications of the ACM | July 2023
"Toward Basing Cryptography on the Hardness of EXP," by Yanyi Liu and Rafael Pass, establishes surprisingly tight bidirectional connections between one-way functions...Gil Segev From Communications of the ACM | May 2023
We show that the only "gap" toward getting (infinitely-often) OWFs from the assumption that EXP ≠ BPP is the seemingly "minor" technical gap between two-sided error...Yanyi Liu, Rafael Pass From Communications of the ACM | May 2023
The breakthrough of "Achieving High Performance the Functional Way," by Bastian Hagedorn et al., is in fundamentally rethinking the design of user-schedulable languages...Jonathan Ragan-Kelley From Communications of the ACM | March 2023
We show how to employ functional programming techniques to solve with elegance the challenge of using a high-level language to describe functionality and a separate...Bastian Hagedorn, Johannes Lenfers, Thomas Kœhler, Xueying Qin, Sergei Gorlatch, Michel Steuwer From Communications of the ACM | March 2023
"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al., addresses the challenge of processing an intractably large set of trained models...Martin Vechev From Communications of the ACM | February 2023
We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for...Samuel Drews, Aws Albarghouthi, Loris D'Antoni From Communications of the ACM | February 2023