Sign In

Communications of the ACM

Research Archive


Archives

The Research archive provides access to all Research articles published in past issues of Communications of the ACM.

March 2010


From Communications of the ACM

Computing Arbitrary Functions of Encrypted Data

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a…


From Communications of the ACM

Technical Perspective: Seeing the Trees, the Forest, and Much More

Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and blind. How shall we go about building machines that can…


From Communications of the ACM

Using the Forest to See the Trees: Exploiting Context for Visual Object Detection and Localization

Using the Forest to See the Trees

Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search across all locations and scales in the image comparing local image…


From Communications of the ACM

Technical Perspective: A First Glimpse of Cryptography's Holy Grail

We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect valuable or sensitive data can be…

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo