Contention for caches, memory controllers, and interconnects can be eased by contention-aware scheduling algorithms.Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev From Communications of the ACM | February 2010
How do we develop software to make the most of the promise that asymmetric multicore systems use a lot less energy?Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto From Communications of the ACM | December 2009
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009
Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.Paul Stachour, David Collier-Brown From Communications of the ACM | November 2009
The biosciences need an image format capable of high performance and long-term maintenance. Is HDF5 the answer?
Matthew T. Dougherty, Michael J. Folk, Erez Zadok, Herbert J. Bernstein, Frances C. Bernstein, Kevin W. Eliceiri, Werner Benger, Christoph Best From Communications of the ACM | October 2009
MonALISA developers describe how it works, the key design principles behind it, and the biggest technical challenges in building it.
Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan From Communications of the ACM | September 2009