Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Low-depth Arithmetic Circuits

The past few years have seen a revolution in our understanding of arithmetic circuits. "Unexpected Power of Low-Depth Arithmetic Circuits" by Gupta et al. on the...

Unexpected Power of Low-Depth Arithmetic Circuits
From Communications of the ACM

Unexpected Power of Low-Depth Arithmetic Circuits

Several earlier results have shown that it is possible to rearrange basic computational elements in surprising ways to give more efficient algorithms. The main...

From Communications of the ACM

Technical Perspective: What Led Computer Vision to Deep Learning?

We are in the middle of the third wave of interest in artificial neural networks as the leading paradigm for machine learning. "ImageNet Classification with Deep...

ImageNet Classification with Deep Convolutional Neural Networks
From Communications of the ACM

ImageNet Classification with Deep Convolutional Neural Networks

In the 1980s backpropagation did not live up to the very high expectations of its advocates. Twenty years later, we know what went wrong: for deep neural networks...

From Communications of the ACM

Technical Perspective: Building Knowledge Bases from Messy Data

"DeepDive: Declarative Knowledge Base Construction" is a prime example of groundbreaking work in the area of Knowledge Base Construction.

DeepDive
From Communications of the ACM

DeepDive: Declarative Knowledge Base Construction

We describe DeepDive, a system that combines database and machine learning ideas to help to develop knowledge base construction systems.

From Communications of the ACM

Technical Perspective: Functional Compilers

"Exploiting Vector Instructions with Generalized Stream Fusion" points out that stream fusion by itself is not well suited for generating bulk instructions such...

Exploiting Vector Instructions with Generalized Stream Fusion
From Communications of the ACM

Exploiting Vector Instructions with Generalized Stream Fusion

Programmers should not have to sacrifice code clarity or good software engineering practices to obtain performance. This work shows how to attain this goal for...

From Communications of the ACM

Technical Perspective: Building a Safety Net for Data Reuse

The authors of "Guilt-Free Data Reuse" show there is a way to construct a safety net that goes around a fixed dataset so that it may be analyzed interactively without...

Guilt-Free Data Reuse
From Communications of the ACM

Guilt-Free Data Reuse

In this work, we initiate a principled study of how to guarantee the validity of statistical inference in adaptive data analysis.

From Communications of the ACM

Technical Perspective: Proving File Systems Meet Expectations

"Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes" presents a big step toward real-world file systems that are crash-safe...

Certifying a File System Using Crash Hoare Logic
From Communications of the ACM

Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes

This paper introduces Crash Hoare logic, which extends traditional Hoare logic with a crash condition, a recovery procedure, and logical address spaces for specifying...

From Communications of the ACM

Technical Perspective: Data Distribution for Fast Joins

What is the most drastic way to reduce the cost of communication for parallel data processing algorithms? This is the question studied in "Reasoning on Data Partitioning...

Reasoning on Data Partitioning for Single-Round Multi-Join Evaluation in Massively Parallel Systems
From Communications of the ACM

Reasoning on Data Partitioning for Single-Round Multi-Join Evaluation in Massively Parallel Systems

We introduce a framework for reasoning about data partitioning to detect when we can avoid the data reshuffling step. 

From Communications of the ACM

Technical Perspective: The Power of Wi-Fi to Deliver Power

The authors of "Powering the Next Billion Devices with Wi-Fi" turn the problem of powering wireless sensor networks on its head. Instead of focusing on energy harvesting...

Powering the Next Billion Devices with Wi-Fi
From Communications of the ACM

Powering the Next Billion Devices with Wi-Fi

We present the first power over Wi-Fi system that delivers power to low-power sensors and devices and works with existing Wi-Fi chipsets.

Authentication Using Pulse-Response Biometrics
From Communications of the ACM

Authentication Using Pulse-Response Biometrics

We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response.

From Communications of the ACM

Technical Perspective: Cleaning Up Flaws in TLS Implementations

One unfortunate fact about protocols is that as they get older and applied to more scenarios — and TLS is used basically everywhere — they tend to gain weight....

A Messy State of the Union
From Communications of the ACM

A Messy State of the Union: Taming the Composite State Machines of TLS

We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how...

From Communications of the ACM

Technical Perspective: Mapping the Universe

"HACC: Extreme Scaling and Performance Across Diverse Architectures" describes the Hardware/Hybrid Accelerated Cosmology Code (HACC) framework, which uses a novel...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo