acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Personalized Recommendation of PoIs to People with Autism
From Communications of the ACM

Technical Perspective: Personalized Recommendation of PoIs to People with Autism

"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs
From Communications of the ACM

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs: An Inclusive Recommender System

We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...

Technical Perspective: A Recipe for Protecting Against Speculation Attacks
From Communications of the ACM

Technical Perspective: A Recipe for Protecting Against Speculation Attacks

"Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data," by Jiyong Yu et al., might be a beginning of an end to speculation...

Speculative Taint Tracking (STT)
From Communications of the ACM

Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data

This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism, to block speculative execution attacks.

Technical Perspective: On Proofs, Entanglement, and Games
From Communications of the ACM

Technical Perspective: On Proofs, Entanglement, and Games

"MIP* = RE," by Zhengfeng Ji et al., studies quantum interactive proofs.

MIP* = RE
From Communications of the ACM

MIP* = RE

In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design
From Communications of the ACM

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design

"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts...

Securing the Wireless Emergency Alerts System
From Communications of the ACM

Securing the Wireless Emergency Alerts System

We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account