"A Fistful of Bitcoins" examines, in the context of Bitcoin, what we could learn by studying the patterns encoded in a complete record of every single financial...Emin GÜn Sirer From Communications of the ACM | April 2016
Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique...Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage From Communications of the ACM | April 2016
An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is...Ari Juels, Bonnie Wong From Communications of the ACM | May 2014
We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow...Hristo Bojinov, Daniel Sanchez, Paul Reber, Dan Boneh, Patrick Lincoln From Communications of the ACM | May 2014
For a semiconductor circuit with billions of transistors, finding desired locations of circuit components is a challenging task that substantially impacts circuit...Yao-Wen Chang From Communications of the ACM | June 2013
VLSI placement optimizes locations of circuit components so as to reduce interconnect. We propose an algorithm for large-scale placement that outperforms prior...Myung-Chul Kim, Dong-Jin Lee, Igor L. Markov From Communications of the ACM | June 2013
Photographs capture the moment; paintings convey perception, impression, and feeling; illustrations tell stories. Computer graphics aims to enrich all these artistic...Doug DeCarlo, Matthew Stone From Communications of the ACM | January 2013
How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for...Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala From Communications of the ACM | January 2013
Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security...Christopher Kruegel From Communications of the ACM | September 2011
The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that...Sruthi Bandhakavi, Nandit Tiku, Wyatt Pittman, Samuel T. King, P. Madhusudan, Marianne Winslett From Communications of the ACM | September 2011
Dremel is a scalable, interactive ad hoc query system for analysis of read-only nested data. By combining multilevel execution trees and columnar data layout, it...Sergey Melnik, Andrey Gubarev, Jing Jing Long, Geoffrey Romer, Shiva Shivakumar, Matt Tolton, Theo Vassilakis From Communications of the ACM | June 2011
The importance of data analysis has never been clearer. Globe-spanning scientific collaborations are exploring...Michael J. Franklin From Communications of the ACM | June 2011
CDOs are examples of financial derivatives, with a value that depends on the underlying assets with which they are linked. These kinds of complex financial products...David C. Parkes From Communications of the ACM | May 2011
Securitization of cash flows using financial derivatives transformed the financial industry over the last three decades. Derivatives...Sanjeev Arora, Boaz Barak, Markus Brunnermeier, Rong Ge From Communications of the ACM | May 2011
This paper reports on the results of a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools...Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin From Communications of the ACM | April 2011
The paper by LeMétayer et al. addresses one technical issue in a large and serious problem in the production...Daniel M. Berry From Communications of the ACM | April 2011
A system for musical accompaniment is presented in which a computer-driven orchestra follows and learns from a soloist in a concerto-like setting. The system's...Christopher Raphael From Communications of the ACM | March 2011
In the opening of Sibelius' Violin Concerto, a soloist plays delicately. The orchestra responds in kind. As...Juan Bello, Yann LeCun, Robert Rowe From Communications of the ACM | March 2011
Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...Hristo Bojinov, Elie Bursztein, Dan Boneh From Communications of the ACM | August 2010
A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...Helen Wang From Communications of the ACM | August 2010