acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Finding the Sweet Spot Amid Accuracy and Performance
From Communications of the ACM

Technical Perspective: Finding the Sweet Spot Amid Accuracy and Performance

"Multi-Itinerary Optimization as Cloud Service," by Alexandru Cristian et al., makes accessible an end-to-end cloud service that produces traffic-aware, real-time...

Multi-Itinerary Optimization as Cloud Service
From Communications of the ACM

Multi-Itinerary Optimization as Cloud Service

We describe multi-itinerary optimization, a novel Bing Maps service that automates the process of building itineraries for multiple agents while optimizing their...

Technical Perspective: Does Your Experiment Smell?
From Communications of the ACM

Technical Perspective: Does Your Experiment Smell?

"PlanAlyzer," by Emma Tosch et al., details PlanAlyzer software, the first tool to statically check the validity of online experiments.

PlanAlyzer
From Communications of the ACM

PlanAlyzer: Assessing Threats to the Validity of Online Experiments

We present the first approach for checking the internal validity of online experiments statically, that is, from code alone.

Technical Perspective: The Importance of WINOGRANDE
From Communications of the ACM

Technical Perspective: The Importance of WINOGRANDE

"WINOGRANDE" explores new methods of dataset development and adversarial filtering, expressly designed to prevent AI systems from making claims of smashing through...

WinoGrande
From Communications of the ACM

WinoGrande: An Adversarial Winograd Schema Challenge at Scale

We introduce WinoGrande, a large-scale dataset of 44k problems, inspired by the original Winograd Schema Challenge, but adjusted to improve both the scale and the...

From Communications of the ACM

Technical Perspective: The Strength of SuRF

The authors of "Succinct Range Filters" make a critical and insightful observation: For a given set of queries, the upper levels of the trie incur many more accesses...

Succinct Range Filters
From Communications of the ACM

Succinct Range Filters

We present the Succinct Range Filter (SuRF), a fast and compact data structure for approximate membership tests.

From Communications of the ACM

Technical Perspective: Programming Microfluidics to Execute Biological Protocols

The approach taken in "BioScript," by Jason Ott, et al., is an example of how programming languages can help develop executable protocols that are conforming, understandable...

BioScript
From Communications of the ACM

BioScript: Programming Safe Chemistry on Laboratories-on-a-Chip

This paper introduces BioScript, a domain-specific language for programmable biochemistry that executes on emerging microfluidic platforms.

From Communications of the ACM

Technical Perspective: BLeak: Semantics-Aware Leak Detection in the Web

What is the right leak oracle that can precisely capture the behavior of leaks in Web applications? "BLeak: Automatically Debugging Memory Leaks in Web Applications...

BLeak
From Communications of the ACM

BLeak: Automatically Debugging Memory Leaks in Web Applications

This paper introduces BLeak (Browser Leak debugger), the first system for automatically debugging memory leaks in web applications.

From Communications of the ACM

Technical Perspective: Analyzing Smart Contracts with MadMax

"MadMax: Analyzing the Out-of-Gas World of Smart Contracts," by Neville Grech et al., effectively discovers a new smart contract vulnerability, and proposes a detection...

MadMax
From Communications of the ACM

MadMax: Analyzing the Out-of-Gas World of Smart Contracts

We identify gas-focused vulnerabilities and present MadMax: a static program analysis technique that automatically detects gas-focused vulnerabilities with very...

From Communications of the ACM

Technical Perspective: Progress in Spatial Computing for Flood Prediction

There are few algorithms for multi-flow graphs beyond flow accumulation. The authors of "Flood-Risk Analysis on Terrains" take a big step to fill this knowledge...

Flood-Risk Analysis on Terrains
From Communications of the ACM

Flood-Risk Analysis on Terrains

In this paper, we study a number of flood-risk related problems, give an overview of efficient algorithms for them, as well as explore the efficacy and efficiency...

From Communications of the ACM

Technical Perspective: Computing the Value of Location Data

"Computing Value of Spatiotemporal Information," by Heba Aly et al., describes a technique for computing the monetary value of a person's location data for a potential...

Computing Value of Spatiotemporal Information
From Communications of the ACM

Computing Value of Spatiotemporal Information

We investigate the intrinsic value of location data in the context of strong privacy, where location information is only available from end users via purchase. ...

From Communications of the ACM

Technical Perspective: ASIC Clouds: Specializing the Datacenter

Can we build purpose-built, warehouse-scale datacenters customized for large-scale arrays of ASIC accelerators or, to use a term coined in the paper by Michael...

ASIC Clouds
From Communications of the ACM

ASIC Clouds: Specializing the Datacenter for Planet-Scale Applications

This paper distills lessons from Bitcoin ASIC Clouds and applies them to other large scale workloads, showing superior TCO (total cost of ownership) versus CPU...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account