CDOs are examples of financial derivatives, with a value that depends on the underlying assets with which they are linked. These kinds of complex financial products...David C. Parkes From Communications of the ACM | May 2011
Securitization of cash flows using financial derivatives transformed the financial industry over the last three decades. Derivatives...Sanjeev Arora, Boaz Barak, Markus Brunnermeier, Rong Ge From Communications of the ACM | May 2011
This paper reports on the results of a multidisciplinary project involving lawyers and computer scientists with the aim to put forward a set of methods and tools...Daniel Le Métayer, Manuel Maarek, Eduardo Mazza, Marie-Laure Potet, Stéphane Frénot, Valérie Viet Triem Tong, Nicolas Craipeau, Ronan Hardouin From Communications of the ACM | April 2011
The paper by LeMétayer et al. addresses one technical issue in a large and serious problem in the production...Daniel M. Berry From Communications of the ACM | April 2011
A system for musical accompaniment is presented in which a computer-driven orchestra follows and learns from a soloist in a concerto-like setting. The system's...Christopher Raphael From Communications of the ACM | March 2011
In the opening of Sibelius' Violin Concerto, a soloist plays delicately. The orchestra responds in kind. As...Juan Bello, Yann LeCun, Robert Rowe From Communications of the ACM | March 2011
Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...Hristo Bojinov, Elie Bursztein, Dan Boneh From Communications of the ACM | August 2010
A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...Helen Wang From Communications of the ACM | August 2010
Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine...Sebastian Thrun From Communications of the ACM | April 2010
Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries...Leslie Pack Kaelbling From Communications of the ACM | April 2010
Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search...A. Torralba, K. P. Murphy, W. T. Freeman From Communications of the ACM | March 2010
Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and...Pietro Perona From Communications of the ACM | March 2010
We all receive spam advertisements, but few of us have encountered a person who admits to following through on an offer and making a purchase. And yet, the relentlessness...Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage From Communications of the ACM | September 2009
You never click on advertisements received in spam or in phishing messages, do you? Nobody does. So, if that is...Marc Dacier From Communications of the ACM | September 2009
Existing literature on distributed development in software engineering and other fields discusses various challenges,...Christian Bird, Nachiappan Nagappan, Premkumar Devanbu, Harald Gall, Brendan Murphy From Communications of the ACM | August 2009
It was a problem that should not have taken three weeks to solve. The documentation claimed that if a function was called...James Herbsleb From Communications of the ACM | August 2009
Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical...Adam Coates, Pieter Abbeel, Andrew Y. Ng From Communications of the ACM | July 2009
In one scene from The Matrix, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither...Stuart Russell, Lawrence Saul From Communications of the ACM | July 2009
Many Web sites embed third-party content in frames, relying on the browser's security policy to protect against malicious content. However, frames provide insufficient...Adam Barth, Collin Jackson, John C. Mitchell From Communications of the ACM | June 2009
The web has brought exciting new functionality while simultaneously requiring new mechanisms to make it secure. We've...Andrew Myers From Communications of the ACM | June 2009