acm-header
Sign In

Communications of the ACM

Latest Research



Real-Time Human Pose Recognition in Parts from Single Depth Images
From Communications of the ACM

Real-Time Human Pose Recognition in Parts from Single Depth Images

We propose a new method to quickly and accurately predict human pose — the 3-D positions of body joints — from a single depth image, without depending on information...

From Communications of the ACM

Technical Perspective: Visualization, Understanding, and Design

Photographs capture the moment; paintings convey perception, impression, and feeling; illustrations tell stories. Computer graphics aims to enrich all these artistic...

From Communications of the ACM

Illustrating How Mechanical Assemblies Work

How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for...

From Communications of the ACM

Technical Perspective: High-Level Data Structures

This lifting of data structure thinking to the relational level has long inspired computer scientists. In "An Introduction to Data Representation Synthesis," the...

An Introduction to Data Representation Synthesis
From Communications of the ACM

An Introduction to Data Representation Synthesis

We consider the problem of specifying combinations of data structures with complex sharing in a manner that is declarative and results in provably correct code.

From Communications of the ACM

Technical Perspective: SQL on an Encrypted Database

There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?

CryptDB: Processing Queries on an Encrypted Database
From Communications of the ACM

CryptDB: Processing Queries on an Encrypted Database

An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data,...

From Communications of the ACM

Technical Perspective: Innovative Interaction: From Concept to the Wild

The history of the relationship between writing systems and technology is as long as it is varied. Likewise, the challenge of entering text using portable gadgets...

The Word-Gesture Keyboard
From Communications of the ACM

The Word-Gesture Keyboard: Reimagining Keyboard Interaction

As computing technologies expanded beyond the confines of the desktop, the need for effective text entry methods alternative to the ubiquitous desktop keyboards...

Searching the Village
From Communications of the ACM

Searching the Village: Models and Methods For Social Search

With Aardvark, a social search engine, users ask a question, either by IM, e-mail, Web input, text message, or voice. Aardvark then routes the question to the person...

From Communications of the ACM

Technical Perspective: Who Knows?: Searching For Expertise on the Social Web

It is difficult to remember what people had to do to find the answer to a question before the Web. One option might be to call a friend who might know the answer...

From Communications of the ACM

Technical Perspective: Visual Reconstruction

Nearly 460,000 Flickr pictures were used to create detailed three-dimensional geometry and colors of famous landmarks and...

Building Rome in a Day
From Communications of the ACM

Building Rome in a Day

We present a system that can reconstruct 3D geometry from large, unorganized collections of photographs. Our experimental results demonstrate that it is possible...

From Communications of the ACM

Technical Perspective: Making Browser Extensions Secure

Vulnerabilities in browsers and their extensions have become the primary venue through which cyber criminals compromise the security...

Vetting Browser Extensions For Security Vulnerabilities with VEX
From Communications of the ACM

Vetting Browser Extensions For Security Vulnerabilities with VEX

The browser has become the de facto platform for everyday computation and a popular target for attackers of computer systems. Among the many potential attacks that...

From Communications of the ACM

Technical Perspective: Skintroducing the Future

Two critical goals for mobile devices seem intrinsically in conflict. For carrying, the smaller the better. Yet for...

Skinput
From Communications of the ACM

Skinput: Appropriating the Skin as an Interactive Canvas

Skinput is a technology that appropriates the skin as an input surface by analyzing mechanical vibrations that propagate through the body. Specifically, we resolve...

From Communications of the ACM

Technical Perspective: Sketches Get Sketchier

Are data synopses — such as the hash-based sketches discussed by Li and König — still needed for querying massive...

Theory and Applications of <i>b</i>-Bit Minwise Hashing
From Communications of the ACM

Theory and Applications of b-Bit Minwise Hashing

Efficient (approximate) computation of set similarity in very large datasets is a common task with many applications inminwise hashing...

From Communications of the ACM

Technical Perspective: FAWN: A Fast Array of Wimpy Nodes

The emergence of wimpy processors and FLASH met a promising deployment scenario in the field of large-scale data centers. The energy efficiency potential of these...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account