In the opening of Sibelius' Violin Concerto, a soloist plays delicately. The orchestra responds in kind. As...Juan Bello, Yann LeCun, Robert Rowe From Communications of the ACM | March 2011
While a large body of work exists on DRAM in lab conditions, little has been reported on real DRAM failures in large production clusters. In this paper, we analyze...Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber From Communications of the ACM | February 2011
In order to advance the field, knowledge of the types of memory errors at the system level, their frequencies, and conditions that exacerbate or are unrelated to...Norman P. Jouppi From Communications of the ACM | February 2011
Privacy Integrated Queries (PINQ) is an extensible data analysis platform designed to provide unconditional privacy guarantees for the records of the underlying...Frank McSherry From Communications of the ACM | September 2010
Government agencies worldwide release statistical information about population, education, and health, crime...Johannes Gehrke From Communications of the ACM | September 2010
Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...Hristo Bojinov, Elie Bursztein, Dan Boneh From Communications of the ACM | August 2010
A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...Helen Wang From Communications of the ACM | August 2010
Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine...Sebastian Thrun From Communications of the ACM | April 2010
Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries...Leslie Pack Kaelbling From Communications of the ACM | April 2010
Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer...Yehuda Koren From Communications of the ACM | April 2010
The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of...Padhraic Smyth, Charles Elkan From Communications of the ACM | April 2010
Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search...A. Torralba, K. P. Murphy, W. T. Freeman From Communications of the ACM | March 2010
Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and...Pietro Perona From Communications of the ACM | March 2010
Information integration is a key challenge faced by all major organizations, business and governmental ones alike. Two research...Balder ten Cate, Phokion G. Kolaitis From Communications of the ACM | January 2010
When you search for products on Amazon.com, you are seeing results from thousands of vendor databases that were developed before Amazon existed. Did you ever wonder...Alon Halevy From Communications of the ACM | January 2010
ThinSight is a thin form-factor interactive surface technology based on optical sensors embedded inside a regular LCD. These augment the display with the ability...Shahram Izadi, Steve Hodges, Alex Butler, Darren West, Alban Rrustemi, Mike Molloy, William Buxton From Communications of the ACM | December 2009
One of the major innovations in computing was the invention of the graphical user interface at MIT, SRI, and Xerox PARC. The...Pat Hanrahan From Communications of the ACM | December 2009
Machine Learning today offers a broad repertoire of methods for classification and regression. But what if we need to predict complex objects like trees, orderings...Thorsten Joachims, Thomas Hofmann, Yisong Yue, Chun-Nam Yu From Communications of the ACM | November 2009
Interest in machine learning can be traced back to the early days of computer science. Alan Turing himself conjectured that...John Shawe-Taylor From Communications of the ACM | November 2009
Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to...Boon Thau Loo, Tyson Condie, Minos Garofalakis, David E. Gay, Joseph M. Hellerstein, Petros Maniatis, Raghu Ramakrishnan, Timothy Roscoe, Ion Stoica From Communications of the ACM | November 2009