acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Exploring Cognitive Bias 'In the Wild'
From Communications of the ACM

Technical Perspective: Exploring Cognitive Bias 'In the Wild'

The authors of "Cognitive Biases in Software Development" rightly highlight the need for situated studies that examine cognitive bias 'in the wild' during software...

Cognitive Biases in Software Development
From Communications of the ACM

Cognitive Biases in Software Development

We conducted a two-part field study to examine the extent to which cognitive biases occur, the consequences of these biases on developer behavior, and the practices...

Technical Perspective: Personalized Recommendation of PoIs to People with Autism
From Communications of the ACM

Technical Perspective: Personalized Recommendation of PoIs to People with Autism

"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs
From Communications of the ACM

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs: An Inclusive Recommender System

We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...

Technical Perspective: Liquid Testing Using Built-in Phone Sensors
From Communications of the ACM

Technical Perspective: Liquid Testing Using Built-in Phone Sensors

"Liquid Testing with Your Smartphone," by Shichao Yue and Dina Katabi, proposes a novel technique for determining the surface tension of a liquid by leveraging...

Liquid Testing with Your Smartphone
From Communications of the ACM

Liquid Testing with Your Smartphone

We show a simple and accurate approach to measuring surface tension that's available to anyone with a smartphone.

Technical Perspective: eBP Rides the Third Wave of Mobile Health
From Communications of the ACM

Technical Perspective: eBP Rides the Third Wave of Mobile Health

The automated blood pressure wearable system described in "eBP," by Nam Bui et al., is a sterling example of the third wave of mobile health tech to fill the preventative...

eBP
From Communications of the ACM

eBP: An Ear-Worn Device for Frequent and Comfortable Blood Pressure Monitoring

We developed eBP to measure blood pressure from inside a user's ear aiming to minimize the measurement's impact on normal activities while maximizing its comfort...

From Communications of the ACM

Technical Perspective: Is There a Geek Gene?

"Evidence that Computer Science Grades Are Not Bimodal" uses empirical methods to determine if belief in innate differences may explain why CS teachers see a bimodality...

Evidence That Computer Science Grades Are Not Bimodal
From Communications of the ACM

Evidence That Computer Science Grades Are Not Bimodal

There is a common belief that grades in computer science courses are bimodal. We devised a psychology experiment to understand why CS educators hold this belief...

From Communications of the ACM

Technical Perspective: From Virtual Worlds to Digital Fabrication

The authors of "OpenFab" propose to revisit the processing pipeline that turns a 3D model into machine instructions in light of the solutions developed in computer...

OpenFab
From Communications of the ACM

OpenFab: A Programmable Pipeline for Multimaterial Fabrication

We present OpenFab, a programmable pipeline for synthesis of multimaterial 3D printed objects that is inspired by RenderMan and modern GPU pipelines.

From Communications of the ACM

Technical Perspective: Attacking Cryptographic Key Exchange with Precomputation

"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice," by David Adrian et al., illustrates the importance of taking preprocessing attacks into account...

Imperfect Forward Secrecy
From Communications of the ACM

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.

From Communications of the ACM

Technical Perspective: Making Sleep Tracking More User Friendly

"LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study" provides a nice balance in terms of minimizing the burden on users and...

LIBS
From Communications of the ACM

LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study

We explore a new form of wearable systems, called LIBS, that can continuously record biosignals such as brain wave, eye movements, and facial muscle contractions...

From Communications of the ACM

Technical Perspective: Backdoor Engineering

"Where Did I Leave My Keys?" by Checkoway et al. reports on the amazing independent reconstruction of a backdoor, discovered in the firmware of a VPN router commonly...

Where Did I Leave My Keys?
From Communications of the ACM

Where Did I Leave My Keys?: Lessons from the Juniper Dual EC Incident

In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems, which we carried...

From Communications of the ACM

Technical Perspective: The Rewards of Selfish Mining

"Majority Is Not Enough: Bitcoin Mining Is Vulnerable," by Eyal and Sirer, questions the 2009 Bitcoin white paper's implicit assumption of perfect information—that...

Majority Is Not Enough
From Communications of the ACM

Majority Is Not Enough: Bitcoin Mining Is Vulnerable

We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account