acm-header
Sign In

Communications of the ACM

Latest Research



Toward Robotic Cars
From Communications of the ACM

Toward Robotic Cars

Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine...

From Communications of the ACM

Technical Perspective: New Bar Set For Intelligent Vehicles

Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries...

Collaborative Filtering with Temporal Dynamics
From Communications of the ACM

Collaborative Filtering with Temporal Dynamics

Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer...

From Communications of the ACM

Creativity Helps Influence Prediction Precision

The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of...

Using the Forest to See the Trees
From Communications of the ACM

Using the Forest to See the Trees: Exploiting Context For Visual Object Detection and Localization

Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search...

From Communications of the ACM

Technical Perspective: Seeing the Trees, the Forest, and Much More

Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and...

Computing Arbitrary Functions of Encrypted Data
From Communications of the ACM

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic"...

From Communications of the ACM

Technical Perspective: A First Glimpse of Cryptography's Holy Grail

We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect...

Post-Silicon Bug Localization For Processors Using IFRA
From Communications of the ACM

Post-Silicon Bug Localization For Processors Using IFRA

IFRA overcomes major challenges associated with a very expensive step in post-silicon validation of processors — pinpointing a bug location and the instruction...

From Communications of the ACM

Technical Perspective: Want to Be a Bug Buster?

Microprocessor performance has increased exponentially. These chips with ever increasing complexity are not always fully functional on...

Structural Characterizations of Schema-Mapping Languages
From Communications of the ACM

Structural Characterizations of Schema-Mapping Languages

Information integration is a key challenge faced by all major organizations, business and governmental ones alike. Two research...

From Communications of the ACM

Technical Perspective: Schema Mappings: Rules For Mixing Data

When you search for products on Amazon.com, you are seeing results from thousands of vendor databases that were developed before Amazon existed. Did you ever wonder...

ThinSight: A Thin Form-Factor Interactive Surface Technology
From Communications of the ACM

ThinSight: A Thin Form-Factor Interactive Surface Technology

ThinSight is a thin form-factor interactive surface technology based on optical sensors embedded inside a regular LCD. These augment the display with the ability...

From Communications of the ACM

Technical Perspective: A Graphical Sense of Touch

One of the major innovations in computing was the invention of the graphical user interface at MIT, SRI, and Xerox PARC. The...

Predicting Structured Objects with Support Vector Machines
From Communications of the ACM

Predicting Structured Objects with Support Vector Machines

Machine Learning today offers a broad repertoire of methods for classification and regression. But what if we need to predict complex objects like trees, orderings...

From Communications of the ACM

Technical Perspective: Machine Learning For Complex Predictions

Interest in machine learning can be traced back to the early days of computer science. Alan Turing himself conjectured that...

From Communications of the ACM

Declarative Networking

Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to...

From Communications of the ACM

Technical Perspective: Narrowing the Semantic Gap in Distributed Programming

In science, significant advances are often made when researchers from different communities join forces.

Finding the Frequent Items in Streams of Data
From Communications of the ACM

Finding the Frequent Items in Streams of Data

Many data generation processes can be modeled as data streams. While this data may be archived and indexed within a data warehouse, it is also important to process...

From Communications of the ACM

Technical Perspective: Data Stream Processing - When You Only Get One Look

The database and systems communities have made great progress in developing database systems that allow us to store and query huge amounts of data. Real-time analysis...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account