acm-header
Sign In

Communications of the ACM

Latest Research



Spamalytics: An Empirical Analysis of Spam Marketing Conversion
From Communications of the ACM

Spamalytics: An Empirical Analysis of Spam Marketing Conversion

We all receive spam advertisements, but few of us have encountered a person who admits to following through on an offer and making a purchase. And yet, the relentlessness...

From Communications of the ACM

Technical Perspective: They Do Click, Don't They?

You never click on advertisements received in spam or in phishing messages, do you? Nobody does. So, if that is...

Statistical Analysis of Circuit Timing Using Majorization
From Communications of the ACM

Statistical Analysis of Circuit Timing Using Majorization

Future miniaturization of silicon transistors following Moore's Law may be in jeopardy as it becomes harder to precisely define the behavior and shape of nanoscale...

From Communications of the ACM

Technical Perspective: Where the Chips May Fall

The traditional approach to circuit design has been to build chips that work correctly at extreme-case process...

Apprenticeship Learning For Helicopter Control
From Communications of the ACM

Apprenticeship Learning For Helicopter Control

Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical...

From Communications of the ACM

Technical Perspective: The Ultimate Pilot Program

In one scene from The Matrix, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither...

Two Hardware-Based Approaches For Deterministic Multiprocessor Replay
From Communications of the ACM

Two Hardware-Based Approaches For Deterministic Multiprocessor Replay

Modern computer systems are inherently nondeterministic due to a variety of events that occur during an execution. The lack of repeatability that arises from this...

From Communications of the ACM

Technical Perspective: Software and Hardware Support For Deterministic Replay of Parallel Programs


Securing Frame Communication in Browsers
From Communications of the ACM

Securing Frame Communication in Browsers

Many Web sites embed third-party content in frames, relying on the browser's security policy to protect against malicious content. However, frames provide insufficient...

From Communications of the ACM

Technical Perspective: Reframing Security For the Web

The web has brought exciting new functionality while simultaneously requiring new mechanisms to make it secure. We've...

Lest We Remember
From Communications of the ACM

Lest We Remember: Cold-Boot Attacks on Encryption Keys

DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and...

From Communications of the ACM

Technical Perspective: A Chilly Sense of Security

Many systems rely on keeping a master key secret. But technological progress can undermine old assumptions.

Integrating Nand Flash Devices Onto Servers
From Communications of the ACM

Integrating Nand Flash Devices Onto Servers

In this paper, we examine the use of Flash storage in the server domain. Wear-out has the potential to limit the use of Flash in this domain. To seriously consider...

From Communications of the ACM

Technical Perspective: Integrating Flash Devices

Flash memory nowadays seems to be in every discussion about system architecture. Sure enough, flash memory boasts...

From Communications of the ACM

Technical Perspective: One Size Fits All: An Idea Whose Time Has Come and Gone

Beginning in the early to mid-1980s the relational model of data has dominated the DBMS landscape. Moreover, descendents of...

Breaking the Memory Wall in MonetDB
From Communications of the ACM

Breaking the Memory Wall in MonetDB

In this paper, we report how research around the MonetDB database system has led to a redesign of database architecture in order to take advantage of modern hardware...

Polaris
From Communications of the ACM

Polaris: A System For Query, Analysis, and Visualization of Multidimensional Databases

In this paper, we address these demands by presenting the Polaris formalism, a visual query language for precisely describing a wide range of table-based graphical...

From Communications of the ACM

Technical Perspective: Safeguarding Online Information Against Failures and Attacks

Users need storage that is highly reliable (it is not lost) and highly available (accessible when needed). Guaranteeing...

Technical Perspective: The Polaris Tableau System
From Communications of the ACM

Technical Perspective: The Polaris Tableau System

Jim Gray nominated the Polaris paper for the Research Highlights section and wrote the first draft of this Technical Perspective in November 2006. David Patterson...

Zyzzyva: Speculative Byzantine Fault Tolerance
From Communications of the ACM

Zyzzyva: Speculative Byzantine Fault Tolerance

A longstanding vision in distributed systems is to build reliable systems from unreliable components. An enticing formulation of this vision is Byzantine fault-tolerant...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account