Sign In

Communications of the ACM

Latest Research



The Emergence of Cross Channel Scripting
From Communications of the ACM

The Emergence of Cross Channel Scripting

Lightweight, embedded Web servers are soon about to outnumber regular Internet Web servers. We reveal a series of attacks that target...

From Communications of the ACM

Technical Persepctive: Attacks Target Web Server Logic and Prey on XCS Weaknesses

A system is secure only if the entire system is secure. While this may sound obvious, achieving total security throughout a system is rarely trivial when you consider...

Toward Robotic Cars
From Communications of the ACM

Toward Robotic Cars

Recent challenges organized by DARPA have induced a significant advance in technology for autopilots for cars; similar to those already used in aircraft and marine...

From Communications of the ACM

Technical Perspective: New Bar Set For Intelligent Vehicles

Sebastian Thrun gives us a glimpse into the design and implementation of two winning DARPA grand challenge entries...

Using the Forest to See the Trees
From Communications of the ACM

Using the Forest to See the Trees: Exploiting Context For Visual Object Detection and Localization

Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search...

From Communications of the ACM

Technical Perspective: Seeing the Trees, the Forest, and Much More

Bristling with cameras, microphones, and other sensors, today's portable phones are nevertheless essentially deaf and...

Spamalytics: An Empirical Analysis of Spam Marketing Conversion
From Communications of the ACM

Spamalytics: An Empirical Analysis of Spam Marketing Conversion

We all receive spam advertisements, but few of us have encountered a person who admits to following through on an offer and making a purchase. And yet, the relentlessness...

From Communications of the ACM

Technical Perspective: They Do Click, Don't They?

You never click on advertisements received in spam or in phishing messages, do you? Nobody does. So, if that is...

Does Distributed Development Affect Software Quality?
From Communications of the ACM

Does Distributed Development Affect Software Quality?: An Empirical Case Study of Windows Vista

Existing literature on distributed development in software engineering and other fields discusses various challenges,...

From Communications of the ACM

Technical Perspective: Maintaining Quality in the Face of Distributed Development

It was a problem that should not have taken three weeks to solve. The documentation claimed that if a function was called...

Apprenticeship Learning For Helicopter Control
From Communications of the ACM

Apprenticeship Learning For Helicopter Control

Autonomous helicopter flight is widely regarded to be a highly challenging control problem. As helicopters are highly unstable and exhibit complicated dynamical...

From Communications of the ACM

Technical Perspective: The Ultimate Pilot Program

In one scene from The Matrix, two leaders of the human resistance are trapped on the roof of a skyscraper. The only means of escape is by helicopter, which neither...

Securing Frame Communication in Browsers
From Communications of the ACM

Securing Frame Communication in Browsers

Many Web sites embed third-party content in frames, relying on the browser's security policy to protect against malicious content. However, frames provide insufficient...

From Communications of the ACM

Technical Perspective: Reframing Security For the Web

The web has brought exciting new functionality while simultaneously requiring new mechanisms to make it secure. We've...

Lest We Remember
From Communications of the ACM

Lest We Remember: Cold-Boot Attacks on Encryption Keys

DRAM retains its contents for several seconds after power is lost. Although DRAM becomes less reliable when it is not refreshed, it is not immediately erased, and...

From Communications of the ACM

Technical Perspective: A Chilly Sense of Security

Many systems rely on keeping a master key secret. But technological progress can undermine old assumptions.

From Communications of the ACM

Technical Perspective: Computational Photography on Large Collections of Images

This paper wil strike a familiar chord with anyone who has ever taken a picture. The problem is easy to understand— replacing unwanted parts of a photograph.

Scene Completion Using Millions of Photographs
From Communications of the ACM

Scene Completion Using Millions of Photographs

What can you do with a million images? In this paper, we present a new image completion algorithm powered by a huge database of photographs gathered from the Web...

From Communications of the ACM

Technical Perspective: Computer Science Takes on Molecular Dynamics

The following paper by researcher David Shaw and colleagues describes their Anton molecular dynamics engine....

From Communications of the ACM

Anton, A Special-Purpose Machine For Molecular Dynamics Simulation

The ability to perform long, accurate molecular dynamics (MD) simulations involving proteins and other biological macro-molecules could in principle provide answers...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account