"Toward Systematic Architectural Design of Near-Term Trapped Ion Quantum Computers" presents a study on scaling trapped-ion quantum architectures, and challenges...Frederic T. Chong From Communications of the ACM | March 2022
Toward realizing QCCD-based trapped ion systems with 50-100 qubits, we perform an extensive application-driven architectural study evaluating the key design choices...Prakash Murali, Dripto M. Debroy, Kenneth R. Brown, Margaret Martonosi From Communications of the ACM | March 2022
"Worst-Case Topological Entropy and Minimal Data Rate for State Estimation of Switched Linear Systems" gives a method for computing the topological entropy of a...Sayan Mitra From Communications of the ACM | February 2022
In this paper, we study the problem of estimating the state of a switched linear system when the observation of the system is subject to communication constraints...Guillaume O. Berger, Raphael M. Jungers From Communications of the ACM | February 2022
"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...Robin Burke From Communications of the ACM | February 2022
We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...Noemi Mauro, Liliana Ardissono, Federica Cena From Communications of the ACM | February 2022
"Eyelid Gestures for People with Motor Impairments," by Mingming Fan et al., addresses the accessibility of mobile devices to people with motor impairments.
Tiago Guerreiro From Communications of the ACM | January 2022
We present an algorithm to detect nine eyelid gestures on smartphones in real time and evaluate it with 12 able-bodied people and four people with severe motor...Mingming Fan, Zhen Li, Franklin Mingzhe Li From Communications of the ACM | January 2022
Neural volume rendering exploded onto the scene in 2020, triggered by "NeRF," the impressive paper by Ben Mildenhall et al., on Neural Radiance Fields.
Frank Dellaert From Communications of the ACM | January 2022
We present a method that achieves state-of-the-art results for synthesizing novel views of complex scenes by optimizing an underlying continuous volumetric scene...Ben Mildenhall, Pratul P. Srinivasan, Matthew Tancik, Jonathan T. Barron, Ravi Ramamoorthi, Ren Ng From Communications of the ACM | January 2022
"Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data," by Jiyong Yu et al., might be a beginning of an end to speculation...Timothy Sherwood From Communications of the ACM | December 2021
This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism, to block speculative execution attacks.
Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher From Communications of the ACM | December 2021
"Software-Defined Cooking Using a Microwave Oven," by Haojian Jin et al., introduces a feedback mechanism to microwave heating through a technique the authors call...Fadel Adib From Communications of the ACM | December 2021
We present software-defined cooking (SDC), a low-cost closed-loop microwave oven system that aims to heat food in a software-defined thermal trajectory.
Haojian Jin, Jingxian Wang, Swarun Kumar, Jason Hong From Communications of the ACM | December 2021
In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.
Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, Henry Yuen From Communications of the ACM | November 2021
"Multi-Itinerary Optimization as Cloud Service," by Alexandru Cristian et al., makes accessible an end-to-end cloud service that produces traffic-aware, real-time...Pascal Van Hentenryck From Communications of the ACM | November 2021
We describe multi-itinerary optimization, a novel Bing Maps service that automates the process of building itineraries for multiple agents while optimizing their...Alexandru Cristian, Luke Marshall, Mihai Negrea, Flavius Stoichescu, Peiwei Cao, Ishai Menache From Communications of the ACM | November 2021
"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts...Ahmad-Reza Sadeghi From Communications of the ACM | October 2021
We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available...Jihoon Lee, Gyuhong Lee, Jinsung Lee, Youngbin Im, Max Hollingsworth, Eric Wustrow, Dirk Grunwald, Sangtae Ha From Communications of the ACM | October 2021