acm-header
Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Toward Reliable Programming For Unreliable Hardware

"Verifying Quantitative Reliability for Programs that Execute on Unreliable Hardware" by Carbin et al. addresses challenges related to a bug, how likely it is to...

Verifying Quantitative Reliability For Programs that Execute on Unreliable Hardware
From Communications of the ACM

Verifying Quantitative Reliability For Programs that Execute on Unreliable Hardware

We present Rely, a programming language that enables developers to reason about the quantitative reliability of an application — namely, the probability that it...

From Communications of the ACM

Technical Perspective: Mesa Takes Data Warehousing to New Heights

Producing reports at the scale of Google Ads, where billions of clicks happen per day, is the challenge addressed by the Mesa system described in "Mesa: A Geo-Replicated...

Mesa
From Communications of the ACM

Mesa: A Geo-Replicated Online Data Warehouse For Google's Advertising System

Mesa is a highly scalable analytic data warehousing system that stores critical measurement data related to Google's Internet advertising business. This paper presents...

From Communications of the ACM

Technical Perspective: The State (and Security) of the Bitcoin Economy

"A Fistful of Bitcoins" examines, in the context of Bitcoin, what we could learn by studying the patterns encoded in a complete record of every single financial...

A Fistful of Bitcoins
From Communications of the ACM

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names

Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique...

From Communications of the ACM

Technical Perspective: Fairness and the Coin Flip

"Secure Multiparty Computations on Bitcoin" introduces an exciting new idea for how to provide fairness: leverage Bitcoin’s existing infrastructure for distributed...

Secure Multiparty Computations on Bitcoin
From Communications of the ACM

Secure Multiparty Computations on Bitcoin

In this work, we propose to use Bitcoin to design fully decentralized protocols that are secure even if no trusted third party is available.

From Communications of the ACM

Technical Perspective: Taming the Name Game

In "Learning to Name Objects," the authors offer a method to determine a basic-level category name for an object in an image.

Learning to Name Objects
From Communications of the ACM

Learning to Name Objects

This paper looks at the problem of predicting category labels that mimic how human observers would name objects.

From Communications of the ACM

Technical Perspective: Catching Lies (and Mistakes) in Offloaded Computation

The system described in "Pinocchio: Nearly Practical Verifiable Computation" refines an important theoretical advance by Gennaro et al. Together, these two works represent...

Pinocchio
From Communications of the ACM

Pinocchio: Nearly Practical Verifiable Computation

We introduce Pinocchio, a built system for efficiently verifying general computations while relying only on cryptographic assumptions.

From Communications of the ACM

Technical Perspective: In-Situ Database Management

"NoDB: Efficient Query Execution on Raw Data Files" investigates extending a DBMS so it can use the file data in situ, without having to load it first.

NoDB
From Communications of the ACM

NoDB: Efficient Query Execution on Raw Data Files

We here present the design and roadmap of a new paradigm in database systems, called NoDB, which do not require data loading while still maintaining the whole feature...

From Communications of the ACM

Technical Perspective: Virtual Reality in Your Living Room

The authors of IllumiRoom investigate what AR/VR could look like in a truly social environment — the living room.

Illumiroom
From Communications of the ACM

Illumiroom: Immersive Experiences Beyond the TV Screen

IllumiRoom is a proof-of-concept system that surrounds a television with projected light, bringing video games, and film experiences out of the TV screen and into...

From Communications of the ACM

Technical Perspective: Programming Multicore Computers

"Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications" advocates an appealing division of labor between a developer...

Can Traditional Programming Bridge the Ninja Performance Gap For Parallel Computing Applications?
From Communications of the ACM

Can Traditional Programming Bridge the Ninja Performance Gap For Parallel Computing Applications?

Current processor trends of integrating more cores with SIMD units have made it more to extract performance from applications. It is believed that traditional...

From Communications of the ACM

Technical Perspective: Getting Consensus For Data Replication

The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that was not written by one of the K most...

Quantifying Eventual Consistency with PBS
From Communications of the ACM

Quantifying Eventual Consistency with PBS

Eventual consistency is often "good enough" for practitioners given its latency and availability benefits. In this work, we explain this phenomenon and demonstrate...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account