acm-header
Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Programming Multicore Computers

"Can Traditional Programming Bridge the Ninja Performance Gap for Parallel Computing Applications" advocates an appealing division of labor between a developer...

Can Traditional Programming Bridge the Ninja Performance Gap For Parallel Computing Applications?
From Communications of the ACM

Can Traditional Programming Bridge the Ninja Performance Gap For Parallel Computing Applications?

Current processor trends of integrating more cores with SIMD units have made it more to extract performance from applications. It is believed that traditional...

From Communications of the ACM

Technical Perspective: Image Processing Goes Back to Basics

In "Local Laplacian Filters," Paris et al. made a surprising move. They chose to build a system on the Laplacian pyramid, which is a very simple multiscale representation...

Local Laplacian Filters
From Communications of the ACM

Local Laplacian Filters: Edge-Aware Image Processing with a Laplacian Pyramid

In this paper, we demonstrate that state-of-the-art edge-aware filters can be achieved with standard Laplacian pyramids.

From Communications of the ACM

Technical Perspective: The Intricate Dance of Fabric and Light

For years, graphics programs have simulated fabric as a collection of fibers, requiring tweaks to algorithms for each new fabric. "Building Volumetric Appearance...

Building Volumetric Appearance Models of Fabric Using Micro CT Imaging
From Communications of the ACM

Building Volumetric Appearance Models of Fabric Using Micro CT Imaging

Visualizing and rendering cloth has been an important area of graphics research for decades. This paper proposes a new approach to acquiring volume models, based...

From Communications of the ACM

Technical Perspective: Portraiture in the Age of Big Data

"Moving Portraits" is, in some sense, part of the perpetual quest to capture the perfect portrait. Its principal contribution is in adapting this age-old problem...

Moving Portraits
From Communications of the ACM

Moving Portraits

We present an approach for generating face animations from large image collections of the same person. By optimizing the quantity and order in which photos are...

From Communications of the ACM

Technical Perspective: Getting Consensus For Data Replication

The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that was not written by one of the K most...

Quantifying Eventual Consistency with PBS
From Communications of the ACM

Quantifying Eventual Consistency with PBS

Eventual consistency is often "good enough" for practitioners given its latency and availability benefits. In this work, we explain this phenomenon and demonstrate...

From Communications of the ACM

Technical Perspective: Motion Fields For Interactive Character Animation

The following paper effectively treats motion clips as a set of independent motion vectors. In their ensemble, these high-dimensional motion vectors define a...

Motion Fields For Interactive Character Locomotion
From Communications of the ACM

Motion Fields For Interactive Character Locomotion

We propose a novel representation of motion data and control of virtual characters that gives highly agile responses to user input and allows a natural handling...

From Communications of the ACM

Technical Perspective: The Interplay of Neuroscience and Cryptography

An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is...

Neuroscience Meets Cryptography
From Communications of the ACM

Neuroscience Meets Cryptography: Crypto Primitives Secure Against Rubber Hose Attacks

We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow...

From Communications of the ACM

Technical Perspective: A 'Reasonable' Solution to Deformation Methods

Jacobson et al. construct a deformation method that allows a wide range of handle types (points, line segments, open and closed polygons) and produces deformations...

Bounded Biharmonic Weights For Real-Time Deformation
From Communications of the ACM

Bounded Biharmonic Weights For Real-Time Deformation

Changing an object's shape is a basic operation in computer graphics. Our goal is to make the design and control of deformations simpler by allowing the user to...

From Communications of the ACM

Technical Perspective: Can We Verify Cyber-Physical Systems?

Developing effective symbolic verification technology for mixed discrete-analog models has proved to be a challenging problem. The following paper by Althoff...

Formal Verification of Phase-Locked Loops Using Reachability Analysis and Continuization
From Communications of the ACM

Formal Verification of Phase-Locked Loops Using Reachability Analysis and Continuization

We present a scalable and formal technique to verify locking time and stability for charge-pump phase-locked loops (PLLs).

From Communications of the ACM

Technical Perspective: Progress in Visual Categorization

Our visual system helps us carry out our daily business. Our eyes and brain help us by measuring shapes, trajectories, and distances in world around us, and by...

Visual Object Detection with Deformable Part Models
From Communications of the ACM

Visual Object Detection with Deformable Part Models

We describe a state-of-the-art system for finding objects in cluttered images. Our system is based on deformable models that represent objects using local part...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account