For a semiconductor circuit with billions of transistors, finding desired locations of circuit components is a challenging task that substantially impacts circuit...Yao-Wen Chang From Communications of the ACM | June 2013
VLSI placement optimizes locations of circuit components so as to reduce interconnect. We propose an algorithm for large-scale placement that outperforms prior...Myung-Chul Kim, Dong-Jin Lee, Igor L. Markov From Communications of the ACM | June 2013
With video delivery, it appears that once again "the Internet changes everything." In this changed environment, what measures of quality are most relevant, and...David Oran From Communications of the ACM | March 2013
As Internet-based videos become mainstream, user expectation for high quality is constantly increasing. In this context, it is crucial for content providers to...Florin Dobrian, Asad Awan, Dilip Joseph, Aditya Ganjam, Jibin Zhan, Vyas Sekar, Ion Stoica, Hui Zhang From Communications of the ACM | March 2013
The microprocessor chip R&D community has been well aware of the so-called "power wall" challenge for over a decade. The following work by Esmaeilzadeh et al. is...Pradip Bose From Communications of the ACM | February 2013
Tthe microprocessor industry has shifted to multicore scaling as its principal strategy for continuing performance growth. However, while transistor count increases...Hadi Esmaeilzadeh, Emily Blem, Renée St. Amant, Karthikeyan Sankaralingam, Doug Burger From Communications of the ACM | February 2013
Photographs capture the moment; paintings convey perception, impression, and feeling; illustrations tell stories. Computer graphics aims to enrich all these artistic...Doug DeCarlo, Matthew Stone From Communications of the ACM | January 2013
How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for...Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala From Communications of the ACM | January 2013
This lifting of data structure thinking to the relational level has long inspired computer scientists. In "An Introduction to Data Representation Synthesis," the...Yannis Smaragdakis From Communications of the ACM | December 2012
We consider the problem of specifying combinations of data structures with complex sharing in a manner that is declarative and results in provably correct code.Peter Hawkins, Martin Rinard, Alex Aiken, Mooly Sagiv, Kathleen Fisher From Communications of the ACM | December 2012
Buying residential broadband services seems relatively simple: pick among a small number of plans, and then compare similar plans by price. Unfortunately, reality...Henning Schulzinne From Communications of the ACM | November 2012
We present the results from the first study of Internet access link performance measured directly from home routers. Our findings provide a snapshot of access network...Srikanth Sundaresan, Walter de Donato, Nick Feamster, Renata Teixeira, Sam Crawford, Antonio Pescapè From Communications of the ACM | November 2012
There is some risk in trusting the cloud providers with sensitive data. Why not encrypt the data stored in cloud services?
Dan Suciu From Communications of the ACM | September 2012
An ideal solution to satisfying the dual goals of protecting data confidentiality and running computations is to enable a server to compute over encrypted data,...Raluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, Hari Balakrishnan From Communications of the ACM | September 2012
Like other IT fields, computer architects initially reported incomparable results. We quickly saw the folly of this approach. We then went through a sequence...David Patterson From Communications of the ACM | July 2012
The past 10 years have delivered two significant revolutions. Microprocessor design has been transformed — leading to multicore processors. And an entirely new...Hadi Esmaeilzadeh, Ting Cao, Xi Yang, Stephen M. Blackburn, Kathryn S. McKinley From Communications of the ACM | July 2012
Suppose that one observes an incomplete subset of entries selected from a low-rank matrix. When is it possible to complete the matrix and recover the entries that...Emmanuel Candès, Benjamin Recht From Communications of the ACM | June 2012
The problem of estimating or reconstructing an unknown structured object from incomplete, partial, noisy measurements is a fundamental one in scientific and technological...Pablo A. Parrilo From Communications of the ACM | June 2012
With Aardvark, a social search engine, users ask a question, either by IM, e-mail, Web input, text message, or voice. Aardvark then routes the question to the person...Damon Horowitz, Sepandar D. Kamvar From Communications of the ACM | April 2012
It is difficult to remember what people had to do to find the answer to a question before the Web. One option might be to call a friend who might know the answer...Ed H. Chi From Communications of the ACM | April 2012