acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Personalized Recommendation of PoIs to People with Autism
From Communications of the ACM

Technical Perspective: Personalized Recommendation of PoIs to People with Autism

"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs
From Communications of the ACM

Supporting People with Autism Spectrum Disorders in the Exploration of PoIs: An Inclusive Recommender System

We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...

Technical Perspective: On Proofs, Entanglement, and Games
From Communications of the ACM

Technical Perspective: On Proofs, Entanglement, and Games

"MIP* = RE," by Zhengfeng Ji et al., studies quantum interactive proofs.

MIP* = RE
From Communications of the ACM

MIP* = RE

In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.

Technical Perspective: Does Your Experiment Smell?
From Communications of the ACM

Technical Perspective: Does Your Experiment Smell?

"PlanAlyzer," by Emma Tosch et al., details PlanAlyzer software, the first tool to statically check the validity of online experiments.

PlanAlyzer
From Communications of the ACM

PlanAlyzer: Assessing Threats to the Validity of Online Experiments

We present the first approach for checking the internal validity of online experiments statically, that is, from code alone.

Technical Perspective: Tracking Pandemic-Driven Internet Traffic
From Communications of the ACM

Technical Perspective: Tracking Pandemic-Driven Internet Traffic

"A Year in Lockdown," by Anja Feldmann, et al., offers a detailed look at how Internet traffic changed during the COVID-19 pandemic.

A Year in Lockdown
From Communications of the ACM

A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic

We review the impact of the first year of the COVID-19 pandemic on Internet traffic in order to analyze its performance.

From Communications of the ACM

Technical Perspective: Programming Microfluidics to Execute Biological Protocols

The approach taken in "BioScript," by Jason Ott, et al., is an example of how programming languages can help develop executable protocols that are conforming, understandable...

BioScript
From Communications of the ACM

BioScript: Programming Safe Chemistry on Laboratories-on-a-Chip

This paper introduces BioScript, a domain-specific language for programmable biochemistry that executes on emerging microfluidic platforms.

From Communications of the ACM

Technical Perspective: Deciphering Errors to Reduce the Cost of Quantum Computation

In "Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes," by Omar Fawzi, et al., the authors produce an algorithm that can rapidly deduce the...

Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes
From Communications of the ACM

Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes

In this paper, we study the asymptotic scaling of the space overhead needed for fault-tolerant quantum computation.

From Communications of the ACM

Technical Perspective: BLeak: Semantics-Aware Leak Detection in the Web

What is the right leak oracle that can precisely capture the behavior of leaks in Web applications? "BLeak: Automatically Debugging Memory Leaks in Web Applications...

BLeak
From Communications of the ACM

BLeak: Automatically Debugging Memory Leaks in Web Applications

This paper introduces BLeak (Browser Leak debugger), the first system for automatically debugging memory leaks in web applications.

From Communications of the ACM

Technical Perspective: Analyzing Smart Contracts with MadMax

"MadMax: Analyzing the Out-of-Gas World of Smart Contracts," by Neville Grech et al., effectively discovers a new smart contract vulnerability, and proposes a detection...

MadMax
From Communications of the ACM

MadMax: Analyzing the Out-of-Gas World of Smart Contracts

We identify gas-focused vulnerabilities and present MadMax: a static program analysis technique that automatically detects gas-focused vulnerabilities with very...

From Communications of the ACM

Technical Perspective: ASIC Clouds: Specializing the Datacenter

Can we build purpose-built, warehouse-scale datacenters customized for large-scale arrays of ASIC accelerators or, to use a term coined in the paper by Michael...

ASIC Clouds
From Communications of the ACM

ASIC Clouds: Specializing the Datacenter for Planet-Scale Applications

This paper distills lessons from Bitcoin ASIC Clouds and applies them to other large scale workloads, showing superior TCO (total cost of ownership) versus CPU...

From Communications of the ACM

Technical Perspective: A Perspective on Pivot Tracing

Instead of handing trace records off to a collector for long-term storage and future processing, the system described in "Pivot Tracing: Dynamic Causal Monitoring...

Pivot Tracing
From Communications of the ACM

Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems

This paper presents Pivot Tracing, a monitoring framework for distributed systems, which addresses the limitations of today's monitoring and diagnosis tools by...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account