The authors of "Distributed Strategies for Computational Sprints" bring the rich theory of allocating scarce resources to the challenge of managing computational...Thomas F. Wenisch From Communications of the ACM | February 2019
We describe a computational sprinting architecture in which many, independent chip multiprocessors share a power supply and sprints are constrained by the chips'...Songchun Fan, Seyed Majid Zahedi, Benjamin C. Lee From Communications of the ACM | February 2019
"Scalable Computation of High-Order Optimization Queries," by Brucato et al., makes a case for marrying the well-established paradigms of constrained optimization...Surajit Chaudhuri From Communications of the ACM | February 2019
We present a complete system that supports package queries, a new query model that extends traditional database queries to handle complex constraints and preferences...Matteo Brucato, Azza Abouzied, Alexandra Meliou From Communications of the ACM | February 2019
If facial performance capture is possible for conventional RGB videos in real time, then believable facial expressions can be transferred effortlessly from one...Hao Li From Communications of the ACM | January 2019
Face2Face is an approach for real-time facial reenactment of a monocular target video sequence. Our goal is to animate the facial expressions of the target video...Justus Thies, Michael Zollhöfer, Marc Stamminger, Christian Theobalt, Matthias Nie Fner From Communications of the ACM | January 2019
"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice," by David Adrian et al., illustrates the importance of taking preprocessing attacks into account...Dan Boneh From Communications of the ACM | January 2019
We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.
David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelin, Paul Zimmermann From Communications of the ACM | January 2019
"Bringing the Web Up to Speed with WebAssembly," by Rossberg et al., gives an overview of the initial design of WebAssembly, a new low-level programming language...Anders Møller From Communications of the ACM | December 2018
WebAssembly is the first mainstream language designed from the start with a formal semantics. It not only demonstrates the feasibility of applying formal techniques...Andreas Rossberg, Ben L. Titzer, Andreas Haas, Derek L. Schuff, Dan Gohman, Luke Wagner, Alon Zakai, J. F. Bastien, Michael Holman From Communications of the ACM | December 2018
In "How to Implement Any Concurrent Data Structure," Calciu et al. show that a concurrent data structure can be built automatically and that its performance is...Tim Harris From Communications of the ACM | December 2018
We propose a method called Node Replication (NR) to implement any concurrent data structure.
Irina Calciu, Siddhartha Sen, Mahesh Balakrishnan, Marcos K. Aguilera From Communications of the ACM | December 2018
"LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study" provides a nice balance in terms of minimizing the burden on users and...Tanzeem Choudhury From Communications of the ACM | November 2018
We explore a new form of wearable systems, called LIBS, that can continuously record biosignals such as brain wave, eye movements, and facial muscle contractions...Anh Nguyen, Raghda Alqurashi, Zohreh Raghebi, Farnoush Banaei-Kashani, Ann C. Halbower, Tam Vu From Communications of the ACM | November 2018
"Where Did I Leave My Keys?" by Checkoway et al. reports on the amazing independent reconstruction of a backdoor, discovered in the firmware of a VPN router commonly...Markus G. Kuhn From Communications of the ACM | November 2018
In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems, which we carried...Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham From Communications of the ACM | November 2018
"Enabling Highly Scalable Remote Memory Access Programming with MPI-3 One Sided" convincingly shows that the potential of MPI one-sided communication can be realized...Marc Snir From Communications of the ACM | October 2018
In this work, we design and develop bufferless protocols that demonstrate how to implement the MPI-3 RMA interface and support scaling to millions of cores.
Robert Gerstenberger, Maciej Besta, Torsten Hoefler From Communications of the ACM | October 2018
"Fundamental Concepts of Reactive Control for Autonomous Drones" introduces the notion of "reactive control" in which an autopilot's control logic is run only intermittently...John Baillieul From Communications of the ACM | October 2018
We conceive a notion of reactive control that allows drones to execute the low-level control logic only upon recognizing the need to, based on the influence of...Luca Mottola, Kamin Whitehouse From Communications of the ACM | October 2018