Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: The State (and Security) of the Bitcoin Economy

"A Fistful of Bitcoins" examines, in the context of Bitcoin, what we could learn by studying the patterns encoded in a complete record of every single financial...

A Fistful of Bitcoins
From Communications of the ACM

A Fistful of Bitcoins: Characterizing Payments among Men with No Names

Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique...

From Communications of the ACM

Technical Perspective: Fairness and the Coin Flip

"Secure Multiparty Computations on Bitcoin" introduces an exciting new idea for how to provide fairness: leverage Bitcoin’s existing infrastructure for distributed...

Secure Multiparty Computations on Bitcoin
From Communications of the ACM

Secure Multiparty Computations on Bitcoin

In this work, we propose to use Bitcoin to design fully decentralized protocols that are secure even if no trusted third party is available.

From Communications of the ACM

Technical Perspective: Taming the Name Game

In "Learning to Name Objects," the authors offer a method to determine a basic-level category name for an object in an image.

Learning to Name Objects
From Communications of the ACM

Learning to Name Objects

This paper looks at the problem of predicting category labels that mimic how human observers would name objects.

From Communications of the ACM

Technical Perspective: STACKing Up Undefined Behaviors

In "A Differential Approach to Undefined Behavior Detection," Wang et al. hypothesize that any time a compiler is able to delete code by using reasoning based on...

A Differential Approach to Undefined Behavior Detection
From Communications of the ACM

A Differential Approach to Undefined Behavior Detection

This paper studies undefined behavior arising in systems programming languages such as C/C++. We introduce a new static checker called STACK that precisely identifies...

From Communications of the ACM

Technical Perspective: Program Synthesis Using Stochastic Techniques

The authors of "Stochastic Program Optimization" have developed a stochastic search technique and applied it to program optimization.

Stochastic Program Optimization
From Communications of the ACM

Stochastic Program Optimization

By encoding constraints of transformation correctness as terms in a cost function, and using a Markov Chain Monte Carlo sampler to explore the space of all possible...

From Communications of the ACM

Technical Perspective: Catching Lies (and Mistakes) in Offloaded Computation

The system described in "Pinocchio: Nearly Practical Verifiable Computation" refines an important theoretical advance by Gennaro et al. Together, these two works represent...

Pinocchio
From Communications of the ACM

Pinocchio: Nearly Practical Verifiable Computation

To instill greater confidence in computations outsourced to the cloud, we introduce Pinocchio, a built system for efficiently verifying general computations while...

From Communications of the ACM

Technical Perspective: Enlisting the Power of the Crowd

An important contribution of "Answering Enumeration Queries with the Crowd" is the observation that by using the crowd for the collection of new data, we are departing...

Answering Enumeration Queries with the Crowd
From Communications of the ACM

Answering Enumeration Queries with the Crowd

Hybrid human/computer database systems promise to greatly expand the usefulness of query processing by incorporating the crowd. Such systems raise many implementation...

From Communications of the ACM

Technical Perspective: High-Performance Virtualization: Are We Done?

"Bare-Metal Performance for Virtual Machines with Exitless Interrupts" shows how to enable a virtual machine to attain "bare metal" performance from high-speed...

Bare-Metal Performance for Virtual Machines with Exitless Interrupts
From Communications of the ACM

Bare-Metal Performance for Virtual Machines with Exitless Interrupts

We present ExitLess Interrupts (ELI), a software-only approach for handling interrupts within guest virtual machines directly and securely.

From Communications of the ACM

Technical Perspective: In-Situ Database Management

"NoDB: Efficient Query Execution on Raw Data Files" investigates extending a DBMS so it can use the file data in situ, without having to load it first.

NoDB
From Communications of the ACM

NoDB: Efficient Query Execution on Raw Data Files

We here present the design and roadmap of a new paradigm in database systems, called NoDB, which do not require data loading while still maintaining the whole feature...

From Communications of the ACM

Technical Perspective: Paris Beyond Frommer's

Can a computer automatically discover and tell us what makes Paris look so much like Paris? "What Makes Paris Look Like Paris?" offers a creative, inspiring new...

What Makes Paris Look Like Paris?
From Communications of the ACM

What Makes Paris Look Like Paris?

Given a large repository of geo-tagged imagery, we seek to automatically find visual elements, for example windows, balconies, and street signs, that are most distinctive...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo