acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: A Recipe for Protecting Against Speculation Attacks
From Communications of the ACM

Technical Perspective: A Recipe for Protecting Against Speculation Attacks

"Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data," by Jiyong Yu et al., might be a beginning of an end to speculation...

Speculative Taint Tracking (STT)
From Communications of the ACM

Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data

This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism, to block speculative execution attacks.

Technical Perspective: Cooking Up a Solution to Microwave Heat Distribution
From Communications of the ACM

Technical Perspective: Cooking Up a Solution to Microwave Heat Distribution

"Software-Defined Cooking Using a Microwave Oven," by Haojian Jin et al., introduces a feedback mechanism to microwave heating through a technique the authors call...

Software-Defined Cooking Using a Microwave Oven
From Communications of the ACM

Software-Defined Cooking Using a Microwave Oven

We present software-defined cooking (SDC), a low-cost closed-loop microwave oven system that aims to heat food in a software-defined thermal trajectory.

Technical Perspective: On Proofs, Entanglement, and Games
From Communications of the ACM

Technical Perspective: On Proofs, Entanglement, and Games

"MIP* = RE," by Zhengfeng Ji et al., studies quantum interactive proofs.

MIP* = RE
From Communications of the ACM

MIP* = RE

In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.

Technical Perspective: Finding the Sweet Spot Amid Accuracy and Performance
From Communications of the ACM

Technical Perspective: Finding the Sweet Spot Amid Accuracy and Performance

"Multi-Itinerary Optimization as Cloud Service," by Alexandru Cristian et al., makes accessible an end-to-end cloud service that produces traffic-aware, real-time...

Multi-Itinerary Optimization as Cloud Service
From Communications of the ACM

Multi-Itinerary Optimization as Cloud Service

We describe multi-itinerary optimization, a novel Bing Maps service that automates the process of building itineraries for multiple agents while optimizing their...

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design
From Communications of the ACM

Technical Perspective: The Real-World Dilemma of Security and Privacy by Design

"Securing the Wireless Emergency Alerts System," by Jihoon Lee et al., investigates real-world attacks on the current implementation of Wireless Emergency Alerts...

Securing the Wireless Emergency Alerts System
From Communications of the ACM

Securing the Wireless Emergency Alerts System

We investigate the Wireless Emergency Alert system and develop and demonstrate the first practical spoofing attack on Presidential Alerts, using commercially available...

Technical Perspective: Liquid Testing Using Built-in Phone Sensors
From Communications of the ACM

Technical Perspective: Liquid Testing Using Built-in Phone Sensors

"Liquid Testing with Your Smartphone," by Shichao Yue and Dina Katabi, proposes a novel technique for determining the surface tension of a liquid by leveraging...

Liquid Testing with Your Smartphone
From Communications of the ACM

Liquid Testing with Your Smartphone

We show a simple and accurate approach to measuring surface tension that's available to anyone with a smartphone.

Technical Perspective: Does Your Experiment Smell?
From Communications of the ACM

Technical Perspective: Does Your Experiment Smell?

"PlanAlyzer," by Emma Tosch et al., details PlanAlyzer software, the first tool to statically check the validity of online experiments.

PlanAlyzer
From Communications of the ACM

PlanAlyzer: Assessing Threats to the Validity of Online Experiments

We present the first approach for checking the internal validity of online experiments statically, that is, from code alone.

Technical Perspective: The Importance of WINOGRANDE
From Communications of the ACM

Technical Perspective: The Importance of WINOGRANDE

"WINOGRANDE" explores new methods of dataset development and adversarial filtering, expressly designed to prevent AI systems from making claims of smashing through...

WinoGrande
From Communications of the ACM

WinoGrande: An Adversarial Winograd Schema Challenge at Scale

We introduce WinoGrande, a large-scale dataset of 44k problems, inspired by the original Winograd Schema Challenge, but adjusted to improve both the scale and the...

Technical Perspective: eBP Rides the Third Wave of Mobile Health
From Communications of the ACM

Technical Perspective: eBP Rides the Third Wave of Mobile Health

The automated blood pressure wearable system described in "eBP," by Nam Bui et al., is a sterling example of the third wave of mobile health tech to fill the preventative...

eBP
From Communications of the ACM

eBP: An Ear-Worn Device for Frequent and Comfortable Blood Pressure Monitoring

We developed eBP to measure blood pressure from inside a user's ear aiming to minimize the measurement's impact on normal activities while maximizing its comfort...

Technical Perspective: The Quest for Optimal Multi-Item Auctions
From Communications of the ACM

Technical Perspective: The Quest for Optimal Multi-Item Auctions

"Optimal Auctions Through Deep Learning," by Paul Dütting et al., contributes a very interesting and forward-looking new take on the optimal multi-item mechanism...

Optimal Auctions Through Deep Learning
From Communications of the ACM

Optimal Auctions Through Deep Learning

We overview recent research results that show how tools from deep learning are shaping up to become a powerful tool for the automated design of near-optimal auctions...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account