Sign In

Communications of the ACM

Latest Research



A Massively Parallel Adaptive Fast Multipole Method on Heterogeneous Architectures
From Communications of the ACM

A Massively Parallel Adaptive Fast Multipole Method on Heterogeneous Architectures

We describe a parallel fast multipole method for highly nonuniform distributions of particles. We employ both distributed memory parallelism and shared memory parallelism...

Searching the Village
From Communications of the ACM

Searching the Village: Models and Methods for Social Search

With Aardvark, a social search engine, users ask a question, either by IM, e-mail, Web input, text message, or voice. Aardvark then routes the question to the person...

From Communications of the ACM

Technical Perspective: Who Knows?: Searching for Expertise on the Social Web

It is difficult to remember what people had to do to find the answer to a question before the Web. One option might be to call a friend who might know the answer...

Asynchronous Contact Mechanics
From Communications of the ACM

Asynchronous Contact Mechanics

Physicists have long observed physical phenomena and developed mathematical models to describe them. The advent of computers has allowed us to implement these...

From Communications of the ACM

Technical Perspective: Building Robust Dynamical Simulation Systems

Computational power has been widely used to predict the behavior of dynamical systems using computer simulations, which are often used as an adjunct to or substitute...

The Grand Challenge of Computer Go
From Communications of the ACM

The Grand Challenge of Computer Go: Monte Carlo Tree Search and Extensions

The ancient oriental game of Go has long been considered a grand challenge for artificial intelligence. However, computer Go programs based on Monte-Carlo tree...

From Communications of the ACM

Technical Perspective: A New Way to Search Game Trees

Researchers in artificial intelligence know that computers still lag far behind human levels of play in many games of strategy. One such contest of wits is Go...

From Communications of the ACM

Technical Perspective: The Benefits of Capability-Based Protection

Affordable personal computing hardware and the usable GUI-based PC operating systems made the vision of "a computer on every desktop and in every home" a reality...

A Taste of Capsicum
From Communications of the ACM

A Taste of Capsicum: Practical Capabilities for UNIX

Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs...

From Communications of the ACM

Technical Perspective: Modeling High-Dimensional Data

Data in high dimension is difficult to visualize and understand. This has always been the case and is even more apparent now with the availability of large high...

Disentangling Gaussians
From Communications of the ACM

Disentangling Gaussians

The Gaussian mixture model is one of the oldest and most widely used statistical models. Our work focuses on the case where the mixture consists of a small but...

From Communications of the ACM

Technical Perspective: Compiling What to How

The following paper by Viktor Kuncak et al. integrates declarative programming into a general-purpose language, allowing one to escape the host language when...

Software Synthesis Procedures
From Communications of the ACM

Software Synthesis Procedures

Automated synthesis of program fragments from specifications can make programs easier to write and easier to reason about. To integrate synthesis into programming...

From Communications of the ACM

Technical Perspective: Content-Centric Networking

Much has changed in the 50 years since the invention of packet switching and the early network designs and deployments that...

Networking Named Content
From Communications of the ACM

Networking Named Content

Current network use is dominated by content distribution and retrieval yet current networking protocols are designed for conversations between hosts. We present...

From Communications of the ACM

Technical Perspective: Where Do People Draw Lines?

Computer graphics once focused exclusively on realism. The field eventually broadened to include other pictorial...

Where Do People Draw Lines?
From Communications of the ACM

Where Do People Draw Lines?

This paper presents the results of a study in which artists made line drawings intended to convey specific 3D shapes.

From Communications of the ACM

Technical Perspective: Anonymity Is Not Privacy

We live in an era of data abundance. Every aspect of our online and offline behavior is captured and analyzed. The companies holding our data face the responsibility...

Wherefore Art Thou R3579X?
From Communications of the ACM

Wherefore Art Thou R3579X?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography

In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. We describe a family of attacks such...

From Communications of the ACM

Technical Perspective: Safety First!

Software misbehaves all too often. This is a truism, but also the driving force behind many computing techniques intended to increase software reliability, safety...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo