"Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship," by Kelly Mack et al., provides guidance on how to make remote...John Richards From Communications of the ACM | August 2023
Interns, full-time members, and affiliates of a Microsoft Research team focused on accessibility report on the experiences of virtual interns in 2020 navigating...Kelly Mack, Maitraye Das, Dhruv Jain, Danielle Bragg, John Tang, Andrew Begel, Erin Beneteau, Josh Urban Davis, Abraham Glasser, Joon Sung Park, Venkatesh Potluri From Communications of the ACM | August 2023
The authors of "Offline and Online Algorithms for SSD Management" propose a more accurate theoretical model of flash-based SSDs that views each page as containing...Ramesh K. Sitaraman From Communications of the ACM | July 2023
We explore the problem of reducing high internal overhead of flash media which is referred to as write amplification from an algorithmic perspective, considering...Tomer Lange, Joseph (Seffi) Naor, Gala Yadgar From Communications of the ACM | July 2023
FoundationDB, as explored in "FoundationDB: A Distributed Key-Value Store," by Jingyu Zhou et al., pioneered the development of a scalable distributed key-value...Alfons Kemper From Communications of the ACM | June 2023
FoundationDB, an open-source transactional key-value store, is one of the first systems to combine the flexibility and scalability of NoSQL architectures with the...Jingyu Zhou, Meng Xu, Alexander Shraer, Bala Namasivayam, Alex Miller, Evan Tschannen, Steve Atherton, Andrew J. Beamon, Rusty Sears, John Leach, Dave Rosenthal, Xin Dong, Will Wilson, Ben Collins, David Scherer, Alec Grieser, Yang Liu, Alvin Moore, Bhaskar Muppana, Xiaoge Su, Vishesh Yadav From Communications of the ACM | June 2023
For a given cryptographic scheme, as perfect security is almost never achievable, one requires a computational assumption. Computational assumptions are some well...David Pointcheval From Communications of the ACM | June 2023
We reveal that in the interoperable world of OpenPGP, unforeseen cross-configuration attacks become possible.
Luca De Feo, Bertram Poettering, Alessandro Sorniotti From Communications of the ACM | June 2023
"Toward Basing Cryptography on the Hardness of EXP," by Yanyi Liu and Rafael Pass, establishes surprisingly tight bidirectional connections between one-way functions...Gil Segev From Communications of the ACM | May 2023
We show that the only "gap" toward getting (infinitely-often) OWFs from the assumption that EXP ≠ BPP is the seemingly "minor" technical gap between two-sided error...Yanyi Liu, Rafael Pass From Communications of the ACM | May 2023
"Symbol-Synchronous Buses," by Jonathan Oostvogels et al., conceives a notion of a symbol-synchronous bus, which effectively makes a multi-hop wireless network...Luca Mottola From Communications of the ACM | April 2023
We describe a novel networking paradigm that aims to enable a new class of latency-sensitive applications by systematically breaking networking abstractions.
Jonathan Oostvogels, Fan Yang, Sam Michiels, Danny Hughes From Communications of the ACM | April 2023
The breakthrough of "Achieving High Performance the Functional Way," by Bastian Hagedorn et al., is in fundamentally rethinking the design of user-schedulable languages...Jonathan Ragan-Kelley From Communications of the ACM | March 2023
We show how to employ functional programming techniques to solve with elegance the challenge of using a high-level language to describe functionality and a separate...Bastian Hagedorn, Johannes Lenfers, Thomas Kœhler, Xueying Qin, Sergei Gorlatch, Michel Steuwer From Communications of the ACM | March 2023
"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al., addresses the challenge of processing an intractably large set of trained models...Martin Vechev From Communications of the ACM | February 2023
We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for...Samuel Drews, Aws Albarghouthi, Loris D'Antoni From Communications of the ACM | February 2023
"Actionable Auditing Revisited," by Inioluwa Deborah Raji and Joy Buolamwini, examines how companies producing commercial facial classification software responded...Vincent Conitzer, Gillian K. Hadfield, Shannon Vallor From Communications of the ACM | January 2023
This paper investigates the commercial impact of Gender Shades, the first algorithmic audit of gender- and skin-type performance disparities in commercial facial...Inioluwa Deborah Raji, Joy Buolamwini From Communications of the ACM | January 2023
"DIAMetrics," by Shaleen Deep et al., describes a versatile framework from Google for automatic extraction of benchmarks and their distributed execution and performance...Peter Boncz From Communications of the ACM | December 2022
This paper introduces DIAMetrics: a novel framework for end-to-end benchmarking and performance monitoring of query engines.
Shaleen Deep, Anja Gruenheid, Kruthi Nagaraj, Hiro Naito, Jeff Naughton, Stratis Viglas From Communications of the ACM | December 2022