This paper presents a study on the practicality of operating system kernel debloating, that is, reducing kernel code that is not needed by the target applications...Hsuan-Chi Kuo, Jianyan Chen, Sibin Mohan, Tianyin Xu From Communications of the ACM | May 2022
In "FANG," the authors focus on a strategy of automatically detecting disinformation campaigns on online media with a new graph-based, contextual technique for...Philippe Cudré-Mauroux From Communications of the ACM | April 2022
We propose Factual News Graph (FANG), a novel graphical social context representation and learning framework for fake news detection.
Van-Hoang Nguyen, Kazunari Sugiyama, Preslav Nakov, Min-Yen Kan From Communications of the ACM | April 2022
The authors of "Cognitive Biases in Software Development" rightly highlight the need for situated studies that examine cognitive bias 'in the wild' during software...Marian Petre From Communications of the ACM | April 2022
We conducted a two-part field study to examine the extent to which cognitive biases occur, the consequences of these biases on developer behavior, and the practices...Souti Chattopadhyay, Nicholas Nelson, Audrey Au, Natalia Morales, Christopher Sanchez, Rahul Pandita, Anita Sarma From Communications of the ACM | April 2022
"Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?" by Shrestha et al. provides insight into the difficulty of learning...Jonathan Aldrich From Communications of the ACM | March 2022
Our findings demonstrate that interference is a widespread phenomenon, forcing programmers to adopt suboptimal, opportunistic learning strategies.
Nischal Shrestha, Colton Botta, Titus Barik, Chris Parnin From Communications of the ACM | March 2022
"Toward Systematic Architectural Design of Near-Term Trapped Ion Quantum Computers" presents a study on scaling trapped-ion quantum architectures, and challenges...Frederic T. Chong From Communications of the ACM | March 2022
Toward realizing QCCD-based trapped ion systems with 50-100 qubits, we perform an extensive application-driven architectural study evaluating the key design choices...Prakash Murali, Dripto M. Debroy, Kenneth R. Brown, Margaret Martonosi From Communications of the ACM | March 2022
"Worst-Case Topological Entropy and Minimal Data Rate for State Estimation of Switched Linear Systems" gives a method for computing the topological entropy of a...Sayan Mitra From Communications of the ACM | February 2022
In this paper, we study the problem of estimating the state of a switched linear system when the observation of the system is subject to communication constraints...Guillaume O. Berger, Raphael M. Jungers From Communications of the ACM | February 2022
"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...Robin Burke From Communications of the ACM | February 2022
We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...Noemi Mauro, Liliana Ardissono, Federica Cena From Communications of the ACM | February 2022
"Eyelid Gestures for People with Motor Impairments," by Mingming Fan et al., addresses the accessibility of mobile devices to people with motor impairments.
Tiago Guerreiro From Communications of the ACM | January 2022
We present an algorithm to detect nine eyelid gestures on smartphones in real time and evaluate it with 12 able-bodied people and four people with severe motor...Mingming Fan, Zhen Li, Franklin Mingzhe Li From Communications of the ACM | January 2022
Neural volume rendering exploded onto the scene in 2020, triggered by "NeRF," the impressive paper by Ben Mildenhall et al., on Neural Radiance Fields.
Frank Dellaert From Communications of the ACM | January 2022
We present a method that achieves state-of-the-art results for synthesizing novel views of complex scenes by optimizing an underlying continuous volumetric scene...Ben Mildenhall, Pratul P. Srinivasan, Matthew Tancik, Jonathan T. Barron, Ravi Ramamoorthi, Ren Ng From Communications of the ACM | January 2022
"Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data," by Jiyong Yu et al., might be a beginning of an end to speculation...Timothy Sherwood From Communications of the ACM | December 2021
This paper proposes speculative taint tracking (STT), a high security and high performance hardware mechanism, to block speculative execution attacks.
Jiyong Yu, Mengjia Yan, Artem Khyzha, Adam Morrison, Josep Torrellas, Christopher W. Fletcher From Communications of the ACM | December 2021