"Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication)...Charles (Chuck) Thacker From Communications of the ACM | September 2017
We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.
Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, Dennis Sylvester From Communications of the ACM | September 2017
To avoid costly feedback loops between design, engineering, and fabrication, research in computer graphics has recently tried to incorporate key aspects of function...Helmut Pottmann From Communications of the ACM | August 2017
In this article, we describe an algorithm to generate designs for spinning objects by optimizing their mass distribution.
Moritz Bächer, Bernd Bickel, Emily Whiting, Olga Sorkine-Hornung From Communications of the ACM | August 2017
This paper introduces an interface-driven approach to building scalable software.
Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert T. Morris, Nickolai Zeldovich From Communications of the ACM | August 2017
"IronFleet: Proving Safety and Liveness of Practical Distributed Systems," by Chris Hawblitzel, et al., describes mechanically checked proofs for two non-trivial...Fred B. Schneider From Communications of the ACM | July 2017
We demonstrate the methodology on a complex implementation of a Paxos-based replicated state machine library and a lease-based sharded key-value store. With our...Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob R. Lorch, Bryan Parno, Michael L. Roberts, Srinath Setty, Brian Zill From Communications of the ACM | July 2017
In "Fast and Powerful Hashing Using Tabulation," Mikkel Thorup describes a variation of simple but surprisingly effective and powerful hash functions based on using...Michael Mitzenmacher From Communications of the ACM | July 2017
The past few years have seen a revolution in our understanding of arithmetic circuits. "Unexpected Power of Low-Depth Arithmetic Circuits" by Gupta et al. on the...Avi Wigderson From Communications of the ACM | June 2017
Several earlier results have shown that it is possible to rearrange basic computational elements in surprising ways to give more efficient algorithms. The main...Ankit Gupta, Pritish Kamath, Neeraj Kayal, Ramprasad Saptharishi From Communications of the ACM | June 2017
We are in the middle of the third wave of interest in artificial neural networks as the leading paradigm for machine learning. "ImageNet Classification with Deep...Jitendra Malik From Communications of the ACM | June 2017
In the 1980s backpropagation did not live up to the very high expectations of its advocates. Twenty years later, we know what went wrong: for deep neural networks...Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton From Communications of the ACM | June 2017
We describe DeepDive, a system that combines database and machine learning ideas to help to develop knowledge base construction systems.
Ce Zhang, Christopher Ré, Michael Cafarella, Christopher De Sa, Alex Ratner, Jaeho Shin, Feiran Wang, Sen Wu From Communications of the ACM | May 2017
"Exploiting Vector Instructions with Generalized Stream Fusion" points out that stream fusion by itself is not well suited for generating bulk instructions such...Guy Blelloch From Communications of the ACM | May 2017
Programmers should not have to sacrifice code clarity or good software engineering practices to obtain performance. This work shows how to attain this goal for...Geoffrey Mainland, Roman Leshchinskiy, Simon Peyton Jones From Communications of the ACM | May 2017
The authors of "Guilt-Free Data Reuse" show there is a way to construct a safety net that goes around a fixed dataset so that it may be analyzed interactively without...Jonathan Ullman From Communications of the ACM | April 2017
In this work, we initiate a principled study of how to guarantee the validity of statistical inference in adaptive data analysis.
Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, Aaron Roth From Communications of the ACM | April 2017