Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: A Gloomy Look at the Integrity of Hardware

"Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication)...

Exploiting the Analog Properties of Digital Circuits for Malicious Hardware
From Communications of the ACM

Exploiting the Analog Properties of Digital Circuits for Malicious Hardware

We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.

From Communications of the ACM

Technical Perspective: Unexpected Connections

The inherent scalability of an interface is the focus of "The Scalable Commutativity Rule" by Austin T. Clements, et al.

The Scalable Commutativity Rule
From Communications of the ACM

The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors

This paper introduces an interface-driven approach to building scalable software.

From Communications of the ACM

Technical Perspective: IronFleet Simplifies Proving Safety and Liveness Properties

"IronFleet: Proving Safety and Liveness of Practical Distributed Systems," by Chris Hawblitzel, et al., describes mechanically checked proofs for two non-trivial...

IronFleet
From Communications of the ACM

IronFleet: Proving Safety and Liveness of Practical Distributed Systems

We demonstrate the methodology on a complex implementation of a Paxos-based replicated state machine library and a lease-based sharded key-value store. With our...

From Communications of the ACM

Technical Perspective: What Led Computer Vision to Deep Learning?

We are in the middle of the third wave of interest in artificial neural networks as the leading paradigm for machine learning. "ImageNet Classification with Deep...

ImageNet Classification with Deep Convolutional Neural Networks
From Communications of the ACM

ImageNet Classification with Deep Convolutional Neural Networks

In the 1980s backpropagation did not live up to the very high expectations of its advocates. Twenty years later, we know what went wrong: for deep neural networks...

From Communications of the ACM

Technical Perspective: The Power of Wi-Fi to Deliver Power

The authors of "Powering the Next Billion Devices with Wi-Fi" turn the problem of powering wireless sensor networks on its head. Instead of focusing on energy harvesting...

Powering the Next Billion Devices with Wi-Fi
From Communications of the ACM

Powering the Next Billion Devices with Wi-Fi

We present the first power over Wi-Fi system that delivers power to low-power sensors and devices and works with existing Wi-Fi chipsets.

From Communications of the ACM

Technical Perspective: FPGA Compute Acceleration is First About Energy Efficiency

"A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services" presents a research deployment of Field Programmable Gate Arrays (FPGAs) in a Microsoft...

A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services
From Communications of the ACM

A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services

We describe a medium-scale deployment of a composable, reconfigurable hardware fabric on a bed of 1,632 servers, and measure its effectiveness in accelerating the...

From Communications of the ACM

Technical Perspective: If I Could Only Design One Circuit . . .

"DianNao Family: Energy-Efficient Hardware Accelerators for Machine Learning" shows a deep understanding of both neural net implementations and the issues in computer...

DianNao Family
From Communications of the ACM

DianNao Family: Energy-Efficient Hardware Accelerators for Machine Learning

We introduce a series of hardware accelerators (i.e., the DianNao family) designed for Machine Learning (especially neural networks), with a special emphasis on...

From Communications of the ACM

Technical Perspective: Toward Reliable Programming for Unreliable Hardware

"Verifying Quantitative Reliability for Programs that Execute on Unreliable Hardware" by Carbin et al. addresses challenges related to a bug, how likely it is to...

From Communications of the ACM

Technical Perspective: Combining Logic and Probability

In "Probabilistic Theorem Proving," Gogate and Domingos suggest how PTP could be turned in a fast approximate algorithm by sampling from the set of children of...

Probabilistic Theorem Proving
From Communications of the ACM

Probabilistic Theorem Proving

Many representation schemes combining first-order logic and probability have been proposed in recent years. We propose the first method that has the full power...

From Communications of the ACM

Technical Perspective: High-Performance Virtualization: Are We Done?

"Bare-Metal Performance for Virtual Machines with Exitless Interrupts" shows how to enable a virtual machine to attain "bare metal" performance from high-speed...

Bare-Metal Performance for Virtual Machines with Exitless Interrupts
From Communications of the ACM

Bare-Metal Performance for Virtual Machines with Exitless Interrupts

We present ExitLess Interrupts (ELI), a software-only approach for handling interrupts within guest virtual machines directly and securely.

From Communications of the ACM

Technical Perspective: Treating Networks Like Programs

"Software Dataplane Verification" takes existing static checking of networks to a new level by checking the real code in the forwarding path of a Click router using...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account