Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: A Whitebox Solution for Blackbox-Like Behaviors

DeepXplore brings a software testing perspective to deep neural networks and, in doing so, creates the opportunity for enormous amounts of follow-on work in several...

DeepXplore
From Communications of the ACM

DeepXplore: Automated Whitebox Testing of Deep Learning Systems

We design, implement, and evaluate DeepXplore, the first white-box framework for systematically testing real-world deep learning systems.

From Communications of the ACM

Technical Perspective: The Scalability of CertiKOS

The authors of "Building Certified Concurrent OS Kernels" illustrate that formal verification can scale up to a moderate-size program (6,500 lines of C) that has...

Building Certified Concurrent OS Kernels
From Communications of the ACM

Building Certified Concurrent OS Kernels

In this work, we present CertiKOS, a novel compositional framework for building verified concurrent OS kernels.

From Communications of the ACM

Technical Perspective: Do You Know Why Your Web Pages Load Faster?

"Taking a Long Look at QUIC," by Arash Molavi Kakhki et al., is a bold attempt to unearth the reasons why QUIC works better than TCP.

Taking a Long Look at Q­UIC
From Communications of the ACM

Taking a Long Look at Q­UIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols

There is a need for alternative techniques for understanding and evaluating QUIC when compared with previous transport-layer protocols.

From Communications of the ACM

Technical Perspective: Borrowing Big Code to Automate Programming Activities

"Predicting Program Properties from 'Big Code'" presents new techniques for leveraging big code to automate two programming activities: selecting understandable...

Predicting Program Properties from 'Big Code'
From Communications of the ACM

Predicting Program Properties from 'Big Code'

We present a new approach for predicting program properties from large codebases (aka "Big Code").

From Communications of the ACM

Technical Perspective: Attacking Cryptographic Key Exchange with Precomputation

"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice," by David Adrian et al., illustrates the importance of taking preprocessing attacks into account...

Imperfect Forward Secrecy
From Communications of the ACM

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.

From Communications of the ACM

Technical Perspective: WebAssembly: A Quiet Revolution of the Web

"Bringing the Web Up to Speed with WebAssembly," by Rossberg et al., gives an overview of the initial design of WebAssembly, a new low-level programming language...

Bringing the Web ­Up to Speed with WebAssembly
From Communications of the ACM

Bringing the Web ­Up to Speed with WebAssembly

WebAssembly is the first mainstream language designed from the start with a formal semantics. It not only demonstrates the feasibility of applying formal techniques...

From Communications of the ACM

Technical Perspective: Node Replication Divides to Conquer

In "How to Implement Any Concurrent Data Structure," Calciu et al. show that a concurrent data structure can be built automatically and that its performance is...

How to Implement Any Concurrent Data Structure
From Communications of the ACM

How to Implement Any Concurrent Data Structure

We propose a method called Node Replication (NR) to implement any concurrent data structure.

From Communications of the ACM

Technical Perspective: Backdoor Engineering

"Where Did I Leave My Keys?" by Checkoway et al. reports on the amazing independent reconstruction of a backdoor, discovered in the firmware of a VPN router commonly...

Where Did I Leave My Keys?
From Communications of the ACM

Where Did I Leave My Keys?: Lessons from the Juniper Dual EC Incident

In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems, which we carried...

From Communications of the ACM

Technical Perspective: The Future of MPI

"Enabling Highly Scalable Remote Memory Access Programming with MPI-3 One Sided" convincingly shows that the potential of MPI one-sided communication can be realized...

Enabling Highly Scalable Remote Memory Access Programming with MPI-3 One Sided
From Communications of the ACM

Enabling Highly Scalable Remote Memory Access Programming with MPI-3 One Sided

In this work, we design and develop bufferless protocols that demonstrate how to implement the MPI-3 RMA interface and support scaling to millions of cores.

From Communications of the ACM

Technical Perspective: Is Your WiFi a Sensor?

"Emotion Recognition Using Wireless Signals" shows that not only can the heartrate be counted with accuracy comparable to ECG devices, but the variabilities of...

Emotion Recognition ­Using Wireless Signals
From Communications of the ACM

Emotion Recognition ­Using Wireless Signals

This paper demonstrates a new technology that can infer a person's emotions from RF signals reflected off his body.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account