This paper presents a study on the practicality of operating system kernel debloating, that is, reducing kernel code that is not needed by the target applications...Hsuan-Chi Kuo, Jianyan Chen, Sibin Mohan, Tianyin Xu From Communications of the ACM | May 2022
"Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?" by Shrestha et al. provides insight into the difficulty of learning...Jonathan Aldrich From Communications of the ACM | March 2022
Our findings demonstrate that interference is a widespread phenomenon, forcing programmers to adopt suboptimal, opportunistic learning strategies.
Nischal Shrestha, Colton Botta, Titus Barik, Chris Parnin From Communications of the ACM | March 2022
"Toward Systematic Architectural Design of Near-Term Trapped Ion Quantum Computers" presents a study on scaling trapped-ion quantum architectures, and challenges...Frederic T. Chong From Communications of the ACM | March 2022
Toward realizing QCCD-based trapped ion systems with 50-100 qubits, we perform an extensive application-driven architectural study evaluating the key design choices...Prakash Murali, Dripto M. Debroy, Kenneth R. Brown, Margaret Martonosi From Communications of the ACM | March 2022
"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that...Robin Burke From Communications of the ACM | February 2022
We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized...Noemi Mauro, Liliana Ardissono, Federica Cena From Communications of the ACM | February 2022
In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.
Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, Henry Yuen From Communications of the ACM | November 2021
We present the first approach for checking the internal validity of online experiments statically, that is, from code alone.
Emma Tosch, Eytan Bakshy, Emery D. Berger, David D. Jensen, J. Eliot B. Moss From Communications of the ACM | September 2021
We review the impact of the first year of the COVID-19 pandemic on Internet traffic in order to analyze its performance.
Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis From Communications of the ACM | July 2021
The approach taken in "BioScript," by Jason Ott, et al., is an example of how programming languages can help develop executable protocols that are conforming, understandable...Nada Amin From Communications of the ACM | February 2021
This paper introduces BioScript, a domain-specific language for programmable biochemistry that executes on emerging microfluidic platforms.
Jason Ott, Tyson Loveless, Chris Curtis, Mohsen Lesani, Philip Brisk From Communications of the ACM | February 2021
In "Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes," by Omar Fawzi, et al., the authors produce an algorithm that can rapidly deduce the...Daniel Gottesman From Communications of the ACM | January 2021
In this paper, we study the asymptotic scaling of the space overhead needed for fault-tolerant quantum computation.
Omar Fawzi, Antoine Grospellier, Anthony Leverrier From Communications of the ACM | January 2021
What is the right leak oracle that can precisely capture the behavior of leaks in Web applications? "BLeak: Automatically Debugging Memory Leaks in Web Applications...Harry Xu From Communications of the ACM | November 2020
This paper introduces BLeak (Browser Leak debugger), the first system for automatically debugging memory leaks in web applications.
John Vilk, Emery D. Berger From Communications of the ACM | November 2020