Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Do You Know Why Your Web Pages Load Faster?

"Taking a Long Look at QUIC," by Arash Molavi Kakhki et al., is a bold attempt to unearth the reasons why QUIC works better than TCP.

Taking a Long Look at QUIC
From Communications of the ACM

Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols

There is a need for alternative techniques for understanding and evaluating QUIC when compared with previous transport-layer protocols.

From Communications of the ACM

Technical Perspective: Back to the Edge

"Heterogeneous Von Neumann/Dataflow Microprocessors" describes an innovative approach to exploit both CDFG and EDGE computation models.

Heterogeneous Von Neumann/Dataflow Microprocessors
From Communications of the ACM

Heterogeneous Von Neumann/Dataflow Microprocessors

This work studies the potential of a paradigm of heterogeneous execution models by developing a specialization engine for explicit-dataflow (SEED) and integrating...

From Communications of the ACM

Technical Perspective: How Economic Theories Can Help Computers Beat the Heat

The authors of "Distributed Strategies for Computational Sprints" bring the rich theory of allocating scarce resources to the challenge of managing computational...

Distributed Strategies for Computational Sprints
From Communications of the ACM

Distributed Strategies for Computational Sprints

We describe a computational sprinting architecture in which many, independent chip multiprocessors share a power supply and sprints are constrained by the chips'...

From Communications of the ACM

Technical Perspective: To Do or Not To Do: Extending SQL with Integer Linear Programming?

"Scalable Computation of High-Order Optimization Queries," by Brucato et al., makes a case for marrying the well-established paradigms of constrained optimization...

Scalable Computation of High-Order Optimization Queries
From Communications of the ACM

Scalable Computation of High-Order Optimization Queries

We present a complete system that supports package queries, a new query model that extends traditional database queries to handle complex constraints and preferences...

From Communications of the ACM

Technical Perspective: Making Sleep Tracking More User Friendly

"LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study" provides a nice balance in terms of minimizing the burden on users and...

LIBS
From Communications of the ACM

LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study

We explore a new form of wearable systems, called LIBS, that can continuously record biosignals such as brain wave, eye movements, and facial muscle contractions...

From Communications of the ACM

Technical Perspective: Is Your WiFi a Sensor?

"Emotion Recognition Using Wireless Signals" shows that not only can the heartrate be counted with accuracy comparable to ECG devices, but the variabilities of...

Emotion Recognition Using Wireless Signals
From Communications of the ACM

Emotion Recognition Using Wireless Signals

This paper demonstrates a new technology that can infer a person's emotions from RF signals reflected off his body.

From Communications of the ACM

Technical Perspective: Graphs, Betweenness Centrality, and the GPU

"Accelerating GPU Betweenness Centrality" by McLaughlin and Bader ably addresses the challenges to authors of efficient graph implementations in the important context...

Accelerating GPU Betweenness Centrality
From Communications of the ACM

Accelerating GPU Betweenness Centrality

We present a hybrid GPU implementation that provides good performance on graphs of arbitrary structure rather than just scale-free graphs as was done previously...

From Communications of the ACM

Technical Perspective: The Rewards of Selfish Mining

"Majority Is Not Enough: Bitcoin Mining Is Vulnerable," by Eyal and Sirer, questions the 2009 Bitcoin white paper's implicit assumption of perfect information—that...

Majority Is Not Enough
From Communications of the ACM

Majority Is Not Enough: Bitcoin Mining Is Vulnerable

We propose a practical modification to the Bitcoin protocol that protects Bitcoin in the general case.

From Communications of the ACM

Technical Perspective: Measuring Optimization Potential with Coz

In "Coz: Finding Code that Counts with Causal Profiling," Curtsinger and Berger describe causal profiling, which tell programmers exactly how much speed-up bang...

Coz
From Communications of the ACM

Coz: Finding Code that Counts with Causal Profiling

This paper introduces causal profiling. Unlike past profiling approaches, causal profiling indicates exactly where programmers should focus their optimization efforts...

From Communications of the ACM

Technical Perspective: On Heartbleed: A Hard Beginnyng Makth a Good Endyng

When a serious security vulnerability is discovered in the SSL/TLS protocol, one would naturally expect a rapid response. "Analysis of SSL Certificate Reissues...

Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
From Communications of the ACM

Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

We use Heartbleed, a widespread OpenSSL vulnerability from 2014, as a natural experiment to determine whether administrators are properly managing their X.509 certificates...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account