Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: A Perspective on Pivot Tracing

Instead of handing trace records off to a collector for long-term storage and future processing, the system described in "Pivot Tracing: Dynamic Causal Monitoring...

Pivot Tracing
From Communications of the ACM

Pivot Tracing: Dynamic Causal Monitoring for Distributed Systems

This paper presents Pivot Tracing, a monitoring framework for distributed systems, which addresses the limitations of today's monitoring and diagnosis tools by...

From Communications of the ACM

Technical Perspective: Lighting the Way to Visual Privacy

"Automating Visual Privacy Protection Using a Smart LED," presents a new technique to address the issue of cameras capturing proprietary or private information—it...

Automating Visual Privacy Protection Using a Smart LED
From Communications of the ACM

Automating Visual Privacy Protection Using a Smart LED

We introduce LiShield, which automatically protects a physical scene against photographing, by illuminating it with smart LEDs flickering in specialized waveforms...

From Communications of the ACM

Technical Perspective: Is There a Geek Gene?

"Evidence that Computer Science Grades Are Not Bimodal" uses empirical methods to determine if belief in innate differences may explain why CS teachers see a bimodality...

Evidence That Computer Science Grades Are Not Bimodal
From Communications of the ACM

Evidence That Computer Science Grades Are Not Bimodal

There is a common belief that grades in computer science courses are bimodal. We devised a psychology experiment to understand why CS educators hold this belief...

From Communications of the ACM

Technical Perspective: The Scalability of CertiKOS

The authors of "Building Certified Concurrent OS Kernels" illustrate that formal verification can scale up to a moderate-size program (6,500 lines of C) that has...

Building Certified Concurrent OS Kernels
From Communications of the ACM

Building Certified Concurrent OS Kernels

In this work, we present CertiKOS, a novel compositional framework for building verified concurrent OS kernels.

From Communications of the ACM

Technical Perspective: Do You Know Why Your Web Pages Load Faster?

"Taking a Long Look at QUIC," by Arash Molavi Kakhki et al., is a bold attempt to unearth the reasons why QUIC works better than TCP.

Taking a Long Look at Q­UIC
From Communications of the ACM

Taking a Long Look at Q­UIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols

There is a need for alternative techniques for understanding and evaluating QUIC when compared with previous transport-layer protocols.

From Communications of the ACM

Technical Perspective: Back to the Edge

"Heterogeneous Von Neumann/Dataflow Microprocessors" describes an innovative approach to exploit both CDFG and EDGE computation models.

Heterogeneous Von Neumann/Dataflow Microprocessors
From Communications of the ACM

Heterogeneous Von Neumann/Dataflow Microprocessors

This work studies the potential of a paradigm of heterogeneous execution models by developing a specialization engine for explicit-dataflow (SEED) and integrating...

From Communications of the ACM

Technical Perspective: How Economic Theories Can Help Computers Beat the Heat

The authors of "Distributed Strategies for Computational Sprints" bring the rich theory of allocating scarce resources to the challenge of managing computational...

Distributed Strategies for Computational Sprints
From Communications of the ACM

Distributed Strategies for Computational Sprints

We describe a computational sprinting architecture in which many, independent chip multiprocessors share a power supply and sprints are constrained by the chips'...

From Communications of the ACM

Technical Perspective: Attacking Cryptographic Key Exchange with Precomputation

"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice," by David Adrian et al., illustrates the importance of taking preprocessing attacks into account...

Imperfect Forward Secrecy
From Communications of the ACM

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.

From Communications of the ACM

Technical Perspective: Making Sleep Tracking More ­User Friendly

"LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study" provides a nice balance in terms of minimizing the burden on users and...

LIBS
From Communications of the ACM

LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study

We explore a new form of wearable systems, called LIBS, that can continuously record biosignals such as brain wave, eye movements, and facial muscle contractions...

From Communications of the ACM

Technical Perspective: Backdoor Engineering

"Where Did I Leave My Keys?" by Checkoway et al. reports on the amazing independent reconstruction of a backdoor, discovered in the firmware of a VPN router commonly...

Where Did I Leave My Keys?
From Communications of the ACM

Where Did I Leave My Keys?: Lessons from the Juniper Dual EC Incident

In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems, which we carried...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account