Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: A Gloomy Look at the Integrity of Hardware

"Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication)...

Exploiting the Analog Properties of Digital Circuits for Malicious Hardware
From Communications of the ACM

Exploiting the Analog Properties of Digital Circuits for Malicious Hardware

We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.

From Communications of the ACM

Technical Perspective: The Power of Wi-Fi to Deliver Power

The authors of "Powering the Next Billion Devices with Wi-Fi" turn the problem of powering wireless sensor networks on its head. Instead of focusing on energy harvesting...

Powering the Next Billion Devices with Wi-Fi
From Communications of the ACM

Powering the Next Billion Devices with Wi-Fi

We present the first power over Wi-Fi system that delivers power to low-power sensors and devices and works with existing Wi-Fi chipsets.

Authentication Using Pulse-Response Biometrics
From Communications of the ACM

Authentication Using Pulse-Response Biometrics

We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response.

From Communications of the ACM

Technical Perspective: The Chemistry of Software-Defined Batteries

A time-tested principle in computer systems design is to use an interface to separate an abstraction from its implementation. "Software-Defined Batteries" represents...

Software-Defined Batteries
From Communications of the ACM

Software-Defined Batteries

In this paper, we present a new hardware-software system, called Software Defined Battery, which allows system designers to integrate batteries of different chemistries...

From Communications of the ACM

Technical Perspective: FPGA Compute Acceleration is First About Energy Efficiency

"A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services" presents a research deployment of Field Programmable Gate Arrays (FPGAs) in a Microsoft...

A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services
From Communications of the ACM

A Reconfigurable Fabric for Accelerating Large-Scale Datacenter Services

We describe a medium-scale deployment of a composable, reconfigurable hardware fabric on a bed of 1,632 servers, and measure its effectiveness in accelerating the...

From Communications of the ACM

Technical Perspective: If I Could Only Design One Circuit . . .

"DianNao Family: Energy-Efficient Hardware Accelerators for Machine Learning" shows a deep understanding of both neural net implementations and the issues in computer...

DianNao Family
From Communications of the ACM

DianNao Family: Energy-Efficient Hardware Accelerators for Machine Learning

We introduce a series of hardware accelerators (i.e., the DianNao family) designed for Machine Learning (especially neural networks), with a special emphasis on...

From Communications of the ACM

Technical Perspective: Jupiter Rising

As "Jupiter Rising" makes clear, many of the Internet mechanisms for maintaining large-scale networks are suboptimal when the datacenter is largely homogeneous,...

Jupiter Rising
From Communications of the ACM

Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network

We present our approach for overcoming the cost, operational complexity, and limited scale endemic to datacenter networks a decade ago.

From Communications of the ACM

Technical Perspective: Combining Logic and Probability

In "Probabilistic Theorem Proving," Gogate and Domingos suggest how PTP could be turned in a fast approximate algorithm by sampling from the set of children of...

Probabilistic Theorem Proving
From Communications of the ACM

Probabilistic Theorem Proving

Many representation schemes combining first-order logic and probability have been proposed in recent years. We propose the first method that has the full power...

From Communications of the ACM

Technical Perspective: A Breakthrough in Software Obfuscation

In "Hiding Secrets in Software," Garg et al. construct a "one-way compiler" of the type envisioned by Diffie and Hellman.

Hiding Secrets in Software
From Communications of the ACM

Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation

Can we hide secrets in software? Can we make programs unintelligible while preserving their functionality? Why would we even want to do this? In this article, we...

From Communications of the ACM

Technical Perspective: The State (and Security) of the Bitcoin Economy

"A Fistful of Bitcoins" examines, in the context of Bitcoin, what we could learn by studying the patterns encoded in a complete record of every single financial...

From Communications of the ACM

Technical Perspective: Fairness and the Coin Flip

"Secure Multiparty Computations on Bitcoin" introduces an exciting new idea for how to provide fairness: leverage Bitcoin’s existing infrastructure for distributed...

Secure Multiparty Computations on Bitcoin
From Communications of the ACM

Secure Multiparty Computations on Bitcoin

In this work, we propose to use Bitcoin to design fully decentralized protocols that are secure even if no trusted third party is available.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account