Sign In

Communications of the ACM

Latest Research



Technical Perspective: Does Your Experiment Smell?
From Communications of the ACM

Technical Perspective: Does Your Experiment Smell?

"PlanAlyzer," by Emma Tosch et al., details PlanAlyzer software, the first tool to statically check the validity of online experiments.

PlanAlyzer
From Communications of the ACM

PlanAlyzer: Assessing Threats to the Validity of Online Experiments

We present the first approach for checking the internal validity of online experiments statically, that is, from code alone.

Technical Perspective: The Quest for Optimal Multi-Item Auctions
From Communications of the ACM

Technical Perspective: The Quest for Optimal Multi-Item Auctions

"Optimal Auctions Through Deep Learning," by Paul Dütting et al., contributes a very interesting and forward-looking new take on the optimal multi-item mechanism...

Optimal Auctions Through Deep Learning
From Communications of the ACM

Optimal Auctions Through Deep Learning

We overview recent research results that show how tools from deep learning are shaping up to become a powerful tool for the automated design of near-optimal auctions...

From Communications of the ACM

Technical Perspective: Robust Statistics Tackle New Problems

"Robustness Meets Algorithms," by Ilias Diakonikolas, et al., represents the beginning of a long and productive line of work on robust statistics in high dimensions...

Robustness Meets Algorithms
From Communications of the ACM

Robustness Meets Algorithms

We give the first efficient algorithm for estimating the parameters of a high-dimensional Gaussian that is able to tolerate a constant fraction of corruptions that...

From Communications of the ACM

Technical Perspective: A Logical Step Toward the Graph Isomorphism Problem

In "Isomorphism, Canonization, and Definability for Graphs of Bounded Rank Width," Grohe and Neuen show that the Weisfeiler-Leman algorithm in its plain form solves...

Isomorphism, Canonization, and Definability for Graphs of Bounded Rank Width
From Communications of the ACM

Isomorphism, Canonization, and Definability for Graphs of Bounded Rank Width

In this paper we study the graph isomorphism problem and the closely related graph canonization problem as well as logical definability and descriptive complexity...

From Communications of the ACM

Technical Perspective: Why Don't Today's Deep Nets Overfit to Their Training Data?

"Understanding Deep Learning (Still) Requires Rethinking Generalization," Chiyuan Zhang, et al., brings a fundamental new theoretical challenge: Why don't today's...

Understanding Deep Learning (Still) Requires Rethinking Generalization
From Communications of the ACM

Understanding Deep Learning (Still) Requires Rethinking Generalization

In this work, we presented a simple experimental framework for interrogating purported measures of generalization.

From Communications of the ACM

Technical Perspective: Programming Microfluidics to Execute Biological Protocols

The approach taken in "BioScript," by Jason Ott, et al., is an example of how programming languages can help develop executable protocols that are conforming, understandable...

BioScript
From Communications of the ACM

BioScript: Programming Safe Chemistry on Laboratories-on-a-Chip

This paper introduces BioScript, a domain-specific language for programmable biochemistry that executes on emerging microfluidic platforms.

From Communications of the ACM

Technical Perspective: SkyCore's Architecture Takes It to the 'Edge'

"SkyCore," by Mehrdad Moradi, et al., addresses an exciting use case for Unmanned Aerial Vehicles in which UAVs can act as mobile base stations for the cellular...

SkyCore
From Communications of the ACM

SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-Based LTE Networks

We argue for and propose an alternate, radical edge evolved packet core design, called SkyCore, that pushes the EPC functionality to the extreme edge of the core...

From Communications of the ACM

Technical Perspective: BLeak: Semantics-Aware Leak Detection in the Web

What is the right leak oracle that can precisely capture the behavior of leaks in Web applications? "BLeak: Automatically Debugging Memory Leaks in Web Applications...

BLeak
From Communications of the ACM

BLeak: Automatically Debugging Memory Leaks in Web Applications

This paper introduces BLeak (Browser Leak debugger), the first system for automatically debugging memory leaks in web applications.

From Communications of the ACM

Technical Perspective: Analyzing Smart Contracts with MadMax

"MadMax: Analyzing the Out-of-Gas World of Smart Contracts," by Neville Grech et al., effectively discovers a new smart contract vulnerability, and proposes a detection...

MadMax
From Communications of the ACM

MadMax: Analyzing the Out-of-Gas World of Smart Contracts

We identify gas-focused vulnerabilities and present MadMax: a static program analysis technique that automatically detects gas-focused vulnerabilities with very...

From Communications of the ACM

Technical Perspective: Two for the Price of One

"Lower Bounds for External Memory Integer Sorting via Network Coding" proves a remarkable connection between how efficiently computers can perform sorting and transmitting...

Lower Bounds for External Memory Integer Sorting via Network Coding
From Communications of the ACM

Lower Bounds for External Memory Integer Sorting via Network Coding

In this paper, we present a tight conditional lower bound on the complexity of external memory sorting of integers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account