acm-header
Sign In

Communications of the ACM

Latest Research



Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning
From Communications of the ACM

Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning

"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al., addresses the challenge of processing an intractably large set of trained models...

Proving Data-Poisoning Robustness in Decision Trees
From Communications of the ACM

Proving Data-Poisoning Robustness in Decision Trees

We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for...

Technical Perspective: The Power of Low-Power GPS Receivers for Nanosats
From Communications of the ACM

Technical Perspective: The Power of Low-Power GPS Receivers for Nanosats

The work explored in "Hummingbird," by Sujay Narayana et al., focuses on the energy consumption of a typical GPS receiver and its operational challenges in a nanosat...

Hummingbird
From Communications of the ACM

Hummingbird: An Energy-Efficient GPS Receiver for Small Satellites

In this work, we elucidate the design of a low-cost, low-power GPS receiver for small satellites.

Sampling Near Neighbors in Search for Fairness
From Communications of the ACM

Sampling Near Neighbors in Search for Fairness

We propose several efficient data structures for the exact and approximate variants of the fair near neighbor problem.

Technical Perspective: Can Data Structures Treat Us Fairly?
From Communications of the ACM

Technical Perspective: Can Data Structures Treat Us Fairly?

In "Sampling Near Neighbors in Search for Fairness," Aumüller et al. investigate a basic problem in similarity search called near neighbor in the context of fair...

Technical Perspective: The Compression Power of the BWT
From Communications of the ACM

Technical Perspective: The Compression Power of the BWT

"Resolution of the Burrows-Wheeler Transform Conjecture," by Dominik Kempa and Tomasz Kociumaka, finally settles the question of how well r in the BWT captures...

Resolution of the Burrows-Wheeler Transform Conjecture
From Communications of the ACM

Resolution of the Burrows-Wheeler Transform Conjecture

In this paper, we show that r = (z log2 n) holds for every text. This result has numerous implications for text indexing and data compression.

Technical Perspective: 'What Is the Ideal Operating System?'
From Communications of the ACM

Technical Perspective: 'What Is the Ideal Operating System?'

The authors of "Set the Configuration for the Heart of the OS" put a fresh view on the practicability of automatic kernel debloating.

Set the Configuration for the Heart of the OS
From Communications of the ACM

Set the Configuration for the Heart of the OS: On the Practicality of Operating System Kernel Debloating

This paper presents a study on the practicality of operating system kernel debloating, that is, reducing kernel code that is not needed by the target applications...

Technical Perspective: Leveraging Social Context for Fake News Detection
From Communications of the ACM

Technical Perspective: Leveraging Social Context for Fake News Detection

In "FANG," the authors focus on a strategy of automatically detecting disinformation campaigns on online media with a new graph-based, contextual technique for...

FANG
From Communications of the ACM

FANG: Leveraging Social Context for Fake News Detection Using Graph Representation

We propose Factual News Graph (FANG), a novel graphical social context representation and learning framework for fake news detection.

Technical Perspective: How Do Experts Learn New Programming Languages?
From Communications of the ACM

Technical Perspective: How Do Experts Learn New Programming Languages?

"Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?" by Shrestha et al. provides insight into the difficulty of learning...

Here We Go Again
From Communications of the ACM

Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?

Our findings demonstrate that interference is a widespread phenomenon, forcing programmers to adopt suboptimal, opportunistic learning strategies.

Technical Perspective: Applying Design-Space Exploration to Quantum Architectures
From Communications of the ACM

Technical Perspective: Applying Design-Space Exploration to Quantum Architectures

"Toward Systematic Architectural Design of Near-Term Trapped Ion Quantum Computers" presents a study on scaling trapped-ion quantum architectures, and challenges...

Toward Systematic Architectural Design of Near-Term Trapped Ion Quantum Computers
From Communications of the ACM

Toward Systematic Architectural Design of Near-Term Trapped Ion Quantum Computers

Toward realizing QCCD-based trapped ion systems with 50-100 qubits, we perform an extensive application-driven architectural study evaluating the key design choices...

Technical Perspective: On Proofs, Entanglement, and Games
From Communications of the ACM

Technical Perspective: On Proofs, Entanglement, and Games

"MIP* = RE," by Zhengfeng Ji et al., studies quantum interactive proofs.

MIP* = RE
From Communications of the ACM

MIP* = RE

In this work, we study a fourth modification to the notion of efficient verification that originates in the study of quantum entanglement.

Technical Perspective: Finding the Sweet Spot Amid Accuracy and Performance
From Communications of the ACM

Technical Perspective: Finding the Sweet Spot Amid Accuracy and Performance

"Multi-Itinerary Optimization as Cloud Service," by Alexandru Cristian et al., makes accessible an end-to-end cloud service that produces traffic-aware, real-time...

Multi-Itinerary Optimization as Cloud Service
From Communications of the ACM

Multi-Itinerary Optimization as Cloud Service

We describe multi-itinerary optimization, a novel Bing Maps service that automates the process of building itineraries for multiple agents while optimizing their...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account