Sign In

Communications of the ACM

Latest Research



From Communications of the ACM

Technical Perspective: Shedding New Light on an Old Language Debate

"A Large-Scale Study of Programming Languages and Code Quality in GitHub," by Baishakhi Ray, et al., studies whether programming language choice and code quality...

A Large-Scale Study of Programming Languages and Code Quality in GitHub
From Communications of the ACM

A Large-Scale Study of Programming Languages and Code Quality in GitHub

What is the effect of programming languages on software quality? In this study, we gather a very large data set from GitHub in an attempt to shed some empirical...

From Communications of the ACM

Technical Perspective: Broadening and Deepening Query Optimization Yet Still Making Progress

"Multi-Objective Parametric Query Optimization," by Immanuel Trummer and Christoph Koch is a remarkable tour de force exploration of the combination of both parametric...

Multi-Objective Parametric Query Optimization
From Communications of the ACM

Multi-Objective Parametric Query Optimization

We propose a generalization of the classical database query optimization problem: multi-objective parametric query (MPQ) optimization.

From Communications of the ACM

Technical Perspective: A Gloomy Look at the Integrity of Hardware

"Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication)...

Exploiting the Analog Properties of Digital Circuits for Malicious Hardware
From Communications of the ACM

Exploiting the Analog Properties of Digital Circuits for Malicious Hardware

We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.

DeepDive
From Communications of the ACM

DeepDive: Declarative Knowledge Base Construction

We describe DeepDive, a system that combines database and machine learning ideas to help to develop knowledge base construction systems.

From Communications of the ACM

Technical Perspective: Enlisting the Power of the Crowd

An important contribution of "Answering Enumeration Queries with the Crowd" is the observation that by using the crowd for the collection of new data, we are departing...

From Communications of the ACM

Technical Perspective: High-Level Data Structures

This lifting of data structure thinking to the relational level has long inspired computer scientists. In "An Introduction to Data Representation Synthesis," the...

An Introduction to Data Representation Synthesis
From Communications of the ACM

An Introduction to Data Representation Synthesis

We consider the problem of specifying combinations of data structures with complex sharing in a manner that is declarative and results in provably correct code.

CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples
From Communications of the ACM

CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples

Compressive sampling (CoSa) is a new paradigm for developing data sampling technologies. The main computational challenge in CoSa is to reconstruct a compressible...

From Communications of the ACM

Technical Perspective: Iterative Signal Recovery From Incomplete Samples

You are given a large set of data values, and you are requested to compress, clean, recover, recognize, and/or predict...

Collaborative Filtering with Temporal Dynamics
From Communications of the ACM

Collaborative Filtering with Temporal Dynamics

Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer...

From Communications of the ACM

Creativity Helps Influence Prediction Precision

The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of...

Computing Arbitrary Functions of Encrypted Data
From Communications of the ACM

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic"...

From Communications of the ACM

Technical Perspective: A First Glimpse of Cryptography's Holy Grail

We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect...

From Communications of the ACM

Technical Perspective: Data Stream Processing—When You Only Get One Look

The database and systems communities have made great progress in developing database systems that allow us to store and query...

From Communications of the ACM

Error Correction Up to the Information-Theoretic Limit

Ever since the birth of coding theory almost 60 years ago, researchers have been pursuing the elusive goal of constructing the "best codes," whose encoding introduces...

From Communications of the ACM

Technical Perspective: The Beauty of Error-Correcting Codes

Error-correcting codes are the means by which we compensate for interference in communication, and are essential for the accurate transmission and storage of digital...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account