Sign In

Communications of the ACM

Latest Research



DeepDive
From Communications of the ACM

DeepDive: Declarative Knowledge Base Construction

We describe DeepDive, a system that combines database and machine learning ideas to help to develop knowledge base construction systems.

From Communications of the ACM

Technical Perspective: Enlisting the Power of the Crowd

An important contribution of "Answering Enumeration Queries with the Crowd" is the observation that by using the crowd for the collection of new data, we are departing...

From Communications of the ACM

Technical Perspective: High-Level Data Structures

This lifting of data structure thinking to the relational level has long inspired computer scientists. In "An Introduction to Data Representation Synthesis," the...

An Introduction to Data Representation Synthesis
From Communications of the ACM

An Introduction to Data Representation Synthesis

We consider the problem of specifying combinations of data structures with complex sharing in a manner that is declarative and results in provably correct code.

CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples
From Communications of the ACM

CoSaMP: Iterative Signal Recovery From Incomplete and Inaccurate Samples

Compressive sampling (CoSa) is a new paradigm for developing data sampling technologies. The main computational challenge in CoSa is to reconstruct a compressible...

From Communications of the ACM

Technical Perspective: Iterative Signal Recovery From Incomplete Samples

You are given a large set of data values, and you are requested to compress, clean, recover, recognize, and/or predict...

Collaborative Filtering with Temporal Dynamics
From Communications of the ACM

Collaborative Filtering with Temporal Dynamics

Customer preferences for products are drifting over time. Product perception and popularity are constantly changing as new selection emerges. Similarly, customer...

From Communications of the ACM

Creativity Helps Influence Prediction Precision

The past decade has seen an explosion of interest in machine learning and data mining, with significant advances in terms of...

Computing Arbitrary Functions of Encrypted Data
From Communications of the ACM

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic"...

From Communications of the ACM

Technical Perspective: A First Glimpse of Cryptography's Holy Grail

We all know how to protect our private or most valuable data from unauthorized access: encrypt it. Still, the use of encryption to protect...

From Communications of the ACM

Technical Perspective: Data Stream Processing—When You Only Get One Look

The database and systems communities have made great progress in developing database systems that allow us to store and query...

From Communications of the ACM

Error Correction Up to the Information-Theoretic Limit

Ever since the birth of coding theory almost 60 years ago, researchers have been pursuing the elusive goal of constructing the "best codes," whose encoding introduces...

From Communications of the ACM

Technical Perspective: The Beauty of Error-Correcting Codes

Error-correcting codes are the means by which we compensate for interference in communication, and are essential for the accurate transmission and storage of digital...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo