Designing an Efficient Tree Index on Disaggregated Memory
Sherman demonstrates that combining RDMA hardware features and RDMA-friendly software designs can enable a high-performance index on disaggregated memory.
Designing an Efficient Tree Index on Disaggregated Memory
Sherman demonstrates that combining RDMA hardware features and RDMA-friendly software designs can enable a high-performance index on disaggregated memory.
Technical Perspective: A Write-Optimized Distributed B+Tree Index on Disaggregated Memory
The high-performance tree index uses a lock-free search with versions to resolve read-write conflicts and exclusive locks to resolve write-write conflicts.
The design ensures unobtrusiveness and a natural look and feel while achieving high signal quality, high spatial-temporal fidelity, and low power operation.
Technical Perspective: The Technologies that Disappear
Bringing new "life" to stuffed animal toys and beyond.
Many Faces of Ad Hoc Transactions
The flexibility of ad hoc transactions is a double-edged sword, providing potential performance benefits but also increasing the risk of correctness issues.
Technical Perspective: Ad Hoc Transactions: What They Are and Why We Should Care
The paper by Tang et al. addresses important questions about ad hoc transactions.
New Spectral Algorithms for Refuting Smoothed k-SAT
Our methods yield new algorithms for smoothed k-SAT instances with guarantees that match those for the significantly simpler and well-studied model of random formulas.
Technical Perspective: The Surprising Power of Spectral Refutation
Could an algorithm that seems unrelated to SAT serve as a reliable refutation heuristic? Perhaps surprisingly, the answer is yes.
R2T: Instance-Optimal Truncation for Differentially Private Query Evaluation with Foreign Keys
The first DP mechanism for answering arbitrary SPJA queries in a database with foreign-key constraints.
Technical Perspective: Toward Building a Differentially Private DBMS
The paper is an important step toward automatically ensuring privacy for arbitrary computations.
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions
Our work attempts to characterize the tendency of Copilot to produce insecure code.
Technical Perspective: Unsafe Code Still a Hurdle Copilot Must Clear
Examining the conditions under which LLMs may generate insecure code.
Negative-Weight Single-Source Shortest Paths in Near-Linear Time
The first combinatorial algorithm for negative-weight SSSP to break through the classic ˜O(m√n log W) bound.
Technical Perspective: Shortening the Path to Designing Efficient Graph Algorithms
A new way of designing efficient graph algorithms that will go significantly beyond shortest paths.
A mobile application can generate situation-specific communication boards automatically from photographs.
Technical Perspective: Can AI Keep Accessible Communication in the Picture?
Recent research explores how AI can use photos to support communication, especially for people with communication impairments.
Computing with Time: Microarchitectural Weird Machines
Demonstrating the practicallity of μWMs by creating a microarchitecture-sensitive logic bomb.
Technical Perspective: How Exploits Impact Computer Science Theory
The term “weird machines” reflects the shift in the understanding of exploitability’s root cause.
HammingMesh: A Network Topology for Large-Scale Deep Learning
HammingMesh is optimized specifically for ML workloads and their communication patterns.
Technical Perspective: Mirror, Mirror on the Wall, What Is the Best Topology of Them All?
Combining torus topologies’ cost-effectiveness and switched topologies’ performance into a novel network topology.
Pitfalls in Machine Learning for Computer Security
Generic pitfalls related to machine learning affect all security domains and can affect the entire machine learning workflow, weakening assumptions, conclusions, and lessons learned.
Technical Perspective: Machine Learning in Computer Security is Difficult to Fix
The study points out some common issues hindering the design of ML models for computer security and how to overcome them.
BentoMuseum: 3D and Layered Interactive Museum Map for Blind Visitors
BentoMuseum is a layered, stackable, 3D museum map that makes complex structural information accessible by allowing explorations on a floor and between floors.
Technical Perspective: An Accessible Solution to Unlock Museums
The BentoMuseum introduces a novel interactive way for visitors to understand museum layouts before their visit.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More