Advertisement

Computing Arbitrary Functions of Encrypted Data

Suppose that you want to delegate the ability to process your data, without giving away access to it. This separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a worker that does not have the secret decryption key to compute any (still encrypted) result of the data, even when the function of the data is very complex.

Using the Forest to See the Trees: Exploiting Context For Visual Object Detection and Localization

Recognizing objects in images is an active area of research in computer vision. However, most of the algorithms for detecting objects perform an exhaustive search across all locations and scales in the image comparing local image regions with an object model. That approach ignores the semantic structure of scenes and tries to solve the recognition problem by brute force.

A Framework For Health Care Information Assurance Policy and Compliance

As many as 400 people may have access to one's personal medical information throughout the typical care process. Patients (consumers) feel that it is critical that their medical information is held in confidence, otherwise they may withhold important medical information from health care providers making it difficult to provide quality and effective health care.

Practitioner-Based Measurement: A Collaborative Approach

The established philosophy within the software development industry is that an organization implementing a program to improve software quality can expect to recoup the cost of the implementation many times over. While organizations recognize that there are potential benefits to measuring their processes and products, however, they typically find it difficult to structure ad-hoc measures into a formal program.

Faster Dimension Reduction

Data represented geometrically in high-dimensional vector spaces can be found in many applications. The need to manipulate such data in huge corpora and to support various query types gives rise to the question of how to represent the data in a lower-dimensional space to allow more space and time efficient computation.

Practical Intelligence in IT: Assessing Soft Skills of IT Professionals

What qualities make a successful IT professional? When companies hire IT professionals, their focus is often on the "hard" skills needed to perform the work, such as years of Java programming experience. However, there is a growing awareness that technical skills alone are insufficient for success in IT, particularly in today's dynamic, distributed and complex workplace.

Wireless Insecurity: Examining User Security Behavior on Public Networks

Wireless access points are increasingly serving as entry points to the Internet, increasing connectivity options and security concerns. Particularly significant are public access points, commonly known as hotspots, which are often located in heavily populated areas such as airports, coffee shops, and hotels, appealing to both business and casual users, but offering little or no security.

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More