• About communications
  • Current Issue
  • Digital Edition
  • Sample Issue
  • FAQs
  • Author Center
  • Author Guidelines
  • ACM Copyright Form
  • ACM Copyright Policy
  • ACM Author Rights
  • Submit a Video
  • Editor's Letters
  • Third-Party Material
  • Kudos Service
  • 2016 Editorial Calendar
  • Editorial Board
  • Editor's Letters
  • Editorial Staff
  • Contact Us
  • Mobile Apps
  • For Advertisers
  • Research Archive


    Latest Research Research Archive 2017SeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2016DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2015DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2014DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2013DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2012DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2011DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2010DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2009DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2008DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary Refine your search:
    Archives

    The Research archive provides access to all Research articles published in past issues of Communications of the ACM.

    September 2017


    From Communications of the ACM

    Scribe: Deep Integration of Human and Machine Intelligence to Caption Speech in Real Time

    Scribe

    We discuss how our Scribe system combines human labor and machine intelligence in real time to reliably convert speech to text with less than 4s latency.

    Walter S. Lasecki, Christopher D. Miller, Iftekhar Naim, Raja Kushalnagar, Adam Sadilek, Daniel Gildea, Jeffrey P. Bigham | September 2017

    From Communications of the ACM

    Technical Perspective: A Gloomy Look at the Integrity of Hardware

    "Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication) can be malicious, modifying designs to produce devices that…

    Charles (Chuck) Thacker | September 2017

    From Communications of the ACM

    Technical Perspective: Humans and Computers Working Together on Hard Tasks

    "Scribe," by Walter S. Lasecki, et al., is one of the first in a recent set of crowdsourcing papers that demonstrated how human workers can collaborate with computing systems to accomplish a real-time task that is difficult for…

    Ed H. Chi | September 2017

    From Communications of the ACM

    Exploiting the Analog Properties of Digital Circuits for Malicious Hardware

    Exploiting the Analog Properties of Digital Circuits for Malicious Hardware

    We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.

    Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, Dennis Sylvester | September 2017