default search action
ACM Queue, Volume 21
Volume 21, Number 1, January/February 2023
- Alfred Z. Spector, Peter Norvig, Chris Wiggins, Jeannette M. Wing, Ben Fried, Michael Tingley:
More Than Just Algorithms: A discussion with Alfred Spector, Peter Norvig, Chris Wiggins, Jeannette Wing, Ben Fried, and Michael Tingley. 102-129 - Simson L. Garfinkel, Jon Stewart:
Sharpening Your Tools: Updating bulk_extractor for the 2020s. 30-56 - Kelly Shortridge, Josiah Dykstra:
Opportunity Cost and Missed Chances in Optimizing Cybersecurity: The loss of potential gain from other alternatives when one alternative is chosen. 30-56 - Zachary Tellman:
Designing a Framework for Conversational Interfaces: Combining the latest advances in machine learning with earlier approaches. 85-101 - Terence Kelly, Yekai Pan:
Catch-23: The New C Standard Sets the World on Fire. 12-30 - George V. Neville-Neil:
The Parchment Path?: Is there ever a time when learning is not of value - for its own sake? 5-11
Volume 21, Number 2, 2023
- Thomas A. Limoncelli:
Improvement on End-to-End Encryption May Lead to Silent Revolution: Researchers are on a brink of what could be the next big improvement in communication privacy. 10-13 - Abi Noda, Margaret-Anne D. Storey, Nicole Forsgren, Michaela Greiler:
DevEx: What Actually Drives Productivity: The developer-centric approach to measuring and improving productivity. 35-53 - Amanda Casari, Julia Ferraioli, Juniper L. Lovato:
Beyond the Repository: Best practices for open source ecosystems researchers. 14-34 - Edlyn V. Levine:
Cargo Cult AI: Is the ability to think scientifically the defining essence of intelligence? 66-87 - David Collier-Brown:
You Don't know Jack about Application Performance: Knowing whether you're doomed to fail is important when starting a project. 54-65 - Kostis Kaffes, Peter Alvaro:
OS Scheduling: Better scheduling policies for modern computing systems. 88-95 - George V. Neville-Neil:
The Human Touch: There is no substitute for good, direct, honest training. 9-13
Volume 21, Number 3, 2023
- Kate Matsudaira:
Managing Hybrid Teams: The combination of on-site and remote workers takes extra effort from team leaders. 5-16
- Poul-Henning Kamp:
Don't "Think of the Internet!": No human right is absolute. 17-22
- Phil Vachon:
Security Mismatch: Security must be a business enabler, not a hinderer. 23-28
- George V. Neville-Neil:
Stone Knives and Bear Skins. 29-35
- Alvaro Videla:
Echoes of Intelligence: Textual interpretation and large language models. 36-53 - Samuel W. Stark, A. Theodore Markettos, Simon W. Moore:
How Flexible is CXL's Memory Protection?: Replacing a sledgehammer with a scalpel. 54-64 - Ethan L. Miller, Achilles Benetopoulos, George V. Neville-Neil, Pankaj Mehra, Daniel Bittman:
Pointers in Far Memory: A rethink of how data and computations should be organized. 75-93
Volume 21, Number 4, 2023
- Thomas A. Limoncelli:
Knowing What You Neeed to Know: Personal, team, and organizational effectiveness can be improved with a little preparation. 5-17
- George V. Neville-Neil:
Halfway Around the World: Learn the language, meet the people, eat the food. 18-22
- Terence Kelly:
Protecting Secrets from Computers. 23-43
- Mark Russinovich:
Confidential Computing: Elevating Cloud Security and Privacy: Working toward a more secure and innovative future. 44-48 - David Kaplan:
Hardware VM Isolation in the Cloud: Enabling confidential computing with AMD SEV-SNP technology. 49-67 - Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Michael O'Connor, Rob Nertney, Phil Rogers:
Creating the First Confidential GPUs: The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing. 68-93 - Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code?: Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy. 94-122
Volume 21, Number 5, 2023
- Kate Matsudaira:
Software Managers' Guide to Operational Excellence: The secret to being a great engineering leader? Setting up the right checks and balances. 5-12
- Phil Vachon:
The Security Jawbreaker: Access to a system should not imply authority to use it. Enter the principle of complete mediation. 13-21
- George V. Neville-Neil:
Dear Diary: On keeping a laboratory notebook. 22-28
- Geoffrey H. Cooper:
Device Onboarding using FDO and the Untrusted Installer Model: FDO's untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism. 29-53 - Harsh Deokuliar, Raghvinder S. Sangwan, Youakim Badr, Satish Mahadevan Srinivasan:
Improving Testing of Deep-learning Systems: A combination of differential and mutation testing results in better test data. 54-65 - Ivar Jacobson, Alistair Cockburn:
Use Cases are Essential: Use cases provide a proven method to capture and explain the requirements of a system in a concise and easily understood format. 66-86 - João Varajão, António Trigo, Miguel Almeida:
Low-code Development Productivity: "Is winter coming" for code-based technologies? 87-107
Volume 21, Number 6, 2024
- Thomas A. Limoncelli:
What do Trains, Horses, and Home Internet Installation have in Common?: Avoid changes mid-process. 5-11
- George V. Neville-Neil:
Is There Another System?: Computer science is the study of what can be automated. 12-15
- Terence Kelly:
Programmer Job Interviews: The Hidden Agenda. 16-26
- David Chisnall:
How to Design an ISA: The popularity of RISC-V has led many to try designing instruction sets. 27-46 - Nicole Forsgren, Eirini Kalliamvakou, Abi Noda, Michaela Greiler, Brian Houck, Margaret-Anne D. Storey:
DevEx in Action: A study of its tangible impacts. 47-77
- Nigel P. Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, Atefeh Mashatan:
Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan. 78-100
- Divyansh Kaushik, Zachary C. Lipton, Alex John London:
Resolving the Human-subjects Status of Machine Learning's Crowdworkers: What ethical framework should govern the interaction of ML researchers and crowdworkers? 101-127
- Peter Alvaro, Manuel Rigger:
Automatically Testing Database Systems: DBMS testing with test oracles, transaction history, and fuzzing. 128-135
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.