default search action
Communications of the ACM, Volume 67
Volume 67, Number 1, January 2024
- Moshe Y. Vardi:
Computing, You Have Blood on Your Hands! 5
- Sam Zheng:
From Eye Tracking to AI-Powered Learning. 7
- Alex Vakulov:
Protecting Life-Saving Medical Devices from Cyberattack. 8-9
- Don Monroe:
Epigenomics Now. 11-13 - Gregory Goth:
Why Are Lawyers Afraid of AI? 14-16 - Samuel Greengard:
Wayfinding Without GPS. 17-19
- Wendy Hall, Divesh Srivastava, Scott E. Delman:
ACM Publications Finances for 2022: Striving for Balance between Mission, Sustainability, and Growth. 22-26
- Gianluca Demartini, Kevin Roitero, Stefano Mizzaro:
Data Bias Management. 28-32
- Michael A. Cusumano:
NVIDIA at the Center of the Generative AI Ecosystem - For Now. 33-35
- Kyle Langvardt, Alan Z. Rozenshtein:
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet. 36-38
- Sabah Suhail, Mubashar Iqbal, Raja Jurdak:
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers. 39-42
- Ana Pop Stefanija, Bart Buelens, Elfi Goesaert, Tom Lenaerts, Jo Pierson, Jan Van den Bussche:
Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence. 43-46 - Danfeng (Daphne) Yao:
Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research. 47-49
- Leah Hoffmann:
Achievement in Microarchitecture. 50-51
- Mark Russinovich:
Confidential Computing: Elevating Cloud Security and Privacy. 52-53 - David Kaplan:
Hardware VM Isolation in the Cloud. 54-59 - Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Rob Nertney, Michael O'Connor, Phil Rogers:
Creating the First Confidential GPUs. 60-67 - Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code? 68-76
- Neil C. C. Brown, Felienne F. J. Hermans, Lauren E. Margulieux:
10 Things Software Developers Should Learn about Learning. 78-87 - Manish Raghavan:
What Should We Do when Our Ideas of Fairness Conflict? 88-97 - Dhaminda B. Abeywickrama, Amel Bennaceur, Greg Chance, Yiannis Demiris, Anastasia Kordoni, Mark Levine, Luke Moffat, Luc Moreau, Mohammad Reza Mousavi, Bashar Nuseibeh, Subramanian Ramamoorthy, Jan Oliver Ringert, James Wilson, Shane Windsor, Kerstin Eder:
On Specifying for Trustworthiness. 98-109 - Mengnan Du, Fengxiang He, Na Zou, Dacheng Tao, Xia Hu:
Shortcut Learning of Large Language Models in Natural Language Understanding. 110-120
- Annalu Waller:
Technical Perspective: The User as a Key Ingredient in AAC Design. 122 - Stephanie Valencia, Mark Steidl, Michael L. Rivera, Cynthia L. Bennett, Jeffrey P. Bigham, Henny Admoni:
Nonverbal Communication through Expressive Objects. 123-131
- Dennis Shasha:
Seesaw Gold.
Volume 67, Number 2, February 2024
- Vinton G. Cerf:
Validating Factual Personal Information. 5
- Alex Tray:
Why Bother Localizing Information Technology Products? 6-7
- Erica Klarreich:
Algorithmic Advance: The Group Isomorphism Problem. 9-11 - Chris Edwards:
Teaching Transformed. 12-13 - Gregory Mone:
Virtual Reality as Therapy. 14-15
- Christopher Hoadley, Sara Vogel:
Autocorrect Is Not: People Are Multilingual and Computer Science Should Be Too. 16-18
- Nicholas Diakopoulos, Christoph Trattner, Dietmar Jannach, Irene Costera Meijer, Enrico Motta:
Leveraging Professional Ethics for Responsible AI. 19-21
- Thomas Haigh:
How the AI Boom Went Bust. 22-26
- George V. Neville-Neil:
Dear Diary. 27-28
- Rahul Simha, Amruth N. Kumar, Rajendra K. Raj:
Undergraduate Computer Science Curricula. 29-31 - Steven Fraser, Dennis Mancl:
Virtual and the Future of Conferences. 32-34 - Alfred Z. Spector:
Gaining Benefit from Artificial Intelligence and Data Science: A Three-Part Framework. 35-38
- Phil Vachon:
Security Mismatch. 40-41 - Thomas A. Limoncelli:
Knowing What You Need to Know. 42-46
- Maarten Buyl, Tijl De Bie:
Inherent Limitations of AI Fairness. 48-55 - Paul Denny, James Prather, Brett A. Becker, James Finnie-Ansley, Arto Hellas, Juho Leinonen, Andrew Luxton-Reilly, Brent N. Reeves, Eddie Antonio Santos, Sami Sarsa:
Computing Education in the Era of Generative AI. 56-67 - Murray Shanahan:
Talking about Large Language Models. 68-79 - Rae Yule Kim:
Anthropomorphism and Human-Robot Interaction. 80-85 - David Patterson, Jeffrey M. Gilbert, Marco Gruteser, Efren Robles, Krishna Sekar, Yong Wei, Tenghui Zhu:
Energy and Emissions of Machine Learning on Smartphones vs. the Cloud. 86-97
- Nitin Saxena:
How Easy Is It to Describe Hard Polynomials?: Technical Perspective. 100 - Nutan Limaye, Srikanth Srinivasan, Sébastien Tavenas:
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits. 101-108 - Giorgio C. Buttazzo:
Bridging AI with Real-Time Systems: Technical Perspective. 109 - Shengzhong Liu, Shuochao Yao, Xinzhe Fu, Rohan Tabish, Simon Yu, Ayoosh Bansal, Heechul Yun, Lui Sha, Tarek F. Abdelzaher:
Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines. 110-117
- Brian Clegg:
The Human Touch.
Volume 67, Number 3, March 2024
- Moshe Y. Vardi:
What Do Computing and Economics Have to Say to Each Other? 5
- David Patterson, Jeffrey M. Gilbert, Marco Gruteser, Efren Robles, Krishna Sekar, Yong Wei, Tenghui Zhu:
Corrigendum for February 2024 Article. 6
- Thomas Morton:
Computations for This World and out of This World. 7
- Robin K. Hill, Carlos Baquero:
Pondering the Ugly Underbelly, and Whether Images Are Real. 8-10
- Samuel Greengard:
Service Robots Roll Forward. 11-13 - Logan Kugler:
The Battle to Mitigate E-Waste. 14-16 - Esther Shein:
What's That Smell? 17-19 - Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Niklaus Wirth. 20
- Filippo Gualtiero Blancato:
Innovation Is Overrated: A Provocation. 22-24
- Pamela Samuelson:
U.S. Copyright Office's Questions about Generative AI. 25-28
- Lorrie Faith Cranor, Yuvraj Agarwal, Pardis Emami Naeini:
Internet of Things Security and Privacy Labels Should Empower Consumers. 29-31
- Peter J. Denning, B. Scot Rousse:
Can Machines Be in Language? 32-35
- Wojciech Mazurczyk, Dongwon Lee, Andreas Vlachos:
Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective. 36-39 - Gordon Burtch, Dokyun Lee, Zhichen Chen:
Generative AI Degrades Online Communities. 40-42
- Harsh Deokuliar, Raghvinder S. Sangwan, Yoaukim Badr, Satish Mahadevan Srinivasan:
Improving Testing of Deep-Learning Systems. 44-48 - Kate Matsudaira:
Software Managers' Guide to Operational Excellence. 49-51
- Albert Ziegler, Eirini Kalliamvakou, X. Alice Li, Andrew Rice, Devon Rifkin, Shawn Simister, Ganesh Sittampalam, Edward Aftandilian:
Measuring GitHub Copilot's Impact on Productivity. 54-63 - Saad Ahmed, Bashima Islam, Kasim Sinan Yildirim, Marco Zimmerling, Przemyslaw Pawelczak, Muhammad Hamad Alizai, Brandon Lucia, Luca Mottola, Jacob Sorber, Josiah D. Hester:
The Internet of Batteryless Things. 64-73 - Benny Kimelfeld, Phokion G. Kolaitis:
A Unifying Framework for Incompleteness, Inconsistency, and Uncertainty in Databases. 74-83 - Roderick Chapman, Claire Dross, Stuart Matthews, Yannick Moy:
Co-Developing Programs and Their Proof of Correctness. 84-94
- Daniel Wichs:
Technical Perspective: Hiding Secrets in Programs. 96 - Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. 97-105
- Leah Hoffmann:
Verifying Correctness.
Volume 67, Number 4, April 2024
- Vinton G. Cerf:
Thoughts on AI Interoperability. 5
- Orit Hazzan, Avital Binah-Pollak:
Using Data Science to Predict How Rituals Will Evolve. 6-8
- Chris Edwards:
Answers Begin to Surface to Deep Earth Puzzles. 9-11 - Esther Shein:
Governments Setting Limits on AI. 12-14 - Keith Kirkpatrick:
Abusing AI for Advertising. 15-17
- Mari Sako:
How Generative AI Fits into Knowledge Work. 20-22
- Maggie Johnson:
Generative AI and CS Education. 23-24 - Henry Farrell, Cosma Rohilla Shalizi:
Bias, Skew, and Search Engines Are Sufficient to Explain Online Toxicity. 25-28
- George V. Neville-Neil:
Is There Another System? 29-30
- Guglielmo Faggioli, Laura Dietz, Charles L. A. Clarke, Gianluca Demartini, Matthias Hagen, Claudia Hauff, Noriko Kando, Evangelos Kanoulas, Martin Potthast, Benno Stein, Henning Wachsmuth:
Who Determines What Is Relevant? Humans or AI? Why Not Both? 31-34 - Hemangee K. Kapoor, David A. Patterson:
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India. 35-36
- Geoffrey H. Cooper:
Device Onboarding Using FDO and the Untrusted Installer Model. 38-45 - Phil Vachon:
The Security Jawbreaker. 46-48
- Ruixiang Tang, Yu-Neng Chuang, Xia Hu:
The Science of Detecting LLM-Generated Text. 50-59 - Minhyung Lee, Jinyoung Min, Junyeong Lee, Chanhee Kwak, HanByeol Stella Choi:
A Small Clue Made of Fragmented Pieces. 60-69 - Anne-Sophie Himmel, George B. Mertzios, André Nichterlein, Rolf Niedermeier:
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems. 70-79 - Dominic Steinhöfel, Andreas Zeller:
Language-Based Software Testing. 80-84
- Doug Lea:
Technical Perspective: Learning-Based Memory Allocation for C++ Server Workloads. 86 - Martin Maas, David G. Andersen, Michael Isard, Mohammad Mahdi Javanmard, Kathryn S. McKinley, Colin Raffel:
Combining Machine Learning and Lifetime-Based Resource Management for Memory Allocation and Beyond. 87-96
- Dennis Shasha:
Jump Snatch.
Volume 67, Number 5, May 2024
- Boisy Pitre:
A Fit of Anger.
- Moshe Y. Vardi:
More Is Different, in Social Media Too. 5
- Hemangee Kapoor, Cherri M. Pancake, Gerald Segal:
ACM's 2024 General Election. 7-21
- Herbert E. Bruderer, Alex Vakulov:
The Dangers of Digitization, and the Importance of Data Backup. 23-25
- Don Monroe:
More Efficient Fault-Tolerant Quantum Computing. 26-28 - Neil Savage:
Can ChatGPT Learn Chinese or Swahili? 29-31 - Gregory Mone:
Thirsty Fabs. 32-33
- James Grimmelmann:
The Return of Age Verification Laws. 34-36
- Victor Le Pochat:
Reflecting on Research Practices. 37-39
- Tamara L. Clegg:
Community Is Critical Too. 40-42
- William Dunbar:
Vendor-Locked DevOps Strategies. 43-44 - Nicholas Berente, Cameron Kormylo, Christoph Rosenkranz:
Test-Driven Ethics for Machine Learning. 45-47 - Andrew Strelzoff, Benjamin D. Trump, Christopher L. Cummings, Madison Smith, Stephanie Elisabeth Galaitsi, Kelsey Stoddard, Jeffrey M. Keisler, Moshe Y. Vardi, Nathaniel D. Bastian, Alexander Kott, Igor Linkov:
Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience. 48-51
- Divyansh Kaushik, Zachary C. Lipton, Alex John London:
Resolving the Human-Subjects Status of ML's Crowdworkers. 52-59 - David Chisnall:
How to Design an ISA. 60-66
- David G. Stork:
Computer Vision, ML, and AI in the Study of Fine Art. 68-75 - Shimon Schocken:
Nand to Tetris: Building a Modern Computer System from First Principles. 76-85 - Sukyoung Ryu, Jihyeok Park:
JavaScript Language Design and Implementation in Tandem. 86-95
- Narges Ahani, Paul Gölz, Ariel D. Procaccia, Alexander Teytelboym, Andrew C. Trapp:
Dynamic Placement in Refugee Resettlement. 99-106 - Daniel Freund:
Technical Perspective: Improving Refugees' Integration with Online Resource Allocation. 9898
Volume 67, Number 6, June 2024
- Vinton G. Cerf:
On the Difference between Security and Safety. 5
- David Ayman Shamma:
Taking Apart to Build Back Up. 7
- Generating Trust. 8-9
- Shaoshan Liu:
Shaping the Outlook for the Autonomy Economy. 10-12
- Neil Savage:
A Life of Complexity. 14-16 - Logan Kugler:
Raising the Dead with AI. 17-19 - Don Monroe:
A Quantum Leap in Factoring. 20-21 - Gregory Mone:
Poisoning Data to Protect It. 22-23
- Peter J. Denning, Todd W. Lyons:
Resistance Is Your Friend. 26-29
- Marc Steen:
The Problem with the Trolley Problem and the Need for Systems Thinking. 30-32
- George V. Neville-Neil:
Software Drift. 33-34
- Stevie Chancellor, Joseph A. Konstan, Loren Terveen, Svetlana Yarosh:
Do Know Harm: Considering the Ethics of Online Community Research. 35-38 - Eric Horvitz, Vincent Conitzer, Sheila A. McIlraith, Peter Stone:
Now, Later, and Lasting: 10 Priorities for AI Research, Policy, and Practice. 39-40
- Nicole Forsgren, Eirini Kalliamvakou, Abi Noda, Michaela Greiler, Brian Houck, Margaret-Anne D. Storey:
DevEx in Action. 42-51 - Christoph Kern:
Developer Ecosystems for Software Safety. 52-60
- David Harel, Assaf Marron:
The Human-or-Machine Issue: Turing-Inspired Reflections on an Everyday Matter. 62-69 - Ángel Goñi-Moreno:
Biocomputation: Moving Beyond Turing with Living Cellular Computers. 70-77 - Raúl Rojas:
The First Computer Program. 78-81 - Liang Yu, Emil Alégroth, Panagiota Chatzipetrou, Tony Gorschek:
A Roadmap for Using Continuous Integration Environments. 82-90
- Shyamnath Gollakota:
Creating the Internet of Biological and Bio-Inspired Things: Technical Perspective. 92 - Inhee Lee, Roger Hsiao, Gordy Carichner, Chin-Wei Hsu, Mingyu Yang, Sara Shoouri, Katherine Ernst, Tess Carichner, Yuyang Li, Jaechan Lim, Cole R. Julick, Eunseong Moon, Yi Sun, Jamie Phillips, Kristi L. Montooth, Delbert A. Green II, Hun-Seok Kim, David T. Blaauw:
mSAIL: Milligram-Scale Multi-Modal Sensor Platform for Monarch Butterfly Migration Tracking. 93-101
- Leah Hoffmann:
Specifying the Power and Limitations of Randomness.
Volume 67, Number 7, July 2024
- Moshe Y. Vardi:
Is Computing a Discipline in Crisis? 5
- Alex Williams:
Zero-Knowledge Proofs and Their Role within the Blockchain. 6-7
- Chris Edwards:
Data Quality May Be All You Need. 8-10 - Logan Kugler:
Digital Payment Issues. 11-13 - Samuel Greengard:
Lithography Lights a New Path. 14-16 - Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Gordon Bell. 17
- Abigail Sellen, Eric Horvitz:
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond. 18-23 - Carla E. Brodley, Catherine Gill:
The BPC Relevance of Common Assessment in the Introductory Sequence. 24-26
- Pamela Samuelson:
How to Think about Remedies in the Generative AI Copyright Cases. 27-30
- Sarah Scheffler:
Age Verification Systems Will Be a Personal Identifiable Information Nightmare. 31-33
- Padmal Vitharana, Shahir A. Daya:
Adopting and Sustaining Microservice-Based Software Development. 34-41 - Yifei Wang:
From Open Access to Guarded Trust. 42-45
- Valerie Barr, Carla E. Brodley, Manuel A. Pérez-Quiñones:
Visualizing Progress in Broadening Participation in Computing: The Value of Context. 46-55 - Jiwon Kim, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich:
Security Challenges of Intent-Based Networking. 56-65 - João Marques-Silva, Xuanxiang Huang:
Explainability Is Not a Game. 66-75
- Daniel Spielman:
Solve for x: Technical Perspective. 78 - Richard Peng, Santosh S. Vempala:
Solving Sparse Linear Systems Faster than Matrix Multiplication. 79-86
- Dennis Shasha:
Click Fulfillment.
Volume 67, Number 8, August 2024
- Vinton G. Cerf:
The Boundary Hunters. 5
- Ranjeeta Bhattacharya, Mario Antoine Aoun:
Using Generative AI in Finance, and the Lack of Emergent Behavior in LLMs. 6-7
- Chris Edwards:
Spinning Electrons to Attain Low-Power Computing. 8-10 - Gregory Goth:
Can Artificial Intelligence Be Open Sourced? 11-13 - Logan Kugler:
How Today's Recommender Systems Use Machine Learning to Cater to Your Every Whim. 14-16
- Elizabeth Novoa-Monsalve, David Patterson, Stephanie Ludi, Daniel E. Acuna:
Science Needs You: Mobilizing for Diversity in Award Recognition. 18-21 - Michael C. Loui, Nigel Bosch, Anita Say Chan, Jenny L. Davis, Rochelle Gutiérrez, Jingrui He, Karrie Karahalios, Sanmi Koyejo, Ruby Mendenhall, Madelyn Rose Sanfilippo, Hanghang Tong, Lav R. Varshney, Yang Wang:
Artificial Intelligence, Social Responsibility, and the Roles of the University. 22-25
- Joshua Sunshine, Joey Velez-Ginorio:
Research Experiences for Undergraduates Are Necessary for an Equitable Research Community. 26-28
- Ed Felten, Manav Raj, Rob Seamans:
Generative AI Requires Broad Labor Policy Considerations. 29-32
- George V. Neville-Neil:
Structuring Success. 33-34
- Fabio Kon, Barbara Poblete, Sebastián Uchitel:
Welcome. 36-37
- Diego Arroyuelo, Aidan Hogan, Gonzalo Navarro, Juan L. Reutter, Domagoj Vrgoc:
Tackling Challenges in Implementing Large-Scale Graph Databases. 40-44 - Armando Castañeda, Sergio Rajsbaum:
Recent Advances on Principles of Concurrent Data Structures. 45-46 - Roxana Lisette Quintanilla Portugal, Leandro Antonelli, Sabrina Marczak, Graciela Dora Susana Hadad, Jaelson Castro, Julio César Sampaio P. Leite:
Requirements Engineering in Latin America: The Case of the WER. 47-48 - Matías Toro, Federico Olmedo, Éric Tanter:
Gradual Differentially Private Programming. 49-53 - Hernán Maina, Laura Alonso Alemany, Guido Ivetta, Mariela Rajngewerc, Beatriz Busaniche, Luciana Benotti:
Exploring Stereotypes and Biases in Language Technologies in Latin America. 54-56
- Ivan Sipiran:
The Role of Computing in the Study of Latin American Cultural Heritage. 58-62 - Jazmín Vidal, Cyntia Bonomi, Pablo Riera, Luciana Ferrer:
Automatic Pronunciation Assessment Systems for English Students from Argentina. 63-67 - Gustavo Sibilla, Fernando Schapachnik, Maria Soledad Escobar:
GENis: Open Source Forensic Genetics Software for Judicial Cooperation. 68-69 - Jesús Favela, Dagoberto Cruz-Sandoval, Marcelo Marques da Rocha, Débora Christina Muchaluat-Saade:
Social Robots for Healthcare and Education in Latin America. 70-71
- Fabrício Benevenuto, Philipe Melo:
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil. 72-77 - Renzo Angles, Naim Bro, Ivania Donoso-Guzmán, Juan Pablo Luna, Aidan Hogan, Juan L. Reutter, Henry Rosales-Méndez, Sergio Toro:
Telar and TelarKG: Data-Driven Insights into Chile's Constitutional Process. 78-79
- Avelino F. Zorzo, Claudia L. R. Da Motta, Leila Ribeiro, Lisandro Z. Granville:
Computing Everywhere, for Everyone, at Any Level. 80-82 - Mara Borchardt, Inés Roggi, Fernando Schapachnik:
Keys to a Comprehensive Computer Science at School Policy in Argentina. 83-85 - Carlos Areces, Luciana Benotti, Franco Bulgarelli, Maria Emilia Echeveste, Nadia Finzi:
Leveraging Language Models and Automatic Summarization in Online Programming Learning Environments. 86-87 - Antônio Carlos Mariani, Lucas Machado da Palma, Jean Everson Martina:
The Digital Degree Certification Revolution in Brazil and Beyond. 88-89 - Cristiano Maciel, Indira R. Guzman, Rita Cristina Galarraga Berardi, Nadia Rodriguez-Rodriguez, Luciana Salgado, Luciana Bolan Frigo, Boris Branisa, Elizabeth Jiménez:
An Open Data Platform to Advance Gender Equality in STEM in Latin America. 90-92
- José A. Brenes, Gabriela Marín-Raventós:
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions. 93-94 - Álvaro Luiz Fazenda, Fábio Augusto Faria:
ForestEyes: Citizen Scientists and Machine Learning-Assisting Rainforest Conservation. 95-96
- Queenie Luo, Michael J. Puett, Michael D. Smith:
A Perspectival Mirror of the Elephant. 98-105 - Poul-Henning Kamp:
Free and Open Source Software and Other Market Failures. 106-108
- Donald D. Chamberlin:
50 Years of Queries. 110-121 - Carla E. Brodley, McKenna Quam, Mark Allen Weiss:
An Analysis of the Math Requirements of 199 CS BS/BA Degrees at 158 U.S. Universities. 122-131
- Paul Chow:
The Software-Centric Approach of SYNERGY: Technical Perspective. 133 - Joshua Landgraf, Tiffany Yang, Will Lin, Christopher J. Rossbach, Eric Schkufza:
Compiler-Driven FPGA Virtualization with SYNERGY. 134-142
- Soneyaa Rucher:
Triple Helix.
Volume 67, Number 9, September 2024
- Moshe Y. Vardi:
The Linear Fallacy. 5
- Kay Kukoyi:
A Technology Swiss Army Knife. 7
- Alex Williams:
Improving Memory Management, Performance with Rust: Why Rust is becoming the programming language of choice for many high-level developers. 8-9 - Daniel Lemire:
Will AI Flood Us with Irrelevant Papers? 9
- Neil Savage:
Beyond Turing: Testing LLMs for Intelligence. 10-12 - Esther Shein:
The Impact of AI on Computer Science Education. 13-15 - Samuel Greengard:
AI Reinvents Chip Design. 16-18
- Maarten Bullynck, Liesbeth De Mol:
The Myth of the Coder. 20-23
- Peter J. Denning:
Subscriptions. 24-26
- Faiza Tazi, Josiah Dykstra, Prashanth Rajivan, Kapil Chalil Madathil, Jiovanne Hughart, James T. McElligott, Daniel Votipka, Sanchari Das:
Improving Privacy and Security of Telehealth. 27-30 - Bruce Schneier:
LLMs' Data-Control Path Insecurity. 31-32 - Douglas Schuler:
Tools of Our Tools? Exploring the Cybercene Conjecture. 33-36
- James Grimmelmann:
Public Business and Private Accounts. 37-39
- William J. Bowman:
ACM Profits Considered Harmful. 40-42 - Vicki L. Hanson, Patricia Ryan:
ACM's Reserves Enable Its Mission. 43-46
- Jinnan Guo, Peter R. Pietzuch, Andrew Paverd, Kapil Vaswani:
Trustworthy AI Using Confidential Federated Learning. 48-53
- Ryen W. White:
Advancing the Search Frontier with AI Agents. 54-65 - Zishen Wan, Yiming Gan, Bo Yu, Shaoshan Liu, Arijit Raychowdhury, Yuhao Zhu:
The Vulnerability-Adaptive Protection Paradigm. 66-77
- Clayton H. Lewis:
Looking Ahead at Inclusive Technology. 79 - Steven M. Goodman, Erin Buehler, Patrick Clary, Andy Coenen, Aaron Donsbach, Tiffanie N. Horne, Michal Lahav, Robert MacDonald, Rain Breaw Michaels, Ajit Narayanan, Mahima Pushkarna, Joel Riley, Alex Santana, Lei Shi, Rachel Sweeney, Phil Weaver, Ann Yuan, Meredith Ringel Morris:
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models. 80-89
- Gregory Mone:
Imagining Intelligent Machines.
Volume 67, Number 10, October 2024
- Vinton G. Cerf:
The Global Digital Compact. 5
- Robin K. Hill:
Do All Problems Have Technical Fixes? 6-7
- Don Monroe:
Faster Integer Programming. 9-11 - Ron Westfall:
Non-Volatile Memory Technology Poised for Game-Changing Breakthrough. 12-14 - Chris Edwards:
A Hybrid Future for AI: The drive for efficiency brings large language models out of the cloud. 15-17
- Advait Sarkar:
AI Should Challenge, Not Obey. 18-21
- Michael A. Cusumano:
Private Crypto Versus Public Digital. 22-25
- Tanmoy Chakraborty, Sarah Masud:
The Promethean Dilemma of AI at the Intersection of Hallucination and Creativity. 26-28
- George V. Neville-Neil:
Repeat, Reproduce, Replicate. 29-30
- Amin Vahdat, Xiaoyu Ma, David A. Patterson:
New Computer Evaluation Metrics for a Changing World. 31-33
- Charles Garcia-Tobin, Mark Knight:
Elevating Security with Arm CCA. 34-39 - Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa:
Confidential Container Groups. 40-49
- Kyle Lo, Joseph Chee Chang, Andrew Head, Jonathan Bragg, Amy X. Zhang, Cassidy Trier, Chloe Anastasiades, Tal August, Russell Authur, Danielle Bragg, Erin Bransom, Isabel Cachola, Stefan Candra, Yoganand Chandrasekhar, Yen-Sung Chen, Evie Yu-Yen Cheng, Yvonne Chou, Doug Downey, Rob Evans, Raymond Fok, Fangzhou Hu, Regan Huff, Dongyeop Kang, Tae Soo Kim, Rodney Kinney, Aniket Kittur, Hyeonsu B. Kang, Egor Klevak, Bailey Kuehl, Michael Langan, Matt Latzke, Jaron Lochner, Kelsey MacMillan, Eric Marsh, Tyler Murray, Aakanksha Naik, Ngoc-Uyen Nguyen, Srishti Palani, Soya Park, Caroline Paulic, Napol Rachatasumrit, Smita Rao, Paul Sayre, Zejiang Shen, Pao Siangliulue, Luca Soldaini, Huy Tran, Madeleine van Zuylen, Lucy Lu Wang, Chris Wilhelm, Caroline Wu, Jiangjiang Yang, Angele Zamarron, Marti A. Hearst, Daniel S. Weld:
The Semantic Reader Project. 50-61 - Rafael Belchior, Jan Süßenguth, Qi Feng, Thomas Hardjono, André Vasconcelos, Miguel Correia:
A Brief History of Blockchain Interoperability. 62-69 - Aravinth Manivannan, Sibi Chakkaravarthy Sethuraman, Devi Priya Vimala Sudhakaran:
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility. 70-80
- Hamed Haddadi:
Revealing the Cracks in AA Services. 82 - Pouyan Fotouhi Tehrani, Eric Osterweil, Thomas C. Schmidt, Matthias Wählisch:
A Security Model for Web-Based Communication. 83-90 - Luis Ceze:
Optimizing Convolution Neural Nets with a Unified Transformation Approach. 91 - Jack Turner, Elliot J. Crowley, Michael F. P. O'Boyle:
Neural Architecture Search as Program Transformation Exploration. 92-100
- Dennis Shasha:
Rational Gambling.
Volume 67, Number 11, November 2024
- Moshe Y. Vardi:
What Is Theoretical Computer Science? 5
- Karu Sankaralingam:
A Whimsical Odyssey Through the Maze of Scholarly Reviews. 6-7
- Samuel Greengard:
Room-Temperature Superconductivity Heats Up. 8-10 - Neil Savage:
Automating Detective Work. 11-13 - Gregory Mone:
The Chiplet Revolution. 14-16
- Thomas Haigh:
Between the Booms: AI in Winter. 18-23
- Pamela Samuelson:
Do Social Media Platforms Have Free Speech Rights to 'Censor' Conservatives? 24-26
- Peter G. Neumann, Ulf Lindqvist:
The Future of Misuse Detection. 27-28
- Marshall W. Van Alstyne:
Free Speech vs. Free Ride: Navigating the Supreme Court's Social Media Paradox. 29-31
- David Gray Widder, Claire Le Goues:
What Is a 'Bug'? 32-34 - Philip Machanick:
Mentorship Lessons from Growing a Developing Country Journal. 35-37
- David Collier-Brown:
You Don't Know Jack about Bandwidth. 38-41 - Mansi Khemka, Brian Houck:
Toward Effective AI Support for Developers: A survey of desires and concerns. 42-49
- Vasant Dhar:
The Paradigm Shifts in Artificial Intelligence. 50-59 - Igor L. Markov:
Reevaluating Google's Reinforcement Learning for IC Macro Placement. 60-71 - Verena Zimmermann, Lorin Schöni, Thierry Schaltegger, Benjamin Ambuehl, Melanie Knieps, Nico Ebert:
Human-Centered Cybersecurity Revisited: From Enemies to Partners. 72-81 - Xudong Shen, Hannah Brown, Jiashu Tao, Martin Strobel, Yao Tong, Akshay Narayan, Harold Soh, Finale Doshi-Velez:
Directions of Technical Innovation for Regulatable AI Systems. 82-89
- Amy Hurst:
An Accessible Solution to Unlock Museums. 92 - Xiyue Wang, Seita Kayukawa, Hironobu Takagi, Chieko Asakawa:
BentoMuseum: 3D and Layered Interactive Museum Map for Blind Visitors. 93-102 - Battista Biggio:
Machine Learning in Computer Security is Difficult to Fix. 103 - Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck:
Pitfalls in Machine Learning for Computer Security. 104-112
- Leah Hoffmann:
Looking Within.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.