Stop the war!
Остановите войну!
for scientists:
default search action
Communications of the ACM, Volume 67
Volume 67, Number 1, January 2024
- Moshe Y. Vardi:
Computing, You Have Blood on Your Hands! 5
- Sam Zheng:
From Eye Tracking to AI-Powered Learning. 7
- Alex Vakulov:
Protecting Life-Saving Medical Devices from Cyberattack. 8-9
- Don Monroe:
Epigenomics Now. 11-13 - Gregory Goth:
Why Are Lawyers Afraid of AI? 14-16 - Samuel Greengard:
Wayfinding Without GPS. 17-19
- Wendy Hall, Divesh Srivastava, Scott E. Delman:
ACM Publications Finances for 2022: Striving for Balance between Mission, Sustainability, and Growth. 22-26
- Gianluca Demartini, Kevin Roitero, Stefano Mizzaro:
Data Bias Management. 28-32
- Michael A. Cusumano:
NVIDIA at the Center of the Generative AI Ecosystem - For Now. 33-35
- Kyle Langvardt, Alan Z. Rozenshtein:
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet. 36-38
- Sabah Suhail, Mubashar Iqbal, Raja Jurdak:
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers. 39-42
- Ana Pop Stefanija, Bart Buelens, Elfi Goesaert, Tom Lenaerts, Jo Pierson, Jan Van den Bussche:
Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence. 43-46 - Danfeng (Daphne) Yao:
Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research. 47-49
- Leah Hoffmann:
Achievement in Microarchitecture. 50-51
- Mark Russinovich:
Confidential Computing: Elevating Cloud Security and Privacy. 52-53 - David Kaplan:
Hardware VM Isolation in the Cloud. 54-59 - Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Rob Nertney, Michael O'Connor, Phil Rogers:
Creating the First Confidential GPUs. 60-67 - Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich:
Why Should I Trust Your Code? 68-76
- Neil C. C. Brown, Felienne F. J. Hermans, Lauren E. Margulieux:
10 Things Software Developers Should Learn about Learning. 78-87 - Manish Raghavan:
What Should We Do when Our Ideas of Fairness Conflict? 88-97 - Dhaminda B. Abeywickrama, Amel Bennaceur, Greg Chance, Yiannis Demiris, Anastasia Kordoni, Mark Levine, Luke Moffat, Luc Moreau, Mohammad Reza Mousavi, Bashar Nuseibeh, Subramanian Ramamoorthy, Jan Oliver Ringert, James Wilson, Shane Windsor, Kerstin Eder:
On Specifying for Trustworthiness. 98-109 - Mengnan Du, Fengxiang He, Na Zou, Dacheng Tao, Xia Hu:
Shortcut Learning of Large Language Models in Natural Language Understanding. 110-120
- Annalu Waller:
Technical Perspective: The User as a Key Ingredient in AAC Design. 122 - Stephanie Valencia, Mark Steidl, Michael L. Rivera, Cynthia L. Bennett, Jeffrey P. Bigham, Henny Admoni:
Nonverbal Communication through Expressive Objects. 123-131
- Dennis Shasha:
Seesaw Gold.
Volume 67, Number 2, February 2024
- Vinton G. Cerf:
Validating Factual Personal Information. 5
- Alex Tray:
Why Bother Localizing Information Technology Products? 6-7
- Erica Klarreich:
Algorithmic Advance: The Group Isomorphism Problem. 9-11 - Chris Edwards:
Teaching Transformed. 12-13 - Gregory Mone:
Virtual Reality as Therapy. 14-15
- Christopher Hoadley, Sara Vogel:
Autocorrect Is Not: People Are Multilingual and Computer Science Should Be Too. 16-18
- Nicholas Diakopoulos, Christoph Trattner, Dietmar Jannach, Irene Costera Meijer, Enrico Motta:
Leveraging Professional Ethics for Responsible AI. 19-21
- Thomas Haigh:
How the AI Boom Went Bust. 22-26
- George V. Neville-Neil:
Dear Diary. 27-28
- Rahul Simha, Amruth N. Kumar, Rajendra K. Raj:
Undergraduate Computer Science Curricula. 29-31 - Steven Fraser, Dennis Mancl:
Virtual and the Future of Conferences. 32-34 - Alfred Z. Spector:
Gaining Benefit from Artificial Intelligence and Data Science: A Three-Part Framework. 35-38
- Phil Vachon:
Security Mismatch. 40-41 - Thomas A. Limoncelli:
Knowing What You Need to Know. 42-46
- Maarten Buyl, Tijl De Bie:
Inherent Limitations of AI Fairness. 48-55 - Paul Denny, James Prather, Brett A. Becker, James Finnie-Ansley, Arto Hellas, Juho Leinonen, Andrew Luxton-Reilly, Brent N. Reeves, Eddie Antonio Santos, Sami Sarsa:
Computing Education in the Era of Generative AI. 56-67 - Murray Shanahan:
Talking about Large Language Models. 68-79 - Rae Yule Kim:
Anthropomorphism and Human-Robot Interaction. 80-85 - David Patterson, Jeffrey M. Gilbert, Marco Gruteser, Efren Robles, Krishna Sekar, Yong Wei, Tenghui Zhu:
Energy and Emissions of Machine Learning on Smartphones vs. the Cloud. 86-97
- Nitin Saxena:
How Easy Is It to Describe Hard Polynomials?: Technical Perspective. 100 - Nutan Limaye, Srikanth Srinivasan, Sébastien Tavenas:
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits. 101-108 - Giorgio Buttazzo:
Bridging AI with Real-Time Systems: Technical Perspective. 109 - Shengzhong Liu, Shuochao Yao, Xinzhe Fu, Rohan Tabish, Simon Yu, Ayoosh Bansal, Heechul Yun, Lui Sha, Tarek F. Abdelzaher:
Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines. 110-117
- Brian Clegg:
The Human Touch.
Volume 67, Number 3, March 2024
- Moshe Y. Vardi:
What Do Computing and Economics Have to Say to Each Other? 5
- David Patterson, Jeffrey M. Gilbert, Marco Gruteser, Efren Robles, Krishna Sekar, Yong Wei, Tenghui Zhu:
Corrigendum for February 2024 Article. 6
- Thomas Morton:
Computations for This World and out of This World. 7
- Robin K. Hill, Carlos Baquero:
Pondering the Ugly Underbelly, and Whether Images Are Real. 8-10
- Samuel Greengard:
Service Robots Roll Forward. 11-13 - Logan Kugler:
The Battle to Mitigate E-Waste. 14-16 - Esther Shein:
What's That Smell? 17-19 - Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Niklaus Wirth. 20
- Filippo Gualtiero Blancato:
Innovation Is Overrated: A Provocation. 22-24
- Pamela Samuelson:
U.S. Copyright Office's Questions about Generative AI. 25-28
- Lorrie Faith Cranor, Yuvraj Agarwal, Pardis Emami Naeini:
Internet of Things Security and Privacy Labels Should Empower Consumers. 29-31
- Peter J. Denning, B. Scot Rousse:
Can Machines Be in Language? 32-35
- Wojciech Mazurczyk, Dongwon Lee, Andreas Vlachos:
Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective. 36-39 - Gordon Burtch, Dokyun Lee, Zhichen Chen:
Generative AI Degrades Online Communities. 40-42
- Harsh Deokuliar, Raghvinder S. Sangwan, Yoaukim Badr, Satish M. Srinivasan:
Improving Testing of Deep-Learning Systems. 44-48 - Kate Matsudaira:
Software Managers' Guide to Operational Excellence. 49-51
- Albert Ziegler, Eirini Kalliamvakou, X. Alice Li, Andrew Rice, Devon Rifkin, Shawn Simister, Ganesh Sittampalam, Edward Aftandilian:
Measuring GitHub Copilot's Impact on Productivity. 54-63 - Saad Ahmed, Bashima Islam, Kasim Sinan Yildirim, Marco Zimmerling, Przemyslaw Pawelczak, Muhammad Hamad Alizai, Brandon Lucia, Luca Mottola, Jacob Sorber, Josiah D. Hester:
The Internet of Batteryless Things. 64-73 - Benny Kimelfeld, Phokion G. Kolaitis:
A Unifying Framework for Incompleteness, Inconsistency, and Uncertainty in Databases. 74-83 - Roderick Chapman, Claire Dross, Stuart Matthews, Yannick Moy:
Co-Developing Programs and Their Proof of Correctness. 84-94
- Daniel Wichs:
Technical Perspective: Hiding Secrets in Programs. 96 - Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. 97-105
- Leah Hoffmann:
Verifying Correctness.
Volume 67, Number 4, April 2024
- Vinton G. Cerf:
Thoughts on AI Interoperability. 5
- Orit Hazzan, Avital Binah-Pollak:
Using Data Science to Predict How Rituals Will Evolve. 6-8
- Chris Edwards:
Answers Begin to Surface to Deep Earth Puzzles. 9-11 - Esther Shein:
Governments Setting Limits on AI. 12-14 - Keith Kirkpatrick:
Abusing AI for Advertising. 15-17
- Mari Sako:
How Generative AI Fits into Knowledge Work. 20-22
- Maggie Johnson:
Generative AI and CS Education. 23-24 - Henry Farrell, Cosma Rohilla Shalizi:
Bias, Skew, and Search Engines Are Sufficient to Explain Online Toxicity. 25-28
- George V. Neville-Neil:
Is There Another System? 29-30
- Guglielmo Faggioli, Laura Dietz, Charles L. A. Clarke, Gianluca Demartini, Matthias Hagen, Claudia Hauff, Noriko Kando, Evangelos Kanoulas, Martin Potthast, Benno Stein, Henning Wachsmuth:
Who Determines What Is Relevant? Humans or AI? Why Not Both? 31-34 - Hemangee K. Kapoor, David A. Patterson:
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India. 35-36
- Geoffrey H. Cooper:
Device Onboarding Using FDO and the Untrusted Installer Model. 38-45 - Phil Vachon:
The Security Jawbreaker. 46-48
- Ruixiang Tang, Yu-Neng Chuang, Xia Hu:
The Science of Detecting LLM-Generated Text. 50-59 - Minhyung Lee, Jinyoung Min, Junyeong Lee, Chanhee Kwak, HanByeol Stella Choi:
A Small Clue Made of Fragmented Pieces. 60-69 - Anne-Sophie Himmel, George B. Mertzios, André Nichterlein, Rolf Niedermeier:
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems. 70-79 - Dominic Steinhöfel, Andreas Zeller:
Language-Based Software Testing. 80-84
- Doug Lea:
Technical Perspective: Learning-Based Memory Allocation for C++ Server Workloads. 86 - Martin Maas, David G. Andersen, Michael Isard, Mohammad Mahdi Javanmard, Kathryn S. McKinley, Colin Raffel:
Combining Machine Learning and Lifetime-Based Resource Management for Memory Allocation and Beyond. 87-96
- Dennis Shasha:
Jump Snatch.
Volume 67, Number 5, May 2024
- Boisy Pitre:
A Fit of Anger.
- Moshe Y. Vardi:
More Is Different, in Social Media Too. 5
- Hemangee Kapoor, Cherri M. Pancake, Gerald Segal:
ACM's 2024 General Election. 7-21
- Herbert E. Bruderer, Alex Vakulov:
The Dangers of Digitization, and the Importance of Data Backup. 23-25
- Don Monroe:
More Efficient Fault-Tolerant Quantum Computing. 26-28 - Neil Savage:
Can ChatGPT Learn Chinese or Swahili? 29-31 - Gregory Mone:
Thirsty Fabs. 32-33
- James Grimmelmann:
The Return of Age Verification Laws. 34-36
- Victor Le Pochat:
Reflecting on Research Practices. 37-39
- Tamara L. Clegg:
Community Is Critical Too. 40-42
- William Dunbar:
Vendor-Locked DevOps Strategies. 43-44 - Nicholas Berente, Cameron Kormylo, Christoph Rosenkranz:
Test-Driven Ethics for Machine Learning. 45-47 - Andrew Strelzoff, Benjamin D. Trump, Christopher L. Cummings, Madison Smith, Stephanie Elisabeth Galaitsi, Kelsey Stoddard, Jeffrey M. Keisler, Moshe Y. Vardi, Nathaniel Bastian, Alexander Kott, Igor Linkov:
Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience. 48-51
- Divyansh Kaushik, Zachary C. Lipton, Alex John London:
Resolving the Human-Subjects Status of ML's Crowdworkers. 52-59 - David Chisnall:
How to Design an ISA. 60-66
- David G. Stork:
Computer Vision, ML, and AI in the Study of Fine Art. 68-75 - Shimon Schocken:
Nand to Tetris: Building a Modern Computer System from First Principles. 76-85 - Sukyoung Ryu, Jihyeok Park:
JavaScript Language Design and Implementation in Tandem. 86-95
- Narges Ahani, Paul Gölz, Ariel D. Procaccia, Alexander Teytelboym, Andrew C. Trapp:
Dynamic Placement in Refugee Resettlement. 99-106 - Daniel Freund:
Technical Perspective: Improving Refugees' Integration with Online Resource Allocation. 9898
Volume 67, Number 6, June 2024
- Vinton G. Cerf:
On the Difference between Security and Safety. 5
- David Ayman Shamma:
Taking Apart to Build Back Up. 7
- Generating Trust. 8-9
- Shaoshan Liu:
Shaping the Outlook for the Autonomy Economy. 10-12
- Neil Savage:
A Life of Complexity. 14-16 - Logan Kugler:
Raising the Dead with AI. 17-19 - Don Monroe:
A Quantum Leap in Factoring. 20-21 - Gregory Mone:
Poisoning Data to Protect It. 22-23
- Peter J. Denning, Todd W. Lyons:
Resistance Is Your Friend. 26-29
- Marc Steen:
The Problem with the Trolley Problem and the Need for Systems Thinking. 30-32
- George V. Neville-Neil:
Software Drift. 33-34
- Stevie Chancellor, Joseph A. Konstan, Loren Terveen, Svetlana Yarosh:
Do Know Harm: Considering the Ethics of Online Community Research. 35-38 - Eric Horvitz, Vincent Conitzer, Sheila A. McIlraith, Peter Stone:
Now, Later, and Lasting: 10 Priorities for AI Research, Policy, and Practice. 39-40
- Nicole Forsgren, Eirini Kalliamvakou, Abi Noda, Michaela Greiler, Brian Houck, Margaret-Anne D. Storey:
DevEx in Action. 42-51 - Christoph Kern:
Developer Ecosystems for Software Safety. 52-60
- David Harel, Assaf Marron:
The Human-or-Machine Issue: Turing-Inspired Reflections on an Everyday Matter. 62-69 - Ángel Goñi-Moreno:
Biocomputation: Moving Beyond Turing with Living Cellular Computers. 70-77 - Raúl Rojas:
The First Computer Program. 78-81 - Liang Yu, Emil Alégroth, Panagiota Chatzipetrou, Tony Gorschek:
A Roadmap for Using Continuous Integration Environments. 82-90
- Shyamnath Gollakota:
Creating the Internet of Biological and Bio-Inspired Things: Technical Perspective. 92 - Inhee Lee, Roger Hsiao, Gordy Carichner, Chin-Wei Hsu, Mingyu Yang, Sara Shoouri, Katherine Ernst, Tess Carichner, Yuyang Li, Jaechan Lim, Cole R. Julick, Eunseong Moon, Yi Sun, Jamie Phillips, Kristi L. Montooth, Delbert A. Green II, Hun-Seok Kim, David T. Blaauw:
mSAIL: Milligram-Scale Multi-Modal Sensor Platform for Monarch Butterfly Migration Tracking. 93-101
- Leah Hoffmann:
Specifying the Power and Limitations of Randomness.
Volume 67, Number 7, July 2024
- Moshe Y. Vardi:
Is Computing a Discipline in Crisis? 5
- Alex Williams:
Zero-Knowledge Proofs and Their Role within the Blockchain. 6-7
- Chris Edwards:
Data Quality May Be All You Need. 8-10 - Logan Kugler:
Digital Payment Issues. 11-13 - Samuel Greengard:
Lithography Lights a New Path. 14-16 - Simson L. Garfinkel, Eugene H. Spafford:
In Memoriam: Gordon Bell. 17
- Abigail Sellen, Eric Horvitz:
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond. 18-23 - Carla E. Brodley, Catherine Gill:
The BPC Relevance of Common Assessment in the Introductory Sequence. 24-26
- Pamela Samuelson:
How to Think about Remedies in the Generative AI Copyright Cases. 27-30
- Sarah Scheffler:
Age Verification Systems Will Be a Personal Identifiable Information Nightmare. 31-33
- Padmal Vitharana, Shahir A. Daya:
Adopting and Sustaining Microservice-Based Software Development. 34-41 - Yifei Wang:
From Open Access to Guarded Trust. 42-45
- Valerie Barr, Carla E. Brodley, Manuel A. Pérez-Quiñones:
Visualizing Progress in Broadening Participation in Computing: The Value of Context. 46-55 - Jiwon Kim, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich:
Security Challenges of Intent-Based Networking. 56-65 - João Marques-Silva, Xuanxiang Huang:
Explainability Is Not a Game. 66-75
- Daniel Spielman:
Solve for x: Technical Perspective. 78 - Richard Peng, Santosh S. Vempala:
Solving Sparse Linear Systems Faster than Matrix Multiplication. 79-86
- Dennis Shasha:
Click Fulfillment.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.