Journal: Communications of the ACM

Volume 63, Issue 4

0 -- 0Leah Hoffmann. Reinventing virtual machines
5 -- 0Cherri M. Pancake. New ways to think about CS education
7 -- 0Vinton G. Cerf. Multisensory adventures
9 -- 0CACM Staff. Adding more color to patch picture
10 -- 11Mark Guzdial. Teaching teachers to offer STEM to undergrads
13 -- 15Gary Anthes. Dead languages come to life
16 -- 17Gregory Mone. Machine learning, meet whiskey
18 -- 20Esther Shein. How universities deploy student data
22 -- 24Alan Rubel, Kyle M. L. Jones. The temptation of data-enabled surveillance
25 -- 27Mari Sako. Artificial intelligence and the future of professional work
28 -- 29George V. Neville-Neil. Master of tickets
30 -- 34Gaurav Banga. Why is cybersecurity not a human-scale problem anymore?
35 -- 38Audrey Girouard, Jon E. Froehlich, Regan L. Mandryk, Mark Hancock. Organizing family support services at ACM conferences
39 -- 41Jerrold M. Grochow. A taxonomy of automated assistants
44 -- 46Sue Moon, Ann Nicholson, Abhik Roychoudhury. Welcome
48 -- 49Ken-ichi Kawarabayashi. The NII Shonan meeting in Japan
50 -- 52Sally Jo Cunningham, Fariz Darari, Adila Krisnadhi, Annika Hinze. Capturing cultural heritage in East Asia and Oceania
53 -- 54Carsten Rudolph, Sadie Creese, Sameer Sharma. Cybersecurity in Pacific Island nations
55 -- 57Karen Teh, Vivy Suhendra, Soon Chia Lim, Abhik Roychoudhury. Singapore's cybersecurity ecosystem
58 -- 59Thomas Ho Chee Tat, George Loh Chee Ping. Innovating services and digital economy in Singapore
60 -- 63Sintia Teddy-Ang, Abigail Toh. AI Singapore: empowering a smart nation
62 -- 0Lam Kwok Yan, Campbell Wilson. Developing AI for law enforcement in Singapore and Australia
64 -- 67Chris Bain, Abraham Oshni Alvandi. Digital healthcare across Oceania
68 -- 71Meeyoung Cha, Wei Gao, Cheng-Te Li. Detecting fake news in social media: an Asia-Pacific perspective
72 -- 75Gernot Heiser, Gerwin Klein, June Andronick. seL4 in Australia: from research to real-world trustworthy systems
76 -- 81Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo 0001, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong-Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu 0001, Jianying Zhou 0001. Advances in security research in the Asiacrypt region
82 -- 85Dong Ku Kim, Hyeonwoo Lee, Seong-Choon Lee, SunWoo Lee. 5G commercialization and trials in Korea
86 -- 88Sang Kil Cha, Zhenkai Liang. Asia's surging interest in binary analysis
90 -- 96Laura M. D. Maguire. Managing the hidden costs of coordination
97 -- 103Marisa R. Grayson. Cognitive work of hypothesis exploration during anomaly response
104 -- 107Daniel W. Woods, Tyler Moore. Cyber warranties: market fix or marketing trick?
108 -- 115Herbert E. Bruderer. The Antikythera mechanism
118 -- 0Ariel D. Procaccia. An answer to fair division's most enigmatic question: technical perspective
119 -- 126Haris Aziz 0001, Simon Mackenzie. A bounded and envy-free cake cutting algorithm