Journal: Communications of the ACM

Volume 65, Issue 9

0 -- 0Leah Hoffmann. Advancing the ability of robots to help
5 -- 0Moshe Y. Vardi. Technology and democracy
7 -- 0Kristian Sørensen. The making of an IT strategy consultant
8 -- 9Subbarao Kambhampati. Changing the nature of AI research
11 -- 13Chris Edwards. Competition makes big datasets the winners
14 -- 16Keith Kirkpatrick. The road to 6G
17 -- 18Logan Kugler. How AI is driving the esports boom
20 -- 22Andres Guadamuz. These are not the apes you are looking for
23 -- 25Andreas Kuehn. Security by labeling
26 -- 29Peter Denning, Roland N. Ibbett. The Atlas milestone
30 -- 32William J. Dally. On the model of computation: point
32 -- 34Uzi Vishkin. On the model of computation: counterpoint
35 -- 37Florence Maraninchi. Let us not put all our eggs in one basket
38 -- 42Alexandros Gazis, Eleftheria Katsiri. Middleware 101
43 -- 47Archie L. Cobbs. Persistence programming
48 -- 57Carmela Troncoso, Dan Bogdanov, Edouard Bugnion, Sylvain Chatel, Cas Cremers, Seda F. Gürses, Jean-Pierre Hubaux, Dennis Jackson, James R. Larus, Wouter Lueks, Rui Oliveira 0001, Mathias Payer, Bart Preneel, Apostolos Pyrgelis, Marcel Salathé, Theresa Stadler, Michael Veale. Deploying decentralized, privacy-preserving proximity tracing
58 -- 66Leslie Lamport. Deconstructing the bakery to build a distributed state machine
68 -- 78Majd Latah, Kübra Kalkan. When SDN and blockchain shake hands
82 -- 0Falko Dressler. Physical layer resilience through deep learning in software radios: technical perspective
83 -- 91Francesco Restuccia, Tommaso Melodia. Polymorphic wireless receivers
92 -- 0Nicolas Christin. The effectiveness of security measures: technical perspective
93 -- 102Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, Stefan Savage. Measuring security practices