Journal: Communications of the ACM

Volume 67, Issue 11

0 -- 0Leah Hoffmann. Looking Within
5 -- 0Moshe Y. Vardi. What Is Theoretical Computer Science?
6 -- 7Karu Sankaralingam. A Whimsical Odyssey Through the Maze of Scholarly Reviews
8 -- 10Samuel Greengard. Room-Temperature Superconductivity Heats Up
11 -- 13Neil Savage. Automating Detective Work
14 -- 16Gregory Mone. The Chiplet Revolution
18 -- 23Thomas Haigh. Between the Booms: AI in Winter
24 -- 26Pamela Samuelson. Do Social Media Platforms Have Free Speech Rights to 'Censor' Conservatives?
27 -- 28Peter G. Neumann, Ulf Lindqvist. The Future of Misuse Detection
29 -- 31Marshall W. van Alstyne. Free Speech vs. Free Ride: Navigating the Supreme Court's Social Media Paradox
32 -- 34David Gray Widder, Claire Le Goues. What Is a 'Bug'?
35 -- 37Philip Machanick. Mentorship Lessons from Growing a Developing Country Journal
38 -- 41David Collier-Brown. You Don't Know Jack about Bandwidth
42 -- 49Mansi Khemka, Brian Houck. Toward Effective AI Support for Developers: A survey of desires and concerns
50 -- 59Vasant Dhar. The Paradigm Shifts in Artificial Intelligence
60 -- 71Igor L. Markov. Reevaluating Google's Reinforcement Learning for IC Macro Placement
72 -- 81Verena Zimmermann, Lorin Schöni, Thierry Schaltegger, Benjamin Ambuehl, Melanie Knieps, Nico Ebert. Human-Centered Cybersecurity Revisited: From Enemies to Partners
82 -- 89Xudong Shen, Hannah Brown, Jiashu Tao, Martin Strobel 0001, Yao Tong, Akshay Narayan 0002, Harold Soh, Finale Doshi-Velez. Directions of Technical Innovation for Regulatable AI Systems
92 -- 0Amy Hurst. An Accessible Solution to Unlock Museums
93 -- 102Xiyue Wang, Seita Kayukawa, Hironobu Takagi, Chieko Asakawa. BentoMuseum: 3D and Layered Interactive Museum Map for Blind Visitors
103 -- 0Battista Biggio. Machine Learning in Computer Security is Difficult to Fix
104 -- 112Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck. Pitfalls in Machine Learning for Computer Security