Journal: Communications of the ACM

Volume 66, Issue 9

0 -- 0Leah Hoffmann. How Many Ways Can You Teach a Robot?
5 -- 0Moshe Y. Vardi. To Regulate Tech, Nullify Click-Through Contracts
7 -- 0Fiona Rivera. Finding the Right Mix of Creativity and Technology
8 -- 9Carlos Baquero. A Year Embedded in the Crypto-NFT Space
10 -- 12Chris Edwards. Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough
13 -- 14Esther Shein. Shining a Light on the Dark Web
15 -- 17Samuel Greengard. Distilling What We Know
18 -- 20Tejas N. Narechania. Closing Our Digital Divides
21 -- 23Stefano Zanero. Coming of Age
24 -- 27Peter J. Denning. The Smallness of Large Language Models
28 -- 31Weiyue Wu, Shaoshan Liu. Dilemma of the Artificial Intelligence Regulatory Landscape
32 -- 34Katrina Ligett, Kobbi Nissim. We Need to Focus on How Our Data Is Used, Not Just How It Is Shared
35 -- 41Nachum Dershowitz, Rakesh M. Verma. Rebutting Rebuttals
42 -- 45Taha Yasseri, Filippo Menczer. Can Crowdsourcing Rescue the Social Marketplace of Ideas?
46 -- 51Edlyn V. Levine. Cargo Cult AI
52 -- 54Kostis Kaffes, Peter Alvaro. Research for Practice: OS Scheduling
56 -- 63Shengdong Zhao, Felicia Tan 0002, Katherine Fennedy. Heads-Up Computing Moving Beyond the Device-Centered Paradigm
64 -- 72Georgios Bakirtzis, Steven Carr, David Danks, Ufuk Topcu. Dynamic Certification for Autonomous Systems
73 -- 79Bran Knowles, Jason D'Cruz, John T. Richards, Kush R. Varshney. Humble AI
80 -- 92Samuel Kounev, Nikolas Herbst, Cristina L. Abad, Alexandru Iosup, Ian T. Foster, Prashant Shenoy, Omer F. Rana, Andrew A. Chien. Serverless Computing: What It Is, and What It Is Not?
94 -- 0David P. Woodruff. Technical Perspective: Tapping the Link between Algorithmic Model Counting and Streaming
95 -- 102A. Pavan 0001, N. V. Vinodchandran, Arnab Bhattacharyya 0001, Kuldeep S. Meel. Model Counting Meets Distinct Elements

Volume 66, Issue 8

0 -- 0Jofish Kaye. L-Space and Large Language Models
5 -- 0Andrew A. Chien. 2
7 -- 0Vinton G. Cerf. Large Language Models
10 -- 11Jason I. Hong. Teaching the FATE Community about Privacy
12 -- 14Don Monroe. Computer-Assisted Proofs Take on Fluid Flow
15 -- 16Samuel Greengard. 3D Modeling Draws on AI
17 -- 19Keith Kirkpatrick. The Carbon Footprint of Artificial Intelligence
20 -- 23Tom Williams 0001, Cynthia Matuszek, Kristiina Jokinen, Raj Korpan, James Pustejovsky, Brian Scassellati. Voice in the Machine: Ethical Considerations for Language-Capable Robots
24 -- 26R. Benjamin Shapiro, Kayla DesPortes, Betsy DiSalvo. Improving Computing Education Research through Valuing Design
27 -- 28George V. Neville-Neil. The Human Touch
29 -- 31Hakan Temiz. SI and Binary Prefixes: Clearing the Confusion
32 -- 34Javier Luis Cánovas Izquierdo, Jordi Cabot. For a More Transparent Governance of Open Source
35 -- 38Wesley Sheh, Joel Nishimura. Why You Should Be Able to Make Your Own Individualized, Digital Nano-Currency
39 -- 42Benjamin Kuipers. AI and Society: Ethics, Trust, and Cooperation
44 -- 52Simson L. Garfinkel, Jon Stewart 0001. Sharpening Your Tools
53 -- 61Peter Norvig, Alfred Z. Spector, Chris Wiggins 0001, Jeannette M. Wing, Ben Fried, Michael Tingley. More Than Just Algorithms
62 -- 73Tom Hope, Doug Downey, Daniel S. Weld, Oren Etzioni, Eric Horvitz. A Computational Inflection for Scientific Discovery
74 -- 83Kris Oosthoek, Jack Cable, Georgios Smaragdakis. A Tale of Two Markets: Investigating the Ransomware Payments Economy
84 -- 92Mohammad Hossein Jarrahi, Ali Memariani, Shion Guha. The Principles of Data-Centric AI
94 -- 0Sara Alouf. Technical Perspective: Can We Uncover Private Backbone Infrastructures?
95 -- 103Loqman Salamatian, Scott Anderson, Joshua Matthews, Paul Barford, Walter Willinger, Mark Crovella. A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers
104 -- 0John Richards. Technical Perspective: Pandemics, Remote Work, and Accessibility
105 -- 113Kelly Mack, Maitraye Das, Dhruv Jain, Danielle Bragg, John Tang, Andrew Begel, Erin Beneteau, Josh Urban Davis, Abraham Glasser, Joon-Sung Park, Venkatesh Potluri. Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship

Volume 66, Issue 7

0 -- 0Dennis E. Shasha. Sampling the Goods
5 -- 0Moshe Y. Vardi. Revisiting ACM's Open-Conference Principle
7 -- 0Hina Elton. From UX to Product: An Intentional Career Route
9 -- 0CACM Staff. The End Is Not Clear
10 -- 11Vivienne Sze. Unleashing the Power of Deep Learning
13 -- 15Chris Edwards. Accelerating Optical Communications with AI
16 -- 17Neil Savage. The Rise of the Chatbots
18 -- 19Gregory Mone. Outsmarting Deepfake Video
20 -- 23Pamela Samuelson. Legal Challenges to Generative AI, Part I
24 -- 27Alessandro Acquisti, Ryan Steed. Learning to Live with Privacy-Preserving Analytics
28 -- 31Jeff A. Johnson, Daniel H. Bullock. Fragility in AIs Using Artificial Neural Networks
32 -- 34Tariq Zaman. Lost in Afghanistan: Can the World Take ICT4D Seriously?
36 -- 38Flora D. Salim, Bingsheng He, Ken-ichi Kawarabayashi. Welcome
40 -- 45Damiano Spina, Mark Sanderson, Daniel Angus, Gianluca Demartini, Dana McKay, Lauren L. Saling, Ryen W. White. Human-AI Cooperation to Tackle Misinformation and Polarization
46 -- 51Ji-Hoon Kim, Sungyeob Yoo, Joo-Young Kim 0001. South Korea's Nationwide Effort for AI Semiconductor Industry
52 -- 57Tao Luo 0014, Weng-Fai Wong, Rick Siow Mong Goh, Anh-Tuan Do, Zhixian Chen, Haizhou Li, Wenyu Jiang, Weiyun Yau. Achieving Green AI with Energy-Efficient Deep Learning Using Neuromorphic Computing
58 -- 63Masaru Kitsuregawa, Shigeo Urushidani, Kazutsuna Yamaji, Hiroki Takakura, Ichiro Hasuo, Imari Sato, Fuyuki Ishikawa, Isao Echizen, Kensaku Mori. Activities of National Institute of Informatics in Japan
64 -- 66Qinghua Lu 0001, Liming Zhu 0001, Xiwei Xu 0001, Jon Whittle 0001, Didar Zowghi, Aurelie Jacquet. Operationalizing Responsible AI at Scale: CSIRO Data61's Pattern-Oriented Responsible AI Engineering Approach
67 -- 69Markus Luczak-Rösch, Matthias Galster, Kevin Shedlock. The Veracity Grand Challenge in Computing: A Perspective from Aotearoa New Zealand
70 -- 71Sourav S. Bhowmick. CLOSET: Data-Driven COI Detection and Management in Peer-Review Venues
72 -- 74Hiroaki Ogata, Rwitajit Majumdar, Brendan Flanagan. Learning and Evidence Analytics Framework Bridges Research and Practice for Educational Data Science
75 -- 76Hung Bui 0001, Nguyen Minh Le 0001, Dat Quoc Nguyen, Linh Pham, Dinh Q. Phung. Building and Nurturing AI Development in Vietnam
77 -- 78Hao Zhang, Jun Yang, Cheng Chen, Siqi Wang, Jiashu Li, Mian Lu. Principles and Practices of Real-Time Feature Computing Platforms for ML
79 -- 80Vincent Gramoli, Qiang Tang. The Future of Blockchain Consensus
81 -- 82Guntur Dharma Putra, Sidra Malik, Volkan Dedeoglu, Raja Jurdak, Salil S. Kanhere. Challenges in Designing Blockchain for Cyber-Physical Systems
83 -- 84Sourav S. Bhowmick, Byron Choi. To Draw Is Human: Toward No-Code Subgraph Search
85 -- 86Eiji Ikoma, Masaru Kitsuregawa. DIAS - Earth Environment Data Integration and Analysis System
87 -- 88Dimitrios Georgakopoulos, Prem Prakash Jayaraman. Digital Twins and Dependency/Constraint-Aware AI for Digital Manufacturing
89 -- 90Anusha Withana. Co-Designing Personalized Assistive Devices Using Personal Fabrication
91 -- 0Masahiko Inami. JIZAI Body: Human-Machine Integration Based on Asian Thought
92 -- 93Yoshihiro Kawahara. Fusing Creativity and Innovation in Asia's Manufacturing Industry
94 -- 95Teruo Higashino, Hidetoshi Kotera, Yasushi Yagi. MEXT Society 5.0 Realization Research Support Project
96 -- 104Kelly Shortridge, Josiah Dykstra. Opportunity Cost and Missed Chances in Optimizing Cybersecurity
106 -- 116M. Tamer Özsu. Data Science - A Systematic Treatment
118 -- 125Paul Medvedev. Theoretical Analysis of Sequencing Bioinformatics Algorithms and Beyond
128 -- 0Ramesh K. Sitaraman. Opening the Door to SSD Algorithmics: Technical Perspective
129 -- 137Tomer Lange, Joseph (Seffi) Naor, Gala Yadgar. Offline and Online Algorithms for SSD Management

Volume 66, Issue 6

0 -- 0Leah Hoffmann. Still Networking
5 -- 0Vinton G. Cerf. Connectivity Is Everything
6 -- 7Doug Meil. AI in the Enterprise
8 -- 10Neil Savage. Making Connections
11 -- 13Samuel Greengard. Better Algorithms through Faster Math
14 -- 16Logan Kugler. Standards to Secure the Sensors That Power IoT
17 -- 19Keith Kirkpatrick. Using Algorithms to Deliver Disaster Aid
20 -- 23Simson L. Garfinkel, Eugene H. Spafford. In Memoriam: William A. Wulf
24 -- 27Peter J. Denning. Can Generative AI Bots Be Trusted?
28 -- 30Peter G. Neumann. Computer-Related Risks and Remediation Challenges
31 -- 32George V. Neville-Neil. The Parchment Path?
33 -- 37Thomas Haigh. Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
38 -- 41Micah Beck, Terry Moore. Breaking Up a Digital Monopoly
42 -- 44Emanuel Moss. Trust Is Not Enough: Accuracy, Error, Randomness, and Accountability in an Algorithmic Society
45 -- 47Massimo Franceschet. Decentraland: The Alleged Decentralization of Blockchain Applications
48 -- 55Gabriel Falcão 0001, João Dinis Ferreira. To PiM or Not to PiM
56 -- 62Christian Bird, Denae Ford, Thomas Zimmermann 0001, Nicole Forsgren, Eirini Kalliamvakou, Travis Lowdermilk, Idan Gazit. Taking Flight with Copilot
64 -- 72Johannes Klaus Fichte, Daniel Le Berre, Markus Hecher, Stefan Szeider. The Silent (R)evolution of SAT
73 -- 77Philippa Harrison. Buffer-Bloated Router? How to Prevent It and Improve Performance
78 -- 85Tae Wan Kim, Alan Strudler. Should Robots Have Rights or Rites?
86 -- 93Gal Vardi. On the Implicit Bias in Deep-Learning Algorithms
96 -- 0Alfons Kemper. Technical Perspective: FoundationDB Performs Balancing Act
97 -- 105Jingyu Zhou, Meng Xu, Alexander Shraer, Bala Namasivayam, Alex Miller, Evan Tschannen, Steve Atherton, Andrew J. Beamon, Rusty Sears, John Leach, Dave Rosenthal, Xin Dong, Will Wilson, Ben Collins, David Scherer, Alec Grieser, Yang Liu, Alvin Moore, Bhaskar Muppana, Xiaoge Su, Vishesh Yadav. FoundationDB: A Distributed Key-Value Store
106 -- 0David Pointcheval. Technical Perspective: What Does Provable Security Mean for Cryptographic Schemes?
107 -- 115Luca De Feo, Bertram Poettering, Alessandro Sorniotti. On the (In)Security of ElGamal in OpenPGP

Volume 66, Issue 5

0 -- 0Ralph Raiola. ChatGPT, Can You Tell Me a Story? An Exercise in Challenging the True Creativity of Generative AI
5 -- 0Moshe Y. Vardi. ACM for the Public Good
7 -- 0Jules Maitland. A Career Built on Using Technology to Help Others
8 -- 9Alex Tray. Securing Data for Business Telephones
10 -- 12Chris Edwards. AlphaFold Spreads through Protein Science
13 -- 14Neil Savage. Locking Down Secure Open Source Software
15 -- 17Esther Shein. Women in Computer Science Are Making Strides
18 -- 20Kendra Albert, James Grimmelmann. Do the Right Thing
21 -- 23Steve Lipner, John Pescatore. Updates, Threats, and Risk Management
24 -- 26Mark Guzdial, Emma Dodoo, Bahare Naimipour, Tamara Nelson-Fromm, Aadarsh Padiyath. Putting a Teaspoon of Programming into Other Subjects
27 -- 29Marc Steen. Ethics as a Participatory and Iterative Process
30 -- 32Jaime Sevilla, Anson Ho, Tamay Besiroglu. Please Report Your Compute
33 -- 35Emily Ruppel, Sihang Liu 0001, Elba Garza, Sukyoung Ryu, Alexandra Silva 0001, Talia Ringer. Long-Term Mentoring for Computer Science Researchers
36 -- 37Nina Amla, Dilma Da Silva, Michael Littman, Manish Parashar. NSF on Chien's Grand Challenge for Sustainability
40 -- 47Peter Ward, Paul Wankadia, Kavita Guliani. Reinventing Backend Subsetting at Google
48 -- 50Stefan Nagy. Research for Practice: The Fun in Fuzzing
52 -- 61Dror G. Feitelson. From Code Complexity Metrics to Program Comprehension
62 -- 71Manfred Broy, Bernhard Rumpe. Development Use Cases for Semantics-Driven Modeling Languages
72 -- 81Shruthi Gorantala, Rob Springer, Bryant Gipson. Unlocking the Potential of Fully Homomorphic Encryption
82 -- 87Torsten Hoefler, Thomas Häner, Matthias Troyer. Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage
90 -- 0Gil Segev 0001. Technical Perspective: Finding Connections between One-Way Functions and Kolmogorov Complexity
91 -- 99Yanyi Liu, Rafael Pass. Toward Basing Cryptography on the Hardness of EXP

Volume 66, Issue 4

0 -- 0Dennis E. Shasha. Cooperation in the Commons
5 -- 0Vinton G. Cerf. Scaffolding as Catalyst
6 -- 7Gary Marcus 0001. Hoping for the Best as AI Evolves
9 -- 11Don Monroe. Artificial Intelligence for Materials Discovery
12 -- 14Samuel Greengard. AI Rewrites Coding
15 -- 17Esther Shein. ... And the Computer Plays Along
18 -- 19Wendy Hall 0001, Divesh Srivastava, Scott E. Delman. ACM Publications Finances for 2021
20 -- 23Mari Sako. Contracting for Artificial Intelligence
24 -- 25George V. Neville-Neil. All Sliders to the Right
26 -- 28Marshall W. van Alstyne, Michael D. Smith 0002, Herbert Lin. Improving Section 230, Preserving Democracy, and Protecting Free Speech
29 -- 32David Ott, Kenny Paterson, Dennis Moreau. Where Is the Research on Cryptographic Transition and Agility?
33 -- 37Igor Linkov, Alexandre K. Ligo, Kelsey Stoddard, Beatrice Perez, Andrew Strelzoff, Emanuele Bellini 0001, Alexander Kott. Cyber Efficiency and Cyber Resilience
38 -- 0David A. Patterson 0001. Faculty Can Save Lives of the Elderly
40 -- 47Jorge A. Navas, Ashish Gehani. OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization
48 -- 54Maya Kaczorowski, Falcon Momot, George V. Neville-Neil, Chris McCubbin. OSS Supply-Chain Security: What Will It Take?
56 -- 69Ben Nassi, Yisroel Mirsky, Jacob Shams, Raz Ben-Netanel, Dudi Nassi, Yuval Elovici. Protecting Autonomous Cars from Phantom Attacks
68 -- 78Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez. Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity
80 -- 90Alexander Bentkamp, Jasmin Blanchette, Visa Nummelin, Sophie Tourret, Petar Vukmirovic, Uwe Waldmann. Mechanical Mathematicians
92 -- 0Luca Mottola. Technical Perspective: On Abstractions and Embedded Networks
93 -- 101Jonathan Oostvogels, Fan Yang 0051, Sam Michiels, Danny Hughes 0001. Symbol-Synchronous Buses: Deterministic, Low-Latency Wireless Mesh Networking with LEDs

Volume 66, Issue 3

0 -- 0Leah Hoffmann. Considering the Impact of Technology on Society
5 -- 0Moshe Y. Vardi. Who Is Responsible Around Here?
6 -- 11Marty J. Wolf, Joseph A. Konstan, Helena M. Mentis, Jane Prey, Harald Störrle. After the Complaint: What Should ACM Disclose?
13 -- 0Nuria Oliver. A Philosopher's Daughter Navigates a Career in AI
14 -- 15Carlos Baquero. What Ever Happened to Peer-to-Peer Systems?
17 -- 19Don Monroe. Neural Networks for Drug Discovery and Design
20 -- 22Keith Kirkpatrick. Adding Smarts to Vending Machines Drives Convenience, Efficiency
23 -- 25Logan Kugler. Virtual Influencers in the Real World
28 -- 31Peter J. Denning. A Map for Innovation
32 -- 34Pamela Samuelson. A Legal Challenge to Algorithmic Recommendations
35 -- 37Lorrie Faith Cranor, Hana Habib. Metrics for Success: Why and How to Evaluate Privacy Choice Usability
38 -- 40Alexandra Gillespie. Designing an Ethical Tech Developer
41 -- 44Daniel W. Woods. A Turning Point for Cyber Insurance
46 -- 53Raphael Auer, Rainer Böhme, Jeremy Clark, Didem Demirag. Mapping the Privacy Landscape for Central Bank Digital Currencies
54 -- 56Thomas A. Limoncelli. Split Your Overwhelmed Teams
58 -- 68Sara Berger, Francesca Rossi. AI and Neurotechnology: Learning from AI Ethics to Address an Expanded Ethics Landscape
69 -- 77Rua-Huan Tsaih, Hsin-Lu Chang, Chih-Chun Hsu, David C. Yen. The AI Tech-Stack Model
78 -- 85Stevie Chancellor. Toward Practices for Human-Centered Machine Learning
88 -- 0Jonathan Ragan-Kelley. Technical Perspective: Reconsidering the Design of User-Schedulable Languages
89 -- 97Bastian Hagedorn, Johannes Lenfers, Thomas Koehler 0005, Xueying Qin, Sergei Gorlatch, Michel Steuwer. Achieving High Performance the Functional Way: Expressing High-Performance Optimizations as Rewrite Strategies

Volume 66, Issue 2

0 -- 0William Sims Bainbridge. Aftermath Impact
5 -- 0Yannis E. Ioannidis. To the Members of ACM
7 -- 0Vinton G. Cerf. On QR Codes and Safety
8 -- 11CACM Staff. Neighborhood Watch
12 -- 13Koby Mike, Orit Hazzan. What is Data Science?
15 -- 17Don Monroe. Post-Quantum Cryptography
18 -- 20Samuel Greengard. Computational Linguistics Finds its Voice
21 -- 23Keith Kirkpatrick. Can AI Demonstrate Creativity?
26 -- 29Barbara Ericson. Four Ways to Add Active Learning to Computing Courses
30 -- 31George V. Neville-Neil. The Elephant in the Room
32 -- 34Deborah G. Johnson, Mario Verdicchio. Ethical AI is Not about AI
35 -- 37Charles Isbell, Michael L. Littman, Peter Norvig. Software Engineering of Machine Learning Systems
38 -- 40Colin Raffel. Building Machine Learning Models Like Open Source Software
41 -- 44Daniel M. Yellin. The Premature Obituary of Programming
45 -- 47Juan E. Gilbert, Jeremy A. Magruder Waisome, Simone A. Smarr. An Analysis of Black Faculty in CS Research Departments
48 -- 55Matthew Bush, Atefeh Mashatan. From Zero to 100
56 -- 62Michael Loftus, Andrew Vezina, Rick Doten, Atefeh Mashatan. The Arrival of Zero Trust: What Does it Mean?
64 -- 74James Murphy McCauley, Scott Shenker, George Varghese. Extracting the Essential Simplicity of the Internet
75 -- 81Maria Teresa Baldassarre, Neil A. Ernst, Ben Hermann 0001, Tim Menzies, Rahul Yedida. (Re)Use of Research Results (Is Rampant)
82 -- 90Daniel A. Reed, Dennis Gannon, Jack J. Dongarra. HPC Forecast: Cloudy and Uncertain
92 -- 102Chen Shani, Jonathan Zarecki, Dafna Shahaf. The Lean Data Scientist: Recent Advances Toward Overcoming the Data Bottleneck
104 -- 0Martin Vechev. Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning
105 -- 113Samuel Drews, Aws Albarghouthi, Loris D'Antoni. Proving Data-Poisoning Robustness in Decision Trees

Volume 66, Issue 12

0 -- 0Leah Hoffmann. Ulterior Motives
5 -- 0Vinton G. Cerf. On Expert Testimony
6 -- 7Antony Chayka, Andrei Sukhov. Comparing Chatbots Trained in Different Languages
8 -- 10Chris Edwards. Tales of Topological Qubits
11 -- 12Esther Shein. Saving Digital Libraries and the Internet Archive
13 -- 14Neil Savage. Revamping Python for an AI World
16 -- 19Subhabrata Dutta, Tanmoy Chakraborty 0002. Thus Spake ChatGPT
20 -- 23Alessio Malizia, Fabio Paternò. Why Is the Current XAI Not Meeting the Expectations?
24 -- 26Peter J. Denning, Todd W. Lyons. A Clash of Civilizations
27 -- 28George V. Neville-Neil. Halfway Around the World
29 -- 31Mikael Berndtsson, Anna-Carin Jonsson, Magnus Carlsson, Thomas Svahn. A Strategy for Scaling Advanced Analytics
32 -- 34Stephen J. Andriole. Five Ways Executives Misunderstand Technology
35 -- 39Thomas Haigh. There Was No 'First AI Winter'
40 -- 45Ethan L. Miller, George V. Neville-Neil, Achilles Benetopoulos, Pankaj Mehra, Daniel Bittman. Pointers in Far Memory
46 -- 51Samuel W. Stark, A. Theodore Markettos, Simon W. Moore. How Flexible Is CXL's Memory Protection?
52 -- 63Niklas Elmqvist. Data Analytics Anywhere and Everywhere
64 -- 71Paul Medvedev. Theoretical Analysis of Edit Distance Algorithms
72 -- 82Jongho Lee, Mohit Gupta, Bhuvana Krishnaswamy, Suman Banerjee 0001. When Two Cameras Are a Crowd
84 -- 0Shang-Hua Teng. Technical Perspective: Maximum Flow through a Network: A Storied Problem and a Groundbreaking Solution
85 -- 92Li Chen 0028, Rasmus Kyng, Yang P. Liu, Richard Peng, Maximilian Probst Gutenberg, Sushant Sachdeva. Almost-Linear-Time Algorithms for Maximum Flow and Minimum-Cost Flow

Volume 66, Issue 11

0 -- 0Ross Koningstein. How Climate Change Was Won
5 -- 0Moshe Y. Vardi. What Came First, Math or Computing?
6 -- 7Doug Meil. Lessons from PL/I: A Most Ambitious Programming Language
8 -- 10Don Monroe. Quantum Speedup for the Fast Fourier Transform?
11 -- 12Logan Kugler. What's Old Is New Again
13 -- 15Keith Kirkpatrick. Accessibility and Inclusion through Technology
16 -- 19Pamela Samuelson. Legal Challenges to Generative AI, Part II
20 -- 22Sheldon H. Jacobson. On Being a Computer Science Communicator
23 -- 24Sean Flaherty, Gregg Gordon. The Gamification of Academia
25 -- 28Pete Warden, Matthew Stewart, Brian Plancher, Sachin Katti, Vijay Janapa Reddi. Machine Learning Sensors
29 -- 31Sauvik Das, Hao-Ping (Hank) Lee, Jodi Forlizzi. Privacy in the Age of AI
32 -- 34Ricardo Fabrino Mendonça, Fernando Filgueiras, Virgílio A. F. Almeida. The Infrapolitics of Algorithmic Resistance
35 -- 37Anna Förster. Rethinking Conference Formats
38 -- 43Alvaro Videla. Echoes of Intelligence
44 -- 49Abi Noda, Margaret-Anne D. Storey, Nicole Forsgren, Michaela Greiler. DevEX: What Actually Drives Productivity?
50 -- 60Walter Cazzola, Luca Favalli. Scrambled Features for Breakfast: Concepts of Agile Language Development
61 -- 67Elisabetta Di Nitto, Ismael García-Varea, Mehdi Jazayeri, Damian A. Tamburri, Svetlana Tikhonenko. Informatics Higher Education in Europe: A Data Portal and Case Study
68 -- 77Shvetank Prakash, Matthew Stewart, Colby R. Banbury, Mark Mazumder, Pete Warden, Brian Plancher, Vijay Janapa Reddi. Is TinyML Sustainable?
78 -- 86Or Sattath. Uncloneable Cryptography
88 -- 0Gordon Fraser 0001. Technical Perspective: What's All the Fuss about Fuzzing?
89 -- 97Marcel Böhme, Valentin J. M. Manès, Sang Kil Cha. Boosting Fuzzer Efficiency: An Information Theoretic Perspective

Volume 66, Issue 10

0 -- 0Dennis E. Shasha. Tidy Towers
5 -- 0Vinton G. Cerf. The Dilemma of Scale
6 -- 7Gary Marcus 0001. Controlling AI
9 -- 11Gregory Mone. Biomedical Digital Twins
12 -- 14Logan Kugler. The Fight to Repair
15 -- 17David Geer. Using Psychology to Bolster Cybersecurity
18 -- 21Michael A. Cusumano. Generative AI as a New Innovation Platform
22 -- 26Nancy G. Leveson, John P. Thomas. Certification of Safety-Critical Systems
27 -- 29George V. Neville-Neil. Stone Knives and Bear Skins
30 -- 33Madison C. Allen Kuyenga, Eleanor R. Glover Gladney, Michael Lachney, Marwin McKnight, Theodore S. Ransaw, Dominick Sanders, Aman Yadav. Barbershop Computing
34 -- 36James Bessen. How Software Stifles Competition and Innovation
37 -- 40Dominik Bär, Nicolas Pröllochs, Stefan Feuerriegel. New Threats to Society from Free-Speech Social Media Platforms
41 -- 43Rick Skarbez, Missie Smith, Mary C. Whitton. It Is Time to Let Go of 'Virtual Reality'
44 -- 49Zachary Tellman. Designing a Framework for Conversational Interfaces
50 -- 55Amanda Casari, Julia Ferraioli, Juniper Lovato. Beyond the Repository
56 -- 67Michael Seymour, Kai Riemer, Lingyao Yuan 0001, Alan R. Dennis. Beyond Deep Fakes
68 -- 75Marti A. Hearst. Show It or Tell It? Text, Visualization, and Their Combination
76 -- 85Martin Hirzel. Low-Code Programming Models
86 -- 95Haniel Barbosa, Clark W. Barrett, Byron Cook, Bruno Dutertre, Gereon Kremer, Hanna Lachnitt, Aina Niemetz, Andres Nötzli, Alex Ozdemir, Mathias Preiner, Andrew Reynolds 0001, Cesare Tinelli, Yoni Zohar. Generating and Exploiting Automated Reasoning Proof Certificates
97 -- 0Shreyas Sekar. Technical Perspective: A Rare Glimpse of Tracking Fake Reviews
98 -- 105Sherry He, Brett Hollenbeck, Davide Proserpio. Leveraging Social Media to Buy Fake Reviews
106 -- 0Polly Huang. Technical Perspective: Sensing Interaction with Everyday Objects Using Near-Field Communication in Textiles
107 -- 114Jingxian Wang, Junbo Zhang, Ke Li 0013, Chengfeng Pan, Carmel Majidi, Swarun Kumar. Locating Everyday Objects Using NFC Textiles

Volume 66, Issue 1

5 -- 0Andrew A. Chien. Computing Divided: How Wide the Chasm?
7 -- 0Moshe Y. Vardi. How Not to Win a Tech War
9 -- 0Michelle Zhou. A Computer Scientist with a Biologist's Ambition: Advance Humanity
10 -- 11Marc Rotenberg, Jeremy Roschelle. Making AI Fair, and How to Use It
13 -- 15Chris Edwards. Error Control Begins to Shape Quantum Architectures
16 -- 18Neil Savage. The Outlook for Crypto
19 -- 20Logan Kugler. Making Traffic a Thing of the Past
21 -- 22Simson L. Garfinkel, Eugene H. Spafford. In Memoriam: Frederick P. Brooks, Jr. 1931-2022
23 -- 0John Delaney. Remembering Valérie Issarny
24 -- 27Michael A. Cusumano. From Quantum Computing to Quantum Communications
28 -- 30Alexandra J. Roberts. Getting a Handle on Handles
31 -- 33Fabio Massacci, Giorgio Di Tizio. Are Software Updates Useless against Advanced Persistent Threats?
34 -- 35Matt Welsh. The End of Programming
36 -- 38Natasha F. Noy, Carole A. Goble. Are We Cobblers without Shoes?: Making Computer Science Data FAIR
39 -- 41Henrik Skaug Sætra, Mark Coeckelbergh, John Danaher. The AI Ethicist's Dirty Hands Problem
44 -- 51Brian Eaton, Jeff Stewart, Jon Tedesco, N. Cihan Tas. Distributed Latency Profiling through Critical Path Tracing
52 -- 54Ramnatthan Alagappan, Peter Alvaro. Research for Practice: Crash Consistency
56 -- 61Ted G. Lewis. The Many Faces of Resilience
62 -- 73Luhui Wang, Cong Zhao 0001, Shusen Yang, Xinyu Yang, Julie A. McCann. ACE: Toward Application-Centric, Edge-Cloud, Collaborative Intelligence
74 -- 85Yuze Chi, Weikang Qiao, Atefeh Sohrabizadeh, Jie Wang 0022, Jason Cong. Democratizing Domain-Specific Computing
86 -- 97Armando Castañeda, Sergio Rajsbaum, Michel Raynal. A Linearizability-based Hierarchy for Concurrent Specifications
100 -- 0Vincent Conitzer, Gillian K. Hadfield, Shannon Vallor. Technical Perspective: The Impact of Auditing for Algorithmic Bias
101 -- 108Inioluwa Deborah Raji, Joy Buolamwini. Actionable Auditing Revisited: Investigating the Impact of Publicly Naming Biased Performance Results of Commercial AI Products
112 -- 0Dennis E. Shasha. Maximal Cocktails