Journal: Communications of the ACM

Volume 67, Issue 9

0 -- 0Gregory Mone. Imagining Intelligent Machines
5 -- 0Moshe Y. Vardi. The Linear Fallacy
7 -- 0Kay Kukoyi. A Technology Swiss Army Knife
8 -- 9Alex Williams. Improving Memory Management, Performance with Rust: Why Rust is becoming the programming language of choice for many high-level developers
9 -- 0Daniel Lemire. Will AI Flood Us with Irrelevant Papers?
10 -- 12Neil Savage. Beyond Turing: Testing LLMs for Intelligence
13 -- 15Esther Shein. The Impact of AI on Computer Science Education
16 -- 18Samuel Greengard. AI Reinvents Chip Design
20 -- 23Maarten Bullynck, Liesbeth De Mol. The Myth of the Coder
24 -- 26Peter J. Denning. Subscriptions
27 -- 30Faiza Tazi, Josiah Dykstra, Prashanth Rajivan, Kapil Chalil Madathil, Jiovanne Hughart, James T. McElligott, Daniel Votipka, Sanchari Das. Improving Privacy and Security of Telehealth
31 -- 32Bruce Schneier. LLMs' Data-Control Path Insecurity
33 -- 36Douglas Schuler. Tools of Our Tools? Exploring the Cybercene Conjecture
37 -- 39James Grimmelmann. Public Business and Private Accounts
40 -- 42William J. Bowman. ACM Profits Considered Harmful
43 -- 46Vicki L. Hanson, Patricia Ryan. ACM's Reserves Enable Its Mission
48 -- 53Jinnan Guo, Peter R. Pietzuch, Andrew Paverd, Kapil Vaswani. Trustworthy AI Using Confidential Federated Learning
54 -- 65Ryen W. White. Advancing the Search Frontier with AI Agents
66 -- 77Zishen Wan, Yiming Gan, Bo Yu 0014, Shaoshan Liu, Arijit Raychowdhury, Yuhao Zhu 0001. The Vulnerability-Adaptive Protection Paradigm
79 -- 0Clayton H. Lewis. Looking Ahead at Inclusive Technology
80 -- 89Steven M. Goodman, Erin Buehler, Patrick Clary, Andy Coenen, Aaron Donsbach, Tiffanie N. Horne, Michal Lahav, Robert MacDonald, Rain Breaw Michaels, Ajit Narayanan, Mahima Pushkarna, Joel Riley, Alex Santana, Lei Shi, Rachel Sweeney, Phil Weaver, Ann Yuan, Meredith Ringel Morris. LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models

Volume 67, Issue 8

0 -- 0Soneyaa Rucher. Triple Helix
5 -- 0Vinton G. Cerf. The Boundary Hunters
6 -- 7Ranjeeta Bhattacharya, Mario Antoine Aoun. Using Generative AI in Finance, and the Lack of Emergent Behavior in LLMs
8 -- 10Chris Edwards. Spinning Electrons to Attain Low-Power Computing
11 -- 13Gregory Goth. Can Artificial Intelligence Be Open Sourced?
14 -- 16Logan Kugler. How Today's Recommender Systems Use Machine Learning to Cater to Your Every Whim
18 -- 21Elizabeth Novoa-Monsalve, David Patterson, Stephanie Ludi, Daniel E. Acuna. Science Needs You: Mobilizing for Diversity in Award Recognition
22 -- 25Michael C. Loui, Nigel Bosch, Anita Say Chan, Jenny L. Davis, Rochelle Gutiérrez, Jingrui He, Karrie Karahalios, Sanmi Koyejo, Ruby Mendenhall, Madelyn Rose Sanfilippo, Hanghang Tong, Lav R. Varshney, Yang Wang. Artificial Intelligence, Social Responsibility, and the Roles of the University
26 -- 28Joshua Sunshine, Joey Velez-Ginorio. Research Experiences for Undergraduates Are Necessary for an Equitable Research Community
29 -- 32Ed Felten, Manav Raj, Rob Seamans. Generative AI Requires Broad Labor Policy Considerations
33 -- 34George V. Neville-Neil. Structuring Success
36 -- 37Fabio Kon, Barbara Poblete, Sebastián Uchitel. Welcome
40 -- 44Diego Arroyuelo, Aidan Hogan, Gonzalo Navarro 0001, Juan L. Reutter, Domagoj Vrgoc. Tackling Challenges in Implementing Large-Scale Graph Databases
45 -- 46Armando Castañeda, Sergio Rajsbaum. Recent Advances on Principles of Concurrent Data Structures
47 -- 48Roxana Lisette Quintanilla Portugal, Leandro Antonelli 0001, Sabrina Marczak, Graciela Dora Susana Hadad, Jaelson Castro, Julio César Sampaio P. Leite. Requirements Engineering in Latin America: The Case of the WER
49 -- 53Matías Toro, Federico Olmedo, Éric Tanter. Gradual Differentially Private Programming
54 -- 56Hernán Maina, Laura Alonso Alemany, Guido Ivetta, Mariela Rajngewerc, Beatriz Busaniche, Luciana Benotti. Exploring Stereotypes and Biases in Language Technologies in Latin America
58 -- 62Ivan Sipiran. The Role of Computing in the Study of Latin American Cultural Heritage
63 -- 67Jazmín Vidal, Cyntia Bonomi, Pablo Riera, Luciana Ferrer. Automatic Pronunciation Assessment Systems for English Students from Argentina
68 -- 69Gustavo Sibilla, Fernando Schapachnik, Maria Soledad Escobar. GENis: Open Source Forensic Genetics Software for Judicial Cooperation
70 -- 71Jesús Favela, Dagoberto Cruz-Sandoval, Marcelo Marques da Rocha, Débora Christina Muchaluat-Saade. Social Robots for Healthcare and Education in Latin America
72 -- 77Fabrício Benevenuto, Philipe Melo. Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil
78 -- 79Renzo Angles, Naim Bro, Ivania Donoso-Guzmán, Juan Pablo Luna, Aidan Hogan, Juan L. Reutter, Henry Rosales-Méndez, Sergio Toro. Telar and TelarKG: Data-Driven Insights into Chile's Constitutional Process
80 -- 82Avelino F. Zorzo, Claudia L. R. Da Motta, Leila Ribeiro, Lisandro Z. Granville. Computing Everywhere, for Everyone, at Any Level
83 -- 85Mara Borchardt, Inés Roggi, Fernando Schapachnik. Keys to a Comprehensive Computer Science at School Policy in Argentina
86 -- 87Carlos Areces, Luciana Benotti, Franco Bulgarelli, Emilia Echeveste, Nadia Finzi. Leveraging Language Models and Automatic Summarization in Online Programming Learning Environments
88 -- 89Antônio Carlos Mariani, Lucas Machado da Palma, Jean Everson Martina. The Digital Degree Certification Revolution in Brazil and Beyond
90 -- 92Cristiano Maciel, Indira R. Guzman, Rita Cristina Galarraga Berardi, Nadia Rodriguez-Rodriguez, Luciana Salgado, Luciana Bolan Frigo, Boris Branisa, Elizabeth Jiménez. An Open Data Platform to Advance Gender Equality in STEM in Latin America
93 -- 94José A. Brenes, Gabriela Marín Raventós. Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions
95 -- 96Álvaro Luiz Fazenda 0001, Fábio Augusto Faria. ForestEyes: Citizen Scientists and Machine Learning-Assisting Rainforest Conservation
98 -- 105Queenie Luo, Michael J. Puett, Michael D. Smith 0001. A Perspectival Mirror of the Elephant
106 -- 108Poul-Henning Kamp. Free and Open Source Software and Other Market Failures
110 -- 121Donald Chamberlin. 50 Years of Queries
122 -- 131Carla E. Brodley, Mckenna Quam, Mark Allen Weiss. An Analysis of the Math Requirements of 199 CS BS/BA Degrees at 158 U.S. Universities
133 -- 0Paul Chow. The Software-Centric Approach of SYNERGY: Technical Perspective
134 -- 142Joshua Landgraf, Tiffany Yang, Will Lin, Christopher J. Rossbach, Eric Schkufza. Compiler-Driven FPGA Virtualization with SYNERGY

Volume 67, Issue 7

0 -- 0Dennis Shasha. Click Fulfillment
5 -- 0Moshe Y. Vardi. Is Computing a Discipline in Crisis?
6 -- 7Alex Williams. Zero-Knowledge Proofs and Their Role within the Blockchain
8 -- 10Chris Edwards. Data Quality May Be All You Need
11 -- 13Logan Kugler. Digital Payment Issues
14 -- 16Samuel Greengard. Lithography Lights a New Path
17 -- 0Simson L. Garfinkel, Eugene H. Spafford. In Memoriam: Gordon Bell
18 -- 23Abigail Sellen, Eric Horvitz. The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond
24 -- 26Carla E. Brodley, Catherine Gill. The BPC Relevance of Common Assessment in the Introductory Sequence
27 -- 30Pamela Samuelson. How to Think about Remedies in the Generative AI Copyright Cases
31 -- 33Sarah Scheffler. Age Verification Systems Will Be a Personal Identifiable Information Nightmare
34 -- 41Padmal Vitharana, Shahir A. Daya. Adopting and Sustaining Microservice-Based Software Development
42 -- 45Yifei Wang. From Open Access to Guarded Trust
46 -- 55Valerie Barr, Carla E. Brodley, Manuel A. Pérez-Quiñones. Visualizing Progress in Broadening Participation in Computing: The Value of Context
56 -- 65Jiwon Kim, Hamed Okhravi, Dave (Jing) Tian, Benjamin E. Ujcich. Security Challenges of Intent-Based Networking
66 -- 75João Marques-Silva 0001, Xuanxiang Huang. Not a Game
78 -- 0Daniel Spielman. x: Technical Perspective
79 -- 86Richard Peng, Santosh S. Vempala. Solving Sparse Linear Systems Faster than Matrix Multiplication

Volume 67, Issue 6

0 -- 0Leah Hoffmann. Specifying the Power and Limitations of Randomness
5 -- 0Vinton G. Cerf. On the Difference between Security and Safety
7 -- 0David Ayman Shamma. Taking Apart to Build Back Up
8 -- 9. Generating Trust
10 -- 12Shaoshan Liu. Shaping the Outlook for the Autonomy Economy
14 -- 16Neil Savage. A Life of Complexity
17 -- 19Logan Kugler. Raising the Dead with AI
20 -- 21Don Monroe. A Quantum Leap in Factoring
22 -- 23Gregory Mone. Poisoning Data to Protect It
26 -- 29Peter J. Denning, Todd W. Lyons. Resistance Is Your Friend
30 -- 32Marc Steen. The Problem with the Trolley Problem and the Need for Systems Thinking
33 -- 34George V. Neville-Neil. Software Drift
35 -- 38Stevie Chancellor, Joseph A. Konstan, Loren Terveen, Svetlana Yarosh. Do Know Harm: Considering the Ethics of Online Community Research
39 -- 40Eric Horvitz, Vincent Conitzer, Sheila A. McIlraith, Peter Stone. Now, Later, and Lasting: 10 Priorities for AI Research, Policy, and Practice
42 -- 51Nicole Forsgren, Eirini Kalliamvakou, Abi Noda, Michaela Greiler, Brian Houck, Margaret-Anne D. Storey. DevEx in Action
52 -- 60Christoph Kern. Developer Ecosystems for Software Safety
62 -- 69David Harel, Assaf Marron. The Human-or-Machine Issue: Turing-Inspired Reflections on an Everyday Matter
70 -- 77Ángel Goñi Moreno. Biocomputation: Moving Beyond Turing with Living Cellular Computers
78 -- 81Raúl Rojas 0002. The First Computer Program
82 -- 90Liang Yu, Emil Alégroth, Panagiota Chatzipetrou, Tony Gorschek. A Roadmap for Using Continuous Integration Environments
92 -- 0Shyamnath Gollakota. Creating the Internet of Biological and Bio-Inspired Things: Technical Perspective
93 -- 101Inhee Lee, Roger Hsiao, Gordy Carichner, Chin-Wei Hsu, Mingyu Yang, Sara Shoouri, Katherine Ernst, Tess Carichner, Yuyang Li 0001, Jaechan Lim, Cole R. Julick, Eunseong Moon, Yi Sun, Jamie Phillips, Kristi L. Montooth, Delbert A. Green II, Hun-Seok Kim, David T. Blaauw. mSAIL: Milligram-Scale Multi-Modal Sensor Platform for Monarch Butterfly Migration Tracking

Volume 67, Issue 5

0 -- 0Boisy Pitre. A Fit of Anger
5 -- 0Moshe Y. Vardi. More Is Different, in Social Media Too
7 -- 21Hemangee Kapoor, Cherri M. Pancake, Gerald Segal. ACM's 2024 General Election
23 -- 25Herbert E. Bruderer, Alex Vakulov. The Dangers of Digitization, and the Importance of Data Backup
26 -- 28Don Monroe. More Efficient Fault-Tolerant Quantum Computing
29 -- 31Neil Savage. Can ChatGPT Learn Chinese or Swahili?
32 -- 33Gregory Mone. Thirsty Fabs
34 -- 36James Grimmelmann. The Return of Age Verification Laws
37 -- 39Victor Le Pochat. Reflecting on Research Practices
40 -- 42Tamara L. Clegg. Community Is Critical Too
43 -- 44William Dunbar. Vendor-Locked DevOps Strategies
45 -- 47Nicholas Berente, Cameron Kormylo, Christoph Rosenkranz. Test-Driven Ethics for Machine Learning
48 -- 51Andrew Strelzoff, Benjamin D. Trump, Christopher L. Cummings, Madison Smith, Stephanie Elisabeth Galaitsi, Kelsey Stoddard, Jeffrey M. Keisler, Moshe Vardi, Nathaniel Bastian, Alexander Kott, Igor Linkov. Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience
52 -- 59Divyansh Kaushik, Zachary C. Lipton, Alex John London. Resolving the Human-Subjects Status of ML's Crowdworkers
60 -- 66David Chisnall. How to Design an ISA
68 -- 75David G. Stork. Computer Vision, ML, and AI in the Study of Fine Art
76 -- 85Shimon Schocken. Nand to Tetris: Building a Modern Computer System from First Principles
86 -- 95Sukyoung Ryu, Jihyeok Park. JavaScript Language Design and Implementation in Tandem
99 -- 106Narges Ahani, Paul Gölz, Ariel D. Procaccia, Alexander Teytelboym, Andrew C. Trapp. Dynamic Placement in Refugee Resettlement
9898 -- 0Daniel Freund 0001. Technical Perspective: Improving Refugees' Integration with Online Resource Allocation

Volume 67, Issue 4

0 -- 0Dennis Shasha. Jump Snatch
5 -- 0Vinton G. Cerf. Thoughts on AI Interoperability
6 -- 8Orit Hazzan, Avital Binah-Pollak. Using Data Science to Predict How Rituals Will Evolve
9 -- 11Chris Edwards. Answers Begin to Surface to Deep Earth Puzzles
12 -- 14Esther Shein. Governments Setting Limits on AI
15 -- 17Keith Kirkpatrick. Abusing AI for Advertising
20 -- 22Mari Sako. How Generative AI Fits into Knowledge Work
23 -- 24Maggie Johnson. Generative AI and CS Education
25 -- 28Henry Farrell, Cosma Rohilla Shalizi. Bias, Skew, and Search Engines Are Sufficient to Explain Online Toxicity
29 -- 30George V. Neville-Neil. Is There Another System?
31 -- 34Guglielmo Faggioli, Laura Dietz, Charles L. A. Clarke, Gianluca Demartini, Matthias Hagen, Claudia Hauff, Noriko Kando, Evangelos Kanoulas, Martin Potthast, Benno Stein 0001, Henning Wachsmuth. Who Determines What Is Relevant? Humans or AI? Why Not Both?
35 -- 36Hemangee K. Kapoor, David A. Patterson 0001. Increasing Diversity, Equity, and Inclusion Awareness: An Example from India
38 -- 45Geoffrey H. Cooper. Device Onboarding Using FDO and the Untrusted Installer Model
46 -- 48Phil Vachon. The Security Jawbreaker
50 -- 59Ruixiang Tang, Yu-Neng Chuang, Xia Hu 0001. The Science of Detecting LLM-Generated Text
60 -- 69Minhyung Lee, Jinyoung Min, Junyeong Lee, Chanhee Kwak, HanByeol Stella Choi. A Small Clue Made of Fragmented Pieces
70 -- 79Anne-Sophie Himmel, George B. Mertzios, André Nichterlein, Rolf Niedermeier. Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems
80 -- 84Dominic Steinhöfel, Andreas Zeller. Language-Based Software Testing
86 -- 0Doug Lea. Technical Perspective: Learning-Based Memory Allocation for C++ Server Workloads
87 -- 96Martin Maas 0001, David G. Andersen, Michael Isard, Mohammad Mahdi Javanmard, Kathryn S. McKinley, Colin Raffel. Combining Machine Learning and Lifetime-Based Resource Management for Memory Allocation and Beyond

Volume 67, Issue 3

0 -- 0Leah Hoffmann. Verifying Correctness
5 -- 0Moshe Y. Vardi. What Do Computing and Economics Have to Say to Each Other?
6 -- 0David Patterson, Jeffrey M. Gilbert, Marco Gruteser, Efren Robles, Krishna Sekar, Yong Wei, Tenghui Zhu. Corrigendum for February 2024 Article
7 -- 0Thomas Morton. Computations for This World and out of This World
8 -- 10Robin K. Hill, Carlos Baquero. Pondering the Ugly Underbelly, and Whether Images Are Real
11 -- 13Samuel Greengard. Service Robots Roll Forward
14 -- 16Logan Kugler. The Battle to Mitigate E-Waste
17 -- 19Esther Shein. What's That Smell?
20 -- 0Simson L. Garfinkel, Eugene H. Spafford. In Memoriam: Niklaus Wirth
22 -- 24Filippo Gualtiero Blancato. Innovation Is Overrated: A Provocation
25 -- 28Pamela Samuelson. U.S. Copyright Office's Questions about Generative AI
29 -- 31Lorrie Faith Cranor, Yuvraj Agarwal, Pardis Emami Naeini. Internet of Things Security and Privacy Labels Should Empower Consumers
32 -- 35Peter J. Denning, B. Scot Rousse. Can Machines Be in Language?
36 -- 39Wojciech Mazurczyk, Dongwon Lee, Andreas Vlachos 0001. Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective
40 -- 42Gordon Burtch, Dokyun Lee, Zhichen Chen. Generative AI Degrades Online Communities
44 -- 48Harsh Deokuliar, Raghvinder S. Sangwan, Yoaukim Badr, Satish M. Srinivasan. Improving Testing of Deep-Learning Systems
49 -- 51Kate Matsudaira. Software Managers' Guide to Operational Excellence
54 -- 63Albert Ziegler 0001, Eirini Kalliamvakou, X. Alice Li, Andrew Rice, Devon Rifkin, Shawn Simister, Ganesh Sittampalam, Edward Aftandilian. Measuring GitHub Copilot's Impact on Productivity
64 -- 73Saad Ahmed, Bashima Islam, Kasim Sinan Yildirim, Marco Zimmerling, Przemyslaw Pawelczak, Muhammad Hamad Alizai, Brandon Lucia, Luca Mottola, Jacob Sorber, Josiah D. Hester. The Internet of Batteryless Things
74 -- 83Benny Kimelfeld, Phokion G. Kolaitis. A Unifying Framework for Incompleteness, Inconsistency, and Uncertainty in Databases
84 -- 94Roderick Chapman, Claire Dross, Stuart Matthews, Yannick Moy. Co-Developing Programs and Their Proof of Correctness
96 -- 0Daniel Wichs. Technical Perspective: Hiding Secrets in Programs
97 -- 105Aayush Jain, Huijia Lin, Amit Sahai. Indistinguishability Obfuscation from Well-Founded Assumptions

Volume 67, Issue 2

0 -- 0Brian Clegg. The Human Touch
5 -- 0Vinton G. Cerf. Validating Factual Personal Information
6 -- 7Alex Tray. Why Bother Localizing Information Technology Products?
9 -- 11Erica Klarreich. Algorithmic Advance: The Group Isomorphism Problem
12 -- 13Chris Edwards. Teaching Transformed
14 -- 15Gregory Mone. Virtual Reality as Therapy
16 -- 18Christopher Hoadley, Sara Vogel. Autocorrect Is Not: People Are Multilingual and Computer Science Should Be Too
19 -- 21Nicholas Diakopoulos, Christoph Trattner, Dietmar Jannach, Irene Costera Meijer, Enrico Motta. Leveraging Professional Ethics for Responsible AI
22 -- 26Thomas Haigh. How the AI Boom Went Bust
27 -- 28George V. Neville-Neil. Dear Diary
29 -- 31Rahul Simha, Amruth N. Kumar, Rajendra K. Raj. Undergraduate Computer Science Curricula
32 -- 34Steven Fraser 0001, Dennis Mancl. Virtual and the Future of Conferences
35 -- 38Alfred Z. Spector. Gaining Benefit from Artificial Intelligence and Data Science: A Three-Part Framework
40 -- 41Phil Vachon. Security Mismatch
42 -- 46Thomas A. Limoncelli. Knowing What You Need to Know
48 -- 55Maarten Buyl, Tijl De Bie. Inherent Limitations of AI Fairness
56 -- 67Paul Denny 0001, James Prather, Brett A. Becker, James Finnie-Ansley, Arto Hellas, Juho Leinonen 0001, Andrew Luxton-Reilly, Brent N. Reeves, Eddie Antonio Santos, Sami Sarsa. Computing Education in the Era of Generative AI
68 -- 79Murray Shanahan. Talking about Large Language Models
80 -- 85Rae Yule Kim. Anthropomorphism and Human-Robot Interaction
86 -- 97David Patterson, Jeffrey M. Gilbert, Marco Gruteser, Efren Robles, Krishna Sekar, Yong Wei, Tenghui Zhu. Energy and Emissions of Machine Learning on Smartphones vs. the Cloud
100 -- 0Nitin Saxena 0001. How Easy Is It to Describe Hard Polynomials?: Technical Perspective
101 -- 108Nutan Limaye, Srikanth Srinivasan 0001, Sébastien Tavenas. Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits
109 -- 0Giorgio Buttazzo. Bridging AI with Real-Time Systems: Technical Perspective
110 -- 117Shengzhong Liu, Shuochao Yao, Xinzhe Fu, Rohan Tabish, Simon Yu, Ayoosh Bansal, Heechul Yun, Lui Sha, Tarek F. Abdelzaher. Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines

Volume 67, Issue 12

0 -- 0Leah Hoffmann. Personalizing Interactions: With Socially Assistive Robots
5 -- 0Yannis E. Ioannidis. th Paradigm: AI-Driven Scientific Discovery
7 -- 0Vinton G. Cerf. Warnings!!
9 -- 0Wei Lu. From Dot Matrix to Data: A Journey through Technology and Leadership
10 -- 11CACM Staff. Diversity Examples Inappropriate
12 -- 13Saurabh Bagchi. Considering Conference Contributions
14 -- 16Samuel Greengard. Is It Possible to Truly Understand Performance in LLMs?
17 -- 19Esther Shein. AI Judging in Sports
20 -- 22Logan Kugler. A Camera the Size of a Grain of Salt Could Change Imaging as We Know It
23 -- 0Eugene H. Spafford, Simson L. Garfinkel. In Memoriam: E. Allen Emerson
24 -- 27Peter J. Denning, Ted G. Lewis. An AI Learning Hierarchy
28 -- 30Meredith Ringel Morris. Prompting Considered Harmful
31 -- 34Karl Werder, Lan Cao 0001, Balasubramaniam Ramesh, Eun Hee Park 0001. Empower Diversity in AI Development
35 -- 36George V. Neville-Neil. Unwanted Surprises
37 -- 39Lorrie Faith Cranor. Notice and Choice Cannot Stand Alone
40 -- 42Jennifer Mankoff, Devva Kasnitz, L. Jean Camp, Jonathan Lazar, Harry Hochheiser. AI Must Be Anti-Ableist and Accessible
44 -- 51Raluca Ada Popa. Confidential Computing or Cryptographic Computing?
52 -- 56Qian Li 0027, Peter Kraft. Transactions and Serverless are Made for Each Other
58 -- 65Alejandro Bellogín, Oliver Grau, Stefan Larsson, Gerhard Schimpf, Biswa Sengupta, Gürkan Solmaz. The EU AI Act and the Wager on Trustworthy AI
66 -- 77Xuebin Ren, Shusen Yang, Cong Zhao 0001, Julie A. McCann, ZongBen Xu. Belt and Braces: When Federated Learning Meets Differential Privacy
78 -- 84Tiziana Catarci, Giuseppina De Nicola, Daniel Raffini. Ethics and Cultural Background as Key Factors for an Attractive Metaverse
86 -- 0Sergey Bratus. How Exploits Impact Computer Science Theory
87 -- 95Thomas Benjamin, Jeffery A. Eitel, Jesse Elwell, Dmitry Evtyushkin, Abhrajit Ghosh, Angelo Sapello. Computing with Time: Microarchitectural Weird Machines
96 -- 0Michela Taufer. Mirror, Mirror on the Wall, What is the Best Topology of Them All?
97 -- 105Torsten Hoefler, Tommaso Bonoto, Daniele De Sensi, Salvatore Di Girolamo, Shigang Li, Marco Heddes, Deepak Goel, Miguel Castro, Steve Scott. HammingMesh: A Network Topology for Large-Scale Deep Learning

Volume 67, Issue 11

0 -- 0Leah Hoffmann. Looking Within
5 -- 0Moshe Y. Vardi. What Is Theoretical Computer Science?
6 -- 7Karu Sankaralingam. A Whimsical Odyssey Through the Maze of Scholarly Reviews
8 -- 10Samuel Greengard. Room-Temperature Superconductivity Heats Up
11 -- 13Neil Savage. Automating Detective Work
14 -- 16Gregory Mone. The Chiplet Revolution
18 -- 23Thomas Haigh. Between the Booms: AI in Winter
24 -- 26Pamela Samuelson. Do Social Media Platforms Have Free Speech Rights to 'Censor' Conservatives?
27 -- 28Peter G. Neumann, Ulf Lindqvist. The Future of Misuse Detection
29 -- 31Marshall W. van Alstyne. Free Speech vs. Free Ride: Navigating the Supreme Court's Social Media Paradox
32 -- 34David Gray Widder, Claire Le Goues. What Is a 'Bug'?
35 -- 37Philip Machanick. Mentorship Lessons from Growing a Developing Country Journal
38 -- 41David Collier-Brown. You Don't Know Jack about Bandwidth
42 -- 49Mansi Khemka, Brian Houck. Toward Effective AI Support for Developers: A survey of desires and concerns
50 -- 59Vasant Dhar. The Paradigm Shifts in Artificial Intelligence
60 -- 71Igor L. Markov. Reevaluating Google's Reinforcement Learning for IC Macro Placement
72 -- 81Verena Zimmermann, Lorin Schöni, Thierry Schaltegger, Benjamin Ambuehl, Melanie Knieps, Nico Ebert. Human-Centered Cybersecurity Revisited: From Enemies to Partners
82 -- 89Xudong Shen, Hannah Brown, Jiashu Tao, Martin Strobel 0001, Yao Tong, Akshay Narayan 0002, Harold Soh, Finale Doshi-Velez. Directions of Technical Innovation for Regulatable AI Systems
92 -- 0Amy Hurst. An Accessible Solution to Unlock Museums
93 -- 102Xiyue Wang, Seita Kayukawa, Hironobu Takagi, Chieko Asakawa. BentoMuseum: 3D and Layered Interactive Museum Map for Blind Visitors
103 -- 0Battista Biggio. Machine Learning in Computer Security is Difficult to Fix
104 -- 112Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck. Pitfalls in Machine Learning for Computer Security

Volume 67, Issue 10

0 -- 0Dennis Shasha. Rational Gambling
5 -- 0Vinton G. Cerf. The Global Digital Compact
6 -- 7Robin K. Hill. Do All Problems Have Technical Fixes?
9 -- 11Don Monroe. Faster Integer Programming
12 -- 14Ron Westfall. Non-Volatile Memory Technology Poised for Game-Changing Breakthrough
15 -- 17Chris Edwards. A Hybrid Future for AI: The drive for efficiency brings large language models out of the cloud
18 -- 21Advait Sarkar. AI Should Challenge, Not Obey
22 -- 25Michael A. Cusumano. Private Crypto Versus Public Digital
26 -- 28Tanmoy Chakraborty 0002, Sarah Masud. The Promethean Dilemma of AI at the Intersection of Hallucination and Creativity
29 -- 30George V. Neville-Neil. Repeat, Reproduce, Replicate
31 -- 33Amin Vahdat, Xiaoyu Ma, David A. Patterson 0001. New Computer Evaluation Metrics for a Changing World
34 -- 39Charles Garcia-Tobin, Mark Knight. Elevating Security with Arm CCA
40 -- 49Matthew A. Johnson 0003, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa. Confidential Container Groups
50 -- 61Kyle Lo, Joseph Chee Chang, Andrew Head, Jonathan Bragg, Amy X. Zhang, Cassidy Trier, Chloe Anastasiades, Tal August, Russell Authur, Danielle Bragg, Erin Bransom, Isabel Cachola, Stefan Candra, Yoganand Chandrasekhar, Yen-Sung Chen, Evie Yu-Yen Cheng, Yvonne Chou, Doug Downey, Rob Evans, Raymond Fok, Fangzhou Hu, Regan Huff, Dongyeop Kang, Tae Soo Kim 0002, Rodney Kinney, Aniket Kittur, Hyeonsu B. Kang, Egor Klevak, Bailey Kuehl, Michael Langan, Matt Latzke, Jaron Lochner, Kelsey MacMillan, Eric Marsh, Tyler Murray, Aakanksha Naik, Ngoc-Uyen Nguyen, Srishti Palani, Soya Park, Caroline Paulic, Napol Rachatasumrit, Smita Rao, Paul Sayre, Zejiang Shen 0001, Pao Siangliulue, Luca Soldaini, Huy Tran, Madeleine van Zuylen, Lucy Lu Wang, Chris Wilhelm, Caroline Wu, Jiangjiang Yang, Angele Zamarron, Marti A. Hearst, Daniel S. Weld. The Semantic Reader Project
62 -- 69Rafael Belchior, Jan Süßenguth, Qi Feng, Thomas Hardjono, André Vasconcelos 0001, Miguel Correia 0001. A Brief History of Blockchain Interoperability
70 -- 80Aravinth Manivannan, Sibi Chakkaravarthy Sethuraman, Devi Priya Vimala Sudhakaran. mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility
82 -- 0Hamed Haddadi. Revealing the Cracks in AA Services
83 -- 90Pouyan Fotouhi Tehrani, Eric Osterweil, Thomas C. Schmidt, Matthias Wählisch. A Security Model for Web-Based Communication
91 -- 0Luis Ceze. Optimizing Convolution Neural Nets with a Unified Transformation Approach
92 -- 100Jack Turner, Elliot J. Crowley, Michael F. P. O'Boyle. Neural Architecture Search as Program Transformation Exploration

Volume 67, Issue 1

0 -- 0Dennis Shasha. Seesaw Gold
5 -- 0Moshe Y. Vardi. Computing, You Have Blood on Your Hands!
7 -- 0Sam Zheng. From Eye Tracking to AI-Powered Learning
8 -- 9Alex Vakulov. Protecting Life-Saving Medical Devices from Cyberattack
11 -- 13Don Monroe. Epigenomics Now
14 -- 16Gregory Goth. Why Are Lawyers Afraid of AI?
17 -- 19Samuel Greengard. Wayfinding Without GPS
22 -- 26Wendy Hall 0001, Divesh Srivastava, Scott E. Delman. ACM Publications Finances for 2022: Striving for Balance between Mission, Sustainability, and Growth
28 -- 32Gianluca Demartini, Kevin Roitero, Stefano Mizzaro. Data Bias Management
33 -- 35Michael A. Cusumano. NVIDIA at the Center of the Generative AI Ecosystem - For Now
36 -- 38Kyle Langvardt, Alan Z. Rozenshtein. Beyond the Editorial Analogy: The Future of the First Amendment on the Internet
39 -- 42Sabah Suhail, Mubashar Iqbal 0001, Raja Jurdak. The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers
43 -- 46Ana Pop Stefanija, Bart Buelens, Elfi Goesaert, Tom Lenaerts, Jo Pierson, Jan Van den Bussche. Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence
47 -- 49Danfeng (Daphne) Yao. Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research
50 -- 51Leah Hoffmann. Achievement in Microarchitecture
52 -- 53Mark Russinovich. Confidential Computing: Elevating Cloud Security and Privacy
54 -- 59David Kaplan. Hardware VM Isolation in the Cloud
60 -- 67Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Rob Nertney, Michael O'Connor, Phil Rogers. Creating the First Confidential GPUs
68 -- 76Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich. Why Should I Trust Your Code?
78 -- 87Neil C. C. Brown, Felienne F. J. Hermans, Lauren E. Margulieux. 10 Things Software Developers Should Learn about Learning
88 -- 97Manish Raghavan. What Should We Do when Our Ideas of Fairness Conflict?
98 -- 109Dhaminda B. Abeywickrama, Amel Bennaceur, Greg Chance, Yiannis Demiris, Anastasia Kordoni, Mark Levine, Luke Moffat, Luc Moreau 0001, Mohammad Reza Mousavi 0001, Bashar Nuseibeh, Subramanian Ramamoorthy, Jan Oliver Ringert, James Wilson, Shane Windsor, Kerstin Eder. On Specifying for Trustworthiness
110 -- 120Mengnan Du, Fengxiang He, Na Zou, Dacheng Tao, Xia Hu. Shortcut Learning of Large Language Models in Natural Language Understanding
122 -- 0Annalu Waller. Technical Perspective: The User as a Key Ingredient in AAC Design
123 -- 131Stephanie Valencia, Mark Steidl, Michael L. Rivera, Cynthia L. Bennett, Jeffrey P. Bigham, Henny Admoni. Nonverbal Communication through Expressive Objects