Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
There seems to be a gap in how cryptographic and non-cryptographic hash functions are designed.
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions
There seems to be a gap in how cryptographic and non-cryptographic hash functions are designed.
Program Correctness through Self-Certification
Self-certification is simpler to apply than formal verification, and fully validates only the program runs that actually occur.
It simply is not appropriate to write code that will be connected to the Internet in an unsafe language such as C.
Brain Implants Give People Back What They Lost
Researchers aim to have paralyzed patients use thoughts to control a prosthetic hand while physical sensations from the hand provide feedback.
The realization of a self-designing software system is faced with key challenges.
Thinking of Algorithms as Institutions
Algorithms are not just lines of code; they are architectures that organize complex systems of interactions involving machines and humans.
The EU AI Act and the Wager on Trustworthy AI
The EU AI Act serves as a reminder for developers to always prioritize the well being of individuals and society as a whole.
Brain Implants Give People Back What They Lost
Researchers aim to have paralyzed patients use thoughts to control a prosthetic hand while physical sensations from the hand provide feedback.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More