acm-header
Sign In

Communications of the ACM

Blog at CACM
The Continual Re-Creation Of The Key-Value Datastore
The Continual Re-Creation Of The Key-Value Datastore
08.11.2022

The evolution of single machine key-value stores.

Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
Mitigating the Base-Rate Neglect Cognitive Bias in Data Science Education
08.09.2022

How can machine learning educators help learners cope with the base rate neglect cognitive bias?

Was Ada Lovelace Actually the First Programmer?
Was Ada Lovelace Actually the First Programmer?
08.08.2022

Historical arguments for and against.

View More Blog@CACM

Latest News
Thinking Like a Cyber-Attacker to Protect User Data
Thinking Like a Cyber-Attacker to Protect User Data
08.17.2022

Researchers exploit computer processor's on-chip interconnect to launch side-channel attacks.

AI Model Recommends Personalized Fonts to Improve Reading, Accessibility
AI Model Recommends Personalized Fonts to Improve Reading, Accessibility
08.17.2022

Model matches reader characteristics, such as font familiarity and age …

Gaming for Science: How Video Games Are Making Research Fun
Gaming for Science: How Video Games Are Making Research Fun
08.17.2022

Video games paired with citizen science are increasingly being used …

View More News

Video Highlights
Interpretable Machine Learning: Moving from Mythos to Diagnostics
08.01.2022
Interpretable Machine Learning: Moving from Mythos to Diagnostics

A path forward for the ML community to address a stark disconnect.

hXDP: Efficient Software Packet Processing on FPGA NICs
08.01.2022
hXDP: Efficient Software Packet Processing on FPGA NICs

We present hXDP, a solution to run on FPGAs software packet processing tasks described with the eBPF technology and targeting …

View More Video Highlights
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account