A mobile application can generate situation-specific communication boards automatically from photographs.
Software Engineering and Programming Languages
Technical Perspective: Can AI Keep Accessible Communication in the Picture?
Recent research explores how AI can use photos to support communication, especially for people with communication impairments.
The realization of a self-designing software system is faced with key challenges.
Zero-Trust Security in Software Development
The zero-trust security model is a proactive approach to overcoming potential threats and enhancing application security.
AI-Driven Code Review: Enhancing Developer Productivity and Code Quality
AI-driven code review tools use deep learning and natural language processing to understand coding patterns and offer suggestions.
Compliance Requirements in Research
An urgent issue to address is the proliferation of requirements from all federal and state agencies and private companies, which share an awareness for security but add different security requirements.
Datagram Forwarding Considered Harmful
Perhaps we need to look to forms of structured networking as a means of restricting and controlling the use of unstructured routing.
Computing with Time: Microarchitectural Weird Machines
Demonstrating the practicallity of μWMs by creating a microarchitecture-sensitive logic bomb.
Technical Perspective: How Exploits Impact Computer Science Theory
The term “weird machines” reflects the shift in the understanding of exploitability’s root cause.
The Importance of Robust Documentation in Software Development
Without well-maintained documentation, even the most elegant codebases can become opaque, inefficient, and impossible to scale.
‘Cheat Engines’ and Copyright in Video Games in the EU
The Court of Justice of the EU finds it permissible to observe, study, and test a program to reveal the ideas and principles underlying its operation and reproduce the results of its execution.
Pitfalls in Machine Learning for Computer Security
Generic pitfalls related to machine learning affect all security domains and can affect the entire machine learning workflow, weakening assumptions, conclusions, and lessons learned.
Reevaluating Google’s Reinforcement Learning for IC Macro Placement
Crosschecked data indicates that the integrity of a 2021 paper in Nature by Mirhoseini, Goldie, et al. is substantially undermined, owing to errors in conduct, analysis, and reporting.
Subjectivity and judgment surrounds what a bug is, and how and whether it should be fixed.
Neural Architecture Search as Program Transformation Exploration
This paper shows that program and neural architecture transformations can be interleaved delivering significant performance improvement and greater expressivity.
Technical Perspective: Optimizing Convolution Neural Nets with a Unified Transformation Approach
The key idea in "Neural Architecture Search for Program Transformation Exploration," by Jack Turner et al., is to express model architecture search as a program transformation, such that it can be naturally unified with the optimization and compilation process.
Giving Go a Go: Simplifying Cloud Infrastructure Development
Go's design principles prioritize simplicity and productivity, making it a language to which developers can easily adapt and utilize.
There is a critical need for better software design, development, test, and propagation processes.
How CrowdStrike Stopped Everything
The CrowdStrike global IT outage put millions of systems and their data out of reach.
If computing science wants to really be a science, we need to think about how we encourage people to defend their scientific claims with reproducible results.
The Vulnerability-Adaptive Protection Paradigm
Resiliency solutions for autonomous machines make trade-offs between resiliency and cost.
Operational and Analytic Data Cycles
In highly effective environments, operational and analytic data cycles never end.
A recounting of the past half-century of database technology.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More