Datagram Forwarding Considered Harmful
Perhaps we need to look to forms of structured networking as a means of restricting and controlling the use of unstructured routing.
Datagram Forwarding Considered Harmful
Perhaps we need to look to forms of structured networking as a means of restricting and controlling the use of unstructured routing.
Computing with Time: Microarchitectural Weird Machines
Demonstrating the practicallity of μWMs by creating a microarchitecture-sensitive logic bomb.
Technical Perspective: How Exploits Impact Computer Science Theory
The term “weird machines” reflects the shift in the understanding of exploitability’s root cause.
The Importance of Robust Documentation in Software Development
Without well-maintained documentation, even the most elegant codebases can become opaque, inefficient, and impossible to scale.
‘Cheat Engines’ and Copyright in Video Games in the EU
The Court of Justice of the EU finds it permissible to observe, study, and test a program to reveal the ideas and principles underlying its operation and reproduce the results of its execution.
Pitfalls in Machine Learning for Computer Security
Generic pitfalls related to machine learning affect all security domains and can affect the entire machine learning workflow, weakening assumptions, conclusions, and lessons learned.
Reevaluating Google’s Reinforcement Learning for IC Macro Placement
Crosschecked data indicates that the integrity of a 2021 paper in Nature by Mirhoseini et al. is substantially undermined, owing to errors in conduct, analysis, and reporting.
Subjectivity and judgment surrounds what a bug is, and how and whether it should be fixed.
Neural Architecture Search as Program Transformation Exploration
This paper shows that program and neural architecture transformations can be interleaved delivering significant performance improvement and greater expressivity.
Technical Perspective: Optimizing Convolution Neural Nets with a Unified Transformation Approach
The key idea in "Neural Architecture Search for Program Transformation Exploration," by Jack Turner et al., is to express model architecture search as a program transformation, such that it can be naturally unified with the optimization and compilation process.
Giving Go a Go: Simplifying Cloud Infrastructure Development
Go's design principles prioritize simplicity and productivity, making it a language to which developers can easily adapt and utilize.
There is a critical need for better software design, development, test, and propagation processes.
How CrowdStrike Stopped Everything
The CrowdStrike global IT outage put millions of systems and their data out of reach.
If computing science wants to really be a science, we need to think about how we encourage people to defend their scientific claims with reproducible results.
The Vulnerability-Adaptive Protection Paradigm
Resiliency solutions for autonomous machines make trade-offs between resiliency and cost.
Operational and Analytic Data Cycles
In highly effective environments, operational and analytic data cycles never end.
A recounting of the past half-century of database technology.
Gradual Differentially Private Programming
The adoption of type systems in recent years has been facilitated by gradual typing.
Requirements Engineering in Latin America: The Case of the WER
The Workshop on Requirements Engineering, a platform for research that addresses emerging trends and challenges, has been a springboard for emerging scholars.
Recent Advances on Principles of Concurrent Data Structures
Exploring new static and dynamic techniques on proving linearizability.
Ensuring application security from design to operation with DevSecOps.
Free and Open Source Software–and Other Market Failures
Computing has scientific roots, and if it is not open source, it is not science.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More