Many public agencies already have tracking and communications technologies embedded in their emergency and transit vehicles.
Systems and Networking
Nobel Laureates Consider the State of Quantum Computing
Most experts are reluctant to predict when a large-scale quantum computer will be commercialized.
Cybersecurity in Industrial IoT: Protecting Critical Infrastructure
Today's IIoT environments demand sophisticated, multi-layered security strategies.
Global Auto Dealer Management Systems Hacked
Lawsuits claim the attacks exposed consumers' personal information and stopped dealerships' sales, financing, servicing, and payroll operations.
How Today’s Recommender Systems Use Machine Learning to Cater to Your Every Whim
Today’s recommender systems, driven by sophisticated models, are able to increasingly personalize your online experience.
Security Challenges of Intent-Based Networking
Intent-based networking allows operators to describe the high-level intent of what they want a network to do.
Technical Perspective: Tracing the Network Traffic Fingerprinting Techniques of OpenVPN
"OpenVPN is Open to VPN Fingerprinting," by Diwen Xue et al., investigates network traffic fingerprinting of a very popular privacy technique—OpenVPN.
OpenVPN Is Open to VPN Fingerprinting
Technical Perspective: Creating the Internet of Biological and Bio-Inspired Things
"mSAIL: Milligram-Scale Multi-modal Sensor Platform for Monarch Butterfly Migration Tracking," by Inhee Lee et al., describes a critical milestone in the mobile system community’s efforts toward creating the Internet of biological things.
mSAIL: Milligram-Scale Multi-Modal Sensor Platform for Monarch Butterfly Migration Tracking
We propose a wireless sensing platform, mSAIL, specifically designed for a monarch butterfly migration study based on previously developed custom-designed ICs.
Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience
Vendor-Locked DevOps Strategies
Adopting and Sustaining Microservice-Based Software Development
The microservice approach to software development offers an alternative to the conventional monolith style.
More Efficient Fault-Tolerant Quantum Computing
Dynamic Placement in Refugee Resettlement
In this paper, we design an online algorithm for refugee allocation.
Technical Perspective: Improving Refugees’ Integration with Online Resource Allocation
"Dynamic Placement in Refugee Resettlement," by Narges Ahani et al., applies online resource allocation concepts to a new and important area: refugee resettlement.
Ensuring Business Continuity with Backup Cloud Storage Choices
Thoughts on AI Interoperability
Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines
This paper discusses algorithmic priority inversion in mission-critical machine inference pipelines used in modern neural-network-based perception subsystems and describes a solution to mitigate its effect.
Technical Perspective: Bridging AI with Real-Time Systems
"Taming Algorithmic Priority Inversion in Mission-Critical Perception Pipelines," by Shengzhong Liu et al., proposes a new methodology for overcoming the limitations of current AI frameworks to enable the use of deep neural networks in mission-critical systems.
The Role of Autonomous Machine Computing in Shaping the Autonomy Economy
Governments Are Spying on Your Push Notifications
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More