To celebrate the first 50 years of the A.M. Turing Award, ACM is sponsoring a yearlong series of programs, as highlighted on the Turing 50th website http://www.acm.org/turing-award-50.
"Denial-of-service" cyberattacks require us to up our technical game in Internet security and safety. They also expose the need to frame and enforce social and ethical behavior, privacy, and appropriate use in Internet environments …
DEPARTMENT: Letters to the editor
Adi Livnat's and Christos Papadimitriou's critique of genetic algorithms in "Sex as an Algorithm" (Nov. 2016) stands in counterpoint to a voluminous empirical record of practical successes.
DEPARTMENT: Panels in print
To help celebrate 50 years of the ACM Turing Award and the visionaries who have received it, ACM has launched a campaign called "Panels in Print," which takes the form of a collection of responses from Turing laureates, ACM award …
DEPARTMENT: [email protected]
Janet Davis makes a plea to CS practitioners to consider even a short teaching stint.
Data locking experiments provide stepping stones to a possible future in quantum cryptography.
Security researchers have identified a technique for installing a backdoor on computer chips, a security flaw that could profoundly change the computing industry.
In risk assessment and predictive policing, biased data can yield biased results.
COLUMN: Inside risks
The IoT can become ubiquitous worldwide — if the pursuit of systemic trustworthiness can overcome the potential risks.
How creative thinking tools and computing can be used to support creative human endeavors.
COLUMN: Kode vicious
Tests, documentation, and code.
COLUMN: Privacy and security
How can cryptography empower users with sensitive data to access large-scale computing platforms in a privacy-preserving manner?
Worrying about machines that are too smart distracts us from the real and present threat from machines that are too dumb.
Arguing against the arguments for the concept of the singularity.
An apostate's opinion.
Anyone can use a load balancer. Using it properly is much more difficult.
Measuring bottleneck bandwidth and round-trip propagation time.
SECTION: Contributed articles
Government-sanctioned and market-based anti-piracy measures can both mitigate economic harm from piracy.
It is past time to acknowledge 400 years of European computational innovation from non-English-speaking scientists and engineers.
SECTION: Review articles
Model learning emerges as an effective method for black-box state machine models of hardware and software components.
SECTION: Research highlights
One unfortunate fact about protocols is that as they get older and applied to more scenarios — and TLS is used basically everywhere — they tend to gain weight. A truism of the security community is that "complexity is the enemy …
We systematically test popular TLS implementations and find unexpected transitions in many of their state machines that have stayed hidden for years. We show how some of these flaws lead to critical security vulnerabilities. …
We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-response.
COLUMN: Last byte
In a series of interactive murder mysteries, I might not have done it, but, then again, maybe I did