Here we are, 70 years into the computer age and after three ACM Turing Awards in the area of cryptography, and we still do not seem to know how to build secure information systems. And yet, our community marches forward with …
Moshe Y. Vardi
Online social media have provided a megaphone for voices that might not have been heard except in limited circles. The amplifying effect, however, gives visibility to deliberate (or ignorant) misinformation, hate speech, incitement …
Vinton G. Cerf
Void safety, says Bertrand Meyer, relies on type declarations and static analysis.
Supercomputers will sift massive amounts of data in search of therapies that work.
Advances in artificial intelligence and machine learning are motivating researchers to design and build new chips to support different computing models.
Developers of innovative assistive devices compete as a means of networking with each other.
2009 ACM Prize recipient Eric Brewer, 2004 ACM A.M. Turing Award co-recipient Vint Cerf, 2016–2017 Athena Lecturer Jennifer Rexford, ACM Grace Murray Hopper Award recipient Martin Casado, ACM Fellows Nick Feamster and Jim Kurose …
COLUMN: Law and Technology
Focusing on the process of anonymity rather than pursuing the unattainable goal of guaranteed safety.
Woodrow Hartzog, Ira Rubinstein
Using a "boot camp" workshop for new faculty orientation.
Leo Porter, Cynthia Lee, Beth Simon, Mark Guzdial
A 10-point plan toward fashioning a proposal to ban some — if not all — lethal autonomous weapons.
Modern applications are increasingly using probabilistic machine-learned models.
The fuzzer is for those edge cases that your testing did not catch.
Expert-curated guides to the best of CS research.
Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han
SECTION: Contributed articles
User attitudes toward online intellectual property reveal how far social norms have strayed from legal notions of ownership.
Catherine C. Marshall, Frank M. Shipman
RRI requires doing the best science for the world, not only the best science in the world.
Marina Jirotka, Barbara Grimpe, Bernd Stahl, Grace Eden, Mark Hartswood
SECTION: Review articles
Exploring the basic game theory models of contests found in online services.
SECTION: Research highlights
"Exploiting Vector Instructions with Generalized Stream Fusion" points out that stream fusion by itself is not well suited for generating bulk instructions such as vector or SIMD instructions.
Programmers should not have to sacrifice code clarity or good software engineering practices to obtain performance. This work shows how to attain this goal for high-level Haskell in the domain of sequence-processing functions …
Geoffrey Mainland, Roman Leshchinskiy, Simon Peyton Jones
"DeepDive: Declarative Knowledge Base Construction" is a prime example of groundbreaking work in the area of Knowledge Base Construction.
We describe DeepDive, a system that combines database and machine learning ideas to help to develop knowledge base construction systems.
Ce Zhang, Christopher Ré, Michael Cafarella, Christopher De Sa, Alex Ratner, Jaeho Shin, Feiran Wang, Sen Wu
COLUMN: Last byte
On a mission to boldly go where no man has gone before, the series and movies somehow missed some promising technologies . . .
David Allen Batchelor
For the first time since 1992, the ACM Code of Ethics and Professional Conduct (the Code) is being updated. We look forward to receiving your comments on these suggested changes and your requests for additional changes as we …
Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith Miller, Kate Vazansky, Marty J. Wolf