DEPARTMENT: Letter from USACM
There is a common misconception that algorithms automatically result in unbiased decisions.
DEPARTMENT: Cerf's Up
I am fascinated by the metaphor of cyber security as a public health problem.
DEPARTMENT: Vardi's Insights
Divination is the practice of an occultic ritual as an aid in decision making. Developments in mathematics and in computer science in the 20th century shed new light on the power of divination.
DEPARTMENT: Letters to the editor
I applaud Peter J. Denning's "Remaining Trouble Spots with Computational Thinking" (June 2017), especially for pointing out the subject itself is often characterized by "vague definitions and unsubstantiated claims."
Robin K. Hill suggests software neglect is a failure of the coder to pay enough attention and take enough trouble to ensure software quality.
Image recognition technology is advancing rapidly. Researchers are discovering new ways to tackle the task without enormous datasets.
Scientists are demonstrating that lasers could be the future of space communication.
Technology that falsifies navigation data presents significant dangers to public and private organizations.
ACM recently held a conference in celebration of the first 50 years of the ACM A.M. Turing Award.
An engineer best known for his work in database management systems, and in techniques of layered architecture that include Bachman diagrams.
COLUMN: Law and technology
Considering law and governance in the digital age.
COLUMN: Computing ethics
A procedure for reflection and discourse on the behavior of bots in the context of law, deception, and societal norms.
COLUMN: The profession of IT
Lessons from operating systems teach how to do multitasking without thrashing.
Failures to involve end users or to collect comprehensive data representing user needs are described and solutions to avoid such failures are proposed.
On cryptographic backdoors and prosthetic intelligence.
You're only as available as the sum of your dependencies.
The approximate approach is often faster and more efficient.
Plan ahead to make the interview a successful one.
SECTION: Contributed articles
Answering questions correctly from standardized eighth-grade science tests is itself a test of machine intelligence.
Even when checked by fact checkers, facts are often still open to preexisting bias and doubt.
SECTION: Review articles
Exploring the many distinctive elements that make securing HPC systems much different than securing traditional systems.
SECTION: Research highlights
"Exploiting the Analog Properties of Digital Circuits for Malicious Hardware," by Kaiyuan Yang, et al., assumes semiconductor foundries (and others in chip fabrication) can be malicious, modifying designs to produce devices that …
We show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small and stealthy.
"Scribe," by Walter S. Lasecki, et al., is one of the first in a recent set of crowdsourcing papers that demonstrated how human workers can collaborate with computing systems to accomplish a real-time task that is difficult for …
We discuss how our Scribe system combines human labor and machine intelligence in real time to reliably convert speech to text with less than 4s latency.
COLUMN: Last byte
Alexei Efros, recipient of the 2016 ACM prize in computing, works to harness the power of visual complexity.