It is apparent that the world needs thoughtful and technically credible debate on alternatives for containing the problem of harmful behavior on the Internet.
Vinton G. Cerf Page 5DEPARTMENT: BLOG@CACM
Leveraging existing data sources to improve the declaration and management of authorship conflicts of interest.
Richard T. Snodgrass, Marianne Winslett Pages 30-32SECTION: Practice
Hitting a nerve with field-programmable gate arrays.
Oskar Mencer, Dennis Allison, Elad Blatt, Mark Cummings, Michael J. Flynn, Jerry Harris, Carl Hewitt, Quinn Jacobson, Maysam Lavasani, Mohsen Moazami, Hal Murray, Masoud Nikravesh, Andreas Nowatzyk, Mark Shand, Shahram Shirazi Pages 36-39SECTION: Contributed articles
Bots increasingly tamper with political elections and economic discussions. Tracing trends in detection strategies and key suggestions on how to win the fight.
Stefano Cresci Pages 72-83COLUMN: Last byte
Can you answer a poll without revealing your true preferences and have the results of the poll still be accurate?
Dennis Shasha Pages 108-ffSECTION: Research highlights
We identify gas-focused vulnerabilities and present MadMax: a static program analysis technique that automatically detects gas-focused vulnerabilities with very high confidence.
Neville Grech, Michael Kong, Anton Jurisevic, Lexi Brent, Bernhard Scholz, Yannis Smaragdakis Pages 87-95
"Lower Bounds for External Memory Integer Sorting via Network Coding" proves a remarkable connection between how efficiently computers can perform sorting and transmitting.
Paul Beame Page 96
In this paper, we present a tight conditional lower bound on the complexity of external memory sorting of integers.
Alireza Farhadi, Mohammad Taghi Hajiaghayi, Kasper Green Larsen, Elaine Shi Pages 97-105
"MadMax: Analyzing the Out-of-Gas World of Smart Contracts," by Neville Grech et al., effectively discovers a new smart contract vulnerability, and proposes a detection approach based on a static analysis.
Benjamin Livshits Page 86