Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Cerf's up

Repairability Redux

Manufactured goods today do not seem to take into account the possibility of repair.
DEPARTMENT: BLOG@CACM

Pitting Computers Against Each Other . . . in Chess

Guest blogger Monroe Newborn on the 50th anniversary of ACM computer chess tournaments.
COLUMN: News

Tracking COVID, Discreetly

Tracing the contacts of those who come into contact with the coronavirus is not that simple.

Softening Up Robots

Giving robots soft, artificial skin would enable them to work more closely with people.

Technologies for the Visually Impaired

The last decade has seen major advancements in technology for the blind and visually impaired, but problems remain.
COLUMN: Computing ethics

Operationalizing AI Ethics Principles

A better ethics analysis guide for developers.
COLUMN: Broadening participation

U.S. States Must Broaden Participation While Expanding Access to Computer Science Education

Incorporating equity and inclusion in the effort toward access for everyone.
COLUMN: The profession of IT

Navigating in Real-Time Environments

An interview with Jim Selman.
COLUMN: Kode vicious

Removing Kode

Dead functions and dead features.
COLUMN: Viewpoint

Silicon Politics

Tracing the widening path between Silicon Valley and Washington, D.C.

Federated Learning for Privacy-Preserving AI

Engineering and algorithmic framework to ensure data privacy and user confidentiality.
SECTION: Practice

The Life of a Data Byte

Be kind and rewind.

Security Analysis of SMS as a Second Factor of Authentication

The challenges of multifactor authentication based on SMS, including cellular security deficiencies, SS7 exploits, and SIM swapping.
SECTION: Contributed articles

Green AI

Creating efficiency in AI research will decrease its carbon footprint and increase its inclusivity as deep learning study should not require the deepest pockets.

The Dark Triad and Insider Threats in Cyber Security

Tracing the relationship between pathological personality traits and insider cyber sabotage.
SECTION: Review articles

Measuring Internet Speed: Current Challenges and Future Recommendations

Speed testing methods have flourished over the last decade, but none without at least some limitations.
SECTION: Research highlights

Technical Perspective: XNOR-Networks – Powerful but Tricky

How to produce a convolutional neural net that is small enough to run on a mobile device, and accurate enough to be worth using? The strategies in "Enabling AI at the Edge with XNOR-Networks" are the best known to date.

Enabling AI at the Edge with XNOR-Networks

We present a novel approach to running state-of-the-art AI algorithms in edge devices, and propose two efficient approximations to standard convolutional neural networks.

Technical Perspective: The Future of Large-Scale Embedded Sensing

The system described in "SATURN: An Introduction to the Internet of Materials" works passively, energized essentially by static electricity generated as layers move relative to each other during vibration.

SATURN: An Introduction to the Internet of Materials

We propose an Internet of Materials, where the very materials of objects and surfaces are augmented or manufactured to have computational capabilities.
COLUMN: Last byte

Walden Three

Can humanity take its next step forward by taking a step back?