DEPARTMENT: From the President
This is an update on the efforts of the ACM Executive Committee and Council to draft a longer-term strategic plan for our organization.
DEPARTMENT: Cerf's Up
The QR code, a convenient mechanism for delivering digital information to a reader, does not come with any human-readable way to ascertain safety. You have no way to tell whether it is potentially malicious.
DEPARTMENT: Letters to the Editor
Vinton G. Cerf wonders "whether there is any possibility of establishing 'watcher networks'" in his October 2022 Communications "Cerf's Up" column. Philip K. Dick describes this problem in his story The Minority Report.
Koby Mike and Orit Hazzan consider why multiple definitions are needed to pin down data science.
Cryptographers seek algorithms quantum computers cannot break.
Advances in artificial intelligence permit computers to converse with humans in seemingly realistic ways.
When fed a sufficient amount of training data, artificial intelligence techniques can be used to generate new ideas in several different ways. Is that creativity?
How active-learning techniques can benefit students in computing courses.
COLUMN: Kode Vicious
It is time to get the POSIX elephant off our necks.
COLUMN: Computing Ethics
The equation Ethics + AI = Ethical AI is questionable.
Seeking to make machine learning more dependable.
Proposing a community-based system for model development.
Why deep learning will not replace programming.
Exploring Black faculty at computer science research departments where Ph.D. programs exist.
Demystifying zero trust and its implications on enterprise people, process, and technology.
A discussion of zero-trust enterprise efforts in cybersecurity.
SECTION: Contributed Articles
Looking past inessential complexities to explain the Internet's simple yet daring design.
Prior pessimism about reuse in software engineering research may have been a result of using the wrong methods to measure the wrong things.
An examination of how the technology landscape has changed and possible future directions for HPC operations and innovation.
SECTION: Review Articles
A taxonomy of the methods used to obtain quality datasets enhances existing resources.
SECTION: Research Highlights
"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al
., addresses the challenge of processing an intractably large set of trained models when enumeration is infeasible in a clean, beautiful, and elegant …
We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for an intractably large space of possible poisoned datasets.
COLUMN: Last Byte
An ancient Roman dispatched to find the greatest technological advances of the time may lose something of far greater importance.