The ACM 4.0 Initiative aims to lay the foundations of ACM for the next 25 years on issues of service to society and to ACM members, ACM membership, ACM finances, and internal processes.
Moshe Y. Vardi
DEPARTMENT: Career Paths in Computing
Everyone deserves the access and opportunity to have a good and fulfilling life. Technologies can only contribute toward this goal when they are designed from an understanding of what makes a life good for the people concerned …
Cybersecurity consultant Alex Tray looks at potential security issues, and solutions, for business telephone systems.
Based on machine learning, DeepMind's code now lies at the heart of a variety of protein-structure tools and workflows. It may ultimately be replaced by models that are bigger but faster.
Can even secure open source software ever be considered truly safe?
Computer science is still not a level playing field for those women who majored in it and choose to pursue it as a career.
COLUMN: Law and Technology
Exploring the intersection of legal compliance and ethical judgment.
Kendra Albert, James Grimmelmann
Revisiting a recent column considering security updates.
Steve Lipner, John Pescatore
Using teaspoon languages to integrate programming across myriad academic disciplines.
Mark Guzdial, Emma Dodoo, Bahare Naimpour, Tamara Nelson-Fromm, Aadarsh Padiyath
Facilitating ethical reflection, inquiry, and deliberation.
Seeking consistent means of measure.
Jaime Sevilla, Anson Ho, Tamay Besiroglu
Reaching out across computer science research communities.
Emily Ruppel, Sihang Liu, Elba Garza, Sukyoung Ryu, Alexandra Silva, Talia Ringer
This Viewpoint focuses on ways the computing community can contribute broadly to environmental sustainability and identifies NSF Directorate for Computer and Information Science and Engineering research programs supporting these …
Nina Amla, Dilma Da Silva, Michael Littman, Manish Parashar
Designing an algorithm with reduced connection churn that could replace deterministic subsetting.
Peter Ward, Paul Wankadia, Kavita Guliani
The debugging technique comes into its own.
SECTION: Contributed Articles
Understanding code depends not only on the code but also on the brain.
Dror G. Feitelson
Choosing underlying semantic theories and definition techniques must closely follow intended use cases for the modeling language.
Manfred Broy, Bernhard Rumpe
SECTION: Review Articles
Exploring the transformational potential of FHE and the path toward adoption of its "stack."
Shruthi Gorantala, Rob Springer, Bryant Gipson
What are the promising applications to realize quantum advantage?
Torsten Hoefler, Thomas Häner, Matthias Troyer
SECTION: Research Highlights
"Toward Basing Cryptography on the Hardness of EXP," by Yanyi Liu and Rafael Pass, establishes surprisingly tight bidirectional connections between one-way functions and the cross-domain notion of Kolmogorov complexity.
We show that the only "gap" toward getting (infinitely-often) OWFs from the assumption that EXP ≠ BPP is the seemingly "minor" technical gap between two-sided error and errorless average-case hardness of the MKtP problem.
Yanyi Liu, Rafael Pass
COLUMN: Last Byte
An exercise in challenging the true creativity of generative AI.