Sign In

Communications of the ACM

Video Highlights

Spectre Attacks: Exploiting Speculative Execution

This paper describes practical attacks that combine methodology from side-channel attacks, fault attacks, and return-...

Your Wish Is My CMD

Artificial intelligence could automate software coding.

The Quantum Threat

Cryptographers are developing algorithms to ensure security in a world of quantum computing.

Reducing and Eliminating E-Waste

We need to mitigate the environmental impact of disposing of electronics at their end of useful life.

The Data Science Life Cycle: A Disciplined Approach to Advancing Data Science as a Science

A cycle that traces ways to define the landscape of data science.

Some Simple Economics of the Blockchain

Blockchain technology can shape innovation and competition in digital platforms, but under what conditions?

Hiring from the Autism Spectrum

Companies increasingly are looking to hire people who are on the autism spectrum to fill IT roles.

Seeing Through Walls

Artificial intelligence makes sense of radio signals to understand what someone in another room is doing.

How to Curtail Oversensing in the Home

Limiting sensitive information leakage via smart-home sensor data.