Issue Downloads
Securing Data for Business Telephones
The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Follow us on Twitter at http://twitter.com/blogCACM
https:...
AlphaFold Spreads through Protein Science
Based on machine learning, DeepMind's code now lies at the heart of a variety of protein-structure tools and workflows. It may ultimately be replaced by models that are bigger but faster.
Locking Down Secure Open Source Software
Can even secure open source software ever be considered truly safe?
Women in Computer Science Are Making Strides
Computer science is still not a level playing field for those women who majored in it and choose to pursue it as a career.
Do the Right Thing
Exploring the intersection of legal compliance and ethical judgment.
Updates, Threats, and Risk Management
Revisiting a recent column considering security updates.
Putting a Teaspoon of Programming into Other Subjects
Using teaspoon languages to integrate programming across myriad academic disciplines.
Ethics as a Participatory and Iterative Process
Facilitating ethical reflection, inquiry, and deliberation.
Please Report Your Compute
Seeking consistent means of measure.
Long-Term Mentoring for Computer Science Researchers
Reaching out across computer science research communities.
Reinventing Backend Subsetting at Google
Designing an algorithm with reduced connection churn that could replace deterministic subsetting.
Research for Practice: The Fun in Fuzzing
The debugging technique comes into its own.
From Code Complexity Metrics to Program Comprehension
Understanding code depends not only on the code but also on the brain.
Development Use Cases for Semantics-Driven Modeling Languages
Choosing underlying semantic theories and definition techniques must closely follow intended use cases for the modeling language.
Unlocking the Potential of Fully Homomorphic Encryption
Exploring the transformational potential of FHE and the path toward adoption of its "stack."
Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage
What are the promising applications to realize quantum advantage?
Toward Basing Cryptography on the Hardness of EXP
Let Kt(x) denote the Levin-Kolmogorov Complexity of the string x, and let MKtP denote the language of pairs (x, k) having the property that Kt(x) ≤ k. We demonstrate that:
• MKtP ∉ HeurnegBPP (i.e., MKtP is two-sided error mildly average-case hard) iff ...
ChatGPT, Can You Tell Me a Story? An Exercise in Challenging the True Creativity of Generative AI
From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be.