Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 66, Issue 5May 2023
Editor:
  • James Larus
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:0001-0782
EISSN:1557-7317
Published In:
cacm
Reflects downloads up to 02 Feb 2025Bibliometrics
Skip Table Of Content Section
DEPARTMENT: BLOG@CACM
opinion
Free
Securing Data for Business Telephones

The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.

twitter

Follow us on Twitter at http://twitter.com/blogCACM

https:...

COLUMN: News
article
Free
AlphaFold Spreads through Protein Science

Based on machine learning, DeepMind's code now lies at the heart of a variety of protein-structure tools and workflows. It may ultimately be replaced by models that are bigger but faster.

article
Free
Locking Down Secure Open Source Software

Can even secure open source software ever be considered truly safe?

article
Free
Women in Computer Science Are Making Strides

Computer science is still not a level playing field for those women who majored in it and choose to pursue it as a career.

COLUMN: Law and Technology
column
Free
Do the Right Thing

Exploring the intersection of legal compliance and ethical judgment.

COLUMN: Security
column
Free
Updates, Threats, and Risk Management

Revisiting a recent column considering security updates.

COLUMN: Education
column
Free
Putting a Teaspoon of Programming into Other Subjects

Using teaspoon languages to integrate programming across myriad academic disciplines.

COLUMN: Viewpoint
opinion
Free
Ethics as a Participatory and Iterative Process

Facilitating ethical reflection, inquiry, and deliberation.

opinion
Free
Please Report Your Compute

Seeking consistent means of measure.

opinion
Free
Long-Term Mentoring for Computer Science Researchers

Reaching out across computer science research communities.

SECTION: Practice
research-article
Open Access
Reinventing Backend Subsetting at Google

Designing an algorithm with reduced connection churn that could replace deterministic subsetting.

research-article
Open Access
Research for Practice: The Fun in Fuzzing

The debugging technique comes into its own.

SECTION: Contributed Articles
research-article
Open Access
From Code Complexity Metrics to Program Comprehension

Understanding code depends not only on the code but also on the brain.

research-article
Free
Development Use Cases for Semantics-Driven Modeling Languages

Choosing underlying semantic theories and definition techniques must closely follow intended use cases for the modeling language.

SECTION: Review Articles
research-article
Open Access
Unlocking the Potential of Fully Homomorphic Encryption

Exploring the transformational potential of FHE and the path toward adoption of its "stack."

research-article
Free
Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage

What are the promising applications to realize quantum advantage?

SECTION: Research Highlights
research-article
Free
Toward Basing Cryptography on the Hardness of EXP

Let Kt(x) denote the Levin-Kolmogorov Complexity of the string x, and let MKtP denote the language of pairs (x, k) having the property that Kt(x) ≤ k. We demonstrate that:

• MKtP ∉ HeurnegBPP (i.e., MKtP is two-sided error mildly average-case hard) iff ...

COLUMN: Last Byte
opinion
Free
ChatGPT, Can You Tell Me a Story? An Exercise in Challenging the True Creativity of Generative AI

From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be.

Subjects

Comments