Issue Downloads
Teaching the FATE Community about Privacy
The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Follow us on Twitter at http://twitter.com/blogCACM
https:...
Computer-Assisted Proofs Take on Fluid Flow
Researchers use computers to show that equations can "blow up."
3D Modeling Draws on AI
Artificial intelligence can unlock speed and quality improvements in three-dimensional graphics.
The Carbon Footprint of Artificial Intelligence
Looking for ways to cut the release of greenhouse gases attributable to AI use, at a time that usage is very likely to grow.
Voice in the Machine: Ethical Considerations for Language-Capable Robots
Parsing the promise of language-capable robots.
Improving Computing Education Research through Valuing Design
Exploring alternatives to existing research systems and methods.
The Human Touch
There is no substitute for good, direct, honest training.
SI and Binary Prefixes: Clearing the Confusion
Considering the emergence of non-standard acceptance of SI prefixes.
For a More Transparent Governance of Open Source
Seeking the best governance models for FOSS projects.
Why You Should Be Able to Make Your Own Individualized, Digital Nano-Currency
Increasing opportunities for access to traditional financial systems.
AI and Society: Ethics, Trust, and Cooperation
Trust and trustworthiness are central to how ethics helps society survive and thrive.
Sharpening Your Tools
Updating bulk_extractor for the 2020s.
More Than Just Algorithms
A discussion with Alfred Spector, Peter Norvig, Chris Wiggins, Jeannette Wing, Ben Fried, and Michael Tingley.
A Computational Inflection for Scientific Discovery
Enabling researchers to leverage systems to overcome the limits of human cognitive capacity.
A Tale of Two Markets: Investigating the Ransomware Payments Economy
A data-driven, follow-the-money approach to characterize the ransomware ecosystem uncovers two parallel ransomware criminal markets: commodity ransomware and Ransomware as a Service (RaaS).
The Principles of Data-Centric AI
Uniting data-centric perspectives and concepts to trace the foundations of DCAI.
A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers
As hyperscalers such as Google, Microsoft, and Amazon play an increasingly important role in today's Internet, they are also capable of manipulating probe packets that traverse their privately owned and operated backbones. As a result, standard ...
Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship
- Kelly Mack,
- Maitraye Das,
- Dhruv Jain,
- Danielle Bragg,
- John Tang,
- Andrew Begel,
- Erin Beneteau,
- Josh Urban Davis,
- Abraham Glasser,
- Joon Sung Park,
- Venkatesh Potluri
The COVID-19 pandemic forced many people to convert their daily work lives to a "virtual" format, in which they connected remotely from home. In this new, virtual environment, accessibility barriers changed, in some respects for the better (e.g., more ...
L-Space and Large Language Models
From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be.
Design fiction is an approach to understanding and speculating about alternate futures. One part of this ...