Issue Downloads
Using Data Science to Predict How Rituals Will Evolve
In each issue of Communications, we publish selected posts or excerpts from the many blogs on our website. The views expressed by bloggers are their own and not necessarily held by Communications or the Association for Computing Machinery.
Follow ...
Answers Begin to Surface to Deep Earth Puzzles
Evidence from high orbit is helping to shape understanding of the churning processes that shape oceans and continents.
Governments Setting Limits on AI
Many countries/regions are considering, or trying to implement, regulations on the training and use of artificial intelligence.
Abusing AI for Advertising
Will generative artificial intelligence accelerate the growth of made-for-advertising sites?
How Generative AI Fits into Knowledge Work
Seeking to influence how generative artificial intelligence affects various professions.
Generative AI and CS Education
Increasing knowledge sharing between industry and academia.
Bias, Skew, and Search Engines Are Sufficient to Explain Online Toxicity
Social media would still be a mess even without engagement algorithms.
Is There Another System?
Computer science is the study of what can be automated.
Who Determines What Is Relevant? Humans or AI? Why Not Both?
- Guglielmo Faggioli,
- Laura Dietz,
- Charles L. A. Clarke,
- Gianluca Demartini,
- Matthias Hagen,
- Claudia Hauff,
- Noriko Kando,
- Evangelos Kanoulas,
- Martin Potthast,
- Benno Stein,
- Henning Wachsmuth
A spectrum of human-artificial intelligence collaboration in assessing relevance.
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India
Overcoming barriers inhibiting greater inclusion and understanding.
Device Onboarding Using FDO and the Untrusted Installer Model
FDO's untrusted model is contrasted with Wi-Fi Easy Connect to illustrate the advantages of each mechanism.
The Security Jawbreaker
Access to a system should not imply authority to use it. Enter the principle of complete mediation.
The Science of Detecting LLM-Generated Text
While many detection methods have been proposed, understanding the challenges is far more daunting.
A Small Clue Made of Fragmented Pieces
The effect of online comment history disclosure on digital citizenship.
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems
The challenge of transforming polynomial-time algorithms to really efficient ones.
Language-Based Software Testing
Constraints over grammar elements can make test generation easier than ever.
Combining Machine Learning and Lifetime-Based Resource Management for Memory Allocation and Beyond
- Martin Maas,
- David G. Andersen,
- Michael Isard,
- Mohammad Mahdi Javanmard,
- Kathryn S. McKinley,
- Colin Raffel
Memory management is fundamental to the performance of all applications. On modern server architectures, an application's memory allocator needs to balance memory utilization against the ability to use 2MB huge pages, which are crucial for achieving high ...