


default search action
Communications of the ACM, Volume 68
Volume 68, Number 1, January 2025
- Moshe Y. Vardi
:
I Was Wrong about the Ethics Crisis. 5
- CACM Staff:
Is It Math or CS? Or Is It Both? 6-7
- Micah Beck, Brenna Bentley, Anika Roskowski:
Connecting the Unconnected. 8-9
- Chris Edwards:
The Secret of Ramsey Numbers: A new order forms out of randomness. 11-13 - Logan Kugler:
Who Owns AI's Output? 14-16 - Don Monroe:
Addressing the Data Storage Crisis. 17-19
- Virgílio Almeida, Ricardo Fabrino Mendonça
, Fernando Filgueiras
:
Thinking of Algorithms as Institutions. 20-23
- Erik Deumens
, Carolyn Ellis
:
Compliance Requirements in Research. 24-26
- James Grimmelmann
:
The Fine Line Between Persuasion and Coercion. 27-29
- Michael A. Cusumano:
Intel's Fall from Grace. 30-32
- Hans Hüttel
:
On Program Synthesis and Large Language Models. 33-35 - Hilde G. Corneliussen
:
'Superpowers' of Gender Equality Failing to Establish Gender Balance in IT. 36-38
- Jim Waldo, Soline Boussard
:
GPTs and Hallucination. 40-45 - Phil Vachon:
Test Accounts: A Hidden Risk. 46-49
- Barry Porter
, Penny Faulkner Rainford
, Roberto Rodrigues Filho
:
Self-Designing Software. 50-59 - Krishna Venkatasubramanian
, Tina-Marie Ranalli
, Piriyankan Kirupaharan
, Liam Cannon
:
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities. 60-67 - Jack Parkinson
, Lauren Margulieux
:
Improving CS Performance by Developing Spatial Skills. 68-75
- Gene Tsudik
:
Tracing the Network Traffic Fingerprinting Techniques of OpenVPN. 78 - Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. 79-87 - Timothy Neate:
Can AI Keep Accessible Communication in the Picture? 88 - Maurício Fontana de Vargas
, Jiamin Dai
, Karyn Moffatt
:
AAC with Automated Vocabulary from Photographs: Insights from School and Speech-Language Therapy Settings. 89-96
- Dennis Shasha:
Cylinder Lottery.
Volume 68, Number 2, February 2025
- Vinton G. Cerf:
Building Safer and Interoperable AI systems. 5
- Geraldine Fitzpatrick
:
Fit for People, Fit for Purpose: Designing Tech that Matters. 7
- Alex Williams:
Go-ing to the Cloud. 8-9
- Samuel Greengard:
Can LLMs Make Robots Smarter? 11-13 - Esther Shein:
The Evolution of Computer Science at the University Level. 14-16 - Neil Savage:
Brain Implants Give People Back What They Lost. 17-19
- Michael Felderer
, Michael Goedicke
, Lars Grunske
, Wilhelm Hasselbring
, Anna-Lena Lamprecht
, Bernhard Rumpe
:
Investigating Research Software Engineering: Toward RSE Research. 20-23
- Thomas Haigh:
Artificial Intelligence Then and Now. 24-29
- Ian Gorton
, Alessio Bucaioni
, Patrizio Pelliccione
:
Technical Credit. 30-33
- George V. Neville-Neil:
Building on Shaky Ground. 34-35
- David A. Patterson:
Life Lessons from the First Half-Century of My Career. 36-39
- Robert N. M. Watson, John Baldwin, David Chisnall, Tony Chen, Jessica Clarke, Brooks Davis, Nathaniel Wesley Filardo, Brett F. Gutstein, Graeme Jenkinson, Ben Laurie, Alfredo Mazzinghi, Simon W. Moore, Peter G. Neumann, Hamed Okhravi, Alex Richardson, Alex Rebert, Peter Sewell, Laurence Tratt, Murali Vijayaraghavan, Hugo Vincent, Konrad Witaszczyk:
It Is Time to Standardize Principles and Practices for Software Memory Safety. 40-45
- Catherine Hayes, David Malone:
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions. 46-51
- Chunqiang Tang
:
Meta's Hyperscale Infrastructure: Overview and Insights. 52-63 - Jennifer A. Rode
, Luís A. Castro
, Varun K. Viswanath
, María Concepción Valdez Gastelum
, Afra Mashhadi
, Monica Tentori
, Kristof Van Laerhoven
, Nadir Weibel
:
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences. 64-73 - Kedar S. Namjoshi
, Lenore D. Zuck
:
Program Correctness through Self-Certification. 74-84
- Richard Peng:
Shortening the Path to Designing Efficient Graph Algorithms. 86 - Aaron Bernstein, Danupon Nanongkai, Christian Wulff-Nilsen:
Negative-Weight Single-Source Shortest Paths in Near-Linear Time. 87-94 - Thorsten Holz
:
Unsafe Code Still a Hurdle Copilot Must Clear. 95 - Hammond Pearce
, Baleegh Ahmad
, Benjamin Tan
, Brendan Dolan-Gavitt
, Ramesh Karri
:
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions. 96-105
- David Studebaker:
A Heavenly Host.
Volume 68, Number 3, March 2025
- Moshe Y. Vardi:
Homo Ratiocinator (Reckoning Human). 5
- Wang Fan, Shaoshan Liu:
Putting the Smarts into Robot Bodies. 6-8
- Chris Edwards:
Feedback Loops Guide AI to Proof Checking. 9-11 - Mark Halper:
How Software Bugs led to "One of the Greatest Miscarriages of Justice" in British History. 12-14 - Sandrine Ceurstemont:
Controlling AI's Growing Energy Needs. 15-17
- Pamela Samuelson:
California's AI Act Vetoed. 18-20
- Peter J. Denning:
Abstractions. 21-23
- Robert West
, Roland Aydin
:
The AI Alignment Paradox. 24-26
- Charles Morphy D. Santos
, João Paulo Gois
:
Artificial Intelligence as Catalyst for Biodiversity Understanding. 27-29 - Jack West
, Jingjie Li
, Kassem Fawaz
:
A Glimpse Into the Pandora's Box. 30-32
- Shuvendu K. Lahiri
, Alexey Svyatkovskiy
, Christian Bird
, Erik Miejer
, Terry Coatta
:
Program Merge: What's Deep Learning Got to Do with It? 34-41
- Veniamin Veselovsky
, Manoel Horta Ribeiro
, Philip Cozzolino
, Andrew Gordon, David M. Rothschild
, Robert West
:
Prevalence and Prevention of Large Language Model Use in Crowd Work. 42-47 - Xuewei Feng
, Qi Li
, Kun Sun
, Ke Xu
, Jianping Wu
:
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite. 48-59 - Luca Felicetti
, Mauro Femminella
, Gianluca Reali
:
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies. 60-69 - Lieven Eeckhout
:
The Sustainability Gap for Computing: Quo Vadis? 70-79
- Uriel Feige:
The Surprising Power of Spectral Refutation. 82 - Venkatesan Guruswami, Pravesh K. Kothari, Peter Manohar:
New Spectral Algorithms for Refuting Smoothed k-SAT. 83-91 - Graham Cormode:
Technical Perspective: Toward Building a Differentially Private DBMS. 92 - Wei Dong, Juanru Fang, Ke Yi, Yuchao Tao, Ashwin Machanavajjhala:
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys. 93-101
- Leah Hoffmann:
Not on the Best Path.
Volume 68, Number 4, April 2025
- Vinton G. Cerf:
Remember. 5
- Henrik Skaug Sætra:
Leaving X. 6-7
- Chris Edwards:
When Will This End? 9-11 - Paul Marks:
Guide Dogs Are Expensive and Scarce. Could Robots Do Their Job? 12-14 - Logan Kugler:
How Do You Measure AI? 15-17
- Mari Sako, Teppo Felin:
Does AI Prediction Scale to Decision Making? 18-21
- George V. Neville-Neil:
The Drunken Plagiarists. 22-23
- Evgenia Christoforou
, Gianluca Demartini
, Jahna Otterbacher
:
Crowdsourcing or AI Sourcing? 24-27 - Shuang Wu, Bo Yu, Shaoshan Liu, Yuhao Zhu:
Autonomy 2.0: The Quest for Economies of Scale. 28-32 - Ryen W. White
, Chirag Shah
:
Panmodal Information Interaction. 33-36
- Stacy M. Branham, Shahtab Wahid, Sheri Byrne-Haber, Jamal Mazrui, Carlos Muncharaz, Carl Myhill:
The State of Digital Accessibility. 38-41
- David Gefen, Barry A. Leffew, Arik Ragowsky, René Riedl:
The Importance of Distrust in Trusting Digital Worker Chatbots. 42-49 - Marianna Obrist
, Carlos Velasco
:
Multisensory Experiences: Formation, Realization, and Responsibilities. 50-59 - Henrik Skaug Sætra
:
Preprinting in AI Ethics: Toward a Set of Community Guidelines. 60-68
- Kenneth Salem
:
Ad Hoc Transactions: What They Are and Why We Should Care. 70 - Chuzhe Tang, Zhaoguo Wang, Xiaodong Zhang, Qianmian Yu, Binyu Zang, Haibing Guan, Haibo Chen:
Many Faces of Ad Hoc Transactions. 71-80 - Xia Zhou
:
The Technologies that Disappear. 81 - Ali Kiaghadi, Jin Huang, Seyedeh Zohreh Homayounfar, Trisha Andrew, Deepak Ganesan:
FabToys: Large Arrays of Fabric-Based Pressure Sensors in Plush Toys to Detect Fine-Grained Interaction. 82-90
- Dennis Shasha:
Efficient Go Bags. 92
Volume 68, Number 05, May 2025
- Moshe Y. Vardi:
Big Tech, You Need Academia. Speak Up! 5
- Robin K. Hill:
In Pursuit of Professionalism. 6-7
- Samuel Greengard:
Shining a Light on AI Hallucinations. 9-11 - Esther Shein:
The Outlook for Programmers. 12-14 - Sandrine Ceurstemont:
Automating Tools for Prompt Engineering. 15-17
- James Grimmelmann
:
The TikTok Ban and Its Consequences. 18-20
- Sabine Weber
:
Can We Build AI That Does Not Harm Queer People? 21-23
- Mona Sloane
:
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting. 24-26 - Antonis C. Kakas
:
The Pollution of AI. 27-30
- Andrew Quinn, Peter Alvaro:
Deterministic Record-and-Replay. 32-34
- Jean-Yves Marion
:
Ransomware: Extortion Is My Business. 36-47 - Jizhi Zhang
, Keqin Bao
, Wenjie Wang
, Yang Zhang
, Wentao Shi
, Wanhong Xu
, Fuli Feng
, Tat-Seng Chua
:
Envisioning Recommendations on an LLM-Based Agent Platform. 48-57 - Annalu Waller
, Tom Griffiths
, Per Ola Kristensson
:
'What I Think about When I Type about Talking': Reflections on Text-Entry Acceleration Interfaces. 58-68 - Peter Buneman
, Dennis Dosso
, Matteo Lissandrini
, Gianmaria Silvello
, He Sun:
Can We Measure the Impact of a Database? 69-76
- Yatish Turakhia:
Toward a Generalized Accelerator for Genome Sequence Analysis. 80 - Yufeng Gu, Arun Subramaniyan, Timothy Dunn, Alireza Khadem, Kuan-Yu Chen, Somnath Paul, Mohammad Vasimuddin, Sanchit Misra, David T. Blaauw, Satish Narayanasamy, Reetuparna Das:
GenDP: A Framework of Dynamic Programming Acceleration for Genome Sequencing Analysis. 81-90 - Tim Kraska:
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory. 91 - Qing Wang
, Youyou Lu
, Jiwu Shu
:
Designing an Efficient Tree Index on Disaggregated Memory. 92-100
- Mina Rezaei:
Explorers' Intangible Power.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
