


default search action
Communications of the ACM, Volume 68
Volume 68, Number 1, January 2025
- Moshe Y. Vardi:
I Was Wrong about the Ethics Crisis. 5
- CACM Staff:
Is It Math or CS? Or Is It Both? 6-7
- Micah Beck, Brenna Bentley, Anika Roskowski:
Connecting the Unconnected. 8-9
- Chris Edwards:
The Secret of Ramsey Numbers: A new order forms out of randomness. 11-13 - Logan Kugler:
Who Owns AI's Output? 14-16 - Don Monroe:
Addressing the Data Storage Crisis. 17-19
- Virgílio Almeida, Ricardo Fabrino Mendonça, Fernando Filgueiras:
Thinking of Algorithms as Institutions. 20-23
- Erik Deumens, Carolyn Ellis:
Compliance Requirements in Research. 24-26
- James Grimmelmann:
The Fine Line Between Persuasion and Coercion. 27-29
- Michael A. Cusumano:
Intel's Fall from Grace. 30-32
- Hans Hüttel:
On Program Synthesis and Large Language Models. 33-35 - Hilde G. Corneliussen:
'Superpowers' of Gender Equality Failing to Establish Gender Balance in IT. 36-38
- Jim Waldo, Soline Boussard:
GPTs and Hallucination. 40-45 - Phil Vachon:
Test Accounts: A Hidden Risk. 46-49
- Barry Porter, Penny Faulkner Rainford, Roberto Rodrigues Filho:
Self-Designing Software. 50-59 - Krishna Venkatasubramanian, Tina-Marie Ranalli, Piriyankan Kirupaharan, Liam Cannon:
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities. 60-67 - Jack Parkinson, Lauren Margulieux:
Improving CS Performance by Developing Spatial Skills. 68-75
- Gene Tsudik:
Tracing the Network Traffic Fingerprinting Techniques of OpenVPN. 78 - Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. 79-87 - Timothy Neate:
Can AI Keep Accessible Communication in the Picture? 88 - Maurício Fontana de Vargas, Jiamin Dai, Karyn Moffatt:
AAC with Automated Vocabulary from Photographs: Insights from School and Speech-Language Therapy Settings. 89-96
- Dennis Shasha:
Cylinder Lottery.
Volume 68, Number 2, February 2025
- Vinton G. Cerf:
Building Safer and Interoperable AI systems. 5
- Geraldine Fitzpatrick:
Fit for People, Fit for Purpose: Designing Tech that Matters. 7
- Alex Williams:
Go-ing to the Cloud. 8-9
- Samuel Greengard:
Can LLMs Make Robots Smarter? 11-13 - Esther Shein:
The Evolution of Computer Science at the University Level. 14-16 - Neil Savage:
Brain Implants Give People Back What They Lost. 17-19
- Michael Felderer, Michael Goedicke, Lars Grunske, Wilhelm Hasselbring, Anna-Lena Lamprecht, Bernhard Rumpe:
Investigating Research Software Engineering: Toward RSE Research. 20-23
- Thomas Haigh:
Artificial Intelligence Then and Now. 24-29
- Ian Gorton, Alessio Bucaioni, Patrizio Pelliccione:
Technical Credit. 30-33
- George V. Neville-Neil:
Building on Shaky Ground. 34-35
- David A. Patterson:
Life Lessons from the First Half-Century of My Career. 36-39
- Robert N. M. Watson, John Baldwin, David Chisnall, Tony Chen, Jessica Clarke, Brooks Davis, Nathaniel Wesley Filardo, Brett F. Gutstein, Graeme Jenkinson, Ben Laurie, Alfredo Mazzinghi, Simon W. Moore, Peter G. Neumann, Hamed Okhravi, Alex Richardson, Alex Rebert, Peter Sewell, Laurence Tratt, Murali Vijayaraghavan, Hugo Vincent, Konrad Witaszczyk:
It Is Time to Standardize Principles and Practices for Software Memory Safety. 40-45
- Catherine Hayes, David Malone:
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions. 46-51
- Chunqiang Tang:
Meta's Hyperscale Infrastructure: Overview and Insights. 52-63 - Jennifer A. Rode, Luís A. Castro, Varun K. Viswanath, María Concepción Valdez Gastelum, Afra Mashhadi, Monica Tentori, Kristof Van Laerhoven, Nadir Weibel:
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences. 64-73 - Kedar S. Namjoshi, Lenore D. Zuck:
Program Correctness through Self-Certification. 74-84
- Richard Peng:
Shortening the Path to Designing Efficient Graph Algorithms. 86 - Aaron Bernstein, Danupon Nanongkai, Christian Wulff-Nilsen:
Negative-Weight Single-Source Shortest Paths in Near-Linear Time. 87-94 - Thorsten Holz:
Unsafe Code Still a Hurdle Copilot Must Clear. 95 - Hammond Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, Ramesh Karri:
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions. 96-105
- David Studebaker:
A Heavenly Host.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.