February — July 2023 Editorial Calendar
FEBRUARY 2023
MARCH 2023
APRIL 2023
MAY 2023
JUNE 2023
JULY 2023
NEWS
- Quantum-Resistent Cryptography
- Giant Neural Nets and Design Language Models
- The Potential Creativity from AI
VIEWPOINTS
- Software Engineering of Machine-Learning Systems
- Building Machine-Learning Models Like Open Source Models
- The Premature Obituary of Programming
PRACTICE
- Case Study—The Arrival of Zero Trust: What Does It Mean?
- From Zero to 100
CONTRIBUTED ARTICLES
- Extracting the Simplicity of the Net
- HPC Forecast: Cloudy and Uncertain
- (Re)Use of Research Results (It's Rampant)
RESEARCH HIGHLIGHTS
- Proving Data-Poisoning Robustness in Decision Trees
LAST BYTE
NEWS
- Using Graph Neural Nets for Drug Discovery
- Giant Neural Nets and Design Language Models
- The Potential Creativity from AI
VIEWPOINTS
- Designing an Ethical Technology Developer
- A Turning point in Cybersecurity
PRACTICE
- Mapping the Privacy Landscape for Central Digital Currencies
- Split Your Overwhelmed Teams
CONTRIBUTED ARTICLES
- AI and Neurotechnology
- Toward Practices for Human-Centered Machines
- The AI Tech Stack Model
RESEARCH HIGHLIGHTS
- Achieving High-Performance the Functional Way
LAST BYTE
NEWS
- Material Informatics
- Automated Code Generated using AI/ML
- ... and the Computer Plays Along
VIEWPOINTS
- Cyber Efficiency and Cyber Resilience
- Where is Research on Cryptographic Transition and Agility?
- Faculty Can Save the Lives of the Elderly
PRACTICE
- OCCAM v2
- OSS Supply Chain Security
CONTRIBUTED ARTICLES
- Protecting Autonomous Cars from Attacks
- Why Cybersecurity on Novel Brain Computer Interfaces Should be Prioritized
REVIEW ARTICLES
RESEARCH HIGHLIGHTS
LAST BYTE
NEWS
- Producing Proteins
- How Does Open Source Work?
- Where Are Women in Computer Science?
VIEWPOINTS
- Ethics as Participatory and Iterative Process
- Long-Term Mentoring for Computer Science Researchers
- Please Report Your Compute
PRACTICE
- Research for Practice: The Fun in Fuzzing
- Reinventing Backend Subsetting at Google
CONTRIBUTED ARTICLES
- From Code Complexity Metrics to Program Comprehension
- The Significance of Use Cases for Semantics-Driven Modeling Language
REVIEW ARTICLES
- On Realistically Achieving Quantum Advantage
- Unlocking the Potential of Fully Homomorphic Encryption
RESEARCH HIGHLIGHTS
- Toward Basing Cryptography on the Hardness of EXP
LAST BYTE
NEWS
- Profile of the new Turing Recipient(s)
- Faster Math
- Standards to Secure Sensors
- Disaster Relief
VIEWPOINTS
- Decentralization of Blockchain Apps
- Breaking a Digital Monopoly
- Accuracy, Error, Accountability in Algorithmic Society
PRACTICE
- To PiM or Not to PiM
- Taking Flight with Copilot
CONTRIBUTED ARTICLES
- The Silent (R)Evolution of SAT
- Buffer-Bloated Router?
REVIEW ARTICLES
- On the Implicit Bias in Deep-Learning Algorithms
- Should Robots Have Rights or Rites?
RESEARCH HIGHLIGHTS
LAST BYTE
- Q&A with Turing Recipient(s)
NEWS
- Optical Acceleration through AI
- Detecting Deepfake Texts
- Detecting Deepfake Images/Videos
VIEWPOINTS
- Fragility in AIs using Artificial Neural Networks
- Lost in Afghanistan
- SI and Binary Prefixes: Clearing Confusion
- For a More Transparent Governance of OS
PRACTICE
CONTRIBUTED ARTICLES
- Computational Inflection for Scientific Discovery
- A Systematic Treatment of Data Science
REVIEW ARTICLES
- Theoretical Analysus Sequencing of Biometric Algorithms
RESEARCH HIGHLIGHTS
- Offline/Online Algorithms for SSD Management
- On the (In)Security of ElGamal in OpenPGP
LAST BYTE