Sign In

Communications of the ACM

Table of Contents


Self-Authenticating Identifiers

The peculiar property that makes public key cryptography interesting is that you must use one key to encrypt and the other to decrypt.
DEPARTMENT: Letters to the editor

Reclaim Internet Greatness

Vinton G. Cerf's "The Internet in the 21st Century" (Sept. 2018) highlighted many challenges facing today's Internet. The fundamental issue becomes what changes are warranted and who will be responsible for defining and administering …

Securing Agent 111, and the Job of Software Architect

John Arquilla describes the new state of cyberspying, while Yegor Bugayenko considers the importance of a software architect to development projects.

Learning to See

Machine learning turns the spotlight on elusive viruses.

Technology for the Deaf

Why aren't better assistive technologies available for those communicating using ASL?

AI Judges and Juries

Artificial intelligence is changing the legal industry.
COLUMN: The profession of IT

Learning Machine Learning

A discussion of the rapidly evolving realm of machine learning.
COLUMN: Kode vicious

A Chance Gardener

Harvesting open source products and planting the next crop.
COLUMN: Point/counterpoint

Point: Should AI Technology Be Regulated?: Yes, and Here's How

Considering the difficult technical and sociological issues affecting the regulation of artificial intelligence research and applications.

Counterpoint: Regulators Should Allow the Greatest Space for AI Innovation

Permissionless innovation should be the governing policy for AI technologies.
COLUMN: Viewpoint

Opportunities and Challenges in Search Interaction

Seeking to address a wider range of user requests toward task completion.
SECTION: Practice

How to Live in a Post-Meltdown and -Spectre World

Learn from the past to prepare for the next battle.

Why SRE Documents Matter

How documentation enables SRE teams to manage new and existing services.

How to Get Things Done When You Don't Feel Like It

Five strategies for pushing through.
SECTION: Contributed articles

What Motivates a Citizen to Take the Initiative in e-Participation?: The Case of a South Korean Parliamentary Hearing

Citizen-led initiatives via social media yield political influence, including even with a country's top political leaders.

Uncertainty in Current and Future Health Wearables

Expect inherent uncertainties in health-wearables data to complicate future decision making concerning user health.

A Century-Long Commitment to Assessing Artificial Intelligence and Its Impact on Society

A series of reports promises the general public a technologically accurate view of the state of AI and its societal implications.
SECTION: Review articles

Designing Emotionally Sentient Agents

Emotionally sentient systems will enable computers to perform complex tasks more effectively, making better decisions and offering more productive services.

Search-based Program Synthesis

A promising, useful tool for future programming development environments.
SECTION: Research highlights

Technical Perspective: Node Replication Divides to Conquer

In "How to Implement Any Concurrent Data Structure," Calciu et al. show that a concurrent data structure can be built automatically and that its performance is actually competitive with state-of-the-art designs for a series of …

How to Implement Any Concurrent Data Structure

We propose a method called Node Replication (NR) to implement any concurrent data structure.

Technical Perspective: WebAssembly: A Quiet Revolution of the Web

"Bringing the Web Up to Speed with WebAssembly," by Rossberg et al., gives an overview of the initial design of WebAssembly, a new low-level programming language for Web-based software.

Bringing the Web Up to Speed with WebAssembly

WebAssembly is the first mainstream language designed from the start with a formal semantics. It not only demonstrates the feasibility of applying formal techniques, but also that they lead to a remarkably clean and simple design …
COLUMN: Last byte

Promoting Common Sense, Reality, Dependable Engineering

Peter G. Neumann traces a lifetime devoted to identifying computing risks.