DEPARTMENT: From the ACM CEO
The new Policy for Honors Conferred by ACM and its associated procedures address two overarching issues with respect to awards, and addresses the very serious matter of award revocation.
DEPARTMENT: Cerf's up
The smartphone has become the Swiss Army knife of computing and communication. However, there are some downsides to this cornucopia of utility wrapped up in a pocket-sized device.
Jason Hong considers how computer scientists, technologists could help guide regulation of the social media giant.
A focus on causality is promising to help researchers overcome shortcomings that have bedeviled more traditional approaches to artificial intelligence.
Digital twins aim to model reality so we can see how it changes.
Advancements in AI, machine learning, and next-gen technologies are transforming the fight against world hunger.
"I cannot work on what I cannot see . . ." —Katherine Goble, Hidden Figures
COLUMN: Kode Vicious
The lessons here are broader than just a simple "Don't do that."
COLUMN: Historical Reflections
A new history of modern computing.
Suggesting a better route to evaluate autonomous vehicles' smartness.
Learning Responsible AI together.
Is artificial intelligence up to the task of managing online discourse in social networks?
An experience report.
Evaluating tool design guidelines with SWAN.
SECTION: Contributed articles
AI is driving the next evolution of chess, giving players a glimpse into the game's future.
Can algorithmic advice override preconceived notions and the believability of fake news?
SECTION: Turing lecture
Jeffrey D. Ullman and Alfred V. Aho are recipients of the 2020 ACM A.M. Turing award. They were recognized for creating fundamental algorithms and theory underlying programming language implementation and for synthesizing these …
SECTION: Review articles
The recent progress and ongoing problems of keeping online platforms and their users safe from malicious activities.
SECTION: Research highlights
"Supporting People with Autism Spectrum Disorders in the Exploration of PoIs" is an example of work that takes seriously the task of supporting a small group that is not well served by existing recommender systems.
We propose a novel Top-N recommendation model that combines information about an autistic user's idiosyncratic aversions with her/his preferences in a personalized way.
"Worst-Case Topological Entropy and Minimal Data Rate for State Estimation of Switched Linear Systems" gives a method for computing the topological entropy of a broad class of systems called switched linear systems.
In this paper, we study the problem of estimating the state of a switched linear system when the observation of the system is subject to communication constraints.
COLUMN: Last byte
FBI agents Saskia Lipcott and Dinah Carter are forced to deal with Dupin, the agency's rogue crime-fighting computer that is out to get them.