DEPARTMENT: From the President
This is an update on the efforts of the ACM Executive Committee and Council to draft a longer-term strategic plan for our organization.
DEPARTMENT: Cerf's Up
The QR code, a convenient mechanism for delivering digital information to a reader, does not come with any human-readable way to ascertain safety. You have no way to tell whether it is potentially malicious.
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
Vinton G. Cerf wonders "whether there is any possibility of establishing 'watcher networks'" in his October 2022 Communications "Cerf's Up" column. Philip K. Dick describes this problem in his story The Minority Report.
Koby Mike and Orit Hazzan consider why multiple definitions are needed to pin down data science.
Koby Mike, Orit Hazzan
Cryptographers seek algorithms quantum computers cannot break.
Advances in artificial intelligence permit computers to converse with humans in seemingly realistic ways.
When fed a sufficient amount of training data, artificial intelligence techniques can be used to generate new ideas in several different ways. Is that creativity?
How active-learning techniques can benefit students in computing courses.
COLUMN: Kode Vicious
It is time to get the POSIX elephant off our necks.
George V. Neville-Neil
COLUMN: Computing Ethics
The equation Ethics + AI = Ethical AI is questionable.
Deborah G. Johnson, Mario Verdicchio
Seeking to make machine learning more dependable.
Charles Isbell, Michael L. Littman, Peter Norvig
Proposing a community-based system for model development.
Why deep learning will not replace programming.
Daniel M. Yellin
Exploring Black faculty at computer science research departments where Ph.D. programs exist.
Juan E. Gilbert, Jeremy A. Magruder Waisome, Simone Smarr
Demystifying zero trust and its implications on enterprise people, process, and technology.
Matthew Bush, Atefeh Mashatan
A discussion of zero-trust enterprise efforts in cybersecurity.
Michael Loftus, Andrew Vezina, Rick Doten, Atefeh Mashatan
SECTION: Contributed Articles
Looking past inessential complexities to explain the Internet's simple yet daring design.
James Mccauley, Scott Shenker, George Varghese
Prior pessimism about reuse in software engineering research may have been a result of using the wrong methods to measure the wrong things.
Maria Teresa Baldassarre, Neil Ernst, Ben Hermann, Tim Menzies, Rahul Yedida
An examination of how the technology landscape has changed and possible future directions for HPC operations and innovation.
Daniel Reed, Dennis Gannon, Jack Dongarra
SECTION: Review Articles
A taxonomy of the methods used to obtain quality datasets enhances existing resources.
Chen Shani, Jonathan Zarecki, Dafna Shahaf
SECTION: Research Highlights
"Proving Data-Poisoning Robustness in Decision Trees," by Samuel Drews et al
., addresses the challenge of processing an intractably large set of trained models when enumeration is infeasible in a clean, beautiful, and elegant …
We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote, which abstractly trains decision trees for an intractably large space of possible poisoned datasets.
Samuel Drews, Aws Albarghouthi, Loris D'Antoni
COLUMN: Last Byte
An ancient Roman dispatched to find the greatest technological advances of the time may lose something of far greater importance.
William Sims Bainbridge