Quantcast
Channel: Communications of the ACM
Browsing all 85 articles
Browse latest View live

Can Machines Be in Language?

In late 2022, large language models (LLMs) erupted into the public spotlight. Pundits were quick to claim LLMs are the next step in the path to artificial general intelligence (AGI) and even the...

View Article



In Memoriam: Niklaus Wirth

Computing pioneer Niklaus Wirth died on January 1, 2024, just 45 days short of his 90th birthday. Wirth was born in Switzerland in 1934. He received his B.S. from ETH (Swiss Federal Institute of...

View Article

Image may be NSFW.
Clik here to view.

Disinformation 2.0 in the Age of AI: A Cybersecurity Perspective

According to a report from Lloyd’s Register Foundation,a at present, cybercrime is one of the biggest concerns of Internet users worldwide, with disinformationb ranking highest among such risks (57%...

View Article

CACM Is Now Open Access

We are excited to announce that Communications of the ACM (CACM) is now a fully Open Access publication. This means that more than six decades of CACM’s renowned research articles, seminal papers,...

View Article

Corrigendum for February 2024 Research Article

In the February 2024 Communications article titled, “Energy and Emissions of Machine Learning on Smartphones vs. the Cloud,” the authors found and corrected two arithmetic errors after it was printed....

View Article


Image may be NSFW.
Clik here to view.

Co-Developing Programs and Their Proof of Correctness

Twenty years ago, Sir Tony Hoare proposed a grand challenge to the computing research community: to develop a verifying compiler [which] uses mathematical and logical reasoning to check the...

View Article

Technical Perspective: Hiding Secrets in Programs

Can we create computer programs that do not reveal anything about their inner workings? This is the goal of program obfuscation. An obfuscator is a compiler that transforms a program into an...

View Article

Indistinguishability Obfuscation from Well-Founded Assumptions

1. Introduction Consider the polynomial f1(x,y)ɛℤ[x,y] that is computed as follows: f 1 ( x , y ) = ( x + y ) 16 − ( x − y ) 16 Alternatively, contemplate the polynomial f2(x,y)ɛℤ[x,y] that is...

View Article


Here Come the Killer Robots

In late 2023, the United Nations General Assembly approved its first-ever resolution on autonomous weapons systems, or weapons systems powered by artificial intelligence (AI). The resolution raised...

View Article


A Healthy Dose of AI

Diagnosing and treating medical problems is at the heart of effective healthcare. However, too often, symptoms are vague, errors occur, or people simply do not have access to adequate healthcare at...

View Article

How to Navigate Generative AI within the Regulatory Frameworks of Banking and...

Application of Generative AI within the strict guardrails of banking and finance is a critical endeavor that requires a delicate balance between innovation and compliance. These advanced AI systems...

View Article

Image may be NSFW.
Clik here to view.

The Science of Detecting LLM-Generated Text

Recent advancements in natural language generation (NLG) technology have significantly improved the diversity, control, and quality of large language models (LLM)-generated text. A notable example is...

View Article

How Generative AI Fits into Knowledge Work

Since OpenAI released ChatGPT in November 2022, we have seen increased excitement about generative artificial intelligence (AI), coupled with concerns about its safety. Given this inflection point, we...

View Article


Thoughts on AI Interoperability

A chance meeting with Jake Taylor, National Institute of Standards and Technology’s (NIST) new lead for the AI Safety Institute Consortium,a led me to wonder about the interoperability of machine...

View Article

Is There Another System?

Dear KV, There has been considerable discussion about the use of AI for automating a lot of work—including software development. I have just finished a Ph.D., I am out of school, and I have been...

View Article


Image may be NSFW.
Clik here to view.

Device Onboarding using FDO and the Untrusted Installer Model

The Internet of Things (IoT) market has grown into a major business, with millions of devices and servers dedicated to tracking, logging, and measuring real-world features. This covers many areas of...

View Article

Image may be NSFW.
Clik here to view.

Edge AI Devices Eye Lifetime Learning

Today, artificial intelligence (AI) devices at the network’s edge—such as the billions of Internet of Things (IoT) devices IDC predicts will net $1 trillion by 2026—should have lifelong learning...

View Article


Abusing AI for Advertising

The use of made-for-advertising (MFA) sites, websites created solely to generate digital ad impressions without regard to the content’s quality, legitimacy, or the end-user’s experience, have become a...

View Article

The Security Jawbreaker

When someone stands at the front door of your home, what are the steps to let them in? If it is your partner or another member of the family, they use their house key, unlocking the door using the...

View Article

Ensuring Business Continuity with Backup Cloud Storage Choices

Data storage is one of the foundations of effective work for both companies and individuals. However, with the constant growth in the volume of information and the increasing likelihood of data loss...

View Article
Browsing all 85 articles
Browse latest View live




Latest Images