Can Machines Be in Language?
In late 2022, large language models (LLMs) erupted into the public spotlight. Pundits were quick to claim LLMs are the next step in the path to artificial general intelligence (AGI) and even the...
View ArticleIn Memoriam: Niklaus Wirth
Computing pioneer Niklaus Wirth died on January 1, 2024, just 45 days short of his 90th birthday. Wirth was born in Switzerland in 1934. He received his B.S. from ETH (Swiss Federal Institute of...
View ArticleDisinformation 2.0 in the Age of AI: A Cybersecurity Perspective
According to a report from Lloyd’s Register Foundation,a at present, cybercrime is one of the biggest concerns of Internet users worldwide, with disinformationb ranking highest among such risks (57%...
View ArticleCACM Is Now Open Access
We are excited to announce that Communications of the ACM (CACM) is now a fully Open Access publication. This means that more than six decades of CACM’s renowned research articles, seminal papers,...
View ArticleCorrigendum for February 2024 Research Article
In the February 2024 Communications article titled, “Energy and Emissions of Machine Learning on Smartphones vs. the Cloud,” the authors found and corrected two arithmetic errors after it was printed....
View ArticleCo-Developing Programs and Their Proof of Correctness
Twenty years ago, Sir Tony Hoare proposed a grand challenge to the computing research community: to develop a verifying compiler [which] uses mathematical and logical reasoning to check the...
View ArticleTechnical Perspective: Hiding Secrets in Programs
Can we create computer programs that do not reveal anything about their inner workings? This is the goal of program obfuscation. An obfuscator is a compiler that transforms a program into an...
View ArticleIndistinguishability Obfuscation from Well-Founded Assumptions
1. Introduction Consider the polynomial f1(x,y)ɛℤ[x,y] that is computed as follows: f 1 ( x , y ) = ( x + y ) 16 − ( x − y ) 16 Alternatively, contemplate the polynomial f2(x,y)ɛℤ[x,y] that is...
View ArticleHere Come the Killer Robots
In late 2023, the United Nations General Assembly approved its first-ever resolution on autonomous weapons systems, or weapons systems powered by artificial intelligence (AI). The resolution raised...
View ArticleA Healthy Dose of AI
Diagnosing and treating medical problems is at the heart of effective healthcare. However, too often, symptoms are vague, errors occur, or people simply do not have access to adequate healthcare at...
View ArticleHow to Navigate Generative AI within the Regulatory Frameworks of Banking and...
Application of Generative AI within the strict guardrails of banking and finance is a critical endeavor that requires a delicate balance between innovation and compliance. These advanced AI systems...
View ArticleThe Science of Detecting LLM-Generated Text
Recent advancements in natural language generation (NLG) technology have significantly improved the diversity, control, and quality of large language models (LLM)-generated text. A notable example is...
View ArticleHow Generative AI Fits into Knowledge Work
Since OpenAI released ChatGPT in November 2022, we have seen increased excitement about generative artificial intelligence (AI), coupled with concerns about its safety. Given this inflection point, we...
View ArticleThoughts on AI Interoperability
A chance meeting with Jake Taylor, National Institute of Standards and Technology’s (NIST) new lead for the AI Safety Institute Consortium,a led me to wonder about the interoperability of machine...
View ArticleIs There Another System?
Dear KV, There has been considerable discussion about the use of AI for automating a lot of work—including software development. I have just finished a Ph.D., I am out of school, and I have been...
View ArticleDevice Onboarding using FDO and the Untrusted Installer Model
The Internet of Things (IoT) market has grown into a major business, with millions of devices and servers dedicated to tracking, logging, and measuring real-world features. This covers many areas of...
View ArticleEdge AI Devices Eye Lifetime Learning
Today, artificial intelligence (AI) devices at the network’s edge—such as the billions of Internet of Things (IoT) devices IDC predicts will net $1 trillion by 2026—should have lifelong learning...
View ArticleAbusing AI for Advertising
The use of made-for-advertising (MFA) sites, websites created solely to generate digital ad impressions without regard to the content’s quality, legitimacy, or the end-user’s experience, have become a...
View ArticleThe Security Jawbreaker
When someone stands at the front door of your home, what are the steps to let them in? If it is your partner or another member of the family, they use their house key, unlocking the door using the...
View ArticleEnsuring Business Continuity with Backup Cloud Storage Choices
Data storage is one of the foundations of effective work for both companies and individuals. However, with the constant growth in the volume of information and the increasing likelihood of data loss...
View Article
More Pages to Explore .....