Researchers have invested immeasurable time and effort into programs that run and never halt.
Preprinting in AI Ethics: Toward a Set of Community Guidelines
Preprinting allows for the rapid dissemination of new ideas, but also of junk science and potentially of research without due ethics approval.
You Need Much Less Memory than Time
An upcoming STOC conference paper reports a huge near-quadratic improvement that will go down as a true classic complexity theorem.
Beyond Compliance: Security Documentation as a Strategic Asset
It’s time to stop viewing security documentation as a necessary evil and start leveraging it as a strategic asset.
What We're Reading
Opinion
BLOG@CACM
Explore the latest issue
Table of ContentsVideo
Prevalence and Prevention of Large Language Model Use in Crowd Work
LLMs may be particularly harmful in crowd work when the goal is to capture the diversity of human preferences, behaviors, or opinions.
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
An investigation of vulnerabilities within the TCP/IP protocol suite that can be exploited by forged ICMP errors.
Meta’s Hyperscale Infrastructure: Overview and Insights
A concise, high-level overview of Meta’s hyperscale infrastructure, with key insights from its development.
Multi-Dimensional Growth of GenAI Use by STEM Undergraduates
The evolution of GenAI tool usage by science and engineering students over their academic years provides valuable insights for students, educators, and educational institutions.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More