» Computing, You Have Blood on Your Hands!
01/01/24 05:00 from Communications of the ACM: Latest Issue
How did the technology that we considered "cool" just a decade ago become an assault weapon used to hurt, traumatize, and even kill vulnerable people?

» From Eye Tracking to AI-Powered Learning
01/01/24 05:00 from Communications of the ACM: Latest Issue
My journey through the intertwining worlds of computing and manufacturing began, unexpectedly, in the halls of the University of Illinois at Urbana-Champaign.

» Protecting Life-Saving Medical Devices from Cyberattack
01/01/24 05:00 from Communications of the ACM: Latest Issue
Alex Vakulov ponders how to protect the Internet of Medical Things.

» Epigenomics Now
01/01/24 05:00 from Communications of the ACM: Latest Issue
Computer power helps biologists track the regulation of genetic information.

» Why Are Lawyers Afraid of AI?
01/01/24 05:00 from Communications of the ACM: Latest Issue
Generative artificial intelligence and the law: there is no turning back.

» Wayfinding Without GPS
01/01/24 05:00 from Communications of the ACM: Latest Issue
Quantum entanglement provides a new direction in navigation.

» ACM Publications Finances for 2022
01/01/24 05:00 from Communications of the ACM: Latest Issue
Achieving a balance between mission, sustainability, and growth is without question ACM's greatest challenge as we transition to a fully Open Access model over the next few years.

» Data Bias Management
01/01/24 05:00 from Communications of the ACM: Latest Issue
Envisioning a unique approach toward bias and fairness research.

» NVIDIA at the Center of the Generative AI Ecosystem – For Now
01/01/24 05:00 from Communications of the ACM: Latest Issue
Assessing the ascent of NVIDIA.

» Beyond the Editorial Analogy: The Future of the First Amendment on the Internet
01/01/24 05:00 from Communications of the ACM: Latest Issue
Can the government regulate how social media companies moderate their platforms?

» The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers
01/01/24 05:00 from Communications of the ACM: Latest Issue
Seeking more secure and effective digital representations.

» Toward a Solid Acceptance of the Decentralized Web of Personal Data: Societal and Technological Convergence
01/01/24 05:00 from Communications of the ACM: Latest Issue
Giving individuals more control of their personal data.

» Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research
01/01/24 05:00 from Communications of the ACM: Latest Issue
Demystifying rebuttal writing.

» Achievement in Microarchitecture
01/01/24 05:00 from Communications of the ACM: Latest Issue
David Papworth, a 30-year veteran of Intel, on what led to the P6 microprocessor and how that changed the microarchitectural paradigm.

» Confidential Computing: Elevating Cloud Security and Privacy
01/01/24 05:00 from Communications of the ACM: Latest Issue
Working toward a more secure and innovative future.

» Hardware VM Isolation in the Cloud
01/01/24 05:00 from Communications of the ACM: Latest Issue
Enabling confidential computing with AMD SEV-SNP technology.

» Creating the First Confidential GPUs
01/01/24 05:00 from Communications of the ACM: Latest Issue
The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing.

» Why Should I Trust Your Code?
01/01/24 05:00 from Communications of the ACM: Latest Issue
Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.

» 10 Things Software Developers Should Learn about Learning
01/01/24 05:00 from Communications of the ACM: Latest Issue
Understanding how human memory and learning works, the differences between beginners and experts, and practical steps developers can take to improve their learning, training, and recruitment.

» What Should We Do when Our Ideas of Fairness Conflict?
01/01/24 05:00 from Communications of the ACM: Latest Issue
Standards for fair decision making could help us develop algorithms that comport with our consensus views; however, algorithmic fairness has its limits.

» On Specifying for Trustworthiness
01/01/24 05:00 from Communications of the ACM: Latest Issue
As autonomous systems increasingly become part of our lives, it is crucial to foster trust between humans and these systems, to ensure positive outcomes and mitigate harmful ones.

» Shortcut Learning of Large Language Models in Natural Language Understanding
01/01/24 05:00 from Communications of the ACM: Latest Issue
Shortcuts often hinder the robustness of large language models.

» Technical Perspective: The User as a Key Ingredient in AAC Design
01/01/24 05:00 from Communications of the ACM: Latest Issue
"Nonverbal Communication through Expressive Objects," by Stephanie Valencia et al ., describes the design of a physical object to support communication and focuses on the active involvement of an expert Augmentative and Alterna...

» Nonverbal Communication through Expressive Objects
01/01/24 05:00 from Communications of the ACM: Latest Issue
In this work, we work closely with an Augmentative and Alternative Communication (AAC) user to understand how motion through a physical expressive object can support their communication.

» Seesaw Gold
01/01/24 05:00 from Communications of the ACM: Latest Issue
Tilting for treasure.

» Improving Testing of Deep-learning Systems
30/11/23 14:01 from ACM Queue - articles
We used differential testing to generate test data to improve diversity of data points in the test dataset and then used mutation testing to check the quality of the test data in terms of diversity. Combining differential and mutation te...

» Low-code Development Productivity
27/11/23 15:22 from ACM Queue - articles
This article aims to provide new insights on the subject by presenting the results of laboratory experiments carried out with code-based, low-code, and extreme low-code technologies to study differences in productivity. Low-code technolo...

» Use Cases are Essential
11/11/23 10:49 from ACM Queue - articles
While the software industry is a fast-paced and exciting world in which new tools, technologies, and techniques are constantly being developed to serve business and society, it is also forgetful. In its haste for fast-forward motion, it ...

» Device Onboarding using FDO and the Untrusted Installer Model
09/11/23 14:56 from ACM Queue - articles
Automatic onboarding of devices is an important technique to handle the increasing number of "edge" and IoT devices being installed. Onboarding of devices is different from most device-management functions because the device's ...

» Creating the First Confidential GPUs
07/09/23 16:16 from ACM Queue - articles
Today's datacenter GPU has a long and storied 3D graphics heritage. In the 1990s, graphics chips for PCs and consoles had fixed pipelines for geometry, rasterization, and pixels using integer and fixed-point arithmetic. In 1999, NVI...

» Why Should I Trust Your Code?
07/09/23 16:05 from ACM Queue - articles
For Confidential Computing to become ubiquitous in the cloud, in the same way that HTTPS became the default for networking, a different, more flexible approach is needed. Although there is no guarantee that every malicious code behavior ...

» Hardware VM Isolation in the Cloud
07/09/23 15:55 from ACM Queue - articles
Confidential computing is a security model that fits well with the public cloud. It enables customers to rent VMs while enjoying hardware-based isolation that ensures that a cloud provider cannot purposefully or accidentally see or corru...

» Confidential Computing: Elevating Cloud Security and Privacy
07/09/23 15:24 from ACM Queue - articles
Confidential Computing (CC) fundamentally improves our security posture by drastically reducing the attack surface of systems. While traditional systems encrypt data at rest and in transit, CC extends this protection to data in use. It p...

» Pointers in Far Memory
17/07/23 13:01 from ACM Queue - articles
Effectively exploiting emerging far-memory technology requires consideration of operating on richly connected data outside the context of the parent process. Operating-system technology in development offers help by exposing abstractions...

» How Flexible is CXL's Memory Protection?
05/07/23 14:30 from ACM Queue - articles
CXL, a new interconnect standard for cache-coherent memory sharing, is becoming a reality - but its security leaves something to be desired. Decentralized capabilities are flexible and resilient against malicious actors, and should be co...

» You Don't know Jack about Application Performance: Knowing whether you're doomed to fail is important when starting a project.
24/05/23 12:51 from ACM Queue - Performance

» All Sliders to the Right: Hardware Overkill
13/02/23 14:54 from ACM Queue - Performance

» Reinventing Backend Subsetting at Google: Designing an algorithm with reduced connection churn that could replace deterministic subsetting
14/12/22 11:47 from ACM Queue - Performance

» The Time I Stole $10,000 from Bell Labs: Or why DevOps encourages us to celebrate outages
11/11/20 13:00 from ACM Queue - Performance

» FPGAs in Data Centers: FPGAs are slowly leaving the niche space they have occupied for decades.
05/06/18 14:13 from ACM Queue - Performance
This installment of Research for Practice features a curated selection from Gustavo Alonso, who provides an overview of recent developments utilizing FPGAs (field-programmable gate arrays) in datacenters. As Moore's Law has slowed and th...

» Workload Frequency Scaling Law - Derivation and Verification: Workload scalability has a cascade relation via the scale factor.
24/05/18 17:48 from ACM Queue - Performance
This article presents equations that relate to workload utilization scaling at a per-DVFS subsystem level. A relation between frequency, utilization, and scale factor (which itself varies with frequency) is established. The verification ...

» Monitoring in a DevOps World: Perfect should never be the enemy of better.
08/01/18 16:05 from ACM Queue - Performance
Monitoring can seem quite overwhelming. The most important thing to remember is that perfect should never be the enemy of better. DevOps enables highly iterative improvement within organizations. If you have no monitoring, get something;...

» Idle-Time Garbage-Collection Scheduling: Taking advantage of idleness to reduce dropped frames and memory consumption
26/07/16 16:37 from ACM Queue - Performance
Google's Chrome web browser strives to deliver a smooth user experience. An animation will update the screen at 60 FPS (frames per second), giving Chrome around 16.6 milliseconds to perform the update. Within these 16.6 ms, all input eve...

» Hadoop Superlinear Scalability: The perpetual motion of parallel performance
04/06/15 20:08 from ACM Queue - Performance
"We often see more than 100 percent speedup efficiency!" came the rejoinder to the innocent reminder that you can't have more than 100 percent of anything. But this was just the first volley from software engineers during a presentation ...

» The API Performance Contract: How can the expected interactions between caller and implementation be guaranteed?
30/01/14 15:37 from ACM Queue - Performance
When you call functions in an API, you expect them to work correctly; sometimes this expectation is called a contract between the caller and the implementation. Callers also have performance expectations about these functions, and often ...

Powered by Feed Informer