Full Stack Recycling Approaches for Computing Devices
Full-stack recycling considers computational methods that assist with recycling each layer of an electronic device rather than once at its end-of-life.
Full Stack Recycling Approaches for Computing Devices
Full-stack recycling considers computational methods that assist with recycling each layer of an electronic device rather than once at its end-of-life.
Researchers have tapped reward-based reinforcement learning to teach robots to walk on diverse terrains, negotiate steps, and handle other motor functions.
Generative Artificial Intelligence Policies under the Microscope
CS conferences are increasingly adopting and sharing GenAI policies for authors, and guidelines for reviewers.
Homomorphic Technologies Could Process Still-Encrypted Data
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
Sutton and Barto developed reinforcement learning, a machine learning method that trains neural networks by offering them rewards in the form of numerical values.
Revolutionizing Datacenter Networks via Reconfigurable Topologies
An overview of reconfigurable datacenter networks and their technological enablers.
Ransomware: Extortion Is My Business
A look at ransomware, its ecosystems, the impact of its attacks, and the tactics of its attackers.
Researchers have tapped reward-based reinforcement learning to teach robots to walk on diverse terrains, negotiate steps, and handle other motor functions.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More