Deleting X: Why SIGDOC Left the Platform
The platform does not embrace communication design, privacy, and trust, the group's members say.
Deleting X: Why SIGDOC Left the Platform
The platform does not embrace communication design, privacy, and trust, the group's members say.
The Rise of the AI-Enabled Agentic Internet
Society is turning over major and minor decisions once made exclusively by humans to AI agents.
Formal computer science may never model practical computer engineering well enough to be predictive in the way the physical sciences are.
Space-based datacenters would reduce the need for water, electricity, and other earth-based resources.
Revolutionizing Datacenter Networks via Reconfigurable Topologies
An overview of reconfigurable datacenter networks and their technological enablers.
Rethinking Social Media’s Future
Experts propose changes to help social technologies better address disinformation, harassment, and other harms.
Designing an Efficient Tree Index on Disaggregated Memory
Sherman demonstrates that combining RDMA hardware features and RDMA-friendly software designs can enable a high-performance index on disaggregated memory.
Technical Perspective: A Write-Optimized Distributed B+Tree Index on Disaggregated Memory
The high-performance tree index uses a lock-free search with versions to resolve read-write conflicts and exclusive locks to resolve write-write conflicts.
Analytics Are A Full Stack Problem
Dashboards provide insight into operations and opportunities for improvement.
Security Research Gaps Leave Critical Infrastructure Open to Cyberattack
The risk of attack on industrial controls is greater for today's interconnected systems than for those in the isolated world of Stuxnet.
The design ensures unobtrusiveness and a natural look and feel while achieving high signal quality, high spatial-temporal fidelity, and low power operation.
Technical Perspective: The Technologies that Disappear
Bringing new "life" to stuffed animal toys and beyond.
Cyber Trust Mark to Distinguish Secure Smart Home Devices
The U.S. Cyber Trust Mark program is a mechanism for providers of wireless smart home devices to test and certify the security of their products.
The UGC Overload: Scaling Content Moderation for Massive Datasets
AI and ML have a role to play in moderating user-generated content in real time to keep sites safe, civilized, and legally compliant.
Reasons to Raise the Cyber-Shields
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
An investigation of vulnerabilities within the TCP/IP protocol suite that can be exploited by forged ICMP errors.
AI Upgrades the Internet of Things
A Pragmatic Overview of Wi-Fi Security Risks
Communication between each device on a Wi-Fi network and its router should be secured with strong encryption because the signals can literally be snatched out of the air.
Disrupting Networks: Decentralization and the Fediverse
Meta’s Hyperscale Infrastructure: Overview and Insights
A concise, high-level overview of Meta’s hyperscale infrastructure, with key insights from its development.
Technical Perspective: Shortening the Path to Designing Efficient Graph Algorithms
A new way of designing efficient graph algorithms that will go significantly beyond shortest paths.
Building Safer and Interoperable AI Systems
AI agents are now contemplated that can interact with each other and with information sources on the Internet. What could go wrong?
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More