On the Implications of Personalization.
Vulnerability Counts: A Rejoinder.
Cultivating Innovation in a Research Lab.
Simulating Extinct Species.
AI's Impact on Mental Health.
The Rise of Smart Glasses.
It's the Specification, Stupid!
Forecasting.
The Process.
Identity Theft in AI Conference Peer Review.
AI Fatigue: Reflections on the Human Side of AI's Rapid Advancement.
Beyond Benchmarks: Responsible AI in Education Needs Learning Sciences.
Keeping the Dream Alive: The Power and Promise of Federally Funded Research.
How the U.S. National Science Foundation Enabled Software-Defined Networking.
Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle.
The Innovation Engine: Government-Funded Academic Research.
Durable Engines of Discovery.
From University Research to Global Impact.
Advancing AI in Agriculture through Large-Scale Collaborative Research.
Federal Funding Supports The Flow of Innovation.
The TRIPS Project.
Rediscovering Reinforcement Learning.
Are Crypto Ecosystems (De)centralizing? A Framework for Longitudinal Analysis.
Cyber Humanities for Heritage Security.
Trust, Governance, and AI Decision Making.
Computing Is Indeed a Discipline in Crisis.
Communications Practice Section Welcomes Submissions.
Shedding Labels, Sidestepping Limitations, and Self-Fulfillment.
Acting in Self-Defense.
Can AI Talk to the Animals?
Creating Digital Replicas of History with AI.
In Search of Better Search.
The Silent Scientist: When Software Research Fails to Reach Its Audience.
Does Using In-Copyright Works as Training Data Infringe?
Culture, Language, and Generative Language Models.
Trading Bits for Atoms: How Digital Products Are Reshaping the Global Economy.
Reinventing AI: Is It the Time for a New Paradigm?
Tech Workers Versus Enshittification.
When Is WebAssembly Going to Get DOM Support?
WebAssembly: Yes, but for What?
Automatically Translating C to Rust.
Information Power!
The Cyberpsychology Influence on Modern Computing.
Shields for Safe Reinforcement Learning.
Cryptocurrency Browser-Extension Security: A Wake-Up Call and a Way Forward.
Characterizing Cryptocurrency-Themed Malicious Browser Extensions.
The Memory Exchange.
On Digital Ubiquity.
How Generative Models Are Ruining Themselves.
Language Models Wrestle with Gaps in Understanding.