The 5th Paradigm: AI-Driven Scientific Discovery
Warnings!!
From Dot Matrix to Data: A Journey through Technology and Leadership.
Letters to the Editor:.
Considering Conference Contributions.
Is It Possible to Truly Understand Performance in LLMs?
AI Judging in Sports
A Camera the Size of a Grain of Salt Could Change Imaging as We Know It
In Memoriam: E. Allen Emerson.
An AI Learning Hierarchy
Prompting Considered Harmful
Empower Diversity in AI Development
Unwanted Surprises
Notice and Choice Cannot Stand Alone
AI Must Be Anti-Ableist and Accessible
Confidential Computing or Cryptographic Computing?
Transactions and Serverless are Made for Each Other
The EU AI Act and the Wager on Trustworthy AI.
Belt and Braces: When Federated Learning Meets Differential Privacy
Ethics and Cultural Background as Key Factors for an Attractive Metaverse.
How Exploits Impact Computer Science Theory.
Computing with Time: Microarchitectural Weird Machines.
Mirror, Mirror on the Wall, What is the Best Topology of Them All?
HammingMesh: A Network Topology for Large-Scale Deep Learning
Personalizing Interactions: With Socially Assistive Robots.
What Is Theoretical Computer Science?
A Whimsical Odyssey Through the Maze of Scholarly Reviews
Room-Temperature Superconductivity Heats Up
Automating Detective Work
The Chiplet Revolution
Between the Booms: AI in Winter
Do Social Media Platforms Have Free Speech Rights to ‘Censor’ Conservatives?
The Future of Misuse Detection
Free Speech vs. Free Ride: Navigating the Supreme Court’s Social Media Paradox
What Is a ‘Bug’?
Mentorship Lessons from Growing a Developing Country Journal
You Don’t Know Jack about Bandwidth
Toward Effective AI Support for Developers : A survey of desires and concerns.
The Paradigm Shifts in Artificial Intelligence
Reevaluating Google’s Reinforcement Learning for IC Macro Placement
Human-Centered Cybersecurity Revisited: From Enemies to Partners
Directions of Technical Innovation for Regulatable AI Systems
An Accessible Solution to Unlock Museums
BentoMuseum: 3D and Layered Interactive Museum Map for Blind Visitors
Machine Learning in Computer Security is Difficult to Fix
Pitfalls in Machine Learning for Computer Security
Looking Within
The Global Digital Compact
Do All Problems Have Technical Fixes?
Faster Integer Programming