CACM - volume 64 - 2021 论文列表 |
点击这里查看 Communications of the ACM 的JCR分区、影响因子等信息 |
Nam Bui Nhat Pham Jessica Jacqueline Barnitz Zhanan Zou Phuc Nguyen Hoang Truong Taeho Kim Nicholas Farrow Anh Nguyen Jianliang Xiao Robin Deterding Thang N. Dinh Tam Vu
Technical perspective: eBP rides the third wave of mobile health. Optimal auctions through deep learning.Paul Dütting Zhe Feng Harikrishna Narasimhan David C. Parkes Sai Srivatsa Ravindranath
Technical perspective: The quest for optimal multi-item auctions. PL and HCI: better together.Sarah E. Chasins Elena L. Glassman Joshua Sunshine
Scaling up chatbots for corporate service delivery systems.Alistair Barros Renuka Sindhgatta Alireza Nili
Multimedia data delivery based on IoT clouds. Unveiling unexpected training data in internet video. The dogged pursuit of bug-free C programs: the Frama-C software analysis platform.Patrick Baudin François Bobot David Bühler Loïc Correnson Florent Kirchner Nikolai Kosmatov André Maroneze Valentin Perrelle Virgile Prevosto Julien Signoles Nicky Williams
WebRTC: real-time communication for the open web platform.Niklas Blum Serge Lachapelle Harald Alvestrand
Biases in AI systems. The domestic computer science graduate students are there, we just need to recruit them.David B. Whalley Xin Yuan Xiuwen Liu
Science needs to engage with society: some lessons from COVID-19. Responsible AI: bridging from ethics to practice. In praise of the disassembler. What does saying that 'programming is hard' really say, and about whom? A European union approach to regulating big tech. Upholding ACM's principles. The unionization of technology companies. Fixing the internet. Better security through obfuscation. A journal for interdisciplinary data science education. Tales of two Turings. On communication.Anja Feldmann Oliver Gasser Franziska Lichtblau Enric Pujol Ingmar Poese Christoph Dietzel Daniel Wagner Matthias Wichtlhuber Juan Tapiador Narseo Vallina-Rodriguez Oliver Hohlfeld Georgios Smaragdakis
Technical perspective: Tracking pandemic-driven internet traffic. Deriving equations from sensor data using dimensional function synthesis.Vasileios Tsoutsouras Sam Willis Phillip Stanley-Marbell
Technical perspective: An elegant model for deriving equations. Spatial concepts in the conversation with a computer.Stephan Winter Timothy Baldwin Martin Tomko Jochen Renz Werner Kuhn Maria Vasardani
Flexible work and personal digital infrastructures.Mohammad Hossein Jarrahi Gemma Newlands Brian Butler Saiph Savage Christoph Lutz Michael Dunn Steve Sawyer
The harm in conflating aging with accessibility.Bran Knowles Vicki L. Hanson Yvonne Rogers Anne Marie Piper Jenny Waycott Nigel Davies Aloha May Hufana Ambe Robin N. Brewer Debaleena Chattopadhyay Marianne Dee David M. Frohlich Marisela Gutierrez-Lopez Ben Jelen Amanda Lazar Radoslaw Nielek Belén Barros Pena Abi Roper Mark Schlager Britta Schulte Irene Ye Yuan
Deep learning for AI.Yoshua Bengio Yann LeCun Geoffrey E. Hinton
Always-on time-series database: keeping up where there's no way to catch up.Theo Schlossnagle Justin Sheehy Chris McCubbin
Application frameworks. The 2021 software developer shortage is coming. Why computing students should contribute to open source software projects. The limits of differential privacy (and its misuse in data release and machine learning).Josep Domingo-Ferrer David Sánchez Alberto Blanco-Justicia
Responsible computing during COVID-19 and beyond.Solon Barocas Asia J. Biega Margarita Boyarskaya Kate Crawford Hal Daumé III Miroslav Dudík Benjamin Fish Mary L. Gray Brent J. Hecht Alexandra Olteanu Forough Poursabzi-Sangdeh Luke Stark Jennifer Wortman Vaughan Hanna M. Wallach Marion Zepf
Lessons from the loo. Reimplementing software interfaces is fair use. Charles M. Geschke (1939-2021).Simson L. Garfinkel Eugene H. Spafford
The future of supply chains. A battery-free internet of things. Formal software verification measures up. Securing seabed cybersecurity, emphasizing intelligence augmentation. Two sides of the software engineering coin. Obtain a Ph.D. and a career in data. Program verification: vision and reality.Yakun Sophia Shao Jason Clemons Rangharajan Venkatesan Brian Zimmer Matthew Fojtik Nan Jiang Ben Keller Alicia Klinefelter Nathaniel Ross Pinckney Priyanka Raina Stephen G. Tell Yanqing Zhang William J. Dally Joel S. Emer C. Thomas Gray Brucek Khailany Stephen W. Keckler
Technical perspective: A chiplet prototype system for deep learning inference. In-sensor classification with boosted race trees.Georgios Tzimpragos Advait Madhavan Dilip Vasudevan Dmitri B. Strukov Timothy Sherwood
Technical perspective: Race logic presents a novel form of encoding. Securing internet applications from routing attacks.Yixin Sun Maria Apostolaki Henry Birge-Lee Laurent Vanbever Jennifer Rexford Mung Chiang Prateek Mittal
Dynamics of gender bias in computing. On the requirements engineer role.Xavier Franch Cristina Palomares Tony Gorschek
CoCoPIE: enabling real-time AI on off-the-shelf mobile devices via compression-compilation co-design.Hui Guan Shaoshan Liu Xiaolong Ma Wei Niu Bin Ren Xipeng Shen Yanzhi Wang Pu Zhao
Toward confidential cloud computing.Mark Russinovich Manuel Costa Cédric Fournet David Chisnall Antoine Delignat-Lavaud Sylvan Clebsch Kapil Vaswani Vikas Bhatia
The SPACE of developer productivity.Nicole Forsgren Margaret-Anne D. Storey Chandra Shekhar Maddila Thomas Zimmermann Brian Houck Jenna L. Butler
Collusion rings threaten the integrity of computer science research. Depth and persistence: what researchers need to know about impostor syndrome. A vision to compute like nature: thermodynamically.Todd Hylton Thomas M. Conte Mark D. Hill
Locality and professional life. Aversion to versions. The risks of election believability (or lack thereof).Rebecca T. Mercuri Peter G. Neumann
Let the algorithm decide? Taking the heat. Jack Minker (1927 - 2021). Deceiving AI. Getting down to basics. The search for unlimited productivity. It came from outer space! Time for two annual Turing awards.Ilias Diakonikolas Gautam Kamath Daniel M. Kane Jerry Li Ankur Moitra Alistair Stewart
Technical perspective: Robust statistics tackle new problems. Isomorphism, canonization, and definability for graphs of bounded rank width. Technical perspective: A logical step toward the graph isomorphism problem. Automata modulo theories. What serverless computing is and should become: the next phase of cloud computing.Johann Schleier-Smith Vikram Sreekanti Anurag Khandelwal Joao Carreira Neeraja Jayant Yadwadkar Raluca Ada Popa Joseph E. Gonzalez Ion Stoica David A. Patterson
HCDA: from computational thinking to a generalized thinking paradigm.Yuhang Liu Xian-He Sun Yang Wang Yungang Bao
Implementing insider defenses.Eric Grosse Fred B. Schneider Lynette L. Millett
Battery day. Enclaves in the clouds.Jatinder Singh Jennifer Cobbe Do Le Quoc Zahra Tarkhani
Let's be honest. The 10 best practices for remote software engineering. Understanding law and the rule of law: a plea to augment CS curricula. CS unplugged or coding classes? Software professionals, malpractice law, and codes of ethics. Trustworthy scientific computing. A traffic cop for low earth orbit. Catching the fakes. A satisfying result. Teaching other teachers how to teach CS better. Computing enabled me to...promote sustainability and help underserved communities. In response to 'Vardi's insights'. The agency trilemma and ACM.Huanchen Zhang Hyeontaek Lim Viktor Leis David G. Andersen Michael Kaminsky Kimberly Keeton Andrew Pavlo
Technical perspective: The strength of SuRF. Transformers aftermath: current research and rising trends.Eduardo Souza dos Reis Cristiano André da Costa Diórgenes Silveira Rodrigo Bavaresco Rodrigo da Rosa Righi Jorge Luis Victória Barbosa Rodolfo Stoffel Antunes Márcio Miguel Gomes Gustavo Federizzi
Safe systems programming in Rust.Ralf Jung Jacques-Henri Jourdan Robbert Krebbers Derek Dreyer
The (Im)possibility of fairness: different value systems require different mechanisms for fair decision making.Sorelle A. Friedler Carlos Scheidegger Suresh Venkatasubramanian
Everything VPN is new again. Connecting Arabs: bridging the gap in dialectal speech recognition.Ahmed Ali Shammur A. Chowdhury Mohamed Afify Wassim El-Hajj Hazem M. Hajj Mourad Abbas Amir Hussein Nada Ghneim Mohammad A. M. Abushariah Assal Alqudah
Database systems research in the Arab world: a tradition that spans decades.Ashraf Aboulnaga Azza Abouzied Karima Echihabi Mourad Ouzzani
Networking research for the Arab world: from regional initiatives to potential global impact.Basem Shihada Tamer A. ElBatt Ahmed M. Eltawil Mohammad Mansour Essaid Sabir Slim Rekhis Sanaa Sharafeddine
Biomedical computing in the Arab world: unlocking the potential of a growing research community.Seif Eldawlatly Mohamed Abouelhoda Omar Sultan Al-Kadi Takashi Gojobori Boris Jankovic Mohamad Khalil Ahsan H. Khandoker Ahmed Morsy
Unleashing early maturity academic innovations.Slim Abdennadher Sherif G. Aly Joe Tekli Karima Echihabi
Cyber security research in the Arab region: a blooming ecosystem with global ambitions.Christina Pöpper Michail Maniatakos Roberto Di Pietro
Non-traditional data sources: providing insights into sustainable development.Ingmar Weber Muhammad Imran Ferda Ofli Fouad Mrad Jennifer Colville Mehdi Fathallah Alissar Chaker Wigdan Seed Ahmed
The Arab world prepares the exascale workforce. A panoramic survey of natural language processing in the Arab world.Kareem Darwish Nizar Habash Mourad Abbas Hend S. Al-Khalifa Hussein T. Al-Natsheh Houda Bouamor Karim Bouzoubaa Violetta Cavalli-Sforza Samhaa R. El-Beltagy Wassim El-Hajj Mustafa Jarrar Hamdy Mubarak
ArabHCI: five years and counting.Shaimaa Lazem Mennatallah Saleh Ebtisam Alabdulqader
Traffic routing in the ever-changing city of Doha.Sofiane Abbar Rade Stanojevic Shadab Mustafa Mohamed F. Mokbel
Autonomous driving in the face of unconventional odds. Entrepreneurship ecosystem in Lebanon. An AI-enabled future for Qatar and the region.Ashraf Aboulnaga Sanjay Chawla Ahmed K. Elmagarmid Mohammed Al-Mannai Hassan Al-Sayed
The strategic pursuit of artificial intelligence in the United Arab Emirates. Data science for the oil and gas industry in the Arab region. Building a preeminent research lab in the Arab region: the case of QCRI.Ahmed Elmagarmid Abdellatif Saoudi
Building a research university in the Arab region: the case of KAUST.Elmootazbellah (Mootaz) Elnozahy
Welcome.Sherif G. Aly Mohamed Mokbel Moustafa Youssef
Building a multilingual Wikipedia. Roots of 'program' revisited.Liesbeth De Mol Maarten Bullynck
When hackers were heroes. The non-psychopath's guide to managing an open source project. Reflections on black in computing.Quincy Brown Tyrone Grandison Jamika D. Burge Odest Chadwicke Jenkins Tawanna Dillahunt
From remote work to working from anywhere. The worsening state of ransomware. Deep learning speeds MRI scans. The best of NLP. The SolarWinds hack, and a grand challenge for CS education. What does a static, sustainable economy look like?Rajalakshmi Nandakumar Vikram Iyer Shyamnath Gollakota
Technical perspective: Localizing insects outdoors. Understanding deep learning (still) requires rethinking generalization.Chiyuan Zhang Samy Bengio Moritz Hardt Benjamin Recht Oriol Vinyals
Technical perspective: Why don't today's deep nets overfit to their training data? Knowledge graphs.Claudio Gutiérrez Juan F. Sequeda
Cyber reconnaissance techniques.Wojciech Mazurczyk Luca Caviglione
Gender trends in computer science authorship.Lucy Lu Wang Gabriel Stanovsky Luca Weihs Oren Etzioni
Educational interventions and female enrollment in IT degrees.Andreea Molnar Therese Keane Rosemary Stockdale
The decline of computers as a general purpose technology.Neil C. Thompson Svenja Spanuth
Out-of-this-world additive manufacturing. A second conversation with Werner Vogels. The transformation of patient-clinician relationships with AI-based medical advice.Oded Nov Yindalon Aphinyanaphongs Yvonne W. Lui Devin M. Mann Maurizio Porfiri Mark Riedl John-Ross Rizzo Batia Wiesenfeld
What can the maker movement teach us about the digitization of creativity?Sascha Friesike Frédéric Thiesse George Kuk
50 years of Pascal. Science is not another opinion.Peter J. Denning Jeffrey Johnson
What to do about deepfakes.Deborah G. Johnson Nicholas Diakopoulos
Informing California privacy regulations with evidence from research. The push for stricter rules for internet platforms. Edmund M. Clarke (1945 - 2020). Can the biases in facial recognition be fixed; also, should they? Fact-finding mission. The power of quantum complexity. Disputing Dijkstra, and birthdays in base 2. Enabling renewable energy through smarter grids. The people vs. tech. Around the world: (the first time) with Communications' Regional Special Sections.Abolfazl Asudeh Jees Augustine Saravanan Thirumuruganathan Azade Nazi Nan Zhang Gautam Das Divesh Srivastava
Technical perspective: Solving the signal reconstruction problem at scale. BioScript: programming safe chemistry on laboratories-on-a-chip.Jason Ott Tyson Loveless Christopher Curtis Mohsen Lesani Philip Brisk
Technical perspective: Programming microfluidics to execute biological protocols. DP-cryptography: marrying differential privacy and cryptography in emerging applications.Sameer Wagh Xi He Ashwin Machanavajjhala Prateek Mittal
A review of the semantic web field. Keeping science on keel when software moves.Dong H. Ahn Allison H. Baker Michael Bentley Ian Briggs Ganesh Gopalakrishnan Dorit M. Hammerling Ignacio Laguna Gregory L. Lee Daniel J. Milroy Mariana Vertenstein
GDPR anti-patterns.Supreeth Shastri Melissa Wasserman Vijay Chidambaram
AZERTY amélioré: computational design on a national scale.Anna Maria Feit Mathieu Nancel Maximilian John Andreas Karrenbauer Daryl Weir Antti Oulasvirta
The time I stole $10, 000 from Bell Labs. Differential privacy: the pursuit of protections by default. Let's not dumb down the history of computer science. Polanyi's revenge and AI's new romance with tacit knowledge. Cybersecurity: is it worse than we think?Chris Maurer Kevin Kim Dan J. Kim Leon A. Kappelman
Kabin fever. CAPE: a framework for assessing equity throughout the computer science education ecosystem.Carol L. Fletcher Jayce R. Warner
When permissioned blockchains deliver more decentralization than permissionless. Technological responses to COVID-19. The state of virtual reality hardware. Moore's Law: what comes next? Issues arise when time goes digital. Salary disputes. Half-baked high-resolution referencing. Driving the cloud to true zero carbon.Mehrdad Moradi Karthikeyan Sundaresan Eugene Chai Sampath Rangarajan Z. Morley Mao
Technical perspective: SkyCore's architecture takes it to the 'edge'. Constant overhead quantum fault tolerance with quantum expander codes.Omar Fawzi Antoine Grospellier Anthony Leverrier
Technical perspective: Deciphering errors to reduce the cost of quantum computation. The ethics of zero-day exploits - : the NSA meets the trolley car. Secure multiparty computation. How to transition incrementally to microservice architecture.Karoly Bozan Kalle Lyytinen Gregory M. Rose
Digital instruments as invention machines.Pantelis Koutroumpis Aija Leiponen Llewellyn D. W. Thomas
Does Facebook use sensitive data for advertising purposes?José González Cabañas Ángel Cuevas Aritz Arrate Galán Rubén Cuevas
The die is cast. The identity in everyone's pocket. Excessive use of technology: can tech providers be the culprits? Insights for AI from the human mind. The immortal soul of an old machine. Content moderation modulation. Cybersecurity research for the future. Boeing's 737 MAX: a failure of management, not just technology. Coalition of the willing takes aim at COVID-19. Fugaku takes the lead. Geometric deep learning advances data science. Talking about race in CS education. A career fueled by HPC. Reboot the computing-research publication systems. 2021: Computing's divided future.