I/F
Will AI Destroy the World Wide Web?
vol.68 iss.9 (2025) pp.1
A Generative AI-Powered Digital Twin for Adaptive NASH Care.
vol.68 iss.9 (2025) pp.2
An Algorithm for a Better Bookshelf.
vol.68 iss.9 (2025) pp.3
AI for Senior Citizens.
vol.68 iss.9 (2025) pp.3
AI Teams Contend with Synthetic Data's Jekyll/Hyde Roles.
vol.68 iss.9 (2025) pp.3
Stop Using Vulnerability Counts to Measure Software Security.
vol.68 iss.9 (2025) pp.3
An Analysis of the Impact of Gold Open Access Publications in Computer Science.
vol.68 iss.9 (2025) pp.8
On Notifications
vol.68 iss.8 (2025) pp.1
The Case for Compact AI
vol.68 iss.8 (2025) pp.2
The Transformative Power of Inspiration
vol.68 iss.8 (2025) pp.1
Empowering Virtual Agents With Intelligent Systems
vol.68 iss.8 (2025) pp.2
Deleting X: Why SIGDOC Left the Platform
vol.68 iss.8 (2025) pp.2
The Power and Potential of Zero-Knowledge Proofs
vol.68 iss.8 (2025) pp.3
Clock Bait: Why the Moon Needs Its Own Time Zone
vol.68 iss.8 (2025) pp.3
A Quantum Leap Forward
vol.68 iss.8 (2025) pp.3
Balancing Secrecy and Transparency in Bug Bounty Programs
vol.68 iss.8 (2025) pp.4
ACM Publications Finances for 2023 and 2024
vol.68 iss.8 (2025) pp.5
Can’t We Have Nice Things?
vol.68 iss.8 (2025) pp.2
The Future of Professional Ethics in Computing
vol.68 iss.8 (2025) pp.3
Deconstructing the Take It Down Act
vol.68 iss.8 (2025) pp.3
AI and Trust
vol.68 iss.8 (2025) pp.5
Three AI Futures
vol.68 iss.8 (2025) pp.3
Two Types of Data-Privacy Controls
vol.68 iss.8 (2025) pp.2
Global AI Cultures
vol.68 iss.8 (2025) pp.4
To Post or Not to Post: AI Ethics in the Age of Big Tech
vol.68 iss.8 (2025) pp.12
Concerning the Responsible Use of AI in the U.S. Criminal Justice System
vol.68 iss.8 (2025) pp.4
The Price of Intelligence
vol.68 iss.8 (2025) pp.8
It Takes a Village: Bridging the Gaps between Current and Formal Specifications for Protocols
vol.68 iss.8 (2025) pp.12
Grand Challenges in Trustworthy Computing at 20: A Retrospective Look at the Second CRA Grand Challenges Conference
vol.68 iss.8 (2025) pp.8
Understanding Mobile App Reviews to Guide Misuse Audits
vol.68 iss.8 (2025) pp.10
Socioeconomic Threats of Deepfakes and the Role of Cyber-Wellness Education in Defense
vol.68 iss.8 (2025) pp.10
Thinking Fast and Slow in Human and Machine Intelligence
vol.68 iss.8 (2025) pp.8
Differentiable Economics: Strategic Behavior, Mechanisms, and Machine Learning
vol.68 iss.8 (2025) pp.9
Defending Data from SRAM-Based Attacks
vol.68 iss.8 (2025) pp.1
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets
vol.68 iss.8 (2025) pp.9
NeuroRadar: Can Radar Systems Be Reimagined Using Computational Principles?
vol.68 iss.8 (2025) pp.1
NeuroRadar: A Neuromorphic Radar Sensor for Low-Power IoT Systems
vol.68 iss.8 (2025) pp.10
Organizational Lobotomy
vol.68 iss.8 (2025) pp.1
Memory Efficiency via Offloading in Warehouse-Scale Datacenters
vol.68 iss.8 (2025) pp.1
TMO: Transparent Memory Offloading in Datacenters
vol.68 iss.8 (2025) pp.9
Embracing Her Critics To Refine VoIP
vol.68 iss.8 (2025) pp.1
I Teach Computer Science, and That Is Not All
vol.68 iss.7 (2025) pp.1
The Ethical Implications of Online Computer Science Education.
vol.68 iss.7 (2025) pp.3
The Emerging Face of Digital Dentistry
vol.68 iss.7 (2025) pp.3
Advancements in Weather Prediction
vol.68 iss.7 (2025) pp.3
Computer Science under Trump
vol.68 iss.7 (2025) pp.3
DeepSeek Inside: Origins, Technology, and Impact
vol.68 iss.7 (2025) pp.5
Beyond the Checkbox: Upgrading the Right to Opt Out
vol.68 iss.7 (2025) pp.3
AI Authorship Revisited
vol.68 iss.7 (2025) pp.3
Generative Artificial Intelligence Policies under the Microscope
vol.68 iss.7 (2025) pp.5