Homomorphic Technologies Could Process Still-Encrypted Data
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
Homomorphic Technologies Could Process Still-Encrypted Data
Fully homomorphic encryption could stave off the security threats quantum computers pose to current encryption techniques.
Space-based datacenters would reduce the need for water, electricity, and other earth-based resources.
Revolutionizing Datacenter Networks via Reconfigurable Topologies
An overview of reconfigurable datacenter networks and their technological enablers.
From Prompt Engineering to Prompt Science with Humans in the Loop
Demonstrating how to have scientific rigor in developing a reliable prompt and getting a trustworthy response for a downstream application.
Storytelling is a strategic communication practice that enables us to craft narratives that make sense of complexity, clarify uncertainty, and connect data to decisions.
You Can Get There From Here (But It Really Makes a Mess of Things)
Can We Measure the Impact of a Database?
The h-index can be extended to hierarchical structures, allowing the impact of authors and journals to be measured on a large class of databases and datasets.
Analytics Are A Full Stack Problem
Dashboards provide insight into operations and opportunities for improvement.
AI Transforms Medical Diagnostics
Generative AI tools are streamlining administrative tasks, enhancing clinical-decision support, and augmenting patient education.
Many Faces of Ad Hoc Transactions
The flexibility of ad hoc transactions is a double-edged sword, providing potential performance benefits but also increasing the risk of correctness issues.
Technical Perspective: Ad Hoc Transactions: What They Are and Why We Should Care
The paper by Tang et al. addresses important questions about ad hoc transactions.
The UGC Overload: Scaling Content Moderation for Massive Datasets
AI and ML have a role to play in moderating user-generated content in real time to keep sites safe, civilized, and legally compliant.
Researchers have invested immeasurable time and effort into programs that run and never halt.
Finding Beauty and Meaning in Computational Complexity
Irit Dinur’s appointment as the first woman professor at the Institute for Advanced Study's School of Mathematics is at once historic and unremarkable.
Self-Correction in Large Language Models
LLMs may be able to correct mistakes but they must first detect errors, which is a bottleneck at present.
R2T: Instance-Optimal Truncation for Differentially Private Query Evaluation with Foreign Keys
The first DP mechanism for answering arbitrary SPJA queries in a database with foreign-key constraints.
Technical Perspective: Toward Building a Differentially Private DBMS
The paper is an important step toward automatically ensuring privacy for arbitrary computations.
Feedback Loops Guide AI to Proof Checking
Recent developments suggest artificial intelligence could play a role in helping computers test and verify smaller, more manageable portions of mathematical proofs.
Why Can’t We Predict Earthquakes?
Does the U.S. Geological Survey need to change its adamant position that it is impossible to accurately predict when an earthquake will occur?
Meta’s Hyperscale Infrastructure: Overview and Insights
A concise, high-level overview of Meta’s hyperscale infrastructure, with key insights from its development.
Archeologists Dig Deep into the Past with AI
Assorted tech tools are helping researchers reconstruct excavation sites and reassemble artifacts algorithmically.
The Hidden Risks of URL-Shortening in Scientific Review
Reviewers, authors, and editors all have a role to play in protecting fairness and objectivity in the blind review process.
Delivering Cloud Data and Analytic Solutions
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More