Найдено 99
The AI Alignment Paradox
West R., Aydin R.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2025, цитирований: 0, doi.org, Abstract
The better we align AI models with our values, the easier we may make it to realign them with opposing values.
Negative-Weight Single-Source Shortest Paths in Near-Linear Time
Bernstein A., Nanongkai D., Wulff-Nilsen C.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2025, цитирований: 0, doi.org, Abstract
In the single-source shortest paths problem, the goal is to compute the shortest path tree from a designated source vertex in a weighted, directed graph. We present the first near-linear time algorithm for the problem that can also handle negative edge-weights; the runtime is O ( m log 8 ( n ) log W ) . In contrast to all recent developments that rely on sophisticated continuous optimization methods and dynamic algorithms, our algorithm is simple: it requires only a simple graph decomposition and elementary combinatorial tools. In fact, ours is the first combinatorial algorithm for negative-weight single-source shortest paths to break through the classic O ~ ( m n log W ) bound from over three decades ago (Gabow and Tarjan, SICOMP’89.)
Unsafe Code Still a Hurdle Copilot Must Clear
Holz T.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2025, цитирований: 0, doi.org
Investigating Research Software Engineering: Toward RSE Research
Felderer M., Goedicke M., Grunske L., Hasselbring W., Lamprecht A., Rumpe B.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2025, цитирований: 0, doi.org, Abstract
Research software engineering research aims at understanding and improving how software is developed for research.
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences
Rode J.A., Castro L.A., Viswanath V., Valdez Gastelum M.C., Mashhadi A., Tentori M., Van Laerhoven K., Weibel N.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2025, цитирований: 0, doi.org, Abstract
To increase diversity in computing, international conferences must support the accessibility needs of a diverse global population of researchers and practitioners.
The EU AI Act and the Wager on Trustworthy AI
Bellogín A., Grau O., Larsson S., Schimpf G., Sengupta B., Solmaz G.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 1, doi.org, Abstract
As the impact of AI is difficult to assess by a single group, policymakers should prioritize societal and environmental well being and seek advice from interdisciplinary groups focusing on ethical aspects, responsibility, and transparency in the development of algorithms.
Pitfalls in Machine Learning for Computer Security
Arp D., Quiring E., Pendlebury F., Warnecke A., Pierazzi F., Wressnegger C., Cavallaro L., Rieck K.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 0, doi.org, Abstract
With the growing processing power of computing systems and the increasing availability of massive datasets, machine learning algorithms have led to major breakthroughs in many different areas. This development has influenced computer security, spawning a series of work on learning-based security systems, such as for malware detection, vulnerability discovery, and binary code analysis. Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance and render learning-based systems potentially unsuitable for security tasks and practical deployment. In this paper, we look at this problem with critical eyes. First, we identify common pitfalls in the design, implementation, and evaluation of learning-based security systems. We conduct a study of 30 papers from top-tier security conferences within the past 10 years, confirming that these pitfalls are widespread in the current security literature. In an empirical analysis, we further demonstrate how individual pitfalls can lead to unrealistic performance and interpretations, obstructing the understanding of the security problem at hand. As a remedy, we propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible. Furthermore, we identify open problems when applying machine learning in security and provide directions for further research.
A Security Model for Web-Based Communication
Tehrani P.F., Osterweil E., Schmidt T.C., Wählisch M.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 0, doi.org, Abstract
Web access involves various protocols to resolve domain names to IP addresses, establish data exchange channels with Web servers, and to authenticate communication partners. Each protocol has its own set of requirements and security measures. In addition to technical features, operating the Web also introduces organizational and political aspects which are important to consider when deploying a secure basis for Web-based communication. In this paper, we propose an algorithmic security model based on the widely deployed technologies DNS(SEC) and Web PKI to cover the three dimensions identification , resolution , and transaction . Our model enables quantification and qualification of the security assurance provided by an online service provider. To verify the applicability of our model, we investigate the online presence of Alerting Authorities in the U.S., selected German Emergency Service providers, and UN member states . We observe partially enhanced security relative to global Internet trends, yet find cause for concern as only about 6% of unique hosts cater to secure resolution. About 46% of investigated organizations use shared certificates with 1% of all organizations having no or invalid certificates. Two thirds of organizations are not uniquely identifiable and as such lack the basic requirement of trustworthy communication.
A Brief History of Blockchain Interoperability
Belchior R., Süßenguth J., Feng Q., Hardjono T., Vasconcelos A., Correia M.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 6, doi.org, Abstract
Dek: A deep dive into blockchain interoperability: why it is needed, progress that has been made over the past decade, how it is currently deployed and used, and likely paths of future development.
Requirements Engineering in Latin America: The Case of the WER
Quintanilla Portugal R.L., Antonelli L., Marczak S., Hadad G.D., Castro J., Leite J.C.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 0, doi.org
Test-Driven Ethics for Machine Learning
Berente N., Kormylo C., Rosenkranz C.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 2, doi.org, Abstract
Encouraging organizations to adapt a test-driven ethical development approach.
Language-Based Software Testing
Steinhöfel D., Zeller A.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 1, doi.org, Abstract
Constraints over grammar elements can make test generation easier than ever.
Who Determines What Is Relevant? Humans or AI? Why Not Both?
Faggioli G., Dietz L., Clarke C., Demartini G., Hagen M., Hauff C., Kando N., Kanoulas E., Potthast M., Stein B., Wachsmuth H.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 24, doi.org, Abstract
A spectrum of human-artificial intelligence collaboration in assessing relevance.
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems
Himmel A., Mertzios G.B., Nichterlein A., Niedermeier R.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 0, doi.org, Abstract
The challenge of transforming polynomial-time algorithms to really efficient ones.
The Internet of Batteryless Things
Ahmed S., Islam B., Yildirim K.S., Zimmerling M., Pawełczak P., Alizai M.H., Lucia B., Mottola L., Sorber J., Hester J.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 15, doi.org, Abstract
Batteryless, energy-harvesting systems could reshape the Internet of Things into a more sustainable societal infrastructure.
How the AI Boom Went Bust
Haigh T.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2024, цитирований: 1, doi.org, Abstract
Fallout from an exploding bubble of hype triggered the real AI Winter in the late 1980s.
On Specifying for Trustworthiness
Abeywickrama D.B., Bennaceur A., Chance G., Demiris Y., Kordoni A., Levine M., Moffat L., Moreau L., Mousavi M.R., Nuseibeh B., Ramamoorthy S., Ringert J.O., Wilson J., Windsor S., Eder K.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 7, doi.org, Abstract
As autonomous systems increasingly become part of our lives, it is crucial to foster trust between humans and these systems, to ensure positive outcomes and mitigate harmful ones.
There Was No 'First AI Winter'
Haigh T.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 2, doi.org, Abstract
Despite challenges and failures, the artificial intelligence community grew steadily during the 1970s.
Rethinking Conference Formats
Förster A.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 0, doi.org, Abstract
Suggesting a conference format better suited for both onsite and virtual conferences.
What's All the Fuss about Fuzzing? Technical Perspective
Fraser G.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 0, doi.org
New Threats to Society from Free-Speech Social Media Platforms
Bär D., Pröllochs N., Feuerriegel S.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 8, doi.org, Abstract
Understanding emerging threats from social media platforms.
Serverless Computing: What It Is, and What It Is Not?
Kounev S., Herbst N., Abad C.L., Iosup A., Foster I., Shenoy P., Rana O., Chien A.A.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 17, doi.org, Abstract
Dispelling the confusion around serverless computing by capturing its essential and conceptual characteristics.
Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
Haigh T.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 1, doi.org, Abstract
How artificial intelligence and computer science grew up together.
Technical Perspective: FoundationDB Performs Balancing Act
Kemper A.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 0, doi.org
Development Use Cases for Semantics-Driven Modeling Languages
Broy M., Rumpe B.
Q1
Association for Computing Machinery (ACM)
Communications of the ACM, 2023, цитирований: 5, doi.org, Abstract
Choosing underlying semantic theories and definition techniques must closely follow intended use cases for the modeling language.
Cobalt Бета
ru en