Autonomy 2.0: The Quest for Economies of Scale
An ever-evolving software stack and the digital twin paradigm will significantly accelerate progress in the autonomy industry.
Cyber Trust Mark to Distinguish Secure Smart Home Devices
The U.S. Cyber Trust Mark program is a mechanism for providers of wireless smart home devices to test and certify the security of their products.
Opinion
BLOG@CACM
You Need Much Less Memory than Time
An upcoming STOC conference paper reports a huge near-quadratic improvement that will go down as a true classic complexity theorem.
What Are You Thinking?
We rely on an always-changing international community of bloggers. Please recommend a blogger or volunteer yourself as a BLOG@CACM contributor. Contact us atblog@cacm.acm.org.
Explore the latest issue
Table of Contents
Video
Prevalence and Prevention of Large Language Model Use in Crowd Work
LLMs may be particularly harmful in crowd work when the goal is to capture the diversity of human preferences, behaviors, or opinions.
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
An investigation of vulnerabilities within the TCP/IP protocol suite that can be exploited by forged ICMP errors.
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More