I/F
On the Implications of Personalization Vulnerability Counts: A Rejoinder Cultivating Innovation in a Research Lab Simulating Extinct Species AI’s Impact on Mental Health The Rise of Smart Glasses It’s the Specification, Stupid! Forecasting The Process Identity Theft in AI Conference Peer Review AI Fatigue: Reflections on the Human Side of AI’s Rapid Advancement Beyond Benchmarks: Responsible AI in Education Needs Learning Sciences Keeping the Dream Alive: The Power and Promise of Federally Funded Research How the U.S. National Science Foundation Enabled Software-Defined Networking Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle The Innovation Engine: Government-Funded Academic Research From University Research to Global Impact Advancing AI in Agriculture through Large-Scale Collaborative Research Federal Funding Supports The Flow of Innovation The TRIPS Project Rediscovering Reinforcement Learning Are Crypto Ecosystems (De)centralizing? A Framework for Longitudinal Analysis Cyber Humanities for Heritage Security Trust, Governance, and AI Decision Making Computing Is Indeed a Discipline in Crisis Communications Practice Section Welcomes Submissions. Shedding Labels, Sidestepping Limitations, and Self-Fulfillment Acting in Self-Defense Can AI Talk to the Animals? Creating Digital Replicas of History with AI In Search of Better Search The Silent Scientist: When Software Research Fails to Reach Its Audience Does Using In-Copyright Works as Training Data Infringe? Culture, Language, and Generative Language Models Trading Bits for Atoms: How Digital Products Are Reshaping the Global Economy Reinventing AI: Is It the Time for a New Paradigm? Tech Workers Versus Enshittification When Is WebAssembly Going to Get DOM Support? WebAssembly: Yes, but for What? Automatically Translating C to Rust Information Power! The Cyberpsychology Influence on Modern Computing Shields for Safe Reinforcement Learning Cryptocurrency Browser-Extension Security: A Wake-Up Call and a Way Forward Characterizing Cryptocurrency-Themed Malicious Browser Extensions The Memory Exchange On Digital Ubiquity. How Generative Models Are Ruining Themselves. Language Models Wrestle with Gaps in Understanding.