On the Implications of Personalization
Vulnerability Counts: A Rejoinder
Cultivating Innovation in a Research Lab
Simulating Extinct Species
AI’s Impact on Mental Health
The Rise of Smart Glasses
It’s the Specification, Stupid!
Forecasting
The Process
Identity Theft in AI Conference Peer Review
AI Fatigue: Reflections on the Human Side of AI’s Rapid Advancement
Beyond Benchmarks: Responsible AI in Education Needs Learning Sciences
Keeping the Dream Alive: The Power and Promise of Federally Funded Research
How the U.S. National Science Foundation Enabled Software-Defined Networking
Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle
The Innovation Engine: Government-Funded Academic Research
From University Research to Global Impact
Advancing AI in Agriculture through Large-Scale Collaborative Research
Federal Funding Supports The Flow of Innovation
The TRIPS Project
Rediscovering Reinforcement Learning
Are Crypto Ecosystems (De)centralizing? A Framework for Longitudinal Analysis
Cyber Humanities for Heritage Security
Trust, Governance, and AI Decision Making
Computing Is Indeed a Discipline in Crisis
Communications Practice Section Welcomes Submissions.
Shedding Labels, Sidestepping Limitations, and Self-Fulfillment
Acting in Self-Defense
Can AI Talk to the Animals?
Creating Digital Replicas of History with AI
In Search of Better Search
The Silent Scientist: When Software Research Fails to Reach Its Audience
Does Using In-Copyright Works as Training Data Infringe?
Culture, Language, and Generative Language Models
Trading Bits for Atoms: How Digital Products Are Reshaping the Global Economy
Reinventing AI: Is It the Time for a New Paradigm?
Tech Workers Versus Enshittification
When Is WebAssembly Going to Get DOM Support?
WebAssembly: Yes, but for What?
Automatically Translating C to Rust
Information Power!
The Cyberpsychology Influence on Modern Computing
Shields for Safe Reinforcement Learning
Cryptocurrency Browser-Extension Security: A Wake-Up Call and a Way Forward
Characterizing Cryptocurrency-Themed Malicious Browser Extensions
The Memory Exchange
On Digital Ubiquity.
How Generative Models Are Ruining Themselves.
Language Models Wrestle with Gaps in Understanding.