Communications of the ACM.

Communications of the ACM. - New York : Association for Computing Machinery (ACM), c2022. - 104 pages : color illustrations ; 28 cm. - Communications of the ACM, Volume 65, Issue 9, September 2022 .

Includes bibliographical references.

Technology and democracy -- The Making of an IT Strategy Consultant -- Changing the Nature of AI Research -- Competition Makes Big Datasets the Winners -- The Road to 6G -- How AI Is Driving the Esports Boom -- These Are Not the Apes You Are Looking For -- Security by Labeling -- The Atlas Milestone -- On the Model of Computation -- Let Us Not Put All Our Eggs -- Middleware 101 -- Middleware 101 -- Deploying Decentralized, Privacy Preserving Proximity Tracing -- Deconstructing the Bakery to Build a Distributed State Machine -- When SDN and Blockchain Shake Hands -- Physical Layer Resilience through Deep Learning in Software Radios -- Polymorphic Wireless Receivers -- The Effectiveness
of Security Measures -- Measuring Security Practices -- Advancing the Ability of Robots to Help.

[Article Title: Technology and democracy/ Moshe Y. Vardi, p. 5]
https://doi.org/10.1145/3546937 [Article Title: Changing the nature of AI research/ Subbarao Kambhampati, p. 7] https://doi.org/10.1145/3546954
[Article Title: Competition makes big datasets the winners/ Chris Edwards, p. 11-13]

Abstract: Measurement has driven research groups to home in on the most popular datasets, but that may change as metrics shift to real-world quality. https://doi.org/10.1145/3546955 [Article Title: The road to 6G/ Keith Kirkpatrick, p. 14-16]

Abstract: Looking past 5G to sixth-generation wireless technology. https://doi.org/10.1145/3546959 [Article Title: How AI is driving the esports boom/ Logan Kugler, p. 17-18]

Abstract: Artificial intelligence is helping the esports industry take the world by storm. https://doi.org/10.1145/3546956 [Article Title: These are not the apes you are looking for/ Andres Guadamuz, p. 20-22]

Abstract: Considering copyright licensing issues involving non-fungible tokens to manage creative works. https://doi.org/10.1145/3548761 [Article Title: Security by labeling/ Andreas Kuehn, p. 23-25]

Abstract: Protecting and empowering the digital consumer. https://doi.org/10.1145/3548762 [Article Title: The Atlas milestone/ Peter Denning, and Roland Ibbett, p. 26-29]

Abstract: Celebrating virtual memory, which has made such a difference in how we approach programming, memory management, and secure computing. https://doi.org/10.1145/3548781 [Article Title: On the model of computation: point/ William Dally, p. 30-32]

https://doi.org/10.1145/354878 [Article Title: On the model of computation: counterpoint/ William Dally, p. 32-34] https://doi.org/10.1145/3548784 [Article Title: Let us not put all our eggs in one basket/ Florence Maraninchi, p. 35-37]

Abstract: Toward new research directions in computer science. https://doi.org/10.1145/3528088 [Article Title: Middleware 101/ Alexandros Gazis, and Eleftheria Katsiri, p. 38-42]

Abstract: What to know now and for the future. https://doi.org/10.1145/3546958 [Article Title: Persistence programming/ Archie L. Cobbs, p. 43-47]
https://doi.org/10.1145/354695 [Article Title: Deploying decentralized, privacy-preserving proximity tracing/ Carmela Troncoso, Dan Bogdanov, Edouard Bugnion, Sylvain Chatel, Cas Cremers, Seda Gürses, Jean-Pierre Hubaux, Dennis Jackson, James R. Larus, Wouter Lueks, Rui Oliveira, Mathias Payer, Bart Preneel, Apostolos Pyrgelis, Marcel Salathé, Theresa Stadler, and Michael Veale, p. 48-57]
https://doi.org/10.1145/352410 [Article Title: Deconstructing the bakery to build a distributed state machine/ Leslie Lamport, p. 58-66] https://doi.org/10.1145/3513259 [Article Title: When SDN and blockchain shake hands/ Majd Latah, Kubra Kalkan, p. 68-78]

Abstract: A survey of recent efforts to combine SDN and BC shows promising results and points to directions for future research. https://doi.org/10.1145/3500920 [Article Title: Technical perspective: Physical layer resilience through deep learning in software radios/ Picture Falko Dressler, p. 82]

Abstract: https://doi.org/10.1145/3547130 [Article Title: Polymorphic wireless receivers/ Francesco Restuccia, and Tommaso Melodia, p. 83-91]

Abstract: Today's wireless technologies are largely based on inflexible designs, which make them inefficient and prone to a variety of wireless attacks. To address this key issue, wireless receivers will need to (i) infer on-the-fly the physical layer parameters currently used by transmitters; and if needed, (ii) change their hardware and software structures to demodulate the incoming waveform. In this paper, we introduce PolymoRF, a deep learning-based polymorphic receiver able to reconfigure itself in real time based on the inferred waveform parameters. Our key technical innovations are (i) a novel embedded deep learning architecture, called RFNet, which enables the solution of key waveform inference problems, and (ii) a generalized hardware/software architecture that integrates RFNet with radio components and signal processing. We prototype PolymoRF on a custom software-defined radio platform and show through extensive over-the-air experiments that PolymoRF achieves throughput within 87% of a perfect-knowledge Oracle system, thus demonstrating for the first time that polymorphic receivers are feasible. https://doi.org/10.1145/3547131 [Article Title: Technical perspective: The effectiveness of security measures/ Nicolas Christin, p. 92]

https://doi.org/10.1145/3547132 [Article Title: Measuring security practices/ Louis F. DeKoven, Audrey Randall, Ariana Mirian, Gautam Akiwate, Ansel Blume, Lawrence K. Saul, Aaron Schulman, Geoffrey M. Voelker, and Stefan Savage, p. 93-102]

Abstract: Users are encouraged to adopt a wide array of technologies and behaviors to reduce their security risk. However, the adoption of these "best practices," ranging from the use of antivirus products to keeping software updated, is not well understood, nor is their practical impact on security risk well established. To explore these issues, we conducted a large-scale measurement of 15,000 computers over six months. We use passive monitoring to infer and characterize the prevalence of various security practices as well as a range of other potentially security-relevant behaviors. We then explore the extent to which differences in key security behaviors impact the real-world outcomes (i.e., that a device shows clear evidence of having been compromised). https://doi.org/10.1145/3547133 [Article Title: Advancing the ability of robots to help/Leah Hoffmann, p. 104]

Abstract: ACM Athena Lecturer Ayanna Howard considers the benefits of robotics and the potential drawbacks of over trust. https://doi.org/10.1145/3546960

0001-0782