Communications of the ACM. (Record no. 2219)

MARC details
000 -LEADER
fixed length control field 07035nam a22005537a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250519114418.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250519b ph ||||| |||| 00| 0 eng d
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER
International Standard Serial Number 0001-0782
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
245 ## - TITLE STATEMENT
Title Communications of the ACM.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. Association for Computing Machinery (ACM),
Date of publication, distribution, etc. c2023.
300 ## - PHYSICAL DESCRIPTION
Extent 116 pages :
Other physical details color illustrations ;
Dimensions 28 cm.
490 ## - SERIES STATEMENT
Volume/sequential designation Communications of the ACM, Volume 66, Issue 2, February 2023
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note To the Members of ACM -- On QR Codes and Safety -- Neighborhood Watch -- What Is Data Science? -- Post-Quantum Cryptography -- Computational Linguistics Finds Its Voice -- Can AI Demonstrate Creativity? -- Four Ways to Add Active Learning to Computing Courses -- The Elephant in the Room -- Ethical AI Is Not about AI -- Software Engineering of Machine Learning Systems -- Building Machine Learning Models like Open Source Software -- The Premature Obituary of Programming -- An Analysis of Black Faculty in CS Research Departments -- From Zero to 100 -- The Arrival of Zero Trust: What Does It Mean? -- Extracting the Essential Simplicity of the Internet -- (Re)Use of Research Results (Is Rampant) -- HPC Forecast: Cloudy and Uncertain -- The Lean Data Scientist: Recent Advances toward Overcoming the Data Bottleneck -- Beautiful Symbolic Abstractions for Safe and Secure Machine Learning -- Proving Data-Poisoning Robustness in Decision Trees --Aftermath Impact.
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: To the Members of ACM/ Yannis Ioannidis, p. 5]
Uniform Resource Identifier <a href="https://doi.org/10.1145/357864">https://doi.org/10.1145/357864</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: On QR Codes and Safety/ Vinton G. Cerf, p. 7]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3578891">https://doi.org/10.1145/3578891</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Neighborhood Watch/ CACM Staff, p. 8-11]
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: What is Data Science?/ Koby Mike, and Orit Hazzan, p. 12-13]<br/><br/>Abstract: The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.
Expansion of summary note
Uniform Resource Identifier <a href="https://doi.org/10.1145/3575663">https://doi.org/10.1145/3575663</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Post-Quantum Cryptography/Don Monroe, p. 15-17]<br/><br/>Abstract: Cryptographers seek algorithms quantum computers cannot break.
Uniform Resource Identifier <a href="https://doi.org/10.1145/3575664">https://doi.org/10.1145/3575664</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Computational Linguistics Finds its Voice/Samuel Greengard, p. 18-20]<br/><br/>Abstract: Advances in artificial intelligence permit computers to converse with humans in seemingly realistic ways.
Uniform Resource Identifier <a href="https://doi.org/10.1145/3575666">https://doi.org/10.1145/3575666</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Can AI Demonstrate Creativity?/ Keith Kirkpatrick, p. 21-23]<br/><br/>Abstract: When fed a sufficient amount of training data, artificial intelligence techniques can be used to generate new ideas in several different ways. Is that creativity?
Uniform Resource Identifier <a href="https://doi.org/10.1145/3575665">https://doi.org/10.1145/3575665</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Four Ways to Add Active Learning to Computing Courses/ Barbara Ericson, p. 26-29]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3576930">https://doi.org/10.1145/3576930</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: The Elephant in the Room/ George V. Neville-Neil, p. 30-31]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3576931">https://doi.org/10.1145/3576931</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Ethical AI is Not about AI/ Deborah G. Johnson, and Mario Verdicchio, p. 32-34]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3576932">https://doi.org/10.1145/3576932</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Software Engineering of Machine Learning Systems/ Charles Isbell, Michael L. Littman, and Peter Norvig, p. 35-37]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3539783">https://doi.org/10.1145/3539783</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Building Machine Learning Models Like Open Source Software/ Colin Raffel, p. 38-40]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3545111">https://doi.org/10.1145/3545111</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: The Premature Obituary of Programming/ Daniel M. Yellin, p. 41-44]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3555367">https://doi.org/10.1145/3555367</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: An Analysis of Black Faculty in CS Research Departments/ Juan E. Gilbert, Jeremy A. Magruder Waisome, and Simone Smarr, p. 45-47]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3571279">https://doi.org/10.1145/3571279</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: From Zero to 100/ Matthew Bush, and Atefeh Mashatan, p. 48-55]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3573127">https://doi.org/10.1145/3573127</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: The Arrival of Zero Trust: What Does it Mean?/ Michael Loftus, Andrew Vezina, Rick Doten, and Atefeh Mashatan, p. 56-62]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3573129">https://doi.org/10.1145/3573129</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Extracting the Essential Simplicity of the Internet/ James Mccauley, Scott Shenker, and George Varghese, p. 64-74]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3547137">https://doi.org/10.1145/3547137</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: (Re)Use of Research Results (Is Rampant)t/ Maria Teresa Baldassarre, Neil Ernst, Ben Hermann, Tim Menzies, abd Rahul Yedida, p. 75-81]
Expansion of summary note
Uniform Resource Identifier <a href="https://doi.org/10.1145/3554976">https://doi.org/10.1145/3554976</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: HPC Forecast: Cloudy and Uncertain/ Daniel Reed, Dennis Gannon, and Jack Dongarra, p. 82-90]
Expansion of summary note
Uniform Resource Identifier <a href="https://doi.org/10.1145/3552309">https://doi.org/10.1145/3552309</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: The Lean Data Scientist: Recent Advances Toward Overcoming the Data Bottleneck/ Chen Shani, Jonathan Zarecki, and Dafna Shahaf, p. 92-102]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3551635">https://doi.org/10.1145/3551635</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning/ Martin Vechev, p. 104]
Uniform Resource Identifier <a href="https://doi.org/10.1145/3576893">https://doi.org/10.1145/3576893</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Proving Data-Poisoning Robustness in Decision Trees/ Samuel Drews, Aws Albarghouthi, and Loris D'Antoni, p. 105-113]<br/><br/>Abstract: Machine learning models are brittle, and small changes in the training data can result in different predictions. We study the problem of proving that a prediction is robust to data poisoning, where an attacker can inject a number of malicious elements into the training set to influence the learned model. We target decision tree models, a popular and simple class of machine learning models that underlies many complex learning techniques. We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote. Antidote abstractly trains decision trees for an intractably large space of possible poisoned datasets. Due to the soundness of our abstraction, Antidote can produce proofs that, for a given input, the corresponding prediction would not have changed had the training set been tampered with or not. We demonstrate the effectiveness of Antidote on a number of popular datasets.
Uniform Resource Identifier <a href="https://doi.org/10.1145/3576894">https://doi.org/10.1145/3576894</a>
520 ## - SUMMARY, ETC.
Summary, etc. [Article Title: Aftermath Impact/ William Sims Bainbridge, p. 116]<br/><br/>Abstract: From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be.<br/>An ancient roman dispatched to find the greatest technological advances of the time may lose something of far greater importance.
Uniform Resource Identifier <a href="https://doi.org/10.1145/3578622">https://doi.org/10.1145/3578622</a>
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element AUTOMATED STATIC ANALYSIS
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element COMPUTER CRIME
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element CRYPTOGRAPHIC PROTOCOLS
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element DATA MANAGEMENT SYSTEMS
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element NEURAL NETWORKS
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element SOFTWARE DESIGN
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element TRUSTED COMPUTING
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Topical term or geographic name as entry element TRUST FRAMEWORKS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Serials
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Gen. Ed. - CCIT LRC - Main National University - Manila Periodicals 02/17/2024 Donation   Communications of the ACM, Volume 66, Issue 2, February 2023 c.1 PER000000608 05/19/2025 c.1 05/19/2025 Serials
    Library of Congress Classification     Gen. Ed. - CCIT LRC - Main National University - Manila Periodicals 02/17/2024 Donation   Communications of the ACM, Volume 66, Issue 2, February 2023 c.2 PER000000609 05/19/2025 c.2 05/19/2025 Serials