MARC details
000 -LEADER |
fixed length control field |
07035nam a22005537a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250519114418.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250519b ph ||||| |||| 00| 0 eng d |
022 ## - INTERNATIONAL STANDARD SERIAL NUMBER |
International Standard Serial Number |
0001-0782 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
245 ## - TITLE STATEMENT |
Title |
Communications of the ACM. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
Association for Computing Machinery (ACM), |
Date of publication, distribution, etc. |
c2023. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
116 pages : |
Other physical details |
color illustrations ; |
Dimensions |
28 cm. |
490 ## - SERIES STATEMENT |
Volume/sequential designation |
Communications of the ACM, Volume 66, Issue 2, February 2023 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
To the Members of ACM -- On QR Codes and Safety -- Neighborhood Watch -- What Is Data Science? -- Post-Quantum Cryptography -- Computational Linguistics Finds Its Voice -- Can AI Demonstrate Creativity? -- Four Ways to Add Active Learning to Computing Courses -- The Elephant in the Room -- Ethical AI Is Not about AI -- Software Engineering of Machine Learning Systems -- Building Machine Learning Models like Open Source Software -- The Premature Obituary of Programming -- An Analysis of Black Faculty in CS Research Departments -- From Zero to 100 -- The Arrival of Zero Trust: What Does It Mean? -- Extracting the Essential Simplicity of the Internet -- (Re)Use of Research Results (Is Rampant) -- HPC Forecast: Cloudy and Uncertain -- The Lean Data Scientist: Recent Advances toward Overcoming the Data Bottleneck -- Beautiful Symbolic Abstractions for Safe and Secure Machine Learning -- Proving Data-Poisoning Robustness in Decision Trees --Aftermath Impact. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: To the Members of ACM/ Yannis Ioannidis, p. 5] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/357864">https://doi.org/10.1145/357864</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: On QR Codes and Safety/ Vinton G. Cerf, p. 7] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3578891">https://doi.org/10.1145/3578891</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Neighborhood Watch/ CACM Staff, p. 8-11] |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: What is Data Science?/ Koby Mike, and Orit Hazzan, p. 12-13]<br/><br/>Abstract: The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts. |
Expansion of summary note |
|
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3575663">https://doi.org/10.1145/3575663</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Post-Quantum Cryptography/Don Monroe, p. 15-17]<br/><br/>Abstract: Cryptographers seek algorithms quantum computers cannot break. |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3575664">https://doi.org/10.1145/3575664</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Computational Linguistics Finds its Voice/Samuel Greengard, p. 18-20]<br/><br/>Abstract: Advances in artificial intelligence permit computers to converse with humans in seemingly realistic ways. |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3575666">https://doi.org/10.1145/3575666</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Can AI Demonstrate Creativity?/ Keith Kirkpatrick, p. 21-23]<br/><br/>Abstract: When fed a sufficient amount of training data, artificial intelligence techniques can be used to generate new ideas in several different ways. Is that creativity? |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3575665">https://doi.org/10.1145/3575665</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Four Ways to Add Active Learning to Computing Courses/ Barbara Ericson, p. 26-29] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3576930">https://doi.org/10.1145/3576930</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: The Elephant in the Room/ George V. Neville-Neil, p. 30-31] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3576931">https://doi.org/10.1145/3576931</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Ethical AI is Not about AI/ Deborah G. Johnson, and Mario Verdicchio, p. 32-34] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3576932">https://doi.org/10.1145/3576932</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Software Engineering of Machine Learning Systems/ Charles Isbell, Michael L. Littman, and Peter Norvig, p. 35-37] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3539783">https://doi.org/10.1145/3539783</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Building Machine Learning Models Like Open Source Software/ Colin Raffel, p. 38-40] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3545111">https://doi.org/10.1145/3545111</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: The Premature Obituary of Programming/ Daniel M. Yellin, p. 41-44] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3555367">https://doi.org/10.1145/3555367</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: An Analysis of Black Faculty in CS Research Departments/ Juan E. Gilbert, Jeremy A. Magruder Waisome, and Simone Smarr, p. 45-47] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3571279">https://doi.org/10.1145/3571279</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: From Zero to 100/ Matthew Bush, and Atefeh Mashatan, p. 48-55] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3573127">https://doi.org/10.1145/3573127</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: The Arrival of Zero Trust: What Does it Mean?/ Michael Loftus, Andrew Vezina, Rick Doten, and Atefeh Mashatan, p. 56-62] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3573129">https://doi.org/10.1145/3573129</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Extracting the Essential Simplicity of the Internet/ James Mccauley, Scott Shenker, and George Varghese, p. 64-74] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3547137">https://doi.org/10.1145/3547137</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: (Re)Use of Research Results (Is Rampant)t/ Maria Teresa Baldassarre, Neil Ernst, Ben Hermann, Tim Menzies, abd Rahul Yedida, p. 75-81] |
Expansion of summary note |
|
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3554976">https://doi.org/10.1145/3554976</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: HPC Forecast: Cloudy and Uncertain/ Daniel Reed, Dennis Gannon, and Jack Dongarra, p. 82-90] |
Expansion of summary note |
|
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3552309">https://doi.org/10.1145/3552309</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: The Lean Data Scientist: Recent Advances Toward Overcoming the Data Bottleneck/ Chen Shani, Jonathan Zarecki, and Dafna Shahaf, p. 92-102] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3551635">https://doi.org/10.1145/3551635</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning/ Martin Vechev, p. 104] |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3576893">https://doi.org/10.1145/3576893</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Proving Data-Poisoning Robustness in Decision Trees/ Samuel Drews, Aws Albarghouthi, and Loris D'Antoni, p. 105-113]<br/><br/>Abstract: Machine learning models are brittle, and small changes in the training data can result in different predictions. We study the problem of proving that a prediction is robust to data poisoning, where an attacker can inject a number of malicious elements into the training set to influence the learned model. We target decision tree models, a popular and simple class of machine learning models that underlies many complex learning techniques. We present a sound verification technique based on abstract interpretation and implement it in a tool called Antidote. Antidote abstractly trains decision trees for an intractably large space of possible poisoned datasets. Due to the soundness of our abstraction, Antidote can produce proofs that, for a given input, the corresponding prediction would not have changed had the training set been tampered with or not. We demonstrate the effectiveness of Antidote on a number of popular datasets. |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3576894">https://doi.org/10.1145/3576894</a> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
[Article Title: Aftermath Impact/ William Sims Bainbridge, p. 116]<br/><br/>Abstract: From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be.<br/>An ancient roman dispatched to find the greatest technological advances of the time may lose something of far greater importance. |
Uniform Resource Identifier |
<a href="https://doi.org/10.1145/3578622">https://doi.org/10.1145/3578622</a> |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
AUTOMATED STATIC ANALYSIS |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
COMPUTER CRIME |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
CRYPTOGRAPHIC PROTOCOLS |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
DATA MANAGEMENT SYSTEMS |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
NEURAL NETWORKS |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
SOFTWARE DESIGN |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
TRUSTED COMPUTING |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) |
Topical term or geographic name as entry element |
TRUST FRAMEWORKS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Serials |
Suppress in OPAC |
No |