Stephanie Valencia, Mark Steidl, Michael L. Rivera, Cynthia L. Bennett, Jeffrey P. Bigham, H. Admoni
Augmentative and alternative communication (AAC) devices enable speech-based communication, but generating speech is not the only resource needed to have a successful conversation. Being able to signal one wishes to take a turn by raising a hand or providing some other cue is critical in securing a turn to speak. Experienced conversation partners know how to recognize the nonverbal communication an augmented communicator (AC) displays, but these same nonverbal gestures can be hard to interpret by people who meet an AC for the first time. Prior work has identified motion through robots and expressive objects as a modality that can support communication. In this work, we work closely with an AAC user to understand how motion through a physical expressive object can support their communication. We present our process and resulting lessons on the designed object and the co-design process.
{"title":"Nonverbal Communication through Expressive Objects","authors":"Stephanie Valencia, Mark Steidl, Michael L. Rivera, Cynthia L. Bennett, Jeffrey P. Bigham, H. Admoni","doi":"10.1145/3610939","DOIUrl":"https://doi.org/10.1145/3610939","url":null,"abstract":"Augmentative and alternative communication (AAC) devices enable speech-based communication, but generating speech is not the only resource needed to have a successful conversation. Being able to signal one wishes to take a turn by raising a hand or providing some other cue is critical in securing a turn to speak. Experienced conversation partners know how to recognize the nonverbal communication an augmented communicator (AC) displays, but these same nonverbal gestures can be hard to interpret by people who meet an AC for the first time. Prior work has identified motion through robots and expressive objects as a modality that can support communication. In this work, we work closely with an AAC user to understand how motion through a physical expressive object can support their communication. We present our process and resulting lessons on the designed object and the co-design process.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"61 41","pages":"123 - 131"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seesaw Gold","authors":"Dennis Shasha","doi":"10.1145/3630113","DOIUrl":"https://doi.org/10.1145/3630113","url":null,"abstract":"Tilting for treasure.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"53 4","pages":"136 - ff"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138951187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neil C. C. Brown, F. Hermans, Lauren E. Margulieux
Understanding how human memory and learning works, the differences between beginners and experts, and practical steps developers can take to improve their learning, training, and recruitment.
{"title":"10 Things Software Developers Should Learn about Learning","authors":"Neil C. C. Brown, F. Hermans, Lauren E. Margulieux","doi":"10.1145/3584859","DOIUrl":"https://doi.org/10.1145/3584859","url":null,"abstract":"Understanding how human memory and learning works, the differences between beginners and experts, and practical steps developers can take to improve their learning, training, and recruitment.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"63 9","pages":"78 - 87"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138951633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enabling confidential computing with AMD SEV-SNP technology.
利用 AMD SEV-SNP 技术实现保密计算。
{"title":"Hardware VM Isolation in the Cloud","authors":"David Kaplan","doi":"10.1145/3624576","DOIUrl":"https://doi.org/10.1145/3624576","url":null,"abstract":"Enabling confidential computing with AMD SEV-SNP technology.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"4 2","pages":"54 - 59"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138948382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Rob Nertney, Michael O'Connor, Phil Rogers
The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing.
NVIDIA 团队为加速计算的用户代码和数据带来了保密性和完整性。
{"title":"Creating the First Confidential GPUs","authors":"Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Rob Nertney, Michael O'Connor, Phil Rogers","doi":"10.1145/3626827","DOIUrl":"https://doi.org/10.1145/3626827","url":null,"abstract":"The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"61 18","pages":"60 - 67"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACM Publications Finances for 2022: Striving for Balance between Mission, Sustainability, and Growth","authors":"Wendy Hall, Divesh Srivastava, Scott E. Delman","doi":"10.1145/3635166","DOIUrl":"https://doi.org/10.1145/3635166","url":null,"abstract":"","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"59 12","pages":"22 - 26"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138952105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Can the government regulate how social media companies moderate their platforms?
政府能否监管社交媒体公司如何管理自己的平台?
{"title":"Beyond the Editorial Analogy: The Future of the First Amendment on the Internet","authors":"Kyle Langvardt, A. Rozenshtein","doi":"10.1145/3631538","DOIUrl":"https://doi.org/10.1145/3631538","url":null,"abstract":"Can the government regulate how social media companies moderate their platforms?","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"16 6","pages":"36 - 38"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138953017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts. twitter Follow us on Twitter at http://twitter.com/blogCACM https://cacm.acm.org/blogs/blog-cacm Alex Vakulov ponders how to protect the Internet of Medical Things.
{"title":"Protecting Life-Saving Medical Devices from Cyberattack","authors":"Alex Vakulov","doi":"10.1145/3631535","DOIUrl":"https://doi.org/10.1145/3631535","url":null,"abstract":"The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts. twitter Follow us on Twitter at http://twitter.com/blogCACM https://cacm.acm.org/blogs/blog-cacm Alex Vakulov ponders how to protect the Internet of Medical Things.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"55 7","pages":"8 - 9"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138949749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer power helps biologists track the regulation of genetic information.
计算机的强大功能帮助生物学家追踪遗传信息的调控。
{"title":"Epigenomics Now","authors":"Don Monroe","doi":"10.1145/3631934","DOIUrl":"https://doi.org/10.1145/3631934","url":null,"abstract":"Computer power helps biologists track the regulation of genetic information.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"48 4","pages":"11 - 13"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research","authors":"D. Yao","doi":"10.1145/3624722","DOIUrl":"https://doi.org/10.1145/3624722","url":null,"abstract":"Demystifying rebuttal writing.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"24 8","pages":"47 - 49"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138951590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}