搜索优化
English
搜索
Copilot
图片
视频
地图
资讯
购物
更多
航班
旅游
酒店
房地产
笔记本
Top stories
Sports
U.S.
Local
World
Science
Technology
Entertainment
Business
More
Politics
时间不限
过去 1 小时
过去 24 小时
过去 7 天
过去 30 天
按相关度排序
按时间排序
acm.org
4 小时
Interesting Engineering
Researchers at the U.S. Department of Energy’s Argonne National Laboratory used the Frontier supercomputer at Oak Ridge National Laboratory to perform the biggest ever astrophysical simulation of the ...
acm.org
1 天
Email Insecurity
Personally Identifiable Information (PII) is the data most at risk, said Casares. PII is any information someone could use to ...
acm.org
4 天
The EU AI Act and the Wager on Trustworthy AI
The EU AI Act passed by the European Parliament will now be implemented in 27 member states of the EU. It is the first major ...
acm.org
7 天
A Camera the Size of a Grain of Salt Could Change Imaging as We Know It
The meta-optics camera is the first device of its kind to produce full-color images that are equal in quality to those ...
acm.org
7 天
Transactions and Serverless are Made for Each Other
Serverless cloud offerings are becoming increasingly popular for stateless applications because they simplify cloud ...
acm.org
6 天
Security via AI
Security vendors have been applying AI, including machine learning, to product development and services for at least a decade ...
acm.org
4 天
Jesse Elwell
Demonstrating the practicallity of μWMs by creating a microarchitecture-sensitive logic bomb. ACM encourages its members to ...
acm.org
4 天
In Memoriam: E. Allen Emerson
E. Allen Emerson was the first graduate student of Edmund M. Clarke at Harvard. After discussing several ideas for Allen’s ...
Opinion
acm.org
4 天
Opinion
Diversity Examples Inappropriate
While diversity should be encouraged, it does not directly pertain to the core of computer science and technology professions ...
acm.org
4 天
Tom Lambert
There is little convincing evidence that anything other than ability, knowledge, and communication skills drives the success ...
acm.org
4 天
Technical Perspective: How Exploits Impact Computer Science Theory
Should exploits be a concern of computer science theory? Can they tell us about fundamental properties of computing rather ...
当前正在显示可能无法访问的结果。
隐藏无法访问的结果
反馈