Stephanie Valencia, Mark Steidl, Michael L. Rivera, Cynthia L. Bennett, Jeffrey P. Bigham, H. Admoni
{"title":"Nonverbal Communication through Expressive Objects","authors":"Stephanie Valencia, Mark Steidl, Michael L. Rivera, Cynthia L. Bennett, Jeffrey P. Bigham, H. Admoni","doi":"10.1145/3610939","DOIUrl":"https://doi.org/10.1145/3610939","url":null,"abstract":"Augmentative and alternative communication (AAC) devices enable speech-based communication, but generating speech is not the only resource needed to have a successful conversation. Being able to signal one wishes to take a turn by raising a hand or providing some other cue is critical in securing a turn to speak. Experienced conversation partners know how to recognize the nonverbal communication an augmented communicator (AC) displays, but these same nonverbal gestures can be hard to interpret by people who meet an AC for the first time. Prior work has identified motion through robots and expressive objects as a modality that can support communication. In this work, we work closely with an AAC user to understand how motion through a physical expressive object can support their communication. We present our process and resulting lessons on the designed object and the co-design process.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"61 41","pages":"123 - 131"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Seesaw Gold","authors":"Dennis Shasha","doi":"10.1145/3630113","DOIUrl":"https://doi.org/10.1145/3630113","url":null,"abstract":"Tilting for treasure.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"53 4","pages":"136 - ff"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138951187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neil C. C. Brown, F. Hermans, Lauren E. Margulieux
{"title":"10 Things Software Developers Should Learn about Learning","authors":"Neil C. C. Brown, F. Hermans, Lauren E. Margulieux","doi":"10.1145/3584859","DOIUrl":"https://doi.org/10.1145/3584859","url":null,"abstract":"Understanding how human memory and learning works, the differences between beginners and experts, and practical steps developers can take to improve their learning, training, and recruitment.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"63 9","pages":"78 - 87"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138951633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware VM Isolation in the Cloud","authors":"David Kaplan","doi":"10.1145/3624576","DOIUrl":"https://doi.org/10.1145/3624576","url":null,"abstract":"Enabling confidential computing with AMD SEV-SNP technology.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"4 2","pages":"54 - 59"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138948382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Rob Nertney, Michael O'Connor, Phil Rogers
{"title":"Creating the First Confidential GPUs","authors":"Gobikrishna Dhanuskodi, Sudeshna Guha, Vidhya Krishnan, Aruna Manjunatha, Rob Nertney, Michael O'Connor, Phil Rogers","doi":"10.1145/3626827","DOIUrl":"https://doi.org/10.1145/3626827","url":null,"abstract":"The team at NVIDIA brings confidentiality and integrity to user code and data for accelerated computing.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"61 18","pages":"60 - 67"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ACM Publications Finances for 2022: Striving for Balance between Mission, Sustainability, and Growth","authors":"Wendy Hall, Divesh Srivastava, Scott E. Delman","doi":"10.1145/3635166","DOIUrl":"https://doi.org/10.1145/3635166","url":null,"abstract":"","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"59 12","pages":"22 - 26"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138952105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Beyond the Editorial Analogy: The Future of the First Amendment on the Internet","authors":"Kyle Langvardt, A. Rozenshtein","doi":"10.1145/3631538","DOIUrl":"https://doi.org/10.1145/3631538","url":null,"abstract":"Can the government regulate how social media companies moderate their platforms?","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"16 6","pages":"36 - 38"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138953017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Life-Saving Medical Devices from Cyberattack","authors":"Alex Vakulov","doi":"10.1145/3631535","DOIUrl":"https://doi.org/10.1145/3631535","url":null,"abstract":"The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts. twitter Follow us on Twitter at http://twitter.com/blogCACM https://cacm.acm.org/blogs/blog-cacm Alex Vakulov ponders how to protect the Internet of Medical Things.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"55 7","pages":"8 - 9"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138949749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Epigenomics Now","authors":"Don Monroe","doi":"10.1145/3631934","DOIUrl":"https://doi.org/10.1145/3631934","url":null,"abstract":"Computer power helps biologists track the regulation of genetic information.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"48 4","pages":"11 - 13"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138950804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research","authors":"D. Yao","doi":"10.1145/3624722","DOIUrl":"https://doi.org/10.1145/3624722","url":null,"abstract":"Demystifying rebuttal writing.","PeriodicalId":10594,"journal":{"name":"Communications of the ACM","volume":"24 8","pages":"47 - 49"},"PeriodicalIF":22.7,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138951590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}