| Majority Is Not Enough: Bitcoin Mining Is Vulnerable |
59 |
| The Mythos of Model Interpretability |
40 |
| Decentralized Blockchain-Based Electronic Marketplaces |
33 |
| A New Golden Age for Computer Architecture |
28 |
| Never-Ending Learning |
25 |
| Making Machine Learning Robust Against Adversarial Inputs |
24 |
| SONYC : A System for Monitoring, Analyzing, and Mitigating Urban Noise Pollution |
24 |
| Speech Emotion Recognition Two Decades in a Nutshell, Benchmarks, and Ongoing Trends |
24 |
| Bias on the Web |
21 |
| The Seven Tools of Causal Inference, with Reflections on Machine Learning |
19 |
| The Wisdom of Older Technology (Non)Users |
12 |
| Building a Smart City: Lessons from Barcelona |
11 |
| A Domain-Specific Architecture for Deep Neural Networks |
11 |
| Digital Nudging: Guiding Online User Choices through Interface Design |
10 |
| The Challenge of Crafting Intelligible Intelligence |
10 |
| Data Acquisition in Vehicular Ad Hoc Networks |
9 |
| Lessons from Building Static Analysis Tools at Google |
9 |
| Metamorphic Testing of Driverless Cars |
9 |
| Even Central Users Do Not Always Drive Information Diffusion |
8 |
| Fully Device Independent Quantum Key Distribution |
8 |
| Realizing the Potential of Data Science |
7 |
| Multiparty Privacy in Social Media |
7 |
| Research for Practice. The DevOps Phenomenon |
6 |
| Industry-Scale Knowledge Graphs: Lessons and Challenges |
6 |
| Elements of the Theory of Dynamic Networks |
6 |
| Designing Emotionally Sentient Agents |
6 |
| Bridgeware: The Air-Gap Malware |
5 |
| Computational Sustainability: Computing for a Better World and a Sustainable Future |
5 |
| Embedded EthiCS: Integrating Ethics Across CS Education |
5 |
| Autonomous Tools and Design: A Triple-Loop Approach to Human-Machine Learning |
5 |
| Intelligent Systems for Geosciences: An Essential Research Agenda |
5 |
| Formally Verified Software in the Real World |
5 |
| Computing within Limits |
5 |
| Human-Level Intelligence or Animal-Like Abilities? |
4 |
| Privacy in Decentralized Cryptocurrencies |
4 |
| Information Hiding: Challenges for Forensic Experts |
4 |
| Deep Optimization for Spectrum Repacking |
4 |
| Amdahl's Law for Tail Latency |
4 |
| Blockchains from a Distributed Computing Perspective |
4 |
| Alloy: A Language and Tool for Exploring Software Designs |
4 |
| The Next Phase in the Digital Revolution: Intelligent Tools, Platforms, Growth, Employment |
3 |
| The Rise of Serverless Computing |
3 |
| Automated Program Repair |
3 |
| Search-based Program Synthesis |
3 |
| DevOps Metrics |
3 |
| Cyber Security in the Quantum Era |
3 |
| Ability-Based Design |
3 |
| Modern Debugging The Art of Finding a Needle in a Haystack |
3 |
| Face2Face: Real-Time Face Capture and Reenactment of RGB Videos |
3 |
| How to Teach Computer Ethics through Science Fiction |
3 |