A Formal Analysis of 5G Authentication

24:05
Towards Verified, Constant-time Floating Point Operations

58:48
Research to Reality Building Production Ready LLM Apps Users Can Trust

25:26
Racial Steering by Large Language Models: A Prospective Audit of GPT-4 on Housing Recommendations

1:01:30
ACMW Celebrating Technology Leaders Episode 16: A Look at ACM W Professional Chapters

1:01:59
ACM2Y Online BoF - Generative AI Use in Community College Computing Programs - Feb 18, 2025

58:36
Testing the System: A Holistic Approach to Security in Systems Development

30:23
From Transparency to Accountability and Back: A Discussion of Access and Evidence in AI Auditing

3:05