default search action
Marty J. Wolf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Frances S. Grodzinsky, Marty J. Wolf, Keith W. Miller:
Ethical Issues From Emerging AI Applications: Harms Are Happening. Computer 57(2): 44-52 (2024) - [j32]Marty J. Wolf, Frances S. Grodzinsky, Keith W. Miller:
Generative AI and Its Implications for Definitions of Trust. Inf. 15(9): 542 (2024) - 2023
- [j31]Marty J. Wolf, Joseph A. Konstan, Helena M. Mentis, Jane Prey, Harald Störrle:
After the Complaint: What Should ACM Disclose? Commun. ACM 66(3): 6-11 (2023) - 2022
- [j30]Marty J. Wolf, Frances S. Grodzinsky, Keith W. Miller:
Ethical Reflections on Handling Digital Remains: Computing Professionals Picking Up Bones. Digit. Soc. 1(1) (2022) - [j29]Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf:
Session replay scripts: A privacy analysis. Inf. Soc. 38(4): 257-268 (2022) - [c8]Patrick D. Anderson, Emanuelle Burton, Jaye Nias, Marty J. Wolf:
Moving Toward a Responsible CS Curriculum: Every Course Has a Role to Play. SIGCSE (2) 2022: 1047-1048 - 2021
- [j28]Marty J. Wolf, Don Gotterbarn, Michael S. Kirkpatrick:
Upholding ACM's principles. Commun. ACM 64(8): 21 (2021) - [j27]Jason Borenstein, Frances S. Grodzinsky, Ayanna M. Howard, Keith W. Miller, Marty J. Wolf:
AI Ethics: A Long History and a Recent Burst of Attention. Computer 54(1): 96-102 (2021)
2010 – 2019
- 2019
- [j26]Marty J. Wolf, Alexis M. Elder, Gosia Plotka:
Guest editorial. J. Inf. Commun. Ethics Soc. 17(2): 114-118 (2019) - [c7]Marty J. Wolf, Don Gotterbarn, Michael S. Kirkpatrick:
ACM Code of Ethics: Looking Back and Forging Ahead. SIGCSE 2019: 801-802 - 2018
- [j25]Don Gotterbarn, Amy S. Bruckman, Catherine Flick, Keith W. Miller, Marty J. Wolf:
ACM code of ethics: a guide for positive action. Commun. ACM 61(1): 121-128 (2018) - [j24]Don Gotterbarn, Marty J. Wolf, Catherine Flick, Keith W. Miller:
THINKING PROFESSIONALLY: The continual evolution of interest in computing ethics. Inroads 9(2): 10-12 (2018) - 2017
- [j23]Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct. Commun. ACM 60(5): 105-111 (2017) - [j22]Keith W. Miller, Marty J. Wolf, Frances S. Grodzinsky:
This "Ethical Trap" Is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision-Making. Sci. Eng. Ethics 23(2): 389-401 (2017) - [j21]Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
Dynamic technology challenges static codes of ethics: a case study. SIGCAS Comput. Soc. 47(3): 7-24 (2017) - [j20]Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky:
Why we should have seen that coming: comments on Microsoft's tay "experiment, " and wider implications. SIGCAS Comput. Soc. 47(3): 54-64 (2017) - 2016
- [j19]Marty J. Wolf:
The ACM code of ethics: a call to action. Commun. ACM 59(12): 6 (2016) - [j18]Bo Brinkman, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
Making a positive impact: updating the ACM code of ethics. Commun. ACM 59(12): 7-13 (2016) - [j17]Marty J. Wolf, Frances S. Grodzinsky, Keith W. Miller:
There's something in your eye: ethical implications of augmented visual field devices. J. Inf. Commun. Ethics Soc. 14(3): 214-230 (2016) - [j16]Bo Brinkman, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
All hands on deck for ACM Ethics: updating the Code, revising enforcement, promoting integrity. SIGCAS Comput. Soc. 46(3): 5-8 (2016) - [j15]Marty J. Wolf, Nir Fresco:
Ethics of the software vulnerabilities and exploits market. Inf. Soc. 32(4): 269-279 (2016) - 2015
- [j14]Keith W. Miller, Marty J. Wolf, Frances S. Grodzinsky:
Behind the mask: machine morality. J. Exp. Theor. Artif. Intell. 27(1): 99-107 (2015) - [j13]Marty J. Wolf, Frances S. Grodzinsky, Keith W. Miller:
Augmented reality all around us: power and perception at a crossroads. SIGCAS Comput. Soc. 45(3): 126-131 (2015) - 2014
- [j12]Nir Fresco, Marty J. Wolf:
The instructional information processing account of digital computation. Synth. 191(7): 1469-1492 (2014) - 2012
- [j11]Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf:
Moral responsibility for computing artifacts: "the rules" and issues of trust. SIGCAS Comput. Soc. 42(2): 15-25 (2012) - 2011
- [c6]Frances S. Grodzinsky, Marty J. Wolf, Keith W. Miller:
Quantum computing and cloud computing: humans trusting humans via machines. ISTAS 2011: 1-5
2000 – 2009
- 2009
- [j10]Darren B. Parker, Randy F. Westhoff, Marty J. Wolf:
Convex independence and the structure of clone-free multipartite tournaments. Discuss. Math. Graph Theory 29(1): 51-69 (2009) - [j9]Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky:
Free, source-code-available, or proprietary: an ethically charged, context-sensitive choice. SIGCAS Comput. Soc. 39(1): 15-26 (2009) - 2008
- [j8]Darren B. Parker, Randy F. Westhoff, Marty J. Wolf:
On two-path convexity in multipartite tournaments. Eur. J. Comb. 29(3): 641-651 (2008) - 2006
- [j7]Darren B. Parker, Randy F. Westhoff, Marty J. Wolf:
Two-path convexity in clone-free regular multipartite tournaments. Australas. J Comb. 36: 177-196 (2006) - [j6]Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf:
Influences on and incentives for increasing software reliability. J. Inf. Commun. Ethics Soc. 4(2): 103-113 (2006) - [c5]Marty J. Wolf, Frances S. Grodzinsky:
Good/fast/cheap: contexts, relationships and professional responsibility during software development. SAC 2006: 261-266 - 2003
- [j5]Frances S. Grodzinsky, Keith W. Miller, Marty J. Wolf:
Ethical issues in open source software. J. Inf. Commun. Ethics Soc. 1(4): 193-205 (2003) - 2002
- [c4]Alexandros Stamatakis, Thomas Ludwig, Harald Meier, Marty J. Wolf:
AxML: A Fast Program for Sequential and Parallel Phylogenetic Tree Calculations Based on the Maximum Likelihood Method. CSB 2002: 21- - [c3]Alexandros Stamatakis, Thomas Ludwig, Harald Meier, Marty J. Wolf:
Accelerating parallel maximum likelihood-based phylogenetic tree calculations using subtree equality vectors. SC 2002: 2:1-2:16 - [c2]Marty J. Wolf, Kevin W. Bowyer, Donald Gotterbarn, Keith W. Miller:
Open source software: intellectual challenges to the status quo. SIGCSE 2002: 317-318 - 2000
- [j4]Marty J. Wolf, Simon Easteal, Margaret Kahn, Brendan D. McKay, Lars S. Jermiin:
TrExML: a maximum-likelihood approach for extensive tree-space exploration. Bioinform. 16(4): 383-394 (2000)
1990 – 1999
- 1999
- [j3]Marty J. Wolf, David J. Haglin:
An Optimal Algorithm for Finding All Convex Subsets in Tournaments. Ars Comb. 52 (1999) - 1998
- [c1]Don Goelman, Roberta Evans Sabin, Marty J. Wolf, Peter J. Knoke, Mike Murphy:
The terminal Master's degree (panel): does it need to be cured? SIGCSE 1998: 355-356 - 1996
- [j2]David J. Haglin, Marty J. Wolf:
On Convex Subsets in Tournaments. SIAM J. Discret. Math. 9(1): 63-70 (1996) - 1994
- [j1]Marty J. Wolf:
Nondeterministic Circuits, Space Complexity and Quasigroups. Theor. Comput. Sci. 125(2): 295-313 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint