Sign In

Communications of the ACM

Video Highlights


An Interview with Yale Patt

ACM Fellow Professor Yale Patt reflects on his career in industry and academia.

The Key to Privacy

40 years ago, Whitfield Diffie and Martin E. Hellman introduced the public key cryptography used to secure today's on...

Parallel Graph Analytics

Data-centric abstractions and execution strategies are needed to exploit parallelism in large-scale graph analytics.

A Survey of Robotic Musicianship

Reviewing the technologies that enable robot musicians to jam.

On the Naturalness of Software

We begin with the conjecture that most software is natural, with all the attendant constraints and limitations &mdash...

Existing Technologies Can Assist the Disabled

Researchers consider how to adapt broadly available technology products for those battling physical impairments.

Search Engine Agendas

Is Google trying to trick you on the way to the polls?

A Fistful of Bitcoins: Characterizing Payments among Men with No Names

Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally ...

Secure Multiparty Computations on Bitcoin

In this work, we propose to use Bitcoin to design fully decentralized protocols that are secure even if no trusted th...

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo