Sign In

Communications of the ACM

Video Highlights


Online Deception in Social Media

The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage.

The New Digital Medicine

Affordable, connected, personal medical devices are slowly changing the nature of health care.

The Power of Memory

In-memory databases promise speedier processing.

Moving Portraits.

Moving Portraits

An approach for generating face animations from large image collections of the same person. The approach is complet...

Reshaping Terrorist Networks from Steph Martinez .

Reshaping Terrorist Networks

To destabilize terrorist organizations, the <code>STONE</code> algorithms identify a set of operatives wh...

Efficient Maximum Flow Algorithms .

Efficient Maximum Flow Algorithms

Though maximum flow algorithms have a long history, revolutionary progress is still being made.

Surgical Robots Deliver Care More Precisely

Computer-controlled robotic surgical systems and tumor-targeting radiation systems provide a greater level of precisi...

Fostering Computational Literacy in Science Classrooms.

Fostering Computational Literacy in Science Classrooms

An agent-based approach to integrating computing in secondary-school science courses.

Robots Compete in Disaster Scenarios

The DARPA Robotics Challenge pitted teams from around the world against each other in a series of disaster-themed tasks.