Sign In

Communications of the ACM

Video Highlights


AI Dangers: Imagined and Real

Arguing against the arguments for the concept of the singularity.

Authentication Using Pulse-Response Biometrics

We propose a new biometric based on the human body's response to an electric square pulse signal, called pulse-re...

Celebrating 50 Years of the Turing Award

To celebrate the first 50 years of the A.M. Turing Award, ACM is sponsoring a yearlong series of programs, as highlig...

Model Learning

Model learning emerges as an effective method for black-box state machine models of hardware and software components.

Pure Randomness Extracted from Two Poor Sources

Developments from several disparate areas of computer science provide "a huge jump, both technically and also qu...

Cell-Graphs: Image-Driven Modeling of Structure-Function Relationship

Cell-graph construction methods are best served when physics-driven and data-driven paradigms are joined.

Creating Connection with Autonomous Facial Animation

Biologically based computational modeling promises virtual characters capable of face-to-face human interaction.

Software-Defined Batteries

In this paper, we present a new hardware-software system, called Software Defined Battery, which allows system design...

Extracting 3D Objects from Photographs Using 3-Sweep

We introduce an interactive technique to extract and manipulate simple 3D shapes in a single photograph.

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo