Sign In

Communications of the ACM

Video Highlights


Rethinking Security for Internet Routing

Combine simple whitelisting technology, notably prefix filtering, in most BGP-speaking routers with weaker cryptograp...

A Brief Chronology of Medical Device Security

With the implantation of software-driven devices comes unique privacy and security threats to the human body.

Efficient Parallelization Using Rank Convergence in Dynamic Programming Algorithms

This paper proposes an efficient parallel algorithm for an important class of dynamic programming problems that inclu...

Why Data Citation Is a Computational Problem

Using database views to define citable units is the key to specifying and generating citations to data.

Imaging the Propagation of Light Through Scenes at Picosecond Resolution

We present a novel imaging technique, which we call femtophotography, to capture and visualize the propagation of lig...

Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network

We present our approach for overcoming the cost, operational complexity, and limited scale endemic to datacenter netw...

When Computers Are The Hackers

A Pittsburgh company's cyber reasoning system takes the $2-million grand prize in the DARPA Cyber Grand Challenge.

Smartphone Apps for Social Good

Mobile apps make it easier, faster, and cheaper to create massive impact on social causes ranging from world hunger t...

Open Source Software No Longer Optional

Open development and sharing of software gained widespread acceptance 15 years ago, and the practice is accelerating.

Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo