Searching in a dynamic memory with fast sequential access
Architecture and Hardware
On an improved algorithm for decentralized extrema finding in circular configurations of processors
Grapevine: an exercise in distributed computing
Performing remote operations efficiently on a local computer network
A technique for testing command and control software
The “worm” programs—early experience with a distributed computation
Authentication of signatures using public key encryption
The evolution of user behavior in a computerized conferencing system
Password authentication with insecure communication
Comparison of synonym handling and bucket organization methods
Timestamps in key distribution protocols
The cube-connected cycles: a versatile network for parallel computation
Strip trees: a hierarchical representation for curves
Using encryption for authentication in large networks of computers
Reverse path forwarding of broadcast packets
Performance evaluation of highly concurrent computers by deterministic simulation
Counting large numbers of events in small registers
Hybrid simulation models of computer systems
Time, clocks, and the ordering of events in a distributed system
Optimal shift strategy for a block-transfer CCD memory
List processing in real time on a serial computer
Secure communications over insecure channels
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More