Educational Interventions and Female Enrollment in IT Degrees
Security and Privacy
The Decline of Computers as a General Purpose Technology
Cyber Reconnaissance Techniques
Technical Perspective: Localizing Insects Outdoors
3D Localization for Subcentimeter-Sized Devices
Is MFA Needed to Improve Security?
The Scramble for Post-Quantum Cryptography
Auditing AI and Autonomous Systems; Building an Infrastructure of Trust
Driving the Cloud to True Zero Carbon
Technical Perspective: Solving the Signal Reconstruction Problem at Scale
The State of Virtual Reality Hardware
Technological Responses to COVID-19
CAPE: A Framework for Assessing Equity throughout the Computer Science Education Ecosystem
Differential Privacy: The Pursuit of Protections by Default
Keeping Science on Keel When Software Moves
DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications
Scalable Signal Reconstruction for a Broad Range of Applications
Bringing Stability to Wireless Connections
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More