Security and Privacy
Identifying Patterns in Medical Records through Latent Semantic Analysis
Technical Perspective: Measuring Optimization Potential with Coz
Coz: Finding Code that Counts with Causal Profiling
More Than the Code: Learning Rules of Rejection in Writing Programs
Internet Freedom in West Africa: Technical Support for Journalists and Democracy Advocates
Data Acquisition in Vehicular Ad Hoc Networks
How We Lost the Women in Computing
Toward Sustainable Access: Where Are We Now?
Commenting on Code, Considering Data’s Bottleneck
Finding a Healthier Approach to Managing Medical Data
Shrinking Machines, Cellular Computers
Putting Trust in Security Engineering
Pressure Building for Rules of Engagement for Cyberwarfare
Fostering Inclusion, Keeping the Net Neutral
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More