Impediments with Policy Interventions to Foster Cybersecurity
Security and Privacy
Computational Social Science ≠ Computer Science + Social Data
Technical Perspective: On Heartbleed: A Hard Beginnyng Makth a Good Endyng
Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed
Achieving Gender Equity: ACM-W Can't Do It Alone
A Comprehensive Self-Driving Car Test
Protecting the Power Grid, and Finding Bias in Student Evaluations
Quantum Technology Forgoes Unconditional Security to Extend its Reach
The War Over the Value of Personal Data
Risks of Trusting the Physics of Sensors
Titus: Introducing Containers to the Netflix Cloud
Research For Practice: Private Online Communication; Highlights in Systems Verification
The Next Phase in the Digital Revolution: Intelligent Tools, Platforms, Growth, Employment
A Large-Scale Comparative Study of Beta Testers and Regular Users
Elements of the Theory of Dynamic Networks
Who can say no to the hive mind's promise of cybernetic immortality, for free?
Why Is It Difficult For the Fbi to Break Into Smartphones?
“when Performance Is Pursued Above All”
The Big Idea and the PD Pipeline
Halide: Decoupling Algorithms from Schedules For High-Performance Image Processing
Technical Perspective: Can High Performance Be Portable?
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More