Research For Practice: Web Security and Mobile Web Computing
Security and Privacy
How We Teach CS2All, and What to Do About Database Decay
Cell-Graphs: Image-Driven Modeling of Structure-Function Relationship
Information and Misinformation on the Internet
Exploring Post-Quantum Cryptography
Swearing Dolls, Other Iot Intrusions Threaten Children’s Well-Being, Privacy, Data
The Real Lesson of the Alleged Russian Hack
Creating Connection with Autonomous Facial Animation
Interactive Visualization of 3D Scanned Mummies at Public Venues
Anticipating Policy and Social Implications of Named Data Networking
The ACM Code of Ethics: A Call to Action
Making a Positive Impact: Updating the ACM Code of Ethics
Technical Perspective: The Chemistry of Software-Defined Batteries
Can We Trust Autonomous Weapons?
Containers Push Toward the Mayfly Server
(Mis)Managing Parallel Computing Research Through EU Project Funding
Introducing CS to Newcomers, and JES As a Teaching Tool
Pushing on String: The 'Don't Care' Region of Password Strength
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More