Lessons from the Tech Transfer Trenches
Security and Privacy
The Land Sharks Are on the Squawk Box
Technical Perspective: Catching Lies (and Mistakes) in Offloaded Computation
Technical Perspective: Program Synthesis Using Stochastic Techniques
Stochastic Program Optimization
Pinocchio: Nearly Practical Verifiable Computation
Drumming Up Support For AP CS Principles
Toward a Discourse on Cyber Strategy
Where Code Comes From: Architectures of Automatic Control from Babbage to Algol
The Building Blocks of a Cloud Strategy: Evidence from Three SaaS Providers
Unbalanced Data Leads to Obsolete Economic Advice
Controlling Cyber Arms, and Creating New Legos
Bare-Metal Performance For Virtual Machines with Exitless Interrupts
Technical Perspective: High-Performance Virtualization: Are We Done?
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More