Systems and Networking
These Are Not the Apes You Are Looking For
Deploying Decentralized, Privacy-Preserving Proximity Tracing
Deconstructing the Bakery to Build a Distributed State Machine
When SDN and Blockchain Shake Hands
Protecting Children’s Privacy Online
DevSecOps: Resolving Disagreements Between Developers and Security Teams
No-Code AI: Platforms and Tools
A History of One Brute-Force Attack
Extreme Security for Users Targeted by Cyberattack
On the Ethics of Writing With AIs
Sampling Near Neighbors in Search for Fairness
hXDP: Efficient Software Packet Processing on FPGA NICs
Technical Perspective: Can Data Structures Treat Us Fairly?
Technical Perspective: hXDP: Light and Efficient Packet Processing Offload
Advances in the Quantum Internet
The Seattle Report on Database Research
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More