On the Requirements Engineer Role
Theory
Shaping the Foundations of Programming Languages
The Risks of Election Believability (or Lack Thereof)
Collusion Rings Threaten the Integrity of Computer Science Research
Trustworthy Scientific Computing
Technical Perspective: Robust Statistics Tackle New Problems
The 10 Best Practices for Remote Software Engineering
Isomorphism, Canonization, and Definability for Graphs of Bounded Rank Width
Technical Perspective: A Logical Step Toward the Graph Isomorphism Problem
Deep Learning Speeds MRI Scans
The Worsening State of Ransomware
The Non-Psychopath’s Guide to Managing an Open Source Project
Building a Multilingual Wikipedia
Safe Systems Programming in Rust
Transformers Aftermath: Current Research and Rising Trends
Higher Education Readies for a Quantum Leap
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More