Skip to content
  • Architecture and Hardware
  • Artificial Intelligence and Machine Learning
  • Computer History
  • Computing Applications
  • Computing Profession
  • Data and Information
  • Education
  • HCI
  • Philosophy of Computing
  • Security and Privacy
  • Society
  • Software Engineering and Programming Languages
  • Systems and Networking
  • Theory
July 2025 cover

Latest Issue

July 2025, Vol. 68 No. 7

Previous Issue

June 2025, Vol. 68 No. 6
Explore the archive
Search
  • Settings
  • Sign Out
Sign In
Join ACM

Topics

  • Architecture and Hardware
  • Artificial Intelligence and Machine Learning
  • Computer History
  • Computing Applications
  • Computing Profession
  • Data and Information
  • Education
  • HCI
  • Philosophy of Computing
  • Security and Privacy
  • Society
  • Software Engineering and Programming Languages
  • Systems and Networking
  • Theory

Sections

  • Research and Advances
  • Opinion
  • Practice
  • News
  • Research Highlights
  • Careers

Magazine

  • Latest Issue
  • Magazine Archive
  • Editorial Staff and Board
  • Submit an Article
  • Alerts & Feeds
  • Author Guidelines

CACM Web Account

Membership in ACM includes a subscription to Communications of the ACM (CACM), the computing industry's most trusted source for staying connected to the world of advanced computing.

Sign In Sign Up

Communications of the ACM

  • About Us
  • Frequently Asked Questions
  • Contact Us

Follow Us

  • CACM on Twitter
  • CACM on Reddit
  • CACM on LinkedIn

May 1958 - Vol. 1 No. 5

May 1958 issue cover image
  • Share
    • Twitter
    • Reddit
    • Hacker News
  • Join the Discussion
  • View in the ACM Digital Library

Features

Research and Advances May 1 1958

Note on empirical bounds for generating Bessel functions

James B. Randels and Roy F. Reeves
Research and Advances May 1 1958

A subroutine method for calculating logarithms

R. W. Bemer
Research and Advances May 1 1958

General purpose programming systems

Anatol W. Holt
Research and Advances May 1 1958

An improved decimal redundancy check

Roger L. Sisson
Research and Advances May 1 1958

Binary and truth-function operations on a decimal computer with an extract command

William H. Kautz
Research and Advances May 1 1958

Automatic implementation of computer logic

E. F. Morris and T. E. Wohr

Advertisement

Recent Issues

Explore the Issue Archive
  1. July 2025 cover
    July 2025 Vol. 68 No. 7
  2. June 2025 CACM cover
    June 2025 Vol. 68 No. 6
  3. May 2025 CACM cover
    May 2025 Vol. 68 No. 5
  4. April 2025 CACM cover
    April 2025 Vol. 68 No. 4
  • Publication Policies
  • Send us Feedback
  • Send a Letter to the Editor
  • Contact the Publisher
  • Contact the Editor-in-Chief

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More
  • Previous Issue
  • Next Issue
  • CACM on Twitter
  • CACM on Reddit
  • CACM on LinkedIn

Topics

  • Architecture and Hardware
  • Artificial Intelligence and Machine Learning
  • Computer History
  • Computing Applications
  • Computing Profession
  • Data and Information
  • Education
  • HCI
  • Philosophy of Computing
  • Security and Privacy
  • Society
  • Software Engineering and Programming Languages
  • Systems and Networking
  • Theory

Magazine

  • Latest Issue
  • Magazine Archive
  • Editorial Staff and Board
  • Submit an Article
  • Alerts & Feeds
  • Author Guidelines

Communications of the ACM

  • About Us
  • Frequently Asked Questions
  • Contact Us
  • For Advertisers
  • Join ACM

© 2025 Communications of the ACM. All Rights Reserved.

  • Cookie Notice
  • Privacy Policy