Toward Practices for Human-Centered Machine Learning
Co-Developing Programs and Their Proof of Correctness
It Takes Two to Tango: How Relational Investments Improve IT Outsourcing Partnerships
Two Approaches to an Information Security Laboratory
Deterring Internal Information Systems Misuse
The Compositional Architecture of the Internet
Intelligent Mobile Crisis Response Systems
Responsible Vulnerability Disclosure in Cryptocurrencies
Collaborative Virtual Design Environments: Introduction
Security Issues For Implementation of E-Medical Records
Component-Based Frameworks For E-Commerce
Toward an Equation that Anticipates AI Risks
Steps Toward Self-Aware Networks
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More