Technical Perspective: Safety First!
Research and Advances
Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System
Answer Set Programming at a Glance
Technical Perspective: Anonymity Is Not Privacy
Formal Analysis of MPI-Based Parallel Programs
Visual Crowd Surveillance Through a Hydrodynamics Lens
License Risks from Ad Hoc Reuse of Code from the Internet
Managing Is Adoption in Ambivalent Groups
‘Natural’ Search User Interfaces
The Rise and Fall of High Performance Fortran
Nanonetworks: A New Frontier in Communications
Technical Perspective: A Perfect ‘Match’
The Patchmatch Randomized Matching Algorithm For Image Manipulation
Making Information Flow Explicit in HiStar
Technical Perspective: Making Untrusted Code Useful
From Blitzkrieg to Bitskrieg: The Military Encounter with Computers
Don’t Turn Social Media Into Another ‘Literary Digest’ Poll
Technical Perspective: A Better Way to Learn Features
Technical Perspective: Power Efficiency as the #1 Design Constraint
Technical Perspective: Visual Reconstruction
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More