Technical Opinion: What Drives the Adoption of Antiphishing Measures By Hong Kong Banks?
Research and Advances
Steps Toward Self-Aware Networks
The Metropolis Model: A New Logic For Development of Crowdsourced Systems
Probabilistic Databases: Diamonds in the Dirt
Technical Perspective: The Ultimate Pilot Program
Apprenticeship Learning For Helicopter Control
Technical Perspective: A Compiler’s Story
Formal Verification of a Realistic Compiler
Security Challenges of the EPCglobal Network
Churchman’s Inquirers as Design Templates For Knowledge Management Systems
A Relevancy-Based Services View For Driving Adoption of Wireless Web Services in the U.S.
The Impact of Subversive Stakeholders on Software Projects
Improving the Cyber Security of SCADA Communication Networks
Adoption Leadership and Early Planners: Comcast’s IP Upgrade Strategy
Software Project Scope Alignment: An Outcome-Based Approach
Technical Opinion: The Ethics of IT Professionals in China
The Claremont Report on Database Research
One Laptop Per Child: Vision vs. Reality
How Computer Science Serves the Developing World
Technical Perspective: Reframing Security For the Web
Securing Frame Communication in Browsers
Technical Perspective: Software and Hardware Support For Deterministic Replay of Parallel Programs
Two Hardware-Based Approaches For Deterministic Multiprocessor Replay
Hyperlinking the Work For Self-Management of Flexible Workflows
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More