Research and Advances
Promoting Personal Responsibility For Internet Safety
Requirements Engineering in New Product Development
Peer-Based Computer-Supported Knowledge Refinement: An Empirical Investigation
IT Diffusion in Developing Countries
The Myths and Truths of Wireless Security
Managing Large Collections of Data Mining Models
Are People Biased in Their Use of Search Engines?
Municipal Broadband Wireless Networks
MapReduce: Simplified Data Processing on Large Clusters
Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions
Technical Perspective: The Data Center is the Computer
Technical Perspective: Finding a Good Neighbor, Near and Fast
The Centrality and Prestige of CACM
Multidisciplinary Research on the Datapath of the Computing Disciplines
Trespass, Nuisance, and Spam: 11th Century Common Law Meets the Internet
Competing with IT: The Role of Shared IT-Business Understanding
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More