Sign In

Communications of the ACM

Video Highlights

Being Recognized Everywhere

How facial and voice recognition are reshaping society.

Technologizing Agriculture

An array of technologies are making farms more efficient, safer, and profitable.

A New Golden Age for Computer Architecture

Innovations like domain-specific hardware, enhanced security, open instruction sets, and agile chip development will ...

Who Owns 3D Scans of Historic Sites?

Three-dimensional scanning can be used to protect or rebuild historic structures, but who owns that digital data?

Quantum Leap

A new proof supports a 25-year-old claim of the unique power of quantum computing.

Hidden Messages Fool AI

Forced errors focus attention on neural network quirks.

CACM Video: Modeling in Engineering and Science Modeling in Engineering and Science

Understanding behavior by building models.

Intelligent Systems for Geosciences: An Essential Research Agenda

A research agenda for intelligent systems that will result in fundamental new capabilities for understanding the Eart...

Deception, Identity, and Security: The Game Theory of Sybil Attacks

Classical mathematical game theory helps to evolve the emerging logic of identity in the cyber world.