Communications of the ACM

Papers
(The median citation count of Communications of the ACM is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Addressing algorithmic discrimination3832
Trouble at the source804
The role of professional certifications in computer occupations149
Designing an Ethical Tech Developer133
Persistence programming127
Artificial Intelligence for Materials Discovery119
How do I rely on thee, smartphone?117
In Memoriam109
Improving Section 230, Preserving Democracy, and Protecting Free Speech87
Technical perspective: Eyelid gestures enhance mobile interaction83
Partnership on AI, data, and robotics78
Algorithmic poverty77
Unleashing the Power of Deep Learning69
3D Modeling Draws on AI61
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility61
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough61
Taking Apart to Build Back Up59
Tackling Challenges in Implementing Large-Scale Graph Databases55
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History52
Leaving X49
Show It or Tell It? Text, Visualization, and Their Combination49
On the Implicit Bias in Deep-Learning Algorithms44
Empowering Virtual Agents With Intelligent Systems44
Virtual and the Future of Conferences43
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities40
Brain implants get real38
On Expert Testimony38
Revamping Python for an AI World38
What Should We Do when Our Ideas of Fairness Conflict?34
Trends in computer science research within European countries32
Worst-case topological entropy and minimal data rate for state estimation of switched linear systems29
Patent absurdity27
After the Complaint26
Quantum Speedup for the Fast Fourier Transform?26
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences25
The Dilemma of Scale25
Connecting the Unconnected25
Neural Networks for Drug Discovery and Design25
A Perspectival Mirror of the Elephant24
Deleting X: Why SIGDOC Left the Platform23
Subfield prestige and gender inequality among U.S. computing faculty23
Rebutting Rebuttals23
Talking about Large Language Models22
An AI Learning Hierarchy22
21
Liquid testing with your smartphone21
Inferring and improving street maps with data-driven automation21
Static analysis20
Model Counting Meets Distinct Elements20
The future of text redux20
Quis custodiet ipsos custodes?20
Building and Nurturing AI Development in Vietnam19
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions19
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models19
Lamboozling Attackers18
A Quantum Leap in Factoring18
Technical perspective: How do experts learn new programming languages?18
Elevating Security with Arm CCA18
Computing's grand challenge for sustainability17
Communicating ACM priorities17
What is the cost of living online?17
On-skin computing16
Surveillance too cheap to meter16
Contracting for Artificial Intelligence16
Understanding Mobile App Reviews to Guide Misuse Audits15
Preserving the past with immersive technologies15
‘Upon This Quote I Will Build My Church Thesis’15
The blood price of unrestricted privacy15
The EU AI Act and the Wager on Trustworthy AI15
What is Data Science?15
Is higher education an engine of opportunity, or a perpetuator of privilege?15
On 6G and trustworthiness14
The AI Ethicist's Dirty Hands Problem14
Trust, regulation, and human-in-the-loop AI14
Tales of Topological Qubits14
Dynamic Placement in Refugee Resettlement14
Achievement in Microarchitecture14
Preprinting in AI Ethics: Toward a Set of Community Guidelines14
Women in Computer Science Are Making Strides14
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil13
The Silent (R)evolution of SAT13
Technical Perspective: Pandemics, Remote Work, and Accessibility13
To Post or Not to Post: AI Ethics in theAge of Big Tech13
Mapping the Privacy Landscape for Central Bank Digital Currencies13
Building Safer and Interoperable AI systems13
Multisensory Experiences: Formation, Realization, and Responsibilities13
Deterministic Record-and-Replay13
Involvement and detachment13
Intelligent futures in task assistance12
Technical perspective: Applying design-space exploration to quantum architectures12
Let us not put all our eggs in one basket12
Algorithmic hiring needs a human face12
All Sliders to the Right12
Text and data mining of in-copyright works12
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems11
You Don’t Know Jack about Bandwidth11
When satisfiability solving meets symbolic computation11
A tale of three datasets11
The practice of applying AI to benefit visually impaired people in China11
U.S. Copyright Office's Questions about Generative AI11
Designing an Efficient Tree Index on Disaggregated Memory11
Web 3.0 Requires Data Integrity11
DevEX: What Actually Drives Productivity?11
Ethical AI is Not about AI11
From Eye Tracking to AI-Powered Learning11
Cookie monster11
Repeat, Reproduce, Replicate11
Challenges, experiments, and computational solutions in peer review11
The Importance of Distrust in Trusting Digital Worker Chatbots11
AI Authorship Revisited11
Comparing Chatbots Trained in Different Languages11
A data-driven exploration of the race between human labor and machines in the 21 st century10
Technical perspective: Visualization search10
South Korea's Nationwide Effort for AI Semiconductor Industry10
Activities of National Institute of Informatics in Japan10
Fit for People, Fit for Purpose: Designing Tech that Matters10
Generative AI Requires Broad Labor Policy Considerations10
Trustworthy AI Using Confidential Federated Learning10
Raising the Dead with AI10
The Boundary Hunters10
The Carbon Footprint of Artificial Intelligence9
AI and data science centers in top Indian academic institutions9
Filtering for beauty9
How Many Ways Can You Teach a Robot?9
Public Business and Private Accounts9
A Symbolic Approach to Verifying Quantum Systems9
Software-defined cooking using a microwave oven9
Computational thinking in the era of data science9
Learning new things and avoiding obstacles9
Language models9
Toward Basing Cryptography on the Hardness of EXP9
Robotic process automation platform UiPath9
JIZAI Body: Human-Machine Integration Based on Asian Thought9
The Infrapolitics of Algorithmic Resistance9
When should a black box be transparent?8
Mirror, Mirror on the Wall, What is the Best Topology of Them All?8
Homo Ratiocinator (Reckoning Human)8
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory8
A formal approach to identifying the impact of noise on neural networks8
The Gamification of Academia8
Exclusivity probes8
Improving Memory Management, Performance with Rust8
Transactions and Serverless are Made for Each Other8
Computer Science under Trump8
Agent provocateur8
AI futures8
Software Drift8
The Luce Goose8
Can AI Keep Accessible Communication in the Picture?8
Balancing Secrecy and Transparency in Bug Bounty Programs8
Welcome: Sustainability and Computing Special Section8
A Philosopher's Daughter Navigates a Career in AI8
Expressive querying for accelerating visual analytics8
Computational Linguistics Finds its Voice8
The First Computer Program8
Dilemma of the Artificial Intelligence Regulatory Landscape7
Technical perspective: Leveraging social context for fake news detection7
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India7
Investigating Research Software Engineering: Toward RSE Research7
Can AI learn to forget?7
Pitfalls in Machine Learning for Computer Security7
Machine Learning in Computer Security is Difficult to Fix7
The Collapse of GPT7
Responsible data management7
Privacy in the Age of AI7
The growing cost of deep learning for source code7
The Fine Line Between Persuasion and Coercion7
Achieving CS for all could take decades7
Data science meets law7
AI-CHD7
New life for cordless communication, old regrets for software projects7
Deconstructing the Take It Down Act7
When software engineering meets quantum computing7
Building a new economy7
Hidden malware ratchets up cybersecurity risks6
Lithography Lights a New Path6
‘What I Think about When I Type about Talking’: Reflections on Text-Entry Acceleration Interfaces6
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits6
Lost in Afghanistan: Can the World Take ICT4D Seriously?6
The dawn of crowdfarms6
Resolution of the burrows-wheeler transform conjecture6
ACM Profits Considered Harmful6
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting6
Internet of production6
Shining a Light on the Dark Web6
Always improving performance6
Biomedical Digital Twins6
Technical perspective: Can data structures treat us fairly?6
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite6
What Came First, Math or Computing?6
SI and Binary Prefixes: Clearing the Confusion6
The Vulnerability-Adaptive Protection Paradigm6
50 Years of Queries5
Envisioning Recommendations on an LLM-Based Agent Platform5
AI Must Be Anti-Ableist and Accessible5
Modern tech can't shield your secret identity5
How Flexible Is CXL's Memory Protection?5
Driving an innovation contest into crisis5
Informatics Higher Education in Europe: A Data Portal and Case Study5
How Generative AI Fits into Knowledge Work5
Post-Quantum Cryptography5
More Than Just Algorithms5
Computing Divided5
In Pursuit of Professionalism5
Welcome back!5
Toward Effective AI Support for Developers5
Welcome back!5
The paradox of choice in computing-research conferences5
On Program Synthesis and Large Language Models5
Trustworthy AI5
Shaping ethical computing cultures5
Advancements in Weather Prediction5
ACM at 755
Getting a Handle on Handles5
Cylinder Lottery5
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies5
Conjoined Twins: Artificial Intelligence and the Invention of Computer Science5
Artificial intelligence, machine learning, and the fight against world hunger5
It Is Time to Let Go of 'Virtual Reality'5
Preserving the internet5
Neural software analysis5
The Case for Compact AI5
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet5
Proving Data-Poisoning Robustness in Decision Trees5
Jump Snatch5
Formalizing fairness5
Prompting Considered Harmful4
Finding an alternate way forward with AI4
Accelerating AI4
Connectivity Is Everything4
Technical Perspective: Opening the Door to SSD Algorithmics4
Revolutionizing Datacenter Networks via Reconfigurable Topologies4
Humble AI4
Age Verification Systems Will Be a Personal Identifiable Information Nightmare4
Distributed Latency Profiling through Critical Path Tracing4
Building a practical quantum computer4
ACM publications finances for 20204
The making of an IT strategy consultant4
Using Psychology to Bolster Cybersecurity4
Human detection of machine-manipulated media4
Software development in disruptive times4
Poisoning Data to Protect It4
Remember4
Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning4
Personalized recommendation of PoIs to people with autism4
Bursting a few balloons regarding the famous DARPA red balloon challenge4
Neural Architecture Search as Program Transformation Exploration4
How the AI Boom Went Bust4
Ethics and Cultural Background as Key Factors for an Attractive Metaverse4
A Camera the Size of a Grain of Salt Could Change Imaging as We Know It4
0.19189620018005