Communications of the ACM

Papers
(The median citation count of Communications of the ACM is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Empowering Virtual Agents With Intelligent Systems188
Persistence programming154
Artificial Intelligence for Materials Discovery144
Taking Apart to Build Back Up134
Leaving X133
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough85
3D Modeling Draws on AI82
Partnership on AI, data, and robotics81
How do I rely on thee, smartphone?77
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History69
Unleashing the Power of Deep Learning61
In Memoriam60
Improving Section 230, Preserving Democracy, and Protecting Free Speech54
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility50
Virtual and the Future of Conferences49
Tackling Challenges in Implementing Large-Scale Graph Databases49
Designing an Ethical Tech Developer48
Not Every AI Problem Is a Data Problem43
On the Implicit Bias in Deep-Learning Algorithms43
Show It or Tell It? Text, Visualization, and Their Combination39
A Perspectival Mirror of the Elephant38
Connecting the Unconnected36
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences36
Revamping Python for an AI World33
On Expert Testimony32
Brain implants get real31
Where Is My Data?31
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities31
Quantum Speedup for the Fast Fourier Transform?30
Worst-case topological entropy and minimal data rate for state estimation of switched linear systems30
Trends in computer science research within European countries30
Rebutting Rebuttals28
Deleting X: Why SIGDOC Left the Platform28
After the Complaint27
Neural Networks for Drug Discovery and Design26
The Dilemma of Scale26
Subfield prestige and gender inequality among U.S. computing faculty26
What Should We Do when Our Ideas of Fairness Conflict?26
Simulating Extinct Species25
Talking about Large Language Models24
An AI Learning Hierarchy24
‘Upon This Quote I Will Build My Church Thesis’23
What is Data Science?22
The blood price of unrestricted privacy22
Shedding Labels, Sidestepping Limitations, and Self-Fulfillment22
22
Model Counting Meets Distinct Elements21
Dynamic Placement in Refugee Resettlement21
Computing's grand challenge for sustainability20
Contracting for Artificial Intelligence20
Quis custodiet ipsos custodes?20
Surveillance too cheap to meter19
Technical perspective: How do experts learn new programming languages?19
Preserving the past with immersive technologies19
The AI Ethicist's Dirty Hands Problem18
Tales of Topological Qubits18
Multisensory Experiences: Formation, Realization, and Responsibilities18
Achievement in Microarchitecture18
Preprinting in AI Ethics: Toward a Set of Community Guidelines17
Women in Computer Science Are Making Strides16
On-skin computing16
Sustainable Quantum Computing16
Building and Nurturing AI Development in Vietnam16
A Quantum Leap in Factoring16
Trust, regulation, and human-in-the-loop AI16
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions16
The EU AI Act and the Wager on Trustworthy AI16
On 6G and trustworthiness16
Understanding Mobile App Reviews to Guide Misuse Audits15
Let us not put all our eggs in one basket15
Elevating Security with Arm CCA15
Involvement and detachment15
Technical perspective: Applying design-space exploration to quantum architectures15
Keeping the Dream Alive: The Power and Promise of Federally Funded Research15
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models15
All Sliders to the Right15
You Don’t Know Jack about Bandwidth14
Repeat, Reproduce, Replicate14
Algorithmic hiring needs a human face14
Building Safer and Interoperable AI systems14
Designing an Efficient Tree Index on Disaggregated Memory14
Cookie monster14
Deterministic Record-and-Replay14
Technical Perspective: Pandemics, Remote Work, and Accessibility14
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems13
Intelligent futures in task assistance13
Trading Bits for Atoms: How Digital Products Are Reshaping the Global Economy13
The Silent (R)evolution of SAT13
Web 3.0 Requires Data Integrity13
A tale of three datasets13
Challenges, experiments, and computational solutions in peer review13
To Post or Not to Post: AI Ethics in theAge of Big Tech13
DevEX: What Actually Drives Productivity?13
When satisfiability solving meets symbolic computation13
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil12
The Importance of Distrust in Trusting Digital Worker Chatbots12
A data-driven exploration of the race between human labor and machines in the 21 st century12
Raising the Dead with AI12
Mapping the Privacy Landscape for Central Bank Digital Currencies12
JIZAI Body: Human-Machine Integration Based on Asian Thought12
Learning new things and avoiding obstacles12
How Many Ways Can You Teach a Robot?12
Public Business and Private Accounts12
Ethical AI is Not about AI12
The Boundary Hunters12
A Symbolic Approach to Verifying Quantum Systems12
From Eye Tracking to AI-Powered Learning11
Robotic process automation platform UiPath11
Trustworthy AI Using Confidential Federated Learning11
Toward Basing Cryptography on the Hardness of EXP11
Comparing Chatbots Trained in Different Languages11
Automatically Translating C to Rust11
Fit for People, Fit for Purpose: Designing Tech that Matters11
The Infrapolitics of Algorithmic Resistance11
U.S. Copyright Office's Questions about Generative AI11
Activities of National Institute of Informatics in Japan11
Technical perspective: Visualization search11
AI Authorship Revisited10
Generative AI Requires Broad Labor Policy Considerations10
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India10
A Philosopher's Daughter Navigates a Career in AI10
The Carbon Footprint of Artificial Intelligence10
Language models10
When should a black box be transparent?10
Computational thinking in the era of data science10
AI and data science centers in top Indian academic institutions10
Stablecoins: Why They Are Both Useful and Problematic10
South Korea's Nationwide Effort for AI Semiconductor Industry10
The Luce Goose10
Exclusivity probes9
Deconstructing the Take It Down Act9
Technical perspective: Leveraging social context for fake news detection9
Software Drift9
Can AI Keep Accessible Communication in the Picture?9
Privacy in the Age of AI9
Machine Learning in Computer Security is Difficult to Fix9
Transactions and Serverless are Made for Each Other9
The Gamification of Academia9
Agent provocateur9
Data science meets law9
Achieving CS for all could take decades9
Computational Linguistics Finds its Voice9
Improving Memory Management, Performance with Rust9
Mirror, Mirror on the Wall, What is the Best Topology of Them All?9
A formal approach to identifying the impact of noise on neural networks8
When software engineering meets quantum computing8
Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle8
AI Rewrites the Rules of Phishing, Cybercrime8
Federal Funding Supports The Flow of Innovation8
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory8
The Collapse of GPT8
Dilemma of the Artificial Intelligence Regulatory Landscape8
Welcome: Sustainability and Computing Special Section8
Homo Ratiocinator (Reckoning Human)8
Expressive querying for accelerating visual analytics8
Responsible data management8
Balancing Secrecy and Transparency in Bug Bounty Programs8
Investigating Research Software Engineering: Toward RSE Research8
Computer Science under Trump8
Post-Quantum Cryptography7
Jump Snatch7
The First Computer Program7
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting7
Lithography Lights a New Path7
The Case for Compact AI7
How Flexible Is CXL's Memory Protection?7
ACM Profits Considered Harmful7
Technical perspective: Can data structures treat us fairly?7
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet7
The Fine Line Between Persuasion and Coercion7
‘What I Think about When I Type about Talking’: Reflections on Text-Entry Acceleration Interfaces7
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits7
SI and Binary Prefixes: Clearing the Confusion6
How Generative AI Fits into Knowledge Work6
Hidden malware ratchets up cybersecurity risks6
Pitfalls in Machine Learning for Computer Security6
Advancements in Weather Prediction6
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite6
Can AI learn to forget?6
Proving Data-Poisoning Robustness in Decision Trees6
Techno-Optimism, Techno-Pessimism, and Techno-Realism6
Informatics Higher Education in Europe: A Data Portal and Case Study6
The Vulnerability-Adaptive Protection Paradigm6
Always improving performance6
Biomedical Digital Twins6
Building a new economy6
Lost in Afghanistan: Can the World Take ICT4D Seriously?6
What Came First, Math or Computing?6
More Than Just Algorithms6
Confusing the Map for the Territory6
Internet of production6
Shining a Light on the Dark Web6
Resolution of the burrows-wheeler transform conjecture6
The dawn of crowdfarms6
Cylinder Lottery5
ACM at 755
The Security Jawbreaker5
Formalizing fairness5
Welcome back!5
Taking Flight with Copilot5
Conjoined Twins: Artificial Intelligence and the Invention of Computer Science5
Is TinyML Sustainable?5
Toward Effective AI Support for Developers5
It Is Time to Let Go of 'Virtual Reality'5
When Proofs Meet Programs: An Extension of Dependent Type Theory with Church’s Thesis5
Exploring Stereotypes and Biases in Language Technologies in Latin America5
In Pursuit of Professionalism5
On Program Synthesis and Large Language Models5
Modern tech can't shield your secret identity5
Preserving the internet5
Leveraging Professional Ethics for Responsible AI5
Artificial intelligence, machine learning, and the fight against world hunger5
As Good as a Coin Toss: Human Detection of AI-Generated Content5
AI Must Be Anti-Ableist and Accessible5
AI Should Challenge, Not Obey5
50 Years of Queries5
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond5
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets5
Thirsty Fabs5
Getting a Handle on Handles5
Data Analytics Anywhere and Everywhere5
Driving an innovation contest into crisis5
Envisioning Recommendations on an LLM-Based Agent Platform5
Nand to Tetris: Building a Modern Computer System from First Principles5
The Linear Fallacy5
Continuous Earth Observation of Forest Dynamics and Biodiversity5
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers5
There Was No 'First AI Winter'5
Why Is the Current XAI Not Meeting the Expectations?5
The Pollution of AI5
Vendor-Locked DevOps Strategies5
A Rewarding Line of Work5
Outsmarting Deepfake Video5
Computing Divided5
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies5
Revolutionizing Datacenter Networks via Reconfigurable Topologies4
How the AI Boom Went Bust4
Trust, Governance, and AI Decision Making4
Zero-Knowledge Proofs and Their Role within the Blockchain4
Personalized recommendation of PoIs to people with autism4
Accelerating AI4
Explorations in cyber-physical systems education4
Will AI Destroy the World Wide Web?4
Building a practical quantum computer4
Acting in Self-Defense4
Federated learning and privacy4
How Exploits Impact Computer Science Theory4
Prompting Considered Harmful4
10 Things Software Developers Should Learn about Learning4
Efficiency Is Not Enough: A Critical Perspective on Environmentally Sustainable AI4
0.084562063217163