Communications of the ACM

Papers
(The median citation count of Communications of the ACM is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Empowering Virtual Agents With Intelligent Systems4406
Trouble at the source886
Technical perspective: Eyelid gestures enhance mobile interaction171
Persistence programming138
Artificial Intelligence for Materials Discovery137
Taking Apart to Build Back Up129
Leaving X123
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough84
3D Modeling Draws on AI79
Partnership on AI, data, and robotics78
How do I rely on thee, smartphone?74
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History68
Unleashing the Power of Deep Learning64
In Memoriam62
Improving Section 230, Preserving Democracy, and Protecting Free Speech56
Addressing algorithmic discrimination52
Virtual and the Future of Conferences51
Show It or Tell It? Text, Visualization, and Their Combination46
Designing an Ethical Tech Developer45
Not Every AI Problem Is a Data Problem44
On the Implicit Bias in Deep-Learning Algorithms42
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility41
Tackling Challenges in Implementing Large-Scale Graph Databases40
A Perspectival Mirror of the Elephant39
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences33
Connecting the Unconnected31
On Expert Testimony30
Revamping Python for an AI World30
Brain implants get real29
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities29
Worst-case topological entropy and minimal data rate for state estimation of switched linear systems28
Quantum Speedup for the Fast Fourier Transform?27
Patent absurdity27
Trends in computer science research within European countries26
Deleting X: Why SIGDOC Left the Platform26
After the Complaint25
Rebutting Rebuttals25
Neural Networks for Drug Discovery and Design24
The Dilemma of Scale24
Where Is My Data?23
‘Upon This Quote I Will Build My Church Thesis’22
Subfield prestige and gender inequality among U.S. computing faculty22
Talking about Large Language Models22
What Should We Do when Our Ideas of Fairness Conflict?22
An AI Learning Hierarchy22
21
Keeping the Dream Alive: The Power and Promise of Federally Funded Research21
Is higher education an engine of opportunity, or a perpetuator of privilege?21
Quis custodiet ipsos custodes?19
On-skin computing19
Contracting for Artificial Intelligence19
Preserving the past with immersive technologies19
Model Counting Meets Distinct Elements19
Static analysis19
Computing's grand challenge for sustainability19
Communicating ACM priorities17
Technical perspective: How do experts learn new programming languages?17
What is the cost of living online?17
Surveillance too cheap to meter17
What is Data Science?17
Lamboozling Attackers17
Multisensory Experiences: Formation, Realization, and Responsibilities16
Preprinting in AI Ethics: Toward a Set of Community Guidelines16
Achievement in Microarchitecture16
Tales of Topological Qubits16
The AI Ethicist's Dirty Hands Problem16
Women in Computer Science Are Making Strides16
A Quantum Leap in Factoring15
The blood price of unrestricted privacy15
Building and Nurturing AI Development in Vietnam15
Elevating Security with Arm CCA15
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions15
The EU AI Act and the Wager on Trustworthy AI15
On 6G and trustworthiness14
Dynamic Placement in Refugee Resettlement14
Technical perspective: Applying design-space exploration to quantum architectures14
Involvement and detachment14
Understanding Mobile App Reviews to Guide Misuse Audits14
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models14
Let us not put all our eggs in one basket14
Algorithmic hiring needs a human face14
Trust, regulation, and human-in-the-loop AI14
Shedding Labels, Sidestepping Limitations, and Self-Fulfillment14
All Sliders to the Right14
Technical Perspective: Pandemics, Remote Work, and Accessibility14
Deterministic Record-and-Replay13
To Post or Not to Post: AI Ethics in theAge of Big Tech13
Designing an Efficient Tree Index on Disaggregated Memory13
You Don’t Know Jack about Bandwidth13
Building Safer and Interoperable AI systems13
Repeat, Reproduce, Replicate13
Cookie monster13
Web 3.0 Requires Data Integrity12
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems12
Intelligent futures in task assistance12
The Importance of Distrust in Trusting Digital Worker Chatbots12
Trading Bits for Atoms: How Digital Products Are Reshaping the Global Economy12
When satisfiability solving meets symbolic computation12
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil12
Mapping the Privacy Landscape for Central Bank Digital Currencies12
The Silent (R)evolution of SAT12
Ethical AI is Not about AI12
DevEX: What Actually Drives Productivity?12
A tale of three datasets12
Challenges, experiments, and computational solutions in peer review12
How Many Ways Can You Teach a Robot?11
AI and data science centers in top Indian academic institutions11
Robotic process automation platform UiPath11
Public Business and Private Accounts11
The Carbon Footprint of Artificial Intelligence11
A Symbolic Approach to Verifying Quantum Systems11
Learning new things and avoiding obstacles11
JIZAI Body: Human-Machine Integration Based on Asian Thought11
A data-driven exploration of the race between human labor and machines in the 21 st century11
Software-defined cooking using a microwave oven11
The Boundary Hunters10
Fit for People, Fit for Purpose: Designing Tech that Matters10
Toward Basing Cryptography on the Hardness of EXP10
Computational thinking in the era of data science10
Activities of National Institute of Informatics in Japan10
Technical perspective: Visualization search10
The Infrapolitics of Algorithmic Resistance10
Trustworthy AI Using Confidential Federated Learning10
Raising the Dead with AI10
Language models10
AI Authorship Revisited9
From Eye Tracking to AI-Powered Learning9
Exclusivity probes9
Privacy in the Age of AI9
Generative AI Requires Broad Labor Policy Considerations9
The First Computer Program9
Comparing Chatbots Trained in Different Languages9
A Philosopher's Daughter Navigates a Career in AI9
AI-CHD9
Achieving CS for all could take decades9
South Korea's Nationwide Effort for AI Semiconductor Industry9
Automatically Translating C to Rust9
When should a black box be transparent?9
Technical perspective: Leveraging social context for fake news detection9
Responsible data management9
The Luce Goose9
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India9
U.S. Copyright Office's Questions about Generative AI9
Federal Funding Supports The Flow of Innovation8
Computational Linguistics Finds its Voice8
Transactions and Serverless are Made for Each Other8
The Gamification of Academia8
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory8
A formal approach to identifying the impact of noise on neural networks8
Deconstructing the Take It Down Act8
Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle8
Data science meets law8
Agent provocateur8
Mirror, Mirror on the Wall, What is the Best Topology of Them All?8
Expressive querying for accelerating visual analytics8
Improving Memory Management, Performance with Rust8
Machine Learning in Computer Security is Difficult to Fix8
Welcome: Sustainability and Computing Special Section8
Homo Ratiocinator (Reckoning Human)8
Software Drift8
Can AI Keep Accessible Communication in the Picture?8
Computer Science under Trump8
How Flexible Is CXL's Memory Protection?7
Lithography Lights a New Path7
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet7
Dilemma of the Artificial Intelligence Regulatory Landscape7
The growing cost of deep learning for source code7
The Case for Compact AI7
What Came First, Math or Computing?7
ACM Profits Considered Harmful7
Balancing Secrecy and Transparency in Bug Bounty Programs7
Can AI learn to forget?7
Post-Quantum Cryptography7
Jump Snatch7
The Fine Line Between Persuasion and Coercion7
‘What I Think about When I Type about Talking’: Reflections on Text-Entry Acceleration Interfaces7
Investigating Research Software Engineering: Toward RSE Research7
When software engineering meets quantum computing7
The Collapse of GPT7
Technical perspective: Can data structures treat us fairly?6
Always improving performance6
The Vulnerability-Adaptive Protection Paradigm6
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite6
Proving Data-Poisoning Robustness in Decision Trees6
Hidden malware ratchets up cybersecurity risks6
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits6
Shining a Light on the Dark Web6
SI and Binary Prefixes: Clearing the Confusion6
Advancements in Weather Prediction6
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting6
Internet of production6
More Than Just Algorithms6
Lost in Afghanistan: Can the World Take ICT4D Seriously?6
How Generative AI Fits into Knowledge Work6
Can AI Demonstrate Creativity?5
Neural software analysis5
A Rewarding Line of Work5
In Pursuit of Professionalism5
Leveraging Professional Ethics for Responsible AI5
Cylinder Lottery5
Continuous Earth Observation of Forest Dynamics and Biodiversity5
Driving an innovation contest into crisis5
Thirsty Fabs5
Resolution of the burrows-wheeler transform conjecture5
The Pollution of AI5
Confusing the Map for the Territory5
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets5
Data Analytics Anywhere and Everywhere5
On Program Synthesis and Large Language Models5
When Proofs Meet Programs: An Extension of Dependent Type Theory with Church’s Thesis5
ACM at 755
Artificial intelligence, machine learning, and the fight against world hunger5
Modern tech can't shield your secret identity5
Nand to Tetris: Building a Modern Computer System from First Principles5
The dawn of crowdfarms5
Pitfalls in Machine Learning for Computer Security5
The Security Jawbreaker5
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers5
Taking Flight with Copilot5
It Is Time to Let Go of 'Virtual Reality'5
Exploring Stereotypes and Biases in Language Technologies in Latin America5
Vendor-Locked DevOps Strategies5
The Linear Fallacy5
Outsmarting Deepfake Video5
Envisioning Recommendations on an LLM-Based Agent Platform5
Informatics Higher Education in Europe: A Data Portal and Case Study5
Biomedical Digital Twins5
Building a new economy5
Computing Divided5
Getting a Handle on Handles5
Accelerating AI4
Using Psychology to Bolster Cybersecurity4
Technical Perspective: Opening the Door to SSD Algorithmics4
Revolutionizing Datacenter Networks via Reconfigurable Topologies4
Zero-Knowledge Proofs and Their Role within the Blockchain4
Human-AI Cooperation to Tackle Misinformation and Polarization4
Ethics and Cultural Background as Key Factors for an Attractive Metaverse4
The making of an IT strategy consultant4
Finding an alternate way forward with AI4
Remember4
Acting in Self-Defense4
Personalized recommendation of PoIs to people with autism4
Explorations in cyber-physical systems education4
Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience4
ACM publications finances for 20204
Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning4
Neural Architecture Search as Program Transformation Exploration4
Prompting Considered Harmful4
The Problem with the Trolley Problem and the Need for Systems Thinking4
How the AI Boom Went Bust4
0.13947200775146