Communications of the ACM

Papers
(The TQCC of Communications of the ACM is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Generative adversarial networks5371
NeRF1063
Understanding deep learning (still) requires rethinking generalization872
Datasheets for datasets449
Green AI403
Deep learning for AI292
Domain-specific hardware accelerators146
Some simple economics of the blockchain134
A decade of social bot detection132
A domain-specific supercomputer for training deep neural networks127
What serverless computing is and should become110
A review of the semantic web field108
Meltdown106
The (Im)possibility of fairness104
Non-fungible tokens and the future of art90
Knowledge graphs86
Trustworthy AI84
Spectre attacks83
Threats of a replication crisis in empirical computer science75
Secure multiparty computation73
Toward verified artificial intelligence66
Methods included65
Federated learning for privacy-preserving AI64
The future is big graphs63
The limits of differential privacy (and its misuse in data release and machine learning)59
It is time for more critical CS education55
MIP* = RE51
Medical artificial intelligence43
A year in lockdown42
The hardware lottery41
Advances in the quantum internet41
AI and accessibility38
CAPE38
Biases in AI systems37
The End of Programming37
On 6G and trustworthiness32
Coding at a crossroads32
Responsible AI32
WinoGrande31
Operationalizing AI ethics principles31
The dogged pursuit of bug-free C programs31
The graph isomorphism problem30
A panoramic survey of natural language processing in the Arab world29
On sampled metrics for item recommendation28
When permissioned blockchains deliver more decentralization than permissionless27
Digital agriculture for small-scale producers27
Crowdsensing 2.026
Safe systems programming in Rust25
There is no AI without data25
Measuring internet speed25
Gender trends in computer science authorship24
What does saying that 'programming is hard' really say, and about whom?23
Cyber reconnaissance techniques23
The decline of computers as a general purpose technology23
An internet of things service roadmap23
The state of virtual reality hardware23
From remote work to working from anywhere22
Why computing belongs within the social sciences22
The data science life cycle22
The harm in conflating aging with accessibility22
Language models21
Formalizing and guaranteeing human-robot interaction21
Recommender systems under European AI regulations21
Reason-checking fake news21
Contextual word representations20
When software engineering meets quantum computing19
MadMax19
AI on edge18
Challenges, experiments, and computational solutions in peer review18
Magellan18
DP-cryptography18
What to do about deepfakes18
Digital twins and artificial intelligence17
Automating data science17
Toward confidential cloud computing17
Trust, regulation, and human-in-the-loop AI17
Deploying decentralized, privacy-preserving proximity tracing17
WebRTC17
Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage16
Implications of the COVID-19 pandemic15
Federated learning and privacy15
Virtual collaboration in the age of the coronavirus15
The 'invisible' materiality of information technology15
The 2021 software developer shortage is coming15
Moore's Law15
Neural software analysis14
How reliable is smartphone-based electronic contact tracing for COVID-19?14
Constant overhead quantum fault tolerance with quantum expander codes14
Dark patterns14
Preserving integrity in online social networks14
Six reasons why virtual reality is a game-changing computing and communication platform for organizations14
Self-driving vehicle technology14
Polanyi's revenge and AI's new romance with tacit knowledge14
Keeping CALM13
Non-traditional data sources13
The Seattle report on database research13
Collusion rings threaten the integrity of computer science research13
The best of NLP13
Competitive compatibility12
Flexible work and personal digital infrastructures12
Street lamps as a platform12
What do agile, lean, and ITIL mean to DevOps?12
Toward justice in computer science through community, criticality, and citizenship12
A recent renaissance in privacy law12
Automata modulo theories12
Digital creativity support for original journalism12
Optimal auctions through deep learning12
Securing internet applications from routing attacks11
Blockchain in China11
How to transition incrementally to microservice architecture11
Does Facebook use sensitive data for advertising purposes?11
Responsible vulnerability disclosure in cryptocurrencies10
Excessive use of technology10
Artificial intelligence, machine learning, and the fight against world hunger10
The worsening state of ransomware10
Connecting Arabs10
The growing cost of deep learning for source code10
AI and Neurotechnology10
Data-centricity10
hXDP10
Insights for AI from the human mind10
Building a multilingual Wikipedia10
Technologies for the visually impaired10
Still waiting for self-driving cars10
Can AI Demonstrate Creativity?10
Fugaku takes the lead10
A technological and innovative approach to COVID-19 in Uruguay9
CoCoPIE9
A federated infrastructure for European data spaces9
Artificial intelligence for synthetic biology9
Enabling AI at the edge with XNOR-networks9
The dark triad and insider threats in cyber security9
Democratizing Domain-Specific Computing9
Studying programming in the neuroage9
Accelerator-level parallelism9
Taking Flight with Copilot9
Contextualized interpretable machine learning for medical diagnosis9
Keeping science on keel when software moves8
Fifty years of P vs. NP and the possibility of the impossible8
AI authorship?8
Data-driven algorithm design8
Transformers aftermath8
Computational thinking in the era of data science8
Scalable linear algebra on a relational database system8
Digital contact tracing may protect privacy, but it is unlikely to stop the pandemic8
Neuromorphic chips take shape8
Abstractions, their algorithms, and their compilers8
Real time spent on real time8
A vision to compute like nature8
The history, status, and future of FPGAs7
For impactful community engagement7
Rateless codes for near-perfect load balancing in distributed matrix-vector multiplication7
Declarative machine learning systems7
GDPR anti-patterns7
ArabHCI7
Technology adoption7
ACM, ethics, and corporate behavior7
Hiring from the autism spectrum7
Data science meets law7
Digital instruments as invention machines7
Privacy-preserving AI for future networks7
Cookie monster7
Ethical AI is Not about AI7
Applying the metaverse7
Eyelid gestures for people with motor impairments7
Explainable AI7
Responsible data management7
FANG7
A Tale of Two Markets: Investigating the Ransomware Payments Economy7
PL and HCI7
Differential privacy7
A battery-free internet of things6
Algorithms with predictions6
The Premature Obituary of Programming6
AI-CHD6
Data Science---A Systematic Treatment6
Can Generative AI Bots Be Trusted?6
The Principles of Data-Centric AI6
Resolution of the burrows-wheeler transform conjecture6
Toward systematic architectural design of near-term trapped ion quantum computers6
Supporting people with autism spectrum disorders in the exploration of PoIs6
The Latin American supercomputing ecosystem for science6
AI Rewrites Coding6
Energy informatics6
Toward a broad AI6
The pushback effects of race, ethnicity, gender, and age in code review6
'In situ' data rights6
Driving the cloud to true zero carbon6
Computational thinking for professionals5
CS unplugged or coding classes?5
Simba5
Neurosymbolic AI5
Dynamics of gender bias in computing5
Toward Practices for Human-Centered Machine Learning5
Battery day5
A Linearizability-based Hierarchy for Concurrent Specifications5
Text and data mining of in-copyright works5
Security analysis of SMS as a second factor of authentication5
U.S. states must broaden participation while expanding access to computer science education5
Human detection of machine-manipulated media5
Artificial intelligence across company borders5
Entrepreneurship ecosystem in Lebanon5
Detecting/preventing infections, and moving instruction online5
On the Implicit Bias in Deep-Learning Algorithms5
Low-Code Programming Models5
The role of professional certifications in computer occupations5
Legal Challenges to Generative AI, Part I5
Interpretable machine learning5
Are Software Updates Useless against Advanced Persistent Threats?5
A tale of three datasets5
From Code Complexity Metrics to Program Comprehension5
Producing competent HPC graduates5
Trustworthy scientific computing5
Cyber Efficiency and Cyber Resilience5
The evolution of mathematical software5
Hoping for the Best as AI Evolves5
Internet of production5
Fact-finding mission5
Fixing the internet5
Informing California privacy regulations with evidence from research5
Filtering for beauty5
The Lean Data Scientist5
Digital healthcare in Latin America5
Geometric deep learning advances data science5
Natural language misunderstanding4
ASIC clouds4
Building a new economy4
Our house is on fire4
The SolarWinds hack, and a grand challenge for CS education4
Futures of digital governance4
Why computing students should contribute to open source software projects4
Static analysis4
Holograms on the horizon?4
The identity in everyone's pocket4
Extracting the Essential Simplicity of the Internet4
Application frameworks4
Transitioning to distance learning and virtual conferencing4
Talking about race in CS education4
The transformation of patient-clinician relationships with AI-based medical advice4
Digging into big provenance (with SPADE)4
Understanding law and the rule of law4
eBP4
Cybersecurity research for the future4
Why universities must resist GPA-based enrollment caps in the face of surging enrollments4
What can the maker movement teach us about the digitization of creativity?4
Virtual duplicates4
SATURN4
Software development in disruptive times4
OMSCS4
The ethics of zero-day exploits---4
0.074038982391357