Communications of the ACM

Papers
(The TQCC of Communications of the ACM is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Algorithmic poverty3084
Partnership on AI, data, and robotics730
Trouble at the source446
Addressing algorithmic discrimination120
How do I rely on thee, smartphone?113
Tackling Challenges in Implementing Large-Scale Graph Databases111
Persistence programming110
Unleashing the Power of Deep Learning107
Artificial Intelligence for Materials Discovery106
Improving Section 230, Preserving Democracy, and Protecting Free Speech106
Technical perspective: Eyelid gestures enhance mobile interaction105
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History93
Designing an Ethical Tech Developer86
Always-on time-series database78
Technical perspective: Tracking pandemic-driven internet traffic77
Virtual and the Future of Conferences72
In Memoriam71
Taking Apart to Build Back Up68
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility64
Leaving X60
The role of professional certifications in computer occupations54
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough51
On the Implicit Bias in Deep-Learning Algorithms49
Show It or Tell It? Text, Visualization, and Their Combination49
3D Modeling Draws on AI47
Connecting the Unconnected47
Trends in computer science research within European countries46
Patent absurdity45
A Perspectival Mirror of the Elephant45
An AI Learning Hierarchy42
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences39
The Dilemma of Scale39
Obtain a Ph.D. and a career in data38
Lessons from the loo37
Neural Networks for Drug Discovery and Design37
On Expert Testimony32
Quantum Speedup for the Fast Fourier Transform?32
Revamping Python for an AI World31
After the Complaint30
Rebutting Rebuttals29
Worst-case topological entropy and minimal data rate for state estimation of switched linear systems27
Brain implants get real26
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities26
Subfield prestige and gender inequality among U.S. computing faculty26
What Should We Do when Our Ideas of Fairness Conflict?25
Talking about Large Language Models24
What is the cost of living online?24
Communicating ACM priorities23
Static analysis22
Preserving the past with immersive technologies22
The future of text redux21
Is higher education an engine of opportunity, or a perpetuator of privilege?20
Finding the art in systems conversions, naming20
The EU AI Act and the Wager on Trustworthy AI20
Lamboozling Attackers20
Dynamic Placement in Refugee Resettlement19
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models19
Model Counting Meets Distinct Elements19
Inferring and improving street maps with data-driven automation19
Building and Nurturing AI Development in Vietnam19
Contracting for Artificial Intelligence19
Computing's grand challenge for sustainability19
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions19
The AI Ethicist's Dirty Hands Problem18
Liquid testing with your smartphone18
On-skin computing17
17
Achievement in Microarchitecture16
Two sides of the software engineering coin16
Tales of Topological Qubits16
Surveillance too cheap to meter15
Technical perspective: How do experts learn new programming languages?15
The blood price of unrestricted privacy15
A Quantum Leap in Factoring14
Elevating Security with Arm CCA14
On 6G and trustworthiness14
Quis custodiet ipsos custodes?14
An internet of things service roadmap14
Multisensory Experiences: Formation, Realization, and Responsibilities14
Women in Computer Science Are Making Strides14
Preprinting in AI Ethics: Toward a Set of Community Guidelines14
Trust, regulation, and human-in-the-loop AI14
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems13
‘Upon This Quote I Will Build My Church Thesis’13
All Sliders to the Right13
Technical Perspective: Pandemics, Remote Work, and Accessibility13
A model restoration13
Involvement and detachment13
What is Data Science?13
String me along12
Web 3.0 Requires Data Integrity12
Ethical AI is Not about AI12
Repeat, Reproduce, Replicate12
Technical perspective: Applying design-space exploration to quantum architectures12
Let us not put all our eggs in one basket12
Intelligent futures in task assistance12
The Importance of Distrust in Trusting Digital Worker Chatbots12
Building Safer and Interoperable AI systems12
You Don’t Know Jack about Bandwidth12
Deterministic Record-and-Replay12
Designing an Efficient Tree Index on Disaggregated Memory11
A tale of three datasets11
When satisfiability solving meets symbolic computation11
Algorithmic hiring needs a human face11
Text and data mining of in-copyright works11
Cookie monster11
DevEX: What Actually Drives Productivity?11
Challenges, experiments, and computational solutions in peer review10
Toward Basing Cryptography on the Hardness of EXP10
Mapping the Privacy Landscape for Central Bank Digital Currencies10
Activities of National Institute of Informatics in Japan10
The Silent (R)evolution of SAT10
Software-defined cooking using a microwave oven10
A data-driven exploration of the race between human labor and machines in the 21 st century10
South Korea's Nationwide Effort for AI Semiconductor Industry10
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil10
JIZAI Body: Human-Machine Integration Based on Asian Thought10
Learning new things and avoiding obstacles10
How music and programming led me to build digital microworlds10
Fit for People, Fit for Purpose: Designing Tech that Matters9
AI and data science centers in top Indian academic institutions9
Raising the Dead with AI9
From Eye Tracking to AI-Powered Learning9
Technical perspective: Visualization search9
Generative AI Requires Broad Labor Policy Considerations9
Comparing Chatbots Trained in Different Languages9
Public Business and Private Accounts9
How Many Ways Can You Teach a Robot?9
When should a black box be transparent?8
The limits of differential privacy (and its misuse in data release and machine learning)8
Computational thinking in the era of data science8
Filtering for beauty8
The Carbon Footprint of Artificial Intelligence8
AI futures8
Computer Science Under Trump8
The Luce Goose8
The Infrapolitics of Algorithmic Resistance8
U.S. Copyright Office's Questions about Generative AI8
The Boundary Hunters8
PlanAlyzer8
New life for cordless communication, old regrets for software projects8
Agent provocateur8
Language models8
A Symbolic Approach to Verifying Quantum Systems8
The practice of applying AI to benefit visually impaired people in China8
Robotic process automation platform UiPath8
Trustworthy AI Using Confidential Federated Learning8
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India8
Software Drift8
Can AI Keep Accessible Communication in the Picture?7
The growing cost of deep learning for source code7
Exclusivity probes7
Investigating Research Software Engineering: Toward RSE Research7
Responsible data management7
Achieving CS for all could take decades7
AI-CHD7
A Philosopher's Daughter Navigates a Career in AI7
Technical perspective: Leveraging social context for fake news detection7
Improving Memory Management, Performance with Rust7
Homo Ratiocinator (Reckoning Human)7
The Gamification of Academia7
Machine Learning in Computer Security is Difficult to Fix7
Mirror, Mirror on the Wall, What is the Best Topology of Them All?7
The First Computer Program7
Expressive querying for accelerating visual analytics7
A formal approach to identifying the impact of noise on neural networks7
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory7
Transactions and Serverless are Made for Each Other7
Data science meets law6
Computational Linguistics Finds its Voice6
Always improving performance6
A year in lockdown6
How Flexible Is CXL's Memory Protection?6
Dilemma of the Artificial Intelligence Regulatory Landscape6
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits6
Privacy in the Age of AI6
Lost in Afghanistan: Can the World Take ICT4D Seriously?6
Scaling up chatbots for corporate service delivery systems6
More Than Just Algorithms6
The Collapse of GPT6
Technical perspective: eBP rides the third wave of mobile health6
When software engineering meets quantum computing6
Biomedical Digital Twins6
Shining a Light on the Dark Web6
The Fine Line Between Persuasion and Coercion6
Post-Quantum Cryptography5
Trustworthy AI5
Getting a Handle on Handles5
Formalizing fairness5
Outsmarting Deepfake Video5
Resolution of the burrows-wheeler transform conjecture5
Building a new economy5
Informatics Higher Education in Europe: A Data Portal and Case Study5
SI and Binary Prefixes: Clearing the Confusion5
Proving Data-Poisoning Robustness in Decision Trees5
Jump Snatch5
Hidden malware ratchets up cybersecurity risks5
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting5
How Generative AI Fits into Knowledge Work5
Spatial concepts in the conversation with a computer5
The Vulnerability-Adaptive Protection Paradigm5
The dawn of crowdfarms5
Technical perspective: Can data structures treat us fairly?5
Lithography Lights a New Path5
Internet of production5
‘What I Think about When I Type about Talking’: Reflections on Text-Entry Acceleration Interfaces5
Computing Divided5
Why Is the Current XAI Not Meeting the Expectations?5
Pitfalls in Machine Learning for Computer Security5
Shaping ethical computing cultures5
ACM Profits Considered Harmful5
What Came First, Math or Computing?5
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet5
Can AI learn to forget?5
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite5
Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning4
ACM publications finances for 20204
It Is Time to Let Go of 'Virtual Reality'4
Distributed Latency Profiling through Critical Path Tracing4
Data Analytics Anywhere and Everywhere4
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond4
Artificial intelligence, machine learning, and the fight against world hunger4
Taking Flight with Copilot4
Preserving the internet4
Modern tech can't shield your secret identity4
A Rewarding Line of Work4
Natural interactive techniques for the detection and assessment of neurological diseases4
Connectivity Is Everything4
Finding an alternate way forward with AI4
When Proofs Meet Programs: An Extension of Dependent Type Theory with Church’s Thesis4
In Pursuit of Professionalism4
Exploring Stereotypes and Biases in Language Technologies in Latin America4
Nand to Tetris: Building a Modern Computer System from First Principles4
50 Years of Queries4
eBP4
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies4
ACM at 754
Toward Effective AI Support for Developers4
A Camera the Size of a Grain of Salt Could Change Imaging as We Know It4
Zero-Knowledge Proofs and Their Role within the Blockchain4
Deep learning for AI4
Envisioning Recommendations on an LLM-Based Agent Platform4
The Pollution of AI4
Thirsty Fabs4
Driving an innovation contest into crisis4
Vendor-Locked DevOps Strategies4
The Linear Fallacy4
The Security Jawbreaker4
Conjoined Twins: Artificial Intelligence and the Invention of Computer Science4
AI Should Challenge, Not Obey4
0.29852914810181