Communications of the ACM

Papers
(The TQCC of Communications of the ACM is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
Addressing algorithmic discrimination3424
Trouble at the source782
The role of professional certifications in computer occupations129
Persistence programming127
Designing an Ethical Tech Developer127
Artificial Intelligence for Materials Discovery125
How do I rely on thee, smartphone?122
In Memoriam118
Improving Section 230, Preserving Democracy, and Protecting Free Speech114
Technical perspective: Eyelid gestures enhance mobile interaction112
Partnership on AI, data, and robotics104
Algorithmic poverty86
Unleashing the Power of Deep Learning79
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough76
3D Modeling Draws on AI75
Virtual and the Future of Conferences68
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility58
Tackling Challenges in Implementing Large-Scale Graph Databases57
Taking Apart to Build Back Up57
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History55
Empowering Virtual Agents With Intelligent Systems49
Show It or Tell It? Text, Visualization, and Their Combination49
On the Implicit Bias in Deep-Learning Algorithms49
Leaving X49
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities43
Revamping Python for an AI World41
On Expert Testimony39
Brain implants get real38
Trends in computer science research within European countries38
Subfield prestige and gender inequality among U.S. computing faculty38
Worst-case topological entropy and minimal data rate for state estimation of switched linear systems37
Patent absurdity32
After the Complaint30
Quantum Speedup for the Fast Fourier Transform?30
The Dilemma of Scale28
Neural Networks for Drug Discovery and Design28
Connecting the Unconnected26
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences25
A Perspectival Mirror of the Elephant25
What Should We Do when Our Ideas of Fairness Conflict?24
Rebutting Rebuttals24
An AI Learning Hierarchy24
Talking about Large Language Models23
Multisensory Experiences: Formation, Realization, and Responsibilities23
23
Building and Nurturing AI Development in Vietnam22
What is Data Science?22
The AI Ethicist's Dirty Hands Problem22
A Quantum Leap in Factoring21
Preprinting in AI Ethics: Toward a Set of Community Guidelines20
Elevating Security with Arm CCA20
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions20
Tales of Topological Qubits20
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models20
Achievement in Microarchitecture19
Quis custodiet ipsos custodes?19
Model Counting Meets Distinct Elements19
Lamboozling Attackers18
Women in Computer Science Are Making Strides18
Finding the art in systems conversions, naming18
Technical perspective: How do experts learn new programming languages?18
What is the cost of living online?17
Liquid testing with your smartphone17
Surveillance too cheap to meter16
The future of text redux16
On-skin computing16
Inferring and improving street maps with data-driven automation16
Communicating ACM priorities16
Static analysis15
The blood price of unrestricted privacy15
Contracting for Artificial Intelligence15
Computing's grand challenge for sustainability15
Understanding Mobile App Reviews to Guide Misuse Audits14
Preserving the past with immersive technologies14
‘Upon This Quote I Will Build My Church Thesis’14
Is higher education an engine of opportunity, or a perpetuator of privilege?14
Trust, regulation, and human-in-the-loop AI14
On 6G and trustworthiness14
Dynamic Placement in Refugee Resettlement14
Cookie monster13
All Sliders to the Right13
The EU AI Act and the Wager on Trustworthy AI13
Intelligent futures in task assistance13
Involvement and detachment13
An internet of things service roadmap13
When satisfiability solving meets symbolic computation13
Let us not put all our eggs in one basket13
DevEX: What Actually Drives Productivity?13
Mapping the Privacy Landscape for Central Bank Digital Currencies12
Text and data mining of in-copyright works12
Technical perspective: Applying design-space exploration to quantum architectures12
Technical Perspective: Pandemics, Remote Work, and Accessibility12
A tale of three datasets12
Algorithmic hiring needs a human face12
Ethical AI is Not about AI12
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems12
A model restoration12
The Silent (R)evolution of SAT11
Designing an Efficient Tree Index on Disaggregated Memory11
To Post or Not to Post: AI Ethics in theAge of Big Tech11
Repeat, Reproduce, Replicate11
The Importance of Distrust in Trusting Digital Worker Chatbots11
Building Safer and Interoperable AI systems11
Web 3.0 Requires Data Integrity11
Challenges, experiments, and computational solutions in peer review11
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil11
You Don’t Know Jack about Bandwidth11
Deterministic Record-and-Replay11
AI Authorship Revisited11
Comparing Chatbots Trained in Different Languages10
Fit for People, Fit for Purpose: Designing Tech that Matters10
The practice of applying AI to benefit visually impaired people in China10
Technical perspective: Visualization search10
The Boundary Hunters10
A data-driven exploration of the race between human labor and machines in the 21 st century10
Public Business and Private Accounts10
Raising the Dead with AI10
Language models10
How music and programming led me to build digital microworlds10
Robotic process automation platform UiPath9
U.S. Copyright Office's Questions about Generative AI9
Filtering for beauty9
How Many Ways Can You Teach a Robot?9
JIZAI Body: Human-Machine Integration Based on Asian Thought9
From Eye Tracking to AI-Powered Learning9
Software-defined cooking using a microwave oven9
Trustworthy AI Using Confidential Federated Learning9
Activities of National Institute of Informatics in Japan9
AI and data science centers in top Indian academic institutions9
South Korea's Nationwide Effort for AI Semiconductor Industry9
Computational thinking in the era of data science9
Toward Basing Cryptography on the Hardness of EXP9
Learning new things and avoiding obstacles9
A formal approach to identifying the impact of noise on neural networks8
Exclusivity probes8
New life for cordless communication, old regrets for software projects8
Computer Science under Trump8
Data science meets law8
The First Computer Program8
A Symbolic Approach to Verifying Quantum Systems8
The Luce Goose8
AI-CHD8
AI futures8
Expressive querying for accelerating visual analytics8
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India8
The Infrapolitics of Algorithmic Resistance8
Generative AI Requires Broad Labor Policy Considerations8
Technical perspective: Leveraging social context for fake news detection8
PlanAlyzer8
Achieving CS for all could take decades8
A Philosopher's Daughter Navigates a Career in AI8
When should a black box be transparent?8
The Carbon Footprint of Artificial Intelligence8
Software Drift7
Agent provocateur7
Mirror, Mirror on the Wall, What is the Best Topology of Them All?7
Welcome: Sustainability and Computing Special Section7
Investigating Research Software Engineering: Toward RSE Research7
Dilemma of the Artificial Intelligence Regulatory Landscape7
Always improving performance7
The Gamification of Academia7
Computational Linguistics Finds its Voice7
Can AI Keep Accessible Communication in the Picture?7
Transactions and Serverless are Made for Each Other7
When software engineering meets quantum computing7
The Collapse of GPT7
Lost in Afghanistan: Can the World Take ICT4D Seriously?7
Improving Memory Management, Performance with Rust7
Homo Ratiocinator (Reckoning Human)7
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory7
Machine Learning in Computer Security is Difficult to Fix7
Privacy in the Age of AI7
Responsible data management7
Deconstructing the Take It Down Act7
The growing cost of deep learning for source code7
ACM Profits Considered Harmful6
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite6
Pitfalls in Machine Learning for Computer Security6
The Fine Line Between Persuasion and Coercion6
‘What I Think about When I Type about Talking’: Reflections on Text-Entry Acceleration Interfaces6
SI and Binary Prefixes: Clearing the Confusion6
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet6
The dawn of crowdfarms6
Building a new economy6
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting6
Jump Snatch6
Technical perspective: Can data structures treat us fairly?6
Internet of production6
In Pursuit of Professionalism5
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers5
Advancements in Weather Prediction5
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond5
Shaping ethical computing cultures5
Lithography Lights a New Path5
Biomedical Digital Twins5
How Flexible Is CXL's Memory Protection?5
The Vulnerability-Adaptive Protection Paradigm5
ACM at 755
Toward Effective AI Support for Developers5
Cylinder Lottery5
Neural software analysis5
On Program Synthesis and Large Language Models5
Can AI learn to forget?5
What Came First, Math or Computing?5
Hidden malware ratchets up cybersecurity risks5
More Than Just Algorithms5
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits5
It Is Time to Let Go of 'Virtual Reality'5
Driving an innovation contest into crisis5
How Generative AI Fits into Knowledge Work5
Data Analytics Anywhere and Everywhere5
Natural interactive techniques for the detection and assessment of neurological diseases5
The Case for Compact AI5
Continuous Earth Observation of Forest Dynamics and Biodiversity5
Resolution of the burrows-wheeler transform conjecture5
Post-Quantum Cryptography5
Shining a Light on the Dark Web5
Proving Data-Poisoning Robustness in Decision Trees5
Informatics Higher Education in Europe: A Data Portal and Case Study5
Trustworthy AI5
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies5
The Linear Fallacy5
A Rewarding Line of Work4
Neural Architecture Search as Program Transformation Exploration4
The Security Jawbreaker4
Getting a Handle on Handles4
Can AI Demonstrate Creativity?4
The making of an IT strategy consultant4
Accelerating AI4
Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience4
Technical Perspective: Beautiful Symbolic Abstractions for Safe and Secure Machine Learning4
There Was No 'First AI Winter'4
Saving Digital Libraries and the Internet Archive4
Technical Perspective: Maximum Flow through a Network: A Storied Problem and a Groundbreaking Solution4
Thirsty Fabs4
Outsmarting Deepfake Video4
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets4
Personalized recommendation of PoIs to people with autism4
Using Psychology to Bolster Cybersecurity4
Seesaw Gold4
Human detection of machine-manipulated media4
Technical Perspective: Opening the Door to SSD Algorithmics4
Energy and Emissions of Machine Learning on Smartphones vs. the Cloud4
Nand to Tetris: Building a Modern Computer System from First Principles4
Leveraging Professional Ethics for Responsible AI4
ACM publications finances for 20204
Finding an alternate way forward with AI4
Remember4
Building a practical quantum computer4
When Proofs Meet Programs: An Extension of Dependent Type Theory with Church’s Thesis4
0.05889892578125