Communications of the ACM

Papers
(The TQCC of Communications of the ACM is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
In Memoriam2724
Symbol-Synchronous Buses: Deterministic, Low-Latency Wireless Mesh Networking with LEDs678
Improving Section 230, Preserving Democracy, and Protecting Free Speech426
… And the Computer Plays Along154
Artificial Intelligence for Materials Discovery115
The Many Faces of Resilience109
Always improving performance107
I unplugged what?99
Partnership on AI, data, and robotics95
ACM Publications Finances for 2022: Striving for Balance between Mission, Sustainability, and Growth85
Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research82
Life Lessons from the First Half-Century of My Career80
Meta’s Hyperscale Infrastructure: Overview and Insights78
Informatics Higher Education in Europe: A Data Portal and Case Study74
What Came First, Math or Computing?72
When Two Cameras Are a Crowd72
Five Ways Executives Misunderstand Technology64
Building a new economy60
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet60
Innovation Is Overrated: A Provocation55
A Unifying Framework for Incompleteness, Inconsistency, and Uncertainty in Databases55
3D Modeling Draws on AI49
Can ChatGPT Learn Chinese or Swahili?46
More Is Different, in Social Media Too44
Our house is on fire39
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions39
Fixing the internet39
Virtual duplicates37
Generative AI as a New Innovation Platform36
Show It or Tell It? Text, Visualization, and Their Combination36
How do I rely on thee, smartphone?33
Orbit design32
Seeing beneath the skin with computational photography32
Taking Apart to Build Back Up31
These are not the apes you are looking for30
Reimagining chess with AlphaZero29
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits28
Protecting Autonomous Cars from Phantom Attacks28
Lost in Afghanistan: Can the World Take ICT4D Seriously?27
Unleashing the Power of Deep Learning26
Welcome26
Algorithmic poverty25
Lattice-Based Cryptosystems and Quantum Cryptanalysis24
The dawn of crowdfarms23
Persistence programming21
AI ethics21
ChatGPT, Can You Tell Me a Story? An Exercise in Challenging the True Creativity of Generative AI20
Virtual Reality as Therapy20
Advances in the quantum internet19
A federated infrastructure for European data spaces19
Gaining Benefit from Artificial Intelligence and Data Science: A Three-Part Framework18
Dynamics of gender bias in computing18
Virtual and the Future of Conferences18
Building Machine Learning Models Like Open Source Software17
Technical Perspective: Sensing Interaction with Everyday Objects Using Near-Field Communication in Textiles17
Designing a Framework for Conversational Interfaces17
Stone Knives and Bear Skins17
A Security Model for Web-Based Communication16
Biomedical Digital Twins16
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility16
Confidential Container Groups16
Trouble at the source15
ACM's 2022 general election15
Good, better, best15
Can AI learn to forget?15
Optimal auctions through deep learning15
Remembering Valérie Issarny15
Divide and conquer14
Agent algorithm13
Data Bias Management12
Is Computing a Discipline in Crisis?12
Technical perspective: Does your experiment smell?12
Looking Within12
Security Challenges of Intent-Based Networking12
Scaling up chatbots for corporate service delivery systems12
Between the Booms: AI in Winter12
Technical perspective: eBP rides the third wave of mobile health12
A Whimsical Odyssey Through the Maze of Scholarly Reviews12
We Need to Focus on How Our Data Is Used, Not Just How It Is Shared12
The role of professional certifications in computer occupations12
A switch in time12
BentoMuseum: 3D and Layered Interactive Museum Map for Blind Visitors12
Toward justice in computer science through community, criticality, and citizenship12
Technical perspective: Tracking pandemic-driven internet traffic11
Spatial concepts in the conversation with a computer11
On truth and belief11
The Human Touch11
Application frameworks11
The four horsemen of an ailing software project11
L-Space and Large Language Models11
Always-on time-series database11
SI and Binary Prefixes: Clearing the Confusion11
Changing the world through HCI and UX10
What Ever Happened to Peer-to-Peer Systems?10
Go backward, save energy10
A division in computer science10
Apple's challenge to virtualization software10
Technical perspective: On proofs, entanglement, and games10
In Memoriam: Charles M. Geschke (1939--2021)10
The future of information work10
Designing an Ethical Tech Developer10
Hummingbird10
Words matter9
Technology's impact on morality9
How reliable is smartphone-based electronic contact tracing for COVID-19?9
The Digital Degree Certification Revolution in Brazil and Beyond9
Artificial Intelligence as Catalyst for Biodiversity Understanding9
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite9
Can Artificial Intelligence Be Open Sourced?9
Software Engineering of Machine Learning Systems9
From Quantum Computing to Quantum Communications9
Eyelid gestures for people with motor impairments8
Is It Math or CS? Or Is It Both?8
Resolution of the burrows-wheeler transform conjecture8
Walk a mile in their shoes8
Reinventing Backend Subsetting at Google8
Addressing the Data Storage Crisis8
Securing Data for Business Telephones8
LLMs’ Data-Control Path Insecurity8
Data platforms and network effects8
ForestEyes: Citizen Scientists and Machine Learning-Assisting Rainforest Conservation8
In-sensor classification with boosted race trees8
Imagining Intelligent Machines8
ACM Profits Considered Harmful7
Mixed Abilities and Varied Experiences: A Group Autoethnography of a Virtual Summer Internship7
Proving Data-Poisoning Robustness in Decision Trees7
Energy informatics7
Shaping ethical computing cultures7
Computing Everywhere, for Everyone, at Any Level7
The Fine Line Between Persuasion and Coercion7
Technical Perspective: A Rare Glimpse of Tracking Fake Reviews7
More Than Just Algorithms7
Voice in the Machine: Ethical Considerations for Language-Capable Robots7
Research Experiences for Undergraduates Are Necessary for an Equitable Research Community7
Fenix7
How Flexible Is CXL's Memory Protection?7
Boosting Fuzzer Efficiency: An Information Theoretic Perspective7
‘Superpowers’ of Gender Equality Failing to Establish Gender Balance in IT7
Technical perspective: Can data structures treat us fairly?7
Internet of production7
Empower Diversity in AI Development7
ACE7
The Veracity Grand Challenge in Computing: A Perspective from Aotearoa New Zealand7
Pitfalls in Machine Learning for Computer Security7
Heads-Up Computing Moving Beyond the Device-Centered Paradigm6
Ethics as a Participatory and Iterative Process6
Shining a Light on the Dark Web6
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History6
Tackling Challenges in Implementing Large-Scale Graph Databases6
Technical Perspective: Tapping the Link between Algorithmic Model Counting and Streaming6
Technical perspective: Eyelid gestures enhance mobile interaction6
Interpretable machine learning6
The Smallness of Large Language Models6
Science Needs You: Mobilizing for Diversity in Award Recognition6
A Year Embedded in the Crypto-NFT Space6
Battery day6
Addressing algorithmic discrimination6
Lithography Lights a New Path6
The road to 6G6
Keys to a Comprehensive Computer Science at School Policy in Argentina6
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough6
Leaving X5
Standards to Secure the Sensors That Power IoT5
Autonomy 2.0: The Quest for Economies of Scale5
ACM for the Public Good5
A vision to compute like nature5
Hardware VM Isolation in the Cloud5
A Brief History of Blockchain Interoperability5
Large Language Models5
The Parchment Path?5
Hidden malware ratchets up cybersecurity risks5
New Threats to Society from Free-Speech Social Media Platforms5
Many Faces of Ad Hoc Transactions5
Trustworthy AI5
The Vulnerability-Adaptive Protection Paradigm5
Machine Learning Sensors5
AI in the Enterprise5
Processing extreme-scale graphs on China's supercomputers5
Post-Quantum Cryptography5
Democratizing Domain-Specific Computing5
The Principles of Data-Centric AI5
Algorithms with predictions5
On the Implicit Bias in Deep-Learning Algorithms5
Extracting the Essential Simplicity of the Internet4
Locality and professional life4
Designing UIs for static-analysis tools4
Getting a Handle on Handles4
Cylinder Lottery4
Jump Snatch4
Turing reaction4
Technical perspective: Race logic presents a novel form of encoding4
The Linear Fallacy4
Our ACM community4
ACM at 754
Neurosymbolic AI4
Mobile phone usage data for disaster response4
Driving an innovation contest into crisis4
Patent absurdity4
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies4
In Memoriam: Jack Minker (1927---2021)4
The sand-heap paradox of privacy and influence4
Computing Divided4
Technical perspective: A recipe for protecting against speculation attacks4
Neighborhood Watch4
Modern tech can't shield your secret identity4
Can Generative AI Bots Be Trusted?4
The trouble with Facebook4
The Future of Misuse Detection4
Looking Ahead at Inclusive Technology4
Computations for This World and out of This World4
Technical perspective: Computation where the (inter)action is4
On the Difference between Security and Safety4
How Generative AI Fits into Knowledge Work4
Trends in computer science research within European countries4
AI Rewrites Coding4
Shrinking artificial intelligence4
Neural software analysis4
The agency trilemma and ACM4
Randomower4
Technical Perspective: The Impact of Auditing for Algorithmic Bias4
Upholding ACM's principles4
Connecting the Unconnected4
Bias, Skew, and Search Engines Are Sufficient to Explain Online Toxicity4
The Sustainability Gap for Computing: Quo Vadis?4
Behold the Ch!Ld4
Leveraging Professional Ethics for Responsible AI4
A Career Built on Using Technology to Help Others4
Still waiting for self-driving cars4
Five years as editor-in-chief of Communications4
Depth and persistence4
Traffic classification in an increasingly encrypted web4
Meaning and context in computer programs4
Technical perspective: Achieve big with devices that track small things4
Can AI Demonstrate Creativity?4
65 competencies3
Toward explainable deep learning3
Protecting Life-Saving Medical Devices from Cyberattack3
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers3
What Should We Do when Our Ideas of Fairness Conflict?3
Cyber Efficiency and Cyber Resilience3
Welcome back!3
Applying the metaverse3
Obtain a Ph.D. and a career in data3
Quantum Speedup for the Fast Fourier Transform?3
Revamping Python for an AI World3
Accountability and liability in computing3
Brain implants get real3
Theoretical Analysis of Edit Distance Algorithms3
On Expert Testimony3
Rethinking Conference Formats3
0.30596995353699