Journal of the ACM

Papers
(The median citation count of Journal of the ACM is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Vertex Connectivity in Poly-logarithmic Max-Flows31
Minimizing Convex Functions with Rational Minimizers30
Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents28
Dynamic Matching with Better-than-2 Approximation in Polylogarithmic Update Time28
Almost Optimal Exact Distance Oracles for Planar Graphs26
Parallelize Single-Site Dynamics up to Dobrushin Criterion22
Near-Linear Runtime for a Classical Matrix Preconditioning Algorithm22
Settling the Sample Complexity of Online Reinforcement Learning20
Rate-independent Computation in Continuous Chemical Reaction Networks19
A Framework for Adversarially Robust Streaming Algorithms18
Proximity Gaps for Reed–Solomon Codes18
A New Algorithm for Euclidean Shortest Paths in the Plane17
Universal almost Optimal Compression and Slepian-wolf Coding in Probabilistic Polynomial Time16
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits16
Learning to Branch: Generalization Guarantees and Limits of Data-Independent Discretization14
Stochastic Games with Synchronization Objectives13
The Limitations of Optimization from Samples13
On the Descriptive Complexity of Temporal Constraint Satisfaction Problems13
A New Minimax Theorem for Randomized Algorithms13
EFX Exists for Three Agents12
A Universal Law of Robustness via Isoperimetry11
Indistinguishability Obfuscation from Well-Founded Assumptions10
How Much Data Is Sufficient to Learn High-Performing Algorithms?10
Optimal Multi-Distribution Learning9
Choiceless Polynomial Time with Witnessed Symmetric Choice9
Computing a Fixed Point of Contraction Maps in Polynomial Queries9
Correct and Complete Type Checking and Certified Erasure for Coq , in Coq9
Toward a Better Understanding of Randomized Greedy Matching8
Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code8
A Compositional Theory of Linearizability8
Topological Characterization of Consensus in Distributed Systems8
Relative Error Streaming Quantiles8
The Complexity of Computing KKT Solutions of Quadratic Programs8
An Efficient Quantum Factoring Algorithm7
On Strongest Algebraic Program Invariants7
Faster Modular Composition7
On the Need for Large Quantum Depth7
Smoothed Analysis of Information Spreading in Dynamic Networks7
Invited Article Foreword6
Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection6
On Exponential-time Hypotheses, Derandomization, and Circuit Lower Bounds6
Memory Checking Requires Logarithmic Overhead6
Efficient Normalization of Linear Temporal Logic6
On the Zeros of Exponential Polynomials6
Coverability in VASS Revisited: Improving Rackoff’s Bounds to Obtain Conditional Optimality5
Negative-Weight Single-Source Shortest Paths in Near-linear Time5
A Gap-ETH-Tight Approximation Scheme for Euclidean TSP5
Discovering the Roots: Uniform Closure Results for Algebraic Classes Under Factoring4
Transaction Fee Mechanism Design4
Axiomatization of Compact Initial Value Problems: Open Properties4
Simple Uncoupled No-regret Learning Dynamics for Extensive-form Correlated Equilibrium4
Gradual System F4
Random \( \Theta (\log n) \) -CNFs are Hard for Cutting Planes4
Adaptive and Fair Transformation for Recoverable Mutual Exclusion3
Separations in Proof Complexity and TFNP3
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k -SUM and k -XOR3
Sampling-based Sublinear Low-rank Matrix Arithmetic Framework for Dequantizing Quantum Machine Learning3
Anonymous Shared Memory3
Whole-grain Petri Nets and Processes3
General Strong Polarization3
2-Approximation for Prize-Collecting Steiner Forest3
Pliability and Approximating Max-CSPs3
Killing a Vortex3
The Complexity of Gradient Descent: CLS = PPAD ∩ PLS3
Deterministic Minimum Cut in Poly-logarithmic Maximum Flows3
QCSP Monsters and the Demise of the Chen Conjecture3
Deterministic Document Exchange Protocols and Almost Optimal Binary Codes for Edit Errors3
Oracle Separation of BQP and PH2
Parameterized Inapproximability Hypothesis under ETH2
Consistency of Relations over Monoids2
Orbit-finite Linear Programming2
Convex Hulls of Random Order Types2
Smoothed Analysis with Adaptive Adversaries2
Symmetric Exponential Time Requires Near-Maximum Circuit Size2
The Price of Anarchy of Strategic Queuing Systems2
Breaking the Metric Voting Distortion Barrier2
Binary Iterative Hard Thresholding Converges with Optimal Number of Measurements for 1-Bit Compressed Sensing2
Hardness of Approximate Diameter: Now for Undirected Graphs2
SPARKs: Succinct Parallelizable Arguments of Knowledge2
Chains, Koch Chains, and Point Sets with Many Triangulations2
Generative Datalog with Continuous Distributions2
A Correctness and Incorrectness Program Logic2
Subsampling Suffices for Adaptive Data Analysis2
Spatial Isolation Implies Zero Knowledge Even in a Quantum World2
Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead2
Exponentially Faster Shortest Paths in the Congested Clique2
The One-Way Communication Complexity of Submodular Maximization with Applications to Streaming and Robustness2
Better-Than-2 Approximations for Weighted Tree Augmentation and Applications to Steiner Tree2
The Space Complexity of Consensus from Swap2
Dominantly Truthful Peer Prediction Mechanisms with a Finite Number of Tasks2
0.022414922714233