Journal of the ACM

Papers
(The median citation count of Journal of the ACM is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Vertex Connectivity in Poly-logarithmic Max-Flows49
Minimizing Convex Functions with Rational Minimizers28
Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents27
Dynamic Matching with Better-than-2 Approximation in Polylogarithmic Update Time26
Almost Optimal Exact Distance Oracles for Planar Graphs25
Settling the Sample Complexity of Online Reinforcement Learning22
Parallelize Single-Site Dynamics up to Dobrushin Criterion22
Proximity Gaps for Reed–Solomon Codes21
A New Algorithm for Euclidean Shortest Paths in the Plane19
A Framework for Adversarially Robust Streaming Algorithms18
Rate-independent Computation in Continuous Chemical Reaction Networks17
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits17
Universal almost Optimal Compression and Slepian-wolf Coding in Probabilistic Polynomial Time16
Learning to Branch: Generalization Guarantees and Limits of Data-Independent Discretization16
On the Descriptive Complexity of Temporal Constraint Satisfaction Problems15
Stochastic Games with Synchronization Objectives14
A New Minimax Theorem for Randomized Algorithms13
EFX Exists for Three Agents12
The Limitations of Optimization from Samples12
A Universal Law of Robustness via Isoperimetry11
Correct and Complete Type Checking and Certified Erasure for Coq , in Coq10
Choiceless Polynomial Time with Witnessed Symmetric Choice10
Relative Error Streaming Quantiles10
How Much Data Is Sufficient to Learn High-Performing Algorithms?10
Twin-width I: Tractable FO Model Checking9
Optimal Multi-Distribution Learning9
Toward a Better Understanding of Randomized Greedy Matching9
Computing a Fixed Point of Contraction Maps in Polynomial Queries9
Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code8
Topological Characterization of Consensus in Distributed Systems8
The Complexity of Computing KKT Solutions of Quadratic Programs8
Faster Modular Composition8
A Compositional Theory of Linearizability8
On the Need for Large Quantum Depth8
An Efficient Quantum Factoring Algorithm7
On the Zeros of Exponential Polynomials7
On Strongest Algebraic Program Invariants7
Smoothed Analysis of Information Spreading in Dynamic Networks7
Invited Article Foreword6
Efficient Normalization of Linear Temporal Logic6
A Gap-ETH-Tight Approximation Scheme for Euclidean TSP6
On Exponential-time Hypotheses, Derandomization, and Circuit Lower Bounds6
Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection6
Memory Checking Requires Logarithmic Overhead6
Negative-Weight Single-Source Shortest Paths in Near-linear Time6
The Art Gallery Problem is ∃ℝ-complete5
Gradual System F5
Coverability in VASS Revisited: Improving Rackoff’s Bounds to Obtain Conditional Optimality5
Axiomatization of Compact Initial Value Problems: Open Properties4
The Complexity of Gradient Descent: CLS = PPAD ∩ PLS4
Random \( \Theta (\log n) \) -CNFs are Hard for Cutting Planes4
Transaction Fee Mechanism Design4
Discovering the Roots: Uniform Closure Results for Algebraic Classes Under Factoring4
QCSP Monsters and the Demise of the Chen Conjecture3
Separations in Proof Complexity and TFNP3
Adaptive and Fair Transformation for Recoverable Mutual Exclusion3
Sampling-based Sublinear Low-rank Matrix Arithmetic Framework for Dequantizing Quantum Machine Learning3
Simple Uncoupled No-regret Learning Dynamics for Extensive-form Correlated Equilibrium3
General Strong Polarization3
2-Approximation for Prize-Collecting Steiner Forest3
Pliability and Approximating Max-CSPs3
Whole-grain Petri Nets and Processes3
Deterministic Minimum Cut in Poly-logarithmic Maximum Flows3
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k -SUM and k -XOR3
Deterministic Document Exchange Protocols and Almost Optimal Binary Codes for Edit Errors3
Hardness of Approximate Diameter: Now for Undirected Graphs2
Parameterized Inapproximability Hypothesis under ETH2
A Correctness and Incorrectness Program Logic2
Convex Hulls of Random Order Types2
Dominantly Truthful Peer Prediction Mechanisms with a Finite Number of Tasks2
The Space Complexity of Consensus from Swap2
Binary Iterative Hard Thresholding Converges with Optimal Number of Measurements for 1-Bit Compressed Sensing2
Consistency of Relations over Monoids2
Subsampling Suffices for Adaptive Data Analysis2
Killing a Vortex2
Orbit-finite Linear Programming2
Oracle Separation of BQP and PH2
Generative Datalog with Continuous Distributions2
The One-Way Communication Complexity of Submodular Maximization with Applications to Streaming and Robustness2
Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead2
Exponentially Faster Shortest Paths in the Congested Clique2
Anonymous Shared Memory2
Locally-iterative Distributed (Δ + 1)-coloring and Applications2
Spatial Isolation Implies Zero Knowledge Even in a Quantum World2
Chains, Koch Chains, and Point Sets with Many Triangulations2
Smoothed Analysis with Adaptive Adversaries2
SPARKs: Succinct Parallelizable Arguments of Knowledge2
The Price of Anarchy of Strategic Queuing Systems2
Breaking the Metric Voting Distortion Barrier2
0.13257002830505