Communications of the ACM

Papers
(The median citation count of Communications of the ACM is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Persistence programming249
Artificial Intelligence for Materials Discovery202
Taking Apart to Build Back Up159
Leaving X152
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough143
3D Modeling Draws on AI104
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History91
Unleashing the Power of Deep Learning88
In Memoriam85
Improving Section 230, Preserving Democracy, and Protecting Free Speech81
Designing an Ethical Tech Developer78
Show It or Tell It? Text, Visualization, and Their Combination57
On the Implicit Bias in Deep-Learning Algorithms56
Virtual and the Future of Conferences56
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility49
Not Every AI Problem Is a Data Problem48
Is There an End to Forever Chemicals?46
Empowering Virtual Agents With Intelligent Systems41
AI Multiplies for Drug Discovery41
Tackling Challenges in Implementing Large-Scale Graph Databases41
The Conundrum of LLMs39
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences35
A Perspectival Mirror of the Elephant35
Connecting the Unconnected35
On Expert Testimony34
Revamping Python for an AI World34
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities32
An AI Learning Hierarchy31
General Game Playing31
Quantum Speedup for the Fast Fourier Transform?31
Deleting X: Why SIGDOC Left the Platform29
Rebutting Rebuttals28
After the Complaint27
The Dilemma of Scale27
Neural Networks for Drug Discovery and Design26
Simulating Extinct Species25
Where Is My Data?25
Subfield prestige and gender inequality among U.S. computing faculty24
Brain implants get real23
The Outlook for Computer Science Education23
Talking about Large Language Models22
The Rise of Computational Thinking in the Age of AI22
What Should We Do when Our Ideas of Fairness Conflict?22
‘Upon This Quote I Will Build My Church Thesis’21
Model Counting Meets Distinct Elements21
Contracting for Artificial Intelligence20
Quis custodiet ipsos custodes?20
Computing's grand challenge for sustainability20
19
Keeping the Dream Alive: The Power and Promise of Federally Funded Research19
Surveillance too cheap to meter19
The AI Ethicist's Dirty Hands Problem19
Shedding Labels, Sidestepping Limitations, and Self-Fulfillment19
Achievement in Microarchitecture18
The blood price of unrestricted privacy17
Building and Nurturing AI Development in Vietnam17
Tales of Topological Qubits17
The Future Is Reversible17
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions17
Women in Computer Science Are Making Strides17
Understanding Mobile App Reviews to Guide Misuse Audits17
A Quantum Leap in Factoring17
Preprinting in AI Ethics: Toward a Set of Community Guidelines17
Federal Funding of Public Key Cryptography16
Multisensory Experiences: Formation, Realization, and Responsibilities16
Preserving the past with immersive technologies16
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models16
The EU AI Act and the Wager on Trustworthy AI16
Dynamic Placement in Refugee Resettlement16
Elevating Security with Arm CCA16
What is Data Science?16
Sustainable Quantum Computing16
Technical Perspective: Pandemics, Remote Work, and Accessibility15
Involvement and detachment15
Trading Bits for Atoms: How Digital Products Are Reshaping the Global Economy15
Let us not put all our eggs in one basket15
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil15
All Sliders to the Right15
When satisfiability solving meets symbolic computation15
Deterministic Record-and-Replay14
Cookie monster14
Designing an Efficient Tree Index on Disaggregated Memory14
Building Safer and Interoperable AI systems14
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems14
Repeat, Reproduce, Replicate14
You Don’t Know Jack about Bandwidth14
Web 3.0 Requires Data Integrity14
ACM’s 2026 General Election13
Intelligent futures in task assistance13
From Model Training to Model Raising13
Ethical AI is Not about AI13
A Decade of Docker Containers13
Challenges, experiments, and computational solutions in peer review13
To Post or Not to Post: AI Ethics in theAge of Big Tech13
Mapping the Privacy Landscape for Central Bank Digital Currencies13
The Importance of Distrust in Trusting Digital Worker Chatbots13
Public Business and Private Accounts12
AI and data science centers in top Indian academic institutions12
DevEX: What Actually Drives Productivity?12
JIZAI Body: Human-Machine Integration Based on Asian Thought12
The Silent (R)evolution of SAT12
How Many Ways Can You Teach a Robot?12
Toward Basing Cryptography on the Hardness of EXP11
The Infrapolitics of Algorithmic Resistance11
Raising the Dead with AI11
Technical perspective: Visualization search11
Activities of National Institute of Informatics in Japan11
Computational thinking in the era of data science11
Learning new things and avoiding obstacles11
Comparing Chatbots Trained in Different Languages11
Automatically Translating C to Rust11
Stablecoins: Why They Are Both Useful and Problematic11
The Boundary Hunters11
Fit for People, Fit for Purpose: Designing Tech that Matters11
From Eye Tracking to AI-Powered Learning11
U.S. Copyright Office's Questions about Generative AI10
The Carbon Footprint of Artificial Intelligence10
Generative AI Requires Broad Labor Policy Considerations10
Language models10
AI Authorship Revisited10
We Must Teach Computer Science in Prison10
A Symbolic Approach to Verifying Quantum Systems10
South Korea's Nationwide Effort for AI Semiconductor Industry10
Trustworthy AI Using Confidential Federated Learning10
Passing on Passwords10
Mirror, Mirror on the Wall, What is the Best Topology of Them All?9
The Luce Goose9
Computational Linguistics Finds its Voice9
Software Drift9
Transactions and Serverless are Made for Each Other9
Machine Learning in Computer Security is Difficult to Fix9
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India9
A Philosopher's Daughter Navigates a Career in AI9
The Gamification of Academia9
When should a black box be transparent?9
Exclusivity probes9
Improving Memory Management, Performance with Rust9
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory8
The Collapse of GPT8
Federal Funding Supports The Flow of Innovation8
A formal approach to identifying the impact of noise on neural networks8
Jump Snatch8
The Centrality Fallacy and ACM8
Privacy in the Age of AI8
Responsible data management8
Expressive querying for accelerating visual analytics8
In Memoriam: Vicki L. Hanson8
Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle8
Homo Ratiocinator (Reckoning Human)8
The First Computer Program8
Investigating Research Software Engineering: Toward RSE Research8
Deconstructing the Take It Down Act8
Can AI Keep Accessible Communication in the Picture?8
AI Rewrites the Rules of Phishing, Cybercrime8
Balancing Secrecy and Transparency in Bug Bounty Programs8
Welcome: Sustainability and Computing Special Section8
Dilemma of the Artificial Intelligence Regulatory Landscape8
The Case for Compact AI8
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet8
Computer Science under Trump8
How Flexible Is CXL's Memory Protection?7
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting7
Hidden malware ratchets up cybersecurity risks7
Shining a Light on the Dark Web7
Always improving performance7
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits7
Lithography Lights a New Path7
Technical perspective: Can data structures treat us fairly?7
Building a new economy7
Pitfalls in Machine Learning for Computer Security7
The Fine Line Between Persuasion and Coercion7
ACM Profits Considered Harmful7
Informatics Higher Education in Europe: A Data Portal and Case Study7
More Than Just Algorithms7
Resolution of the burrows-wheeler transform conjecture7
Advancements in Weather Prediction6
What Came First, Math or Computing?6
‘What I Think about When I Type about Talking’: Reflections on Text-Entry Acceleration Interfaces6
The Vulnerability-Adaptive Protection Paradigm6
Why Is the Current XAI Not Meeting the Expectations?6
Post-Quantum Cryptography6
SI and Binary Prefixes: Clearing the Confusion6
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite6
The dawn of crowdfarms6
Confusing the Map for the Territory6
The Security Jawbreaker6
Techno-Optimism, Techno-Pessimism, and Techno-Realism6
Lost in Afghanistan: Can the World Take ICT4D Seriously?6
Biomedical Digital Twins6
Outsmarting Deepfake Video6
How Generative AI Fits into Knowledge Work6
Nand to Tetris: Building a Modern Computer System from First Principles6
Proving Data-Poisoning Robustness in Decision Trees6
The Linear Fallacy5
There Was No 'First AI Winter'5
50 Years of Queries5
Connectivity Is Everything5
A Camera the Size of a Grain of Salt Could Change Imaging as We Know It5
Technical Perspective: Maximum Flow through a Network: A Storied Problem and a Groundbreaking Solution5
Continuous Earth Observation of Forest Dynamics and Biodiversity5
Data Analytics Anywhere and Everywhere5
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets5
On Program Synthesis and Large Language Models5
It Is Time to Let Go of 'Virtual Reality'5
When Proofs Meet Programs: An Extension of Dependent Type Theory with Church’s Thesis5
Is TinyML Sustainable?5
As Good as a Coin Toss: Human Detection of AI-Generated Content5
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond5
The Pollution of AI5
Leveraging Professional Ethics for Responsible AI5
Conjoined Twins: Artificial Intelligence and the Invention of Computer Science5
Semiconductor Manufacturers Feel the Heat5
Distributed Latency Profiling through Critical Path Tracing5
Seesaw Gold5
Saving Digital Libraries and the Internet Archive5
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies5
AI Should Challenge, Not Obey5
Vendor-Locked DevOps Strategies5
A Rewarding Line of Work5
Thirsty Fabs5
Cylinder Lottery5
AI Must Be Anti-Ableist and Accessible5
Getting a Handle on Handles5
In Pursuit of Professionalism5
Driving an innovation contest into crisis5
Formalizing fairness5
Finding an alternate way forward with AI5
Poisoning Data to Protect It5
Indistinguishability Obfuscation from Well-Founded Assumptions5
Age Verification Systems Will Be a Personal Identifiable Information Nightmare5
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers5
Exploring Stereotypes and Biases in Language Technologies in Latin America5
Envisioning Recommendations on an LLM-Based Agent Platform5
Welcome back!5
Taking Flight with Copilot5
Can AI Demonstrate Creativity?5
Toward Effective AI Support for Developers5
Computing Divided5
Mentorship Lessons from Growing a Developing Country Journal4
Faster Integer Programming4
To Regulate Tech, Nullify Click-Through Contracts4
Energy and Emissions of Machine Learning on Smartphones vs. the Cloud4
Feedback Loops Guide AI to Proof Checking4
Teaching Transformed4
How Not to Win a Tech War4
Human-AI Cooperation to Tackle Misinformation and Polarization4
How Exploits Impact Computer Science Theory4
OSS Supply-Chain Security: What Will It Take?4
Zero-Knowledge Proofs and Their Role within the Blockchain4
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys4
0.36852216720581