Communications of the ACM

Papers
(The TQCC of Communications of the ACM is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Algorithmic poverty2918
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough704
Partnership on AI, data, and robotics436
Trouble at the source118
Addressing algorithmic discrimination113
Dynamics of gender bias in computing109
How do I rely on thee, smartphone?108
Tackling Challenges in Implementing Large-Scale Graph Databases101
Persistence programming95
Unleashing the Power of Deep Learning92
Improving Section 230, Preserving Democracy, and Protecting Free Speech88
Artificial Intelligence for Materials Discovery84
Technical perspective: Eyelid gestures enhance mobile interaction82
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History75
Designing an Ethical Tech Developer75
Always-on time-series database69
Technical perspective: Tracking pandemic-driven internet traffic69
3D Modeling Draws on AI66
Virtual and the Future of Conferences63
In Memoriam58
Taking Apart to Build Back Up51
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility50
Leaving X49
The role of professional certifications in computer occupations46
On the Implicit Bias in Deep-Learning Algorithms46
Show It or Tell It? Text, Visualization, and Their Combination45
Connecting the Unconnected44
Trends in computer science research within European countries44
Patent absurdity42
A Perspectival Mirror of the Elephant40
Brain implants get real37
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences36
Subfield prestige and gender inequality among U.S. computing faculty36
The Dilemma of Scale35
Obtain a Ph.D. and a career in data33
Lessons from the loo31
Neural Networks for Drug Discovery and Design31
Quantum Speedup for the Fast Fourier Transform?30
On Expert Testimony29
What Should We Do when Our Ideas of Fairness Conflict?28
Revamping Python for an AI World27
After the Complaint26
Rebutting Rebuttals25
Worst-case topological entropy and minimal data rate for state estimation of switched linear systems24
Talking about Large Language Models24
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities24
An AI Learning Hierarchy22
What is the cost of living online?21
Communicating ACM priorities21
Finding the art in systems conversions, naming20
Preserving the past with immersive technologies20
Lamboozling Attackers20
Static analysis20
The future of text redux20
Contracting for Artificial Intelligence19
Computing's grand challenge for sustainability19
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions19
Is higher education an engine of opportunity, or a perpetuator of privilege?19
The EU AI Act and the Wager on Trustworthy AI19
On 6G and trustworthiness19
What is Data Science?19
Building and Nurturing AI Development in Vietnam18
Liquid testing with your smartphone17
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models17
The AI Ethicist's Dirty Hands Problem17
Model Counting Meets Distinct Elements17
Achievement in Microarchitecture16
On-skin computing16
Tales of Topological Qubits16
16
Two sides of the software engineering coin15
Technical perspective: How do experts learn new programming languages?15
The blood price of unrestricted privacy15
Surveillance too cheap to meter15
Quis custodiet ipsos custodes?14
Preprinting in AI Ethics: Toward a Set of Community Guidelines14
A Quantum Leap in Factoring14
Elevating Security with Arm CCA14
Women in Computer Science Are Making Strides14
Dynamic Placement in Refugee Resettlement13
Trust, regulation, and human-in-the-loop AI13
Inferring and improving street maps with data-driven automation13
Multisensory Experiences: Formation, Realization, and Responsibilities13
A model restoration13
An internet of things service roadmap13
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems13
The Importance of Distrust in Trusting Digital Worker Chatbots12
Cookie monster12
Involvement and detachment12
String me along12
Algorithmic hiring needs a human face12
Text and data mining of in-copyright works12
Web 3.0 Requires Data Integrity12
A tale of three datasets12
You Don’t Know Jack about Bandwidth12
Technical Perspective: Pandemics, Remote Work, and Accessibility12
Technical perspective: Applying design-space exploration to quantum architectures12
Let us not put all our eggs in one basket12
Toward confidential cloud computing12
Repeat, Reproduce, Replicate12
Building Safer and Interoperable AI systems12
All Sliders to the Right12
When satisfiability solving meets symbolic computation12
The Silent (R)evolution of SAT12
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil11
Mapping the Privacy Landscape for Central Bank Digital Currencies11
Intelligent futures in task assistance10
DevEX: What Actually Drives Productivity?10
JIZAI Body: Human-Machine Integration Based on Asian Thought10
Toward Basing Cryptography on the Hardness of EXP10
Ethical AI is Not about AI10
Designing an Efficient Tree Index on Disaggregated Memory10
How music and programming led me to build digital microworlds10
Deterministic Record-and-Replay10
Challenges, experiments, and computational solutions in peer review10
Software-defined cooking using a microwave oven10
A data-driven exploration of the race between human labor and machines in the 21 st century10
Learning new things and avoiding obstacles9
The practice of applying AI to benefit visually impaired people in China9
Comparing Chatbots Trained in Different Languages9
Activities of National Institute of Informatics in Japan9
Technical perspective: Visualization search9
Filtering for beauty9
South Korea's Nationwide Effort for AI Semiconductor Industry9
From Eye Tracking to AI-Powered Learning9
The Boundary Hunters8
The Infrapolitics of Algorithmic Resistance8
AI and data science centers in top Indian academic institutions8
Language models8
U.S. Copyright Office's Questions about Generative AI8
PlanAlyzer8
Software Drift8
Generative AI Requires Broad Labor Policy Considerations8
Fit for People, Fit for Purpose: Designing Tech that Matters8
Robotic process automation platform UiPath8
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India8
The Carbon Footprint of Artificial Intelligence8
AI futures8
Computational thinking in the era of data science8
Raising the Dead with AI8
How Many Ways Can You Teach a Robot?8
Public Business and Private Accounts8
The limits of differential privacy (and its misuse in data release and machine learning)8
Trustworthy AI Using Confidential Federated Learning8
New life for cordless communication, old regrets for software projects8
AI-CHD7
A Philosopher's Daughter Navigates a Career in AI7
The Gamification of Academia7
Improving Memory Management, Performance with Rust7
Computer Science Under Trump7
The Luce Goose7
Achieving CS for all could take decades7
Mirror, Mirror on the Wall, What is the Best Topology of Them All?7
The First Computer Program7
Expressive querying for accelerating visual analytics7
A formal approach to identifying the impact of noise on neural networks7
Agent provocateur7
Computational Linguistics Finds its Voice7
Transactions and Serverless are Made for Each Other7
Machine Learning in Computer Security is Difficult to Fix7
The growing cost of deep learning for source code7
Exclusivity probes7
Can AI Keep Accessible Communication in the Picture?7
When should a black box be transparent?7
Technical perspective: Leveraging social context for fake news detection7
A year in lockdown6
Investigating Research Software Engineering: Toward RSE Research6
Dilemma of the Artificial Intelligence Regulatory Landscape6
Scaling up chatbots for corporate service delivery systems6
Data science meets law6
Homo Ratiocinator (Reckoning Human)6
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory6
Shining a Light on the Dark Web6
Privacy in the Age of AI6
Responsible data management6
When software engineering meets quantum computing6
Biomedical Digital Twins6
Spatial concepts in the conversation with a computer5
Can AI learn to forget?5
Proving Data-Poisoning Robustness in Decision Trees5
More Than Just Algorithms5
Lost in Afghanistan: Can the World Take ICT4D Seriously?5
How Flexible Is CXL's Memory Protection?5
Lithography Lights a New Path5
Informatics Higher Education in Europe: A Data Portal and Case Study5
The dawn of crowdfarms5
Resolution of the burrows-wheeler transform conjecture5
Internet of production5
Technical perspective: eBP rides the third wave of mobile health5
Always improving performance5
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite5
Jump Snatch5
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet5
Building a new economy5
Technical perspective: Can data structures treat us fairly?5
Pitfalls in Machine Learning for Computer Security5
The Fine Line Between Persuasion and Coercion5
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits5
SI and Binary Prefixes: Clearing the Confusion5
The Vulnerability-Adaptive Protection Paradigm5
What Came First, Math or Computing?5
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies4
Taking Flight with Copilot4
Neural software analysis4
Simba4
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting4
Welcome back!4
Thirsty Fabs4
There Was No 'First AI Winter'4
How Generative AI Fits into Knowledge Work4
AI Must Be Anti-Ableist and Accessible4
Post-Quantum Cryptography4
Why Is the Current XAI Not Meeting the Expectations?4
Conjoined Twins: Artificial Intelligence and the Invention of Computer Science4
Natural interactive techniques for the detection and assessment of neurological diseases4
AI Should Challenge, Not Obey4
Modern tech can't shield your secret identity4
Envisioning Recommendations on an LLM-Based Agent Platform4
The Linear Fallacy4
A Rewarding Line of Work4
The Security Jawbreaker4
Toward Effective AI Support for Developers4
Nand to Tetris: Building a Modern Computer System from First Principles4
The paradox of choice in computing-research conferences4
Formalizing fairness4
It Is Time to Let Go of 'Virtual Reality'4
Shaping ethical computing cultures4
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers4
Hidden malware ratchets up cybersecurity risks4
Driving an innovation contest into crisis4
The SPACE of developer productivity4
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond4
eBP4
Preserving the internet4
The Pollution of AI4
50 Years of Queries4
Exploring Stereotypes and Biases in Language Technologies in Latin America4
Outsmarting Deepfake Video4
Is TinyML Sustainable?4
Vendor-Locked DevOps Strategies4
Welcome back!4
Trustworthy AI4
On Program Synthesis and Large Language Models4
‘What I Think about When I Type about Talking’: Reflections on Text-Entry Acceleration Interfaces4
ACM Profits Considered Harmful4
Artificial intelligence, machine learning, and the fight against world hunger4
Can AI Demonstrate Creativity?4
Leveraging Professional Ethics for Responsible AI4
ACM at 754
In Pursuit of Professionalism4
0.081814050674438