Communications of the ACM

Papers
(The TQCC of Communications of the ACM is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-12-01 to 2025-12-01.)
ArticleCitations
Empowering Virtual Agents With Intelligent Systems4662
Technical perspective: Eyelid gestures enhance mobile interaction180
Persistence programming148
Artificial Intelligence for Materials Discovery141
Taking Apart to Build Back Up131
Leaving X127
Historic Algorithms Help Unlock Shortest-Path Problem Breakthrough81
3D Modeling Draws on AI80
Partnership on AI, data, and robotics79
How do I rely on thee, smartphone?72
How Software Bugs led to “One of the Greatest Miscarriages of Justice” in British History68
Unleashing the Power of Deep Learning59
In Memoriam54
Improving Section 230, Preserving Democracy, and Protecting Free Speech52
Addressing algorithmic discrimination47
Virtual and the Future of Conferences46
Show It or Tell It? Text, Visualization, and Their Combination44
Not Every AI Problem Is a Data Problem43
Designing an Ethical Tech Developer43
mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility41
Tackling Challenges in Implementing Large-Scale Graph Databases39
On the Implicit Bias in Deep-Learning Algorithms35
A Perspectival Mirror of the Elephant34
Revamping Python for an AI World31
Connecting the Unconnected31
On Expert Testimony31
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences31
Brain implants get real30
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities30
Worst-case topological entropy and minimal data rate for state estimation of switched linear systems28
Where Is My Data?28
Quantum Speedup for the Fast Fourier Transform?28
Trends in computer science research within European countries27
Rebutting Rebuttals25
The Dilemma of Scale25
Deleting X: Why SIGDOC Left the Platform25
After the Complaint25
An AI Learning Hierarchy24
What Should We Do when Our Ideas of Fairness Conflict?24
Neural Networks for Drug Discovery and Design24
Talking about Large Language Models23
Simulating Extinct Species23
Subfield prestige and gender inequality among U.S. computing faculty23
‘Upon This Quote I Will Build My Church Thesis’22
22
The blood price of unrestricted privacy21
What is Data Science?21
Shedding Labels, Sidestepping Limitations, and Self-Fulfillment20
Understanding Mobile App Reviews to Guide Misuse Audits20
Is higher education an engine of opportunity, or a perpetuator of privilege?19
On 6G and trustworthiness19
Model Counting Meets Distinct Elements19
Dynamic Placement in Refugee Resettlement19
Contracting for Artificial Intelligence18
Quis custodiet ipsos custodes?18
Static analysis18
Computing's grand challenge for sustainability17
Lamboozling Attackers17
Surveillance too cheap to meter17
Technical perspective: How do experts learn new programming languages?17
Preserving the past with immersive technologies17
Multisensory Experiences: Formation, Realization, and Responsibilities17
Achievement in Microarchitecture16
Women in Computer Science Are Making Strides16
Tales of Topological Qubits16
Preprinting in AI Ethics: Toward a Set of Community Guidelines16
The AI Ethicist's Dirty Hands Problem16
Building and Nurturing AI Development in Vietnam16
Elevating Security with Arm CCA15
A Quantum Leap in Factoring15
On-skin computing15
LaMPost: AI Writing Assistance for Adults with Dyslexia Using Large Language Models15
Scalable Technological Architecture Empowers Small-Scale Smart Farming Solutions15
Trust, regulation, and human-in-the-loop AI14
Involvement and detachment14
Algorithmic hiring needs a human face14
Keeping the Dream Alive: The Power and Promise of Federally Funded Research14
Let us not put all our eggs in one basket14
All Sliders to the Right14
The EU AI Act and the Wager on Trustworthy AI14
Technical perspective: Applying design-space exploration to quantum architectures14
Deterministic Record-and-Replay13
To Post or Not to Post: AI Ethics in theAge of Big Tech13
Building Safer and Interoperable AI systems13
Technical Perspective: Pandemics, Remote Work, and Accessibility13
A tale of three datasets13
Repeat, Reproduce, Replicate13
Cookie monster13
Designing an Efficient Tree Index on Disaggregated Memory13
You Don’t Know Jack about Bandwidth13
DevEX: What Actually Drives Productivity?12
When satisfiability solving meets symbolic computation12
Mapping the Privacy Landscape for Central Bank Digital Currencies12
JIZAI Body: Human-Machine Integration Based on Asian Thought12
Challenges, experiments, and computational solutions in peer review12
Fast Parameterized Preprocessing for Polynomial-Time Solvable Graph Problems12
Intelligent futures in task assistance12
Misinformation Campaigns through WhatsApp and Telegram in Presidential Elections in Brazil12
The Silent (R)evolution of SAT12
How Many Ways Can You Teach a Robot?12
Web 3.0 Requires Data Integrity12
Trading Bits for Atoms: How Digital Products Are Reshaping the Global Economy12
Ethical AI is Not about AI12
Public Business and Private Accounts12
A data-driven exploration of the race between human labor and machines in the 21 st century12
The Importance of Distrust in Trusting Digital Worker Chatbots12
A Symbolic Approach to Verifying Quantum Systems11
Raising the Dead with AI11
Technical perspective: Visualization search11
The Carbon Footprint of Artificial Intelligence11
The Boundary Hunters11
Trustworthy AI Using Confidential Federated Learning11
Computational thinking in the era of data science11
Learning new things and avoiding obstacles11
Activities of National Institute of Informatics in Japan11
Fit for People, Fit for Purpose: Designing Tech that Matters11
U.S. Copyright Office's Questions about Generative AI10
Toward Basing Cryptography on the Hardness of EXP10
Comparing Chatbots Trained in Different Languages10
South Korea's Nationwide Effort for AI Semiconductor Industry10
Increasing Diversity, Equity, and Inclusion Awareness: An Example from India10
AI and data science centers in top Indian academic institutions10
The Infrapolitics of Algorithmic Resistance10
AI Authorship Revisited10
Robotic process automation platform UiPath10
Generative AI Requires Broad Labor Policy Considerations10
When should a black box be transparent?10
Automatically Translating C to Rust10
From Eye Tracking to AI-Powered Learning10
The First Computer Program10
Language models10
The Luce Goose10
Mirror, Mirror on the Wall, What is the Best Topology of Them All?9
A Philosopher's Daughter Navigates a Career in AI9
Privacy in the Age of AI9
Deconstructing the Take It Down Act9
Agent provocateur9
Software Drift9
Can AI Keep Accessible Communication in the Picture?9
Technical perspective: Leveraging social context for fake news detection9
Achieving CS for all could take decades9
Computational Linguistics Finds its Voice9
Transactions and Serverless are Made for Each Other9
The Gamification of Academia9
Homo Ratiocinator (Reckoning Human)9
Exclusivity probes9
A formal approach to identifying the impact of noise on neural networks9
Machine Learning in Computer Security is Difficult to Fix9
Improving Memory Management, Performance with Rust9
Computer Science under Trump8
Federal Funding Supports The Flow of Innovation8
Dilemma of the Artificial Intelligence Regulatory Landscape8
The growing cost of deep learning for source code8
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory8
Welcome: Sustainability and Computing Special Section8
The Collapse of GPT8
Responsible data management8
When software engineering meets quantum computing8
Expressive querying for accelerating visual analytics8
Investigating Research Software Engineering: Toward RSE Research8
Federal Research Investment and Innovation in Information Technology: A Virtuous Cycle8
Data science meets law8
Balancing Secrecy and Transparency in Bug Bounty Programs8
Technical perspective: Can data structures treat us fairly?7
Lithography Lights a New Path7
Beyond the Editorial Analogy: The Future of the First Amendment on the Internet7
What Came First, Math or Computing?7
‘What I Think about When I Type about Talking’: Reflections on Text-Entry Acceleration Interfaces7
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits7
Post-Quantum Cryptography7
Jump Snatch7
The Fine Line Between Persuasion and Coercion7
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting7
Pitfalls in Machine Learning for Computer Security7
The Case for Compact AI7
How Flexible Is CXL's Memory Protection?7
ACM Profits Considered Harmful7
Informatics Higher Education in Europe: A Data Portal and Case Study6
SI and Binary Prefixes: Clearing the Confusion6
The dawn of crowdfarms6
Biomedical Digital Twins6
How Generative AI Fits into Knowledge Work6
The Vulnerability-Adaptive Protection Paradigm6
Hidden malware ratchets up cybersecurity risks6
Internet of production6
Always improving performance6
Advancements in Weather Prediction6
Can AI learn to forget?6
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite6
Proving Data-Poisoning Robustness in Decision Trees6
Shining a Light on the Dark Web6
Resolution of the burrows-wheeler transform conjecture6
Lost in Afghanistan: Can the World Take ICT4D Seriously?6
Confusing the Map for the Territory6
Building a new economy6
The Security Jawbreaker6
More Than Just Algorithms6
ACM at 755
AI Must Be Anti-Ableist and Accessible5
A Rewarding Line of Work5
Exploring Stereotypes and Biases in Language Technologies in Latin America5
Leveraging Professional Ethics for Responsible AI5
Formalizing fairness5
Thirsty Fabs5
AI Should Challenge, Not Obey5
Getting a Handle on Handles5
On Program Synthesis and Large Language Models5
In Pursuit of Professionalism5
The Rise of the AI Co-Pilot: Lessons for Design from Aviation and Beyond5
Envisioning Recommendations on an LLM-Based Agent Platform5
Artificial intelligence, machine learning, and the fight against world hunger5
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies5
Driving an innovation contest into crisis5
Toward Effective AI Support for Developers5
The Perils of Leveraging Evil Digital Twins as Security-Enhancing Enablers5
Is TinyML Sustainable?5
Outsmarting Deepfake Video5
When Proofs Meet Programs: An Extension of Dependent Type Theory with Church’s Thesis5
Data Analytics Anywhere and Everywhere5
Computing Divided5
Continuous Earth Observation of Forest Dynamics and Biodiversity5
The Linear Fallacy5
Conjoined Twins: Artificial Intelligence and the Invention of Computer Science5
Preserving the internet5
Nand to Tetris: Building a Modern Computer System from First Principles5
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets5
Vendor-Locked DevOps Strategies5
As Good as a Coin Toss: Human Detection of AI-Generated Content5
It Is Time to Let Go of 'Virtual Reality'5
Taking Flight with Copilot5
Modern tech can't shield your secret identity5
Neural software analysis5
The Pollution of AI5
Welcome back!5
Cylinder Lottery5
Energy and Emissions of Machine Learning on Smartphones vs. the Cloud4
10 Things Software Developers Should Learn about Learning4
How the AI Boom Went Bust4
Explorations in cyber-physical systems education4
Color blind accessibility manifesto4
Trust, Governance, and AI Decision Making4
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys4
Zero-Knowledge Proofs and Their Role within the Blockchain4
Humble AI4
Efficiency Is Not Enough: A Critical Perspective on Environmentally Sustainable AI4
Prompting Considered Harmful4
Human-AI Cooperation to Tackle Misinformation and Polarization4
Revolutionizing Datacenter Networks via Reconfigurable Topologies4
Acting in Self-Defense4
Producing competent HPC graduates4
0.14505004882812