Communications of the ACM

Papers
(The TQCC of Communications of the ACM is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
NeRF1807
Understanding deep learning (still) requires rethinking generalization1105
Datasheets for datasets562
Green AI505
Deep learning for AI352
What serverless computing is and should become133
The (Im)possibility of fairness126
A review of the semantic web field122
Knowledge graphs103
Secure multiparty computation99
Trustworthy AI99
Non-fungible tokens and the future of art95
The future is big graphs90
Methods included84
Federated learning for privacy-preserving AI80
Toward verified artificial intelligence79
The limits of differential privacy (and its misuse in data release and machine learning)63
Medical artificial intelligence62
Advances in the quantum internet60
MIP* = RE59
The End of Programming55
CAPE52
A year in lockdown51
Biases in AI systems51
The hardware lottery50
On 6G and trustworthiness46
WinoGrande45
A panoramic survey of natural language processing in the Arab world39
The dogged pursuit of bug-free C programs39
Operationalizing AI ethics principles37
Responsible AI36
Safe systems programming in Rust35
Digital agriculture for small-scale producers35
On sampled metrics for item recommendation34
There is no AI without data33
Crowdsensing 2.033
Computing Education in the Era of Generative AI31
The harm in conflating aging with accessibility30
When software engineering meets quantum computing29
The decline of computers as a general purpose technology29
When permissioned blockchains deliver more decentralization than permissionless28
Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage28
Talking about Large Language Models28
Recommender systems under European AI regulations27
Measuring internet speed27
Digital twins and artificial intelligence27
Gender trends in computer science authorship27
Formalizing and guaranteeing human-robot interaction26
Language models26
From remote work to working from anywhere26
The state of virtual reality hardware25
Cyber reconnaissance techniques25
What does saying that 'programming is hard' really say, and about whom?24
An internet of things service roadmap24
Challenges, experiments, and computational solutions in peer review23
The Principles of Data-Centric AI23
Trust, regulation, and human-in-the-loop AI22
Deploying decentralized, privacy-preserving proximity tracing21
What to do about deepfakes21
Constant overhead quantum fault tolerance with quantum expander codes21
WebRTC21
Toward confidential cloud computing20
DP-cryptography20
Automating data science19
Federated learning and privacy18
The 2021 software developer shortage is coming17
Neural software analysis17
Polanyi's revenge and AI's new romance with tacit knowledge17
Moore's Law17
The best of NLP16
How reliable is smartphone-based electronic contact tracing for COVID-19?16
Preserving integrity in online social networks16
A federated infrastructure for European data spaces16
Can AI Demonstrate Creativity?15
Toward justice in computer science through community, criticality, and citizenship15
Six reasons why virtual reality is a game-changing computing and communication platform for organizations15
Responsible data management14
The Seattle report on database research14
hXDP14
Collusion rings threaten the integrity of computer science research14
Toward Practices for Human-Centered Machine Learning14
Excessive use of technology14
Artificial intelligence for synthetic biology14
Automata modulo theories14
Flexible work and personal digital infrastructures14
Non-traditional data sources13
Accelerator-level parallelism12
Can Generative AI Bots Be Trusted?12
AI and Neurotechnology12
Building a multilingual Wikipedia12
How to transition incrementally to microservice architecture12
The dark triad and insider threats in cyber security12
Still waiting for self-driving cars12
Rateless codes for near-perfect load balancing in distributed matrix-vector multiplication12
Does Facebook use sensitive data for advertising purposes?12
Securing internet applications from routing attacks12
Artificial intelligence, machine learning, and the fight against world hunger12
Optimal auctions through deep learning12
Blockchain in China12
Competitive compatibility12
Explainable AI11
The growing cost of deep learning for source code11
Eyelid gestures for people with motor impairments11
Insights for AI from the human mind11
Serverless Computing: What It Is, and What It Is Not?11
Connecting Arabs11
The Premature Obituary of Programming11
Taking Flight with Copilot11
Transformers aftermath10
Fugaku takes the lead10
Technologies for the visually impaired10
On the Implicit Bias in Deep-Learning Algorithms10
The pushback effects of race, ethnicity, gender, and age in code review10
Low-Code Programming Models10
Shortcut Learning of Large Language Models in Natural Language Understanding10
Algorithms with predictions10
The Science of Detecting LLM-Generated Text10
Computational thinking in the era of data science10
The worsening state of ransomware10
CoCoPIE9
Interpretable machine learning9
GDPR anti-patterns9
Enabling AI at the edge with XNOR-networks9
Ethical AI is Not about AI9
Applying the metaverse9
Heads-Up Computing Moving Beyond the Device-Centered Paradigm9
HPC Forecast9
FANG9
Fifty years of P vs. NP and the possibility of the impossible9
Resolution of the burrows-wheeler transform conjecture9
Democratizing Domain-Specific Computing9
Legal Challenges to Generative AI, Part I9
A Tale of Two Markets: Investigating the Ransomware Payments Economy9
Data Science---A Systematic Treatment9
Toward systematic architectural design of near-term trapped ion quantum computers8
ArabHCI8
Cookie monster8
ACM, ethics, and corporate behavior8
A vision to compute like nature8
Data science meets law8
Digital instruments as invention machines8
Text and data mining of in-copyright works8
Abstractions, their algorithms, and their compilers8
Human detection of machine-manipulated media8
Energy informatics8
Keeping science on keel when software moves8
Filtering for beauty8
PL and HCI8
U.S. states must broaden participation while expanding access to computer science education8
AI Rewrites Coding8
Artificial intelligence across company borders7
A battery-free internet of things7
Our house is on fire7
Actionable Auditing Revisited7
Declarative machine learning systems7
Privacy-preserving AI for future networks7
Differential privacy7
Driving the cloud to true zero carbon7
Hoping for the Best as AI Evolves7
Why universities must resist GPA-based enrollment caps in the face of surging enrollments7
Simba7
AI-CHD7
Supporting people with autism spectrum disorders in the exploration of PoIs7
A tale of three datasets7
How do Java mutation tools differ?7
Computational thinking for professionals7
CS unplugged or coding classes?7
Achieving Green AI with Energy-Efficient Deep Learning Using Neuromorphic Computing7
Dynamics of gender bias in computing7
Toward a broad AI7
Mobile-app privacy nutrition labels missing key ingredients for success7
'In situ' data rights7
The Lean Data Scientist7
What is Data Science?7
Subfield prestige and gender inequality among U.S. computing faculty7
The Go programming language and environment6
Informing California privacy regulations with evidence from research6
Security analysis of SMS as a second factor of authentication6
Why computing students should contribute to open source software projects6
The evolution of mathematical software6
Battery day6
Reimagining chess with AlphaZero6
A Linearizability-based Hierarchy for Concurrent Specifications6
On the requirements engineer role6
A Computational Inflection for Scientific Discovery6
From Code Complexity Metrics to Program Comprehension6
Fixing the internet6
Entrepreneurship ecosystem in Lebanon6
The role of professional certifications in computer occupations6
Software Engineering of Machine Learning Systems6
The Carbon Footprint of Artificial Intelligence6
Unlocking the Potential of Fully Homomorphic Encryption6
Beyond Deep Fakes6
Traffic classification in an increasingly encrypted web6
Cyber Efficiency and Cyber Resilience6
New Threats to Society from Free-Speech Social Media Platforms6
Internet of production5
Boeing's 737 MAX5
On Specifying for Trustworthiness5
Enclaves in the clouds5
Multimedia data delivery based on IoT clouds5
Assessing the quantum-computing landscape5
Software development in disruptive times5
Producing competent HPC graduates5
Geometric deep learning advances data science5
Data Analytics Anywhere and Everywhere5
Neurosymbolic AI5
What can the maker movement teach us about the digitization of creativity?5
Managing IT professional turnover5
Are Software Updates Useless against Advanced Persistent Threats?5
Eight Reasons to Prioritize Brain-Computer Interface Cybersecurity5
Isomorphism, canonization, and definability for graphs of bounded rank width5
Talking about race in CS education5
Digging into big provenance (with SPADE)5
Innovations and trends in China's digital economy5
Futures of digital governance5
The identity in everyone's pocket5
Scaling up chatbots for corporate service delivery systems5
Dilemma of the Artificial Intelligence Regulatory Landscape5
ChatGPT, Can You Tell Me a Story? An Exercise in Challenging the True Creativity of Generative AI5
Fact-finding mission5
Robotic process automation platform UiPath5
Let the algorithm decide?5
The Silent (R)evolution of SAT5
Educational interventions and female enrollment in IT degrees5
Mechanical Mathematicians5
Holograms on the horizon?5
Trustworthy scientific computing5
eBP5
Application frameworks4
Middleware 1014
The ethics of zero-day exploits---4
The SPACE of developer productivity4
Changing the nature of AI research4
AI ethics4
Building a new economy4
Virtual duplicates4
Understanding law and the rule of law4
When SDN and blockchain shake hands4
Static analysis4
The context problem in artificial intelligence4
The Internet of Batteryless Things4
The Many Faces of Resilience4
The SolarWinds hack, and a grand challenge for CS education4
Generative AI and CS Education4
The transformation of patient-clinician relationships with AI-based medical advice4
Is TinyML Sustainable?4
Cybersecurity research for the future4
Extracting the Essential Simplicity of the Internet4
Addressing algorithmic discrimination4
0.053115129470825