Journal of the ACM

Papers
(The median citation count of Journal of the ACM is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Vertex Connectivity in Poly-logarithmic Max-Flows44
Minimizing Convex Functions with Rational Minimizers39
Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents32
Dynamic Matching with Better-than-2 Approximation in Polylogarithmic Update Time30
Almost Optimal Exact Distance Oracles for Planar Graphs27
Near-Linear Runtime for a Classical Matrix Preconditioning Algorithm26
Ribbon: Fast Succinct Static Retrieval and Approximate Membership24
A New Algorithm for Euclidean Shortest Paths in the Plane23
Settling the Sample Complexity of Online Reinforcement Learning20
Proximity Gaps for Reed–Solomon Codes19
Rate-independent Computation in Continuous Chemical Reaction Networks19
On the Descriptive Complexity of Temporal Constraint Satisfaction Problems18
Parallelize Single-Site Dynamics up to Dobrushin Criterion18
Universal almost Optimal Compression and Slepian-wolf Coding in Probabilistic Polynomial Time16
Learning to Branch: Generalization Guarantees and Limits of Data-Independent Discretization15
Superpolynomial Lower Bounds Against Low-Depth Algebraic Circuits14
Generative Social Choice14
The Limitations of Optimization from Samples13
Stochastic Games with Synchronization Objectives13
A New Minimax Theorem for Randomized Algorithms12
EFX Exists for Three Agents11
Towards P≠NP from Extended Frege lower bounds10
How Much Data Is Sufficient to Learn High-Performing Algorithms?10
A Universal Law of Robustness via Isoperimetry10
Correct and Complete Type Checking and Certified Erasure for Coq , in Coq9
Relative Error Streaming Quantiles9
Indistinguishability Obfuscation from Well-Founded Assumptions9
Choiceless Polynomial Time with Witnessed Symmetric Choice9
Computing a Fixed Point of Contraction Maps in Polynomial Queries9
Equivalence and Conditional Independence in Atomic Sheaf Logic8
Toward a Better Understanding of Randomized Greedy Matching8
The Complexity of Computing KKT Solutions of Quadratic Programs8
Optimal Multi-Distribution Learning8
Cerise: Program Verification on a Capability Machine in the Presence of Untrusted Code8
A Compositional Theory of Linearizability8
Topological Characterization of Consensus in Distributed Systems7
Vizing’s Theorem in Near-Linear Time7
On the Need for Large Quantum Depth6
Smoothed Analysis of Information Spreading in Dynamic Networks6
Faster Modular Composition6
An Efficient Quantum Factoring Algorithm6
On Strongest Algebraic Program Invariants6
On Exponential-time Hypotheses, Derandomization, and Circuit Lower Bounds5
Efficient Normalization of Linear Temporal Logic5
Memory Checking Requires Logarithmic Overhead5
On the Zeros of Exponential Polynomials5
Negative-Weight Single-Source Shortest Paths in Near-linear Time4
A Gap-ETH-Tight Approximation Scheme for Euclidean TSP4
Discovering the Roots: Uniform Closure Results for Algebraic Classes Under Factoring4
Simple Uncoupled No-regret Learning Dynamics for Extensive-form Correlated Equilibrium4
Gradual System F4
Byzantine Agreement with Optimal Resilience via Statistical Fraud Detection4
Random \( \Theta (\log n) \) -CNFs are Hard for Cutting Planes4
Robustly Learning Mixtures of k Arbitrary Gaussians4
Coverability in VASS Revisited: Improving Rackoff’s Bounds to Obtain Conditional Optimality4
Axiomatization of Compact Initial Value Problems: Open Properties4
Transaction Fee Mechanism Design4
The Complexity of Gradient Descent: CLS = PPAD ∩ PLS3
Separations in Proof Complexity and TFNP3
2-Approximation for Prize-Collecting Steiner Forest3
Pliability and Approximating Max-CSPs3
Whole-grain Petri Nets and Processes3
Adaptive and Fair Transformation for Recoverable Mutual Exclusion3
Sampling-based Sublinear Low-rank Matrix Arithmetic Framework for Dequantizing Quantum Machine Learning3
Deterministic Document Exchange Protocols and Almost Optimal Binary Codes for Edit Errors3
Approximating Nash Social Welfare by Matching and Local Search3
Fine-grained Cryptanalysis: Tight Conditional Bounds for Dense k -SUM and k -XOR3
Deterministic Minimum Cut in Poly-logarithmic Maximum Flows3
QCSP Monsters and the Demise of the Chen Conjecture3
Binary Iterative Hard Thresholding Converges with Optimal Number of Measurements for 1-Bit Compressed Sensing2
Orbit-finite Linear Programming2
Minimizing Weighted Flow Time2
Polynomial-Time Pseudodeterministic Construction of Primes2
Oracle Separation of BQP and PH2
SPARKs: Succinct Parallelizable Arguments of Knowledge2
Anonymous Shared Memory2
Consistency of Relations over Monoids2
Exponentially Faster Shortest Paths in the Congested Clique2
Hardness of Approximate Diameter: Now for Undirected Graphs2
Multi-Agent Contracts2
The One-Way Communication Complexity of Submodular Maximization with Applications to Streaming and Robustness2
An Algorithmic Framework for Black-Box Reductions from Bayesian Mechanism Design to Algorithm Design2
Killing a Vortex2
Breaking the Metric Voting Distortion Barrier2
Parameterized Inapproximability Hypothesis under ETH2
Subsampling Suffices for Adaptive Data Analysis2
Proving as Fast as Computing: Succinct Arguments with Constant Prover Overhead2
The Space Complexity of Consensus from Swap2
Generative Datalog with Continuous Distributions1
Chains, Koch Chains, and Point Sets with Many Triangulations1
OptORAMa: Optimal Oblivious RAM1
Adversarially Robust Streaming Algorithms via Differential Privacy1
Edge-Weighted Online Bipartite Matching1
Geometric Embeddability of Complexes is ∃ℝ-complete1
Survivable Network Design with Group-to-Group Requirement1
Lower Bounds for Semialgebraic Range Searching and Stabbing Problems1
Two-round Multiparty Secure Computation from Minimal Assumptions1
Learning Equilibria in Matching Markets with Bandit Feedback1
A Correctness and Incorrectness Program Logic1
The Price of Anarchy of Strategic Queuing Systems1
Co-lexicographically Ordering Automata and Regular Languages - Part I1
Convex Hulls of Random Order Types1
Smooth approximations: An algebraic approach to CSPs over finitely bounded homogeneous structures1
Reducing Isotropy and Volume to KLS: Faster Rounding and Volume Algorithms1
Flow-augmentation I: Directed graphs1
Simulating Time with Square-Root Space1
Fast, Algebraic Multivariate Multipoint Evaluation in Small Characteristic and Applications1
Better-Than-2 Approximations for Weighted Tree Augmentation and Applications to Steiner Tree1
Nested Dissection Meets IPMs: Planar Min-Cost Flow in Nearly-Linear Time1
Symmetric Exponential Time Requires Near-Maximum Circuit Size1
Dominantly Truthful Peer Prediction Mechanisms with a Finite Number of Tasks1
Smoothed Analysis with Adaptive Adversaries1
Efficient Convex Optimization Requires Superlinear Memory1
Nearly Optimal Pseudorandomness from Hardness1
A Proof of the Nisan–Ronen Conjecture1
Exponentially Faster Massively Parallel Maximal Matching1
The Topological Mu-Calculus: Completeness and Decidability1
Near-optimal Lower Bounds on Quantifier Depth and Weisfeiler–Leman Refinement Steps1
Acceleration by Stepsize Hedging: Multi-Step Descent and the Silver Stepsize Schedule1
0.1187629699707