


default search action
Communications of the ACM, Volume 68
Volume 68, Number 1, January 2025
- Moshe Y. Vardi
:
I Was Wrong about the Ethics Crisis. 5
- CACM Staff:
Is It Math or CS? Or Is It Both? 6-7
- Micah Beck, Brenna Bentley, Anika Roskowski:
Connecting the Unconnected. 8-9
- Chris Edwards:
The Secret of Ramsey Numbers: A new order forms out of randomness. 11-13 - Logan Kugler:
Who Owns AI's Output? 14-16 - Don Monroe:
Addressing the Data Storage Crisis. 17-19
- Virgílio Almeida, Ricardo Fabrino Mendonça
, Fernando Filgueiras
:
Thinking of Algorithms as Institutions. 20-23
- Erik Deumens
, Carolyn Ellis
:
Compliance Requirements in Research. 24-26
- James Grimmelmann
:
The Fine Line Between Persuasion and Coercion. 27-29
- Michael A. Cusumano:
Intel's Fall from Grace. 30-32
- Hans Hüttel
:
On Program Synthesis and Large Language Models. 33-35 - Hilde G. Corneliussen
:
'Superpowers' of Gender Equality Failing to Establish Gender Balance in IT. 36-38
- Jim Waldo, Soline Boussard
:
GPTs and Hallucination. 40-45 - Phil Vachon:
Test Accounts: A Hidden Risk. 46-49
- Barry Porter
, Penny Faulkner Rainford
, Roberto Rodrigues Filho
:
Self-Designing Software. 50-59 - Krishna Venkatasubramanian
, Tina-Marie Ranalli
, Piriyankan Kirupaharan
, Liam Cannon
:
Considering Trauma in Accessible Design for Adults with Intellectual and Developmental Disabilities. 60-67 - Jack Parkinson
, Lauren Margulieux
:
Improving CS Performance by Developing Spatial Skills. 68-75
- Gene Tsudik
:
Tracing the Network Traffic Fingerprinting Techniques of OpenVPN. 78 - Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. 79-87 - Timothy Neate:
Can AI Keep Accessible Communication in the Picture? 88 - Maurício Fontana de Vargas
, Jiamin Dai
, Karyn Moffatt
:
AAC with Automated Vocabulary from Photographs: Insights from School and Speech-Language Therapy Settings. 89-96
- Dennis Shasha:
Cylinder Lottery.
Volume 68, Number 2, February 2025
- Vinton G. Cerf:
Building Safer and Interoperable AI systems. 5
- Geraldine Fitzpatrick
:
Fit for People, Fit for Purpose: Designing Tech that Matters. 7
- Alex Williams:
Go-ing to the Cloud. 8-9
- Samuel Greengard:
Can LLMs Make Robots Smarter? 11-13 - Esther Shein:
The Evolution of Computer Science at the University Level. 14-16 - Neil Savage:
Brain Implants Give People Back What They Lost. 17-19
- Michael Felderer
, Michael Goedicke
, Lars Grunske
, Wilhelm Hasselbring
, Anna-Lena Lamprecht
, Bernhard Rumpe
:
Investigating Research Software Engineering: Toward RSE Research. 20-23
- Thomas Haigh:
Artificial Intelligence Then and Now. 24-29
- Ian Gorton
, Alessio Bucaioni
, Patrizio Pelliccione
:
Technical Credit. 30-33
- George V. Neville-Neil:
Building on Shaky Ground. 34-35
- David A. Patterson:
Life Lessons from the First Half-Century of My Career. 36-39
- Robert N. M. Watson, John Baldwin, David Chisnall, Tony Chen, Jessica Clarke, Brooks Davis, Nathaniel Wesley Filardo, Brett F. Gutstein, Graeme Jenkinson, Ben Laurie, Alfredo Mazzinghi, Simon W. Moore, Peter G. Neumann, Hamed Okhravi, Alex Richardson, Alex Rebert, Peter Sewell, Laurence Tratt, Murali Vijayaraghavan, Hugo Vincent, Konrad Witaszczyk:
It Is Time to Standardize Principles and Practices for Software Memory Safety. 40-45
- Catherine Hayes, David Malone:
Questioning the Criteria for Evaluating Non-Cryptographic Hash Functions. 46-51
- Chunqiang Tang
:
Meta's Hyperscale Infrastructure: Overview and Insights. 52-63 - Jennifer A. Rode
, Luís A. Castro
, Varun K. Viswanath
, María Concepción Valdez Gastelum
, Afra Mashhadi
, Monica Tentori
, Kristof Van Laerhoven
, Nadir Weibel
:
Justice, Equity, Diversity, and Inclusion at UbiComp/ISWC: Best Practices for Accessible and Equitable Computing Conferences. 64-73 - Kedar S. Namjoshi
, Lenore D. Zuck
:
Program Correctness through Self-Certification. 74-84
- Richard Peng:
Shortening the Path to Designing Efficient Graph Algorithms. 86 - Aaron Bernstein, Danupon Nanongkai, Christian Wulff-Nilsen:
Negative-Weight Single-Source Shortest Paths in Near-Linear Time. 87-94 - Thorsten Holz
:
Unsafe Code Still a Hurdle Copilot Must Clear. 95 - Hammond Pearce
, Baleegh Ahmad
, Benjamin Tan
, Brendan Dolan-Gavitt
, Ramesh Karri
:
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions. 96-105
- David Studebaker:
A Heavenly Host.
Volume 68, Number 3, March 2025
- Moshe Y. Vardi:
Homo Ratiocinator (Reckoning Human). 5
- Wang Fan, Shaoshan Liu:
Putting the Smarts into Robot Bodies. 6-8
- Chris Edwards:
Feedback Loops Guide AI to Proof Checking. 9-11 - Mark Halper:
How Software Bugs led to "One of the Greatest Miscarriages of Justice" in British History. 12-14 - Sandrine Ceurstemont:
Controlling AI's Growing Energy Needs. 15-17
- Pamela Samuelson:
California's AI Act Vetoed. 18-20
- Peter J. Denning:
Abstractions. 21-23
- Robert West
, Roland Aydin
:
The AI Alignment Paradox. 24-26
- Charles Morphy D. Santos
, João Paulo Gois
:
Artificial Intelligence as Catalyst for Biodiversity Understanding. 27-29 - Jack West
, Jingjie Li
, Kassem Fawaz
:
A Glimpse Into the Pandora's Box. 30-32
- Shuvendu K. Lahiri
, Alexey Svyatkovskiy
, Christian Bird
, Erik Miejer
, Terry Coatta
:
Program Merge: What's Deep Learning Got to Do with It? 34-41
- Veniamin Veselovsky
, Manoel Horta Ribeiro
, Philip Cozzolino
, Andrew Gordon, David M. Rothschild
, Robert West
:
Prevalence and Prevention of Large Language Model Use in Crowd Work. 42-47 - Xuewei Feng
, Qi Li
, Kun Sun
, Ke Xu
, Jianping Wu
:
Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite. 48-59 - Luca Felicetti
, Mauro Femminella
, Gianluca Reali
:
Molecular Communications in Blood Vessels: Models, Analysis, and Enabling Technologies. 60-69 - Lieven Eeckhout
:
The Sustainability Gap for Computing: Quo Vadis? 70-79
- Uriel Feige:
The Surprising Power of Spectral Refutation. 82 - Venkatesan Guruswami, Pravesh K. Kothari, Peter Manohar:
New Spectral Algorithms for Refuting Smoothed k-SAT. 83-91 - Graham Cormode:
Technical Perspective: Toward Building a Differentially Private DBMS. 92 - Wei Dong, Juanru Fang, Ke Yi, Yuchao Tao, Ashwin Machanavajjhala:
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys. 93-101
- Leah Hoffmann:
Not on the Best Path.
Volume 68, Number 4, April 2025
- Vinton G. Cerf:
Remember. 5
- Henrik Skaug Sætra:
Leaving X. 6-7
- Chris Edwards:
When Will This End? 9-11 - Paul Marks:
Guide Dogs Are Expensive and Scarce. Could Robots Do Their Job? 12-14 - Logan Kugler:
How Do You Measure AI? 15-17
- Mari Sako, Teppo Felin:
Does AI Prediction Scale to Decision Making? 18-21
- George V. Neville-Neil:
The Drunken Plagiarists. 22-23
- Evgenia Christoforou
, Gianluca Demartini
, Jahna Otterbacher
:
Crowdsourcing or AI Sourcing? 24-27 - Shuang Wu, Bo Yu, Shaoshan Liu, Yuhao Zhu:
Autonomy 2.0: The Quest for Economies of Scale. 28-32 - Ryen W. White
, Chirag Shah
:
Panmodal Information Interaction. 33-36
- Stacy M. Branham, Shahtab Wahid, Sheri Byrne-Haber, Jamal Mazrui, Carlos Muncharaz, Carl Myhill:
The State of Digital Accessibility. 38-41
- David Gefen, Barry A. Leffew, Arik Ragowsky, René Riedl:
The Importance of Distrust in Trusting Digital Worker Chatbots. 42-49 - Marianna Obrist
, Carlos Velasco
:
Multisensory Experiences: Formation, Realization, and Responsibilities. 50-59 - Henrik Skaug Sætra
:
Preprinting in AI Ethics: Toward a Set of Community Guidelines. 60-68
- Kenneth Salem
:
Ad Hoc Transactions: What They Are and Why We Should Care. 70 - Chuzhe Tang
, Zhaoguo Wang, Xiaodong Zhang, Qianmian Yu, Binyu Zang, Haibing Guan, Haibo Chen:
Many Faces of Ad Hoc Transactions. 71-80 - Xia Zhou
:
The Technologies that Disappear. 81 - Ali Kiaghadi, Jin Huang, Seyedeh Zohreh Homayounfar, Trisha Andrew, Deepak Ganesan:
FabToys: Large Arrays of Fabric-Based Pressure Sensors in Plush Toys to Detect Fine-Grained Interaction. 82-90
- Dennis Shasha:
Efficient Go Bags. 92
Volume 68, Number 5, May 2025
- Moshe Y. Vardi:
Big Tech, You Need Academia. Speak Up! 5
- Robin K. Hill:
In Pursuit of Professionalism. 6-7
- Samuel Greengard:
Shining a Light on AI Hallucinations. 9-11 - Esther Shein:
The Outlook for Programmers. 12-14 - Sandrine Ceurstemont:
Automating Tools for Prompt Engineering. 15-17
- James Grimmelmann
:
The TikTok Ban and Its Consequences. 18-20
- Sabine Weber
:
Can We Build AI That Does Not Harm Queer People? 21-23
- Mona Sloane
:
Boolean Clashes: Discretionary Decision Making in AI-Driven Recruiting. 24-26 - Antonis C. Kakas
:
The Pollution of AI. 27-30
- Andrew Quinn, Peter Alvaro:
Deterministic Record-and-Replay. 32-34
- Jean-Yves Marion
:
Ransomware: Extortion Is My Business. 36-47 - Jizhi Zhang
, Keqin Bao
, Wenjie Wang
, Yang Zhang
, Wentao Shi
, Wanhong Xu
, Fuli Feng
, Tat-Seng Chua
:
Envisioning Recommendations on an LLM-Based Agent Platform. 48-57 - Annalu Waller
, Tom Griffiths
, Per Ola Kristensson
:
'What I Think about When I Type about Talking': Reflections on Text-Entry Acceleration Interfaces. 58-68 - Peter Buneman
, Dennis Dosso
, Matteo Lissandrini
, Gianmaria Silvello
, He Sun:
Can We Measure the Impact of a Database? 69-76
- Yatish Turakhia:
Toward a Generalized Accelerator for Genome Sequence Analysis. 80 - Yufeng Gu, Arun Subramaniyan, Timothy Dunn, Alireza Khadem, Kuan-Yu Chen, Somnath Paul, Mohammad Vasimuddin, Sanchit Misra, David T. Blaauw, Satish Narayanasamy, Reetuparna Das:
GenDP: A Framework of Dynamic Programming Acceleration for Genome Sequencing Analysis. 81-90 - Tim Kraska:
A Write-Optimized Distributed B+Tree Index on Disaggregated Memory. 91 - Qing Wang
, Youyou Lu
, Jiwu Shu
:
Designing an Efficient Tree Index on Disaggregated Memory. 92-100
- Mina Rezaei:
Explorers' Intangible Power.
Volume 68, Number 6, June 2025
- Vinton G. Cerf:
Revenge of the Bots. 5
- Micah D. Beck:
Accept the Consequences. 6-7
- Neil Savage:
A Rewarding Line of Work. 8-10 - Neil Savage
:
The Collapse of GPT. 11-13 - Esther Shein:
AI and Art. 14-16 - Gregory Mone:
Bringing AI to the Edge. 17-19
- Steven M. Bellovin:
Computer Science and the Law. 20-22
- Peter J. Denning:
In Large Language Models We Trust? 23-25
- George V. Neville-Neil:
Analyzing Krazy Kode. 26-27
- Sebastian Mateos Nicolajsen
, Claus Brabrand
:
What Is Programming? 28-30 - Stephen J. Andriole, Noah P. Barsky
:
Thoughts about Some Surprising AI-Era Technology Readiness Findings. 31-33 - Bruce Schneier, Davi Ottenheimer:
Web 3.0 Requires Data Integrity. 34-36
- Marc Brooker, Ankush Desai:
Systems Correctness Practices at Amazon Web Services. 38-42
- Chen Avin
, Stefan Schmid
:
Revolutionizing Datacenter Networks via Reconfigurable Topologies. 44-53 - Chirag Shah
:
From Prompt Engineering to Prompt Science with Humans in the Loop. 54-61 - Aditya K. Sood
, Sherali Zeadally
:
Malicious AI Models Undermine Software Supply-Chain Security. 62-71
- Christine Paulin-Mohring:
When Proofs Meet Programs: An Extension of Dependent Type Theory with Church's Thesis. 74 - Pierre-Marie Pédrot
:
'Upon This Quote I Will Build My Church Thesis'. 75-83 - Parosh Aziz Abdulla:
A Symbolic Approach to Verifying Quantum Systems. 84 - Yu-Fang Chen
, Kai-Min Chung
, Ondrej Lengál
, Jyun-Ao Lin
, Wei-Lun Tsai
, Di-De Yen
:
An Automata-Based Framework for Verification and Bug Hunting in Quantum Circuits. 85-93
- Leah Hoffmann:
Developing the Foundations of Reinforcment Learning.
Volume 68, Number 7, July 2025
- Moshe Y. Vardi:
I Teach Computer Science, and That Is Not All. 5
- Alex Tray:
The Ethical Implications of Online Computer Science Education. 6-8
- Samuel Greengard:
The Emerging Face of Digital Dentistry. 9-11 - Logan Kugler:
Advancements in Weather Prediction. 12-14 - Logan Kugler:
Computer Science under Trump. 15-17
- Michael A. Cusumano:
DeepSeek Inside: Origins, Technology, and Impact. 18-22
- Sebastian Zimmeck
:
Beyond the Checkbox: Upgrading the Right to Opt Out. 23-25
- Pamela Samuelson:
AI Authorship Revisited. 26-28
- Mahjabin Nahar
, Sian Lee
, Rebekah Guillen
, Dongwon Lee
:
Generative Artificial Intelligence Policies under the Microscope. 29-33 - Brett Danaher, Jonathan Hersh, Michael D. Smith, Rahul Telang:
Fighting Crime Online. 34-36 - Isabel Corpus
, Eric Giannella
, Allison Koenecke
, Don Moynihan
:
As Government Outsources More IT, Highly Skilled In-House Technologists Are More Essential. 37-40
- Andrew A. Chien, Hartmut Schmeck:
Welcome: Sustainability and Computing Special Section. 42-44 - Adrien Berthelot
, Eddy Caron
, Mathilde Jay
, Laurent Lefèvre:
Understanding the Environmental Impact of Generative AI Services. 46-53 - Pengfei Li
, Jianyi Yang
, Mohammad A. Islam
, Shaolei Ren
:
Making AI Less 'Thirsty'. 54-61 - Dustin Wright
, Christian Igel
, Gabrielle Samuel
, Raghavendra Selvan
:
Efficiency Is Not Enough: A Critical Perspective on Environmentally Sustainable AI. 62-69 - Mohammad Hajiesmaili
, Shaolei Ren
, Ramesh K. Sitaraman
, Adam Wierman
:
Toward Environmentally Equitable AI. 70-73 - Alexander Kilian
, Hermann de Meer, Gunnar Schomaker:
Energy-Optimized Supercomputer Networks Using Wind Energy. 74-79 - Sydney Young
, Udit Gupta
, Josiah D. Hester
:
Empowering Users to Make Sustainability-Forward Decisions for Computing Services. 80-85 - Jasmine Lu, Pedro Lopes:
Full Stack Recycling Approaches for Computing Devices. 86-91 - Runlong Yu
, Yiqun Xie, Xiaowei Jia:
Environmental Computing as a Branch of Science. 92-94 - Raimundo José de Araújo Macêdo
, Marcelo Pias
, Esteban Clua
, Marilton S. de Aguiar
, Pedro Ribeiro de Andrade
, Alirio Santos de Sá, Eulanda M. dos Santos
, José Campos dos Santos, Lúbia Vinhas
:
A Brazilian Perspective on Computing for the Planet's Sustainability. 96-101 - Nikolas Herbst
, Mareike Kortmann
, Niklas Jaggy
, Frank Thonfeld
, Cristina L. Abad
, Claudia Kuenzer
, Jörg Müller
, Samuel Kounev
:
Continuous Earth Observation of Forest Dynamics and Biodiversity. 102-107
- Michael Davies
, Karthikeyan Sankaralingam
:
Defying Moore: Envisioning the Economics of a Semiconductor Revolution through 12nm Specialization. 108-119 - Christos Dimoulas
, Matthias Felleisen
:
The Rational Programmer: Investigating Programming Language Pragmatics. 120-130
- Dennis Shasha
:
Electoral Trickery.
Volume 68, Number 8, August 2025
- Vinton G. Cerf:
On Notifications. 5
- David Geerts:
The Transformative Power of Inspiration. 7
- Fan Wang, Shaoshan Liu:
Empowering Virtual Agents With Intelligent Systems. 8-9
- Sarah Underwood:
The Power and Potential of Zero-Knowledge Proofs. 11-13 - Paul Marks:
Clock Bait: Why the Moon Needs Its Own Time Zone. 14-16 - Samuel Greengard:
A Quantum Leap Forward. 17-19
- Rahul Telang, Muhammad Zia Hydari:
Balancing Secrecy and Transparency in Bug Bounty Programs. 20-23
- George V. Neville-Neil:
Can't We Have Nice Things? 24-25
- Bernd Carsten Stahl, Susan J. Winter:
The Future of Professional Ethics in Computing. 26-28
- Bruce Schneier:
AI and Trust. 29-33 - Eman Alashwali:
Two Types of Data-Privacy Controls. 34-35
- Henrik Skaug Sætra:
To Post or Not to Post: AI Ethics in theAge of Big Tech. 38-49 - David A. Basin, Nate Foster, Kenneth L. McMillan, Kedar S. Namjoshi, Cristina Nita-Rotaru, Jonathan M. Smith, Pamela Zave, Lenore D. Zuck:
It Takes a Village: Bridging the Gaps between Current and Formal Specifications for Protocols. 50-61 - Vaibhav Garg, Hui Guo, Nirav Ajmeri, Saikath Bhattacharya, Munindar P. Singh:
Understanding Mobile App Reviews to Guide Misuse Audits. 62-71 - Francesco Fabiano, Marianna Bergamaschi Ganapini, Andrea Loreggia, Nicholas Mattei, Keerthiram Murugesan, Vishal Pallagani, Francesca Rossi, Biplav Srivastava, Kristen Brent Venable:
Thinking Fast and Slow in Human and Machine Intelligence. 72-79
- Stefan Saroiu:
Defending Data from SRAM-Based Attacks. 81 - Jubayer Mahmod, Matthew Hicks:
SRAM Has No Chill: Exploiting Power Domain Separation to Steal On-Chip Secrets. 82-90
- Philip Feldman:
Organizational Lobotomy.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.