acm-header
Sign In

Communications of the ACM

Table of Contents


DEPARTMENT: Editor's letter

2021: Computing's Divided Future

China and the West's fundamental systemic differences and growing geopolitical competition are increasingly open. The new reality is pulling the computing community apart, and spilling over into the academic and research communities …
DEPARTMENT: Departments

Reboot the Computing-Research Publication Systems

The virtualization of conferences due to COVID-19 has sharpened my conviction that the computing-research publication system is badly broken and in need of a serious reboot.
DEPARTMENT: Career paths in computing

A Career Fueled by HPC

In a world of nuance and interpretation, the objectivity of math spoke to me (and still does). To be able to use applied math to do science through the use of very large-scale computers was magic.
DEPARTMENT: BLOG@CACM

Talking about Race in CS Education

Mark Guzdial suggests computer science education needs to change, to better serve the needs of students and society.
COLUMN: News

Geometric Deep Learning Advances Data Science

Researchers are pushing beyond the limitations of convolutional neural networks using geometric deep learning techniques.

Fugaku Takes the Lead

Japan tops the Top500 supercomputer rankings, for the moment.

Coalition of the Willing Takes Aim at COVID-19

Data science can only do so much in the face of a pandemic.
COLUMN: Technology strategy and management

Boeing's 737 MAX: A Failure of Management, Not Just Technology

Tracing the trajectory of management and engineering decisions resulting in systemic catastrophe.
COLUMN: Security

Cybersecurity Research for the Future

Considering the wide range of technological and societal trade-offs associated with cybersecurity.
COLUMN: Law and technology

Content Moderation Modulation

Deliberating on how to regulate—or not regulate—online speech in the era of evolving social media.
COLUMN: Historical reflections

The Immortal Soul of an Old Machine

Taking apart a book to figure out how it works.
COLUMN: Viewpoint

Insights for AI from the Human Mind

How the cognitive sciences can inform the quest to build systems with the flexibility of the human mind.

Excessive Use of Technology: Can Tech Providers be the Culprits?

Seeking to assess the possible responsibility of tech providers for excessive use patterns.
SECTION: Practice

The Identity in Everyone's Pocket

Keeping users secure through their smartphones.

The Die is Cast

Hardware security is not assured.
SECTION: Contributed articles

Does Facebook Use Sensitive Data for Advertising Purposes?

Facebook labels 67% of its users with potential sensitive interests, sometimes at great risk to the user.

Digital Instruments as Invention Machines

An analysis of patenting history from 1850 to 2010 to detect long-term patterns of knowledge spillovers via prior-art citations of patented inventions.

How to Transition Incrementally to Microservice Architecture

A field study examines technological advances that have created versatile software ecosystems to develop and deploy microservices.
SECTION: Review articles

Secure Multiparty Computation

MPC has moved from theoretical study to real-world usage. How is it doing?

The Ethics of Zero-Day Exploits: The NSA Meets the Trolley Car

Are U.S. government employees behaving ethically when they stockpile software vulnerabilities?
SECTION: Research highlights

Technical Perspective: Deciphering Errors to Reduce the Cost of Quantum Computation

In "Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes," by Omar Fawzi, et al., the authors produce an algorithm that can rapidly deduce the error in a quantum expander code, even when the syndrome is partially …

Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes

In this paper, we study the asymptotic scaling of the space overhead needed for fault-tolerant quantum computation.

Technical Perspective: SkyCore's Architecture Takes It to the 'Edge'

"SkyCore," by Mehrdad Moradi, et al., addresses an exciting use case for Unmanned Aerial Vehicles in which UAVs can act as mobile base stations for the cellular network, flying to areas in the network in order to improve wireless …

SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-Based LTE Networks

We argue for and propose an alternate, radical edge evolved packet core design, called SkyCore, that pushes the EPC functionality to the extreme edge of the core network.
COLUMN: Last byte

Stay in Balance

No tipping.