acm-header
Sign In

Communications of the ACM

Recent Articles


bg-corner

Security by Labeling
From Communications of the ACM

Security by Labeling

Protecting and empowering the digital consumer.

Can Neural Networks Learn Better than Human Neurons?
From ACM Opinion

Can Neural Networks Learn Better than Human Neurons?

When AI programmers stop trying to copy the human neuron, neural networks make much better progress.

When Should a Black Box Be Transparent?
From Communications of the ACM

When Should a Black Box Be Transparent?

When is a replacement not a replacement?

An Interview with Dana Scott
From Communications of the ACM

An Interview with Dana Scott

ACM Fellow and A.M. Turing Award recipient Dana Scott reflects on his career.

Transforming Science through Cyberinfrastructure
From Communications of the ACM

Transforming Science through Cyberinfrastructure

NSF's vision for the U.S. cyberinfrastructure ecosystem for science and engineering in the 21st century.

Algorithms with Predictions
From Communications of the ACM

Algorithms with Predictions

Seeking a new approach that goes beyond worst-case analysis.

Cookie Monster
From Communications of the ACM

Cookie Monster

Inscrutable cookie banners torment users while failing to inform consent.

The Future of Information Work
From Communications of the ACM

The Future of Information Work

Considering the recent effects of remote work on network structure.

Our House Is On Fire
From Communications of the ACM

Our House Is On Fire: The Climate Emergency and Computing's Responsibility

Efficiencies delivered by computing technology could play a vital role in enabling continued functionality within a resource-constrained future.

The Planning and Care of Data
From Communications of the ACM

The Planning and Care of Data

Rearranging buckets for no good reason.

Involvement and Detachment
From Communications of the ACM

Involvement and Detachment

How detachment from your community blocks your success at leading innovations, and what to do about it.

Information: 'I' vs. 'We' vs. 'They'
From Communications of the ACM

Information: 'I' vs. 'We' vs. 'They'

Seeking a balance between protecting and using personal data.

Cybersecurity as Illuminator for the Future of Computing Research
From Communications of the ACM

Cybersecurity as Illuminator for the Future of Computing Research

Considering the shifting fundamentals of cybersecurity research.

Can Open Source Sustain Itself without Losing Its Soul?
From ACM Opinion

Can Open Source Sustain Itself without Losing Its Soul?

What it means to be an open source contributor or maintainer has changed in recent years.

The AI in a Jar
From ACM Opinion

The AI in a Jar

Exploring a metaphysical argument against artificial intelligence.

Systems Abstractions
From Communications of the ACM

Systems Abstractions

Computing professionals use powerful abstractions to tame complexity in large software systems and distributed networks.

Getting Off the Mad Path
From Communications of the ACM

Getting Off the Mad Path

Debuggers and assertions.

Explainable AI
From Communications of the ACM

Explainable AI

Opening the black box or Pandora's Box?

Yoshua Bengio: 'I Have Rarely Been as Enthusiastic about a New Research Direction'
From ACM Opinion

Yoshua Bengio: 'I Have Rarely Been as Enthusiastic about a New Research Direction'

Yoshua Bengio gushes about GFlowNets, calling them "a new beast" for which the appropriate optimization algorithms are still making rapid progress

The Troubling Future for Facial Recognition Software
From Communications of the ACM

The Troubling Future for Facial Recognition Software

Considering the myriad perspectives of facial recognition technology.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account