All Stories

  1. Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience
  2. More Is Different, in Social Media Too
  3. What Do Computing and Economics Have to Say to Each Other?
  4. Computing, You Have Blood on Your Hands!
  5. What Came First, Math or Computing?
  6. To Regulate Tech, Nullify Click-Through Contracts
  7. Revisiting ACM's Open-Conference Principle
  8. ACM for the Public Good
  9. The sand-heap paradox of privacy and influence
  10. Program verification
  11. The agency trilemma and ACM
  12. Deep Tech Ethics: An Approach to Teaching Social Justice in Computer Science
  13. The people vs. tech
  14. Strategy Logic with Imperfect Information
  15. Reboot the computing-research publication systems
  16. On uniformly sampling traces of a transition system
  17. What should be done about social media?
  18. Where have all the domestic graduate students gone?
  19. A computational lens on economics
  20. Advancing computing as a science and profession
  21. Publish and perish
  22. The winner-takes-all tech corporation
  23. The long game of research
  24. To serve humanity
  25. Quantum hype and quantum skepticism
  26. Lost in math?
  27. Are we having an ethical crisis in computing?
  28. Self-reference and section 230
  29. Move fast and break things
  30. Sequential Relational Decomposition
  31. How the hippies destroyed the internet
  32. How we lost the women in computing
  33. Open access and ACM
  34. A declaration of the dependence of cyberspace
  35. Computer professionals for social responsibility
  36. Would Turing have won the Turing award?
  37. Divination by program committee
  38. A Theory of Regular Queries
  39. The moral hazard of complexity-theoretic assumptions
  40. Does query evaluation tractability help query containment?
  41. Semantic acyclicity on graph databases
  42. Why ACM?
  43. Compositional Temporal Synthesis
  44. Predatory scholarly publishing
  45. What is an algorithm?
  46. Hypercriticality
  47. Is the image crisis over?
  48. The financial meltdown and computing
  49. Open, closed, or clopen access?
  50. "Yes, it can be done"
  51. How are we doing?
  52. Let us---together---make CACM exciting
  53. Robust Satisfaction
  54. Module checking revisited
  55. Module checking
  56. Alternating automata and program verification
  57. On decomposition of relational databases
  58. The Büchi Complementation Saga
  59. Symbolic Techniques in Satisfiability Solving
  60. Verification of Open Systems
  61.  Globalization and Offshoring of Software
  62. LTL Satisfiability Checking
  63. From Monadic Logic to PSL