The Communications of the
ACM is, since 1958, the flagship magazine/journal of the Association for Computing Machinery, a
professional society for computer scientists and computing
professionals. In its current format, which dates to a revamp
initiated by incoming editor Moshe Vardi in 2008, it carries a mixture
of news items, interviews, op-eds, columns (1–3 pages ea.), articles
on current topics in computing practice (3–8 pages ea.), and submitted
short- to medium-length research papers or review articles (8–12
pages ea.).
In each issue, a few articles (but not all) are open
access. Infuriatingly, the table of contents does not say which ones. You can
find out by picking an article and clicking, upon which you'll either be
redirected to a URL ending in .../fulltext
if you can access it,
or one ending in .../abstract
if you can't. As an ACM member, I do
subscribe to the print edition, and could log in to read everything online. But
I also sometimes like to link other people to non-paywalled articles on the
internet, so it would be nice to easily know which ones are OA.
Therefore I wrote a simple script to do this for me, scraping the
table of contents for every issue, and then doing an HTTP HEAD request
for each article, to see whether it redirects to the abstract or
fulltext. The results are below, supplying the missing index of
open-access CACM articles.
Index of OA articles
These are the CACM articles that were open-access as of March
14, 2016 February 11, 2018. I only list regular articles here, not including
introductions, letters to the editor, interviews, news items, columns,
op-eds, etc. Some of those are also interesting and OA, but to keep
this list browseable I'm limiting it to just articles.
There's a lot of good material below, which I hope more people will read.
There's of course even more good material in CACM that's
unfortunately not below. For the rest, you could join ACM or browse from your
local library, among other options.
2007
January
2008
July
- XML Fever, by Erik Wilde, Robert J. Glushko, pages 40–46
- Flash Storage Memory, by Adam Leventhal, pages 47–51
- Beyond Relational Databases, by Margo Seltzer, pages 52–58
- Web Science: An Interdisciplinary Approach to Understanding the Web, by James Hendler, Nigel Shadbolt, Wendy Hall, Tim Berners-Lee, Daniel Weitzner, pages 60–69
- The Revolution Inside the Box, by Mark Oskin, pages 70–78
- Transactional Memory, by James Larus, Christos Kozyrakis, pages 80–88
- Anton, A Special-Purpose Machine for Molecular Dynamics Simulation, by David E. Shaw, Martin M. Deneroff, Ron O. Dror, Jeffrey S. Kuskin, Richard H. Larson, John K. Salmon, Cliff Young, Brannon Batson, Kevin J. Bowers, Jack C. Chao, Michael P. Eastwood, Joseph Gagliardo, J. P. Grossman, C. Richard Ho, Douglas J. Ierardi, Ist, pages 91–97
- The Emergence of a Networking Primitive in Wireless Sensor Networks, by Philip Levis, Eric Brewer, David Culler, David Gay, Samuel Madden, Neil Patel, Joe Polastre, Scott Shenker, Robert Szewczyk, Alec Woo, pages 99–106
August
September
- How Do I Model State?: Let Me Count the Ways, by Ian Foster, Savas Parastatidis, Paul Watson, Mark Mckeown, pages 34–41
- Powering Down, by Matthew Garrett, pages 42–46
- Software Engineering and Formal Methods, by Mike Hinchey, Michael Jackson, Patrick Cousot, Byron Cook, Jonathan P. Bowen, Tiziana Margaria, pages 54–59
October
- Code Spelunking Redux, by George V. Neville-Neil, pages 36–41
- Document Design Matters, by Erik Wilde, Robert J. Glushko, pages 43–49
- A Closer Look at GPUs, by Kayvon Fatahalian, Mike Houston, pages 50–57
- The Many Facets of Natural Computing, by Lila Kari, Grzegorz Rozenberg, pages 72–83
- Scene Completion Using Millions of Photographs, by James Hays, Alexei A. Efros, pages 87-94
November
- Real-World Concurrency, by Bryan Cantrill, Jeff Bonwick, pages 34–39
- Software Transactional Memory: Why is it Only a Research Toy?: why is it only a research toy?, by Calin Cascaval, Colin Blundell, Maged Michael, Harold W. Cain, Peng Wu, Stefanie Chiras, Siddhartha Chatterjee, pages 40–46
December
2009
January
February
March
April
May
June
July
August
September
- Reveling in Constraints, by Bruce Johnson, pages 44–48
- Monitoring and Control of Large Systems With MonALISA, by Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan, pages 49–55
- Making Sense of Revision-Control Systems, by Bryan O'Sullivan, pages 56–62
- Sound Index: Charts for the People, By the People, by Varun Bhagwan, Tyrone Grandison, Daniel Gruhl, pages 64–70
- The Status of the P Versus NP Problem, by Lance Fortnow, pages 78–86
October
- Probing Biomolecular Machines with Graphics Processors, by James C. Phillips, John E. Stone, pages 34–41
- Unifying Biological Image Formats with HDF5, by Matthew T. Dougherty, Michael J. Folk, Erez Zadok, Herbert J. Bernstein, Frances C. Bernstein, Kevin W. Eliceiri, Werner Benger, Christoph Best, pages 42–47
- A Conversation with David E. Shaw, by CACM Staff, pages 48–54
- A View of the Parallel Computing Landscape, by Krste Asanovic, Rastislav Bodik, James Demmel, Tony Keaveny, Kurt Keutzer, John Kubiatowicz, Nelson Morgan, David Patterson, Koushik Sen, John Wawrzynek, David Wessel, Katherine Yelick, pages 56–67
November
- Communications Surveillance: Privacy and Security at Risk, by Whitfield Diffie, Susan Landau, pages 42–47
- Four Billion Little Brothers?: Privacy, Mobile Phones, and Ubiquitous Data Collection, by Katie Shilton, pages 48–53
- You Don't Know Jack About Software Maintenance, by Paul Stachour, David Collier-Brown, pages 54–58
- Scratch: Programming for All, by Mitchel Resnick, John Maloney, Andrés Monroy-Hernández, Natalie Rusk, Evelyn Eastmond, Karen Brennan, Amon Millner, Eric Rosenbaum, Jay Silver, Brian Silverman, Yasmin Kafai, pages 60–67
- Turing Lecture: Model Checking: Algorithmic Verification and Debugging, by Edmund M. Clarke, E. Allen Emerson, Joseph Sifakis, pages 74–84
December
- A 'Smart' Cyberinfrastructure for Research, by Savas Parastatidis, Evelyne Viegas, Tony Hey, pages 33–37
- A Threat Analysis of RFID Passports, by Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo, pages 38–42
- What DNS Is Not, by Paul Vixie, pages 43–47
- Maximizing Power Efficiency with Asymmetric Multicore Systems, by Alexandra Fedorova, Juan Carlos Saez, Daniel Shelepov, Manuel Prieto, pages 48–57
- Computer Science in the Conceptual Age, by Michael Zyda, pages 66–72
- Computer Games and Traditional CS Courses, by Kelvin Sung, pages 74–78
2010
January
- Data in Flight, by Julian Hyde, pages 48–52
- Other People's Data, by Stephen Petschulat, pages 53–57
- Triple-Parity RAID and Beyond, by Adam Leventhal, pages 58–63
- MapReduce and Parallel DBMSs: Friends or Foes?, by Michael Stonebraker, Daniel Abadi, David J. DeWitt, Sam Madden, Erik Paulson, Andrew Pavlo, Alexander Rasin, pages 64–71
- MapReduce: A Flexible Data Processing Tool, by Jeffrey Dean, Sanjay Ghemawat, pages 72–77
- Can Automated Agents Proficiently Negotiate With Humans?, by Raz Lin, Sarit Kraus, pages 78–88
February
- Power-Efficient Software, by Eric Saxe, pages 44–48
- Managing Contention for Shared Resources on Multicore Processors, by Alexandra Fedorova, Sergey Blagodurov, Sergey Zhuravlev, pages 49–57
- Software Model Checking Takes Off, by Steven P. Miller, Michael W. Whalen, Darren D. Cofer, pages 58–64
- A Few Billion Lines of Code Later: Using Static Analysis to Find Bugs in the Real World, by Al Bessey, Ken Block, Ben Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, Dawson Engler, pages 66–75
- Assessing the Changing U.S. IT R&D Ecosystem, by Eric Benhamou, Jon Eisenberg, Randy H. Katz, pages 76–83
- Recent Progress in Quantum Algorithms, by Dave Bacon, Wim van Dam, pages 84–93
March
- GFS: Evolution on Fast-Forward, by Kirk McKusick, Sean Quinlan, pages 42–49
- Toward Energy-Efficient Computing, by David J. Brown, Charles Reams, pages 50–58
- Global IT Management: Structuring for Scale, Responsiveness, and Innovation, by Siew Kien Sia, Christina Soh, Peter Weill, pages 59–64
- Chasing the AIDS Virus, by Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser, pages 66–74
- Making Decisions Based on the Preferences of Multiple Agents, by Vincent Conitzer, pages 84–94
April
- Cooling the Data Center, by Andy Woods, pages 36–42
- A View of Cloud Computing, by Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia, pages 50–58
- Recipe for Efficiency: Principles of Power-Aware Computing, by Parthasarathy Ranganathan, pages 60–67
May
- Enhanced Debugging With Traces, by Peter Phillips, pages 50–53
- Principles of Robust Timing Over the Internet, by Julien Ridoux, Darryl Veitch, pages 54–61
- Why Cloud Computing Will Never Be Free, by Dave Durkee, pages 62–69
- Beyond Total Capture: A Constructive Critique of Lifelogging, by Abigail J. Sellen, Steve Whittaker, pages 70–77
- Energy-Efficient Algorithms, by Susanne Albers, pages 86–96
June
- Securing Elasticity in the Cloud, by Dustin Owens, pages 46–51
- Simplicity Betrayed, by George Phillips, pages 52–58
- A Tour Through the Visualization Zoo, by Jeffrey Heer, Michael Bostock, Vadim Ogievetsky, pages 59–67
- Managing Scientific Data, by Anastasia Ailamaki, Verena Kantere, Debabrata Dash, pages 68–78
July
August
- An Interview With Edsger W. Dijkstra, by Thomas J. Misa, pages 41–47
- Software Development with Code Maps, by Robert DeLine, Gina Venolia, Kael Rowan, pages 48–54
- Seven Principles for Selecting Software Packages, by Jan Damsgaard, Jan Karlsbjerg, pages 63–71
- The Singularity System, by James Larus, Galen Hunt, pages 72–79
- Memory Models: A Case for Rethinking Parallel Languages and Hardware, by Sarita V. Adve, Hans-J. Boehm, pages 90–101
September
- Future Internet Architecture: Clean-Slate Versus Evolutionary Research, by Jennifer Rexford, Constantine Dovrolis, pages 36–40
- Computers in Patient Care: The Promise and the Challenge, by Stephen V. Cantrill, pages 42–47
- Injecting Errors for Fun and Profit, by Steve Chessin, pages 48–54
- Thinking Clearly About Performance, Part 1, by Cary Millsap, pages 55–60
- Erlang, by Joe Armstrong, pages 68–75
October
- Thinking Clearly About Performance, Part 2, by Cary Millsap, pages 39–45
- Tackling Architectural Complexity with Modeling, by Kevin Montagne, pages 46–52
- A Neuromorphic Approach to Computer Vision, by Thomas Serre, Tomaso Poggio, pages 54–61
- Peer-to-Peer Systems, by Rodrigo Rodrigues, Peter Druschel, pages 72–82
November
- The Case Against Data Lock-In, by Brian W. Fitzpatrick, JJ Lueck, pages 42–46
- Keeping Bits Safe: How Hard Can It Be?, by David S. H. Rosenthal, pages 47–55
- Sir, Please Step Away from the ASR-33!, by Poul-Henning Kamp, pages 56–57
- Understanding Throughput-Oriented Architectures, by Michael Garland, David B. Kirk, pages 58–66
- Using Complexity to Protect Elections, by Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra, pages 74–82
December
2011
January
- Collaboration in System Administration, by Eben M. Haber, Eser Kandogan, Paul P. Maglio, pages 46–53
- Virtualization: Blessing or Curse?, by Evangelos Kotsovinos, pages 61–65
- Using Simple Abstraction to Reinvent Computing for Parallelism, by Uzi Vishkin, pages 75–85
- A Firm Foundation for Private Data Analysis, by Cynthia Dwork, pages 86–95
February
March
- Computer and Information Science and Engineering: One Discipline, Many Specialties, by Marc Snir, pages 38–43
- Testable System Administration, by Mark Burgess, pages 44–49
- National Internet Defense – Small States on the Skirmish Line, by Ross Stapleton-Gray, William Woodcock, pages 50–55
- Plug-and-Play Macroscopes, by Katy Börner, pages 60–69
- The Informatics Philharmonic, by Christopher Raphael, pages 87–93
- Reaching Out to the Media: Become a Computer Science Ambassador, by Frances Rosamond, Roswitha Bardohl, Stephan Diehl, Uwe Geisler, Gordon Bolduan, Annette Lessmöllmann, Andreas Schwill, Ulrike Stege, pages 113–116
April
- Returning Control to the Programmer: SIMD Intrinsics for Virtual Machines, by Jonathan Parri, Daniel Shapiro, Miodrag Bolic, Voicu Groza, pages 38–43
- Successful Strategies for IPv6 Rollouts. Really., by Thomas A. Limoncelli, Vinton G. Cerf, pages 44–48
- A Co-Relational Model of Data for Large Shared Data Banks, by Erik Meijer, Gavin Bierman, pages 49–58
- Design Principles for Visual Communication, by Maneesh Agrawala, Wilmot Li, Floraine Berthouzoz, pages 60–69
- Reflecting on the DARPA Red Balloon Challenge, by John C. Tang, Manuel Cebrian, Nicklaus A. Giacobe, Hyun-Woo Kim, Taemie Kim, Douglas "Beaker" Wickert, pages 78–85
- Crowdsourcing Systems on the World-Wide Web, by Anhai Doan, Raghu Ramakrishnan, Alon Y. Halevy, pages 86–96
May
- The One-Second War, by Poul-Henning Kamp, pages 44–48
- Mobile Application Development: Web vs. Native, by Andre Charland, Brian Leroux, pages 49–53
- Weapons of Mass Assignment, by Patrick McKenzie, pages 54–59
- Brain-Computer Interfaces for Communication and Control, by Dennis J. McFarland, Jonathan R. Wolpaw, pages 60–66
- The Future of Microprocessors, by Shekhar Borkar, Andrew A. Chien, pages 67–77
- Proving Program Termination, by Byron Cook, Andreas Podelski, Andrey Rybalchenko, pages 88–98
June
- If You Have Too Much Data, then 'Good Enough' Is Good Enough, by Pat Helland, pages 40–47
- Scalable SQL, by Michael Rys, pages 48–53
- Does Deterrence Work in Reducing Information Security Policy Abuse by Employees?, by Qing Hu, Zhengchuan Xu, Tamara Dinev, Hong Ling, pages 54–60
- 10 Rules for Scalable Performance in Simple Operation' Datastores, by Michael Stonebraker, Rick Cattell, pages 72-80
- PageRank: Standing on the Shoulders of Giants, by Massimo Franceschet, pages 92–101
July
- Passing a Language Through the Eye of a Needle, by Roberto Ierusalimschy, Luiz Henrique De Figueiredo, Waldemar Celes, pages 38–43
- DSL for the Uninitiated, by Debasish Ghosh, pages 44–50
- Algorithmic Composition: Computational Thinking in Music, by Michael Edwards, pages 58–67
- A Decade of Software Model Checking with SLAM, by Thomas Ball, Vladimir Levin, Sriram K. Rajamani, pages 68–76
- Searching for Jim Gray: A Technical Overview, by Joseph M. Hellerstein, David L. Tennenhouse, pages 77–87
- The Case for RAMCloud, by John Ousterhout, Parag Agrawal, David Erickson, Christos Kozyrakis, Jacob Leverich, David Mazières, Subhasish Mitra, Aravind Narayanan, Diego Ongaro, Guru Parulkar, Mendel Rosenblum, Stephen M. Rumble, Eric Stratmann, Ryan Stutsman, pages 121–130
August
- The Robustness Principle Reconsidered, by Eric Allman, pages 40–45
- Computing Without Processors, by Satnam Singh, pages 46–54
- The Pain of Implementing LINQ Providers, by Oren Eini, pages 55–61
- Cognitive Computing, by Dharmendra S. Modha, Rajagopal Ananthanarayanan, Steven K. Esser, Anthony Ndirango, Anthony J. Sherbondy, Raghavendra Singh, pages 62–71
- An Overview of Business Intelligence Technology, by Surajit Chaudhuri, Umeshwar Dayal, Vivek Narasayya, pages 88–98
September
October
- Abstraction in Hardware System Design, by Rishiyur S. Nikhil, pages 36–44
- The World According to LINQ, by Erik Meijer, pages 45–51
- Verification of Safety-Critical Software, by B. Scott Andersen, George Romanski, pages 52–57
- Computational Journalism, by Sarah Cohen, James T. Hamilton, Fred Turner, pages 66–71
- Biology as Reactivity, by Jasmin Fisher, David Harel, Thomas A. Henzinger, pages 72–82
November
- Gender Demographics Trends and Changes in U.S. CS Departments, by Douglas Baumann, Susanne Hambrusch, Jennifer Neville, pages 38–42
- Java Security Architecture Revisited, by Li Gong, pages 48–52
- OCaml for the Masses, by Yaron Minsky, pages 53–58
- 'Natural' Search User Interfaces, by Marti A. Hearst, pages 60–67
- Nanonetworks: A New Frontier in Communications, by Ian F. Akyildiz, Josep Miquel Jornet, Massimiliano Pierobon, pages 84–89
- Information Seeking: Convergence of Search, Recommendations, and Advertising, by Hector Garcia-Molina, Georgia Koutrika, Aditya Parameswaran, pages 121–130
December
- How Will Astronomy Archives Survive the Data Tsunami?, by G. Bruce Berriman, Steven L. Groom, pages 52–56
- Coding Guidelines: Finding the Art in the Science, by Robert Green, Henry Ledgard, pages 57–63
- Visual Crowd Surveillance Through a Hydrodynamics Lens, by Brian E. Moore, Saad Ali, Ramin Mehran, Mubarak Shah, pages 64–73
- Safe to the Last Instruction: Automated Verification of a Type-Safe Operating System, by Jean Yang, Chris Hawblitzel, pages 123–131
2012
January
- Creating Languages in Racket, by Matthew Flatt, pages 48–56
- Bufferbloat: Dark Buffers in the Internet, by Jim Gettys, Kathleen Nichols, pages 57–65
- I/O Virtualization, by Carl Waldspurger, Mendel Rosenblum, pages 66–73
- The State of Phishing Attacks, by Jason Hong, pages 74–81
- (Computer) Vision Without Sight, by Roberto Manduchi, James Coughlan, pages 96–104
February
- Text-Mining the Voice of the People, by Nicholas Evangelopoulos, Lucian Visinescu, pages 62–69
- Software as a Service for Data Scientists, by Bryce Allen, John Bresnahan, Lisa Childers, Ian Foster, Gopi Kandaswamy, Raj Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, Karl Pickett, Steven Tuecke, pages 81–88
March
April
May
- Crossing the Software Education Chasm, by Armando Fox, David Patterson, pages 44–49
- An n-Gram Analysis of Communications 2000–2010, by Daniel S. Soper, Ofir Turel, pages 81-87
- Comparative Analysis of Protein Networks: Hard Problems, Practical Solutions, by Nir Atias, Roded Sharan, pages 88–97
June
July
- Google's Hybrid Approach to Research, by Alfred Spector, Peter Norvig, Slav Petrov, pages 34–37
- Computational Folkloristics, by James Abello, Peter Broadwell, Timothy R. Tangherlini, pages 60–70
- Behavioral Programming, by David Harel, Assaf Marron, Gera Weiss, pages 90–100
October
2013
October
2014
January
April
September
- Privacy, Anonymity, and Big Data in the Social Sciences, by Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew Dean Ho, Daniel Thomas Seaton, Isaac Chuang, pages 56–63
October
November
2015
January
February
May
October
December
2016
January
- Open Data and Civic Apps: First-Generation Failures, Second-Generation Improvements, by Melissa Lee, Esteve Almirall, Jonathan Wareham, pages 82–89
- Answering Enumeration Queries with the Crowd, by Beth Trushkowsky, Tim Kraska, Michael J. Franklin, Purnamrita Sarkar, pages 118–127
February
March
May
- Borg, Omega, and Kubernetes, by Brendan Burns, Brian Grant, David Oppenheimer, Eric Brewer, John Wilkes, pages 50–57
- The Challenges of Partially Automated Driving, by Stephen M. Casner, Edwin L. Hutchins, Don Norman, pages 70–77
June
- Enhancing Symbolic Execution with Veritesting, by Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley, pages 93–100
- Automan: A Platform For Integrating Human-Based and Digital Computation, by Daniel W. Barowy, Charlie Curtsinger, Emery D. Berger, Andrew McGregor, pages 102–109
July
- How Charles Bachman Invented the DBMS, a Foundation of Our Digital World, by Thomas Haigh, pages 25–30
- Why Google Stores Billions of Lines of Code in a Single Repository, by Rachel Potvin, Josh Levenberg, pages 78–87
- The Rise of Social Bots, by Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, Alessandro Flammini, pages 96–104
- Probabilistic Theorem Proving, by Vibhav Gogate, Pedro Domingos, pages 107–115
- Mesa: A Geo-Replicated Online Data Warehouse For Google's Advertising System, by Ashish Gupta, Fan Yang, Jason Govig, Adam Kirsch, Kelvin Chan, Kevin Lai, Shuo Wu, Sandeep Dhoot, Abhilash Rajesh Kumar, Ankur Agiwal, Sanjay Bhansali, Mingsheng Hong, Jamie Cameron, Masood Siddiqi, David Jones, Jeff Shute, Andrey Gubarev, Shivakumar Venkataraman, Divyakant Agrawal, pages 117–125
August
- Debugging Distributed Systems, by Ivan Beschastnikh, Patty Wang, Yuriy Brun, Michael D. Ernst, pages 32–37
- Computational Biology in the 21st Century: Scaling with Compressive Algorithms, by Bonnie Berger, Noah M. Daniels, Y. William Yu, pages 72–80
- Verifying Quantitative Reliability For Programs that Execute on Unreliable Hardware, by Michael Carbin, Sasa Misailovic, Martin C. Rinard, pages 83–91
September
- Why Data Citation Is a Computational Problem, by Peter Buneman, Susan Davidson, James Frew, pages 50–57
- Dynamic Presentation Consistency Issues in Smartphone Mapping Apps, by Hanan Samet, Sarana Nutanong, Brendan C. Fruin, pages 58–67
- Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network, by Arjun Singh, Joon Ong, Amit Agarwal, Glen Anderson, Ashby Armistead, Roy Bannon, Seb Boving, Gaurav Desai, Bob Felderman, Paulie Germano, Anand Kanagala, Hong Liu, Jeff Provost, Jason Simmons, Eiichi Tanda, Jim Wanderer, Urs Hölzle, Stephen Stuart, Amin Vahdat, pages 88–97
October
- A Brief Chronology of Medical Device Security, by A. J. Burns, M. Eric Johnson, Peter Honeyman, pages 66–72
- Incremental, Iterative Data Processing with Timely Dataflow, by Derek G. Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martin Abadi, pages 75–83
- Efficient Parallelization Using Rank Convergence in Dynamic Programming Algorithms, by Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz, pages 85–92
December
- Interactive Visualization of 3D Scanned Mummies at Public Venues, by Anders Ynnerman, Thomas Rydell, Daniel Antoine, David Hughes, Anders Persson, Patric Ljung, pages 72–81
- Anticipating Policy and Social Implications of Named Data Networking, by Katie Shilton, Jeffrey A. Burke, KC Claffy, Lixia Zhang, pages 92–101
2017
January
- Faucet: Deploying SDN in the Enterprise, by Josh Bailey, Stephen Stuart, pages 45–49
- Cell-Graphs: Image-Driven Modeling of Structure-Function Relationship, by Bülent Yener, pages 74–84
- Eulerian Video Magnification and Analysis, by Neal Wadhwa, Hao-Yu Wu, Abe Davis, Michael Rubinstein, Eugene Shih, Gautham J. Mysore, Justin G. Chen, Oral Buyukozturk, John V. Guttag, William T. Freeman, Frédo Durand, pages 87–95
February
- Bbr: Congestion-Based Congestion Control, by Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, Van Jacobson, pages 58–66
- Copyright Enforcement in the Digital Age: Empirical Evidence and Policy Implications, by Brett Danaher, Michael D. Smith, Rahul Telang, pages 68–75
March
- Making the Field of Computing More Inclusive, by Jonathan Lazar, Elizabeth F. Churchill, Tovi Grossman, Gerrit van der Veer, Philippe Palanque, John "Scooter" Morris, Jennifer Mankoff, pages 50–59
- The Path to the Top: Insights from Career Histories of Top CIOs, by Daniel J. Mazzola, Robert D. St. Louis, Mohan R. Tanniru, pages 60–68
- Computational Support For Academic Peer Review: A Perspective from Artificial Intelligence, by Simon Price, Peter A. Flach, pages 70–79
April
- Attack of the Killer Microseconds, by Luiz Barroso, Mike Marty, David Patterson, Parthasarathy Ranganathan, pages 48–54
- Computational Thinking For Teacher Education, by Aman Yadav, Chris Stephenson, Hai Hong, pages 55–62
- Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes, by Tej Chajed, Haogang Chen, Adam Chlipala, M. Frans Kaashoek, Nickolai Zeldovich, Daniel Ziegler, pages 75–84
May
- Toward a Ban on Lethal Autonomous Weapons: Surmounting the Obstacles, by Wendell Wallach, pages 28–34
- Who Owns the Social Web?, by Catherine C. Marshall, Frank M. Shipman, pages 52–61
- Listening to Professional Voices: Draft 2 of the ACM Code of Ethics and Professional Conduct, by Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith Miller, Kate Vazansky, Marty J. Wolf, pages 105–111
June
- Remaining Trouble Spots with Computational Thinking, by Peter J. Denning, pages 33–39
- The Scion Internet Architecture, by David Barrera, Laurent Chuat, Adrian Perrig, Raphael M. Reischuk, Pawel Szalachowski, pages 56–65
- ImageNet Classification with Deep Convolutional Neural Networks, by Alex Krizhevsky, Ilya Sutskever, Geoffrey E. Hinton, pages 84–90
July
August
- Now That We Can Write Simultaneously, How Do We Use That to Our Advantage?, by Ricardo Olenewa, Gary M. Olson, Judith S. Olson, Daniel M. Russell, pages 36–43
- Small-Data Computing: Correct Calculator Arithmetic, by Hans-J. Boehm, pages 44–49
- Turing's Pre-War Analog Computers: The Fatherhood of the Modern Computer Revisited, by Leo Corry, pages 50–58
- Data Science: Challenges and Directions, by Longbing Cao, pages 59–68
- The Science of Brute Force, by Marijn J. H. Heule, Oliver Kullmann, pages 70–79
- The Scalable Commutativity Rule: Designing Scalable Software For Multicore Processors, by Austin T. Clements, M. Frans Kaashoek, Eddie Kohler, Robert T. Morris, Nickolai Zeldovich, pages 83–90
September
- The Calculus of Service Availability, by Ben Treynor, Mike Dahlin, Vivek Rau, Betsy Beyer, pages 42–47
- Data Sketching, by Graham Cormode, pages 48–55
- Moving Beyond the Turing Test with the Allen AI Science Challenge, by Carissa Schoenick, Peter Clark, Oyvind Tafjord, Peter Turney, Oren Etzioni, pages 60–64
- Trust and Distrust in Online Fact-Checking Services, by Petter Bae Brandtzaeg, Asbjørn Følstad, pages 65–71
- Security in High-Performance Computing Environments, by Sean Peisert, pages 72–80
October
- Barriers to Refactoring, by Ewan Tempero, Tony Gorschek, Lefteris Angelis, pages 54–61
- Internet Advertising: Technology, Ethics, and a Serious Difference of Opinion, by Stephen B. Wicker, Kolbeinn Karlsson, pages 70–79
- A Large-Scale Study of Programming Languages and Code Quality in GitHub, by Baishakhi Ray, Daryl Posnett, Premkumar Devanbu, Vladimir Filkov, pages 91–100
November
- Is There a Single Method For the Internet of Things?, by Ivar Jacobson, Ian Spence, Pan-Wei Ng, pages 46–53
- Cambits: A Reconfigurable Camera System, by Makoto Odamaki, Shree K. Nayar, pages 54–61
- Healthcare Robotics, by Laurel D. Riek, pages 68–78
- Heads-Up Limit Hold'em Poker Is Solved, by Michael Bowling, Neil Burch, Michael Johanson, Oskari Tammelin, pages 81–88
December
- Bitcoin's Academic Pedigree, by Arvind Narayanan, Jeremy Clark, pages 36–45
- Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic, by Martin E. Hellman, pages 52–59
- Energy Efficiency: A New Concern For Application Software Developers, by Gustavo Pinto, Fernando Castor, pages 68–75
- A Theory Of Pricing Private Data, by Chao Li, Daniel Yang Li, Gerome Miklau, Dan Suciu, pages 79–86
2018
January
- Popularity Spikes Hurt Future Chances For Viral Propagation of Protomemes, by Michele Coscia, pages 70–77
- Information Hiding: Challenges For Forensic Experts, by Wojciech Mazurczyk, Steffen Wendzel, pages 86–94
- Halide: Decoupling Algorithms from Schedules For High-Performance Image Processing, by Jonathan Ragan-Kelley, Andrew Adams, Dillon Sharlet, Connelly Barnes, Sylvain Paris, Marc Levoy, Saman Amarasinghe, Frédo Durand, pages 106–115
February
- The Next Phase in the Digital Revolution: Intelligent Tools, Platforms, Growth, Employment, by John Zysman, Martin Kenney, pages 54–63
- Elements of the Theory of Dynamic Networks, by Othon Michail, Paul G. Spirakis, pages 72–82
- Which Is the Fairest (Rent Division) of Them All?, by Kobi Gal, Ariel D. Procaccia, Moshe Mash, Yair Zick, pages 93–100
Postscript: CACM and open access
ACM took its first step towards open access in 1999, moving from a
fully closed, traditional publishing model, to what's sometimes called
a "green
OA" model. ACM didn't make its own archives open-access (that
would be "gold OA"), but it did change its copyright terms so authors
now have blanket permission to self-archive papers in an open-access
repository of their choice, such as an institutional repository or arXiv.org's CoRR.
In the 2008 discussions about overhauling the journal, a substantial
portion of the membership would have preferred the "gold OA" option,
but it wasn't ultimately chosen (see Vardi's
opinion). A subset of each issue did begin to be made
open-access, coinciding with a new, modern website, now featuring a
blog, news section, and HTML versions (rather than only PDF) of the
articles.
From the debut of the new format in July 2008, typically the front
matter, columns, and 2–4 articles in each issue were made OA. That
continued for about 4 years. For some reason unknown to me, from
August 2012 through the end of 2014, the practice seems to have
temporarily lapsed (as you can see in the index above), with only a handful
of articles being made OA, often none at all, not even the editor's
introduction to the issue. From January 2015 the previous policy seems
to have been restored again.
ACM occasionally will make something OA that wasn't originally
published as such, but seems to do so only rarely. Once was in
apparent response to a widely retweeted twitter
joke I made about an ironic paywall. They inconsiderately ruined my
joke by flipping the article to OA! Part of this webscraping exercise
was also to satisfy my curiosity over whether any pre-2008 articles
had been made OA. I checked everything back to 1958, but found only
two: the 1999
news item announcing the self-archival policy, and a 2007
article by Peter Naur. In my opinion, ACM should consider making
at least a handful more things retroactively OA, perhaps a few
landmark CACM articles. That would both be good for our
profession, by bringing important historical articles to more readers,
as well as for the visibility of CACM's archives.
February 2018 update
Ed Freeborn mailed in to point out (thanks!) that one of the
articles I had listed as open-access appears to have been subsequently
closed. So I re-ran the scraping script and updated the list to reflect current
open-access status, plus, while I'm at it, adding the CACM issues up through February 2018.
Between when I checked in March 2016 and again in February 2018, four articles
have been made newly open-access (1,
2,
3,
4),
while 27 (!) previously open-access articles were closed. It's not clear why these four
articles in particular were opened. But all 27 of the newly closed articles
were published between April 2015 and March 2016, which were the most recent 12
issues at the time I first posted this list. So it's possible that CACM
is using some kind of rolling open-access model, where a portion of new
articles are temporarily opened but then some are later filed into a closed
archive. But it hasn't been doing that consistently, if so. It would be nice if
there were more transparency around what exactly the policy and intent here is.
Here's a graph showing the number of open-access articles by month of
publication (as of February 2018). The relative lack of OA articles from
mid-2012 through late 2015 is particularly noticeable:
February 2024 update
The ACM has now
made the entire CACM archive open access!