Communications of the ACM, Volume 65 (original) (raw)

search dblp

search dblp

default search action

Authors:

Venues:

Publications:

clear

ask others

mirror

SPARQL queries

Refine list

note

refinements active!

zoomed in on ?? of ?? records

view refined list in

export refined list as

Volume 65, Number 1, January 2022

Editor's letter

Departments

Career paths in computing

BLOG@CACM

News

Technology strategy and management

Law and technology

Security

Viewpoint

Practice

Contributed articles

Review articles

Research highlights

Last byte

Volume 65, Number 2, February 2022

From the ACM CEO

Cerf's up

BLOG@CACM

News

Education

Kode Vicious

Historical Reflections

Viewpoint

Practice

Contributed articles

Turing lecture

Review articles

Research highlights

Last byte

Volume 65, Number 3, March 2022

Departments

Career paths in computing

Letters to the editor

BLOG@CACM

News

Legally speaking

Computing ethics

Privacy

Viewpoint

Practice

Contributed articles

Review articles

Research highlights

Last byte

Volume 65, Number 4, April 2022

Cerf's up

BLOG@ACM

News

Technology strategy and management

The profession of IT

Kode Vicious

Viewpoint

Europe Region special section

Europe Region special section: Hot topics

Europe Region special section: Big trends

Practice

Contributed articles

Research highlights

Last byte

Volume 65, Number 5, May 2022

Editor's letter

Editorial

Departments

Career paths in computing

ACM Open

ACM's election

BLOG@CACM

News

Law and Technology

Security

Education

Viewpoint

Practice

Contributed articles

Review articles

Research highlights

Last byte

Volume 65, Number 6, June 2022

Editor's letter

Editorial

Cerf's up

Letters to the editor

BLOG@CACM

News

The profession of IT

Inside risks

Kode Vicious

Viewpoint

Practice

Contributed articles

Review articles

Research highlights

Last byte

Volume 65, Number 7, July 2022

Editor's letter

Editorial

Departments

BLOG@CACM

News

Legally speaking

Economic and business dimensions

Privacy

Viewpoint

Practice

Contributed articles

Review articles

Research highlights

Last byte

Volume 65, Number 8, August 2022

Editor's letter

Cerf's up

BLOG@CACM

News

Education

Kode Vicious

Interview

Viewpoint

Practice

Contributed articles

Review articles

Research highlights

Last byte

Volume 65, Number 9, September 2022

Departments

Career paths in computing

BLOG@CACM

News

Law and technology

Security

The profession of IT

Point/counterpoint

Viewpoint

Practice

Contributed articles

Review articles

Research highlights

Last byte

Volume 65, Number 10, October 2022

Editor's letter

Cerf's up

BLOG@CACM

News

Technology strategy and management

Kode Vicious

Viewpoint

Practice

Contributed articles

Review articles

Research highlights

Last byte

Volume 65, Number 11, November 2022

Departments

Career paths in computing

Letters to the editor

News

Legally speaking

Privacy

Education

Viewpoint

India Region Special Section

India Region Special Section: Big Trends

India Region Special Section: Hot Topics

India Region Special Section: Big Trends

India Region Special Section: Hot Topics

India Region Special Section: Big Trends

India Region Special Section: Hot Topics

India Region Special Section: Big Trends

India Region Special Section: Hot Topics

India Region Special Section: Big Trends

Practice

Contributed articles

Research highlights

Last byte

Volume 65, Number 12, December 2022

Cerf's up

BLOG@CACM

News

The profession of IT

Kode Vicious

Viewpoint

Practice

Contributed articles

Turing lecture

Review articles

Research highlights

Last byte

manage site settings

To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.

Unpaywalled article links

Add open access links from unpaywall.org to the list of external document links (if available).

load links from unpaywall.org

Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.

Archived links via Wayback Machine

For web page which are no longer available, try to retrieve content from the web.archive.org of the Internet Archive (if available).

load content from archive.org

Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.

Reference lists

Add a list of references from crossref.org, opencitations.net, and semanticscholar.org to record detail pages.

load references from crossref.org and opencitations.net

Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.

Citation data

Add a list of citing articles from opencitations.net and semanticscholar.org to record detail pages.

load citations from opencitations.net

Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.

OpenAlex data

Load additional information about publications from openalex.org.

load data from openalex.org

Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.

dblp was originally created in 1993 at:

University of Trier

since 2018, dblp has been operated and maintained by:

Schloss Dagstuhl - Leibniz Center for Informatics