Default: Communications of the ACM

ISSN: 0001-0782

Journal Home

Journal Guideline

Communications of the ACM Q1 Unclaimed

Association for Computing Machinery (ACM) United States
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

Communications of the ACM is a journal indexed in SJR in Computer Science (miscellaneous) with an H index of 214. It has an SJR impact factor of 0,967 and it has a best quartile of Q1. It is published in English. It has an SJR impact factor of 0,967.

Communications of the ACM focuses its scope in these topics and keywords: digital, information, program, systems, xcon, computing, configuration, software, code, algorithm, ...

Type: Journal

Type of Copyright:

Languages: English

Open Access Policy:

Type of publications:

Publication frecuency: -

Price

- €

Inmediate OA

NPD

Embargoed OA

- €

Non OA

Metrics

Communications of the ACM

0,967

SJR Impact factor

214

H Index

266

Total Docs (Last Year)

849

Total Docs (3 years)

2801

Total Refs

4350

Total Cites (3 years)

475

Citable Docs (3 years)

3,51

Cites/Doc (2 years)

10,53

Ref/Doc

Aims and Scope


digital, information, program, systems, xcon, computing, configuration, software, code, algorithm, clinical, collaboration, data, dataassessing, datamaking, degreesintroductioniterative, cirucular, characterization, challenges, analysisa, analyticsinformedia, applications, base, based, beyondexpert, beyondnatural, business, cardiographybitcoinemerging, cellular,



Best articles by citations

A numbering system for binary trees

View more

Watermark-based copyright protection system security

View more

The future of peer-to-peer computing

View more

Forum

View more

Forum

View more

Viewpoint

View more

Forum

View more

Forum

View more

Closing the learning application gap

View more

The effect of national culture and economic wealth on global software piracy rates

View more

Additional comments on a problem in concurrent programming control

View more

An empirical study of minimal storage sorting

View more
SHOW MORE ARTICLES

Enforce POLA on processes to control viruses

View more

Concurrent-convergent strategy in IT consulting

View more

A human capital perspective of skill acquisition and interface loyalty

View more

Sorting on computers

View more

Web-supported course partnerships

View more

Risks in trusting untrustworthiness

View more

Malware month

View more

Internal and tape sorting using the replacement-selection technique

View more

Rising sun

View more

Unsolicited communications as trespass?

View more

Balancing free speech and censorship

View more

Security and privacy issues of handheld and wearable wireless devices

View more

Comments

No comments ... Be the first to comment!

FAQS