ACM Usage Statistics

ACM Counter III Compliant Usage Statistics

The ACM provides COUNTER III compliant usage statistics to institutions which subscribe to the ACM Digital Library. The usage statistics are generated on a monthly basis and are made available by a third party service provider named Scholarly IQ, and library consortia can view their usage statistics at http://www.acmreports.org.

If you are having trouble logging into your institution’s account, please send us an email at dl-info@hq.acm.org and we will make sure you are given access to your institution’s statistics.

SUSHI

COUNTER III compliancy means that ACM’s usage statistics are also SUSHI (Standardized Usage Statistics Harvesting Initiative) compliant. SUSHI enables a library to gather their usage statistics across multiple publisher platforms without having to log into each search and compile usage statistics manually. For more information on SUSHI compliance, please go to http://www.niso.org/workrooms/sushi.

ACM Usage Reports

Standardized usage statistics are sometimes misleading. Each publisher has a different portfolio of publications with a wide range of content-types and formats available for download. In ACM’s case, the ACM Digital Library consists of non-journal and non-pdf or html content. Due to the nature of the subject matter and ACM’s role as the leading conference and scholarly events organizer in the field of computer science, the ACM Digital Library contains a significant number of conference proceedings that contribute to the overall makeup of the ACM Digital Library archive. As COUNTER III reports do not provide detailed usage information for conference proceedings, it is important for librarians to recognize the limitations of the COUNTER III reports that ACM makes available for evaluation purposes. The reports available at http://www.acmreports.org include the standard COUNTER III reports such as JR1 and JR4. However none of these standard reports include usage for conference proceedings which are critically important to the fields of computer science and IT, and make up over two thirds (67%) of the full text articles that are included in the ACM Digital Library. In addition, across the entire ACM Digital Library user base on average approximately 66% of its total usage occurs with ACM conference proceedings articles with the remaining activity being mostly related to ACM journal articles. To view all of the usage of the ACM Digital Library, it’s important to review the report entitled ‘Article Titles: Article Requests by Month and Type’. This report will show the total full-text downloads across all the media types that are in the Digital Library on a monthly basis.

FAQ

If you have any questions regarding the ACM usage statistics that are not answered above, please refer to our FAQ page. http://www.acmreports.org/Docs/faq.aspx.

Edge Computing

ACM Queue’s “Research for Practice” is your number one resource for keeping up with emerging developments in the world of theory and applying them to the challenges you face on a daily basis. RfP consistently serves up expert-curated guides to the best of CS research, and relates these breakthroughs to the challenges that software engineers face every day. In this installment of RfP is by Nitesh Mor, a PhD candidate at UC Berkeley working on the next generation of globally distributed computer systems with a special focus on data security and privacy. Titled “Edge Computing,” this RfP gives an overview of some of the most exciting work being done in the area of computing infrastructures and applications. It provides an academic view of edge computing through samples of existing research whose applications will be highly relevant in the coming years.

ACM Case Studies

Written by leading domain experts for software engineers, ACM Case Studies provide an in-depth look at how software teams overcome specific challenges by implementing new technologies, adopting new practices, or a combination of both. Often through first-hand accounts, these pieces explore what the challenges were, the tools and techniques that were used to combat them, and the solution that was achieved.