ISR Bibliography

Export 1454 results:
Author Title Type [ Year(Asc)]
2016
Nardi, B., "Designing for the Future - But Which One?", Interactions, vol. 23, issue 1: ACM, pp. 26-33, January-February, 2016.
Srinivas, P., A. Faiola, and G. Mark, "Designing Guidelines for Mobile Health Technology: Managing Notification Interruptions in the ICU", ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2016), San Jose, CA, ACM, pp. 4502-4508, May 7-12, 2016.
Wang, Y., and D. Redmiles, "The Diffusion of Trust and Cooperation in Teams with Individuals' Variations on Baseline Trust", 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16), San Francisco, CA, ACM, pp. 303-318, February, 2016.
Kobsa, A., H.. Cho, and B.. Knijnenburg, "The Effect of Personalization Provider Characteristics on Privacy Attitudes and Behaviors: An Elaboration Likelihood Model Approach", Journal of the Association for Information Science and Technology (JASIST), vol. 67, issue 11. Advance Online: January 11, pp. 2587-2606, 11/2016.
Mark, G., S. Iqbal, M. Czerwinski, P. Johns, and A. Sano, "Email Duration, Batching and Self-interruption: Patterns of Email Use on Productivity and Stress", ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2016), San Jose, CA, ACM, pp. 1717-1728, May 7-12, 2016.
Jabbarvand, R., A. Sadeghi, H. Bagheri, and S. Malek, "Energy-Aware Test-Suite Minimization for Android Apps", 25th International Symposium on Software Testing and Analysis (ISSTA 2016), Saarbrücken, Germany, ACM, pp. 425-436, July, 2016.
Shamekhi, A., M. Czerwinski, G. Mark, M. Novotny, and G. Bennett, "An Exploratory study toward the preferred conversational style for compatible virtual agents", International Conference on Intelligent Virtual Agents (IVA2016), Los Angeles, CA, pp. 40-50, September, 2016.
Jones, W., V. Bellotti, R. Capra, J. David Dinneen, G. Mark, C. Marshall, K. Moffatt, J. Teevan, and M. Van Kleek, "For Richer, for Poorer, in Sickness or in Health...: The Long-Term Management of Personal Information", ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2016), San Jose, CA, ACM, pp. 3508-3515, May 7-12, 2016.
Yang, D., A. Hussain, and C. Videira Lopes, "From Query to Usable Code: An Analysis of Stack Overflow Code Snippets", 13th International Conference on Mining Software Repositories, Austin, TX, ACM, pp. 341-402, 05/2016 .
Bishop, J., C. Jensen, W. Scacchi, and A. Smith, "How to Use Open Source Software in Education", 47th ACM Technical Symposium on Computing Science Education (SIGCSE '16), Memphis, TN, ACM, pp. 321-322, February 17, 2016.
Esfahani, N., E. Yuan, K. R. Canavera, and S. Malek, "Inferring Software Component Interaction Dependencies for Adaptation Support", ACM Transactions on Autonomous and Adaptive Systems, vol. 10, no. 4, February, 2016.
Cerratto-Pargman, T., D. Pargman, and B. Nardi, "The Internet at the eco-village: Performing sustainability in the twenty-first century", First Monday, vol. 21, issue 5, May 2, 2016.
Dourish, P., "The Internet of Urban Things", Code and the City, New York, NY, Routledge, pp. 27-48, 2016.
Crenshaw, N., and B. Nardi, "“It Was More than Just the Game, It Was the Community”: Social Affordances in Online Games", 49th Hawaii International Conference on System Sciences (HICSS 2016), Koloa, HI, IEEE, pp. 3781-3790, January 5-8, 2016.
Sajnani, H., "Large-Scale Code Clone Detection", Doctoral Dissertation: University of California, Irvine, 2016.
Yampolsky, M., and W. Scacchi, "Learning Game Design and Software Engineering through a Game Prototyping Experience: A Case Study", Fifth International Workshop on Games and Software Engineering (GAS 2016), held in conjunction with ICSE 2016, Austin, TX, USA, ACM, 05/2016.
Garcia, J., M. Hammad, and S. Malek, Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware, : UCI Institute for Software Research, January, 2016.
Clemmensen, T., V. Kaptelinin, and B. Nardi, "Making HCI Theory Work: An analysis of the use of activity theory in HCI research", Behaviour & Information Technology, vol. 35, issue 8, pp. 608-627, May 4, 2016.
Shin, E-J., D. Ghosh, A. Gupta, G. Pal Singh, N. Joshi, and A. Kobsa, "Message of Interest: A Framework of Location-Aware Messaging for an Indoor Environment", The 2016 IEEE International Conference on Pervasive Computing and Communication (PerCOM 2016), Sydney, Australia, IEEE, March, 2016.
Yuan, E., and S. Malek, "Mining Software Component Interactions to Detect Security Threats at the Architectural Level", 13th Working IEEE/IFIP Conference on Software Architecture (WICSA 2016), Venice, Italy, IEEE, pp. 211 - 220, April, 2016.
Bagheri, H., and K. Sullivan, "Model-Driven Synthesis of Formally Precise, Stylized Software Architectures", Formal Aspects of Computing, vol. 28, no. 3, pp. 441-467, May 1, 2016.
Leonardi, P. M., D. E. Bailey, E. H. Diniz, D. Sholler, and B. Nardi, "Multiplex Appropriation in Complex Systems Implementation: The Case of Brazil’s Correspondent Banking System", MIS Quarterly, vol. 40, issue 2, pp. 461-473, June, 2016.
Mark, G., S. T. Iqbal, M. Czerwinski, P. Johns, and A. Sano, "Neurotics Can't Focus: An in situ Study of Online Multitasking in the Workplace", ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2016), San Jose, CA, ACM, pp. 1739-1744, May, 2016.
Wang, Y., and G. Mark, "News trustworthiness and verification in China: The tension of dual media channels", First Monday, vol. 21, no. 2, February, 2016.
Crenshaw, N., and B. Nardi, "NPCs as Social Mediators in Massively Multiplayer Online Games", Social Believability in Games Workshop (SBG 2015) held in conjunction with the Eleventh Artificial Intelligence and Interactive Digital Entertainment Conference (AIIDE-15), Santa Cruz, CA, AAAI, pp. 89, November 15, 2016.

Pages