ISR Bibliography

Export 1450 results:
Author Title Type [ Year(Asc)]
Fjeld, M.., P.. Woźniak, J.. Cowls, and B. Nardi, "Ad-hoc encounters with big data: Engaging citizens in conversations around tabletops", First Monday, vol. 20, no. 2, February, 2015.
Lustig, C.., and B. Nardi, "Algorithmic Authority: The Case of Bitcoin", 48th Annual Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii, pp. 743-752, January, 2015.
Sadeghi, A., H. Bagheri, and S. Malek, "Analysis of Android Inter-App Security Vulnerabilities Using COVERT", 37th International Conference on Software Engineering (ICSE 2015), Demonstrations Track, Florence, Italy, May, 2015.
Dorn, C., and R. N. Taylor, "Analyzing Runtime Adaptability of Collaboration Patterns", Concurrency and Computation: Practice and ExperienceConcurrency and Computation: Practice and Experience, Online: November 28, 2014, vol. 27, no. 11, pp. 2725-2750, July 16, 2015.
LaToza, T.D.., A.. Di Lecce, F.. Ricci, W.B.. Towne, and A. van der Hoek, "Ask the Crowd: Scaffolding Coordination and Knowledge Sharing in Microtask Programming", Symposium on Visual Languages and Human-Centric Computing, Atlanta, Georgia, IEEE, pp. 23-27, October 18-22, 2015.
Valadares, A., and C. V. Lopes, "An Aspect-Oriented Approach to Large-Scale Urban Simulations", 2015 Winter Simulation Conference, Huntington Beach, CA, IEEE Press, pp. 3100-3101 , December, 2015.
DiGiuseppe, N., "Automatic Natural-Language Fault Diagnoses", Doctoral Dissertation: University of California, Irvine, 2015.
LaToza, T.D.., M.. Chen, L.. Jiang, M.. Zhao, and A. van der Hoek, "Borrowing from the Crowd: A Study of Recombination in Software Design Competitions", Thirty-seventh International Conference on Software Engineering (ICSE), Florence, Italy, May, 2015.
Zhao, M.., and A. van der Hoek, "A Brief Perspective on Microtask Crowdsourcing Workflows for Interface Design", Second International Workshop on Crowdsourcing in Software Engineering, Florence, Italy, May, 2015.
Lemos, O. Augusto La, A. Carvalho de Paula, H. Sajnani, and C. V. Lopes, "Can the use of types and query expansion help improve large-scale code search?", IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM 2015), Bremen, Germany, pp. 41-50, September, 2015.
Scacchi, W., "Case Studies and Practices in Local Game Jam Software Development Organization: A Software Engineering Perspective", Foundations of Digital Games 2015 Workshop on Game Jams, Hackathons and Game Creation Events, Pacific Grove, CA, June, 2015.
Servant, F., "A Characterization and Partial Automation of the Multi-revision, Fine-grained Analysis of Code History as an Efficient and Accurate Mechanism to Support Software Development", Doctoral Dissertation: University of California, Irvine, 2015.
Wang, Y., and D. Redmiles, "Cheap Talk, Cooperation, and Trust in Global Software Engineering: An Evolutionary Game Theory Model with Empirical Support", Empirical Software Engineering, October 15, 2015, pp. 1-35, October, 2015.
Wang, O., "Cheap Talk, Trust, and Cooperation in Networked Global Software Engineering: Game Theory Model and Empirical Evidence", Doctoral Dissertation: University of California, Irvine, 2015.
Hondori, H. Mousavi, M. Khademi, L. Dodakian, A. McKenzie, C. V. Lopes, and S. C. Cramer, "Choice of Human–Computer Interaction Mode in Stroke Rehabilitation", Neurorehabilitation and neural repair, July, 2015.
Martie, L.., T.D.. LaToza, and A. van der Hoek, "CodeExchange: Supporting Reformulation of Internet-Scale Code Queries in Context", Thirtieth International Conference on Automated Software Engineering, Lincoln, Nebraska, pp. 24-35, November 9-13, 2015.
Penzenstadler, B., A. Raturi, D. J. Richardson, S. M. Silberman, and B. Tomlinson, "Collapse (and other futures) software engineering", First Monday, vol. 20, issue 8, July, 2015.
Wang, Y., M. Niiya, G. Mark, S. M. Reich, and M. Warschauer, "Coming of Age (Digitally): An Ecological View of Social Media Use among College Students", 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW), Vancouver, BC, Canada, pp. 571-582, March, 2015.
Dourish, P., "Commentary: Conduits and Communities", Human–Computer Interaction, vol. 30, no. 6, pp. 540-543, November, 2015.
Cooper, K., and W. Scacchi, Computer Games and Software Engineering, : CRC Press, Taylor and Francis, pp. 311, 2015.
Bagheri, H., A. Sadeghi, J. Garcia, and S. Malek, "COVERT: Compositional Analysis of Android Inter-App Security Vulnerabilities", IEEE Transactions on Software Engineering (IEEE TSE), vol. 41, issue 9, pp. 866-886, 09/2015.
Li, Y.., B.. Knijnenburg, A. Kobsa, and C.. Nguyen, "Cross-Cultural Privacy Prediction", Privacy Personas and Segmentation Workshop, 2015 Symposium On Usable Privacy and Security (SOUPS), Ottawa, Canada, July 22-24, 2015.
Cole, M., B. Nardi, and J. A. Vadeboncoeur, "Detailing Learning Lives", Mind, Culture, and Activity, vol. 22, no. 3, pp. 199-200, August 11, 2015.
Bagheri, H., E. Kang, S. Malek, and D. Jackson, "Detection of Design Flaws in Android Permission Protocol through Bounded Verification", 20th International Symposium on Formal Methods (FM 2015), Oslo, Norway, pp. 73-89, June, 2015.
Zhao, M., Y. Wang, and D. Redmiles, Digital Art-Mediated Practices for Building Team Trust Over Distance, : UCI Institute for Software Research, December, 2015.