ISR Bibliography

Export 1545 results:
Author Title Type [ Year(Asc)]
Ekbia, H., and B. Nardi, "Social Inequality and HCI: The View from Political Economy", ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2016), San Jose, CA, ACM, pp. 4997-5002, May 7-12, 2016.
Bagheri, H., J. Garcia, A. Sadeghi, S. Malek, and N. Medvidovic, "Software Architectural Principles in Contemporary Mobile Software: From Conception to Practice", Journal of Systems and Software, June 1, 2016, vol. 119, pp. 31-44, September 30, 2016.
Petre, M.., and A. van der Hoek, Software Design Decoded: 66 Ways Experts Think, : MIT Press, pp. 184, 2016.
Saini, V., H. Sajnani, J. Kim, and C. Lopes, "SourcererCC and SourcererCC-I: Tools to Detect Clones in Batch mode and During Software Development", 38th International Conference on Software Engineering, Companion Proceedings, Austin, TX, ACM, pp. 597-600, 2016.
Sajnani, H., V. Saini, J. Svajlenko, C. K.. Roy, and C. V. Lopes, "SourcererCC: Scaling Code Clone Detection to Big Code", 38th International Conference on Software Engineering (ICSE 2016), Austin, TX, ACM, pp. 1157-1168 , 05/2016 .
Nardi, B., B. Tomlinson, and D. Patterson, Special issue of Interactions: Sustainable HCI Education. 23(6), , New York, NY, ACM Press, 2016.
Raval, N., and P. Dourish, "Standing Out from the Crowd: Emotional Labor, Body Labor, and Temporal Labor in Ridesharing", 19th ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW), San Francisco, CA, ACM, pp. 97-107 , February-March, 2016.
Sadeghi, A., H. Bagheri, J. Garcia, and S. Malek, A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Apps, : UCI Institute for Software Research, January, 2016.
Tomlinson, B., D. J. Patterson, and B. Nardi, "Teaching Global Disruption and Information Technology Online", interactions, vol. 23, no. 6, pp. 40-43, Nov-Dec, 2016.
Mehrotra, S., A. Kobsa, N. Venkatasubramanian, and S. Raj Rajagopalan, "TIPPERS: A Privacy Cognizant IoT Environment ", First IEEE International Workshop on Security, Privacy and Trust for IoT, held in conjunction with the 2016 IEEE International Conference on Pervasive Computing and Communication (PerCOM 2016), Sydney, Australia, IEEE, March, 2016.
Bagheri, H., and S. Malek, "Titanium: Efficient Analysis of Evolving Alloy Specifications", 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2016), Seattle, WA, ACM, pp. 27-38, Nov 13-18, 2016.
Weidema, E. R. Q., C. Lopez, S. Nayebaziz, F. Spanghero, and A. van der Hoek, "Toward Microtask Crowdsourcing Software Design Work", 3rd International Workshop on CrowdSourcing in Software Engineering (CSI-SE '16), Austin, TX, ACM, pp. 41-44, May 14-22, 2016.
Jain, P., S. Subhash Khanwalkar, R. Malhotra, A. Dheenrajappa, G. Gupta, and A. Kobsa, "uBeacon: Configuration based Beacon Tracking", The 2016 IEEE International Conference on Pervasive Computing and Communication (PerCOM 2016), Sydney, Australia, IEEE, March, 2016.
Lee, H., and A. Kobsa, "Understanding User Privacy in Internet of Things Environments", 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, IEEE Press, pp. 407-412, Dec. 12-14, 2016.
Gui, X.., J.. Forbat, B.. Nardi, and D.. Stokols, "Use of Information and Communication Technology Among Street Drifters in Los Angeles", First Monday, vol. 21, no. 9, September, 2016.
Scacchi, W., "Virtual Meetings", Handbook of Science and Technology Convergence: Springer, 2016.
Mark, G., "Work, email, distraction, repeat: Switching tasks is ruining your workflow", Google re:Work, 2016.
Mark, G., M. Czerwinski, S. Iqbal, and P. Johns, "Workplace Indicators of Mood: Behavioral and Cognitive Correlates of Mood Among Information Workers", 6th International Conference on Digital Health, Montreal, Canada, ACM, pp. 29-36, April, 2016.
Nguyen, K., L. Fang, G. Xu, B. Demsky, S. Lu, S. Alamian, and O. Mutlu, "Yak: A High-Performance Big-Data-Friendly Garbage Collector", 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), Savannah, GA, pp. 349-365, Nov 2-4, 2016.
Giorgio, M., and R. N. Taylor, Accountability Through Architecture for Decentralized Systems: A Preliminary Assessment, : UCI Institute for Software Research, October, 2015.
Alspaugh, T., and W. Scacchi, "Achieving Better Buying Power Through Acquisition of Open Architecture Software Systems for Web-Based and Mobile Devices", 12th Annual Acquisition Research Symposium, Monterey, CA, May, 2015.
Fjeld, M.., P.. Woźniak, J.. Cowls, and B. Nardi, "Ad-hoc encounters with big data: Engaging citizens in conversations around tabletops", First Monday, vol. 20, no. 2, February, 2015.
Lustig, C.., and B. Nardi, "Algorithmic Authority: The Case of Bitcoin", 48th Annual Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii, pp. 743-752, January, 2015.
Sadeghi, A., H. Bagheri, and S. Malek, "Analysis of Android Inter-App Security Vulnerabilities Using COVERT", 37th International Conference on Software Engineering (ICSE 2015), Demonstrations Track, Florence, Italy, May, 2015.
Dorn, C., and R. N. Taylor, "Analyzing Runtime Adaptability of Collaboration Patterns", Concurrency and Computation: Practice and ExperienceConcurrency and Computation: Practice and Experience, Online: November 28, 2014, vol. 27, no. 11, pp. 2725-2750, July 16, 2015.