ISR Bibliography

Export 148 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
Conference Proceedings
Jurdak, R., A. G. Ruzzelli, G. M. P. O'Hare, and C. V. Lopes, "Reliable Symbol Synchronization in Acoustic Sensor Networks", IEEE Global Telecommunications Conference (GLOBECOM 2007), Washington, D.C., November 26-30, 2007.
Ganjisaffar, Y., S. Javanmardi, and C. Lopes, "Review-Based Ranking of Wikipedia Articles", Computational Aspects of Social Networks, 2009. CASON '09. International Conference on, pp. 98-104, 24-27 June 2009.
Tsudik, G., M. Burmester, A. Juels, A. Kobsa, D. Molnar, R. Di Pietro, and M. Rieback, "RFID Security and Privacy: Long-term Research or Short-term Tinkering? Invited Paper", First ACM Conference on Wireless Network Security (WiSec '08), Alexandria, VA, pp. 160, March 31-April 2, 2008.
Jensen, R. Eskild, and B. Nardi, "The Rhetoric of Culture as an Act of Closure in a Cross-national Software Development Department", 22nd European Conference on Information Systems (ECIS 2014), Tel Aviv, Israel, June 9-11, 2014.
Jensen, C., and W. Scacchi, "Role Migration and Advancement Processes in OSSD Projects: A Comparative Case Study", 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, pp. 364-374, May, 2007.
Rode, J., C. Johansson, P. DiGioia, R. S. silva Filho, K. A. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. F. Redmiles, "Seeing Further: Extending Visualization as a Basis for Usable Security", Symposium On Usable Privacy and Security (SOUPS 2006), Pittsburgh, PA, pp. 145-155, July 12-14, 2006.
Jakobac, V., N. Medvidović, and A. Egyed, "Separating Architectural Concerns to Ease Program Understanding", 1<sup>st</sup> International Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005), St. Louis, Missouri, USA, pp. 1-5, May 16, 2005.
Jensen, C., and W. Scacchi, "Simulating an Automated Approach to Discovery and Modeling of Open Source Software Development Processes", ProSim'03 Workshop on Software Process Simulation and Modeling, Portland, OR, May, 2003.
Jurdak, R., C. V. Lopes, and P. Baldi, "Software Acoustic Modems for Short Range Mote-based Underwater Sensor Networks", IEEE/OES Asian-Pacific OCEANS'06, Singapore, May, 2006.
Jurdak, R., P. Baldi, and C. V. Lopes, "State-Driven Energy Optimization in Wireless Sensor Networks", IEEE/IEE International Conference on Sensor Networks (SENET 2005), Montreal, Canada, August, 2005.
Mattmann, C. A., N. Medvidović, P. M. Ramirez, and V. Jakobac, "Unlocking the Grid", 8th International Symposium on Component-Based Software Engineering (CBSE-8), vol. 3489, St. Louis, MO, Lecture Notes in Computer Science, May 14-15, 2005.
Javanmardi, S., Y. Ganjisaffar, C. Lopes, and P. Baldi, "User contribution and trust in Wikipedia", Collaborative Computing: Networking, Applications and Worksharing, 2009. CollaborateCom 2009. 5th International Conference on, pp. 1-6, 11-14 Nov. 2009.
Jenista, J. C., Y. hun Eom, and B. Demsky, "Using Disjoint Reachability for Parallelization", International Conference on Compiler Construction, Saarbrücken, Germany, March-April, 2011.
Javanmardi, S., D. McDonald, and C. Lopes, "Vandalism Detection in Wikipedia: A High-Performing, Feature–Rich Model and its Reduction Through Lasso", WikiSym 2011, Mountain View, CA, USA, October 3-5, 2011.
Journal Article
Jurdak, R., P. Baldi, and C V. Lopes, "Adaptive Low Power Listening for Wireless Sensor Network", IEEE Transactions on Mobile ComputingIEEE Transactions on Mobile Computing, vol. 6, no. 2, pp. 988-1004, 2007.
Nardi, B. A., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth, "ContactMap: Integrating Communication and Information Through Visualizing Personal Social Networks", Communications of the ACM, vol. 45, no. 4, pp. 89-95, 2002.
Nardi, B., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth, "ContactMap: Integrating communication and information through visualizing personal social networks", Communications of the Association for Computing Machinery, vol. April, pp. 89-95, 2002.
Knijnenburg, B. P., A. Kobsa, and H. Jin, "Dimensionality of Information Disclosure Behavior", International Journal of Human-Computer Studies, Special Issue on Privacy Methodologies in HCI, December, 2013.
Palepu, V. Krishna, G. Xu, and J. A. Jones, "Dynamic Dependence Summaries", ACM Transactions on Software Engineering and Methodology (TOSEM)ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 25, no. 4, pp. 1-41, January, 2017.
DiGiuseppe, N., and J. A. Jones, "Fault Density, Fault Types, and Spectra-based Fault Localization", Empirical Software Engineering (First online: March 18, 2014), vol. 20, issue 4, pp. 928-967, 08/2015.
Bagheri, H., E. Kang, S. Malek, and D. Jackson, "A Formal Approach for Detection of Security Flaws in the Android Permission System", Springer Journal on Formal Aspects of Computing, 2017.
Vadeboncoeur, J. A., A. Jornet, N. Gadjamaschko, B. Nardi, J. Williams, and B. Ferholt, "Growing Forward: Imagining the Year Ahead", Mind, Culture, and Activity, vol. 25, issue 1, pp. 1-2, February, 2018.
Williams, J., B. Ferholt, N. Gadjamaschko, A. Jornet, B. Nardi, and J. A. Vadeboncoeur, "Identity, Knowledge, Power, and Educational Reform", Mind, Culture, and Activity, vol. 25, issue 2, pp. 101-104, April, 2018.
Ames, M. G., S. Lindtner, S. Bardzell, J. Bardzell, L. Nguyen, S. Ishtiaque Ahmed, N. Jahan, S. J. Jackson, and P. Dourish, "Making or Making Do? Challenging the Mythologies of Making and Hacking", Journal of Peer Production, issue 12, pp. 21 pp, July, 2018.
Ames, M. G., S. Lindtner, S. Bardzell, J. Bardzell, L. Nguyen, S. Ishtiaque Ahmed, N. Jahan, S. J. Jackson, and P. Dourish, "Making or Making Do? Challenging the Mythologies of Making and Hacking", Journal of Peer Production, issue 12, pp. 21 pp, July, 2018.

Pages