Book Chapter
Asuncion, H. U., and R. N. Taylor,
"Automated Techniques for Capturing Custom Traceability Links across Heterogeneous Artefacts",
Software and Systems Traceability: Springer-Verlag, January, pp. 129-146, 2012.
Zimmerman, A., and B. Nardi,
"The Competition to Be Big: An Analysis of LTER and NEON",
Collaboration in the New Life Sciences, Surrey, England, Ashgate, 2010.
Cao, J., M. Meador, M. L. Baba, P. Mathew Ferreira, M. Madou, W. Scacchi, J. R. Spohrer, C. Teague, P. Westmoreland, and X. Zhang,
"Implications: Societal Collective Outcomes, Including Manufacturing",
Convergence of Knowledge, Technology and Society: Beyond Convergence of Nano-Bio-Info-Cognitive Technologies, Science Policy Reports, New York, Springer, pp. 255-285, 2013.
Javanmardi, S., D. W. McDonald, R. Caruana, S. Forouzan, and C. V. Lopes,
"Learning to Detect Vandalism in Social Content Systems: A Study on Wikipedia",
Mining Social Networks and Security Informatics, pp. 203-225, June, 2013.
Wang, Y., and A. Kobsa,
"Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites",
User Modeling, Adaptation, and Personalization, vol. 5535: Springer Berlin / Heidelberg, pp. 78-89, 2009.
Diallo, M. H., L. Naslavsky, T. A. Alspaugh, H. Ziv, and D. J. Richardson,
"Toward Architecture Evaluation Through Ontology-based Requirements-level Scenarios",
Architecting Dependable Systems VArchitecting Dependable Systems V, 5135 : Springer, pp. 225-247, 2008.
Conference Paper
Xu, L., H. Ziv, D. J. Richardson, and T. A. Alspaugh,
"An Architectural Pattern for Non-functional Dependability Requirements",
Workshop on Architecting Dependable Systems (WADS 2005) held in conjunction with ICSE 2005, St. Louis, MO, May, 2005.
Winbladh, K., T. A. Alspaugh, H. Ziv, and D. J. Richardson,
"Architecture-based Testing Using Goals and Plans",
Second International Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA'06), Portland, ME, July, 2006.
Romero-Mariona, J., H. Ziv, and D. Richardson,
"ASSURE: automated support for secure and usable requirements engineering",
Proceedings of the 2010 international symposium on Software testing and analysis, Trento, Italy, ACM, pp. 279-282, July 12-16, 2010.
LaToza, T.D.., M.. Chen, L.. Jiang, M.. Zhao, and A. van der Hoek,
"Borrowing from the Crowd: A Study of Recombination in Software Design Competitions",
Thirty-seventh International Conference on Software Engineering (ICSE), Florence, Italy, May, 2015.
Zhao, M.., and A. van der Hoek,
"A Brief Perspective on Microtask Crowdsourcing Workflows for Interface Design",
Second International Workshop on Crowdsourcing in Software Engineering, Florence, Italy, May, 2015.
Ziv, H., and S. Patil,
"Capstone Project: From Software Engineering to "Informatics"",
Proceedings of the 2010 23rd IEEE Conference on Software Engineering Education and Training: IEEE Computer Society, pp. 185-188, 2010.
Li, J., M. X. Zhou, H. Yang, and G. Mark,
"Confiding in and Listening to Virtual Agents: The Effect of Personality",
22nd International Conference on Intelligent User Interfaces (IUI '17), Limassol, Cyprus , ACM, pp. 275-286, March 13-16, 2017.
Lopes, C., P. Maj, P. Martins, V. Saini, D. Yang, J. Zitny, H. Sajnani, and J. Vitek,
"DéjàVu: A Map of Code Duplicates on GitHub",
SPLASH 2017 - OOPSLA. Proceedings of the ACM on Programming Languages (PACMPL), Vancouver, Canada, ACM, pp. Article 84; 28 pages, October, 2017.
Akbar, F., T. Grover, G. Mark, and M. X. Zhou,
"The Effects of Virtual Agents' Characteristics on User Impressions and Language Use",
23rd International Conference on Intelligent User Interfaces Companion, Tokyo, Japan, ACM, pp. Article No. 56 , March 7-11, 2018.
Winbladh, K., H. Ziv, and D. J. Richardson,
"Eliciting required characteristics for usable requirements engineering approaches",
Proceedings of the 2009 ACM symposium on Applied Computing, Honolulu, Hawaii, ACM, pp. 360-364, 2009.
Zheng, Y., and R. N. Taylor,
"Enhancing Architecture-Implementation Conformance with Change Management and Support for Behavioral Mapping",
International Conference on Software Engineering (ICSE 2012), Zurich, Switzerland, June, 2012.
Romero-Mariona, J., H. Ziv, and D. J. Richardson,
"Formality of the Security Specification Process: Benefits Beyond Requirements",
Proceedings of the 2010 43rd Hawaii International Conference on System Sciences: IEEE Computer Society, pp. 1-6, 2010.
Liu, D., X. Zhang, Y. Feng, and J. A. Jones,
"Generating descriptions for screenshots to assist crowdsourced testing",
IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER), Campobasso, Italy, pp. 492-496, March 20-23, 2018.
Winbladh, K., H. Ziv, and D. J. Richardson,
"iMuse: interactive model-based use-case and storytelling environment",
Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, Santa Fe, New Mexico, USA, ACM, pp. 383-384, 2010.
Romero-Mariona, J., H. Ziv, and D. J. Richardson,
"Increasing Trustworthiness through Security Testing Support",
Social Computing (SocialCom), 2010 IEEE Second International Conference on, Minneapolis, MN, IEEE , pp. 920-925, August 20-22, 2010.
Romero-Mariona, J., H. Ziv, and D. J. Richardson,
"Later stages support for security requirements",
The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, ACM, pp. 103-107, 2009.
Naslavsky, L., H. Ziv, and D. J. Richardson,
"MbSRT2: Model-Based Selective Regression Testing with Traceability",
Proceedings of the 2010 Third International Conference on Software Testing, Verification and Validation, Trento, Italy, ACM, pp. 89-98, July 12-16, 2010.
Zhou, J., and B. Demsky,
"Memory Management for Many-Core Processors with software configurable locality policies",
2012 International Symposium on Memory Management, Beijing, China, June, 2012.