ISR Bibliography

Export 134 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Ackerman, M. S., L F. Cranor, and J. Reagle, "Privacy in E-commerce: Examining User Scenarios and Privacy Preferences", First ACM Conference on Electronic Commerce, Denver, CO, pp. 1-8, 1999.
Ackerman, M. S., T. Darrell, and D. J. Weitzner, "Privacy in Context", Human-Computer InteractionHuman-Computer Interaction, vol. 16, no. 2-4, pp. 167-176, 2001.
Ackerman, M. S., and L. F. Cranor, "Privacy Critics", WEB Techniques, vol. 4, no. 9, pp. 67-70, 1999.
Alspaugh, T. A., H. Asuncion, and W. Scacchi, "Presenting Software License Conflicts through Argumentation", 22nd International Conference on Software Engineering and Knowledge Engineering (SEKE2011), Miami, FL, July, 2011.
Anand, S S., <b>B. Mobasher</b>, A. Kobsa, and <b>D. Jannach</b>, Proceedings of the 7th International Workshop on Intelligent Techniques for Web Personalization and Recommender Systems (ITWP 2009), , vol. 528, Pasadena, CA, 2009.
Ardissono, L., A. Kobsa, and M. Maybury, Personalized Digital Television: Targeting Programs to Individual Viewers, , Dordrecht, Netherlands, Kluwer Academic Publishers, 2004.
B
Bagheri, H., A. Sadeghi, R. Jabbarvand, and S. Malek, "Practical, Formal Synthesis and Autonomic Enforcement of Security Policies for Android", 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France, June, 2016.
Baker, A., E. Oh Navarro, and A. van der Hoek, "Problems and Programmers: An Educational Software Engineering Card Game", Twenty-fifth International Conference on Software Engineering (ICSE 2003), Portland, OR, pp. 614–619, May, 2003.
Bolcer, G A., "P2P: Person to Person Decentralized Work", The Workshop on Internet-Scale Technologies (TWIST 2000), Irvine, CA, The Workshop on Internet-Scale Technologies (TWIST 2000), 2000.
Bortis, G., and A. van der Hoek, "PorchLight: a Tag-Based Approach to Bug Triaging", 35th International Conference on Software Engineering (ICSE 2013), San Francisco, CA, IEEE, pp. 342–351, May, 2013.
Bortis, G., "PorchLight: A Tag-based Approach to Bug Triaging", Doctoral Dissertation: University of California, Irvine, 2016.
Brindescu, C., I. Ahmed, R. Leano, and A. Sarma, "Planning for Untangling: Predicting the Difficulty of Merge Conflicts", International Conference on Software Engineering (ICSE 2020), Technical Track, 07/2020.
C
Chen, Y., G. Mark, and S. Ali, "Promoting Positive Affect through Smartphone Photography", Psychology of Well-Being, vol. 6, no. 8, July, 2016.
Cheng, D., Kinshuk, A. Kobsa, K. Partridge, and Z. Yu, Proceedings of the UMAP-09 Workshop on Personalization in Mobile and Pervasive Computing, , vol. 478, Trento, Italy, 2009.
D
Dittrich, Y.., M.. Burnett, A.. Mørch, and D. Redmiles, "Proceedings of the 4th International Symposium on End-User Development (IS-EUD 2013), Copenhagen, Denmark", Lecture Notes in Computer Science, Vol. 7897: Springer, June, 2013.
Dourish, P., "Process Descriptions as Organisational Accounting Devices: The Dual Use of Workflow Technologies", ACM Conference on Supporting Group Work (GROUP'01), Boulder, Colorado, September 30 - O, 2001.
Dourish, P., "Point of Persuasion: Strategic Essentialism and Environmental Sustainability", Pervasive 2008 Workshop on Pervasive Technology and Environmental Sustainability, Sydney, Australia, 2008.
Dourish, P., "Proceedings of the Eight International Conference on Ubiquitous Computing UbiComp 2006 (Orange County, CA)", Lecture Notes in Computer Science 4206, Berlin, Springer, 2006.
Dourish, P., "Play, Flex, and Slop: Sociality and Intentionality", HCI Remixed, Cambridge, MA, MIT Press, pp. 305-308, 2008.
Dourish, P., and K. Anderson, "Privacy, Security... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power: Understanding Collective Information Practices", Technical Report, no. UCI-ISR-05-1: Institute for Software Research, University of California, Irvine, January, 2005.
Dourish, P., "Packets, Protocols, and Proximity: The Materiality of Internet Routing", Signal Traffic: Media Infrastructure and Globalization: University of Illinois Press, pp. 183-204, 2015.
Dourish, P., K. W. Edwards, J. Howell, A. LaMarca, J. Lamping, K. Petersen, M. Salisbury, D. B. Terry, and J. Thornton, "A Programming Model for Active Documents", ACM Symposium on User Interface Software and Technology (UIST 2000), San Diego, CA, ACM, pp. 41-50, November 5-8, 2000.
Dourish, P., "Print This Paper, Kill A Tree: Environmental Sustainability as a Research Topic for Human-Computer Interaction", Technical Report, no. LUCI-2009-004, Irvine, CA, The Laboratory for Ubiquitous Computing and Interaction, Donald Bren School of Information and Computer Sciences, University of California at Irvine, 2009.
Dourish, P., "Points of Persuasion: Strategic Essentialism and Environmental Sustainability", Pervasive 2008 Workshop on Pervasive Persuasive Technology and Environmental Sustainability, Sydney, Australia, May 19, 2008.
E
Ekbia, H., and B. Nardi, "The Political Economy of Computing: The Elephant in the HCI Room", Interactions, vol. 22, issue 6: ACM, pp. 46-49, Nov-Dec, 2015.

Pages