ISR Bibliography

Export 1617 results:
Author [ Title(Asc)] Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Lindtner, S., K. Anderson, and P. Dourish, "Cultural Appropriation: Information Technologies as Sites of Transnational Imagination", ACM Conf. Computer-Supported Cooperative Work (CSCW 2012), Seattle, WA, February 11-15, 2012.
Lindtner, S., "Cultivating Creative China: Making and Remaking Cities, Citizens, Work & Innovation", Doctoral Dissertation: University of California, Irvine, 2012.
Richardson, D., R. Farmer, and C. Wilson, "CSEdWeek Wants You!", ACM SIGCSE Bulletin, vol. 43, no. 3, pp. 6, September, 2011.
Richardson, D., "CSEdWeek Shines in 2011", ACM SIGCSE Bulletin, vol. 44, no. 3, September, 2012.
LaToza, T. D., and A. van der Hoek, "Crowdsourcing in Software Engineering: Models, Motivations, and Challenges", IEEE Software, vol. 33, issue 1, pp. 74-80, January-February, 2016.
LaToza, T. D., E. Chiquillo, W.. Ben Towne, C. M. Adriano, and A. van der Hoek, "CrowdCode: A Platform for Crowd Development (Poster Abstract)", CrowdConf 2013, San Diego, California, October 22, 2013.
LaToza, T. D., W.. Ben Towne, A. van der Hoek, and J. D. Herbsleb, "Crowd Development ", Sixth International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE), held at ICSE 2013, San Francisco, CA, IEEE, pp. 85-88, May, 2013.
Sarma, A., G. Bortis, and A. van der Hoek, "Cross-Workspace Impact Awareness for Early Detection of API-induced Indirect Conflicts in Configuration Management", Technical Report, no. UCI-ISR-06-17: Institute for Software Research, University of California, Irvine, December, 2006.
Li, Y.., B.. Knijnenburg, A. Kobsa, and C.. Nguyen, "Cross-Cultural Privacy Prediction", Privacy Personas and Segmentation Workshop, 2015 Symposium On Usable Privacy and Security (SOUPS), Ottawa, Canada, July 22-24, 2015.
Li, Y.., A.. Kobsa, B.. Knijnenburg, and M.-H.. Carolyn Nguyen, "Cross-Cultural Privacy Prediction", Proceedings on Privacy Enhancing TechnologiesProceedings on Privacy Enhancing Technologies, vol. 3, no. 2, pp. 113-132, April, 2017.
Li, Y., "Cross-Cultural Differences in the Contextual Information Norms in Users’ Privacy Decision-Making", Doctoral Dissertation, 2019.
Demsky, B., "Cross Application Data Provenance and Policy Enforcement", ACM Transactions on Information and System Security, vol. 14, no. 1, May, 2011.
Gorlick, M., K. Strasser, A. Baquero, and R. N. Taylor, "CREST: Principled Foundations for Decentralized Systems (abstract)", ACM International Conference on Systems, Programming, Languages and Applications: Software for Humanity (SPLASH) 2011, Companion, Portland, OR, ACM, pp. 193-194, October 22-27, 2011.
Erenkrantz, J. R., M. M. Gorlick, and R. N. Taylor, "CREST: A new model for Decentralized, Internet-Scale Applications", Technical Report, no. UCI-ISR-09-4: Institute for Software Research, University of California, Irvine, CA, September, 2009.
Ratanotayanon, S., "Creating, Maintaining and Building Task Specific Concern Map for Supporting as Needed Program Comprehension", Doctoral Dissertation: University of California, Irvine, 2010.
Kantor, M., and D. Redmiles, "Creating an Infrastructure for Ubiquitous Awareness", Eighth IFIP TC 13 Conference on Human-Computer Interaction (INTERACT 2001), Tokyo, Japan, pp. 431-438, July, 2001.
Semaan, B., and G. Mark, "Creating a Context of Trust with ICTs: Restoring a Sense of NOrmalcy in the Environment", ACM Conference on Computer Supported Cooperative Work (CSCW'11), Hangzhou, China, March 19-23, 2011.
Bagheri, H., A. Sadeghi, J. Garcia, and S. Malek, "COVERT: Compositional Analysis of Android Inter-App Security Vulnerabilities", IEEE Transactions on Software Engineering (IEEE TSE), vol. 41, issue 9, pp. 866-886, 09/2015.
Dorn, C., and R. N. Taylor, "Coupling Software Architecture and Human Architecture for Collaboration-aware System Adaptation", 35th International Conference on Software Engineering (ICSE 2013), San Francisco, CA, IEEE Press, pp. 53-62, May, 2013.
Knijnenburg, B. P., A. Kobsa, and H. Jin, "Counteracting the Negative Effect of Form Auto-Completion on the Privacy Calculus", 34th International Conference on Information Systems, Milan, Italy, Dec. 15-18, 2013.
Mark, G., D. Hausstein, and U. Kloecke, "The Cost of Interrupted Work: More Speed, More Stress", Conference on Human Factors in Computing Systems (CHI 2008), Florence, Italy, ACM Press, pp. 107-110, April 5-10, 2008.
Oreizy, P., and R. N. Taylor, "Coping with Application Inconsistency in Decentralized Software Evolution", Proceedings of the Second International Conference on the Principles of Software Evolution (IWPSE 2), Fukuoka, Japan, 1999.
Sarma, A., D. Redmiles, and A. van der Hoek, "The Coordination Pyramid: A Perspective on the State of the Art in Coordination Technology", IEEE Computer, vol. PP, issue 99, 2010.
Møller, N H., and P. Dourish, "Coordination by avoidance: bringing things together and keeping them apart across hospital departments", Proceedings of the 16th ACM international conference on Supporting group work, Sanibel Island, Florida, USA, ACM, pp. 65-74, November 7-10, 2010.
Reddy, M., P. Dourish, and W. Pratt, "Coordinating Heterogeneous Work: Information and Representation in Medical Care", European Conference on Computer-Supported Cooperative Work (ECSCW 2001), Bonn, Germany, Kluwer, pp. 239-238, September 18-20, 2001.

Pages