Journal Article
Demsky, B.,
"Cross Application Data Provenance and Policy Enforcement",
ACM Transactions on Information and System Security, vol. 14, no. 1, May, 2011.
Dourish, P., and E. Gómez Cruz,
"Datafication and Data Fiction: Narrating Data and Narrating with Data",
Big Data & Society, vol. 5, issue 2, July, 2018.
Dourish, P., and E. Gómez Cruz,
"Datafication and Data Fiction: Narrating Data and Narrating with Data",
Big Data & Society, vol. 5, issue 2, July, 2018.
Mazmanian, M., M L. Cohn, and P. Dourish,
"Dynamic Reconfiguration in Planetary Exploration: A Sociomaterial Ethnography",
MIS Quarterly, Special Issue: On Sociomateriality of Information Systems and Organizing, vol. 38, issue 3, pp. 831-848, 09/2014.
Lopes, C. V., S. Chiba, T. D’Hondt, W. De Meuter, R. Gabriel, R. Hirschfeld, T. Pape, G. Salvaneschi, and M. Südholt,
"Editorial: Introducing The Art, Science, and Engineering of Programming",
The Art, Science, and Engineering of Programming, vol. 1, no. 1, pp. editorial-1, Jan 9, 2017.
Lopes, C. V., S. Chiba, T. D’Hondt, W. De Meuter, R. Gabriel, R. Hirschfeld, T. Pape, G. Salvaneschi, and M. Südholt,
"Editorial: Introducing The Art, Science, and Engineering of Programming",
The Art, Science, and Engineering of Programming, vol. 1, no. 1, pp. editorial-1, Jan 9, 2017.
Liebow, E., V. R. Dominguez, P. Neal Peregrine, T. L. McCarty, M. Nichter, B. Nardi, and J. Leeman,
"On Evidence and the Public Interest",
American Anthropologist, vol. 115, no. 4, pp. 642-655, December, 2013.
Dourish, P., K. W. Edwards, A. LaMarca, J. Lamping, K. Petersen, M. Salisbury, D. B. Terry, and J. Thornton,
"Extending Document Management Systems with User-Specific Active Properties",
ACM Transactions on Information SystemsACM Transactions on Information Systems, vol. 18, no. 2, pp. 140-170, April, 2000.
DiGiuseppe, N., and J. A. Jones,
"Fault Density, Fault Types, and Spectra-based Fault Localization",
Empirical Software Engineering (First online: March 18, 2014), vol. 20, issue 4, pp. 928-967, 08/2015.
Dorn, C., R. N. Taylor, and S. Dustdar,
"Flexible Social Workflows: Collaborations as Human Architecture",
IEEE Internet ComputingIEEE Internet Computing, vol. 16, no. 2, pp. 72-77, March-April, 2012.
Dorn, C., R. N. Taylor, and S. Dustdar,
"Flexible Social Workflows: Collaborations as Human Architecture",
IEEE Internet ComputingIEEE Internet Computing, vol. 16, no. 2, pp. 72-77, March-April, 2012.
Chen, J., P. Dourish, G. R. Hayes, and M. Mazmanian,
"From interaction to performance with public displays",
Personal and Ubiquitous Computing, vol. 18, no. 7, pp. 1617-1629, October, 2014.
Beecham, S., T. Clear, D. Damian, J. Barr, J. Noll, and W. Scacchi,
"How Best to Teach Global Software Engineering? Educators are Divided",
IEEE Software, vol. 34, no. 1, pp. 16-19, Jan-Feb, 2017.
Boehner, K., R. De Paula, P. Dourish, and P. Sengers,
"How Emotion is Made and Measured",
International Journal of Human-Computer StudiesInternational Journal of Human-Computer Studies, vol. 65, no. 4, pp. 275-291, 2007.
Boehner, K., R. De Paula, P. Dourish, and P. Sengers,
"How Emotion is Made and Measured",
International Journal of Human-Computer StudiesInternational Journal of Human-Computer Studies, vol. 65, no. 4, pp. 275-291, 2007.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R S. Filho,
"In the Eye of the Beholder: A Visualization-based Approach to Information System Security",
International Journal of Human-Computer StudiesInternational Journal of Human-Computer Studies (IJHCS) Special Issue on HCI Research in Privacy and Security, vol. 64, no. 1-2, pp. 5-24, July 2005.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R S. Filho,
"In the Eye of the Beholder: A Visualization-based Approach to Information System Security",
International Journal of Human-Computer StudiesInternational Journal of Human-Computer Studies (IJHCS) Special Issue on HCI Research in Privacy and Security, vol. 64, no. 1-2, pp. 5-24, July 2005.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R S. Filho,
"In the Eye of the Beholder: A Visualization-based Approach to Information System Security",
International Journal of Human-Computer StudiesInternational Journal of Human-Computer Studies (IJHCS) Special Issue on HCI Research in Privacy and Security, vol. 64, no. 1-2, pp. 5-24, July 2005.
Dash, A., and B. Demsky,
"Integrating Caching and Prefetching Mechanisms in a Distributed Transactional Memory",
IEEE Transactions on Parallel and Distributed SystemsIEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1284-1298, August, 2011.
Dash, A., and B. Demsky,
"Integrating Caching and Prefetching Mechanisms in a Distributed Transactional Memory",
IEEE Transactions on Parallel and Distributed SystemsIEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1284-1298, August, 2011.
Demsky, B., and N F. Tehrany,
"Integrating File Operations into Transactional Memory",
Journal of Parallel and Distributed ComputingJournal of Parallel and Distributed Computing, vol. 71, no. 10, October, 2011.
Schiano, D. J., B. Nardi, T. Debeauvais, N. Ducheneaut, and N. Yee,
"The “lonely gamer” revisited",
Entertainment ComputingEntertainment Computing, vol. 5, no. 1, pp. 65-70, January, 2014.
Schiano, D. J., B. Nardi, T. Debeauvais, N. Ducheneaut, and N. Yee,
"The “lonely gamer” revisited",
Entertainment ComputingEntertainment Computing, vol. 5, no. 1, pp. 65-70, January, 2014.