ISR Bibliography

Export 403 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is D  [Clear All Filters]
2005
Voida, A., R. E. Grinter, N. Ducheneuat, K. W. Edwards, and M. W. Newman, "Listening In: Practices Surrounding iTunes Music Sharing", SIGCHI Conference on Human Factors in Computing Systems (CHI), Portland, OR, USA, ACM Press, New York, NY, 2005.
Dourish, P., and K. Anderson, "Privacy, Security... and Risk and Danger and Secrecy and Trust and Morality and Identity and Power: Understanding Collective Information Practices", Technical Report, no. UCI-ISR-05-1: Institute for Software Research, University of California, Irvine, January, 2005.
Dourish, P., "Review of "Social Thinking -- Software Practice" (Dittrich, Floyd, and Klischewski, eds.)", Computer-Supported Cooperative WorkComputer-supported Cooperative Work, vol. 14, no. 1, pp. 87-90, 2005.
De Souza, C. R. B., J. Froehlich, and P. Dourish, "Seeking the Source: Software Source Code as a Social and Technical Artifact", ACM Conf. Supporting Group Work (GROUP 2005), Sanibel Island, FL, November, 2005.
De Souza, C. R. B., J. Froehlich, and P. Dourish, "Seeking the Source: Software Source Code as a Social and Technical Artifact", ACM Conf. Supporting Group Work (GROUP 2005), Sanibel Island, FL, November, 2005.
Anderson, K., and P. Dourish, "Situated Privaces: Do you know where you mother [trucker] is?", HCI International, Las Vegas, NV, July, 2005.
Smith, I., A. LaMarca, S. Consolvo, and P. Dourish, "A Social Approach to Privacy in Location-Enhanced Computing.", Privacy, Security and Trust within the Context of Pervasive Computing, Dordrecht, Kluwer, pp. 157-167, 2005.
DiGioia, P., and P. Dourish, "Social Navigation as a Model for Usable Security", Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA, July 6-8, 2005.
DiGioia, P., and P. Dourish, "Social Navigation as a Model for Usable Security", Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA, July 6-8, 2005.
Fisher, D., and P. Dourish, "Structural Information From Email Networks Enhances The Collaborative Workspace", International Sunbelt Social Network Conference (Sunbelt XXV), Redondo Beach, CA, Feb. 16-20, 2005.
Kabisch, E., A. Williams, and P. Dourish, "Symbolic Objects in a Networked Gestural Sound Interface", Interactive Poster, ACM Conf. Human Factors in Computing Systems (CHI 2005), Portland, OR, April, 2005.
Ren, J., R. N. Taylor, P. Dourish, and D. Redmiles, "Towards An Architectural Treatment of Software Security: A Connector-Centric Approach", Workshop on Software Engineering for Secure Systems (SESS 05), in conjunction with ICSE 2005, St. Louis, MO, May, 2005.
Muccini, H., M. Dias, and D. Richardson, "Towards Software Architecture-based Regression Testing", Workshop on Architecting Dependable Systems (WADS 2005), in conjunction with ICSE 2005, St. Louis, MO, May, 2005.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R. S. Silva Filho, "Two Experiences Designing for Effective Security", Symposium On Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA, July 6-8, 2005.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R. S. Silva Filho, "Two Experiences Designing for Effective Security", Symposium On Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA, July 6-8, 2005.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R. S. Silva Filho, "Two Experiences Designing for Effective Security", Symposium On Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA, July 6-8, 2005.
Redmiles, D., R. De Paula, H. Wilensky, and K. Kosaka, "What Ideal End Users Teach Us About Collaborative Software", 2005 International ACM SIGGROUP Conference on Supporting Group Work, Sanibel Island, FL, pp. 260-263, November, 2005.
2006
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor, "Architecting Trust-enabled Peer-to-Peer File-sharing Applications", ACM Crossroads, issue on Software Engineering, vol. 12, no. 4, pp. 11-19, Summer, 2006.
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor, "Architectural Support for Trust Models in Decentralized Applications", 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, pp. 52-61, May, 2006.
Georgas, J. C., E. M. Dashofy, and R. N. Taylor, "Architecture-Centric Development: A Different Approach to Software Engineering", ACM Crossroads, issue on Software Engineering, vol. 12, no. 4, Summer, 2006.
Doliner, M., Cobertura, , 2006.
Dourish, P., and K. Anderson, "Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena", Human-Computer Interaction, vol. 21, no. 3, pp. 319-342, 2006.
Diallo, M. H., J. Romero-Mariona, S E. Sim, T. A. Alspaugh, and D. J. Richardson, "A Comparative Evaluation of Three Approaches to Specifying Security Requirements", 12th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'06), Luxembourg, Grand-Ducky of Luxembourg, June 5-6, 2006.
Lee, C., P. Dourish, and G. Mark, "The Human Infrastructure of Cyberinfrastructure", ACM Conference on CSCW (CSCW'06), Banff, Alberta, Canada, pp. 483-492, 2006.
Dourish, P., "Implications for Design", ACM Conf. on Human Factors in Computing Systems (CHI 2006), Montreal, Canada, pp. 541-550, 2006.

Pages