S
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor,
"Architectural Support for Trust Models in Decentralized Applications",
28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, pp. 52-61, May, 2006.
Suryanarayana, G., J. R. Erenkrantz, and R. N. Taylor,
"An Architectural Approach for Decentralized Trust Management",
IEEE Internet ComputingIEEE Internet Computing, vol. 9, no. 6, pp. 16-23, Nov/Dec, 2005.
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor,
"Architecting Trust-enabled Peer-to-Peer File-sharing Applications",
ACM Crossroads, issue on Software Engineering, vol. 12, no. 4, pp. 11-19, Summer, 2006.
Steinmacher, I., M. Aurélio Gerosa, and D. F. Redmiles,
"Attracting, Onboarding, and Retaining Newcomer Developers in Open Source Software Projects",
Workshop on Global Software Development in a CSCW Perspective held in conjunction with the17th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW'14), Baltimore, Maryland, Feb. 16, 2014.
Stafford, J. A., D. J. Richardson, and A. L. Wolf,
"Architecture-level Dependence Analysis for Software Systems",
International Journal of Software Engineering and Knowledge Engineering, vol. 11, no. 4, pp. 431-452, August, 2001.
de Souza, C. R. B., and D. Redmiles,
"On the alignment of organizational and software structure",
Handbook of Research on Socio-Technical Design and Social Networking SystemsHandbook of Research on Socio-Technical Design and Social Networking Systems, pp. 94-104, 2009.
de Souza, C. R. B., and D. Redmiles,
"The Awareness Network: Should I display my actions to whom? And, whose actions should I monitor?",
European Conference on Computer-Supported Cooperative Work, Limerick, Ireland, pp. 99-117, 2007.
Schmerl, B., J. Gennari, A. Sadeghi, H. Bagheri, S. Malek, J. Camara, and D. Garlan,
"Architecture Modeling and Analysis of Security in Android Systems",
10th European Conference on Software Architecture (ECSA 2016), Istanbul, Turkey, pp. 274-290, 11/2016.
Scacchi, W., and T. A. Alspaugh,
"Achieving Better Buying Power for Mobile Open Architecture Software Systems Through Diverse Acquisition Scenarios",
13th Annual Acquisition Research Symposium, Monterey, CA, Naval Postgraduate School, May 4, 2016.
Scacchi, W., and T. A. Alspaugh,
"Addressing challenges in the acquisition of secure software systems with open architectures",
9th Annual Acquisition Research Symposium, Seaside, CA, May 15-17, 2012.
Scacchi, W., and T. Alspaugh,
"Advances in the Acquisition of Secure Systems Based on Open Architectures (reprint)",
Journal of Cybersecurity & Information Systems, vol. 1, issue 2, 02/2013.
Scacchi, W., and T. A. Alspaugh,
"Advances in the Acquisition of Secure Systems based on Open Architectures",
8th Acquisition Research Symposium, Monterey Bay, CA, May 10-12, 2011.
Scacchi, W., and T. Alspaugh,
"Achieving Better Buying Power through Cost-Sensitive Acquisition of Open Architecture Software Systems",
11th Annual Acquisition Research Symposium, Monterey, CA, May 13-15, 2014.
Sajnani, H., and C. V. Lopes,
"Automatic Software Architecture Recovery: A Machine Learning Approach",
International Conference on Program Comprehension 2012, Student Research Symposium Track, Passau, Germany, June 11-13, 2012.
Sajnani, H., R. Naik, and C. V. Lopes,
"Application Architecture Discovery: Towards Domain-driven, Easily Extensible Code Structure",
18th Working Conference on Reverse Engineering (WCRE 2011). Best Paper Award in the Industrial track, Limerick, Ireland, October 17-20, 2011.
Sadeghi, A., H. Bagheri, and S. Malek,
"Analysis of Android Inter-App Security Vulnerabilities Using COVERT",
37th International Conference on Software Engineering (ICSE 2015), Demonstrations Track, Florence, Italy, May, 2015.
R
Romero-Mariona, J., H. Ziv, and D. Richardson,
"ASSURE: automated support for secure and usable requirements engineering",
Proceedings of the 2010 international symposium on Software testing and analysis, Trento, Italy, ACM, pp. 279-282, July 12-16, 2010.
Retti, J.., W.. Bibel, B.. Buchberger, E.. Buchberger, W.. Horn, A. Kobsa, I.. Steinacker, R.. Trappl, and H.. Trost,
"Artificial Intelligence - Eine Einführung",
XLeitfäden der angewandten Informatik (Book 2), Stuttgart, Teubner, 2014.
Ren, J., and R. N. Taylor,
"An Automatic and Generic Framework for Ranking Research Institutions and Scholars based on Publications",
Technical Report, no. UCI-ISR-04-5: Institute for Software Research, University of California, Irvine, June, 2004.
Ren, J., and R. N. Taylor,
"Automatic and Versatile Publications Ranking for Research Institutions and Scholars",
Communications of the ACM (CACM), vol. 50, no. 6, pp. 81-85, June, 2007.
Redmiles, D., and P. Dourish,
"An Approach to Usable Security Based on Event Monitoring and Visualization",
ACM New Security Paradigms Workshop NSWP, 2001.
Reddy, M., W. Pratt, P. Dourish, and ShabotMichael,
"Asking Questions: Information Needs in a Surgical Intensive Care Unit",
American Medical Informatics Association Fall Symposium (AMIA'02), San Antonio, TX, November, 2002.