Journal Article
Zhou, R. Jiahua, H. Hondori, M. Khademi, J. Margaret Cassidy, K. Mengfei Wu, D. Zhiye Yang, N. Kathuria, F. Rohinton Erani, L. Dodakian, A. McKenzie, et al.,
"Predicting gains with visuospatial training after stroke using an EEG measure of frontoparietal circuit function",
Frontiers in Neurology, vol. 9, July, 2018.
Lopes, C V., R. Achar, and A. Valadares,
"Predicate Collection Classes",
Journal of Object Technology, vol. 16, issue 2, pp. 3:1–38, 04/2017.
Scacchi, W.,
"Practices and Technologies in Computer Game Software Engineering",
IEEE Software, Jan 16, vol. 34, no. 1, Jan-Feb, 2017.
Philip, K., L. Irani, and P. Dourish,
"Postcolonial Computing: A Tactical Survey",
Science, Technology, and Human ValuesScience, Technology, and Human Values, vol. 37, no. 1, pp. 3-29, January, 2012.
Kelly, S., and B. Nardi,
"Playing with sustainability: Using video games to simulate futures of scarcity",
First MondayFirst Monday, vol. 19, no. 5, May 5, 2014.
Wang, Y., and A. Kobsa,
"A PLA-Based Privacy-Enhancing User Modeling Framework and its Evaluation",
User Modeling and User-Adapted Interaction: The Journal of Personalization ResearchUser Modeling and User-Adapted Interaction: The Journal of Personalization Research, vol. 23, issue 1, pp. 41-82, 03/2013.
Foth, M., E. Paulos, C. Satchell, and P. Dourish,
"Pervasive Computing and Environmental Sustainability: Two Conference Workshops",
IEEE Pervasive ComputingIEEE Pervasive Computing, vol. 8, no. 1, pp. 78-81, 2009.
Mark, G., and Y. Ganzach,
"Personality and Internet Usage: A large-scale representative study of young adults",
Computers in Human BehaviorComputers in Human Behavior, vol. Vol. 36, pp. 274-281, July 31, 2014.
Ling, J.., and C. Wagner,
"Perceptions of Justice or Injustice as Determinant of Contributor Defections from Online Communities",
Journal of the Association for Information Science and Technology (JASIST), vol. 66, issue 7, March, 2015.
Sajnani, H., V. Saini, and C. Lopes,
"A Parallel and Efficient Approach to Large Scale Clone Detection",
Journal of Software: Evolution and Process, vol. 27, no. 6, pp. 402-429, Jun (online:Mar), 2015.
Sarma, A., D. Redmiles, and A. van der Hoek,
"Palantír: Early Detection of Development Conflicts Arising from Parallel Code Changes",
IEEE Transactions on Software Engineering, vol. 38, no. 4, pp. 889- 908 , July-August, 2011.
Conference Proceedings
Lopes, C., L. Kan, A. Popov, and R. Morla,
"PRT Simulation in an Immersive Virtual World",
1st International Conference on Simulation Tools and Techniques for Communications, Networks, and Systems (SIMUTools), Marseille, France, March 3-7, 2008.
Dourish, P., K. W. Edwards, J. Howell, A. LaMarca, J. Lamping, K. Petersen, M. Salisbury, D. B. Terry, and J. Thornton,
"A Programming Model for Active Documents",
ACM Symposium on User Interface Software and Technology (UIST 2000), San Diego, CA, ACM, pp. 41-50, November 5-8, 2000.
Jensen, C., and W. Scacchi,
"Process Modeling Across the Web Information Infrastructure",
5th. Intern. Workshop on Software Process Simulation and Modeling (ProSIM), in conjunction with ICSE 2004, Edinburgh, Scotland, UK, May 24-25, 2004.
Dourish, P.,
"Process Descriptions as Organisational Accounting Devices: The Dual Use of Workflow Technologies",
ACM Conference on Supporting Group Work (GROUP'01), Boulder, Colorado, September 30 - O, 2001.
Mark, G.., S.. Fussell, C. Lampe, MC. Schraefel, JP. Hourcade, C.. Appert, and D.. Wigdor,
"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems",
CHI Conference on Human Factors in Computing Systems, Denver, CO, ACM Press, May 6-11, 2017.
Baker, A., E. Oh Navarro, and A. van der Hoek,
"Problems and Programmers: An Educational Software Engineering Card Game",
Twenty-fifth International Conference on Software Engineering (ICSE 2003), Portland, OR, pp. 614–619, May, 2003.
Kobsa, A., R. K. Chellappa, and S. Spiekermann,
"Privacy-Enhanced Personalization",
Proceedings of CHI-2006 (Extended Abstracts), Montréal, Canada, to appear, pp. 1331-1334, 2006.
Wang, Y., and A. Kobsa,
"Privacy in Online Social Networking at Workplace",
Computational Science and Engineering, 2009. CSE '09. International Conference on, vol. 4, pp. 975-978, 29-31 Aug. 2009.
Ackerman, M. S., L F. Cranor, and J. Reagle,
"Privacy in E-commerce: Examining User Scenarios and Privacy Preferences",
First ACM Conference on Electronic Commerce, Denver, CO, pp. 1-8, 1999.
Wang, Y., and A. Kobsa,
"Privacy in Cross-System Personalization",
Intelligent Information Privacy Management Symposium, Stanford, CA, March, 2010.
Patil, S., and A. Kobsa,
"Privacy in Collaboration: Managing Impression",
First International Conference on Online Communities and Social Computing, Las Vegas, NV, 2005.
Fielding, R. T., and R. N. Taylor,
"Principled Design of the Modern Web Architecture",
22nd International Conference on Software Engineering, Limerick, Ireland, pp. 407-416, June, 2000.
Provos, N., M. Friedl, and P. Honeyman,
"Preventing Privilege Escalation",
12th USENIX Security Symposium, Washington, D.C., pp. 231-242, August 4-8, 2003.