ISR Bibliography

Export 141 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Lustig, C.., and B. Nardi, "Algorithmic Authority: The Case of Bitcoin", 48th Annual Hawaii International Conference on System Sciences (HICSS), Kauai, Hawaii, pp. 743-752, January, 2015.
M
Malek, S., H. Bagheri, and A. Sadeghi, "Automated Detection and Mitigation of Inter- Application Security Vulnerabilities in Android", 2nd International Workshop on Software Development Lifecycle for Mobile (DeMobile 2014), Hong Kong, China, pp. 17-18, November, 2014.
Mangano, N., A. Baker, and A. van der Hoek, "ArchTrace: VBoard: A Sketch Based Approach to Abstract Design", Fourth Eurographics Workshop on Sketch-Based Interfaces and Modeling, Riverside, CA, August, 2007.
Mark, G., K. Carpenter, and A. Kobsa, "Are There Benefits in Seeing Double? A Study of Collaborative Information Visualization", ACM Conference on Human factors in Computing Systems (CHI 2003). Short paper: Fort Lauderdale, FL, pp. 273-274, April 5-10, 2003.
Medvidović, N., "Architecture-Based Specification-Time Software Evolution", Information and Computer Science, Irvine, University of California, 1999.
Medvidović, N., and D. S. Rosenblum, "Assessing the Suitability of a Standard Design Method for Modeling Software Architectures", Software Architecture, Boston, Kluwer, pp. 161-182, 1999.
Medvidović, N., P. Oreizy, R. N. Taylor, R. Khare, and M. Guntersdorfer, An Architecture-Centered Approach to Software Environment Integration, , vol. 2001, no. March, 2000.
Mikic-Rakic, M., and N. Medvidović, "Adaptable Architectural Middleware for Programming-in-the-Small-and-Many", ACM/IFIP/USENIX International Middleware Conference (Middleware 2003), Rio de Janeiro, Brazil, June 16-20, 2003.
Muralikumar, M. Devii, and B. Nardi, "Addressing LIMITS through Food Tracking", Computing within LIMITS Workshop, Toronto, Canada, ACM, May 13-15, 2018.
Murta, L. G. P., A. van der Hoek, and C. M. L. Werner, "ArchTrace: Policy-Based Support for Managing Evolving Architecture-to-Implementation Traceability Links", Twenty-first IEEE/ACM International Conference on Automated Software Engineering (ASE 2006), Tokyo, Japan, pp. 135–144, September, 2006.
N
Nardi, B., "Appropriating Theory", Theory Development in Information: Reflecting on the Process, Austin, University of Texas Press, pp. 204-221, 2016.
Nardi, B., N. Gajdamaschko, and J. A. Vadeboncoeur, "Agency, Identity, and Objects in Work and Play", Mind, Culture, and Activity, vol. 24, no. 3, pp. 181-182, July 3, 2017.
Nistor, E., J. R. Erenkrantz, S. A. Hendrickson, and A. van der Hoek, "ArchEvol: Versioning Architectural-Implementation Relationships", 12th International Workshop on Software Configuration Management, Lisbon, Portugal, pp. 99-111, September 5-6, 2005.
O
Oreizy, P., N. Medvidovic, and R. N. Taylor, "Architecture-Based Runtime Software Evolution", Proceedings of the 20th International Conference on Software Engineering (ICSE’98), Kyoto, Japan, 04/1998.
Ossher, J., S. Bajracharya, and C. Lopes, "Automated dependency resolution for open source software", Mining Software Repositories (MSR), 2010 7th IEEE Working Conference on, Cape Town, South Africa, pp. 130-140, 2-3 May 2010.
Ossher, J., H. Sajnani, and C. Lopes, "ASTRA: Bottom-up Construction of Structured Artifact Repositories", 19th Working Conference on Reverse Engineering (WCRE), Kingston, Ontario, Canada , pp. 41-50, Oct. 15-18, 2012.
Ossher, J., and C. Lopes, "Applying Program Analysis to Code Retrieval", Finding Source Code on the Web for Remix and Reuse, New York, Springer , pp. 205-225, 2013.
R
Reddy, M., W. Pratt, P. Dourish, and ShabotMichael, "Asking Questions: Information Needs in a Surgical Intensive Care Unit", American Medical Informatics Association Fall Symposium (AMIA'02), San Antonio, TX, November, 2002.
Redmiles, D., and P. Dourish, "An Approach to Usable Security Based on Event Monitoring and Visualization", ACM New Security Paradigms Workshop NSWP, 2001.
Ren, J., and R. N. Taylor, "Automatic and Versatile Publications Ranking for Research Institutions and Scholars", Communications of the ACM (CACM), vol. 50, no. 6, pp. 81-85, June, 2007.
Ren, J., and R. N. Taylor, "An Automatic and Generic Framework for Ranking Research Institutions and Scholars based on Publications", Technical Report, no. UCI-ISR-04-5: Institute for Software Research, University of California, Irvine, June, 2004.
Retti, J.., W.. Bibel, B.. Buchberger, E.. Buchberger, W.. Horn, A. Kobsa, I.. Steinacker, R.. Trappl, and H.. Trost, "Artificial Intelligence - Eine Einführung", XLeitfäden der angewandten Informatik (Book 2), Stuttgart, Teubner, 2014.
Richardson, D. J., "ACM RETENTION COMMITTEE: Student-focused initiatives for retaining students in computing programs.", ACM Inroads., vol. 9, issue 2, pp. 13-18, June, 2018.
Romero-Mariona, J., H. Ziv, and D. Richardson, "ASSURE: automated support for secure and usable requirements engineering", Proceedings of the 2010 international symposium on Software testing and analysis, Trento, Italy, ACM, pp. 279-282, July 12-16, 2010.
S
Sadeghi, A., H. Bagheri, and S. Malek, "Analysis of Android Inter-App Security Vulnerabilities Using COVERT", 37th International Conference on Software Engineering (ICSE 2015), Demonstrations Track, Florence, Italy, May, 2015.

Pages