ISR Bibliography

Export 185 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Title is C  [Clear All Filters]
Report
Lüer, C., and A. van der Hoek, "Composition Environments for Deployable Software Components", Technical Report, no. UCI-ICS-02-18: Information and Computer Science, University of California, Irvine, August, 2002.
Gorlick, M. M., and R. N. Taylor, "Communication and Capability URLs in COAST-based Decentralized Services", Technical Report, no. UCI-ISR-12-11: Institute for Software Research, University of California, Irvine, CA, December, 2012.
Gorlick, M., K. Strasser, and R. N. Taylor, "COAST: Architectures for Decentralized On-Demand Tailored Services", Technical Report, no. UCI-ISR-12-2: Institute for Software Research, University of California, Irvine, CA, April, 2012.
Patil, S., and A. Kobsa, "The Challenges in Preserving Privacy in Awareness Systems", Technical Report, no. UCI-ISR-03-3: Institute for Software Research, University of California, Irvine, April, 2003.
Rouquette, N., K. Reinholtz, T. Canham, V. Carson, L. Charest, A. van der Hoek, E. Dashofy, and R. N. Taylor, CAR: Component Architecture, , no. #30591: JPL, May 9, 2002.
Miscellaneous
Moran, T., and P. Dourish, Context-Aware Computing: A Special Triple-Issue of Human Computer Interaction, , vol. 16, no. 2-4, 2001.
Doliner, M., Cobertura, , 2006.
Magazine Article
Elliott, M., and W.. Scacchi, "Communicating and Mitigating Conflict in Open Source Software Development Projects", Projects & Profits, vol. IV, no. 10, pp. 25-41, October, 2004.
Journal Article
Richardson, D., R. Farmer, and C. Wilson, "CSEdWeek Wants You!", ACM SIGCSE Bulletin, vol. 43, no. 3, pp. 6, September, 2011.
Richardson, D., "CSEdWeek Shines in 2011", ACM SIGCSE Bulletin, vol. 44, no. 3, September, 2012.
LaToza, T. D., and A. van der Hoek, "Crowdsourcing in Software Engineering: Models, Motivations, and Challenges", IEEE Software, vol. 33, issue 1, pp. 74-80, January-February, 2016.
Li, Y.., A.. Kobsa, B.. Knijnenburg, and M.-H.. Carolyn Nguyen, "Cross-Cultural Privacy Prediction", Proceedings on Privacy Enhancing TechnologiesProceedings on Privacy Enhancing Technologies, vol. 3, no. 2, pp. 113-132, April, 2017.
Demsky, B., "Cross Application Data Provenance and Policy Enforcement", ACM Transactions on Information and System Security, vol. 14, no. 1, May, 2011.
Bagheri, H., A. Sadeghi, J. Garcia, and S. Malek, "COVERT: Compositional Analysis of Android Inter-App Security Vulnerabilities", IEEE Transactions on Software Engineering (IEEE TSE), vol. 41, issue 9, pp. 866-886, 09/2015.
Sarma, A., D. Redmiles, and A. van der Hoek, "The Coordination Pyramid: A Perspective on the State of the Art in Coordination Technology", IEEE Computer, vol. PP, issue 99, 2010.
Redmiles, D., A. van der Hoek, B. Al-Ani, T. Hildenbrand, S. Quirk, A. Sarma, R. Silva Filho, C. R. B. de Souza, and E. Trainer, "Continuous Coordination: A New Paradigm to Support Globally Distributed Software Development Projects", Withschaftsinformatik, vol. 49, pp. S28–S38, 2007.
Murta, L. P. G., A. van der Hoek, and C. M. L. Werner, "Continuous and Automated Evolution of Architecture-to-Implementation Traceability Links", Automated Software Engineering, Special Issue on Selected Papers from the 21st International Conference on Automated Software Engineering (ASE'2006), vol. 15, no. 1, pp. 75-107, 2008.
Nardi, B., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth, "ContactMap: Integrating communication and information through visualizing personal social networks", Communications of the Association for Computing Machinery, vol. April, pp. 89-95, 2002.
Nardi, B. A., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth, "ContactMap: Integrating Communication and Information Through Visualizing Personal Social Networks", Communications of the ACM, vol. 45, no. 4, pp. 89-95, 2002.
Lee, H., and A. Kobsa, "Confident Privacy Decision-Making in IoT Environments", ACM Transactions on Computer-Human Interaction, vol. 27, issue 1, pp. Article 6, 12/2019.
Grudin, J.., G. Mark, and J.. Riedl, "Conference-Journal Hybrids", Communications of the ACM, vol. 56, no. 1, pp. 44-49, January, 2013.
Nardi, B., B. Tomlinson, D. Patterson, J. Chen, D. Pargman, B. Raghavan, and B. Penzenstadler, "Computing within Limits", Communications of the ACM, vol. 61, issue 10, 10/2018.
Scacchi, W., "Computer game mods, modders, modding, and the mod scene", First Monday, vol. 15, no. 5, 2010.
Yasinsac, A., R. F. Erbacher, D. G. Marks, M. M. Pollitt, and P. M. Sommer, "Computer forensics education", IEEE Security & Privacy, vol. 1, no. 4, pp. 15-23, 2003.

Pages