ISR Bibliography

Export 497 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Penzenstadler, B., A. Rauturi, C. Becker, J. Norton, B. Tomlinson, S. Silberman, and D. Richardson, "Bridging communities: ICT4Sustainability @iConference 2015", Interactions, vol. 23, issue 1: ACM, pp. 64-67, Jan-Feb, 2016.
de Souza, C. R. B., D. Redmiles, and P. Dourish, ""Breaking the Code", Moving between Private and Public Work in Collaborative Software Development", International Conference on Supporting Group Work, Sanibel Island, FL, pp. 105-114, November, 2003.
Su, N. M., Y. Wang, G. Mark, T. Aieylokun, and T. Nakano, "A Bosom Buddy Afar Brings a Distant Land Near: Are Bloggers a Global Community?", 2nd International Conference on Communities and Technologies, Milan, Italy, Dordrecht: Springer, pp. 171-190, June 13-16, 2005.
Al-Ani, B., G. Mark, and B. Semaan, "Blogging through conflict: sojourners in the age of social media", 3rd international conference on Intercultural collaboration (ICIC 2010), Copenhagen, Denmark, ACM, pp. 29-38, August 19-20, 2010.
Al-Ani, B., G. Mark, and B. Semaan, "Blogging in a region of conflict: supporting transition to recovery", Proceedings of the 28th international conference on Human factors in computing systems, Atlanta, Georgia, USA, ACM, pp. 1069-1078, April, 2010.
Nardi, B., D. Schiano, and M. Gumbrecht, "Blogging as Social Activity, or, Would You Let 900 Million People Read Your Diary?", Conference on Computer-Supported Cooperative Work (CSCW 2004), Chicago, IL, New York: ACM Press, pp. 222-228, November 6-10, 2004.
Satchell, C., and P. Dourish, "Beyond the user: use and non-use in HCI", Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7, Melbourne, Australia, ACM, pp. 9-16, 2009.
Shen, W., "Beyond Nash Equilibrium: Mechanism Design with Thresholding Agents", Doctoral Dissertation, 2019.
Nguyen, D., and A. Kobsa, "Better RFID Privacy Is Good for Consumers, and Manufacturers, and Distributors, and Retailers", PEP06, CHI 2006 Workshop on Privacy-Enhanced Personalization, Montréal, Canada, 2006.
A
de Souza, C. R. B., and D. Redmiles, "The Awareness Network: Should I display my actions to whom? And, whose actions should I monitor?", European Conference on Computer-Supported Cooperative Work, Limerick, Ireland, pp. 99-117, 2007.
Jensen, C., and W. Scacchi, "Automating the Discovery and Modeling of Open Source Software Processes", 3rd Workshop on Open Source Software Engineering, 25th Intern. Conf. Software Engineering, Portland, OR, May, 2003.
Sajnani, H., and C. V. Lopes, "Automatic Software Architecture Recovery: A Machine Learning Approach", International Conference on Program Comprehension 2012, Student Research Symposium Track, Passau, Germany, June 11-13, 2012.
Bagheri, H., C. Tang, and K. Sullivan, "Automated Synthesis and Dynamic Analysis of Tradeoff Spaces for Object-Relational Mapping", IEEE Transactions on Software Engineering, vol. 43, issue 2, 02/2017.
Malek, S., H. Bagheri, and A. Sadeghi, "Automated Detection and Mitigation of Inter- Application Security Vulnerabilities in Android", 2nd International Workshop on Software Development Lifecycle for Mobile (DeMobile 2014), Hong Kong, China, pp. 17-18, November, 2014.
Kasiri, A., and W. Scacchi, An Augmented Reality Interface for Game Based Stroke TeleRehabilitation, , no. UCI-ISR-17-3: UCI Institute for Software research, June, 2017.
Steinmacher, I., M. Aurélio Gerosa, and D. F. Redmiles, "Attracting, Onboarding, and Retaining Newcomer Developers in Open Source Software Projects", Workshop on Global Software Development in a CSCW Perspective held in conjunction with the17th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW'14), Baltimore, Maryland, Feb. 16, 2014.
Edwards, K., P. Dourish, A. LaMarca, J. Lamping, K. Petersen, M. Salisbury, D. Terry, and J. Thornton, Atomic and Molecular Documents, , April 9, 2002.
Ossher, J., H. Sajnani, and C. Lopes, "ASTRA: Bottom-up Construction of Structured Artifact Repositories", 19th Working Conference on Reverse Engineering (WCRE), Kingston, Ontario, Canada , pp. 41-50, Oct. 15-18, 2012.
Reddy, M., W. Pratt, P. Dourish, and ShabotMichael, "Asking Questions: Information Needs in a Surgical Intensive Care Unit", American Medical Informatics Association Fall Symposium (AMIA'02), San Antonio, TX, November, 2002.
Retti, J.., W.. Bibel, B.. Buchberger, E.. Buchberger, W.. Horn, A. Kobsa, I.. Steinacker, R.. Trappl, and H.. Trost, "Artificial Intelligence - Eine Einführung", XLeitfäden der angewandten Informatik (Book 2), Stuttgart, Teubner, 2014.
Dashofy, E. M., H. Asuncion, S. A. Hendrickson, G. Suryanarayana, J. C. Georgas, and R. N. Taylor, "ArchStudio 4: An Architecture-Based Meta-Modeling Environment", 29th International Conference on Software Engineering (ICSE 2007), vol. Informal Research Demonstrations, Companion Volume, Minneapolis, MN, pp. 67-68, May 20-26, 2007.
Stafford, J. A., D. J. Richardson, and A. L. Wolf, "Architecture-level Dependence Analysis for Software Systems", International Journal of Software Engineering and Knowledge Engineering, vol. 11, no. 4, pp. 431-452, August, 2001.
Schmerl, B., J. Gennari, A. Sadeghi, H. Bagheri, S. Malek, J. Camara, and D. Garlan, "Architecture Modeling and Analysis of Security in Android Systems", 10th European Conference on Software Architecture (ECSA 2016), Istanbul, Turkey, pp. 274-290, 11/2016.
Schmerl, B., J. Gennari, A. Sadeghi, H. Bagheri, S. Malek, J. Camara, and D. Garlan, "Architecture Modeling and Analysis of Security in Android Systems", 10th European Conference on Software Architecture (ECSA 2016), Istanbul, Turkey, pp. 274-290, 11/2016.
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor, "Architectural Support for Trust Models in Decentralized Applications", 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, pp. 52-61, May, 2006.

Pages