ISR Bibliography

Export 1617 results:
Author Title [ Type(Asc)] Year
Journal Article
Schiano, D. J., B. Nardi, T. Debeauvais, N. Ducheneaut, and N. Yee, "The “lonely gamer” revisited", Entertainment ComputingEntertainment Computing, vol. 5, no. 1, pp. 65-70, January, 2014.
Lopes, C., A. Haghighat, A. Mandal, T. Givargis, and P. Baldi, "Localization of Off-the-Shelf Mobile Devices Using Audible Sound: Architectures, Protocols and Performance Assessment", ACM Mobile Computing and Communications Review (MC2R), vol. 10, no. 2, April, 2006.
Garcia, J., M. Hammad, and S. Malek, "Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware", ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 26, issue 3, January, 2018.
Schwab, I., A. Kobsa, and I. Koychev, "Learning User Interests through Positive Examples Using Content Analysis and Collaborative Filtering", User Modeling and User-adapted Interaction - UMUAIUser Modeling and User-adapted Interaction - UMUAI, vol. 14, no. 5, pp. 469-475, 2004.
Kobsa, A., and J. Fink, "An LDAP-Based User Modeling Server and its Evaluation", User Modeling and User-Adapted Interaction: The Journal of Personalization ResearchUser Modeling and User-Adapted Interaction: The Journal of Personalization Research, vol. 16, no. 2, 2006.
Behnamghader, P., D. Minh Le, J. Garcia, D. Link, A. Shahbazian, and N. Medvidović, "A Large-Scale Study of Architectural Evolution in Open-Source Software Systems", Empirical Software Engineering, vol. 22, no. 3, pp. 1146-1193, June, 2017.
Ekbia, H. R., B. A. Nardi, and T. Baudouin, "L’hétéromation", Multitudes. (In French), vol. 70, issue 1, pp. 112-121, 2018.
Taylor, R., and D. Redmiles, "Knowledge Depot", SIGSOFT Software Engineering NotesSIGSOFT Software Engineering Notes, vol. 25, no. 1, January , 2000.
Scacchi, W., and T. A. Alspaugh, "Issues in the Development and Maintenance of Open Architecture Software Systems", CrossTalk: The Defense Software Engineering Journal, vol. 30, no. 3, pp. 10-14, April, 2017.
Redmiles, D. F., "Introduction to the Special Issue on Activity Theory and the Practice of Design", Computer Supported Cooperative Work, Special Issue on Activity Theory and the Practice of Design, vol. 11, no. 1-2, pp. 1-11, 2002.
Wang, D., and G. Mark, "Internet Censorship in China: Examining User Awareness and Attitudes", ACM Transactions on Computer-Human Interaction (TOCHI), vol. 22, no. 6, December, 2015.
Cerratto-Pargman, T., D. Pargman, and B. Nardi, "The Internet at the eco-village: Performing sustainability in the twenty-first century", First Monday, vol. 21, issue 5, May 2, 2016.
Ackerman, M. S., "The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility", Human-Computer InteractionHuman-Computer Interaction, vol. 15, no. 2-3, pp. 179-204, 2000.
Demsky, B., and N F. Tehrany, "Integrating File Operations into Transactional Memory", Journal of Parallel and Distributed ComputingJournal of Parallel and Distributed Computing, vol. 71, no. 10, October, 2011.
Dash, A., and B. Demsky, "Integrating Caching and Prefetching Mechanisms in a Distributed Transactional Memory", IEEE Transactions on Parallel and Distributed SystemsIEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 8, pp. 1284-1298, August, 2011.
Dourish, P., and G. Bell, "The Infrastructure of Experience and the Experience of Infrastructure: Meaning and Structure in Everyday Encounters with Space", Environment and Planning B: Planning and Design, vol. 34, no. 3, pp. 414-430, 2007.
Dourish, P., "The Infrastructure of Experience and the Experience of Infrastructure: Meaning and Structure in Everyday Encounters with Space", Environment and Planning B: Planning and Design, vol. 34, no. 3, pp. 414-430, 2007.
Esfahani, N., E. Yuan, K. R. Canavera, and S. Malek, "Inferring Software Component Interaction Dependencies for Adaptation Support", ACM Transactions on Autonomous and Adaptive Systems, vol. 10, no. 4, February, 2016.
Nardi, B., "Inequality and limits", First Monday, vol. 20, issue 8, August 3, 2015.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R S. Filho, "In the Eye of the Beholder: A Visualization-based Approach to Information System Security", International Journal of Human-Computer StudiesInternational Journal of Human-Computer Studies (IJHCS) Special Issue on HCI Research in Privacy and Security, vol. 64, no. 1-2, pp. 5-24, July 2005.
Redmiles, D., "Improving the Design of Interactive Software", SIGSOFT Software Engineering NotesSIGSOFT Software Engineering Notes, vol. 25, no. 1, January, 2000.
Estublier, J., D. B. Leblang, G. Clemm, R. Conradi, A. van der Hoek, W. Tichy, and D. Wiborg-Weber, "Impact of the Research Community on the Field of Software Configuration Management", ACM Transactions on Software Engineering Methodology (TOSEM)ACM Transactions on Software Engineering Methodology (TOSEM), vol. 14, no. 4, pp. 383-430, October, 2005.
Estublier, J., D. B. Leblang, G. Clemm, R. Conradi, A. van der Hoek, W. Tichy, and D. Wiborg-Weber, "Impact of the Research Community on the Field of Software Configuration Management", Software Engineering Notes, vol. 27, no. 5, pp. 31-39, 2002.
Williams, J., B. Ferholt, N. Gadjamaschko, A. Jornet, B. Nardi, and J. A. Vadeboncoeur, "Identity, Knowledge, Power, and Educational Reform", Mind, Culture, and Activity, vol. 25, issue 2, pp. 101-104, April, 2018.
Baker, A., and A. van der Hoek, "Ideas, subjects, and cycles as lenses for understanding the software design process", Design StudiesDesign Studies, vol. 31, no. 6, pp. 590-613, 2010.

Pages