Journal Article
Richardson, D., R. Farmer, and C. Wilson,
"CSEdWeek Wants You!",
ACM SIGCSE Bulletin, vol. 43, no. 3, pp. 6, September, 2011.
Richardson, D.,
"CSEdWeek Shines in 2011",
ACM SIGCSE Bulletin, vol. 44, no. 3, September, 2012.
LaToza, T. D., and A. van der Hoek,
"Crowdsourcing in Software Engineering: Models, Motivations, and Challenges",
IEEE Software, vol. 33, issue 1, pp. 74-80, January-February, 2016.
Li, Y.., A.. Kobsa, B.. Knijnenburg, and M.-H.. Carolyn Nguyen,
"Cross-Cultural Privacy Prediction",
Proceedings on Privacy Enhancing TechnologiesProceedings on Privacy Enhancing Technologies, vol. 3, no. 2, pp. 113-132, April, 2017.
Demsky, B.,
"Cross Application Data Provenance and Policy Enforcement",
ACM Transactions on Information and System Security, vol. 14, no. 1, May, 2011.
Bagheri, H., A. Sadeghi, J. Garcia, and S. Malek,
"COVERT: Compositional Analysis of Android Inter-App Security Vulnerabilities",
IEEE Transactions on Software Engineering (IEEE TSE), vol. 41, issue 9, pp. 866-886, 09/2015.
Redmiles, D., A. van der Hoek, B. Al-Ani, T. Hildenbrand, S. Quirk, A. Sarma, R. Silva Filho, C. R. B. de Souza, and E. Trainer,
"Continuous Coordination: A New Paradigm to Support Globally Distributed Software Development Projects",
Withschaftsinformatik, vol. 49, pp. S28–S38, 2007.
Murta, L. P. G., A. van der Hoek, and C. M. L. Werner,
"Continuous and Automated Evolution of Architecture-to-Implementation Traceability Links",
Automated Software Engineering, Special Issue on Selected Papers from the 21st International Conference on Automated Software Engineering (ASE'2006), vol. 15, no. 1, pp. 75-107, 2008.
Nardi, B., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth,
"ContactMap: Integrating communication and information through visualizing personal social networks",
Communications of the Association for Computing Machinery, vol. April, pp. 89-95, 2002.
Nardi, B. A., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth,
"ContactMap: Integrating Communication and Information Through Visualizing Personal Social Networks",
Communications of the ACM, vol. 45, no. 4, pp. 89-95, 2002.
Lee, H., and A. Kobsa,
"Confident Privacy Decision-Making in IoT Environments",
ACM Transactions on Computer-Human Interaction, vol. 27, issue 1, pp. Article 6, 12/2019.
Grudin, J.., G. Mark, and J.. Riedl,
"Conference-Journal Hybrids",
Communications of the ACM, vol. 56, no. 1, pp. 44-49, January, 2013.
Nardi, B., B. Tomlinson, D. Patterson, J. Chen, D. Pargman, B. Raghavan, and B. Penzenstadler,
"Computing within Limits",
Communications of the ACM, vol. 61, issue 10, 10/2018.
Yasinsac, A., R. F. Erbacher, D. G. Marks, M. M. Pollitt, and P. M. Sommer,
"Computer forensics education",
IEEE Security & Privacy, vol. 1, no. 4, pp. 15-23, 2003.
Dashofy, E., A. van der Hoek, and R. N. Taylor,
"A Comprehensive Approach for the Development of XML-Based Software Architecture Description Languages",
ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 14, no. 2, pp. 199-245, April, 2005.
Nardi, B., R. Vatrapu, and T. Clemmensen,
"Comparative informatics",
interactions, vol. 18, no. 2, pp. 28-33, March + April, 2011.
Dourish, P.,
"Commentary: Interactivity as Cultural",
Human–Computer InteractionHuman–Computer Interaction, vol. 32, no. 3, pp. 153-154, May 4, 2017.
Dourish, P.,
"Commentary: Conduits and Communities",
Human–Computer Interaction, vol. 30, no. 6, pp. 540-543, November, 2015.
Tomlinson, W.., E.. Blevis, B. A. Nardi, D. Patterson, S.. Silberman, and Y.. Pan,
"Collapse Informatics and Practice: Theory, Method, and Design",
ACM Transactions on Computer-Human Interaction, special issue on Sustainable HCI through Everyday Practices, vol. 20, issue 4, no. 4, 09/2013.