Journal Article
Penzenstadler, B., A. Raturi, D. J. Richardson, S. M. Silberman, and B. Tomlinson,
"Collapse (and other futures) software engineering",
First Monday, vol. 20, issue 8, July, 2015.
Cho, H., B. Knijnenburg, A. Kobsa, and Y. Li,
"Collaborative Privacy Management in Social Media: A Cross Cultural Validation.",
ACM Transactions on Computer-Human Interaction (TOCHI), vol. 25, issue 3, pp. Article No. 17, 33 pp., June, 2018.
Robbins, J. E., and D. F. Redmiles,
"Cognitive Support, UML Adherence, and XMI Interchange in Argo/UML",
Information and Software Technology, Special Issue: The Best of COSET '99, vol. 42, no. 2, pp. 79-89, 2000.
Saini, V., H. Sajnani, and C. Lopes,
"Cloned and non-cloned Java methods: a comparative study",
Empirical Software Engineering., vol. 23, issue 4, pp. 2232-2278, August, 2018.
Medvidović, N., and R. N. Taylor,
"A Classification and Comparison Framework for Software Architecture Description Languages",
IEEE Transactions on Software EngineeringIEEE Transactions on Software Engineering, vol. 26, no. 1, pp. 70-93, January, 2000.
Hondori, H. Mousavi, M. Khademi, L. Dodakian, A. McKenzie, C. V. Lopes, and S. C. Cramer,
"Choice of Human–Computer Interaction Mode in Stroke Rehabilitation",
Neurorehabilitation and neural repair, vol. 30, issue 3, 03/2016.
Anderson, K. M., R. N. Taylor, and J. E. Whitehead,
"Chimera: Hypermedia for Heterogeneous Software Development Environments",
ACM Transactions on Office Information Systems (TOIS), vol. 18, no. 3, pp. 211-245, July, 2000.
Taylor, R., and D. Redmiles,
"Chimera",
SIGSOFT Software Engineering NotesSIGSOFT Software Engineering Notes, vol. 25, no. 1, January, 2000.
Wang, Y., and D. Redmiles,
"Cheap Talk, Cooperation, and Trust in Global Software Engineering: An Evolutionary Game Theory Model with Empirical Support",
Empirical Software Engineering, October 15, 2015, vol. 21, issue 6, pp. 1-35, December, 2016.
Sarma, A., D. Redmiles, and A. van der Hoek,
"Categorizing the Spectrum of Coordination Technology",
ComputerComputer, vol. 43, no. 6, pp. 61-67, June, 2010.
Kobsa, A., R. Nithyanand, G. Tsudik, and E. Uzun,
"Can Jannie Verify? Usability of Display-Equipped RFID Tags for Security Purposes",
Journal of Computer Security Journal of Computer Security, vol. 21, no. 3, pp. 347-370, July, 2013.
Demsky, B., and S. Sundaramurthy,
"Bristlecone: Language Support for Robust Software Applications",
IEEE Transactions on Software EngineeringIEEE Transactions on Software Engineering, 2009.
Medvidović, N., P. Gruenbacher, A. Egyed, and B. W. Boehm,
"Bridging Models across the Software Lifecycle",
Journal of Systems and SoftwareJournal of Systems and Software, vol. 68, no. 3, pp. 199-215, 2003.
Bergman, M., K. Lyytinen, and G. Mark,
"Boundary Objects in Design: An Ecological View of Design Artifacts",
Journal of the Association for Information Systems, Special Issue on Systems Analysis and DesignJournal of the Association for Information Systems, Special Issue on Systems Analysis and Design, vol. 8, no. 11, November, 2007.
Brubaker, J., G. Hayes, and P. Dourish,
"Beyond the Grave: Facebook as a site for the expansion of death and mourning",
The Information Society, vol. 29, no. 3, pp. 152-163, May-June, 2013.
Nardi, B. A.,
"Beyond Bandwidth: Dimensions of Connection in Interpersonal Communication",
Journal of Computer Supported Cooperative Work, vol. 14, no. 2, pp. 91-130, 2005.
Bell, G., and P. Dourish,
"Back to the Shed: Gendered Visions of Technology and Domesticity",
Personal and Ubiquitous ComputingPersonal and Ubiquitous Computing, vol. 11, no. 5, pp. 373-381, 2007.
De Souza, C. R. B., and D. F. Redmiles,
"The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor?",
IEEE Transactions on Software Engineering, vol. 37, no. 3, May/June , 2011.
Demsky, B., and M. Rinard,
"Automatic Extraction of Heap Reference Properties in Object-Oriented Programs",
IEEE Transactions on Software Engineering, vol. 35, no. 3, pp. 305-324, May-June, 2009.