ISR Bibliography

Export 1617 results:
Author Title Type [ Year(Asc)]
2017
Bagheri, H., C. Tang, and K. Sullivan, "Automated Synthesis and Dynamic Analysis of Tradeoff Spaces for Object-Relational Mapping", IEEE Transactions on Software Engineering, vol. 43, issue 2, 02/2017.
Garcia, J., M. Hammad, N. Ghorbani, and S. Malek, "Automatic Generation of Inter-Component Communication Exploits for Android Applications", 1th joint meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017), Paderborn, Germany, pp. 661-671, Sept 4-8, 2017.
Ford, C., D. Gardner, L. Elaine Horgan, C. Liu, B. Nardi, and J. Rickman, "Chat Speed OP PogChamp: Practices of Coherence in Massive Twitch Chat", 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '17), Denver, CO, pp. 858-871, May 6-11, 2017.
Ou, P., and B. Demsky, "Checking Concurrent Data Structures Under the C/C++11 Memory Model", 2017 ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP 2017), Austin, TX, pp. 45-59 , Feb 4-8, 2017.
Dourish, P., "Commentary: Interactivity as Cultural", Human–Computer InteractionHuman–Computer Interaction, vol. 32, no. 3, pp. 153-154, May 4, 2017.
Li, J., M. X. Zhou, H. Yang, and G. Mark, "Confiding in and Listening to Virtual Agents: The Effect of Personality", 22nd International Conference on Intelligent User Interfaces (IUI '17), Limassol, Cyprus , ACM, pp. 275-286, March 13-16, 2017.
Kou, Y., B. Semaan, and B. Nardi, "A Confucian Look at Internet Censorship in China", 16th IFIP TC.13 International Conference on Human-Computer Interaction (INTERACT 2017), Lecture Notes in Computer Science, vol. 10513: Springer, pp. p. 377-398, Sept 25-29, 2017.
Li, Y.., A.. Kobsa, B.. Knijnenburg, and M.-H.. Carolyn Nguyen, "Cross-Cultural Privacy Prediction", Proceedings on Privacy Enhancing TechnologiesProceedings on Privacy Enhancing Technologies, vol. 3, no. 2, pp. 113-132, April, 2017.
Scacchi, W., and T. A. Alspaugh, "Cybersecure Modular Open Architecture Software Systems for Stimulating Innovation", 14th Annual Acquisition Research Symposium, Monterey, CA, pp. 316–334, April 26-17, 2017.
Lopes, C., P. Maj, P. Martins, V. Saini, D. Yang, J. Zitny, H. Sajnani, and J. Vitek, "DéjàVu: A Map of Code Duplicates on GitHub", SPLASH 2017 - OOPSLA. Proceedings of the ACM on Programming Languages (PACMPL), Vancouver, Canada, ACM, pp. Article 84; 28 pages, October, 2017.
Hammad, M.., H.. Bagheri, and S.. Malek, "Determination and Enforcement of Least-Privilege Architecture in Android", IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden, IEEE, pp. 59-68, Apr 3-7, 2017.
Grover, T., and G. Mark, "Digital footprints: predicting personality from temporal patterns of technology use", 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2017 ACM International Symposium on Wearable Computers (UbiComp '17), pp. 41-44, Sept. 11-15, 2017.
Palepu, V. Krishna, G. Xu, and J. A. Jones, "Dynamic Dependence Summaries", ACM Transactions on Software Engineering and Methodology (TOSEM)ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 25, no. 4, pp. 1-41, January, 2017.
Medvidovic, N., S. Malek, M. Mirakhorli, and J. Garcia, "ECASE 2017 Workshop Summary", 2017 IEEE/ACM 1st International Workshop on Establishing the Community-Wide Infrastructure for Architecture-Based Software Engineering (ECASE 2017) , Buenos Aires, Argentina, IEEE Press, pp. 1, May 22, 2017.
Lopes, C. V., S. Chiba, T. D’Hondt, W. De Meuter, R. Gabriel, R. Hirschfeld, T. Pape, G. Salvaneschi, and M. Südholt, "Editorial: Introducing The Art, Science, and Engineering of Programming", The Art, Science, and Engineering of Programming, vol. 1, no. 1, pp. editorial-1, Jan 9, 2017.
Sadeghi, A., "Efficient Permission-Aware Analysis of Android Applications", Doctoral Dissertation, 2017.
Chagas, B. Azevedo, D. F. Redmiles, and C. S. de Souza, "End-user development for the Internet of Things OR How can a (smart) light bulb be so complicated?", IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), Raleigh, NC, IEEE, pp. 273–277, 10/2017.
Jabbarvand, R., and S. Malek, An Energy-Aware Mutation Testing Framework for Android, , no. UCI-ISR-17-1: UCI Institute for Software Research, January, 2017.
Wang, Y., and G. Mark, "Engaging with Political and Social Issues on Facebook in College Life", 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, Portland, OR, ACM, pp. 433-445, Feb 25-Mar 1, 2017.
Sadeghi, A.., N.. Esfahani, and S.. Malek, "Ensuring the Consistency of Adaptation through Inter-and Intra-Component Dependency Analysis", ACM Transactions on Software Engineering and Methodology (TOSEM), May, vol. 26, no. 1, pp. 2:1--2:27, July 1, 2017.
Berg, B., T. Kaczmarek, A. Kobsa, and G. Tsudik, "An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks", IEEE Security & Privacy, vol. 15, issue 6, November/December, pp. 52-60, 2017.
Suzuki, M., A. Carvalho de Paula, E. Guerra, C. V. Lopes, and O. Agusto Laz Lemos, "An Exploratory Study of Functional Redundancy in Code Repositories.", 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM), Shanghai, China, pp. 31-40, Sept. 17-18, 2017.
Bagheri, H., E. Kang, S. Malek, and D. Jackson, "A Formal Approach for Detection of Security Flaws in the Android Permission System", Springer Journal on Formal Aspects of Computing, 2017.
Servant, F., and J. A. Jones, "Fuzzy fine-grained code-history analysis", 39th International Conference on Software Engineering (ICSE 2017), Buenos Aires, Argentina, IEEE Press, pp. 746-757, May 20-28, 2017.
Norton, J., A. Raturi, B. Nardi, S. Prost, S. McDonald, D. Pargman, O. Bates, M. Normark, B. Tomlinson, N. Herbig, et al., "A grand challenge for HCI: food+ sustainability", interactions, vol. 24, issue 4, pp. 50-55, Nov + Dec, 2017.

Pages