Journal Article
Edwards, A., S. Tucker, and B. Demsky,
"AFID: An Automated Approach to Collecting Software Faults",
Automated Software Engineering JournalAutomated Software Engineering Journal, vol. 17, no. 3, pp. 347-372, September, 2010.
Nardi, B., N. Gajdamaschko, and J. A. Vadeboncoeur,
"Agency, Identity, and Objects in Work and Play",
Mind, Culture, and Activity, vol. 24, no. 3, pp. 181-182, July 3, 2017.
Dourish, P.,
"Algorithms and their Others: Algorithmic Culture in Context ",
Big Data & SocietyBig Data & Society, vol. 3, no. 2, August 1, 2016.
Bajracharya, S K., and C V. Lopes,
"Analyzing and mining a code search engine usage log ",
Empirical Software Engineering, Special Issue MSR09Empirical Software Engineering, Special Issue MSR09: Springer Netherlands, September, 2010.
Dorn, C., and R. N. Taylor,
"Analyzing Runtime Adaptability of Collaboration Patterns",
Concurrency and Computation: Practice and ExperienceConcurrency and Computation: Practice and Experience, Online: November 28, 2014, vol. 27, no. 11, pp. 2725-2750, July 16, 2015.
Dourish, P.,
"The Appropriation of Interactive Technologies: Some Lessons from Placeless Documents",
Computer-Supported Cooperative Work, Special Issue on Evolving Use of Groupware, To appear, 2003.
Dourish, P.,
"The Appropriation of Interactive Technologies: Some Lessons from Placeless Documents",
Computer-Supported Cooperative Work, Special Issue on Evolving Use of Groupware, To appear, 2001.
Taylor, R., and D. Redmiles,
"Arabica",
SIGSOFT Software Engineering Notes, vol. 25, no. 1, January, 2000.
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor,
"Architecting Trust-enabled Peer-to-Peer File-sharing Applications",
ACM Crossroads, issue on Software Engineering, vol. 12, no. 4, pp. 11-19, Summer, 2006.
Xu, L., H. Ziv, D. J. Richardson, and T. A. Alspaugh,
"An Architectural Pattern for Non-functional Dependability Requirements",
Journal of Systems and Software, special issue on Architecting Dependable Systems, vol. 79, no. 10, pp. 1370-1378, October, 2006.
Georgas, J. C., E. M. Dashofy, and R. N. Taylor,
"Architecture-Centric Development: A Different Approach to Software Engineering",
ACM Crossroads, issue on Software Engineering, vol. 12, no. 4, Summer, 2006.
Stafford, J. A., D. J. Richardson, and A. L. Wolf,
"Architecture-level Dependence Analysis for Software Systems",
International Journal of Software Engineering and Knowledge Engineering, vol. 11, no. 4, pp. 431-452, August, 2001.
Taylor, R., and D. Redmiles,
"ArchStudio",
SIGSOFT Software Engineering Notes, vol. 25, no. 1, January, 2000.
Taylor, R., and D. Redmiles,
"Argo/UML",
SIGSOFT Software Engineering Notes, vol. 25, no. 1, January, 2000.
Demsky, B., and M. Rinard,
"Automatic Extraction of Heap Reference Properties in Object-Oriented Programs",
IEEE Transactions on Software Engineering, vol. 35, no. 3, pp. 305-324, May-June, 2009.
De Souza, C. R. B., and D. F. Redmiles,
"The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor?",
IEEE Transactions on Software Engineering, vol. 37, no. 3, May/June , 2011.
Bell, G., and P. Dourish,
"Back to the Shed: Gendered Visions of Technology and Domesticity",
Personal and Ubiquitous ComputingPersonal and Ubiquitous Computing, vol. 11, no. 5, pp. 373-381, 2007.
Nardi, B. A.,
"Beyond Bandwidth: Dimensions of Connection in Interpersonal Communication",
Journal of Computer Supported Cooperative Work, vol. 14, no. 2, pp. 91-130, 2005.
Brubaker, J., G. Hayes, and P. Dourish,
"Beyond the Grave: Facebook as a site for the expansion of death and mourning",
The Information Society, vol. 29, no. 3, pp. 152-163, May-June, 2013.
Bergman, M., K. Lyytinen, and G. Mark,
"Boundary Objects in Design: An Ecological View of Design Artifacts",
Journal of the Association for Information Systems, Special Issue on Systems Analysis and DesignJournal of the Association for Information Systems, Special Issue on Systems Analysis and Design, vol. 8, no. 11, November, 2007.