Journal Article
Yasinsac, A., R. F. Erbacher, D. G. Marks, M. M. Pollitt, and P. M. Sommer,
"Computer forensics education",
IEEE Security & Privacy, vol. 1, no. 4, pp. 15-23, 2003.
Nardi, B., B. Tomlinson, D. Patterson, J. Chen, D. Pargman, B. Raghavan, and B. Penzenstadler,
"Computing within Limits",
Communications of the ACM, vol. 61, issue 10, 10/2018.
Grudin, J.., G. Mark, and J.. Riedl,
"Conference-Journal Hybrids",
Communications of the ACM, vol. 56, no. 1, pp. 44-49, January, 2013.
Lee, H., and A. Kobsa,
"Confident Privacy Decision-Making in IoT Environments",
ACM Transactions on Computer-Human Interaction, vol. 27, issue 1, pp. Article 6, 12/2019.
Nardi, B. A., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth,
"ContactMap: Integrating Communication and Information Through Visualizing Personal Social Networks",
Communications of the ACM, vol. 45, no. 4, pp. 89-95, 2002.
Nardi, B., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth,
"ContactMap: Integrating communication and information through visualizing personal social networks",
Communications of the Association for Computing Machinery, vol. April, pp. 89-95, 2002.
Murta, L. P. G., A. van der Hoek, and C. M. L. Werner,
"Continuous and Automated Evolution of Architecture-to-Implementation Traceability Links",
Automated Software Engineering, Special Issue on Selected Papers from the 21st International Conference on Automated Software Engineering (ASE'2006), vol. 15, no. 1, pp. 75-107, 2008.
Redmiles, D., A. van der Hoek, B. Al-Ani, T. Hildenbrand, S. Quirk, A. Sarma, R. Silva Filho, C. R. B. de Souza, and E. Trainer,
"Continuous Coordination: A New Paradigm to Support Globally Distributed Software Development Projects",
Withschaftsinformatik, vol. 49, pp. S28–S38, 2007.
Bagheri, H., A. Sadeghi, J. Garcia, and S. Malek,
"COVERT: Compositional Analysis of Android Inter-App Security Vulnerabilities",
IEEE Transactions on Software Engineering (IEEE TSE), vol. 41, issue 9, pp. 866-886, 09/2015.
Demsky, B.,
"Cross Application Data Provenance and Policy Enforcement",
ACM Transactions on Information and System Security, vol. 14, no. 1, May, 2011.
Li, Y.., A.. Kobsa, B.. Knijnenburg, and M.-H.. Carolyn Nguyen,
"Cross-Cultural Privacy Prediction",
Proceedings on Privacy Enhancing TechnologiesProceedings on Privacy Enhancing Technologies, vol. 3, no. 2, pp. 113-132, April, 2017.
LaToza, T. D., and A. van der Hoek,
"Crowdsourcing in Software Engineering: Models, Motivations, and Challenges",
IEEE Software, vol. 33, issue 1, pp. 74-80, January-February, 2016.
Richardson, D.,
"CSEdWeek Shines in 2011",
ACM SIGCSE Bulletin, vol. 44, no. 3, September, 2012.
Richardson, D., R. Farmer, and C. Wilson,
"CSEdWeek Wants You!",
ACM SIGCSE Bulletin, vol. 43, no. 3, pp. 6, September, 2011.
Mangano, N., and A. van der Hoek,
"The Design and Evaluation of a Tool to Support Software Designers at the Whiteboard",
Journal of Automated Software Engineering, Special Issue: Selected Topics in Automated Software Engineering, vol. 19, no. 4, pp. 1-41, March, 2012.
Valadares, A., E. Gabrielova, and C. V. Lopes,
"On Designing and Testing Distributed Virtual Environments",
Wiley Journal on Concurrency and Computation: Practice and Experience, vol. 28, no. 12, pp. 3255–3522, August, 2016.
van der Hoek, A.,
"Design-Time Product Line Architectures for Any-Time Variability",
Science of Computer Programming, Special issue on Software Variability Management, vol. 53, no. 30, pp. 285-304, 2004.
Cole, M., B. Nardi, and J. A. Vadeboncoeur,
"Detailing Learning Lives",
Mind, Culture, and Activity, vol. 22, no. 3, pp. 199-200, August 11, 2015.