ISR Bibliography

Export 497 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Bhadra, A., J. Brown, H. Ke, C. Liu, E-J. Shin, X. Wang, and A. Kobsa, "ABC3D - Using An Augmented Reality Mobile Game to Enhance Literacy in Early Childhood ", IEEE International Conference on Pervasive Computing and Communication (PerCOM 2016), Syndey, Australia, IEEE, March, 2016.
Scacchi, W., and T. A. Alspaugh, "Achieving Better Buying Power for Mobile Open Architecture Software Systems Through Diverse Acquisition Scenarios", 13th Annual Acquisition Research Symposium, Monterey, CA, Naval Postgraduate School, May 4, 2016.
Alspaugh, T., and W. Scacchi, "Achieving Better Buying Power Through Acquisition of Open Architecture Software Systems for Web-Based and Mobile Devices", 12th Annual Acquisition Research Symposium, Monterey, CA, May, 2015.
Scacchi, W., and T. Alspaugh, "Achieving Better Buying Power through Cost-Sensitive Acquisition of Open Architecture Software Systems", 11th Annual Acquisition Research Symposium, Monterey, CA, May 13-15, 2014.
Dourish, P., W. Edwards, A. LaMarca, J. Lamping, K. Petersen, M. Salisbury, D. Terry, and J. Thornton, Active Properties for Dynamic Document Management System Configuration, , United States, June 26, 2001.
Collins, P., S. Shukla, and D. Redmiles, "Activity Theory and System Design: A View from the Trenches", Computer Supported Cooperative Work, Special Issue on Activity Theory and the Practice of Design, vol. 11, no. 1-2, pp. 55-80, 2002.
Scacchi, W., and T. A. Alspaugh, "Addressing challenges in the acquisition of secure software systems with open architectures", 9th Annual Acquisition Research Symposium, Seaside, CA, May 15-17, 2012.
Scacchi, W., and T. A. Alspaugh, "Advances in the Acquisition of Secure Systems based on Open Architectures", 8th Acquisition Research Symposium, Monterey Bay, CA, May 10-12, 2011.
Scacchi, W., and T. Alspaugh, "Advances in the Acquisition of Secure Systems Based on Open Architectures (reprint)", Journal of Cybersecurity & Information Systems, vol. 1, issue 2, 02/2013.
Boehner, K., R. De Paula, P. Dourish, and P. Sengers, "Affect: From Information to Interaction", Critical Computing: Fourth Decennial Aarhus Conference, Aarhus, Denmark, 2005.
Boehner, K., R. DePaula, P. Dourish, and P. Sengers, "Affect: From Information to Interaction", Critical Computing: Fourth Decennial Aarhus Conference, Aarhus, Denmark, August, 2005.
de Souza, C. R. B., and D. Redmiles, "On the alignment of organizational and software structure", Handbook of Research on Socio-Technical Design and Social Networking SystemsHandbook of Research on Socio-Technical Design and Social Networking Systems, pp. 94-104, 2009.
Sadeghi, A., H. Bagheri, and S. Malek, "Analysis of Android Inter-App Security Vulnerabilities Using COVERT", 37th International Conference on Software Engineering (ICSE 2015), Demonstrations Track, Florence, Italy, May, 2015.
De Souza, C. R. B., J. Penix, M. Sierhuis, and D. F. Redmiles, "Analysis of Work Practices of a Collaborative Software Development Team", First International Symposium on Empirical Software Engineering (ISESE 2002), Nara, Japan, October 3-4, 2002.
Trainer, E., S. Quirk, C. de Souza, and D. Redmiles, "Analyzing a socio-technical visualization tool using usability inspection methods", Proceedings of the 2008 IEEE Symposium on Visual Languages and Human-Centric Computing: IEEE Computer Society, pp. 78-81, 2008.
Alspaugh, T. A., H. U. Asuncion, and W. Scacchi, "Analyzing software licenses in open architecture software systems", Proceedings of the 2009 ICSE Workshop on Emerging Trends in Free/Libre/Open Source Software Research and Development: IEEE Computer Society, pp. 54-57, 2009.
Sajnani, H., R. Naik, and C. V. Lopes, "Application Architecture Discovery: Towards Domain-driven, Easily Extensible Code Structure", 18th Working Conference on Reverse Engineering (WCRE 2011). Best Paper Award in the Industrial track, Limerick, Ireland, October 17-20, 2011.
Ossher, J., and C. Lopes, "Applying Program Analysis to Code Retrieval", Finding Source Code on the Web for Remix and Reuse, New York, Springer , pp. 205-225, 2013.
Nardi, B., "Appropriating Theory", Theory Development in Information: Reflecting on the Process, Austin, University of Texas Press, pp. 204-221, 2016.
Umarji, M., S E. Sim, and C. V. Lopes, "Archetypal Internet-Scale Source Code Searching", 4th International Conference on Open Source Systems, Milan, Italy, pp. 7, 8-10 September 2, 2008.
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor, "Architecting Trust-enabled Peer-to-Peer File-sharing Applications", ACM Crossroads, issue on Software Engineering, vol. 12, no. 4, pp. 11-19, Summer, 2006.
Suryanarayana, G., J. R. Erenkrantz, and R. N. Taylor, "An Architectural Approach for Decentralized Trust Management", IEEE Internet ComputingIEEE Internet Computing, vol. 9, no. 6, pp. 16-23, Nov/Dec, 2005.
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor, "Architectural Support for Trust Models in Decentralized Applications", 28th International Conference on Software Engineering (ICSE 2006), Shanghai, China, pp. 52-61, May, 2006.
Schmerl, B., J. Gennari, A. Sadeghi, H. Bagheri, S. Malek, J. Camara, and D. Garlan, "Architecture Modeling and Analysis of Security in Android Systems", 10th European Conference on Software Architecture (ECSA 2016), Istanbul, Turkey, pp. 274-290, 11/2016.
Schmerl, B., J. Gennari, A. Sadeghi, H. Bagheri, S. Malek, J. Camara, and D. Garlan, "Architecture Modeling and Analysis of Security in Android Systems", 10th European Conference on Software Architecture (ECSA 2016), Istanbul, Turkey, pp. 274-290, 11/2016.

Pages