Diomidis Spinellis General Article Library
- Gregory D. Abowd and
Elizabeth D. Mynatt.
Charting past, present, and future research in ubiquitous computing.
ACM Transactions on Computer-Human Interaction, 7(1):29–58, March
2000.
- Sisay Fissaha Adafre and
Maarten de Rijke.
Discovering
missing links in Wikipedia.
In Proceedings of the Workshop on Link Discovery: Issues, Approaches and
Applications (LinkKDD-2005), 2005.
- Mike
Addlesee, Rupert Curwen, Steve Hodges,
Joe Newman, Pete Steggles, Andy
Ward, and Andy Hopper.
Implementing a sentient computing system.
Computer, 34(8):50–56, August 2001.
- Phil Agre.
Networking on
the network: A guide to professional skills for phd students.
Available online http://dlis.gseis.ucla.edu/people/pagre/network.html. Current
January 2003, August 2002.
- James F. Allen.
Maintaining knowledge about temporal intervals.
Technical Report TR 86, The University of Rochester, Department of Computer
Science, Rochester, NY 14627, January 1981.
- James F. Allen.
Towards a general theory of action and time.
Artificial Intelligence, (23):123–154, 1984.
- Steven
Alter and Alan R. Dennis.
Selecting research topics: Personal experiences and speculations for the
future.
Communications of the Association for Information Systems,
8:314–329, 2002.
- Steven Alter.
Customer
service, responsibility, and systems in international e-commerce: Should a
major airline reissue a stolen ticket?.
Communications of AIS, 12(10), 2003.
- Einat
Amitay and Andrei Broder.
Introduction to special issue on query log analysis: Technology and ethics.
ACM Transactions on the Web, 2(4):1–2, 2008.
(doi:10.1145/1409220.1409221)
- Ross
Anderson and Roger Needham.
Programming Satan's computer.
In Jan van Leeuwen, editor, Computer Science Today: Recent
Trends and Developments, pages 426–440. Springer Verlag, Berlin,
1995.
Lecture Notes in Computer Science 1000.
- Susan
Angebranndt, Philip Karlton, Raymond Drewry,
and Todd Newman.
Writing tailorable software: The X11 sample server.
Software: Practice & Experience, 20(S2):S2/69–S2/81, October
1991.
- Debra Ansen.
Document architecture standards evolution.
AT&T Technical Journal, 68(4):33–44, July/August 1989.
- Giuliano
Antoniol, Roberto Fiutem, G. Lutteri,
Paolo Tonella, S. Zanfei, and
Ettore Merlo.
Program understanding
and maintenance with the CANTO environment.
In ICSM '97: Proceedings of the International Conference on Software
Maintenance, page 72, Washington, DC, USA, 1997. IEEE Computer
Society.
(doi:ICSM.1997.624233)
- G. Antoniol, M. Di Penta,
G. Masone, and U. Villano.
XOgastan:
XML-oriented gcc AST analysis and transformations.
In Third IEEE International Workshop on Source Code Analysis and
Manipulation (SCAM'03), page 173, Los Alamitos, CA, USA, 2003. IEEE
Computer Society.
(doi:10.1109/SCAM.2003.1238043)
- Steven Armbrust and Ted
Forgeron.
.OBJ lessons.
PC Tech Journal, pages 63–81, October 1985.
- Deborah J.
Armstrong.
The quarks of object-oriented development.
Communications of the ACM, 49(2):123–128, 2006.
(doi:10.1145/1113034.1113040)
- Patrick
Arnold.
The user reference manual for the Axis system.
Technical Report HPL–ISC—TR–88–034, September 1988.
- Daniel Ashbrook and Thad
Starner.
Learning significant locations and predicting user movement with GPS.
In Sixth International Symposium on Wearable Computers, pages
101–108. IEEE Computer Society, October 2002.
- Helen Ashman.
Electronic document addressing: Dealing with change.
ACM Computing Surveys, 32(3):201–212, September 2000.
- Darren C. Atkinson and
William G. Griswold.
The
design of whole-program analysis tools.
In 18th International Conference on Software Engineering, ICSE
'96, pages 16–27, New York, 1996. ACM, ACM Press.
- Paul Attewell.
Technology diffusion and
organizational learning: The case of business computing.
Organization Science, 3(1):1–19, February 1992.
- Lerina
Aversano, Massimiliano Di Penta, and Ira D.
Baxter.
Handling
preprocessor-conditioned declarations.
In SCAM'02: Second IEEE International Workshop on Source Code Analysis
and Manipulation, pages 83–93, Los Alamitos, CA, USA, 2002. IEEE
Computer Society.
(doi:10.1109/SCAM.2002.1134108)
- John Aycock.
A brief history of just-in-time.
ACM Computing Surveys, 35(2):97–113, 2003.
(doi:10.1145/857076.857077)
- Christopher Baber and Konrad
Baumann.
Embedded human computer interaction.
Applied Ergonomics, 33:273–287, 2002.
- Greg J.
Badros and David Notkin.
A framework for preprocessor-aware C source code analyses.
Software: Practice & Experience, 30(8):907–924, July 2000.
- Bouchaib
Bahli and Dany Di Tullio.
Web
engineering: An assessment of empirical research.
Communications of AIS, 12(14), 2003.
- Thomas
Ball and Sriram K. Rajamani.
The SLAM project:
debugging system software via static analysis.
In POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on
Principles of Programming Languages, pages 1–3, New York, 2002. ACM
Press.
(doi:10.1145/503272.503274)
- Philip Ball.
Achievement index climbs the ranks.
Nature, 448:737, August 2007.
- Albert-László Barabási and
Réka Albert.
Emergence of scaling in random networks.
Science, 286:509–512, October 1999.
- Albert-László Barabási,
Réka Albert, and Hawoong Jeong.
Scale-free
characteristics of random networks: the topology of the world-wide web.
Physica, A(281):69–77, 2000.
- Paul
Barham, Boris Dragovic, Keir Fraser,
Steven Hand, Tim Harris, Alex
Ho, Rolf Neugebauer, Ian Pratt, and
Andrew Warfield.
Xen and the art of virtualization.
In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating
systems principles, pages 164–177, New York, NY, USA, 2003. ACM
Press.
(doi:10.1145/945445.945462)
- Jeff
Barr and Luis Felipe Cabrera.
AI gets a brain.
Queue, 4(4):24–29, 2006.
(doi:10.1145/1142055.1142067)
- L. Barroca, J. Hall, and
P. Hall, editors.
Software Architectures: Advances and Applications.
Springer Verlag, Berlin, 1999.
- Luiz André Barroso,
Jeffrey Dean, and Urs Hlzle.
Web search for a
planet: The Google cluster architecture.
IEEE Micro, pages 22–28, March/April 2003.
- Iain Bate,
Philippa Conmy, Tim Kelly, and
John McDermid.
Use of modern processors in safery critical applications.
The Computer Journal, 44(6):531–543, 2001.
- Thomas Baudel and Michel
Beaudouin-Lafon.
Charade: Remote control of objects using free-hand gestures.
Communications of the ACM, 36(7):28–35, July 1993.
- Christian
Bauer, Alexander Frink, and Richard Kreckel.
Introduction to the GiNaC framework for symbolic computation within the C++
programming language.
Journal of Symbolic Computation, 33:1–12, 2002.
- David S. Bauser and Michael E.
Koblentz.
NIDX — a real-time intrusion detection expert system.
In USENIX Conference Proceedings, pages 261–273, Berkeley, CA,
Summer 1988. USENIX Association.
- Ira D.
Baxter and Michael Mehlich.
Preprocessor
conditional removal by simple partial evaluation.
In WCRE '01: Proceedings of the Eighth Working Conference on Reverse
Engineering, pages 281–292, Washington, DC, USA, 2001. IEEE Computer
Society.
(doi:10.1109/WCRE.2001.957833)
- Alberto Bayo-Moriones and
Fernando Lera-López.
A
firm-level analysis of determinants of ICT adoption in Spain.
Technovation, 27(6–7):352 – 366, 2007.
- Brian W. Beach.
Connecting software components with declarative glue.
In 14th International Conference on Software Engineering, pages
120–136, New York, May 1992. ACM Press.
- Jon
Beck and David Eichmann.
Program
and interface slicing for reverse engineering.
In 15th International Conference on Software Engineering, ICSE
'93, pages 509–518, New York, 1993. ACM, ACM Press.
- Kent Beck
and Erich Gamma.
Test infected: Programmers love writing tests.
Java Report, 3(7):37–50, July 1998.
- Gordon
Bell and Jim Gemmell.
A call for the home media network.
Communications of the ACM, 45(7):71–75, July 2002.
(doi:10.1145/514236.514237)
- Gordon
Bell and Jim Gray.
Digital immortality.
Communications of the ACM, 44(3):28–30, March 2001.
(doi:10.1145/365181.365182)
- J. Bell,
F. Bellegarde, J. Hook, R. B.
Kieburtz, A. Kotov, J. Lewis,
L. McKinney, D. P. Oliva,
T. Sheard, L. Tong, L. Walton,
and T. Zhou.
Software
design for reliability and reuse: a proof-of-concept demonstration.
In Conference on TRI-Ada '94, pages 396–404, New York, 1994. ACM,
ACM Press.
- Gordon Bell.
A personal digital store.
Communications of the ACM, 44(1):86–91, December 2001.
- Jon Louis
Bentley.
More
Programming Pearls: Confessions of a Coder, chapter Little
Languages, pages 83–100.
Addison-Wesley, 1988.
- Jon Louis
Bentley.
Little languages for pictures in AWK.
AT&T Technical Journal, 68(4):21–32, July/August 1989.
- Emery D.
Berger, Benjamin G. Zorn, and Kathryn S.
McKinley.
Reconsidering custom
memory allocation.
In Mamdouh Ibrahim and Satoshi Matsuoka, editors,
OOPSLA '02: Proceedings of the 17th ACM SIGPLAN Conference on
Object-Oriented Programming, Systems, Languages, and Applications,
pages 1–12, New York, November 2002. ACM Press.
(doi:10.1145/582419.582421)
- Lucy M. Berlin and Robin
Jeffries.
Consultants
and apprentices: observations about learning and collaborative problem
solving.
In Conference proceedings on Computer-supported cooperative work,
pages 130–137. ACM, November 1992.
- Tim
Berners-Lee, Robert Cailliau, Ari Luotonen,
Henrik Frystyk Nielsen, and Arthur Secret.
The World-Wide-Web.
Communications of the ACM, 37(8):76–82, August 1994.
- T. Berners-Lee.
Cool URIs don't change.
Online: http://www.w3.org/Provider/Style/URI, Current June 2002, 1998.
- R. E.
Berry and B. A. E. Meekings.
A style analysis of C programs.
Communications of the ACM, 28(1):80–88, January 1985.
- Sanjay
Bhansali and Tim J. Hoar.
Automated
software synthesis: An application in mechanical cad.
IEEE Transactions on Software Engineering, 24(10):848–862,
October 1998.
- Gerald
Bieber and Martin Giersich.
Personal mobile navigation systems—design considerations and experiences.
Computers & Graphics, 25(4):563–570, August 2001.
- Markus
Biehl, Henry Kim, and Michael Wade.
Relationships among the academic business disciplines: a multi-method citation
analysis.
Omega: The International Journal of Management Science,
34:359–371, 2006.
- Jams M.
Bieman and Linda M. Ott.
Measuring functional cohesion.
IEEE Transactions on Software Engineering, 20(8):644–658, August
1994.
- Joel Birnbaum.
Pervasive information systems.
Communications of the ACM, 40(2):40–41, February 1997.
- Matt
Bishop and Michael Dilger.
Checking for race conditions in file accesses.
Computing Systems, 9(2):131–152, Spring 1996.
- Gordon Blair and Michael
Papathomas.
The
case for reflective middleware.
In 3rd CaberNet Plenary Workshop, April 1997.
- Sidney
Bloch and Garry Walter.
The impact factor: time for change.
Australian and New Zealand Journal of Psychiatry, 35(5):563–568,
2001.
(doi:10.1046/j.1440-1614.2001.00918.x)
- Hans-Juergen
Boehm.
Threads cannot be
implemented as a library.
In Vivek Sarkar and Mary Hall, editors,
PLDI '05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming
Language Design and Implementation, pages 261–268, New York, June
2005. ACM Press.
(doi:10.1145/1065010.1065042)
- Narasimha
Bolloju.
Improving the quality of business object models using collaboration patterns.
Communications of the ACM, 47(7):81–86, July 2004.
- A. Bosselaers, R. Govaerts,
and J. Vandewalle.
Fast
hashing on the Pentium.
In N. Koblitz, editor, Advances in Cryptology — CRYPTO
'96 16th Annual International Cryptology Conference, pages 298–312,
Berlin, August 1996. Springer-Verlag.
Lecture Notes in Computer Science 1109.
- Roger
Box and Michael Whitelaw.
Experiences when
migrating from structured analysis to object-oriented modelling.
In Proceedings of the Australasian conference on Computing
education, pages 12–18. ACM Press, 2000.
(doi:10.1145/359369.359372)
- Daren C.
Brabham.
Crowdsourcing as a model for problem
solving: An introduction and cases.
Convergence, 14(1):75–90, February 2008.
(doi:10.1177/1354856507084420)
- Gilad
Bracha, Martin Odersky, David Stoutamire, and
Philip Wadler.
Making
the future safe for the past: Adding genericity to the Java programming
language.
ACM SIGPLAN Notices, 33(10):183–200, October 1998.
Proceedings of the 1998 ACM SIGPLAN Conference on Object-Oriented Programming
Systems, Languages and Applications (OOPSLA '98).
- Olin Bray
and Michael M. Hess.
Reengineering a configuration-management system.
IEEE Software, 12(1):55–63, January 1995.
- Lee
Breslau, Deborah Estrin, Kevin Fall,
Sally Floyd, John Heidemann,
Ahmed Helmy, Polly Huang, Steven
McCanne, Kannan Varadhan, Ya Xu, and
Haobo Yu.
Advances in network simulation.
IEEE Computer, 33(5):59–67, May 2000.
- Brian E. Brewington and George
Cybenko.
Keeping up
with the changing web.
IEEE Computer, 33(5):52–58, May 2000.
- Frederick P. Brooks, Jr.
No silver bullet: Essence and accidents of software engineering.
IEEE Computer, 20(4):10–19, April 1987.
- B. A. T.
Brown and M. Perry.
Why don't telephones have off switches? Understanding the use of everyday
technologies.
Interacting with Computers, 12:623–634, 2000.
- M. Brown and R. Sedgewick.
Techniques for algorithm animation.
IEEE Software, 2(1):28–39, January 1985.
- Alan W.
Brown and Kurt C. Wallnau.
The current
state of CBSE.
IEEE Software, 15(5):37–46, September/October 1998.
- Susan L.
Bryant, Andrea Forte, and Amy Bruckman.
Becoming
Wikipedian: transformation of participation in a collaborative online
encyclopedia.
In GROUP '05: Proceedings of the 2005 international ACM SIGGROUP
conference on Supporting group work, pages 1–10, New York, NY, USA,
2005. ACM Press.
(doi:10.1145/1099203.1099205)
- Erik
Brynjolfsson, Michael D. Smith, and
Yu (Jeffrey) Hu.
Consumer surplus in the digital economy: Estimating the value of increased
product variety at online booksellers.
Management Science, 49(11):1580–1596, November 2003.
- Lilian
Burdy, Yoonsik Cheon, David R. Cok,
Michael D. Ernst, Joseph R. Kiniry,
Gary T. Leavens, K. Rustan M. Leino, and
Erik Poll.
An overview of JML tools and applications.
International Journal on Software Tools for Technology Transfer,
7(3):212–232, June 2005.
(doi:10.1007/s10009-004-0167-4)
- Neill
Campbell, Henk L. Muller, and Cliff Randall.
Combining positional information with visual media.
In Third International Symposium on Wearable Computers (ISWC '99),
pages 203–206. IEEE Computer Society, October 1999.
- George
Candea, Aaron B. Brown, Armando Fox, and
David A. Patterson.
Recovery-oriented computing: Building multitier dependability.
Computer, 37(11):60–67, November 2004.
- S. N. Cant,
D. R. Jeffery, and B. L. Henderson-Sellers.
A conceptual model of cognitive complexity of elements of the programming
process.
Information and Software Technology, 37(7):351–362, June
1995.
- Bryan M.
Cantrill, Michael W. Shapiro, and Adam H.
Leventha.
Dynamic instrumentation of production systems.
In Andrea Arpaci-Dusseau and Remzi
Arpaci-Dusseau, editors, Proceedings of the USENIX 2004 Annual
Technical Conference, pages 15–28, Berkeley, CA, June 2004. USENIX
Association.
- A. Capocci, V. Servedio,
F. Colaiori, L. Buriol,
D. Donato, S. Leonardi, , and
G. Caldarelli.
Preferential attachment in the growth of social networks: The case of
wikipedia.
Physical Review E, 74(1):036116 6 pages, 2006.
(doi:10.1103/PhysRevE.74.036116)
- Gene D.
Carlow.
Architecture of the space shuttle primary avionics software system.
Communications of the ACM, 27(9):926–936, September 1984.
- Erran Carmel.
Thirteen assertions for globally dispersed software development research.
In Proceedings of the 30th Hawaii Int. Conf. on System Sciences
(HICSS-30) — Volume 3: Information System Track — Organizational Systems
and Technology, page 445, 1997.
(doi:10.1109/HICSS.1997.661670)
- Nicholas G. Carr.
IT doesn't matter.
Harvard Business Review, pages 41–49, May 2003.
- William E. Cartwright and
Gary J. Hunter.
Towards a methodology for the evaluation of multimedia geographical information
products.
GeoInformatica, 5(3):291–315, September 2001.
- Jeffrey C.
Carver, Maria Letizia Jaccheri, Sandro
Morasca, and Forrest Shull.
A checklist for integrating student empirical studies with research and
teaching goals.
Empirical Software Engineering, 15(1):35–59, 2010.
(doi:10.1007/s10664-009-9109-9)
- Huseyin
Cavusoglu, Birendra Mishra, and Srinivasan
Raghunathan.
Model for evaluating security investments.
Communications of the ACM, 47(7):87–92, July 2004.
- Sagar
Chaki, Edmund Clarke, Alex Groce,
Somesh Jha, and Helmut Veith.
Modular verification
of software components in C.
In ICSE '03: Proceedings of the 25th International Conference on Software
Engineering, pages 385–395, Washington, DC, 2003. IEEE Computer
Society.
(doi:10.1109/ICSE.2003.1201217)
- Anawat Chankhunthod, Peter B.
Danzig, Chuck Neerdaels, Michael F. Schwartz,
and Kurt J. Worrell.
A hierarchical internet object cache.
In USENIX Technical Conference Proceedings, Berkeley, CA, January
1996. USENIX Association.
- François
Charette.
High tech from Ancient Greece.
Nature, 444(7119):551–552, November 2006.
- Patrick Y. K.
Chau and Kar Yan Tam.
Factors affecting the
adoption of open systems: An exploratory study.
MIS Quarterly, 21(1):1–24, March 1997.
- Yih-Farn
Chen, Michael Y. Nishimoto, and C. V.
Ramamoorthy.
The C information abstraction system.
IEEE Transactions on Software Engineering, 16(3):325–334, 1990.
(doi:10.1109/32.48940)
- Su-Shing Chen.
The paradox of digital preservation.
Computer, 34(3):24–28, March 2001.
- Nicos
Christodoulakis.
Greek crisis in perspective: Origins, effects and ways-out.
In Steven N. Durlauf and Lawrence E. Blume,
editors, The New Palgrave Dictionary of Economics. Palgrave
Macmillan, Basingstoke, 2012.
- Keith L. Clark.
Parlog and its applications.
IEEE Transactions on Software Engineering, 14(12):1792–1804,
December 1988.
- Felix S. Cohen.
Transcendental nonsense and the functional approach.
Columbia Law Review, XXXV(6), June 1935.
- Fred Cohen.
Implications of computer viruses and current methods of defense.
In Peter J. Denning, editor, Computers Under Attack:
Intruders, Worms, and Viruses, chapter 22, pages 381–406.
Addison-Wesley, 1990.
- David R.
Cok and Joseph R. Kiniry.
ESC/Java2: Uniting
ESC/Java and JML — progress and issues in building and using
ESC/Java2, including a case study involving the use of the tool to verify
portions of an internet voting tally system.
In Gilles Barthe, Lilian Burdy,
Marieke Huisman, and others, editors,
Construction and Analysis of Safe, Secure, and Interoperable Smart
Devices: International Workshop, CASSIS 2004, pages 108–129,
Berlin, March 2005. Springer-Verlag.
Lecture Notes in Computer Science 3362.
(doi:10.1007/b105030)
- Derek
Coleman, Chris Colin, Robin Gallimore,
Patrick Arnold, and Tony Rush.
An introduction to the Axis specification language.
Technical Report HPL–ISC—TR–88–031, September 1988.
- Christian Collberg and Stephen
Kobourov.
Self-plagiarism in computer science.
Communications of the ACM, 48(4):88–94, 2005.
(doi:10.1145/1053291.1053293)
- Daniel
Cooke, Joseph Urban, and Scott Hamilton.
Unix and beyond: An interview with Ken Thompson.
IEEE Computer, 32(5):58–64, May 1999.
- James O.
Coplien.
Multi-Paradigm
Design.
PhD thesis, Vrije Universiteit Brussel, Urbana-Champaign, IL, 2000.
- James R.
Cordy, Charles D. Halpern-Hamu, and Eric
Promislow.
TXL: A rapid prototyping system for programming language dialects.
Computer Languages, 16(1):97–107, January 1991.
- Michael F.
Cowlishaw.
Decimal
floating-point: Algorism for computers.
In Proceedings of the 16th IEEE Symposium on Computer Arithmetic,
pages 104–111, Washington, DC, June 2003. IEEE Computer Society.
- Russ Cox,
Tom Bergan, Austin T. Clements,
Frans Kaashoek, and Eddie Kohler.
Xoc, an
extension-oriented compiler for systems programming.
In ASPLOS XIII: Proceedings of the 13th international conference on
Architectural support for programming languages and operating systems,
pages 244–254, New York, NY, USA, 2008. ACM.
(doi:10.1145/1346281.1346312)
- Michael L.
Creech.
Author-oriented link management.
In Fifth International World Wide Web Conference, May 1996.
- Roger F. Crew.
ASTLOG: A language
for examining abstract syntax trees.
In Ramming [Ramming, 1997], pages 229–242.
- Christoph Csallner and Yannis
Smaragdakis.
Check 'n' crash:
Combining static checking and testing.
In ICSE '05: Proceedings of the 27th International Conference on Software
Engineering, pages 422–431, New York, NY, 2005. ACM Press.
(doi:10.1145/1062455.1062533)
- Mark
Cummings and Steve Heath.
Mode switching and software download for software defined radio: The SDR
forum approach.
IEEE Communications, 37(8):104–106, August 1999.
- Alessandra Devito Da Cunha and
David Greathead.
Does personality matter?: an analysis of code-review ability.
Communications of the ACM, 50(5):109–112, 2007.
(doi:10.1145/1230819.1241672)
- Michael A.
Cusumano.
The puzzle of Japanese software.
Communications of the ACM, 48(7):25–27, 2005.
(doi:10.1145/1070838.1070858)
- Mônica Ferreira da Silva and
Cláudia Maria Lima Werner.
Packaging reusable components using patterns and hypermedia.
In Proceedings of The Fourth International Conference on Software Reuse
(ICSR '96). IEEE, 1996.
- S. R.
Dalal, J. R. Horgan, and J. R. Kettenring.
Reliable
software and communication: software quality, reliability, and safety.
In 14th International Conference on Software Engineering, ICSE
'93, pages 425–435, New York, 1993. ACM, ACM Press.
- Fariborz
Damanpour.
Organizational size and innovation.
Organization Studies, 13(3):375–402, 1992.
(doi:10.1177/017084069201300304)
- E. Damiani, M. G.Fugini, and
C. Bellettini.
A
hierarchy-aware approach to faceted classification of objected-oriented
components.
ACM Transactions on Software Engineering and Methodology,
8(3):215–262, July 1999.
- Shaul Dar,
Gil Hecht, and Eden Shochat.
dbSwitch towards a
database utility.
In SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International
Conference on Management of Data, pages 892–896, New York, 2004. ACM
Press.
(doi:10.1145/1007568.1007679)
- Thomas H.
Davenport.
Putting the enterprise into the enterprise system.
Harvard Business Review, July-August 1998.
- Nigel
Davies and Hans-Werner Gellersen.
Beyond prototypes: Challenges in deploying ubiquitous systems.
IEEE Pervasive Computing, 1(1):26–35, January-March 2002.
- Gordon B. Davis.
Advising
and supervising doctoral students: Lessons I have learned.
MISRC Working Paper 04-12, University of Minnesota. MIS Research Center, May
2004.
Forthcoming as chapter in PhD Supervisors and Student Handbook for Information
Systems Research, Butterworth-Heinnemann, 2004.
- Derek
de Solla Price.
Gears from the Greeks: The Antikythera Mechanism — a calendar computer
from ca. 80 B.C.
Transactions of the American Philosophical Society — New Series,
64(7), November 1974.
- Kris
De Volder.
JQuery: A generic code browser with a declarative configuration language.
In Practical Aspects of Declarative Languages, pages 88–102.
Springer Verlag, 2006.
Lecture Notes in Computer Science 3819.
(doi:10.1007/11603023_7)
- Paulo
Debenest, Edwardo F. Fukushima, Yuki Tojo, and
Shigeo Hirose.
A new approach to humanitarian demining. part 1: Mobile platform for operation
on unstructured terrain.
Autonomous Robots, 18(3):303–321, 2005.
(doi:10.1007/s10514-005-6842-9)
- Jason
Dedrick and Joel West.
Why
firms adopt open source platforms: A grounded theory of innovation and
standards adoption.
In MISQ Special Issue Workshop on Standard Making: A Critical Research
Frontier for Information Systems, pages 236–257, December 2003.
- D. E.
Denning and P. G. Neumann.
Requirements and model for IDES.
Technical Report SRI Project 6169, SRI International, 33 Ravenswood Avenue,
Menlo Park, CA 94025-3493, August 1985.
- Peter
Denning, Jim Horning, David Parnas, and
Lauren Weinstein.
Wikipedia risks.
Communications of the ACM, 48(12):152–152, 2005.
(doi:10.1145/1101779.1101804)
- Peter J.
Denning.
Virtual memory.
ACM Computing Surveys, 2(3):153–189, September 1970.
- Peter J.
Denning.
The ACM digital library goes live.
Communications of the ACM, 40(7):28–29, July 1997.
- Peter J.
Denning.
Network laws.
Communications of the ACM, 47(11):15–20, November 2004.
- A.R.
Dennis and J.S. Valacich.
Conducting
research in information systems.
Communications of AIS, 7(5), 2001.
- David
Detlefs, Al Dosser, and Benjamin G. Zorn.
Memory allocation costs in large C and C++ programs.
Software: Practice & Experience, 24(6):527–542, June 1994.
- Melvin Diaz.
Integrating
GPS receivers into consumer mobile electronics.
Multimedia, 6(4):88–90, October/December 1999.
- Katy
Dickinson.
Software process framework at Sun.
StandardView, 4(3):161–165, 1996.
(doi:10.1145/240819.240830)
- Edsger W.
Dijkstra.
How do we tell
truths that might hurt?.
In Selected Writings on Computing: A Personal Perspective, pages
129–131. Springer-Verlag, Berlin, 1982.
EWD498, 18th June 1975.
- Petar
Djekic and Claudia Loebbecke.
Preventing application software piracy: An empirical investigation of technical
copy protections.
J. Strateg. Inf. Syst., 16(2):173–186, 2007.
(doi:10.1016/j.jsis.2007.05.005)
- H. Dobbertin, A. Bosselaers,
and B. Preneel.
RIPEMD-160:
A strengthened version of RIPEMD.
In Dieter Gollmann, editor, Fast Software Encryption:
Third International Workshop, pages 71–82. Springer-Verlag, Berlin,
February 1996.
Lecture Notes in Computer Science 1039.
- A. Dolenc, A. Lemmke,
D. Keppel, and G. V. Reilly.
Notes on writing portable programs in C.
Available by anonymous ftp from sauna.hut.fi:pub/CompSciLab/doc, November
1990.
- Jack J.
Dongarra.
Performance of various
computers using standard linear equations software, (Linpack benchmark
report).
Computer Science Technical Report CS-89-85, University of Tennessee, Knoxville,
TN, March 2006.
- Rohan T.
Douglas.
Error message management.
Dr. Dobb's Journal, 15(1):48–51, January 1990.
- Fred Douglas.
The compression cache: Using on-line compression to extend physical memory.
In USENIX Conference Proceedings, pages 519–529, Berkeley, CA,
Winter 1993. USENIX Association.
- S. Drossopoulou,
S. Eisenbach, B. Jacobs, G. T.
Leavens, P. Müller, and
A. Poetzsch-Heffter, editors.
Formal Techniques for Java Programs. Technical Report 269,
Fernuniversität Hagen, 2000.
Available from
verb +www.informatik.fernuni-hagen.de/pi5/publications.html+.
- S. Drossopoulou, F. Damiani,
M. Dezani-Ciancaglini, and P. Giannini.
More dynamic object re-classification: FickleII.
Transactions On Programming Languages and Systems, 24(2):153–191,
2002.
- Mireille Ducassé and
Anna-Maria Emde.
Opium: A debugging environment for Prolog development and debugging
research.
ACM Software Engineering Notes (SIGSOFT), 16(1):54–59,
January 1991.
Demonstration presented at the Fourth Symposium on Software Development
Environments.
- Peter Duchessi and InduShobha
Chengalur-Smith.
Client/server benefits, problems, best practices.
Communications of the ACM, 41(5):87–94, May 1998.
- Tom Duff.
Rc — a shell for plan 9 and UNIX systems.
In Proceedings of the Summer 1990 UKUUG Conference, pages
21–33. UKUUG, July 1990.
- Elizabeth W.
Dunn, Lara B. Aknin, and Michael I. Norton.
Spending money on others promotes happiness.
Science, 319(1687–1688), March 2008.
- Amitava
Dutta-Roy.
Networks for homes.
IEEE Spectrum, 36(12):26–33, December 1999.
- T. Dyba,
E. Arisholm, D.I.K. Sjoberg, J.E.
Hannay, and F. Shull.
Are two heads better than one? on the effectiveness of pair programming.
Software, IEEE, 24(6):12–15, Nov.-Dec. 2007.
(doi:10.1109/MS.2007.158)
- S.T.
Eckmann, G. Vigna, and R. Kemmerer.
STATL: An attack language for state-based intrusion detection.
In Proceedings of the ACM Workshop on Intrusion Detection. ACM,
November 2000.
- Nicholas Economides and
Evangelos Katsamakas.
Two-sided competition of proprietary vs. open source technology platforms and
the implications for the software industry.
Management Science, 52(7):1057–1071, 2006.
(doi:10.1287/mnsc.1060.0549)
- Grant Larsen
(editor).
Component-based enterprise frameworks.
Communications of the ACM, 43(10):24–66, October 2000.
- P. D.
Edwards and R. S. Rivett.
Towards an automative `safer subset' of C.
In Peter Daniel, editor, 16th International Conference on
Computer Safety, Reliability and Security: SAFECOMP '97, pages
185–195, Berlin, September 1997. European Workshop on Industrial Computer
Systems: TC-7, Springer Verlag.
- Stephen G.
Eick and Paul J. Lucas.
Displaying trace files.
Software: Practice & Experience, 26(4):399–409, April 1996.
- Carl Ellison.
Improvements on
conventional PKI wisdom.
In Sean Smith, editor, 1st Annual PKI Research
Workshop, pages 165–175. NIST, April 2002.
- Albert Endres.
An analysis of errors and their causes in system programs.
SIGPLAN Notices, 10(6):327–336, April 1975.
Proceedings of the International Conference on Reliable Software.
(doi:10.1145/390016.808455)
- Dawson R.
Engler and Wilson C. Hsieh.
DERIVE: A tool that automatically reverse-engineers instruction encodings.
In Proceedings of the ACM SIGPLAN Workshop on Dynamic and Adaptive
Compilation and Optimization (Dynamo '00), pages 12–22, New York,
July 2000. ACM Press.
ACM SIGPLAN Notices 35(7).
- Hyeonsang Eom and Jeffrey K.
Hollingsworth.
A tool to help tune where computation is performed.
IEEE Transactions on Software Engineering, 27(7):618–629, July
2001.
- Thomas
Erickson.
Some prolems with the notion of context-aware computing.
Communications of the ACM, 45(2):102–104, February 2002.
- Michael D.
Ernst, Greg J. Badros, and David Notkin.
An empirical
analysis of C preprocessor use.
IEEE Transactions on Software Engineering, 28(12):1146–1170,
December 2002.
- Philip
Evans and Bob Wolf.
Collaboration rules.
Harvard Business Review, 83(7):96–104, July/August 2005.
- Rickard E.
Faith, Lars S. Nyland, and Jan F. Prins.
KHEPERA: A system
for rapid implementation of domain specific languages.
In Ramming [Ramming, 1997], pages 243–255.
- Jean-Marie Favre.
Preprocessors from an abstract point of view.
In Proceedings of the International Conference on Software Maintenance
ICSM '96. IEEE Computer Society, 1996.
- Norman Fenton.
Software measurement: A necessary scientific basis.
IEEE Transactions on Software Engineering, 20(3):199–206, March
1994.
- Rudolf
Ferenc, István Siket, and Tibor
Gyimóthy.
Extracting facts from
open source software.
In ICSM '04: Proceedings of the 20th IEEE International Conference on
Software Maintenance (ICSM'04), pages 60–69, Washington, DC,
September 2004. IEEE Computer Society.
- Robert G.
Fichman.
The diffusion and
assimilation of information technology innovations.
In Robert Zmud, editor, Framing the Domains of IT
Management: Projecting the Future ... Through the Past. Pinnaflex
Educational Resources, Cincinnati, OH, 2000.
- R. Fielding.
Maintaining
distributed hypertext infostructures: Welcome to MOMSpider's web.
In First International Conference on the World Wide Web, May
1994.
- R. Flandrena.
Alef programming user manual, September 1994.
- David D. Van
Fleet, Abagail McWilliams, and Donald S.
Siegel.
A theoretical and empirical analysis of journal rankings: The case of formal
lists.
Australian and New Zealand Journal of Psychiatry, 26(5):839–861,
2000.
- The League for Programming Freedom.
Against user interface copyright, February 1991.
- Stephanie
Forrest.
Genetic algorithms.
ACM Computing Surveys, 28(1):77–83, March 1996.
- Justin E. Forrester and
Barton P. Miller.
An
empirical study of the robustness of Windows NT applications using random
testing.
In WSS'00: Proceedings of the 4th conference on USENIX Windows Systems
Symposium, pages 59–68, Berkeley, CA, USA, 2000. USENIX
Association.
- Forrester.
Open source paves the way for the next generation of enterprise IT, November
2008.
- Armando Fox,
Brad Johanson, Pat Nanrahan, and
Terry Winograd.
Integrating information appliances in an interactive workspace.
Computers Graphics and Applications, 20(3):54–65, May/June
2000.
- Piero
Fraternali.
Tools and approaches for developing data-intensive web applications: A survey.
ACM Computing Surveys, 31(9):227–263, September 1999.
- T. Freeth, Y. Bitsakis,
X. Moussas, J. H. Seiradakis,
A. Tselikas, H. Mangou,
M. Zafeiropoulou, R. Hadland,
D. Bate, A. Ramsey, M. Allen,
A. Crawley, P. Hockley,
T. Malzbender, D. Gelb,
W. Ambrisco, and M. G. Edmunds.
Decoding the ancient Greek astronomical calculator known as the Antikythera
Mechanism.
Nature, 444(7119):587–591, November 2006.
(doi:10.1038/nature05357)
- Tony
Freeth, Alexander Jones, John M. Steele, and
Yanis Bitsakis.
Calendars with Olympiad display and eclipse prediction on the Antikythera
Mechanism.
Nature, 454:614–617, July 2008.
(doi:10.1038/nature07130)
- XML schema part 0: Primer second
edition.
Available online http://www.w3.org/TR/xmlschema-0/, 2004.
- M. Gaelli,
O. Nierstrasz, and S. Stinckwich.
Idioms for composing games with EToys.
In Creating, Connecting and Collaborating through Computing, 2006. C5
'06. The Fourth International Conference on, pages 222–231, 2006.
(doi:10.1109/C5.2006.20)
- John M. Gallaugher and Yu-Ming
Wang.
Understanding network effects in
software markets: Evidence from web server pricing.
MIS Quarterly, 26(4):303–327, 2002.
- Lee Garber.
Will 3G really be the next big wireless technology.
Computer, 35(1):26–32, January 2002.
- Phil Garcia.
Multithreaded architectures and the sort benchmark.
In DAMON '05: Proceedings of the 1st International Workshop on Data
Management on New Hardware, page 1, New York, NY, USA, 2005. ACM
Press.
(doi:10.1145/1114252.1114254)
- R. Kelly Garrett and J. N.
Danziger.
On cyberslacking: Workplace status and personal internet use at work.
Cyber Psychology & Behavior, 11(3):287–292, 2008.
(doi:10.1089/cpb.2007.0146)
- Alejandra Garrido and Ralph
Johnson.
Challenges of
refactoring C programs.
In IWPSE '02: Proceedings of the International Workshop on Principles of
Software Evolution, pages 6–14, New York, NY, USA, 2002. ACM.
(doi:10.1145/512035.512039)
- Alejandra Garrido and Ralph
Johnson.
Analyzing multiple
configurations of a C program.
In ICSM '05: Proceedings of the 21st IEEE International Conference on
Software Maintenance, pages 379–388, Washington, DC, USA, 2005. IEEE
Computer Society.
(doi:10.1109/ICSM.2005.23)
- Alejandra
Garrido.
Program
refactoring in the presence of preprocessor directives.
PhD thesis, University of Illinois at Urbana-Champaign, Champaign, IL, USA,
2005.
Adviser: Ralph Johnson.
- Saul I. Gass.
Project mercury;s man-in-space real-time computer system: ``you have a go, at
least seven orbits''.
IEEE Annals of the History of Computing, 21(4):37–48, 1999.
- Daniel
Geer, Rebecca Bace, Peter Gutmann,
Perry Metzger, Charles P. Pfleeger,
John S. Quarterman, and Bruce Schneier.
Cyberinsecurity:
the cost of monopoly.
Computer and Communications Industry Association report, September 2003.
Available online
http://ccianet.org/filings/cybersecurity/cyberinsecurity.pdf.
- M. Gelgon and K. Tilhou.
Automated
multimedia diaries of mobile device users need summarization.
In F. Paternò, editor, 4th International Symposium on
Mobile Human-Computer Interaction — Mobile HCI 2002, pages 36–44,
Berlin, September 2002. Springer-Verlag.
Lecture Notes in Computer Science 2411.
- Richard
Gerber and Seongsoo Hong.
Slicing
real-time programs for enhanced schedulability.
ACM Transactions on Programming Languages and Systems,
19(3):525–555, May 1997.
- William Germano.
The scholarly lecture:
How to stand and deliver.
The Chronicle Review, 50(14), November 2003.
- Stanley B. Gershwin and
James E. Schor.
Efficient algorithms for buffer space allocation.
In International Workshop on Performance Evaluation and Optimization of
Production Lines, pages 217–228. University of the Aegean, Department
of Mathematics, May 1997.
- Sanjay
Ghemawat, Howard Gobioff, and Shun-Tak Leung.
The google file
system.
In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating
systems principles, pages 29–43, New York, NY, USA, 2003. ACM Press.
(doi:10.1145/945445.945450)
- Rakesh
Ghiya, Daniel Lavery, and David Sehr.
On the importance of points-to analysis and other memory disambiguation methods
for C programs.
ACM SIGPLAN Notices, 36(5):47–158, May 2001.
PLDI '01: Proceedings of the ACM SIGPLAN Conference on Programming Language
Design and Implementation.
- Norman E. Gibbs.
The SEI education program: The challenge of teaching future software
engineers.
Communications of the ACM, 32(5):594–605, May 1989.
- Jim Giles.
Internet encyclopaedias go head to head.
Nature, 438(7070):900–901, December 2005.
(doi:10.1038/438900a)
- Jeremy
Ginsberg, Matthew H. Mohebbi, Rajan S. Patel,
Lynnette Brammer, Mark S. Smolinski, and
Larry Brilliant.
Detecting influenza epidemics using search engine query data.
Nature, 457:1012–1014, February 2009.
(doi:10.1038/nature07634)
- M. Girvan and M. E. J.
Newman.
Community Structure in Social and Biological Networks.
Proceedings of the National Academy of Sciences of the United States of
America, 99(12):7821–7826, 2002.
(doi:10.1073/pnas.122653799)
- Wolfgang Glänzel and
Henk F. Moed.
Journal impact measures in bibliometric research.
Scientometrics, 53(2):171–193, 2002.
- Robert L.
Glass and T.Y. Chen.
An
assessment of systems and software engineering scholars and institutions
(1999–2003).
Journal of Systems and Software, 76(1):91–97, April 2005.
- Robert L. Glass.
Cobol — a contradiction and an enigma.
Communications of the ACM, 40(9):11–13, September 1997.
- Robert L. Glass.
How best to provide the services IS programmers need.
Communications of the ACM, 40(12):17–19, December 1997.
- Robert L. Glass.
Of open source, Linux ... and hype.
IEEE Software, 16(1):126–128, January/February 1999.
- Robert L. Glass.
The sociology of open source: Of cults and cultures.
IEEE Software, 17(3):104–105, May/June 2000.
- Robert L. Glass.
An assessment of
systems and software engineering scholars and institutions (1995–1999).
Journal of Systems and Software, 54(1):77–82, September
2000.
- Robert L. Glass.
The generalization of an application domain.
IEEE Software, 17(5):127–128, September/October 2000.
- Robert L. Glass.
Frequently forgotten fundamental facts about software engineering.
IEEE Software, 18(3):110–112, May/June 2001.
- Eugene
Glynn, Brian Fitzgerald, and Chris Exton.
Commercial adoption of open source software: An empirical study.
In International Symposium on Empirical Software Engineering,
pages 225–234, November 2005.
(doi:10.1109/ISESE.2005.1541831)
- David E.
Goldberg.
Genetic and evolutionary algorithms come of age.
Communications of the ACM, 37(3):113–119, March 1994.
- George D.
Gopen and Judith A. Swan.
The science of
scientific writing.
American Scientist, 78:550–558, November/December 1990.
- S. Gorn.
Algorithms: bisection routine.
Communications of the ACM, 3:174, March 1960.
Algorithm available online at http://calgo.acm.org/. Current December
2011.
(doi:10.1145/367149.367173)
- Goetz Graefe.
Implementing sorting in database systems.
ACM Computing Surveys, 38(3):10, 2006.
(doi:10.1145/1132960.1132964)
- William G. Griswold and David
Notkin.
Automated assistance for program restructuring.
ACM Transactions on Software Engineering and Methodology,
2(3):228–269, 1993.
(doi:10.1145/152388.152389)
- Yann-Gaël Guéhéneuc and
Hervé Albin-Amiot.
Recovering binary
class relationships: Putting icing on the UML cake.
In OOPSLA '04: Proceedings of the 19th annual ACM SIGPLAN Conference on
Object-oriented programming, systems, languages, and applications,
pages 301–314. ACM Press, 2004.
(doi:10.1145/1028976.1029002)
- Philip Guo.
The ph.d. grind.
Available online http://tex.loria.fr/typographie/mathwriting.pdf. Current
June 2013, 2012.
- Stefan
Haefliger, Georg von Krogh, and Sebastian
Spaeth.
Code reuse in open source software.
Management Science, 54(1):180–153, January 2008.
(doi:10.1287/mnsc.1070.0748)
- Robert J. Hall.
Call path profiling.
In 14th International Conference on Software Engineering, pages
296–306, New York, May 1992. ACM Press.
- Brian Halla.
How the PC will disappear.
Computer, 31(12):134–136, December 1998.
- Richard W.
Hamming.
You and your research.
Available online via a Google search, March 1986.
Bell Communications Research Colloquium Seminar.
- Sung H. Han,
Myung Hwan Yun, Jiyoung Kwahk, and
Sang W. Hong.
Usability of consumer electronic products.
Industrial Ergonomics, 28:143–151, 2001.
- Ahmed E.
Hassan, Richard C. Holt, and Audris Mockus.
Report on MSR 2004: International workshop on mining software repositories.
SIGSOFT Software Engineering Notes, 30(1):4, 2005.
(doi:10.1145/1039174.1039188)
- Ronald
Heifetz, Alexander Grashow, and Marty Linsky.
Leadership in a (permanent) crisis.
Harvard Business Review, 87(7):1–7, July/August 2009.
- Alan R. Heminger and Steven B.
Robertson.
The digital
rosetta stone: A model for maintaining long-term access to static digital
documents.
Communications of the Association for Information Systems,
3:314–329, January 2000.
- James D. Herbsleb and
Rebecca E. Grinter.
Splitting the
organization and integrating the code: Conway's law revisited.
In ICSE '99: Proceedings of the 21st international conference on Software
engineering, pages 85–95, Los Alamitos, CA, USA, 1999. IEEE Computer
Society Press.
- James D. Herbsleb and Audris
Mockus.
An empirical study of speed and communication in globally distributed software
development.
IEEE Transactions on Software Engineering, 29(6):481–494, June
2003.
- James D. Herbsleb and
Deependra Moitra.
Global software development.
IEEE Software, 18(2):16–20, March/April 2001.
- James
Herbsleb, David Zubrow, Dennis Goldenson,
Will Hayes, and Mark Paulk.
Software quality and the capability maturity model.
Communications of the ACM, 40(6):30–40, June 1997.
- James D.
Herbsleb, Daniel J. Paulish, and Matthew Bass.
Global software
development at Siemens: Experience from nine projects.
In ICSE '05: Proceedings of the 27th International Conference on Software
Engineering, pages 524–533, New York, 2005. ACM Press.
(doi:10.1145/1062455.1062550)
- R.A.
Herendeen.
Personal energy impact of attending a professional meeting.
Energy, 29(1):13–17, 2004.
(doi:10.1016/j.energy.2003.08.005)
- Jeffrey Hightower and Gaetano
Borrielo.
Location systems for ubiquitous computing.
Computer, 34(8):57–66, August 2001.
- Eric Von Hippel.
Economics of product development by users: the impact of ``sticky'' local
information.
Management Science, 44(5):629–644, 1998.
(doi:10.1287/mnsc.44.5.629)
- S. Hitchcock, L. Carr,
S. Harris, J. M. N. Hey, and
W. Hall.
Citation
linking: improving access to online journals.
In Proceedings of the 2nd ACM international conference on Digital
libraries, pages 115–122, July 1999.
- Timo
Honkela, AArno Lehtola, Sakari Kalliomäki,
Risto Suitial, Ray Hudson,
Vangelis Karkaletsis, and George Vouros.
A recommended globalization method.
In P. A. V. Hall and R. Hudson, editors,
Software Without Frontiers, chapter 3. Wiley, 1996.
- Susan
Horwitz, Jan Prins, and Thomas Reps.
Integrating non-interfering versions of programs.
In Conference Record of the 15th Annual ACM Symposium on Principles of
Programming Languages, pages 133–145, Januray 1988.
- S. Horwitz, T. Reps, and
D. Binkley.
Interprocedural
slicing using dependence graphs.
In Proceedings of the SIGPLAN'88 conference on Programming Language
design and Implementation, pages 35–46, New York, 1988. ACM Press.
(doi:10.1145/53990.53994)
- Susan
Horwitz, Jan Prins, and Thomas Reps.
Integrating noninterfering versions of programs.
ACM Transactions on Programming Languages and Systems (TOPLAS),
11(3):345–387, 1989.
(doi:10.1145/65979.65980)
- HQ Air Force Operational Test and
Evaluation Center.
Software maintainability
evaluation guide.
Available Online http://handle.dtic.mil/100.2/ADA324619, September 1996.
AFOTEC Pamhplet 99-102.
- Ying Hu,
Ettore Merlo, Michel Dagenais, and
Bruno Lagüe.
C/C++ conditional
compilation analysis using symbolic execution.
In ICSM '00: Proceedings of the International Conference on Software
Maintenance, pages 196–207, Washington, DC, USA, 2000. IEEE Computer
Society.
(doi:10.1109/ICSM.2000.883045)
- Paul
Hudak and Adrienne Bloss.
The aggregate update problem in functional programming systems.
ACM Conference, 1984.
- Paul
Hudak, John Hughes, Simon Peyton Jones, and
Philip Wadler.
A history of haskell: being
lazy with class.
In HOPL III: Proceedings of the third ACM SIGPLAN conference on History
of programming languages, pages 12–1--12–55. ACM Press, 2007.
(doi:10.1145/1238844.1238856)
- Paul Hudak.
Conception, evolution and application of functional programming languages.
ACM Computing Surveys, 21(3):359–411, September 1989.
- Andy Hunt
and Dave Thomas.
OO in
one sentence: Keep it DRY, shy, and tell the other guy.
IEEE Software, 21(3):101–103, May/June 2004.
- Galen C.
Hunt, James R. Larus, Martin Abadi,
Mark Aiken, Paul Barham, Manuel
Fähndrich, Chris Hawblitzel, Orion Hodson,
Steven Levi, Nick Murphy, Bjarne
Steensgaard, David Tarditi, Ted Wobber, and
Brian Zill.
An overview
of the Singularity project.
Technical Report MSR-TR-2005-135, Microsoft Research, Redmond, WA, October
2005.
- Gary R. Ignatin.
Let the hackers hack: Allowing the reverse engineering of copyrighted computer
programs to achieve compatibility.
University of Pennsylvania Law Review, 140:1999–2050, 1992.
- John Hagel III and
John Seely Brown.
Your next IT strategy.
Harvard Business Review, pages 105–113, October 2001.
- Dan
Ingalls, Ted Kaehler, John Maloney,
Scott Wallace, and Alan Kay.
Back to the future:
the story of Squeak, a practical Smalltalk written in itself.
In OOPSLA '97: Proceedings of the 12th ACM SIGPLAN conference on
Object-oriented programming, systems, languages, and applications,
pages 318–326, New York, NY, USA, 1997. ACM Press.
(doi:10.1145/263698.263754)
- D.B.
Ingham, S.J. Caughey, , and M.C.
Little.
Fixing the
broken-link problem: The W3Objects approach.
Computing Networks and ISDN Systems, 28(7–11):1255–1268, 1996.
Proceedings of the Fifth International World Wide Web Conference, Paris,
France, 6-10 May 1996.
- Intel
Corp.
80C186 and
80C188 embedded microprocessors specification update.
Online. http://www.intel.se/design/intarch/specupdt/27289401.pdf. 29
August 1998, July 1996.
- International Organization
for Standardization, Geneva, Switzerland.
Information technology — Code of practice for information security
management, 2000.
ISO 17799:2000.
- Daniel
Jackson and Eugene J. Rollins.
A
new model of program dependencies for reverse engineering.
In Proceedings of the second ACM SIGSOFT symposium on Foundations of
software engineering, pages 2–10, New York, 1994. ACM, ACM
Press.
- Michael Jackson.
Specializing in software engineering.
IEEE Software, 16(6):119–121, Nov/Dec 1999.
- Suresh
Jagannathan.
Metalevel building blocks for modular systems.
ACM Transactions on Programming Languages and Systems,
16(3):456–492, May 1994.
- A.J.
Jakeman, S.H. Chen, A.E. Rizzoli, and
A.A. Voinov.
Modelling and software as instruments for advancing sustainability.
In A.J. Jakeman, A.A. Voinov, A.E.
Rizzoli, and S.H. Chen, editors, Developments in
Integrated Environmental Assessment, volume 3, pages 1–13. Elsevier,
2008.
(doi:10.1016/S1574-101X(08)00601-7)
- Pankaj
Jalote and Gourav Jain.
Assigning tasks in a 24-hour software development model.
In 11th Asia-Pacific Software Engineering Conference, pages
309–315, 2004.
(doi:10.1109/APSEC.2004.33)
- Doug
Janzen and Kris De Volder.
Navigating and
querying code without getting lost.
In AOSD '03: Proceedings of the 2nd International Conference on
Aspect-Oriented Software Development, pages 178–187, New York, NY,
USA, 2003. ACM.
(doi:10.1145/643603.643622)
- Barbara R.
Jasny, Gilbert Chin, Lisa Chong, and
Sacha Vignieri.
Again, and again, and again...
Science, 334(6060):1225, 2011.
- Bruce
Javob and Trevor Mudge.
Virtual memory: Issues of implementation.
Computer, 31(6):33–43, June 1998.
- Ron
Jeffries and Grigori Melnik.
Guest editors' introduction: TDD–the art of fearless programming.
IEEE Software, 24(3):24–30, May 2007.
(doi:10.1109/MS.2007.75)
- Anand
Jeyaraj, Joseph W. Rottman, and Mary C.
Lacity.
A review of the predictors, linkages, and biases in IT innovation adoption
research.
Journal of Information Technology, 21:1–23, 2006.
(doi:10.1057/palgrave.jit.2000056)
- Trevor Jim,
Greg Morrisett, Dan Grossman,
Michael Hicks, James Cheney, and
Yanling Wang.
Cyclone: A safe dialect of C.
In USENIX Technical Conference Proceedings, Berkeley, CA, June
2002. USENIX Association.
- Simon
L. Peyton Jones and M. S. Joy.
FLIC — a functional language intermediate code.
Internal Note 2048, Document 4, University College London, Department of
Computer Science, July 1989.
- Simon Peyton
Jones, Alan Blackwell, and Margaret Burnett.
A user-centred approach to functions in Excel.
ACM SIGPLAN Notices, 38(9):165–176, September 2003.
Proceedings of the 2003 ACM SIGPLAN International Conference on Functional
Programming (ICFP'03).
- Ho-Won Jung,
Seung-Gweon Kim, and Chang-Sin Chung.
Measuring software product quality: A survey of ISO/IEC 9126.
IEEE Software, 21(5):10–13, September/October 2004.
- Huzefa
Kagdi, Shehnaaz Yusuf, and Jonathan I.
Maletic.
Mining sequences of
changed-files from version histories.
In MSR '06: Proceedings of the 2006 international workshop on Mining
software repositories, pages 47–53, New York, NY, USA, 2006. ACM.
(doi:10.1145/1137983.1137996)
- Samual N.
Kamin and David Hyatt.
A special-purpose
language for picture-drawing.
In Ramming [Ramming, 1997], pages 297–310.
- Elena
Karahanna, Detmar W. Straub, and Norman L.
Chervany.
Information technology adoption
across time: A cross-sectional comparison of pre-adoption and post-adoption
beliefs.
MIS Quarterly, 23(2):183–213, 1999.
- Paul A.
Karger and Roger R. Schell.
Thirty
years later: Lessons from the Multics security evaluation.
In ACSAC: 18th Annual Computer Security Applications Conference,
Washington, DC, October 2002. IEEE Computer Society.
Includes US Air Force report Multics Security Evaluation: Vulnerability
Analysis, ESD-TR-74-193, 1974, by the same authors.
(doi:10.1109/CSAC.2002.1176285)
- Neha
Katira, Laurie Williams, Eric Wiebe,
Carol Miller, Suzanne Balik, and
Ed Gehringer.
On understanding
compatibility of student pair programmers.
In SIGCSE '04: Proceedings of the 35th SIGCSE technical symposium on
Computer science education, pages 7–11, New York, NY, USA, 2004. ACM.
(doi:10.1145/971300.971307)
- Michael L. Katz and Carl
Shapiro.
Systems competition and network
effects.
The Journal of Economic Perspectives, 8(2):93–115, 1994.
- S. Katzoff.
Clarity
in technical reporting.
Technical Report NASA SP-7010, NASA, Washington, D.C., 1964.
Second edition. Available online
http://techreports.larc.nasa.gov/ltrs/PDF/NASA-64-sp7010.pdf.
- Andrew J.
Kennedy.
Dimension types.
In Proceedings of the 5th European Symposium on Programming, pages
348–362, Berlin, April 1994. Springer-Verlag.
Lecture Notes in Computer Science 788.
- Andrew J.
Kennedy.
Relational parametricity and units of measure.
In Proceedings of the 24th Annual ACM Symposium on Principles of
Programming Languages, pages 442–455, New York, January 1997. ACM
Press.
- Brian W. Kernighan and
Dennis M. Ritchie.
The state of C.
Byte, pages 205–210, August 1988.
- Brian W.
Kernighan.
Why Pascal is not my favorite programming language.
Computer Science Technical Report 100, Bell Laboratories, Murray Hill, NJ, July
1981.
Available online at http://cm.bell-labs.com/cm/cs/cstr. (Reprinted in Comparing
and Assessing Programming Languages Ed. A. Feuer N. Gehani Prentice-Hall
1984).
- Brian W.
Kernighan.
The UNIX system document preparation tools: A retrospective.
AT&T Technical Journal, 68(4):5–20, July/August 1989.
- Brian W.
Kernighan.
Experience
with Tcl slash Tk for scientific and engineering visualization.
In Proceedings of the Tcl slash Tk Workshop, pages 269–278,
July 1995.
- Gregor
Kiczales, Erik Hilsdale, Jim Hugunin,
Mik Kersten, Jeffrey Palm, and
William Griswold.
Getting started with ASPECTJ.
Communications of the ACM, 44(10):59–65, 2001.
(doi:10.1145/383845.383858)
- John R. Kimberly and
Michael J. Evanisko.
Organizational innovation: The
influence of individual, organizational, and contextual factors on hospital
adoption of technological and administrative innovations.
The Academy of Management Journal, 24(4):689–713, 1981.
- John Leslie
King, Vijay Gurbaxani, Kenneth L. Kraemer,
F. Warren McFarlan, K. S. Raman, and
C. S. Yap.
Institutional factors
in information technology innovation.
Information Systems Research, 5(2):139–169, June 1994.
- Ritchie S. King.
The top 10 programming languages.
IEEE Spectrum, 48(10):84, October 2011.
(doi:10.1109/MSPEC.2011.6027266)
- Nils Klarlund and Michael I.
Schwarzbach.
A domain-specific
language for regular sets of strings and trees.
In Ramming [Ramming, 1997], pages 145–156.
- Rob Kling
and Lisa Covi.
Electronic journals and
legitimate media in the systems of scholarly communication.
The Information Society, 11(4):261–271, 1995.
- Donald E. Knuth.
Deciphering a linear conguentrial encryption.
IEEE Transactions on Information Theory, 31(1):49–52, January
1985.
- Donald E. Knuth.
The errors of TeX.
Software: Practice & Experience, 19(7):607–687, July 1989.
- Donald E. Knuth.
Theory and practice,.
Theoretical Computer Science, 90(1):1–15, 1991.
(doi:10.1016/0304-3975(91)90295-D)
- Menno-Jan Kraak.
Integrating multimedia in geographical information systems.
IEEE Multimedia, 3(2):59–65, Summer 1996.
- Andreas Krall.
Improving semi-static branch prediction by code replication.
ACM SIGPLAN Notices, 29(6):97–106, June 1994.
Proceedings of the ACM SIGPLAN '94 Conference on Programming Language Design
and Implementation (PLDI).
- Robert E. Kraut and Lynn A.
Streeter.
Coordination in software development.
Communications of the ACM, 38(3):69–81, 1995.
(doi:10.1145/203330.203345)
- Sandeep
Krishnamurthy.
A managerial overview of open source software.
Business Horizons, 46(5):47–56, September-October 2003.
(doi:10.1016/S0007-6813(03)00071-5)
- George Kuk.
Strategic interaction and knowledge sharing in the KDE developer mailing
list.
Management Science, 52(7):1031–1042, 2006.
(doi:10.1287/mnsc.1060.0551)
- David N.
Laband and Michael J. Piette.
Favoritism versus search for good papers: Empirical evidence regarding the
behavior of journal editors.
The Journal of Political Economy, 102(1):194–203, February
1994.
- Mary C.
Lacity, Leslie P. Willcocks, and David F.
Feeny.
IT outsourcing: Maximize flexibility and control.
Harvard Business Review, 73(3):84–93, May-June 1995.
- Sotiria Lampoudi and David M.
Beazley.
SWILL: A simple embedded web server library.
In USENIX Technical Conference Proceedings, Berkeley, CA, June
2002. USENIX Association.
FREENIX Track Technical Program.
- Sébastien Lapierre, Bruno
Laguë, and Charles Leduc.
Datrix source code model and its interchange format: lessons learned and
considerations for future work.
SIGSOFT Softw. Eng. Notes, 26(1):53–56, 2001.
(doi:10.1145/505894.505907)
- Graig Larman.
Protected variaton: The importance of being closed.
IEEE Software, 18(3):89–91, May/June 2001.
- James R.
Larus, Thomas Ball, Manuvir Das,
Robert DeLine, Manuel Fähndrich,
Jon Pincus, Sriram K. Rajamani, and
Ramanathan Venkatapathy.
Righting software.
IEEE Software, 21(3):92–100, May/June 2004.
- Kung-Kiu
Lau, Shaoying Liu, Mario Ornaghi, and
Alan Wills.
Interacting frameworks in Catalysis.
In Proceedings of the Second IEEE International Conference on Formal
Engineering Methods. IEEE, 1998.
- Steve
Lawrence and C. Lee Giles.
Searching
the World Wide Web.
Science, 280(5360):98–100, 1998.
- Steve
Lawrence and C. Lee Giles.
Accessibility of information on the web.
Nature, 400:107–109, 1999.
- Steve
Lawrence and C. Lee Giles.
Searching
the web: General and scientific information access.
IEEE Communications, 37(1):116–122, 1999.
- Steve
Lawrence, C. Lee Giles, and Kurt Bollacker.
Digital
libraries and autonomous citation indexing.
IEEE Computer, 32(6):67–71, June 1999.
- Steve
Lawrence, Kurt Bollacker, and C. Lee Giles.
Indexing
and retrieval of scientific literature.
In Eighth International Conference on Information and Knowledge
Management, CIKM 99, pages 139–146, November 1999.
- Steve
Lawrence, David M. Pennock, Gary William
Flake, Frans M. Coetzee, Eric Glover,
Finn Årup Nielsen, Andries Kruger, and
C. Lee Giles.
Persistence of web references in scientific research.
IEEE Computer, 34(2):26–31, February 2001.
- Adrian Lee,
Carina Dennis, and Philip Campbell.
Nature's guide for mentors.
Nature, 447(7119):791–797, June 2007.
- Burton H. Lee.
Embedded
internet systems: Poised for takeoff.
Internet Computing, 2(3):24–29, May/June 1998.
- Newton Lee.
Interview with Nicholas Negroponte.
Computers in Entertainment, 4(1):3, 2006.
(doi:10.1145/1111293.1111298)
- M. M.
Lehman and J. F. Ramil.
Software evolution in the age of component-based software engineering.
IEE Proceedings Software, 147(6):249–255, December 2000.
- M. M.
Lehman, D. E. Perry, and J. F. Ramil.
Implications of evolution metrics on software maintenance.
In Proceedings of the International Conference on Software Maintenance
ICSM '98. IEEE Computer Society, 1998.
- Dorothy Leonard-Barton and
Isabelle Deschamps.
Managerial influence in the
implementation of new technology.
Management Science, 34(10):1252–1265, 1988.
- Nancy G.
Leveson.
High-pressure steam engines and computer software.
In 14th International Conference on Software Engineering, pages
2–14, New York, May 1992. ACM Press.
- Roy
Levin and David D. Redell.
An
evaluation of the ninth SOSP submissions or how (and how not) to write a
good systems paper.
Operating Systems Review, 17(3):35–40, July 1983.
- Scott M.
Lewandowski.
Frameworks for component-based client/server computing.
ACM Computing Surveys, 30(1):3–27, March 1998.
- Zhenmin Li,
Shan Lu, Suvda Myagmar, and
Yuanyuan Zhou.
CP-miner: Finding copy-paste and related bugs in large-scale software code.
IEEE Transactions on Software Engineering, 32(3):176–192, 2006.
(doi:10.1109/TSE.2006.28)
- Andrew Lih.
Wikipedia
as participatory journalism: Reliable sources? metrics for evaluating
collaborative media as a news resource.
In 5th International Symposium on Online Journalism, April
2004.
- Mark A. Linton.
Implementing
relational views of programs.
In SDE 1: Proceedings of the First ACM SIGSOFT/SIGPLAN Software
Engineering Symposium on Practical Software Development Environments,
pages 132–140, New York, NY, USA, 1984. ACM.
(doi:10.1145/800020.808258)
- Panos E.
Livadas and David T. Small.
Understanding code containing preprocessor constructs.
In IEEE Third Workshop on Program Comprehension, pages 89–97,
November 1994.
(doi:10.1109/WPC.1994.341255)
- Mark Lomas and Bruce
Christianson.
To whom am I speaking: Remote booting in a hostile world.
Computer, 28(1):50–54, January 1995.
- Qi Lu and M. Satyanaranyanan.
Isolation-only transactions for mobile computing.
Operating Systems Review, 28(2):81–87, 1994.
(doi:10.1145/198153.198164)
- Helmut Lucke.
Using the
HP200LX to label mini discs.
Online. http://www.jyu.fi/minidisc/minidisc/mdlbl/mdlbl.htm. 11 April
1998, August 1997.
- Kim Man Lui,
K.C.C. Chan, and J.T. Nosek.
The effect of pairs in program design tasks.
IEEE Transactions on Software Engineering, 34(2):197–211, 2008.
(doi:10.1109/TSE.2007.70755)
- K. Lum and
J. Curran.
Personality similarity and interpersonal attraction in the computer dating
situation.
Journal of Social Psychology, 95(2):233–239, April 1975.
- Alan
MacCormack, John Rusnak, and Carliss Y.
Baldwin.
Exploring the structure of complex software designs: An empirical study of open
source and proprietary code.
Management Science, 52(7):1015–1030, 2006.
(doi:10.1287/mnsc.1060.0552)
- T. R.
Madanmohan and Rahul De'.
Open source reuse in commercial firms.
IEEE Software, 21(6):62–69, November/December 2004.
(doi:10.1109/MS.2004.45)
- Pattie Maes.
Concepts
and experiments in computational reflection.
ACM SIGPLAN Notices, 22(12):147–155, December 1987.
Proceedings of the 1987 ACM SIGPLAN Conference on Object-Oriented Programming
Systems, Languages and Applications (OOPSLA '87).
- David P. Maher.
Fault induction attacks, tamper resistance, and hostile reverse engineering in
perspective.
In Rafael Hirschfeld, editor, Financial Cryptography:
First International Conference, FC '97, pages 109–121, Berlin,
February 1997. Springer-Verlag.
Lecture Notes in Computer Science 1318.
- Tsugio
Makimoto, Kazuhiko Eguchi, and Mitsugu
Yoneyama.
The cooler the beter: New directions in the nomadic age.
Computer, 34(4):38–42, April 2001.
- David
Mandelin, Lin Xu, Rastislav Bodík, and
Doug Kimelman.
Jungloid mining:
helping to navigate the API jungle.
In PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on
Programming Language Design and Implementation, pages 48–61, New
York, 2005. ACM Press.
(doi:10.1145/1065010.1065018)
- Steve Mann.
Wearable
computing: Toward humanistic intelligence.
IEEE Intelligent Systems, 16(3):10–15, May/June 2001.
Special Issue on Wearable Computing and Humanistic Intelligence.
- M. Lynne
Markus, Brook Manville, and Carole E. Agres.
What makes a virtual organization work?
Sloan Management Review, 42:13–26, 2000.
- Larry
Matthies, Mark Maimone, Andrew Johnson,
Yang Cheng, Reg Willson, Carlos
Villalpando, Steve Goldberg, Andres Huertas,
Andrew Stein, and Anelia Angelova.
Computer vision on Mars.
International Journal of Computer Vision, 75(1):67–92, 2007.
(doi:10.1007/s11263-007-0046-z)
- Peter M. Maurer.
Components: What if they gave a revolution and nobody came.
IEEE Software, 33(6):28–34, June 2000.
- Katrina
Maxwell, Luk Van Wassenhove, and Soumitra
Dutta.
Performance evaluation of general and company specific models in software
development effort estimation.
Management Science, 45(6):787–803, 1999.
(doi:10.1287/mnsc.45.6.787)
- John D.
McGregor, Linda M. Northrop, Salah Jarrad, and
Klaus Pohl.
Initiating software product lines.
IEEE Software, 19(4):24–27, July/August 2002.
- Nimrod
Megiddo and Dharmendra S. Modha.
Outperforming LRU with an adaptive replacement cache algorithm.
Computer, 37(4):58–65, April 2004.
- Rajiv Mehrotra.
In
the news: Dueling over DVD and DIVX.
IEEE Multimedia, 6(1):14–19, January-March 1999.
- Marjan
Mernik, Jan Heering, and Anthony M. Sloane.
When and how to develop domain-specific languages.
ACM Computing Surveys, 37(4):316–344, 2005.
(doi:10.1145/1118890.1118892)
- Robert K. Merton.
The Matthew effect in science.
Science, 159(3810):56–63, January 1968.
- Regine Meunier.
The pipes and filters
architecture.
In James O. Coplien and Douglas C. Schmidt,
editors, Pattern Languages of Program Design, chapter 22, pages
427–440. Addison-Wesley, Reading, MA, 1995.
- Bertrand
Meyer, Christine Choppy, Jorgen Staunstrup,
and Jan van Leeuwen.
Research evaluation for computer science, 2008.
- Ana
Milanova, Atanas Rountev, and Barbara G.
Ryder.
Precise call graphs for C programs with function pointers.
Automated Software Engineering, 11(1):7–26, January 2004.
(doi:10.1023/B:AUSE.0000008666.56394.a1)
- Hafedh Mili,
Fatma Mili, and Ali Mili.
Reusing
software: Issues and research directions.
IEEE Transactions on Software Engineering, 21(6):528–562, June
1995.
- Barton P.
Miller, Lars Fredriksen, and Bryan So.
An empirical study of the reliability of UNIX utilities.
Communications of the ACM, 33(12):32–44, December 1990.
- Ray Miller.
Configuration
management with Subversion, YAML and Perl template toolkit.
In Alexios Zavras, editor, Proceedings of the 5th
International System Administration and Network Engineering Conference SANE
06. NLUUG, Stichting SANE, May 2006.
- Jonathan W. Mills.
Stiquito: A small simple, inexpensice hexapod robot.
Technical Report 363a, Indiana University, Bloomington, Indiana 47405,
1992.
- John Mingers.
The long and winding road: Getting papers published in top journals.
Communications of the Association for Information Systems,
8:330–339, 2002.
- Audris
Mockus, Roy T. Fielding, and James D.
Herbsleb.
Two case studies of open source software development: Apache and Mozilla.
ACM Transactions on Software Engineering and Methodology (TOSEM),
11(3):309–346, 2002.
(doi:10.1145/567793.567795)
- Audris Mockus.
Amassing and indexing
a large sample of version control systems: Towards the census of public
source code history.
In Proceedings of the 2009 6th IEEE International Working Conference on
Mining Software Repositories, MSR '09, pages 11–20, Washington, DC,
USA, 2009. IEEE Computer Society.
(doi:10.1109/MSR.2009.5069476)
- Alistair Moffat.
Resource-limited index construction ofr large texts.
Technical Report 93/16, Department of Computer Science, University of
Melbourne, Parkville, Victoria 3052, July 1994.
- C. Mohan, B. Lindsay, and
R. Obermarck.
Transaction management in the r* distributed database management system.
ACM Transactions on Database Systems, 11(4):379–396, December
1986.
- C Mohan, B. Lindsay, and
R. Obermarck.
Transaction management in the R* distributed database management system.
ACM Transactions on Database Systems, 11(4):O378–396, December
1986.
- Ivan Moore.
Automatic inheritance hierarchy and method refactoring.
ACM SIGPLAN Notices, 31(10):235–250, October 1996.
Proceedings of the 1996 ACM SIGPLAN Conference on Object-Oriented Programming
Systems, Languages and Applications (OOPSLA '96).
- Mike
Morrison, Joline Morrison, and Anthony Keyes.
Integrating web sites and databases.
Communications of the ACM, 45(9):81–86, September 2002.
- Donald R.
Morrison.
Patricia—practical algorithm to retrieve information coded in alphanumeric.
J. ACM, 15(4):514–534, 1968.
(doi:10.1145/321479.321481)
- Motor Industry Research Association.
Development guidelines for vehicle based software, November 1994.
- Gail C.
Murphy, Mik Kersten, and Leah Findlater.
How are Java software developers using the Eclipse IDE?
IEEE Software, 23(4):76–83, July/August 2006.
(doi:10.1109/MS.2006.105)
- Sharon L. Murrel and
Thaddeus J. Kowlaski.
Monk: A high-level text compiler.
AT&T Technical Journal, 68(4):45–60, July/August 1989.
- M. E. J.
Newman and M. Girvan.
Finding and evaluating community structure in networks.
Phys. Rev. E, 69(2):026113, Feb 2004.
(doi:10.1103/PhysRevE.69.026113)
- M. E. J. Newman.
Scientific collaboration networks. I. Network construction and fundamental
results.
Phys. Rev. E, 64(1):016131, Jun 2001.
(doi:10.1103/PhysRevE.64.016131)
- M. E. J.
Newman.
Scientific collaboration networks. II. Shortest paths, weighted networks,
and centrality.
Phys. Rev. E, 64(1):016132, Jun 2001.
(doi:10.1103/PhysRevE.64.016132)
- Oscar
Nierstrasz, Simon Gibbs, and Dennis
Tsichritzis.
Component-oriented software development.
Communications of the ACM, 35(9):160–165, September 1992.
- Tobias Nipkow and David von
Oheimb.
Javalight is type-safe—definitely.
In Conference Record of POPL '98: The 25th ACM SIGPLAN-SIGACT Symposium
on Principles of Programming Languages, pages 161–170, 1998.
- Haruo Noma,
Tsutomu Miyasato, and Fumio Kishino.
A
palmtop display for dextrous manipulation with haptic sensation.
In CHI '96. Conference Proceedings on Human Factors in Computing
Systems, pages 126–133. ACM, 1996.
- Donald A. Norman.
Home theater: Not ready for prime time.
Computer, 35(6):100–102, June 2002.
- Chris
Nyberg, Tom Barclay, Zarka Cvetanovic,
Jim Gray, and David B. Lomet.
AlphaSort: A
cache-sensitive parallel external sort.
VLDB Journal, 4(4):603–627, 1995.
- Hideto
Ogasawara, Atsushi Yamada, and Michiko Kojo.
Experiences
of software quality management using metrics through the life-cycle.
In 18th International Conference on Software Engineering, ICSE
'96, pages 179–188, New York, 1993. ACM, ACM Press.
- Masaaki
Oka and Masakazu Suzuoki.
Designing and programming the emotion engine.
IEEE Micro, pages 20–28, November/December 1999.
- One
laptop per child (OLPC), a $100 laptop for the world's children
education.
Available online http://www.laptop.org. Current March 2007, 2007.
- William F.
Opdyke.
Refactoring
Object-Oriented Frameworks.
PhD thesis, University of Illinois at Urbana-Champaign, Urbana-Champaign, IL,
1992.
- Martin
Oppermann and Kye-Sung Chon.
Convention participation decision-making process.
Annals of Tourism Research, 24(1):178–191, 1997.
(doi:10.1016/S0160-7383(96)00049-7)
- OPSiS, Alimos, Greece.
PhotoGPS Users Guide, July 2001.
Available online http://www.digital-opsis.com.
- George Orwell.
Politics and
the english language.
Horizon, April 1946.
Also available online
http://orwell.ru/library/essays/politics/english/e_polit.
- Thomas J. Ostrand and
Elaine J. Weyuker.
Collecting and categorizing software error data in an industrial environment.
Journal of Systems and Software, 4(4):289–300, 1984.
(doi:10.1016/0164-1212(84)90028-1)
- Linda M.
Ott and Jeffrey J. Thuss.
The relationship between slices and module cohesion.
In Proceedings of the 11th ACM conference on Software
Engineering, pages 198–204, New York, May 1989. ACM, ACM Press.
- John K.
Ousterhout.
Scripting:
Higher-level programming for the 21st century.
IEEE Computer, 31(3):23–30, March 1998.
- David A.
Padua and Michael J. Wolfe.
Advanced compiler optimizations for supercomputers.
Communications of the ACM, 29(12):1184–1201, December
1986.
- Seung-Taek
Park, David Pennock, Lee Giles, and
Robert Krovetz.
Analysis of lexical
signatures for finding lost or related documents.
In Proceedings of the 25th Annual International ACM-SIGIR Conference on
Research and Development in Information Retrieval, pages 11–18, New
York, August 2002. ACM, ACM Press.
(doi:10.1145/564376.564381)
- Geoffrey G. Parker and
Marshall W. Van Alstyne.
Two-sided network effects: A theory of information product design.
Management Science, 51(10):1494–1504, 2005.
(doi:10.1287/mnsc.1050.0400)
- David L.
Parnas, A. John van Schouwen, and Shu Po Kwan.
Evaluation of safety-critical software.
Communications of the ACM, 33(6):636–648, June 1990.
(doi:10.1145/78973.78974)
- David L. Parnas.
Software aging.
In 16th International Conference on Software Engineering, ICSE
'94, pages 279–287, Washington, DC, May 1994. IEEE Computer Society.
Also in cite [Chapter 29]HW01.
- T. J. Parr
and R. W. Quong.
ANTLR: A predicated-LL(k) parser generator.
Software: Practice & Experience, 25(7):789–810, 1995.
- Mohammad N. Paryavi and
William J. Hankley.
OOSPEC:
an executable object-oriented specification language.
In ACM 23rd annual computer science conference. CSC '95, pages
169–177, New York, 1995. ACM, ACM Press.
- Norman Paskin.
E-citations: actionable identifiers and
scholarly referencing.
Learned Publishing, 13(3):159–168, July 2000.
- Oren
Patashnik.
Designing BibTeX styles.
Available from the TeX archives, February 1988.
- David A.
Patterson.
Reduced instruction set computers.
Communications of the ACM, 28(1):8–21, January 1985.
- David A.
Patterson.
How to have a
bad career in research/academia.
Available online
http://www.cs.utah.edu/ lepreau/osdi94/keynote/abstract.html and
http://www.cs.berkeley.edu/ pattrsn/talks/BadCareer.pdf. Current
November 2005, November 1994.
Invited Talk. First Symposium on Operating Systems Design and Implementation
(OSDI '94) keynote address, November 14-17, 1994 Monterey, CA.
- James W.
Paulson, Giancarlo Succi, and Armin Eberlein.
An empirical study of open-source and closed-source software products.
IEEE Transactions on Software Engineering, 30(4):246–256, April
2004.
- Linda Dailey
Paulson.
Exploring the wireless LANscape.
Computer, 33(10):12–16, October 2000.
- Vern Paxson.
Strategies
for sound internet measurement.
In Proceedings of the Internet Measurement Conference, Taormina,
Sicily, Italy, October 2004.
- Christian Payne.
On
the security of open source software.
Information Systems Journal, 12(1):61–78, 2002.
- Roger D. Peng.
Reproducible research in computational science.
Science, 334(6060):1226–1227, 2011.
(doi:10.1126/science.1213847)
- Alan J. Perlis.
Epigrams of
programming.
ACM SIGPLAN Notices, 17(9):7–13, September 1982.
- Chad Perry.
A structured
approach to presenting PhD theses: Notes for candidates and their
supervisors.
In ANZ Doctoral Consortium. University of Sydney, February
1994.
- Thomas A. Phelps and Robert
Wilensky.
Robust
hyperlinks: Cheap, everywhere, now.
In Proceedings of Digital Documents and Electronic Publishing
(DDEP00), New York, September 2000.
- Rob
Pike and Ken Thompson.
Hello world.
In Dan Geer, editor, USENIX Technical Conference
Proceedings, pages 43–50, Berkeley, CA, Winter 1993. USENIX
Association.
- Rob Pike,
Dave Presotto, Ken Thompson, and
Howard Trickey.
Plan 9 from Bell Labs.
In Proceedings of the Summer 1990 UKUUG Conference, pages 1–9.
UKUUG, July 1990.
- Rob Pike,
Dave Presotto, Ken Thompson, and
Gerard Holzmann.
Process sleep and wakeup on a shared-memory multiprocessor.
In Proceedings of the Spring 1991 EurOpen Conference, pages
161–166. EurOpen, May 1991.
- Rob Pike.
Notes on programming in C.
Available by anonymous ftp from
relay.cs.toronto.edu:doc/programming/pikestyle.ps, 1989.
- Shamim Pirzada.
Evolution of the Unix system.
University of California at Berkeley Progress Report, July 1986.
- James E. Pitkow.
Summary of WWW
characterizations.
World Wide Web, 2(1–2):3–13, January 1999.
- P. J. Plauger.
The Standard C Library.
Prentice Hall, 1992.
- Stefan Podlipnig and Laszlo
Böszörmenyi.
A survey of web cache replacement strategies.
ACM Computing Surveys, 35(4):374–398, December 2003.
- Mason A.
Porter, Jukka-Pekka Onnela, and Peter J.
Mucha.
Communities in networks.
Notices of the American Mathematical Society, 56(9), 2009.
- Dave
Presotto, Rob Pike, Ken Thompson, and
Howard Trickey.
Plan 9, a distributed system.
In Proceedings of the Spring 1991 EurOpen Conference, pages
43–50. EurOpen, May 1991.
- Dave Presotto.
Multiprocessor streams for plan 9.
In Proceedings of the Summer 1990 UKUUG Conference, pages
11–19. UKUUG, July 1990.
- John S. Quarterman and
Josiah C. Hoskins.
Notable computer networks.
Communications of the ACM, 29(10):932–971, October 1986.
- M. V. Ramakrishna and Justin
Zobel.
Performance in
practice of string hashing functions.
In Rodney W. Topor and Katsumi Tanaka, editors,
Database Systems for Advanced Applications '97, Proceedings of the
Fifth International Conference on Database Systems for Advanced Applications
(DASFAA), Melbourne, Australia, April 1-4, 1997, volume 6 of
Advanced Database Research and Development Series, pages
215–224. World Scientific, 1997.
- J. Christopher
Ramming, editor.
USENIX
Conference on Domain-Specific Languages, Berkeley, CA, October
1997. USENIX Association.
- Eric S. Raymond and David G.
Messerschmitt.
Up from alchemy — back to the user.
IEEE Software, 21(1):88–91, January/February 2004.
- Jesse Reisman.
Web site design: Less
is more.
IT Professional, 1(5):63–64, September/October 1999.
- David N.
Reshef, Yakir A. Reshef, Hilary K. Finucane,
Sharon R. Grossman, Gilean McVean,
Peter J. Turnbaugh, Eric S. Lander,
Michael Mitzenmacher, and Pardis C. Sabeti.
Detecting novel associations in large data sets.
Science, 334(6062):1518–1524, 2011.
(doi:10.1126/science.1205438)
- Glenn Ricart and Ashok K.
Agrawala.
An optimal algorithm for mutual exclusion in computer networks.
Communications of the ACM, 24(1):9–17, January 1981.
- Matthew
Richardson.
Learning about the world through long-term query logs.
ACM Transactions on the Web, 2(4):1–27, 2008.
(doi:10.1145/1409220.1409224)
- Dennis M.
Ritchie.
Reflections on software research.
Communications of the ACM, 27(8):758–760, 1984.
- Dennis M.
Ritchie.
The development of the C language.
ACM SIGPLAN Notices, 28(3):201–208, March 1993.
Preprints of the History of Programming Languages Conference (HOPL-II).
- R. L.
Rivest, A. Shamir, and L. Adleman.
A method for obtaining digital signatures and public–key cryptosystems.
Communications of the ACM, 21(2), February 1978.
- R. Rivest.
The MD4 message digest algorithm.
In A. J. Menezes and S. A. Vanstone, editors,
Advances in Cryptology — CRYPTO '90, pages 303–311, Berlin,
1991. Springer Verlag.
- J.E.
Robbins and D.F. Redmiles.
Cognitive
support, UML adherence, and XMI interchange in Argo/UML.
Information and Software Technology, 42(2):79–89, 2000.
- Rich Robinson.
DigitaScript:
A scripting language for digital cameras.
Dr. Dobb's Journal, 26(1):126–132, January 2001.
- R. Rodriguez.
A system call tracer for UNIX.
In USENIX Conference Proceedings, pages 72–80, Berkeley, CA,
Summer 1986. USENIX Association.
- Eva Rose
and Kristoffer Høgsbro Rose.
Java access protection through typing.
In S. Drossopoulou, S. Eisenbach,
B. Jacobs, G. T. Leavens,
P. Müller, and A. Poetzsch-Heffter,
editors, Formal Techniques for Java Programs, pages 136–142.
Technical Report 269, Fernuniversität Hagen, 2000.
Available online
http://www.informatik.fernuni-hagen.de/pi5/publications.html.
- David S.
Rosenblum.
Towards a method of programming with assertions.
In 14th International Conference on Software Engineering, pages
92–104, New York, May 1992. ACM Press.
- David Rosental.
A simple X11 client program — or — how hard can it really be to write
``Hello, World''?
In USENIX Conference Proceedings, pages 229–242, Berkeley, CA,
Winter 1988. USENIX Association.
- Douglas T. Ross.
Homilies for humble standards.
Communications of the ACM, 19(11):595–600, November 1976.
- Jeff
Rothenberg.
Avoiding
technological quicksand: Finding a viable technical foundation for digital
preservation.
Technical report, Council on Library and Information Resources, 1755
Massachusetts Av., Washington DC 20036, January 1999.
Online http://www.clir.org/pubs/reports/rothenberg/pub77.pdf, current December
2002.
- Howard
Rubin, Margaret Johnson, and Susan Iventosch.
The US software industry.
IEEE Software, 19(1):95–97, 2002.
(doi:10.1109/52.976948)
- David N. Reshef
; Yakir A. Reshef ; Hilary K. Finucane ; Sharon R. Grossman ; Gilean McVean ;
Peter J. Turnbaugh ; Eric S. L;er ; Michael Mitzenmacher ; Pardis C. Sabeti.
Supporting
online material for detecting novel associations in large data sets,
December 2011.
Available online
http://www.sciencemag.org/content/suppl/2011/12/14/334.6062.1518.DC1.
Archived through WebCite at http://www.webcitation.org/64DaiQxPC.
- H. Sackman, W. J. Erikson,
and E. H. Grant.
Exploratory experimental studies comparing online and offline programming
performance.
Communications of the ACM, 11(1):3–11, January 1968.
- Ioannis
Samoladas, Ioannis Stamelos, Lefteris Angelis,
and Apostolos Oikonomou.
Open source software development should strive for even greater code
maintainability.
Communications of the ACM, 47(10):83–87, 2004.
(doi:10.1145/1022594.1022598)
- Pamela
Samuelson.
Why the look and feel of software user interfaces should not be protected by
copyright law.
Communications of the ACM, 32(5):563–572, May 1989.
- Bo Sandén.
Coping with Java threads.
Computer, 37(4):20–27, April 2004.
- M. Satyanarayanan, Henry H.
Mashburn, Puneet Kumar, David C. Steere, and
James J. Kistler.
Lightweight recoverable virtual memory.
ACM Transactions on Computer Systems, 12(1):33–57, 1994.
(doi:10.1145/174613.174615)
- Mary Ann
Scheirer.
The life cycle of an innovation:
Adoption versus discontinuation of the fluoride mouth rinse program in
schools.
Journal of Health and Social Behavior, 31(2):203–215, 1990.
- Panagiotis Sfetsos, Ioannis
Stamelos, Lefteris Angelis, and Ignatios S.
Deligiannis.
Investigating the impact of personality types on communication and
collaboration-viability in pair programming — an empirical study.
In Pekka Abrahamsson, Michele Marchesi, and
Giancarlo Succi, editors, Extreme Programming and Agile
Processes in Software Engineering, 7th International Conference, XP
2006, pages 43–52, 2006.
Lecture Notes in Computer Science 4044.
(doi:10.1007/11774129_5)
- Graeme
Shanks, Elizabeth Tansley, and Ron Weber.
Representing composites in conceptual modeling.
Communications of the ACM, 47(7):77–80, July 2004.
- Jonathan
Shapiro.
Programming language
challenges in systems codes: why systems programmers still use C, and what
to do about it.
In PLOS '06: Proceedings of the 3rd workshop on Programming languages and
operating systems, page 9, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1215995.1216004)
- Mary Shaw
and David Garlan.
Formulations and formalisms in software architecture.
In Jan van Leeuwen, editor, Computer Science Today: Recent
Trends and Developments, pages 307–323. Springer Verlag, Berlin,
1995.
Lecture Notes in Computer Science 1000.
- Mary Shaw.
Writing good
software engineering research papers.
In Proceedings of the 25th International Conference on Software
Engineering, pages 726–726. IEEE Computer Society, May 2003.
- Blair H.
Sheppard, Jon Hartwick, and Paul R. Warshaw.
The theory of reasoned action: A
meta-analysis of past research with recommendations for modifications and
future research.
The Journal of Consumer Research, 15(3):325–343, 1988.
- Jim Shore.
Fail fast.
IEEE Software, 21(5):21–25, September/October 2004.
- Jeremy
Siek and Andrew Lumsdaine.
Concept checking: Binding
parametric polymorphism in C++.
In First Workshop on C++ Template Programming, October
2000.
- Charles Simonyi.
The death of computer languages and the birth of intentional programming.
Technical Report MSR-TR-95-52, Microsoft Corporation, Redmond, WA, September
1995.
Available online at ftp://ftp.research.microsoft.com/pub/tr/tr-95-52.ps.
- Charles
Simonyi.
The death of computer languages and the birth of intentional programming.
In NATO Science Committee Conference, 1995.
- Alok Sinha.
Client-server computing.
Communications of the ACM, 35(7):77–98, July 1992.
- I. Skaldidis, A. E. Germenis,
N. Patsopoulos, and D. Trichopoulos.
The impact of
Greek publications on the international literature by scientific
category.
Archives of Hellenic Medicine, 21(5):472–479, September 2004.
In Greek.
- Brian K.
Smith, Erik Blankinship, Alfred Ashford III,
Michael Baker, and Timothy Hirzel.
Inquiry with imagery:
Historical archive retrieval with digital cameras.
In Proceedings of the seventh ACM International Conference on Multimedia
(Part 1), pages 405–408, New York, 1999. ACM Press.
(doi:10.1145/319463.319675)
- B. Smith,
W. Yurcik, and D. Doss.
Ethical hacking: The security justification redux.
In ISTAS'02: International Symposium on Technology and Society,
pages 374–379, June 2002.
(doi:10.1109/ISTAS.2002.1013840)
- Brian Cantwell
Smith.
Procedural
Reflection in Programming Languages.
PhD thesis, Massachusetts Institute of Technology, January 1982.
- William Smith.
Nuber cruncing in C.
The C Users Journal, pages 37–45, May 1992.
- Steven R.
Snapp, Stephen E. Smaha, Daniel M. Teal, and
Tim Grance.
The DIDS (distributed intrusion detection system) prototype.
In USENIX Conference Proceedings, pages 227–233, Berkeley, CA,
Summer 1992. USENIX Association.
- Gregor
Snelting.
Reengineering of configurations based on mathematical concept analysis.
ACM Transactions on Software Engineering and Methodology,
5(2):146–189, 1996.
(doi:10.1145/227607.227613)
- Eugene H.
Spafford.
The internet worm program: An analysis.
Technical Report CSD-TR-823, Purdue University, West Lafayette, IN 47907-2004,
November 1988.
- Yiannis E.
Spanos, Gregory P. Prastacos, and Angeliki
Poulymenakou.
The
relationship between information and communication technologies adoption and
management.
Information and Management, 39(8):659 – 675, 2002.
(doi:10.1016/S0378-7206(01)00141-0)
- Alfred Z. Spector and David
Gifford.
The Space Shuttle primary computer system.
Communications of the ACM, 27(9):874–900, September 1984.
- Alfred Z. Spector and David
Gifford.
A computer science perspective of bridge design.
Communications of the ACM, 29(4):268–283, April 1986.
- Terry Speed.
A correlation for the 21st century.
Science, 334:1502, 2011.
(doi:10.1126/science.1215894)
- James C.
Spohrer.
Information in
places.
IBM Systems Journal, 38(4):602–628, 1999.
- Rahul Srivastava.
XML
schema: Understanding structures.
Available online
http://www.oracle.com/technology/pub/articles/srivastava_structures.html.
- Ian St James-Roberts, Marissa
Alvarez, Emese Csipke, Tanya Abramsky,
Jennifer Goodwin, and Esther Sorgenfrei.
Infant Crying and Sleeping in London, Copenhagen and When Parents Adopt a
"Proximal" Form of Care.
Pediatrics, 117(6):e1146–1155, 2006.
(doi:10.1542/peds.2005-2387)
- Carl
Staelin and Larry McVoy.
mhz:
Anatomy of a micro-benchmark.
In USENIX Conference Proceedings, Berkeley, CA, June 1998.
USENIX Association.
- Michael Stal.
Web services: Beyoond component-based computing.
Communications of the ACM, 45(10):71–76, October 2002.
- Ioannis
Stamelos, Lefteris Angelis, Apostolos
Oikonomou, and Georgios L. Bleris.
Code
quality analysis in open source software development.
Information Systems Journal, 12(1):43–60, 2002.
- J. T. Stasko.
Tango: A framework and system for algorithm animation.
IEEE Computer, 23(9):27–39, September 1990.
- Joseph L.
Stephen.
Adding run-time checking to the portable C compiler.
Software: Practice & Experience, 22(4):306–316, April 1992.
- W. Richard Stevens and
Jan-Simon Pendry.
Portals in 4.4bsd.
In USENIX 1995 Technical Conference Proceedings, Berkeley, CA,
January 1995. USENIX Association.
- Katherine J. Stewart and
Sanjay Gosain.
The impact of ideology on effectiveness in open source software development
teams.
Management Information Systems Quarterly, 30(2):291–314, June
2006.
- James M. Stichnoth and Thomas
Gross.
Code composition as
an implementation language for compilers.
In Ramming [Ramming, 1997], pages 119–132.
- Kevin J. Stiroh.
Investing
in information technology: Productivity payoffs for U.S. industries.
Current Issues in Economics and Finance, 7(6), June 2001.
- K.-J.
Stol and M. Ali Babar.
Challenges in using open source software in product development: A review of
the literature.
In International Conference on Software Engineering, pages 17–22,
2010.
(doi:10.1145/1833272.1833276)
- Clifford Stoll.
Stalking the wily hacker.
Communications of the ACM, 31(5):484–497, May 1988.
- Bjarne
Stroustrup.
Data abstraction in C.
Bell System Technical Journal, 63(8):1701–1732, October
1984.
- B. Stvilia, M. B. Twidale,
L. C. Smith, and L. Gasser.
Assessing
information quality of a community-based encyclopedia.
In Proceedings of the International Conference on Information Quality -
ICIQ 2005, pages 442–454, 2005.
- Fernando F.
Suarez, Michael A. Cusumano, and Steven J.
Kahl.
Services and the business models of product firms: An empirical analysis of the
software industry.
Management Science.
- John O.
Summers.
Guidelines for conducting research and publishing in marketing: From
conceptualization through the review process.
Journal of the Academy of Marketing Science, 29(4):404–415, 2001.
(doi:10.1177/03079450094243)
- Ivan
Sutherland.
Technology
and courage.
Sun Labs Perspectives Essay Series 96-1, Sun Microsystems Laboratories, Santa
Clara, CA, April 1996.
Available online
http://research.sun.com/techrep/Perspectives/smli_ps-1.pdf.
- Robert A.
Sutterfield.
Low-cost IP connectivity, December 1991.
- Joe Tajnai.
Serial
Infrared Physical Layer Link Specification.
Infrared Data Association, version 1.2 edition, November 1997.
Online. http://www.irda.org/standards/pubs/IrPHY_1_2.PDF. 11 April 1998.
- M. Kobayashi K.
Takeda.
Information retrieval on the Web.
ACM Computing Surveys, 32(2):144–173, June 2000.
- Paul Tanner.
Software portability: still an open issue?
StandardView, 4(2):88–93, June 1996.
- Herb
Taylor, Danny Chin, Stan Knight, and
James Kaba.
The
magic video-on-demand server and real-time simulation system.
IEEE Parallel & Distributed Technology, 3(2):40–51, Summer
1995.
- Rahul
Telang and Sunil Wattal.
An empirical analysis of the impact of software vulnerability announcements on
firm stock price.
IEEE Transactions on Software Engineering, 33(8):544–557, 2007.
(doi:10.1109/TSE.2007.70712)
- C. Teng.
Personality differences between online game players and nonplayers in a student
sample.
CyberPsychology & Behavior, 11(2):232–234, April 2008.
- John Thackara.
The design challenge of pervasive computing.
Interactions, 8(3):46–52, 2001.
- Harold
Thimberly.
A critique of Java.
Software: Practice & Experience, 29(5):457–478, 1999.
- K. Thomas, R. Wall,
A. S. James, and P. Mann.
A methodology for assessment of the carbon neutrality of products.
In M. Hadfield and Y. Wang, editors, 2nd
International Conference on Tribology in Environmental Design, pages
31–38, 2003.
- Ken Thompson.
Programming techniques: Regular expression search algorithm.
Communications of the ACM, 11(6):419–422, 1968.
(doi:10.1145/363347.363387)
- Ken L.
Thompson.
Reflections on trusting trust.
Communications of the ACM, 27(8):761–763, August 1984.
- Ken Thompson.
A new C compiler.
In Proceedings of the Summer 1990 UKUUG Conference, pages
41–51. UKUUG, July 1990.
- Walter F. Tichy.
Programming-in-the-large: Past, present and future.
In 14th International Conference on Software Engineering, pages
362–367, New York, May 1992. ACM Press.
- Frank Tip.
A survey of program slicing techniques.
Technical Report CS-R9438, Centrum voor Wiskunde en Informatica, Amsterdam,
1994.
- Frank Tip.
A survey of program slicing techniques.
Journal of Programming Languages, 3(3):121–189, September
1995.
- Lance
Tokuda and Don Batory.
Evolving
object-oriented designs with refactorings.
Automated Software Engineering, 8:89–120, 2001.
- Charles E. Trevethan,
Thomas D. Taylor, Raymond G. Hartenstein,
Ann C. Merwarth, and William N. Stewart.
Development and application of NASA's first standard spacecraft computer.
Communications of the ACM, 27(9):902–925, September 1984.
- Q. Tu and
M.W. Godfrey.
The build-time software architecture view.
In ICSM'01: Proceedings of the IEEE International Conference on Software
Maintenance, pages 398–407, 2001.
(doi:10.1109/ICSM.2001.972753)
- Edward R. Tufte.
The Cognitive
Style of PowerPoint.
Graphics Press, Cheshire, CT, 2004.
- Shmuel Tyszberowicz and Amiram
Yehudai.
OBSERV
— a prototyping language and environment.
ACM Transactions on Software Engineering and Methodology,
1(3):269–309, July 1992.
- Mark D. Uncles.
Journal rankings: How much credence should we give them.
Australasian Marketing Journal, 12(2):67–72, 2004.
- USENIX Association.
Very High Level Languages Workshop (VHLL), Berkeley, CA, October
1994. USENIX Association.
- Lauera A. Valaer and Robert G.
Babb II.
Choosing a user interface development tool.
IEEE Software, 14(4):29–39, July / August 1997.
- Arie
van Deursen and Paul Klint.
Little languages: Little maintenance.
Journal of Software Maintenance, 10(2):75–92, 1998.
(doi:10.1002/(SICI)1096-908X(199803/04)10:2<75::AID-SMR168>3.0.CO;2-5)
- Fiona Veira.
Analysis: Greece.
PC Europa, 8(9):13–17, May 1998.
- Todd L.
Veldhuizen.
Five
compilation models for C++ templates.
In First Workshop on C++ Template Programming, Erfurt, Germany,
October 2000.
- László Vidács and
Árpád Beszédes.
Opening up the C/C++ preprocessor black box.
In Proceedings of the Eight Symposium on Programming Languages and
Software Tools (SPLST'03), pages 45–57, June 2003.
- László Vidács, Árpád
Beszédes, and Rudolf Ferenc.
Columbus schema for C/C++ preprocessing.
In CSMR '04: Proceedings of the Eighth European Conference on Software
Maintenance and Reengineering, pages 75–84. IEEE Computer Society,
March 2004.
- John
Viega, Joshua T. Bloch, Tadayoshi Kohno, and
Gary McGraw.
ITS4: A static
vulnerability scanner for C and C++ code.
In Proceedings of the 16th Annual Computer Security Applications
Conference (ACSAC'00), page 257, Washington, DC, December 2000. IEEE
Computer Society.
- Fernanda B. Viégas, Martin
Wattenberg, and Kushal Dave.
Studying cooperation
and conflict between authors with history flow visualizations.
In CHI '04: Proceedings of the SIGCHI conference on Human factors in
computing systems, pages 575–582, New York, NY, USA, 2004. ACM Press.
(doi:10.1145/985692.985765)
- Marian Vittek.
Refactoring browser
with preprocessor.
In CSMR '03: Proceedings of the Seventh European Conference on Software
Maintenance and Reengineering, page 101. IEEE Computer Society,
2003.
- Jeffrey M. Voas.
Certifying off-the-shelf software components.
Computer, 31(6):53–59, June 1998.
- Jeffrey M. Voas.
The challenges of using COTS software in component-based development.
Computer, 31(6):44–45, June 1998.
- Werner Vogels.
Web services are not distributed objects.
IEEE Internet Computing, 7(6):59–66, November/December 2003.
- Jakob Vo s .
Measuring
Wikipedia.
In 10th International Conference of the International Society for
Scientometrics and Informetrics, pages 221–231, July 2005.
- George
Vouros, Vangelis Karkaletsis, and Costas
Spyropoulos.
Documentation and translation.
In P. A. V. Hall and R. Hudson, editors,
Software Without Frontiers, chapter 10. Wiley, 1996.
- Daniel G. Waddington and Bin
Yao.
High-fidelity C/C++ code transformation.
Electronic Notes in Theoretical Computer Science, 141(4):35–56,
2005.
(doi:10.1016/j.entcs.2005.04.037)
- Gregory K.
Wallace.
The JPEG still picture compression standard.
Communications of the ACM, 34(4):30–44, April 1991.
- Gregory K.
Wallace.
The JPEG picture compression standard.
IEEE Transactions on Consumer Electronics, 38(1), 1992.
- Roy
Want and Gaetano Borriello.
Survey on
information appliances.
Computers Graphics and Applications, 20(3):24–31, May/June
2000.
- Roy Want
and Bill Schilit.
Expanding the horizons of location-aware computing.
Computer, 34(8):31–34, August 2001.
- Roy Want,
Trevor Pering, Gaetano Borriello, and
Keith I. Farkas.
Disappearing hardware.
IEEE Pervasive Computing, 1(1):36–47, January-March 2002.
- Karsten Weihe.
A software engineering perspective on algorithmics.
ACM Computing Surveys, 33(3):89–134, March 2001.
- Mark Weiser.
The computer of the 21st century.
Scientific American, 265(3):66–75, September 1991.
- Laurie Honour
Werth.
Predicting student
performance in a beginning computer science class.
In SIGCSE '86: Proceedings of the seventeenth SIGCSE technical symposium
on Computer science education, pages 138–143, New York, NY, USA,
1986. ACM.
(doi:10.1145/5600.5701)
- P. Wessel and W. H. F. Smith.
Free software helps map and display data.
EOS Transactions American Geophysical Union, 72(41):441, 445–446,
1991.
- James C.
Wetherbe.
Research
center models for attracting corporate funding.
Communications of AIS, 7(7), August 2001.
- Michael J.
Wiener.
Efficient DES key search, August 1993.
- Jeremiah
Willcock, Jaakko Järvi, Andrew Lumsdaine,
and David Musser.
A
formalization of concepts for generic programming.
In Concepts: a Linguistic Foundation of Generic Programming at Adobe Tech
Summit, San Jose, CA. Adobe Systems, April 2004.
- Laurie Williams and Alistair
Cockburn.
Agile software development: It's about feedback and change.
IEEE Computer, 36(6):39–43, July 2003.
Feature issue on Agile Methods.
- H. E.
Williams, J. Zobel, and S. Heinz.
Self-adjusting trees in practice for large text collections.
Software: Practice & Experience, 31(10):925–940, August
2001.
- Ross N.
Williams.
An
introduction to digest algorithms.
Online. ftp://ftp.rocksoft.com/clients/rocksoft/papers/digest10.ps,
September 1994.
Australian Decus Symposium 1994, Canberra, Australia.
- Alan
Cameron Wills and Desmond D'Souza.
Catalysis — rigorous
component-based development.
Available online http://www.trireme.com/catalysis/catpaper.pdf, December 1999,
October 1997.
- Alan Cameron
Wills.
Designing component
kits and architectures.
In Barroca et al. [Barroca et al.,
1999].
- Victor L.
Winter, John M. Covan, Larry J. Dalton,
Leon Alkalai, Ann T. Tai, Rick
Harper, Barry Flahive, Wei-Tek Tsai,
Ramin Mojdehbakhsh, Sanjai Rayadurgam,
Kinji Mori, and Michael R. Lowry.
Key applications for
high-assurance systems.
Computer, 31(4):35–45, April 1998.
- Niklaus Wirth.
From programming language design to computer construction.
Communications of the ACM, 28(2):159–164, February 1985.
- W. Eric
Wong, Joseph R. Horgan, Swapna S. Gokhale, and
Kishor S. Trivedi.
Locating program features using execution slices.
In Proceedings of the 1999 IEEE Symposium on Application-Specific Systems
and Software Engineering & Technology, 1999.
- W. Eric
Wonga, Robert L. Glass, Victor R. Basili, and
T.Y. Chen.
An assessment of systems and software engineering scholars and institutions
(2003–2007 and 2004–2008).
Journal of Systems and Software, 84(1):162–168, January
2011.
- Gene Woolsey.
An exemplary essay on communication or corporate style, corporate substance, &
the sting.
Interfaces, 9(3):10–12, May 1979.
- M. T. Wright.
The Antikythera mechanism.
A & G, 42:3.9, June 2001.
- M. T. Wright.
The Antikythera mechanism: A new gearing scheme.
Bulletin of the Scientific Instrument Society, 85:2–7, June
2005.
- M. T. Wright.
The Antikythera mechanism and the early history of the moon-phase display.
Antiquarian Horology, 29:319–329, March 2006.
- David R. Wright.
Towards a theory of software design: Timeless principles of software system
design.
In Hisham Al-Mubaid and Marc Garbey, editors,
SEDE, pages 320–325. ISCA, 2007.
- R. Wuyts.
Declarative reasoning
about the structure of object-oriented systems.
In TOOLS '98: Proceedings of the Technology of Object-Oriented Languages
and Systems, pages 112–124, Washington, DC, 1998. IEEE Computer
Society.
- Jie Yang,
Weiyi Yang, Matthias Denecke, and
Alex Waibel.
Smart sight: A tourist assistant system.
In Third International Symposium on Wearable Computers (ISWC '99),
pages 73–78. IEEE Computer Society, October 1999.
- H. Yang,
H. Kang, and R. Mason.
An exploratory study on meta skills in software development teams: antecedent
cooperation skills and personality for shared mental models.
European Journal of Information Systems, 17(1):47–61, February
2008.
- Jonathan Yavner.
Back-progrpagation of knowledge from syntax tree to c source code.
ACM SIGPLAN Notices, 39(3):31–37, March 2004.
- Ozan Yigit.
Sdbm — substitute DBM or Berkeley ndbm for every UN*X made simple.
Part of the Perl 5 distribution, December 1990.
- Yasuhiko Yokote.
The
Apertos reflective operating system: The concept and its
implementation.
ACM SIGPLAN Notices, 27(10):414–434, October 1992.
Proceedings of the 1992 ACM SIGPLAN Conference on Object-Oriented Programming
Systems, Languages and Applications (OOPSLA '92).
- Doug Young.
Programming with the X toolkit.
Unix World, pages 123–135, January 1990.
- Yijun Yu,
Homy Dayani-Fard, and John Mylopoulos.
Removing false code dependencies to speedup software build processes.
In CASCON '03: Proceedings of the 2003 Conference of the Centre for
Advanced Studies on Collaborative Research, pages 343–352. IBM Press,
2003.
- Huiming Yu.
Using
object-oriented techniques to develop reusable components.
In Proceedings of the conference on TRI-Ada '97, pages 117–124.
ACM, 1997.
- Justin
Zobel, Steffen Heinz, and Hugh E. Williams.
In-memory hash tables for accumulating text vocabularies.
Information Processing Letters, 80(6):271–277, December
2001.