Association for Computing Machinery

Publications in OpenAlex of which a co-author is affiliated to this organization

All publications | By field | By subfield

All publications [Next]
Title DOI
https://doi.org/10.1287/isre.14.3.221.16560 Generalizing Generalizability in Information Systems Research
https://doi.org/10.1207/s15327809jls0203_1 Learning by Collaborating: Convergent Conceptual Change
Classification of Model Transformation Approaches
https://doi.org/10.1109/2.19833 Computing as a discipline
The costs and benefits of pair programming
Proceedings of the 2013 IEEE International Conference on Big Data
Overview of the TREC-2005 Enterprise Track
https://doi.org/10.1109/79.81008 Computationally efficient algorithms for cyclic spectral analysis
An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS
https://doi.org/10.1145/2976749.2978315 Acing the IOC Game
https://doi.org/10.1145/92755.92756 Women and computing
https://doi.org/10.26503/dl.v2005i1.229 Affective Videogames and Modes of Affective Gaming: Assist Me, Challenge Me, Emote Me
https://doi.org/10.5555/1953048.2021027 Efficient Structure Learning of Bayesian Networks using Constraints
https://doi.org/10.1109/mra.2003.1213611 LEGO mindstorms: Not just for K-12 anymore
Stratego: A Language for Program Transformation Based on Rewriting Strategies
https://doi.org/10.1145/3411764.3445315 Manipulating and Measuring Model Interpretability
Architectural Patterns Revisited - A Pattern Language
https://doi.org/10.1145/2810103.2813668 When Good Becomes Evil
https://doi.org/10.1111/ecog.05360 Explainable artificial intelligence enhances the ecological interpretability of black‐box species distribution models
Proximity Queries and Penetration Depth Computation on 3D Game Objects
Providing connectivity to the Saami nomadic community
Survey of User-Based Experimentation in Augmented Reality
https://doi.org/10.1109/icdm.2007.93 A Support Vector Approach to Censored Targets
Methods for Evaluating Gameplay Experience in a Serious Gaming Context.
https://doi.org/10.26503/dl.v2011i1.562 Player Typology in Theory and Practice
https://doi.org/10.1080/07421222.1996.11518112 The Congruence between a Firm’s Competitive Strategy and Information Technology Leader’s Rank and Role
Anti-Forensics: Techniques, Detection and Countermeasures
Overview of the TREC 2009 Entity Track
https://doi.org/10.5121/iju.2012.3202 Content Based Video Retrieval Systems
https://doi.org/10.1145/377924.594925 Preliminary report
https://doi.org/10.1007/978-3-030-01701-9_10 Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
https://doi.org/10.1080/03640210802066865 Processing Polarity: How the Ungrammatical Intrudes on the Grammatical
https://doi.org/10.1184/r1/6472181 Would a privacy fundamentalist sell their DNA for $1000... if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences
https://doi.org/10.1145/3024188 Control Strategies for Self-Adaptive Software Systems
Mobile Phones and Poverty Alleviation: A Survey Study in Rural Tanzania
https://doi.org/10.1145/3431280 The harm in conflating aging with accessibility
Evolutional Data Quality: A Theory-Specific View.
https://doi.org/10.1145/543812.543853 Pioneering women in computer science
https://doi.org/10.1126/science.1113963 An Endless Frontier Postponed
https://doi.org/10.1145/3406772 Retention in Computer Science Undergraduate Programs in the U.S.
Proceedings of the 2005 conference on Designing for User eXperience
https://doi.org/10.1145/2837717 Editorial Journal-First Publication for the Software Engineering Community
https://doi.org/10.1167/jov.22.2.17 Visual discrimination of optical material properties: A large-scale study
https://doi.org/10.1145/74224.74255 Lessons learned from the ACM hypertext on hypertext project
https://doi.org/10.1126/science.adu8578 Strengthening nucleic acid biosecurity screening against generative protein design tools
https://doi.org/10.3389/fnbeh.2021.787905 Predicting Dishonesty When the Stakes Are High: Physiologic Responses During Face-to-Face Interactions Identifies Who Reneges on Promises to Cooperate
Structuring Use Cases with Goals
Improving the Design of Existing Code
https://doi.org/10.1049/ic:20040466 Preprocessing CVS data for fine-grained analysis
Coordinating the Interruption of People in Human-Computer Interaction.
https://doi.org/10.1111/1467-8659.t01-1-00597 A Frequency-Domain Approach to Watermarking 3D Shapes
A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE)
CALI: An Online Scribble Recognizer for Calligraphic Interfaces
Application-specific Delta-encoding via Resemblance Detection.
https://doi.org/10.1287/mnsc.46.10.1365.12272 A Time-Oriented Branch-and-Bound Algorithm for Resource-Constrained Project Scheduling with Generalised Precedence Constraints
Information flow control for Java based on path conditions in dependence graphs
Extreme Programming Explored
https://doi.org/10.21437/interspeech.2004-327 Detecting user engagement in everyday conversations
https://doi.org/10.1207/s1532690xci2002_4 Learner Articulation as Interactional Achievement: Studying the Conversation of Gesture
EXTENDING THE GABLE ET AL. ENTERPRISE SYSTEMS SUCCESS MEASUREMENT MODEL: A PRELIMINARY STUDY
https://doi.org/10.1109/pimrc.2003.1259108 Indoor location estimation using multiple wireless technologies
https://doi.org/10.20380/gi2000.14 Effects of Gaze on Multiparty Mediated Communication
Model-Driven Software Evolution: A Research Agenda
A Survey of Self-Stabilizing Spanning-Tree Construction Algorithms
How Crowdsourcable is Your Task
Quantifying and Visualizing Attribute Interactions: An Approach Based on Entropy
https://doi.org/10.1145/2160910.2160911 Implicit dynamic frames
https://doi.org/10.1207/s15327809jls1003_1 Knowing When You've Brought Them in: Scientific Genre Knowledge and Communities of Practice
https://doi.org/10.1097/01.ccm.0000121433.61546.a0 Sepsis severity is the major determinant of circulating thrombopoietin levels in septic patients
Meta-Languages and Semantics for Equation-Based Modeling and Simulation
Data Mining Methods for Network Intrusion Detection
Eating Our Own Cooking: Toward a More Rigorous Design Science of Research Methods
Motivation, Teamwork, and Agile Development
A Model of Two-Thumb Text Entry.
https://doi.org/10.13140/2.1.4197.9845 Adaptive K-Means Clustering.
Self-Regulated Workplace Learning: A Pedagogical Framework and Semantic Web-Based Environment
https://doi.org/10.17705/1jais.00241 Software Licenses in Context: The Challenge of Heterogeneously-Licensed Systems
State of the Art of Web Usability Guidelines
https://doi.org/10.1145/3133956.3134049 Don't Let One Rotten Apple Spoil the Whole Barrel
Overview of the NTCIR-10 INTENT-2 Task.
Agent-Based Collaborative Affective e-Learning Framework.
https://doi.org/10.1145/1132469.1132487 Plagiarism on the rise
https://doi.org/10.3727/109830508784913121 An Analysis of Travel Information Searching on the Web
Learning To Solve Circuit-SAT: An Unsupervised Differentiable Approach.
Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology
Overview of the Wikipedia Image Retrieval Task at ImageCLEF 2011
Collaborative Filtering on a Budget
https://doi.org/10.21437/interspeech.2010-706 Dialog prediction for a general model of turn-taking
https://doi.org/10.2478/cait-2012-0003 Analysis of a Vector Space Model, Latent Semantic Indexing and Formal Concept Analysis for Information Retrieval
TREC 2013 Temporal Summarization.
https://doi.org/10.1145/1095534.1095538 Anna Marie Piersimoni
Multiagent self-organization for a taxi dispatch system
https://doi.org/10.4236/ijcns.2015.87026 Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment
https://doi.org/10.1145/1035134.1035153 The health of research conferences and the dearth of big idea papers
Computer - Supported Cooperative Work - Concepts and Trends
https://doi.org/10.1145/2939918.2939926 Evading Android Runtime Analysis Through Detecting Programmed Interactions
https://doi.org/10.2807/1560-7917.es.2020.25.45.2001735 Epidemiological situation, laboratory capacity and preparedness for carbapenem-resistant Acinetobacter baumannii in Europe, 2019
https://doi.org/10.1111/j.1467-8659.2011.02062.x Creating Fluid Animation from a Single Image using Video Database
https://doi.org/10.3390/s120101072 Activity Inference for Ambient Intelligence Through Handling Artifacts in a Healthcare Environment
https://doi.org/10.1145/3084540 DawnCC