Publications in OpenAlex of which a co-author is affiliated to this organization
All publications | By field | By subfield
All publications [Next]
| Title | DOI |
|---|---|
| https://doi.org/10.1287/isre.14.3.221.16560 | Generalizing Generalizability in Information Systems Research |
| https://doi.org/10.1207/s15327809jls0203_1 | Learning by Collaborating: Convergent Conceptual Change |
| Classification of Model Transformation Approaches | |
| https://doi.org/10.1109/2.19833 | Computing as a discipline |
| The costs and benefits of pair programming | |
| Proceedings of the 2013 IEEE International Conference on Big Data | |
| Overview of the TREC-2005 Enterprise Track | |
| https://doi.org/10.1109/79.81008 | Computationally efficient algorithms for cyclic spectral analysis |
| An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS | |
| https://doi.org/10.1145/2976749.2978315 | Acing the IOC Game |
| https://doi.org/10.1145/92755.92756 | Women and computing |
| https://doi.org/10.26503/dl.v2005i1.229 | Affective Videogames and Modes of Affective Gaming: Assist Me, Challenge Me, Emote Me |
| https://doi.org/10.5555/1953048.2021027 | Efficient Structure Learning of Bayesian Networks using Constraints |
| https://doi.org/10.1109/mra.2003.1213611 | LEGO mindstorms: Not just for K-12 anymore |
| Stratego: A Language for Program Transformation Based on Rewriting Strategies | |
| https://doi.org/10.1145/3411764.3445315 | Manipulating and Measuring Model Interpretability |
| Architectural Patterns Revisited - A Pattern Language | |
| https://doi.org/10.1145/2810103.2813668 | When Good Becomes Evil |
| https://doi.org/10.1111/ecog.05360 | Explainable artificial intelligence enhances the ecological interpretability of black‐box species distribution models |
| Proximity Queries and Penetration Depth Computation on 3D Game Objects | |
| Providing connectivity to the Saami nomadic community | |
| Survey of User-Based Experimentation in Augmented Reality | |
| https://doi.org/10.1109/icdm.2007.93 | A Support Vector Approach to Censored Targets |
| Methods for Evaluating Gameplay Experience in a Serious Gaming Context. | |
| https://doi.org/10.26503/dl.v2011i1.562 | Player Typology in Theory and Practice |
| https://doi.org/10.1080/07421222.1996.11518112 | The Congruence between a Firm’s Competitive Strategy and Information Technology Leader’s Rank and Role |
| Anti-Forensics: Techniques, Detection and Countermeasures | |
| Overview of the TREC 2009 Entity Track | |
| https://doi.org/10.5121/iju.2012.3202 | Content Based Video Retrieval Systems |
| https://doi.org/10.1145/377924.594925 | Preliminary report |
| https://doi.org/10.1007/978-3-030-01701-9_10 | Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild |
| https://doi.org/10.1080/03640210802066865 | Processing Polarity: How the Ungrammatical Intrudes on the Grammatical |
| https://doi.org/10.1184/r1/6472181 | Would a privacy fundamentalist sell their DNA for $1000... if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences |
| https://doi.org/10.1145/3024188 | Control Strategies for Self-Adaptive Software Systems |
| Mobile Phones and Poverty Alleviation: A Survey Study in Rural Tanzania | |
| https://doi.org/10.1145/3431280 | The harm in conflating aging with accessibility |
| Evolutional Data Quality: A Theory-Specific View. | |
| https://doi.org/10.1145/543812.543853 | Pioneering women in computer science |
| https://doi.org/10.1126/science.1113963 | An Endless Frontier Postponed |
| https://doi.org/10.1145/3406772 | Retention in Computer Science Undergraduate Programs in the U.S. |
| Proceedings of the 2005 conference on Designing for User eXperience | |
| https://doi.org/10.1145/2837717 | Editorial Journal-First Publication for the Software Engineering Community |
| https://doi.org/10.1167/jov.22.2.17 | Visual discrimination of optical material properties: A large-scale study |
| https://doi.org/10.1145/74224.74255 | Lessons learned from the ACM hypertext on hypertext project |
| https://doi.org/10.1126/science.adu8578 | Strengthening nucleic acid biosecurity screening against generative protein design tools |
| https://doi.org/10.3389/fnbeh.2021.787905 | Predicting Dishonesty When the Stakes Are High: Physiologic Responses During Face-to-Face Interactions Identifies Who Reneges on Promises to Cooperate |
| Structuring Use Cases with Goals | |
| Improving the Design of Existing Code | |
| https://doi.org/10.1049/ic:20040466 | Preprocessing CVS data for fine-grained analysis |
| Coordinating the Interruption of People in Human-Computer Interaction. | |
| https://doi.org/10.1111/1467-8659.t01-1-00597 | A Frequency-Domain Approach to Watermarking 3D Shapes |
| A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE) | |
| CALI: An Online Scribble Recognizer for Calligraphic Interfaces | |
| Application-specific Delta-encoding via Resemblance Detection. | |
| https://doi.org/10.1287/mnsc.46.10.1365.12272 | A Time-Oriented Branch-and-Bound Algorithm for Resource-Constrained Project Scheduling with Generalised Precedence Constraints |
| Information flow control for Java based on path conditions in dependence graphs | |
| Extreme Programming Explored | |
| https://doi.org/10.21437/interspeech.2004-327 | Detecting user engagement in everyday conversations |
| https://doi.org/10.1207/s1532690xci2002_4 | Learner Articulation as Interactional Achievement: Studying the Conversation of Gesture |
| EXTENDING THE GABLE ET AL. ENTERPRISE SYSTEMS SUCCESS MEASUREMENT MODEL: A PRELIMINARY STUDY | |
| https://doi.org/10.1109/pimrc.2003.1259108 | Indoor location estimation using multiple wireless technologies |
| https://doi.org/10.20380/gi2000.14 | Effects of Gaze on Multiparty Mediated Communication |
| Model-Driven Software Evolution: A Research Agenda | |
| A Survey of Self-Stabilizing Spanning-Tree Construction Algorithms | |
| How Crowdsourcable is Your Task | |
| Quantifying and Visualizing Attribute Interactions: An Approach Based on Entropy | |
| https://doi.org/10.1145/2160910.2160911 | Implicit dynamic frames |
| https://doi.org/10.1207/s15327809jls1003_1 | Knowing When You've Brought Them in: Scientific Genre Knowledge and Communities of Practice |
| https://doi.org/10.1097/01.ccm.0000121433.61546.a0 | Sepsis severity is the major determinant of circulating thrombopoietin levels in septic patients |
| Meta-Languages and Semantics for Equation-Based Modeling and Simulation | |
| Data Mining Methods for Network Intrusion Detection | |
| Eating Our Own Cooking: Toward a More Rigorous Design Science of Research Methods | |
| Motivation, Teamwork, and Agile Development | |
| A Model of Two-Thumb Text Entry. | |
| https://doi.org/10.13140/2.1.4197.9845 | Adaptive K-Means Clustering. |
| Self-Regulated Workplace Learning: A Pedagogical Framework and Semantic Web-Based Environment | |
| https://doi.org/10.17705/1jais.00241 | Software Licenses in Context: The Challenge of Heterogeneously-Licensed Systems |
| State of the Art of Web Usability Guidelines | |
| https://doi.org/10.1145/3133956.3134049 | Don't Let One Rotten Apple Spoil the Whole Barrel |
| Overview of the NTCIR-10 INTENT-2 Task. | |
| Agent-Based Collaborative Affective e-Learning Framework. | |
| https://doi.org/10.1145/1132469.1132487 | Plagiarism on the rise |
| https://doi.org/10.3727/109830508784913121 | An Analysis of Travel Information Searching on the Web |
| Learning To Solve Circuit-SAT: An Unsupervised Differentiable Approach. | |
| Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology | |
| Overview of the Wikipedia Image Retrieval Task at ImageCLEF 2011 | |
| Collaborative Filtering on a Budget | |
| https://doi.org/10.21437/interspeech.2010-706 | Dialog prediction for a general model of turn-taking |
| https://doi.org/10.2478/cait-2012-0003 | Analysis of a Vector Space Model, Latent Semantic Indexing and Formal Concept Analysis for Information Retrieval |
| TREC 2013 Temporal Summarization. | |
| https://doi.org/10.1145/1095534.1095538 | Anna Marie Piersimoni |
| Multiagent self-organization for a taxi dispatch system | |
| https://doi.org/10.4236/ijcns.2015.87026 | Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment |
| https://doi.org/10.1145/1035134.1035153 | The health of research conferences and the dearth of big idea papers |
| Computer - Supported Cooperative Work - Concepts and Trends | |
| https://doi.org/10.1145/2939918.2939926 | Evading Android Runtime Analysis Through Detecting Programmed Interactions |
| https://doi.org/10.2807/1560-7917.es.2020.25.45.2001735 | Epidemiological situation, laboratory capacity and preparedness for carbapenem-resistant Acinetobacter baumannii in Europe, 2019 |
| https://doi.org/10.1111/j.1467-8659.2011.02062.x | Creating Fluid Animation from a Single Image using Video Database |
| https://doi.org/10.3390/s120101072 | Activity Inference for Ambient Intelligence Through Handling Artifacts in a Healthcare Environment |
| https://doi.org/10.1145/3084540 | DawnCC |
