Follow

Submissions from 2009

Link

Frequently Asked Questions on Implementing GSwE2009, Mary Shaw

Link

Graduate Software Engineering 2009 (GSwE2009): Curriculum Guidelines for Graduate Degree Programs in Software Engineering., Mary Shaw

Link

Knowledge Discovery for Mining Patterns in Spatio-Temporal Databases, Upasna Singh and Gora Nandi

Link

SH-Struct: An Affirmative Advanced Method for Mining Frequent Patterns, Upasna Singh and Gora Nandi

Link

Crying Wolf: An Empirical Study of SSL Warning Effectiveness, Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor

Link

The Medical Billing Framework as the Backbone of the National Health Information Infrastructure, Latanya Sweeney

PDF

Flexible Multicast Authentication for Time-Triggered Embedded Control Network Applications, Chris Szilagy and Philip Koopman

Link

Prediction of Interactions between HIV-1 and Human Proteins by Information Integration, Oznur Tastan, Yanjun Qi, Jaime G. Carbonell, and Judith Klein-Seetharaman

Link

Location-Sharing Technologies: Privacy Risks and Controls, Janice Y. Tsai, Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh

Link

Inferring Method Effect Summaries for Nested Heap Regions, Mohsen Vakilian, Danny Dig, Robert Bocchino, Jeffrey Overbey, Vikram Adve, and Ralph Johnson

PDF

Heartbeat: Measuring active user base and potential user interest in FLOSS projects, Andrea Wiggins, James Howison, and Kevin Crowston

Submissions from 2008

Link

Document Representation and Query Expansion Models for Blog Recommendation, Jaime Arguello, Jonathan L. Elsas, Jamie Callan, and Jaime G. Carbonell

PDF

A User Study of Policy Creation in a Flexible Access-Control System, Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, and Kami Vaniea

PDF

Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems, Jennifer Black and Philip Koopman

Link

Traffic Based Clustering in Wireless Sensor Network, Vijay Kr. Chaurasiya, S. Rahul Kumar, Shekhar Verma, and Gora Nandi

PDF

A Framework for Reasoning About the Human in the Loop, Lorrie F. Cranor

PDF

P3P Deployment on Websites, Lorrie F. Cranor, Serge Egelman, Steve Sheng, Aleecia M. McDonald, and Abdur Chowdhury

Link

Optimizing Estimated Loss Reduction for Active Sampling in Rank Learning, Pinar Donmez and Jaime G. Carbonell

Link

Paired Sampling in Density-Sensitive Active Learning, Pinar Donmez and Jaime G. Carbonell

PDF

You’ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings, Serge Egelman, Lorrie Faith Cranor, and Jason Hong

Link

RADAR: A Personal Assistant that Learns to Reduce Email Overload, Michael Freed, Jaime G. Carbonell, Geoffrey J. Gordon, Jordan Hayes, Brad Myers, Daniel Siewiorek, Stephen Smith, Aaron Steinfeld, and Anthony Tomasic

Link

Holistic Application Analysis for Update-Independence, Charles Garrod, Amit Manjhi, Bruce Maggs, Todd Mowry, and Anthony Tomasic

Link

Semi-Supervised Learning of Multi-Factor Models for Face De-Identification, Ralph Gross, Latanya Sweeney, Fernando de la Torre, and Simon Baker

Link

Rare Class Discovery Based on Active Learning, Jingrui He and Jaime G. Carbonell

PDF

Alone Together: A socio-technical theory of motivation, coordination and collaboration technologies in organizing for free and open source software development, James Howison

Link

State-Set Branching: Leveraging BDDs for Heuristic Search, Rune M. Jensen, Manuela M. Veloso, and Randal E. Bryant

Link

Evaluating an Agglutinative Segmentation Model for ParaMor, Christian Monson, Alon Lavie, Jaime G. Carbonell, and Lori Levin

Link

Linguistic Structure and Bilingual Informants to Induce Machine Translation of Lesser-Resourced Languages, Christian Monson, Ariadna Font Llitjós, Vamshi Ambati, Lori Levin, Alon Lavie, Alison Alvarez, Roberto Aranovich, Jaime G. Carbonell, Robert Frederking, Erik Peterson, and Katharina Probst

PDF

Continuous-Domain Reinforcement Learning Using a Learned Qualitative State Representation, Jonathan Mugan and Benjamin Kuipers

PDF

Towards the Application of Reinforcement Learning to Undirected Developmental Learning, Jonathan Mugan and Benjamin Kuipers

Visibility of Control in Adaptive Systems, Hausi Muller, Mauro Pezze, and Mary Shaw

Link

A Novel Approach for Recognition of Human Faces, Jay Shankar Prasad and Gora Nandi

PDF

Expandable Grids for Visualizing and Authoring Computer Security Policies, Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, and Heather Strong

Link

Understanding and Capturing People’s Privacy Policies in a People Finder Application, Norman Sadeh, Jason Hong, Lorrie Faith Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao

Link

The 2007 Procurement Challenge: A Competition to Evaluate Mixed Procurement Strategies, Alberto Sardinha, Michael Benisch, Norman Sadeh, Ramprasad Ravichandran, Vedran Podobnik, and Mihai Stan

Link

Characterizing Reusability of End-User Web Macro Scripts, Chris Scaffidi, Chris Bogart, Margaret Burnett, Allen Cypher, Brad Myers, and Mary Shaw

Link

Using Topes to Validate and Reformat Data in End-User Programming Tools, Chris Scaffidi, Allen Cypher, Sebastian Elbaum, Andhy Koesnandar, James Lin, Brad Myers, and Mary Shaw

Link

Tool Support for Data Validation by End-User Programmers, Chris Scaffidi, Brad Myers, and Mary Shaw

Link

Toped: Enabling End-User Programmers to Validate Data, Chris Scaffidi, Brad Myers, and Mary Shaw

Link

Topes: Reusable Abstractions for Validating Data, Chris Scaffidi, Brad Myers, and Mary Shaw

PDF

Using Scenario-Based Requirements to Direct Research on Web Macro Tools, Christopher Scaffidi, Allen Cypher, Sebastian Elbaum, Andhy Koesnandar, and Brad Myers

Link

Development of New Structure for Frequent Pattern Mining, Upasna Singh and Gora Nandi

Link

Demonstration of a Privacy-Preserving System that Performs an Unduplicated Accounting of Services across Homeless Programs, Latanya Sweeney

PDF

A Flexible Approach to Embedded Network Multicast Authentication, Chris Szilagy and Philip Koopman

Submissions from 2007

Link

Techniques for Dynamic Damping Control in Above Knee Prosthesis, Hemant Kr. Anand, Rachit Rastogi, and Gora Nandi

PDF

Lessons Learned from the Deployment of a Smartphone-Based Access-Control System, Lujo Bauer, Lorrie F. Cranor, Michael K. Reiter, and Kami Vaniea

Link

A Theory of Expressiveness in Mechanisms, Michael Benisch, Norman Sadeh, and Tuomas Sandholm

Link

Data-Intensive Supercomputing: The case for DISC, Randal E. Bryant

Link

Deciding Bit-Vector Arithmetic with Abstraction, Randal E. Bryant, Daniel Kroening, Joel Ouaknine, Sanjit A. Seshia, Ofer Strichman, and Bryan Brady

PDF

Workshop Report: From End-User Programming to End-User Software Engineering (a CHI'06 Workshop), Margaret Burnett, Brad Myers, Mary Beth Rosson, and Susan Wiedenbeck

Link

Combining N-grams and Alignment in G-Protein Coupling Specificity Prediction, Betty Yee Man Cheng and Jaime G. Carbonell

Link

User-Controllable Security and Privacy for Pervasive Computing, Jason Cornwell, Ian Fette, Gary Hsieh, Madhu Prabaker, Jinghai Rao, Karen Teng, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Jason Hong, Bruce McLaren, Mike Reiter, and Norman Sadeh

Link

Factoring Games to Isolate Strategic Interactions, George B. Davis, Michael Benisch, Kathleen M. Carley, and Norman Sadeh

Link

Dual Strategy Active Learning, Pinar Donmez, Jaime G. Carbonell, and Paul N. Bennett

PDF

Behavioral Response to Phishing Risk, Julie S. Downs, Mandy Holbrook, and Lorrie F. Cranor

Link

Retrieval and Feedback Models for Blog Distillation, Jonathan Elsas, Jaime Arguello, Jamie Callan, and Jaime G. Carbonell

Link

Strategies for Research About Design: a multidisciplinary graduate workshop, Mark D. Gross, Susan Finger, James Herbsleb, and Mary Shaw

Link

Robust Hand Geometry Measurements for Person Identification using Active Appearance Models, Ralph Gross, Yiheng Li, Latanya Sweeney, Xiaoqian Jiang, Wanhong Xu, and Daniel Yurovsky

Link

Towards Real-World Face De-Identification, Ralph Gross and Latanya Sweeney

Link

Nearest-Neighbor-Based Active Learning for Rare Category Detection, Jingrui He and Jaime G. Carbonell

Link

Graph-Based Semi-Supervised Learning as a Generative Model, Jingrui He, Jaime G. Carbonell, and Yan Liu

PDF

Position Paper: Deeply Embedded Survivability, Philip Koopman, Jennifer Black, and Theresa Maxino

PDF

Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System, Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge

PDF

Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer, Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie F. Cranor, and Jason Hong

Link

Cluster-Based Selection of Statistical Answering Strategies, Lucian Vlad Lita and Jaime G. Carbonell

Link

Protein Quaternary Fold Recognition Using Conditional Graphical Models, Yan Liu, Jaime G. Carbonell, Vanathi Gopalakrishnan, and Peter Weigele

PDF

Adaptive Sampling for Multi-Robot Wide-Area Exploration, Kian Hsiang Low, Geoffrey J. Gordon, John M. Dolan, and Pradeep Khosla

Link

Invalidation Clues for Database Scalability Services, Amit Manjhi, Phillip B. Gibbons, Anastassia Ailamaki, Charles Garrod, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, Anthony Tomasic, and Haifeng Yu

Link

ParaMor: Finding Paradigms across Morphology, Christian Monson, Jaime G. Carbonell, Alon Lavie, and Lori Levin

Link

ParaMor: Minimally-Supervised Induction of Paradigm Structure and Morphological Analysis, Christian Monson, Jaime G. Carbonell, Alon Lavie, and Lori Levin

PDF

Learning Distinctions and Rules in a Continuous World Through Active Exploration, Jonathan Mugan and Benjamin Kuipers

PDF

Learning to Predict the Effects of Actions: Synergy Between Rules and Landmarks, Jonathan Mugan and Benjamin Kuipers

PDF

Common Pitfalls in Statistical Thinking, Mark C. Paulk and Elaine B. Hyder

Link

Leveraging Resource Prediction for Anticipatory Dynamic Configuration, Vahe Poladian, David Garlan, Mary Shaw, M. Satyanarayanan, Bradley Schmerl, and João Sousa

Link

Modeling Uncertainty of Predictive Inputs in Anticipatory Dynamic Configuration, Vahe Poladian, Mary Shaw, and David Garlan

Link

Enforcing Context-Sensitive Policies in Collaborative Business Environments, Alberto Sardinha, Jinghai Rao, and Norman Sadeh

Link

Trial By Water: Creating Hurricane Katrina "Person Locator" Web Sites, Chris Scaffidi, Brad Myers, and Mary Shaw

Link

Developing Confidence in Software through Credentials and Low-Ceremony Evidence, Chris Scaffidi and Mary Shaw

Link

Toward a Calculus of Confidence, Chris Scaffidi and Mary Shaw

PDF

Scenario-Based Requirements for Web Macro Tools, Christopher Scaffidi, Allen Cypher, Sebastian Elbaum, Andhy Koesnandar, and Brad Myers

Link

On Solving Boolean Combinations of UTVPI Constraints, Sanjit A. Seshia, K. Subramani, and Randal E. Bryant

Link

Helping Everyday Users Establish Confidence for Everyday Applications, Mary Shaw

Link

Strategies for Achieving Dependability in Coalitions of Systems, Mary Shaw

PDF

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish, Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, and Elizabeth Nunge

Link

User Constructed Data Integration via Mixed Initiative Design, Anthony Tomasic, John Zimmerman, Ian Hargraves, and Roderick McMullen

Submissions from 2006

Link

Ultra-Large-Scale Systems: The Software Challenge of the Future

PDF

Scheduling with Uncertain Resources Part 3: Elicitation of Additional Data, Ulas Bardak, Eugene Fink, Chris R. Martens, and Jaime G. Carbonell

Link

Scalable Data Exploration and Novelty Detection, Jaime G. Carbonell, Eugene Fink, and Chun Jin

Link

Context-Based Machine Translation, Jaime G. Carbonell, Steve Klein, David Miller, Michael Steinbaum, Tomer Grassiany, and Jochen Frey

PDF

Language Technologies for Humanitarian Aid, Jaime G. Carbonell, Alon Lavie, Lori Levin, and Alan Black

PDF

JASPER: An Eclipse Plug-In to Facilitate Software Maintenance Tasks, Michael Coblenz, Andrew Ko, and Brad Myers

PDF

Coordination theory and its application in HCI, Kevin Crowston, Joseph Rubleske, and James Howison

PDF

Core and periphery in Free/Libre and Open Source software team communications, Kevin Crowston, Kangning Wei, Qing Li, and James Howison

PDF

Communication Networks from the Enron Email Corpus: "It's Always About the People. Enron is no Different.", Jana Diesner, Terrill L. Frantz, and Kathleen M. Carley

PDF

Decision Strategies and Susceptibility to Phishing, Julie S. Downs, Mandy B. Holbrook, and Lorrie Faith Cranor

Link

Scheduling with Uncertain Resources: Collaboration with the User, Eugene Fink, Ulas Bardak, Brandon Rothrock, and Jaime G. Carbonell

Link

Scheduling with Uncertain Resources: Search for a Near-Optimal Solution, Eugene Fink, P. Matthew Jennings, Ulas Bardak, Jean Oh, Stephen F. Smith, and Jaime G. Carbonell

Link

Spectral Clustering for Example-Based Machine Translation, Rashmi Gangadharaiah, Ralf Brown, and Jaime G. Carbonell

PDF

Power Strips, Prophylactics, and Privacy, Oh My!, Julia Gideon, Lorrie Cranor, Serge Egelman, and Alessandro Acquisti

Link

Model-Based Face De-Identification, Ralph Gross, Latanya Sweeney, Fernando de la Torre, and Simon Baker