Follow

Submissions from 2006

PDF

Power Strips, Prophylactics, and Privacy, Oh My!, Julia Gideon, Lorrie Cranor, Serge Egelman, and Alessandro Acquisti

Link

Model-Based Face De-Identification, Ralph Gross, Latanya Sweeney, Fernando de la Torre, and Simon Baker

Link

ARGUS: Efficient Scalable Continuous Query Optimization for Large-Volume Data Streams, Chun Jin and Jaime G. Carbonell

PDF

ARGUS: Efficient Scalable Continuous Query Optimization for Large-Volume Data Streams, Chun Jin and Jaime G. Carbonell

PDF

End-User Programming Productivity Tools, Andrew Ko, Brad Myers, Michael Coblenz, and Jeffrey Stylos

PDF

Human Selection of Mnemonic Phrase-based Passwords, Cynthia Kuo, Sasha Romanosky, and Lorrie Faith Cranor

Link

Experiences and Results from Initiating Field Defect Prediction and Product Test Prioritization Efforts at ABB Inc., Paul Luo Li, James Herbsleb, Mary Shaw, and Brian Robinson

Link

Segmentation Conditional Random Fields (SCRFs): A New Approach for Protein Fold Recognition, Yan Liu, Jaime G. Carbonell, Peter Weigele, and Vanathi Gopalakrishnan

PDF

Automating Post-Editing to Improve MT Systems, Ariadna Font Llitjós and Jaime G. Carbonell

PDF

Revisiting Fletcher and Adler Checksums, Theresa Maxino

Link

Developing Software suite for microcontroller based above knee active Prosthesis, Gora Nandi

PDF

Controlling Home and Office Appliances with Smartphones, Jeffrey Nichols and Brad Myers

PDF

Factors Affecting Personal Software Quality, Mark C. Paulk

Link

Federated Ontology Search, Vasco Calais Pedro, Eric Nyberg, and Jaime G. Carbonell

Link

A Mixed Initiative Semantic Web Framework for Process Composition, Jinghai Rao, Dimitar Dimitrov, Paul Hofmann, and Norman Sadeh

PDF

Efficient High Hamming Distance CRCs for Embedded Networks, Justin Ray and Philip Koopman

Link

Dimensions Characterizing Programming Language Feature Usage by Information Workers, Chris Scaffidi, Andrew Ko, Mary Shaw, and Brad Myers

Link

Challenges, Motivations, and Success Factors in the Creation of Hurricane Katrina "Person Locator" Web Sites, Chris Scaffidi, Brad Myers, and Mary Shaw

Link

Games Programs Play: Obstacles to Data Reuse, Chris Scaffidi, Mary Shaw, and Brad Myers

PDF

The EUSES Web Macro Scenario Corpus, Version 1.0, Christopher Scaffidi, Allen Cypher, Sebastian Elbaum, Andhy Koesnandar, and Brad Myers

Link

Strategies for Achieving Robustness in Coalitions of Systems, Mary Shaw

Link

The Golden Age of Software Architecture: A Comprehensive Survey, Mary Shaw and Paul Clements

Link

The Golden Age of Software Architecture: A Comprehensive Survey. Technical Report CMU-ISRI-06-101, Mary Shaw and Paul Clements

PDF

An Evaluation of the Effect of US Financial Privacy Legislation Through the Analysis of Privacy Policies, Steve Sheng and Lorrie Faith Cranor

Link

Task-based Adaptation for Ubiquitous Computing, João Sousa, Vahe Poladian, David Garlan, Bradley Schmerl, and Mary Shaw

Link

Coordinated Selection of Procurement Bids in Finite Capacity Environments, Jiong Sun and Norman Sadeh

Link

Connectivity and the Digital Divide – Technology, Policy, and Design tradeoffs for Developing Regions, Rahul Tongia

Link

Real-Time 3D Video Compression for Tele-Immersive Environments, Zhenyu Yang, Yi Cui, Zahid Anwar, Robert Bocchino, Nadir Kiyanclar, Klara Nahrstedt, and Roy H. Campbell

Submissions from 2005

PDF

Pricing for customers with probabilistic valuations as a continuous knapsack problem, Michael Benisch, James Andrews, and Norman Sadeh

Link

Effects of Mediator Selection Strategies for Distributed Constraint Satisfaction, Michael Benisch and Norman Sadeh

Link

Examining Coordination Tradeoffs in Distributed Constraint Satisfaction Problems (DCSPs), Michael Benisch and Norman Sadeh

PDF

Examining DCSP coordination tradeoffs, Michael Benisch and Norman Sadeh

PDF

Representing Design Tradeoffs in Safety-Critical Systems, Jennifer Black and Philip Koopman

PDF

Exploring massive structured data in ARGUS, Jaime G. Carbonell, Eugene Fink, Chun Jin, and Cenk Gazen

Link

Semantic Web Technologies for Context-Aware Museum Tour Guide Applications, Shih-Chun Chou, Wen-Tai Hsieh, Fabien L. Gandon, and Norman Sadeh

Link

Semantics Aware Malware Detection, Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Song, and Randal E. Bryant

PDF

Using Objects of Measurement to Detect Spreadsheet Errors, Michael Coblenz, Andrew Ko, and Brad Myers

Link

Learning to Understand Web Site Update Requests, William W. Cohen, Einat Minkov, and Anthony Tomasic

PDF

Coordination of free/libre and open source software development, Kevin Crowston, Kangning Wei, Qing Li, U. Yeliz Eseryel, and James Howison

PDF

TCP Connections for P2P Apps: A Software Approach to Solving the NAT Problem, Jeffrey L. Eppinger

PDF

Relating network topology to the robustness of centrality measures, Terrill L. Frantz and Kathleen M. Carley

PDF

Counter-forensic privacy tools : a forensic evaluation, Matthew Geiger and Lorrie Faith. Cranor

Link

Integrating Utility into Face De-Identification, Ralph Gross, Edoardo Airoldi, Bradley Malin, and Latanya Sweeney

PDF

ARGUS: Rete + DBMS = Efficient Persistent Profile Matching on Large-Volume Data Streams, Chun Jin, Jaime G. Carbonell, and Phil Hayes

PDF

‘Symmetric Probabilistic Alignment for Example-Based Translation, Jae Dong Kim, Ralf D. Brown, Peter J. Jansen, and Jaime G. Carbonell

PDF

Challenges In Deeply Networked System Survivability, Philip Koopman, Jennifer Black, and Priya Narasimhan

PDF

Peripheral Privacy Notifications for Wireless Networks, Braden Kowitz and Lorrie Cranor

PDF

Privacy indexes : a survey of Westin's studies, Ponnurangam Kumaraguru and Lorrie Faith. Cranor

PDF

Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms, Elizabeth Latronico and Philip Koopman

PDF

Predicting Protein Folds with Structural Repeats Using a Chain Graph Model, Yan Liu, Eric P. Xing, and Jaime G. Carbonell

Link

Adding Semantics and Rigor to Association Rule Learning: the GenTree Approach, Yiheng Li and Latanya Sweeney

PDF

A Framework for Interactive and Automatic Refinement of Transfer-based Machine Translation, Ariadna Font Llitjós, Jaime G. Carbonell, and Alon Lavie

PDF

Adaptive Sampling for Multi-Robot Wide Area Prospecting, Kian Hsiang Low, Geoffrey J. Gordon, John M. Dolan, and Pradeep Khosla

Link

Forecasting Field Defect Rates Using a Combined Time-based and Metrics-based Approach: a Case Study of OpenBSD, Paul Luo Li, James Herbsleb, and Mary Shaw

Link

Finding Predictors of Field Defects for Open Source Software Systems in Commonly Available Data Sources: a Case Study of OpenBSD, Paul Luo Li, Mary Shaw, and James Herbsleb

Link

An Empirical Comparison of Field Defect Modeling Methods, Paul Luo Li, Mary Shaw, James Herbsleb, P. Santhanam, and Bonnie Ray

PDF

Towards an information theoretic framework for location-based data linkage, Bradley Malin and Edoardo Airoldi

PDF

A Network Analysis Model for Disambiguation of Names in Lists, Bradley Malin, Edoardo Airoldi, and Kathleen Carley

Link

A Secure Protocol to Distribute Unlinkable Health Data, Bradley Malin and Latanya Sweeney

PDF

Text Input to Handheld Devices for People with Physical Disabilities, Brad Myers and Jacob Wobbrock

PDF

Generating Consistent Interfaces for Appliances, Jeffrey Nichols and Brad Myers

PDF

Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems, Michael Paulitsch, Jennifer Black, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, and Philip Koopman

Link

Anticipatory Configuration of Resource-aware Applications, Vahe Poladian, João Sousa, Frank Padberg, and Mary Shaw

PDF

Efficient Mapping Through Exploitation of Spatial Dependencies, Yaron Rachlin, John M. Dolan, and Pradeep Khosla

PDF

Sensing Capacity for Discrete Sensor Network Applications, Yaron Rachlin, Rohit Negi, and Pradeep Khosla

PDF

Sensing Capacity for Markov Random Fields, Yaron Rachlin, Rohit Negi, and Pradeep Khosla

Link

A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery, Jinghai Rao and Norman Sadeh

Link

Semantic Web Framework and Meta-Control Model to Enforce Context-Sensitive Policies, Jinghai Rao and Norman Sadeh

PDF

Design Principles for Tools to Support Creative Thinking, Mitchel Resnick, Brad Myers, Kumiyo Nakakoji, Ben Shneiderman, Randy Pausch, Ted Selker, and Mike Eisenberg

Link

The impact of software engineering research on modern progamming languages, B. G. Ryder, M. L. Soffa, and M. Burnett

Link

A Value-Based Approach to Predicting System Properties from Design, Chris Scaffidi, Ashish Arora, Shawn Butler, and Mary Shaw

Link

An Approach for Categorizing End User Programmers to Guide Software Engineering Research, Chris Scaffidi, Mary Shaw, and Brad Myers

Link

Estimating the Numbers of End Users and End User Programmers, Chris Scaffidi, Mary Shaw, and Brad Myers

Link

The "55M End-User Programmers" Estimate Revisited, Chris Scaffidi, Mary Shaw, and Brad Myers

PDF

Identifying categories of end users based on the abstractions that they create, Christopher Scaffidi, Andrew Ko, Brad Myers, and Mary Shaw

PDF

Detailed comparison of America's Army game and Unit of Action experiments, Mike Schneider, Kathleen M. Carley, and Il-Chul Moon

Link

Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds, Sanjit A. Seshia and Randal E. Bryant

Link

Modeling and Verifying Circuits Using Generalized Relative Timing, Sanjit A. Seshia, Randal E. Bryant, and Kenneth S. Stevens

Link

Machines as readers: A solution to the copyright problem, Michael I. Shamos

Link

Software Engineering for the 21st Century: A basis for rethinking the curriculum, Mary Shaw

Link

Sparking Research Ideas from the Friction Between Doctrine and Reality, Mary Shaw

Link

Deciding What to Design: Closing a Gap in Software Engineering Education, Mary Shaw, James Herbsleb, Ipek Ozkaya, and David Root

Link

Software Architecture Education Session Report, Mary Shaw and Hans van Vliet

Link

Privacy-Enhanced Linking, Latanya Sweeney

Link

Privacy-Preserving Surveillance Using Selective Revelation, Latanya Sweeney

Link

Privacy-Preserving Surveillance Using Selective Revelation, Latanya Sweeney

Link

Risk Assessments of Personal Identification Technologies for Domestic Violence Homeless Shelters, Latanya Sweeney

PDF

Structural Knowledge and Success of Anti- Terrorist Activity: The Downside of Structural Equivalence, Maksim Tsvetovat and Kathleen M. Carley

PDF

Accessible Handheld And Desktop Text Entry For People With Motor Impairments, Jacob Wobbrock and Brad Myers

PDF

EdgeWrite: A New Text Entry Technique Designed for Stability, Jacob Wobbrock and Brad Myers

Submissions from 2004

Link

The Supply Chain Trading Agent Competition, Raghu Arunachalam and Norman Sadeh

Link

The Supply Chain Trading Agent Competition, Raghu Arunachalam and Norman Sadeh

PDF

Flow-based Video Synthesis and Editing, Kiran S. Bhat, Steven M. Seitz, Jessica K. Hodgins, and Pradeep Khosla

PDF

Fault Tolerance Tradeoffs in Moving from Decentralized to Centralized Embedded Systems, Jennifer Black, Daniel Kroening, and Philip Koopman

PDF

Automatic Rule Learning for Resource-Limited MT, Jaime G. Carbonell, Katharina Probst, Erik Peterson, Christian Monson, Alon Lavie, Ralf D. Brown, and Lori Levin

PDF

BioWar : a city-scale multi-agent network model of weaponized biological attacks, Kathleen M. Carley

PDF

A network optimization approach for improving organizational design, Kathleen M. Carley and Natalia Y. Kamneva

Modeling the Structure and Effectiveness of Intelligence Organizations: Dynamic Information Flow Simulation, Kathleen M. Carley, D M. Thomas, Scott L. Arouh, James B. Kraiman, and Jonathan R. Davis

PDF

Challenges in Using an Example-Based MT System for a Transnational Digital Government Project, Violetta Cavalli-Sforza, Ralf D. Brown, Jaime G. Carbonell, Peter J. Jansen, and Jae Dong Kim

PDF

Developing Language Resources for Transnational Digital Government Systems: A Case Study, Violetta Cavalli-Sforza, Jaime G. Carbonell, and Peter J. Jansen