Diomidis Spinellis General Article Library
- Gregory D. Abowd and
  Elizabeth D. Mynatt.
Charting past, present, and future research in ubiquitous computing.
ACM Transactions on Computer-Human Interaction, 7(1):29–58, March
  2000.
 
- Sisay Fissaha Adafre and
  Maarten de Rijke.
Discovering
  missing links in Wikipedia.
In Proceedings of the Workshop on Link Discovery: Issues, Approaches and
  Applications (LinkKDD-2005), 2005.
 
- Mike
  Addlesee, Rupert Curwen, Steve Hodges,
  Joe Newman, Pete Steggles, Andy
  Ward, and Andy Hopper.
Implementing a sentient computing system.
Computer, 34(8):50–56, August 2001.
 
- Phil Agre.
Networking on
  the network: A guide to professional skills for phd students.
Available online http://dlis.gseis.ucla.edu/people/pagre/network.html. Current
  January 2003, August 2002.
 
- James F. Allen.
Maintaining knowledge about temporal intervals.
Technical Report TR 86, The University of Rochester, Department of Computer
  Science, Rochester, NY 14627, January 1981.
 
- James F. Allen.
Towards a general theory of action and time.
Artificial Intelligence, (23):123–154, 1984.
 
- Steven
  Alter and Alan R. Dennis.
Selecting research topics: Personal experiences and speculations for the
  future.
Communications of the Association for Information Systems,
  8:314–329, 2002.
 
- Steven Alter.
Customer
  service, responsibility, and systems in international e-commerce: Should a
  major airline reissue a stolen ticket?.
Communications of AIS, 12(10), 2003.
 
- Einat
  Amitay and Andrei Broder.
Introduction to special issue on query log analysis: Technology and ethics.
ACM Transactions on the Web, 2(4):1–2, 2008.
(doi:10.1145/1409220.1409221)
 
- Ross
  Anderson and Roger Needham.
Programming Satan's computer.
In Jan van Leeuwen, editor, Computer Science Today: Recent
  Trends and Developments, pages 426–440. Springer Verlag, Berlin,
  1995.
Lecture Notes in Computer Science 1000.
 
- Susan
  Angebranndt, Philip Karlton, Raymond Drewry,
  and Todd Newman.
Writing tailorable software: The X11 sample server.
Software: Practice & Experience, 20(S2):S2/69–S2/81, October
  1991.
 
- Debra Ansen.
Document architecture standards evolution.
AT&T Technical Journal, 68(4):33–44, July/August 1989.
 
- Giuliano
  Antoniol, Roberto Fiutem, G. Lutteri,
  Paolo Tonella, S. Zanfei, and
  Ettore Merlo.
Program understanding
  and maintenance with the CANTO environment.
In ICSM '97: Proceedings of the International Conference on Software
  Maintenance, page 72, Washington, DC, USA, 1997. IEEE Computer
  Society.
(doi:ICSM.1997.624233)
 
- G. Antoniol, M. Di Penta,
  G. Masone, and U. Villano.
XOgastan:
  XML-oriented gcc AST analysis and transformations.
In Third IEEE International Workshop on Source Code Analysis and
  Manipulation (SCAM'03), page 173, Los Alamitos, CA, USA, 2003. IEEE
  Computer Society.
(doi:10.1109/SCAM.2003.1238043)
 
- Steven Armbrust and Ted
  Forgeron.
.OBJ lessons.
PC Tech Journal, pages 63–81, October 1985.
 
- Deborah J.
  Armstrong.
The quarks of object-oriented development.
Communications of the ACM, 49(2):123–128, 2006.
(doi:10.1145/1113034.1113040)
 
- Patrick
  Arnold.
The user reference manual for the Axis system.
Technical Report HPL–ISC—TR–88–034, September 1988.
 
- Daniel Ashbrook and Thad
  Starner.
Learning significant locations and predicting user movement with GPS.
In Sixth International Symposium on Wearable Computers, pages
  101–108. IEEE Computer Society, October 2002.
 
- Helen Ashman.
Electronic document addressing: Dealing with change.
ACM Computing Surveys, 32(3):201–212, September 2000.
 
- Darren C. Atkinson and
  William G. Griswold.
The
  design of whole-program analysis tools.
In 18th International Conference on Software Engineering, ICSE
  '96, pages 16–27, New York, 1996. ACM, ACM Press.
 
- Paul Attewell.
Technology diffusion and
  organizational learning: The case of business computing.
Organization Science, 3(1):1–19, February 1992.
 
- Lerina
  Aversano, Massimiliano Di Penta, and Ira D.
  Baxter.
Handling
  preprocessor-conditioned declarations.
In SCAM'02: Second IEEE International Workshop on Source Code Analysis
  and Manipulation, pages 83–93, Los Alamitos, CA, USA, 2002. IEEE
  Computer Society.
(doi:10.1109/SCAM.2002.1134108)
 
- John Aycock.
A brief history of just-in-time.
ACM Computing Surveys, 35(2):97–113, 2003.
(doi:10.1145/857076.857077)
 
- Christopher Baber and Konrad
  Baumann.
Embedded human computer interaction.
Applied Ergonomics, 33:273–287, 2002.
 
- Greg J.
  Badros and David Notkin.
A framework for preprocessor-aware C source code analyses.
Software: Practice & Experience, 30(8):907–924, July 2000.
 
- Bouchaib
  Bahli and Dany Di Tullio.
Web
  engineering: An assessment of empirical research.
Communications of AIS, 12(14), 2003.
 
- Thomas
  Ball and Sriram K. Rajamani.
The SLAM project:
  debugging system software via static analysis.
In POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on
  Principles of Programming Languages, pages 1–3, New York, 2002. ACM
  Press.
(doi:10.1145/503272.503274)
 
- Philip Ball.
Achievement index climbs the ranks.
Nature, 448:737, August 2007.
 
- Albert-László Barabási and
  Réka Albert.
Emergence of scaling in random networks.
Science, 286:509–512, October 1999.
 
- Albert-László Barabási,
  Réka Albert, and Hawoong Jeong.
Scale-free
  characteristics of random networks: the topology of the world-wide web.
Physica, A(281):69–77, 2000.
 
- Paul
  Barham, Boris Dragovic, Keir Fraser,
  Steven Hand, Tim Harris, Alex
  Ho, Rolf Neugebauer, Ian Pratt, and
  Andrew Warfield.
Xen and the art of virtualization.
In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating
  systems principles, pages 164–177, New York, NY, USA, 2003. ACM
  Press.
(doi:10.1145/945445.945462)
 
- Jeff
  Barr and Luis Felipe Cabrera.
AI gets a brain.
Queue, 4(4):24–29, 2006.
(doi:10.1145/1142055.1142067)
 
- L. Barroca, J. Hall, and
  P. Hall, editors.
Software Architectures: Advances and Applications.
Springer Verlag, Berlin, 1999.
 
- Luiz André Barroso,
  Jeffrey Dean, and Urs Hlzle.
Web search for a
  planet: The Google cluster architecture.
IEEE Micro, pages 22–28, March/April 2003.
 
- Iain Bate,
  Philippa Conmy, Tim Kelly, and
  John McDermid.
Use of modern processors in safery critical applications.
The Computer Journal, 44(6):531–543, 2001.
 
- Thomas Baudel and Michel
  Beaudouin-Lafon.
Charade: Remote control of objects using free-hand gestures.
Communications of the ACM, 36(7):28–35, July 1993.
 
- Christian
  Bauer, Alexander Frink, and Richard Kreckel.
Introduction to the GiNaC framework for symbolic computation within the C++
  programming language.
Journal of Symbolic Computation, 33:1–12, 2002.
 
- David S. Bauser and Michael E.
  Koblentz.
NIDX — a real-time intrusion detection expert system.
In USENIX Conference Proceedings, pages 261–273, Berkeley, CA,
  Summer 1988. USENIX Association.
 
- Ira D.
  Baxter and Michael Mehlich.
Preprocessor
  conditional removal by simple partial evaluation.
In WCRE '01: Proceedings of the Eighth Working Conference on Reverse
  Engineering, pages 281–292, Washington, DC, USA, 2001. IEEE Computer
  Society.
(doi:10.1109/WCRE.2001.957833)
 
- Alberto Bayo-Moriones and
  Fernando Lera-López.
A
  firm-level analysis of determinants of ICT adoption in Spain.
Technovation, 27(6–7):352 – 366, 2007.
 
- Brian W. Beach.
Connecting software components with declarative glue.
In 14th International Conference on Software Engineering, pages
  120–136, New York, May 1992. ACM Press.
 
- Jon
  Beck and David Eichmann.
Program
  and interface slicing for reverse engineering.
In 15th International Conference on Software Engineering, ICSE
  '93, pages 509–518, New York, 1993. ACM, ACM Press.
 
- Kent Beck
  and Erich Gamma.
Test infected: Programmers love writing tests.
Java Report, 3(7):37–50, July 1998.
 
- Gordon
  Bell and Jim Gemmell.
A call for the home media network.
Communications of the ACM, 45(7):71–75, July 2002.
(doi:10.1145/514236.514237)
 
- Gordon
  Bell and Jim Gray.
Digital immortality.
Communications of the ACM, 44(3):28–30, March 2001.
(doi:10.1145/365181.365182)
 
- J. Bell,
  F. Bellegarde, J. Hook, R. B.
  Kieburtz, A. Kotov, J. Lewis,
  L. McKinney, D. P. Oliva,
  T. Sheard, L. Tong, L. Walton,
  and T. Zhou.
Software
  design for reliability and reuse: a proof-of-concept demonstration.
In Conference on TRI-Ada '94, pages 396–404, New York, 1994. ACM,
  ACM Press.
 
- Gordon Bell.
A personal digital store.
Communications of the ACM, 44(1):86–91, December 2001.
 
- Jon Louis
  Bentley.
More
  Programming Pearls: Confessions of a Coder, chapter Little
  Languages, pages 83–100.
Addison-Wesley, 1988.
 
- Jon Louis
  Bentley.
Little languages for pictures in AWK.
AT&T Technical Journal, 68(4):21–32, July/August 1989.
 
- Emery D.
  Berger, Benjamin G. Zorn, and Kathryn S.
  McKinley.
Reconsidering custom
  memory allocation.
In Mamdouh Ibrahim and Satoshi Matsuoka, editors,
  OOPSLA '02: Proceedings of the 17th ACM SIGPLAN Conference on
  Object-Oriented Programming, Systems, Languages, and Applications,
  pages 1–12, New York, November 2002. ACM Press.
(doi:10.1145/582419.582421)
 
- Lucy M. Berlin and Robin
  Jeffries.
Consultants
  and apprentices: observations about learning and collaborative problem
  solving.
In Conference proceedings on Computer-supported cooperative work,
  pages 130–137. ACM, November 1992.
 
- Tim
  Berners-Lee, Robert Cailliau, Ari Luotonen,
  Henrik Frystyk Nielsen, and Arthur Secret.
The World-Wide-Web.
Communications of the ACM, 37(8):76–82, August 1994.
 
- T. Berners-Lee.
Cool URIs don't change.
Online: http://www.w3.org/Provider/Style/URI, Current June 2002, 1998.
 
- R. E.
  Berry and B. A. E. Meekings.
A style analysis of C programs.
Communications of the ACM, 28(1):80–88, January 1985.
 
- Sanjay
  Bhansali and Tim J. Hoar.
Automated
  software synthesis: An application in mechanical cad.
IEEE Transactions on Software Engineering, 24(10):848–862,
  October 1998.
 
- Gerald
  Bieber and Martin Giersich.
Personal mobile navigation systems—design considerations and experiences.
Computers & Graphics, 25(4):563–570, August 2001.
 
- Markus
  Biehl, Henry Kim, and Michael Wade.
Relationships among the academic business disciplines: a multi-method citation
  analysis.
Omega: The International Journal of Management Science,
  34:359–371, 2006.
 
- Jams M.
  Bieman and Linda M. Ott.
Measuring functional cohesion.
IEEE Transactions on Software Engineering, 20(8):644–658, August
  1994.
 
- Joel Birnbaum.
Pervasive information systems.
Communications of the ACM, 40(2):40–41, February 1997.
 
- Matt
  Bishop and Michael Dilger.
Checking for race conditions in file accesses.
Computing Systems, 9(2):131–152, Spring 1996.
 
- Gordon Blair and Michael
  Papathomas.
The
  case for reflective middleware.
In 3rd CaberNet Plenary Workshop, April 1997.
 
- Sidney
  Bloch and Garry Walter.
The impact factor: time for change.
Australian and New Zealand Journal of Psychiatry, 35(5):563–568,
  2001.
(doi:10.1046/j.1440-1614.2001.00918.x)
 
- Hans-Juergen
  Boehm.
Threads cannot be
  implemented as a library.
In Vivek Sarkar and Mary Hall, editors,
  PLDI '05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming
  Language Design and Implementation, pages 261–268, New York, June
  2005. ACM Press.
(doi:10.1145/1065010.1065042)
 
- Narasimha
  Bolloju.
Improving the quality of business object models using collaboration patterns.
Communications of the ACM, 47(7):81–86, July 2004.
 
- A. Bosselaers, R. Govaerts,
  and J. Vandewalle.
Fast
  hashing on the Pentium.
In N. Koblitz, editor, Advances in Cryptology — CRYPTO
  '96 16th Annual International Cryptology Conference, pages 298–312,
  Berlin, August 1996. Springer-Verlag.
Lecture Notes in Computer Science 1109.
 
- Roger
  Box and Michael Whitelaw.
Experiences when
  migrating from structured analysis to object-oriented modelling.
In Proceedings of the Australasian conference on Computing
  education, pages 12–18. ACM Press, 2000.
(doi:10.1145/359369.359372)
 
- Daren C.
  Brabham.
Crowdsourcing as a model for problem
  solving: An introduction and cases.
Convergence, 14(1):75–90, February 2008.
(doi:10.1177/1354856507084420)
 
- Gilad
  Bracha, Martin Odersky, David Stoutamire, and
  Philip Wadler.
Making
  the future safe for the past: Adding genericity to the Java programming
  language.
ACM SIGPLAN Notices, 33(10):183–200, October 1998.
Proceedings of the 1998 ACM SIGPLAN Conference on Object-Oriented Programming
  Systems, Languages and Applications (OOPSLA '98).
 
- Olin Bray
  and Michael M. Hess.
Reengineering a configuration-management system.
IEEE Software, 12(1):55–63, January 1995.
 
- Lee
  Breslau, Deborah Estrin, Kevin Fall,
  Sally Floyd, John Heidemann,
  Ahmed Helmy, Polly Huang, Steven
  McCanne, Kannan Varadhan, Ya Xu, and
  Haobo Yu.
Advances in network simulation.
IEEE Computer, 33(5):59–67, May 2000.
 
- Brian E. Brewington and George
  Cybenko.
Keeping up
  with the changing web.
IEEE Computer, 33(5):52–58, May 2000.
 
- Frederick P. Brooks, Jr.
No silver bullet: Essence and accidents of software engineering.
IEEE Computer, 20(4):10–19, April 1987.
 
- B. A. T.
  Brown and M. Perry.
Why don't telephones have off switches? Understanding the use of everyday
  technologies.
Interacting with Computers, 12:623–634, 2000.
 
- M. Brown and R. Sedgewick.
Techniques for algorithm animation.
IEEE Software, 2(1):28–39, January 1985.
 
- Alan W.
  Brown and Kurt C. Wallnau.
The current
  state of CBSE.
IEEE Software, 15(5):37–46, September/October 1998.
 
- Susan L.
  Bryant, Andrea Forte, and Amy Bruckman.
Becoming
  Wikipedian: transformation of participation in a collaborative online
  encyclopedia.
In GROUP '05: Proceedings of the 2005 international ACM SIGGROUP
  conference on Supporting group work, pages 1–10, New York, NY, USA,
  2005. ACM Press.
(doi:10.1145/1099203.1099205)
 
- Erik
  Brynjolfsson, Michael D. Smith, and
  Yu (Jeffrey) Hu.
Consumer surplus in the digital economy: Estimating the value of increased
  product variety at online booksellers.
Management Science, 49(11):1580–1596, November 2003.
 
- Lilian
  Burdy, Yoonsik Cheon, David R. Cok,
  Michael D. Ernst, Joseph R. Kiniry,
  Gary T. Leavens, K. Rustan M. Leino, and
  Erik Poll.
An overview of JML tools and applications.
International Journal on Software Tools for Technology Transfer,
  7(3):212–232, June 2005.
(doi:10.1007/s10009-004-0167-4)
 
- Neill
  Campbell, Henk L. Muller, and Cliff Randall.
Combining positional information with visual media.
In Third International Symposium on Wearable Computers (ISWC '99),
  pages 203–206. IEEE Computer Society, October 1999.
 
- George
  Candea, Aaron B. Brown, Armando Fox, and
  David A. Patterson.
Recovery-oriented computing: Building multitier dependability.
Computer, 37(11):60–67, November 2004.
 
- S. N. Cant,
  D. R. Jeffery, and B. L. Henderson-Sellers.
A conceptual model of cognitive complexity of elements of the programming
  process.
Information and Software Technology, 37(7):351–362, June
  1995.
 
- Bryan M.
  Cantrill, Michael W. Shapiro, and Adam H.
  Leventha.
Dynamic instrumentation of production systems.
In Andrea Arpaci-Dusseau and Remzi
  Arpaci-Dusseau, editors, Proceedings of the USENIX 2004 Annual
  Technical Conference, pages 15–28, Berkeley, CA, June 2004. USENIX
  Association.
 
- A. Capocci, V. Servedio,
  F. Colaiori, L. Buriol,
  D. Donato, S. Leonardi, , and
  G. Caldarelli.
Preferential attachment in the growth of social networks: The case of
  wikipedia.
Physical Review E, 74(1):036116 6 pages, 2006.
(doi:10.1103/PhysRevE.74.036116)
 
- Gene D.
  Carlow.
Architecture of the space shuttle primary avionics software system.
Communications of the ACM, 27(9):926–936, September 1984.
 
- Erran Carmel.
Thirteen assertions for globally dispersed software development research.
In Proceedings of the 30th Hawaii Int. Conf. on System Sciences
  (HICSS-30) — Volume 3: Information System Track — Organizational Systems
  and Technology, page 445, 1997.
(doi:10.1109/HICSS.1997.661670)
 
- Nicholas G. Carr.
IT doesn't matter.
Harvard Business Review, pages 41–49, May 2003.
 
- William E. Cartwright and
  Gary J. Hunter.
Towards a methodology for the evaluation of multimedia geographical information
  products.
GeoInformatica, 5(3):291–315, September 2001.
 
- Jeffrey C.
  Carver, Maria Letizia Jaccheri, Sandro
  Morasca, and Forrest Shull.
A checklist for integrating student empirical studies with research and
  teaching goals.
Empirical Software Engineering, 15(1):35–59, 2010.
(doi:10.1007/s10664-009-9109-9)
 
- Huseyin
  Cavusoglu, Birendra Mishra, and Srinivasan
  Raghunathan.
Model for evaluating security investments.
Communications of the ACM, 47(7):87–92, July 2004.
 
- Sagar
  Chaki, Edmund Clarke, Alex Groce,
  Somesh Jha, and Helmut Veith.
Modular verification
  of software components in C.
In ICSE '03: Proceedings of the 25th International Conference on Software
  Engineering, pages 385–395, Washington, DC, 2003. IEEE Computer
  Society.
(doi:10.1109/ICSE.2003.1201217)
 
- Anawat Chankhunthod, Peter B.
  Danzig, Chuck Neerdaels, Michael F. Schwartz,
  and Kurt J. Worrell.
A hierarchical internet object cache.
In USENIX Technical Conference Proceedings, Berkeley, CA, January
  1996. USENIX Association.
 
- François
  Charette.
High tech from Ancient Greece.
Nature, 444(7119):551–552, November 2006.
 
- Patrick Y. K.
  Chau and Kar Yan Tam.
Factors affecting the
  adoption of open systems: An exploratory study.
MIS Quarterly, 21(1):1–24, March 1997.
 
- Yih-Farn
  Chen, Michael Y. Nishimoto, and C. V.
  Ramamoorthy.
The C information abstraction system.
IEEE Transactions on Software Engineering, 16(3):325–334, 1990.
(doi:10.1109/32.48940)
 
- Su-Shing Chen.
The paradox of digital preservation.
Computer, 34(3):24–28, March 2001.
 
- Nicos
  Christodoulakis.
Greek crisis in perspective: Origins, effects and ways-out.
In Steven N. Durlauf and Lawrence E. Blume,
  editors, The New Palgrave Dictionary of Economics. Palgrave
  Macmillan, Basingstoke, 2012.
 
- Keith L. Clark.
Parlog and its applications.
IEEE Transactions on Software Engineering, 14(12):1792–1804,
  December 1988.
 
- Felix S. Cohen.
Transcendental nonsense and the functional approach.
Columbia Law Review, XXXV(6), June 1935.
 
- Fred Cohen.
Implications of computer viruses and current methods of defense.
In Peter J. Denning, editor, Computers Under Attack:
  Intruders, Worms, and Viruses, chapter 22, pages 381–406.
  Addison-Wesley, 1990.
 
- David R.
  Cok and Joseph R. Kiniry.
ESC/Java2: Uniting
  ESC/Java and JML — progress and issues in building and using
  ESC/Java2, including a case study involving the use of the tool to verify
  portions of an internet voting tally system.
In Gilles Barthe, Lilian Burdy,
  Marieke Huisman, and others, editors,
  Construction and Analysis of Safe, Secure, and Interoperable Smart
  Devices: International Workshop, CASSIS 2004, pages 108–129,
  Berlin, March 2005. Springer-Verlag.
Lecture Notes in Computer Science 3362.
(doi:10.1007/b105030)
 
- Derek
  Coleman, Chris Colin, Robin Gallimore,
  Patrick Arnold, and Tony Rush.
An introduction to the Axis specification language.
Technical Report HPL–ISC—TR–88–031, September 1988.
 
- Christian Collberg and Stephen
  Kobourov.
Self-plagiarism in computer science.
Communications of the ACM, 48(4):88–94, 2005.
(doi:10.1145/1053291.1053293)
 
- Daniel
  Cooke, Joseph Urban, and Scott Hamilton.
Unix and beyond: An interview with Ken Thompson.
IEEE Computer, 32(5):58–64, May 1999.
 
- James O.
  Coplien.
Multi-Paradigm
  Design.
PhD thesis, Vrije Universiteit Brussel, Urbana-Champaign, IL, 2000.
 
- James R.
  Cordy, Charles D. Halpern-Hamu, and Eric
  Promislow.
TXL: A rapid prototyping system for programming language dialects.
Computer Languages, 16(1):97–107, January 1991.
 
- Michael F.
  Cowlishaw.
Decimal
  floating-point: Algorism for computers.
In Proceedings of the 16th IEEE Symposium on Computer Arithmetic,
  pages 104–111, Washington, DC, June 2003. IEEE Computer Society.
 
- Russ Cox,
  Tom Bergan, Austin T. Clements,
  Frans Kaashoek, and Eddie Kohler.
Xoc, an
  extension-oriented compiler for systems programming.
In ASPLOS XIII: Proceedings of the 13th international conference on
  Architectural support for programming languages and operating systems,
  pages 244–254, New York, NY, USA, 2008. ACM.
(doi:10.1145/1346281.1346312)
 
- Michael L.
  Creech.
Author-oriented link management.
In Fifth International World Wide Web Conference, May 1996.
 
- Roger F. Crew.
ASTLOG: A language
  for examining abstract syntax trees.
In Ramming [Ramming, 1997], pages 229–242.
 
- Christoph Csallner and Yannis
  Smaragdakis.
Check 'n' crash:
  Combining static checking and testing.
In ICSE '05: Proceedings of the 27th International Conference on Software
  Engineering, pages 422–431, New York, NY, 2005. ACM Press.
(doi:10.1145/1062455.1062533)
 
- Mark
  Cummings and Steve Heath.
Mode switching and software download for software defined radio: The SDR
  forum approach.
IEEE Communications, 37(8):104–106, August 1999.
 
- Alessandra Devito Da Cunha and
  David Greathead.
Does personality matter?: an analysis of code-review ability.
Communications of the ACM, 50(5):109–112, 2007.
(doi:10.1145/1230819.1241672)
 
- Michael A.
  Cusumano.
The puzzle of Japanese software.
Communications of the ACM, 48(7):25–27, 2005.
(doi:10.1145/1070838.1070858)
 
- Mônica Ferreira da Silva and
  Cláudia Maria Lima Werner.
Packaging reusable components using patterns and hypermedia.
In Proceedings of The Fourth International Conference on Software Reuse
  (ICSR '96). IEEE, 1996.
 
- S. R.
  Dalal, J. R. Horgan, and J. R. Kettenring.
Reliable
  software and communication: software quality, reliability, and safety.
In 14th International Conference on Software Engineering, ICSE
  '93, pages 425–435, New York, 1993. ACM, ACM Press.
 
- Fariborz
  Damanpour.
Organizational size and innovation.
Organization Studies, 13(3):375–402, 1992.
(doi:10.1177/017084069201300304)
 
- E. Damiani, M. G.Fugini, and
  C. Bellettini.
A
  hierarchy-aware approach to faceted classification of objected-oriented
  components.
ACM Transactions on Software Engineering and Methodology,
  8(3):215–262, July 1999.
 
- Shaul Dar,
  Gil Hecht, and Eden Shochat.
dbSwitch towards a
  database utility.
In SIGMOD '04: Proceedings of the 2004 ACM SIGMOD International
  Conference on Management of Data, pages 892–896, New York, 2004. ACM
  Press.
(doi:10.1145/1007568.1007679)
 
- Thomas H.
  Davenport.
Putting the enterprise into the enterprise system.
Harvard Business Review, July-August 1998.
 
- Nigel
  Davies and Hans-Werner Gellersen.
Beyond prototypes: Challenges in deploying ubiquitous systems.
IEEE Pervasive Computing, 1(1):26–35, January-March 2002.
 
- Gordon B. Davis.
Advising
  and supervising doctoral students: Lessons I have learned.
MISRC Working Paper 04-12, University of Minnesota. MIS Research Center, May
  2004.
Forthcoming as chapter in PhD Supervisors and Student Handbook for Information
  Systems Research, Butterworth-Heinnemann, 2004.
 
- Derek
  de Solla Price.
Gears from the Greeks: The Antikythera Mechanism — a calendar computer
  from ca. 80 B.C.
Transactions of the American Philosophical Society — New Series,
  64(7), November 1974.
 
- Kris
  De Volder.
JQuery: A generic code browser with a declarative configuration language.
In Practical Aspects of Declarative Languages, pages 88–102.
  Springer Verlag, 2006.
Lecture Notes in Computer Science 3819.
(doi:10.1007/11603023_7)
 
- Paulo
  Debenest, Edwardo F. Fukushima, Yuki Tojo, and
  Shigeo Hirose.
A new approach to humanitarian demining. part 1: Mobile platform for operation
  on unstructured terrain.
Autonomous Robots, 18(3):303–321, 2005.
(doi:10.1007/s10514-005-6842-9)
 
- Jason
  Dedrick and Joel West.
Why
  firms adopt open source platforms: A grounded theory of innovation and
  standards adoption.
In MISQ Special Issue Workshop on Standard Making: A Critical Research
  Frontier for Information Systems, pages 236–257, December 2003.
 
- D. E.
  Denning and P. G. Neumann.
Requirements and model for IDES.
Technical Report SRI Project 6169, SRI International, 33 Ravenswood Avenue,
  Menlo Park, CA 94025-3493, August 1985.
 
- Peter
  Denning, Jim Horning, David Parnas, and
  Lauren Weinstein.
Wikipedia risks.
Communications of the ACM, 48(12):152–152, 2005.
(doi:10.1145/1101779.1101804)
 
- Peter J.
  Denning.
Virtual memory.
ACM Computing Surveys, 2(3):153–189, September 1970.
 
- Peter J.
  Denning.
The ACM digital library goes live.
Communications of the ACM, 40(7):28–29, July 1997.
 
- Peter J.
  Denning.
Network laws.
Communications of the ACM, 47(11):15–20, November 2004.
 
- A.R.
  Dennis and J.S. Valacich.
Conducting
  research in information systems.
Communications of AIS, 7(5), 2001.
 
- David
  Detlefs, Al Dosser, and Benjamin G. Zorn.
Memory allocation costs in large C and C++ programs.
Software: Practice & Experience, 24(6):527–542, June 1994.
 
- Melvin Diaz.
Integrating
  GPS receivers into consumer mobile electronics.
Multimedia, 6(4):88–90, October/December 1999.
 
- Katy
  Dickinson.
Software process framework at Sun.
StandardView, 4(3):161–165, 1996.
(doi:10.1145/240819.240830)
 
- Edsger W.
  Dijkstra.
How do we tell
  truths that might hurt?.
In Selected Writings on Computing: A Personal Perspective, pages
  129–131. Springer-Verlag, Berlin, 1982.
EWD498, 18th June 1975.
 
- Petar
  Djekic and Claudia Loebbecke.
Preventing application software piracy: An empirical investigation of technical
  copy protections.
J. Strateg. Inf. Syst., 16(2):173–186, 2007.
(doi:10.1016/j.jsis.2007.05.005)
 
- H. Dobbertin, A. Bosselaers,
  and B. Preneel.
RIPEMD-160:
  A strengthened version of RIPEMD.
In Dieter Gollmann, editor, Fast Software Encryption:
  Third International Workshop, pages 71–82. Springer-Verlag, Berlin,
  February 1996.
Lecture Notes in Computer Science 1039.
 
- A. Dolenc, A. Lemmke,
  D. Keppel, and G. V. Reilly.
Notes on writing portable programs in C.
Available by anonymous ftp from sauna.hut.fi:pub/CompSciLab/doc, November
  1990.
 
- Jack J.
  Dongarra.
Performance of various
  computers using standard linear equations software, (Linpack benchmark
  report).
Computer Science Technical Report CS-89-85, University of Tennessee, Knoxville,
  TN, March 2006.
 
- Rohan T.
  Douglas.
Error message management.
Dr. Dobb's Journal, 15(1):48–51, January 1990.
 
- Fred Douglas.
The compression cache: Using on-line compression to extend physical memory.
In USENIX Conference Proceedings, pages 519–529, Berkeley, CA,
  Winter 1993. USENIX Association.
 
- S. Drossopoulou,
  S. Eisenbach, B. Jacobs, G. T.
  Leavens, P. Müller, and
  A. Poetzsch-Heffter, editors.
Formal Techniques for Java Programs. Technical Report 269,
  Fernuniversität Hagen, 2000.
Available from
   verb +www.informatik.fernuni-hagen.de/pi5/publications.html+.
 
- S. Drossopoulou, F. Damiani,
  M. Dezani-Ciancaglini, and P. Giannini.
More dynamic object re-classification: FickleII.
Transactions On Programming Languages and Systems, 24(2):153–191,
  2002.
 
- Mireille Ducassé and
  Anna-Maria Emde.
Opium: A debugging environment for Prolog development and debugging
  research.
ACM Software Engineering Notes (SIGSOFT), 16(1):54–59,
  January 1991.
Demonstration presented at the Fourth Symposium on Software Development
  Environments.
 
- Peter Duchessi and InduShobha
  Chengalur-Smith.
Client/server benefits, problems, best practices.
Communications of the ACM, 41(5):87–94, May 1998.
 
- Tom Duff.
Rc — a shell for plan 9 and UNIX systems.
In Proceedings of the Summer 1990 UKUUG Conference, pages
  21–33. UKUUG, July 1990.
 
- Elizabeth W.
  Dunn, Lara B. Aknin, and Michael I. Norton.
Spending money on others promotes happiness.
Science, 319(1687–1688), March 2008.
 
- Amitava
  Dutta-Roy.
Networks for homes.
IEEE Spectrum, 36(12):26–33, December 1999.
 
- T. Dyba,
  E. Arisholm, D.I.K. Sjoberg, J.E.
  Hannay, and F. Shull.
Are two heads better than one? on the effectiveness of pair programming.
Software, IEEE, 24(6):12–15, Nov.-Dec. 2007.
(doi:10.1109/MS.2007.158)
 
- S.T.
  Eckmann, G. Vigna, and R. Kemmerer.
STATL: An attack language for state-based intrusion detection.
In Proceedings of the ACM Workshop on Intrusion Detection. ACM,
  November 2000.
 
- Nicholas Economides and
  Evangelos Katsamakas.
Two-sided competition of proprietary vs. open source technology platforms and
  the implications for the software industry.
Management Science, 52(7):1057–1071, 2006.
(doi:10.1287/mnsc.1060.0549)
 
- Grant Larsen
  (editor).
Component-based enterprise frameworks.
Communications of the ACM, 43(10):24–66, October 2000.
 
- P. D.
  Edwards and R. S. Rivett.
Towards an automative `safer subset' of C.
In Peter Daniel, editor, 16th International Conference on
  Computer Safety, Reliability and Security: SAFECOMP '97, pages
  185–195, Berlin, September 1997. European Workshop on Industrial Computer
  Systems: TC-7, Springer Verlag.
 
- Stephen G.
  Eick and Paul J. Lucas.
Displaying trace files.
Software: Practice & Experience, 26(4):399–409, April 1996.
 
- Carl Ellison.
Improvements on
  conventional PKI wisdom.
In Sean Smith, editor, 1st Annual PKI Research
  Workshop, pages 165–175. NIST, April 2002.
 
- Albert Endres.
An analysis of errors and their causes in system programs.
SIGPLAN Notices, 10(6):327–336, April 1975.
Proceedings of the International Conference on Reliable Software.
(doi:10.1145/390016.808455)
 
- Dawson R.
  Engler and Wilson C. Hsieh.
DERIVE: A tool that automatically reverse-engineers instruction encodings.
In Proceedings of the ACM SIGPLAN Workshop on Dynamic and Adaptive
  Compilation and Optimization (Dynamo '00), pages 12–22, New York,
  July 2000. ACM Press.
ACM SIGPLAN Notices 35(7).
 
- Hyeonsang Eom and Jeffrey K.
  Hollingsworth.
A tool to help tune where computation is performed.
IEEE Transactions on Software Engineering, 27(7):618–629, July
  2001.
 
- Thomas
  Erickson.
Some prolems with the notion of context-aware computing.
Communications of the ACM, 45(2):102–104, February 2002.
 
- Michael D.
  Ernst, Greg J. Badros, and David Notkin.
An empirical
  analysis of C preprocessor use.
IEEE Transactions on Software Engineering, 28(12):1146–1170,
  December 2002.
 
- Philip
  Evans and Bob Wolf.
Collaboration rules.
Harvard Business Review, 83(7):96–104, July/August 2005.
 
- Rickard E.
  Faith, Lars S. Nyland, and Jan F. Prins.
KHEPERA: A system
  for rapid implementation of domain specific languages.
In Ramming [Ramming, 1997], pages 243–255.
 
- Jean-Marie Favre.
Preprocessors from an abstract point of view.
In Proceedings of the International Conference on Software Maintenance
  ICSM '96. IEEE Computer Society, 1996.
 
- Norman Fenton.
Software measurement: A necessary scientific basis.
IEEE Transactions on Software Engineering, 20(3):199–206, March
  1994.
 
- Rudolf
  Ferenc, István Siket, and Tibor
  Gyimóthy.
Extracting facts from
  open source software.
In ICSM '04: Proceedings of the 20th IEEE International Conference on
  Software Maintenance (ICSM'04), pages 60–69, Washington, DC,
  September 2004. IEEE Computer Society.
 
- Robert G.
  Fichman.
The diffusion and
  assimilation of information technology innovations.
In Robert Zmud, editor, Framing the Domains of IT
  Management: Projecting the Future ... Through the Past. Pinnaflex
  Educational Resources, Cincinnati, OH, 2000.
 
- R. Fielding.
Maintaining
  distributed hypertext infostructures: Welcome to MOMSpider's web.
In First International Conference on the World Wide Web, May
  1994.
 
- R. Flandrena.
Alef programming user manual, September 1994.
 
- David D. Van
  Fleet, Abagail McWilliams, and Donald S.
  Siegel.
A theoretical and empirical analysis of journal rankings: The case of formal
  lists.
Australian and New Zealand Journal of Psychiatry, 26(5):839–861,
  2000.
 
- The League for Programming Freedom.
Against user interface copyright, February 1991.
 
- Stephanie
  Forrest.
Genetic algorithms.
ACM Computing Surveys, 28(1):77–83, March 1996.
 
- Justin E. Forrester and
  Barton P. Miller.
An
  empirical study of the robustness of Windows NT applications using random
  testing.
In WSS'00: Proceedings of the 4th conference on USENIX Windows Systems
  Symposium, pages 59–68, Berkeley, CA, USA, 2000. USENIX
  Association.
 
- Forrester.
Open source paves the way for the next generation of enterprise IT, November
  2008.
 
- Armando Fox,
  Brad Johanson, Pat Nanrahan, and
  Terry Winograd.
Integrating information appliances in an interactive workspace.
Computers Graphics and Applications, 20(3):54–65, May/June
  2000.
 
- Piero
  Fraternali.
Tools and approaches for developing data-intensive web applications: A survey.
ACM Computing Surveys, 31(9):227–263, September 1999.
 
- T. Freeth, Y. Bitsakis,
  X. Moussas, J. H. Seiradakis,
  A. Tselikas, H. Mangou,
  M. Zafeiropoulou, R. Hadland,
  D. Bate, A. Ramsey, M. Allen,
  A. Crawley, P. Hockley,
  T. Malzbender, D. Gelb,
  W. Ambrisco, and M. G. Edmunds.
Decoding the ancient Greek astronomical calculator known as the Antikythera
  Mechanism.
Nature, 444(7119):587–591, November 2006.
(doi:10.1038/nature05357)
 
- Tony
  Freeth, Alexander Jones, John M. Steele, and
  Yanis Bitsakis.
Calendars with Olympiad display and eclipse prediction on the Antikythera
  Mechanism.
Nature, 454:614–617, July 2008.
(doi:10.1038/nature07130)
 
- XML schema part 0: Primer second
  edition.
Available online http://www.w3.org/TR/xmlschema-0/, 2004.
 
- M. Gaelli,
  O. Nierstrasz, and S. Stinckwich.
Idioms for composing games with EToys.
In Creating, Connecting and Collaborating through Computing, 2006. C5
  '06. The Fourth International Conference on, pages 222–231, 2006.
(doi:10.1109/C5.2006.20)
 
- John M. Gallaugher and Yu-Ming
  Wang.
Understanding network effects in
  software markets: Evidence from web server pricing.
MIS Quarterly, 26(4):303–327, 2002.
 
- Lee Garber.
Will 3G really be the next big wireless technology.
Computer, 35(1):26–32, January 2002.
 
- Phil Garcia.
Multithreaded architectures and the sort benchmark.
In DAMON '05: Proceedings of the 1st International Workshop on Data
  Management on New Hardware, page 1, New York, NY, USA, 2005. ACM
  Press.
(doi:10.1145/1114252.1114254)
 
- R. Kelly Garrett and J. N.
  Danziger.
On cyberslacking: Workplace status and personal internet use at work.
Cyber Psychology & Behavior, 11(3):287–292, 2008.
(doi:10.1089/cpb.2007.0146)
 
- Alejandra Garrido and Ralph
  Johnson.
Challenges of
  refactoring C programs.
In IWPSE '02: Proceedings of the International Workshop on Principles of
  Software Evolution, pages 6–14, New York, NY, USA, 2002. ACM.
(doi:10.1145/512035.512039)
 
- Alejandra Garrido and Ralph
  Johnson.
Analyzing multiple
  configurations of a C program.
In ICSM '05: Proceedings of the 21st IEEE International Conference on
  Software Maintenance, pages 379–388, Washington, DC, USA, 2005. IEEE
  Computer Society.
(doi:10.1109/ICSM.2005.23)
 
- Alejandra
  Garrido.
Program
  refactoring in the presence of preprocessor directives.
PhD thesis, University of Illinois at Urbana-Champaign, Champaign, IL, USA,
  2005.
Adviser: Ralph Johnson.
 
- Saul I. Gass.
Project mercury;s man-in-space real-time computer system: ``you have a go, at
  least seven orbits''.
IEEE Annals of the History of Computing, 21(4):37–48, 1999.
 
- Daniel
  Geer, Rebecca Bace, Peter Gutmann,
  Perry Metzger, Charles P. Pfleeger,
  John S. Quarterman, and Bruce Schneier.
Cyberinsecurity:
  the cost of monopoly.
Computer and Communications Industry Association report, September 2003.
Available online
  http://ccianet.org/filings/cybersecurity/cyberinsecurity.pdf.
 
- M. Gelgon and K. Tilhou.
Automated
  multimedia diaries of mobile device users need summarization.
In F. Paternò, editor, 4th International Symposium on
  Mobile Human-Computer Interaction — Mobile HCI 2002, pages 36–44,
  Berlin, September 2002. Springer-Verlag.
Lecture Notes in Computer Science 2411.
 
- Richard
  Gerber and Seongsoo Hong.
Slicing
  real-time programs for enhanced schedulability.
ACM Transactions on Programming Languages and Systems,
  19(3):525–555, May 1997.
 
- William Germano.
The scholarly lecture:
  How to stand and deliver.
The Chronicle Review, 50(14), November 2003.
 
- Stanley B. Gershwin and
  James E. Schor.
Efficient algorithms for buffer space allocation.
In International Workshop on Performance Evaluation and Optimization of
  Production Lines, pages 217–228. University of the Aegean, Department
  of Mathematics, May 1997.
 
- Sanjay
  Ghemawat, Howard Gobioff, and Shun-Tak Leung.
The google file
  system.
In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating
  systems principles, pages 29–43, New York, NY, USA, 2003. ACM Press.
(doi:10.1145/945445.945450)
 
- Rakesh
  Ghiya, Daniel Lavery, and David Sehr.
On the importance of points-to analysis and other memory disambiguation methods
  for C programs.
ACM SIGPLAN Notices, 36(5):47–158, May 2001.
PLDI '01: Proceedings of the ACM SIGPLAN Conference on Programming Language
  Design and Implementation.
 
- Norman E. Gibbs.
The SEI education program: The challenge of teaching future software
  engineers.
Communications of the ACM, 32(5):594–605, May 1989.
 
- Jim Giles.
Internet encyclopaedias go head to head.
Nature, 438(7070):900–901, December 2005.
(doi:10.1038/438900a)
 
- Jeremy
  Ginsberg, Matthew H. Mohebbi, Rajan S. Patel,
  Lynnette Brammer, Mark S. Smolinski, and
  Larry Brilliant.
Detecting influenza epidemics using search engine query data.
Nature, 457:1012–1014, February 2009.
(doi:10.1038/nature07634)
 
- M. Girvan and M. E. J.
  Newman.
Community Structure in Social and Biological Networks.
Proceedings of the National Academy of Sciences of the United States of
  America, 99(12):7821–7826, 2002.
(doi:10.1073/pnas.122653799)
 
- Wolfgang Glänzel and
  Henk F. Moed.
Journal impact measures in bibliometric research.
Scientometrics, 53(2):171–193, 2002.
 
- Robert L.
  Glass and T.Y. Chen.
An
  assessment of systems and software engineering scholars and institutions
  (1999–2003).
Journal of Systems and Software, 76(1):91–97, April 2005.
 
- Robert L. Glass.
Cobol — a contradiction and an enigma.
Communications of the ACM, 40(9):11–13, September 1997.
 
- Robert L. Glass.
How best to provide the services IS programmers need.
Communications of the ACM, 40(12):17–19, December 1997.
 
- Robert L. Glass.
Of open source, Linux ... and hype.
IEEE Software, 16(1):126–128, January/February 1999.
 
- Robert L. Glass.
The sociology of open source: Of cults and cultures.
IEEE Software, 17(3):104–105, May/June 2000.
 
- Robert L. Glass.
An assessment of
  systems and software engineering scholars and institutions (1995–1999).
Journal of Systems and Software, 54(1):77–82, September
  2000.
 
- Robert L. Glass.
The generalization of an application domain.
IEEE Software, 17(5):127–128, September/October 2000.
 
- Robert L. Glass.
Frequently forgotten fundamental facts about software engineering.
IEEE Software, 18(3):110–112, May/June 2001.
 
- Eugene
  Glynn, Brian Fitzgerald, and Chris Exton.
Commercial adoption of open source software: An empirical study.
In International Symposium on Empirical Software Engineering,
  pages 225–234, November 2005.
(doi:10.1109/ISESE.2005.1541831)
 
- David E.
  Goldberg.
Genetic and evolutionary algorithms come of age.
Communications of the ACM, 37(3):113–119, March 1994.
 
- George D.
  Gopen and Judith A. Swan.
The science of
  scientific writing.
American Scientist, 78:550–558, November/December 1990.
 
- S. Gorn.
Algorithms: bisection routine.
Communications of the ACM, 3:174, March 1960.
Algorithm available online at http://calgo.acm.org/. Current December
  2011.
(doi:10.1145/367149.367173)
 
- Goetz Graefe.
Implementing sorting in database systems.
ACM Computing Surveys, 38(3):10, 2006.
(doi:10.1145/1132960.1132964)
 
- William G. Griswold and David
  Notkin.
Automated assistance for program restructuring.
ACM Transactions on Software Engineering and Methodology,
  2(3):228–269, 1993.
(doi:10.1145/152388.152389)
 
- Yann-Gaël Guéhéneuc and
  Hervé Albin-Amiot.
Recovering binary
  class relationships: Putting icing on the UML cake.
In OOPSLA '04: Proceedings of the 19th annual ACM SIGPLAN Conference on
  Object-oriented programming, systems, languages, and applications,
  pages 301–314. ACM Press, 2004.
(doi:10.1145/1028976.1029002)
 
- Philip Guo.
The ph.d. grind.
Available online http://tex.loria.fr/typographie/mathwriting.pdf. Current
  June 2013, 2012.
 
- Stefan
  Haefliger, Georg von Krogh, and Sebastian
  Spaeth.
Code reuse in open source software.
Management Science, 54(1):180–153, January 2008.
(doi:10.1287/mnsc.1070.0748)
 
- Robert J. Hall.
Call path profiling.
In 14th International Conference on Software Engineering, pages
  296–306, New York, May 1992. ACM Press.
 
- Brian Halla.
How the PC will disappear.
Computer, 31(12):134–136, December 1998.
 
- Richard W.
  Hamming.
You and your research.
Available online via a Google search, March 1986.
Bell Communications Research Colloquium Seminar.
 
- Sung H. Han,
  Myung Hwan Yun, Jiyoung Kwahk, and
  Sang W. Hong.
Usability of consumer electronic products.
Industrial Ergonomics, 28:143–151, 2001.
 
- Ahmed E.
  Hassan, Richard C. Holt, and Audris Mockus.
Report on MSR 2004: International workshop on mining software repositories.
SIGSOFT Software Engineering Notes, 30(1):4, 2005.
(doi:10.1145/1039174.1039188)
 
- Ronald
  Heifetz, Alexander Grashow, and Marty Linsky.
Leadership in a (permanent) crisis.
Harvard Business Review, 87(7):1–7, July/August 2009.
 
- Alan R. Heminger and Steven B.
  Robertson.
The digital
  rosetta stone: A model for maintaining long-term access to static digital
  documents.
Communications of the Association for Information Systems,
  3:314–329, January 2000.
 
- James D. Herbsleb and
  Rebecca E. Grinter.
Splitting the
  organization and integrating the code: Conway's law revisited.
In ICSE '99: Proceedings of the 21st international conference on Software
  engineering, pages 85–95, Los Alamitos, CA, USA, 1999. IEEE Computer
  Society Press.
 
- James D. Herbsleb and Audris
  Mockus.
An empirical study of speed and communication in globally distributed software
  development.
IEEE Transactions on Software Engineering, 29(6):481–494, June
  2003.
 
- James D. Herbsleb and
  Deependra Moitra.
Global software development.
IEEE Software, 18(2):16–20, March/April 2001.
 
- James
  Herbsleb, David Zubrow, Dennis Goldenson,
  Will Hayes, and Mark Paulk.
Software quality and the capability maturity model.
Communications of the ACM, 40(6):30–40, June 1997.
 
- James D.
  Herbsleb, Daniel J. Paulish, and Matthew Bass.
Global software
  development at Siemens: Experience from nine projects.
In ICSE '05: Proceedings of the 27th International Conference on Software
  Engineering, pages 524–533, New York, 2005. ACM Press.
(doi:10.1145/1062455.1062550)
 
- R.A.
  Herendeen.
Personal energy impact of attending a professional meeting.
Energy, 29(1):13–17, 2004.
(doi:10.1016/j.energy.2003.08.005)
 
- Jeffrey Hightower and Gaetano
  Borrielo.
Location systems for ubiquitous computing.
Computer, 34(8):57–66, August 2001.
 
- Eric Von Hippel.
Economics of product development by users: the impact of ``sticky'' local
  information.
Management Science, 44(5):629–644, 1998.
(doi:10.1287/mnsc.44.5.629)
 
- S. Hitchcock, L. Carr,
  S. Harris, J. M. N. Hey, and
  W. Hall.
Citation
  linking: improving access to online journals.
In Proceedings of the 2nd ACM international conference on Digital
  libraries, pages 115–122, July 1999.
 
- Timo
  Honkela, AArno Lehtola, Sakari Kalliomäki,
  Risto Suitial, Ray Hudson,
  Vangelis Karkaletsis, and George Vouros.
A recommended globalization method.
In P. A. V. Hall and R. Hudson, editors,
  Software Without Frontiers, chapter 3. Wiley, 1996.
 
- Susan
  Horwitz, Jan Prins, and Thomas Reps.
Integrating non-interfering versions of programs.
In Conference Record of the 15th Annual ACM Symposium on Principles of
  Programming Languages, pages 133–145, Januray 1988.
 
- S. Horwitz, T. Reps, and
  D. Binkley.
Interprocedural
  slicing using dependence graphs.
In Proceedings of the SIGPLAN'88 conference on Programming Language
  design and Implementation, pages 35–46, New York, 1988. ACM Press.
(doi:10.1145/53990.53994)
 
- Susan
  Horwitz, Jan Prins, and Thomas Reps.
Integrating noninterfering versions of programs.
ACM Transactions on Programming Languages and Systems (TOPLAS),
  11(3):345–387, 1989.
(doi:10.1145/65979.65980)
 
- HQ Air Force Operational Test and
  Evaluation Center.
Software maintainability
  evaluation guide.
Available Online http://handle.dtic.mil/100.2/ADA324619, September 1996.
AFOTEC Pamhplet 99-102.
 
- Ying Hu,
  Ettore Merlo, Michel Dagenais, and
  Bruno Lagüe.
C/C++ conditional
  compilation analysis using symbolic execution.
In ICSM '00: Proceedings of the International Conference on Software
  Maintenance, pages 196–207, Washington, DC, USA, 2000. IEEE Computer
  Society.
(doi:10.1109/ICSM.2000.883045)
 
- Paul
  Hudak and Adrienne Bloss.
The aggregate update problem in functional programming systems.
ACM Conference, 1984.
 
- Paul
  Hudak, John Hughes, Simon Peyton Jones, and
  Philip Wadler.
A history of haskell: being
  lazy with class.
In HOPL III: Proceedings of the third ACM SIGPLAN conference on History
  of programming languages, pages 12–1--12–55. ACM Press, 2007.
(doi:10.1145/1238844.1238856)
 
- Paul Hudak.
Conception, evolution and application of functional programming languages.
ACM Computing Surveys, 21(3):359–411, September 1989.
 
- Andy Hunt
  and Dave Thomas.
OO in
  one sentence: Keep it DRY, shy, and tell the other guy.
IEEE Software, 21(3):101–103, May/June 2004.
 
- Galen C.
  Hunt, James R. Larus, Martin Abadi,
  Mark Aiken, Paul Barham, Manuel
  Fähndrich, Chris Hawblitzel, Orion Hodson,
  Steven Levi, Nick Murphy, Bjarne
  Steensgaard, David Tarditi, Ted Wobber, and
  Brian Zill.
An overview
  of the Singularity project.
Technical Report MSR-TR-2005-135, Microsoft Research, Redmond, WA, October
  2005.
 
- Gary R. Ignatin.
Let the hackers hack: Allowing the reverse engineering of copyrighted computer
  programs to achieve compatibility.
University of Pennsylvania Law Review, 140:1999–2050, 1992.
 
- John Hagel III and
  John Seely Brown.
Your next IT strategy.
Harvard Business Review, pages 105–113, October 2001.
 
- Dan
  Ingalls, Ted Kaehler, John Maloney,
  Scott Wallace, and Alan Kay.
Back to the future:
  the story of Squeak, a practical Smalltalk written in itself.
In OOPSLA '97: Proceedings of the 12th ACM SIGPLAN conference on
  Object-oriented programming, systems, languages, and applications,
  pages 318–326, New York, NY, USA, 1997. ACM Press.
(doi:10.1145/263698.263754)
 
- D.B.
  Ingham, S.J. Caughey, , and M.C.
  Little.
Fixing the
  broken-link problem: The W3Objects approach.
Computing Networks and ISDN Systems, 28(7–11):1255–1268, 1996.
Proceedings of the Fifth International World Wide Web Conference, Paris,
  France, 6-10 May 1996.
 
- Intel
  Corp.
80C186 and
  80C188 embedded microprocessors specification update.
Online. http://www.intel.se/design/intarch/specupdt/27289401.pdf. 29
  August 1998, July 1996.
 
- International Organization
  for Standardization, Geneva, Switzerland.
Information technology — Code of practice for information security
  management, 2000.
ISO 17799:2000.
 
- Daniel
  Jackson and Eugene J. Rollins.
A
  new model of program dependencies for reverse engineering.
In Proceedings of the second ACM SIGSOFT symposium on Foundations of
  software engineering, pages 2–10, New York, 1994. ACM, ACM
  Press.
 
- Michael Jackson.
Specializing in software engineering.
IEEE Software, 16(6):119–121, Nov/Dec 1999.
 
- Suresh
  Jagannathan.
Metalevel building blocks for modular systems.
ACM Transactions on Programming Languages and Systems,
  16(3):456–492, May 1994.
 
- A.J.
  Jakeman, S.H. Chen, A.E. Rizzoli, and
  A.A. Voinov.
Modelling and software as instruments for advancing sustainability.
In A.J. Jakeman, A.A. Voinov, A.E.
  Rizzoli, and S.H. Chen, editors, Developments in
  Integrated Environmental Assessment, volume 3, pages 1–13. Elsevier,
  2008.
(doi:10.1016/S1574-101X(08)00601-7)
 
- Pankaj
  Jalote and Gourav Jain.
Assigning tasks in a 24-hour software development model.
In 11th Asia-Pacific Software Engineering Conference, pages
  309–315, 2004.
(doi:10.1109/APSEC.2004.33)
 
- Doug
  Janzen and Kris De Volder.
Navigating and
  querying code without getting lost.
In AOSD '03: Proceedings of the 2nd International Conference on
  Aspect-Oriented Software Development, pages 178–187, New York, NY,
  USA, 2003. ACM.
(doi:10.1145/643603.643622)
 
- Barbara R.
  Jasny, Gilbert Chin, Lisa Chong, and
  Sacha Vignieri.
Again, and again, and again...
Science, 334(6060):1225, 2011.
 
- Bruce
  Javob and Trevor Mudge.
Virtual memory: Issues of implementation.
Computer, 31(6):33–43, June 1998.
 
- Ron
  Jeffries and Grigori Melnik.
Guest editors' introduction: TDD–the art of fearless programming.
IEEE Software, 24(3):24–30, May 2007.
(doi:10.1109/MS.2007.75)
 
- Anand
  Jeyaraj, Joseph W. Rottman, and Mary C.
  Lacity.
A review of the predictors, linkages, and biases in IT innovation adoption
  research.
Journal of Information Technology, 21:1–23, 2006.
(doi:10.1057/palgrave.jit.2000056)
 
- Trevor Jim,
  Greg Morrisett, Dan Grossman,
  Michael Hicks, James Cheney, and
  Yanling Wang.
Cyclone: A safe dialect of C.
In USENIX Technical Conference Proceedings, Berkeley, CA, June
  2002. USENIX Association.
 
- Simon
  L. Peyton Jones and M. S. Joy.
FLIC — a functional language intermediate code.
Internal Note 2048, Document 4, University College London, Department of
  Computer Science, July 1989.
 
- Simon Peyton
  Jones, Alan Blackwell, and Margaret Burnett.
A user-centred approach to functions in Excel.
ACM SIGPLAN Notices, 38(9):165–176, September 2003.
Proceedings of the 2003 ACM SIGPLAN International Conference on Functional
  Programming (ICFP'03).
 
- Ho-Won Jung,
  Seung-Gweon Kim, and Chang-Sin Chung.
Measuring software product quality: A survey of ISO/IEC 9126.
IEEE Software, 21(5):10–13, September/October 2004.
 
- Huzefa
  Kagdi, Shehnaaz Yusuf, and Jonathan I.
  Maletic.
Mining sequences of
  changed-files from version histories.
In MSR '06: Proceedings of the 2006 international workshop on Mining
  software repositories, pages 47–53, New York, NY, USA, 2006. ACM.
(doi:10.1145/1137983.1137996)
 
- Samual N.
  Kamin and David Hyatt.
A special-purpose
  language for picture-drawing.
In Ramming [Ramming, 1997], pages 297–310.
 
- Elena
  Karahanna, Detmar W. Straub, and Norman L.
  Chervany.
Information technology adoption
  across time: A cross-sectional comparison of pre-adoption and post-adoption
  beliefs.
MIS Quarterly, 23(2):183–213, 1999.
 
- Paul A.
  Karger and Roger R. Schell.
Thirty
  years later: Lessons from the Multics security evaluation.
In ACSAC: 18th Annual Computer Security Applications Conference,
  Washington, DC, October 2002. IEEE Computer Society.
Includes US Air Force report Multics Security Evaluation: Vulnerability
  Analysis, ESD-TR-74-193, 1974, by the same authors.
(doi:10.1109/CSAC.2002.1176285)
 
- Neha
  Katira, Laurie Williams, Eric Wiebe,
  Carol Miller, Suzanne Balik, and
  Ed Gehringer.
On understanding
  compatibility of student pair programmers.
In SIGCSE '04: Proceedings of the 35th SIGCSE technical symposium on
  Computer science education, pages 7–11, New York, NY, USA, 2004. ACM.
(doi:10.1145/971300.971307)
 
- Michael L. Katz and Carl
  Shapiro.
Systems competition and network
  effects.
The Journal of Economic Perspectives, 8(2):93–115, 1994.
 
- S. Katzoff.
Clarity
  in technical reporting.
Technical Report NASA SP-7010, NASA, Washington, D.C., 1964.
Second edition. Available online
  http://techreports.larc.nasa.gov/ltrs/PDF/NASA-64-sp7010.pdf.
 
- Andrew J.
  Kennedy.
Dimension types.
In Proceedings of the 5th European Symposium on Programming, pages
  348–362, Berlin, April 1994. Springer-Verlag.
Lecture Notes in Computer Science 788.
 
- Andrew J.
  Kennedy.
Relational parametricity and units of measure.
In Proceedings of the 24th Annual ACM Symposium on Principles of
  Programming Languages, pages 442–455, New York, January 1997. ACM
  Press.
 
- Brian W. Kernighan and
  Dennis M. Ritchie.
The state of C.
Byte, pages 205–210, August 1988.
 
- Brian W.
  Kernighan.
Why Pascal is not my favorite programming language.
Computer Science Technical Report 100, Bell Laboratories, Murray Hill, NJ, July
  1981.
Available online at http://cm.bell-labs.com/cm/cs/cstr. (Reprinted in Comparing
  and Assessing Programming Languages Ed. A. Feuer N. Gehani Prentice-Hall
  1984).
 
- Brian W.
  Kernighan.
The UNIX system document preparation tools: A retrospective.
AT&T Technical Journal, 68(4):5–20, July/August 1989.
 
- Brian W.
  Kernighan.
Experience
  with Tcl slash  Tk for scientific and engineering visualization.
In Proceedings of the Tcl slash  Tk Workshop, pages 269–278,
  July 1995.
 
- Gregor
  Kiczales, Erik Hilsdale, Jim Hugunin,
  Mik Kersten, Jeffrey Palm, and
  William Griswold.
Getting started with ASPECTJ.
Communications of the ACM, 44(10):59–65, 2001.
(doi:10.1145/383845.383858)
 
- John R. Kimberly and
  Michael J. Evanisko.
Organizational innovation: The
  influence of individual, organizational, and contextual factors on hospital
  adoption of technological and administrative innovations.
The Academy of Management Journal, 24(4):689–713, 1981.
 
- John Leslie
  King, Vijay Gurbaxani, Kenneth L. Kraemer,
  F. Warren McFarlan, K. S. Raman, and
  C. S. Yap.
Institutional factors
  in information technology innovation.
Information Systems Research, 5(2):139–169, June 1994.
 
- Ritchie S. King.
The top 10 programming languages.
IEEE Spectrum, 48(10):84, October 2011.
(doi:10.1109/MSPEC.2011.6027266)
 
- Nils Klarlund and Michael I.
  Schwarzbach.
A domain-specific
  language for regular sets of strings and trees.
In Ramming [Ramming, 1997], pages 145–156.
 
- Rob Kling
  and Lisa Covi.
Electronic journals and
  legitimate media in the systems of scholarly communication.
The Information Society, 11(4):261–271, 1995.
 
- Donald E. Knuth.
Deciphering a linear conguentrial encryption.
IEEE Transactions on Information Theory, 31(1):49–52, January
  1985.
 
- Donald E. Knuth.
The errors of TeX.
Software: Practice & Experience, 19(7):607–687, July 1989.
 
- Donald E. Knuth.
Theory and practice,.
Theoretical Computer Science, 90(1):1–15, 1991.
(doi:10.1016/0304-3975(91)90295-D)
 
- Menno-Jan Kraak.
Integrating multimedia in geographical information systems.
IEEE Multimedia, 3(2):59–65, Summer 1996.
 
- Andreas Krall.
Improving semi-static branch prediction by code replication.
ACM SIGPLAN Notices, 29(6):97–106, June 1994.
Proceedings of the ACM SIGPLAN '94 Conference on Programming Language Design
  and Implementation (PLDI).
 
- Robert E. Kraut and Lynn A.
  Streeter.
Coordination in software development.
Communications of the ACM, 38(3):69–81, 1995.
(doi:10.1145/203330.203345)
 
- Sandeep
  Krishnamurthy.
A managerial overview of open source software.
Business Horizons, 46(5):47–56, September-October 2003.
(doi:10.1016/S0007-6813(03)00071-5)
 
- George Kuk.
Strategic interaction and knowledge sharing in the KDE developer mailing
  list.
Management Science, 52(7):1031–1042, 2006.
(doi:10.1287/mnsc.1060.0551)
 
- David N.
  Laband and Michael J. Piette.
Favoritism versus search for good papers: Empirical evidence regarding the
  behavior of journal editors.
The Journal of Political Economy, 102(1):194–203, February
  1994.
 
- Mary C.
  Lacity, Leslie P. Willcocks, and David F.
  Feeny.
IT outsourcing: Maximize flexibility and control.
Harvard Business Review, 73(3):84–93, May-June 1995.
 
- Sotiria Lampoudi and David M.
  Beazley.
SWILL: A simple embedded web server library.
In USENIX Technical Conference Proceedings, Berkeley, CA, June
  2002. USENIX Association.
FREENIX Track Technical Program.
 
- Sébastien Lapierre, Bruno
  Laguë, and Charles Leduc.
Datrix source code model and its interchange format: lessons learned and
  considerations for future work.
SIGSOFT Softw. Eng. Notes, 26(1):53–56, 2001.
(doi:10.1145/505894.505907)
 
- Graig Larman.
Protected variaton: The importance of being closed.
IEEE Software, 18(3):89–91, May/June 2001.
 
- James R.
  Larus, Thomas Ball, Manuvir Das,
  Robert DeLine, Manuel Fähndrich,
  Jon Pincus, Sriram K. Rajamani, and
  Ramanathan Venkatapathy.
Righting software.
IEEE Software, 21(3):92–100, May/June 2004.
 
- Kung-Kiu
  Lau, Shaoying Liu, Mario Ornaghi, and
  Alan Wills.
Interacting frameworks in Catalysis.
In Proceedings of the Second IEEE International Conference on Formal
  Engineering Methods. IEEE, 1998.
 
- Steve
  Lawrence and C. Lee Giles.
Searching
  the World Wide Web.
Science, 280(5360):98–100, 1998.
 
- Steve
  Lawrence and C. Lee Giles.
Accessibility of information on the web.
Nature, 400:107–109, 1999.
 
- Steve
  Lawrence and C. Lee Giles.
Searching
  the web: General and scientific information access.
IEEE Communications, 37(1):116–122, 1999.
 
- Steve
  Lawrence, C. Lee Giles, and Kurt Bollacker.
Digital
  libraries and autonomous citation indexing.
IEEE Computer, 32(6):67–71, June 1999.
 
- Steve
  Lawrence, Kurt Bollacker, and C. Lee Giles.
Indexing
  and retrieval of scientific literature.
In Eighth International Conference on Information and Knowledge
  Management, CIKM 99, pages 139–146, November 1999.
 
- Steve
  Lawrence, David M. Pennock, Gary William
  Flake, Frans M. Coetzee, Eric Glover,
  Finn Årup Nielsen, Andries Kruger, and
  C. Lee Giles.
Persistence of web references in scientific research.
IEEE Computer, 34(2):26–31, February 2001.
 
- Adrian Lee,
  Carina Dennis, and Philip Campbell.
Nature's guide for mentors.
Nature, 447(7119):791–797, June 2007.
 
- Burton H. Lee.
Embedded
  internet systems: Poised for takeoff.
Internet Computing, 2(3):24–29, May/June 1998.
 
- Newton Lee.
Interview with Nicholas Negroponte.
Computers in Entertainment, 4(1):3, 2006.
(doi:10.1145/1111293.1111298)
 
- M. M.
  Lehman and J. F. Ramil.
Software evolution in the age of component-based software engineering.
IEE Proceedings Software, 147(6):249–255, December 2000.
 
- M. M.
  Lehman, D. E. Perry, and J. F. Ramil.
Implications of evolution metrics on software maintenance.
In Proceedings of the International Conference on Software Maintenance
  ICSM '98. IEEE Computer Society, 1998.
 
- Dorothy Leonard-Barton and
  Isabelle Deschamps.
Managerial influence in the
  implementation of new technology.
Management Science, 34(10):1252–1265, 1988.
 
- Nancy G.
  Leveson.
High-pressure steam engines and computer software.
In 14th International Conference on Software Engineering, pages
  2–14, New York, May 1992. ACM Press.
 
- Roy
  Levin and David D. Redell.
An
  evaluation of the ninth SOSP submissions or how (and how not) to write a
  good systems paper.
Operating Systems Review, 17(3):35–40, July 1983.
 
- Scott M.
  Lewandowski.
Frameworks for component-based client/server computing.
ACM Computing Surveys, 30(1):3–27, March 1998.
 
- Zhenmin Li,
  Shan Lu, Suvda Myagmar, and
  Yuanyuan Zhou.
CP-miner: Finding copy-paste and related bugs in large-scale software code.
IEEE Transactions on Software Engineering, 32(3):176–192, 2006.
(doi:10.1109/TSE.2006.28)
 
- Andrew Lih.
Wikipedia
  as participatory journalism: Reliable sources? metrics for evaluating
  collaborative media as a news resource.
In 5th International Symposium on Online Journalism, April
  2004.
 
- Mark A. Linton.
Implementing
  relational views of programs.
In SDE 1: Proceedings of the First ACM SIGSOFT/SIGPLAN Software
  Engineering Symposium on Practical Software Development Environments,
  pages 132–140, New York, NY, USA, 1984. ACM.
(doi:10.1145/800020.808258)
 
- Panos E.
  Livadas and David T. Small.
Understanding code containing preprocessor constructs.
In IEEE Third Workshop on Program Comprehension, pages 89–97,
  November 1994.
(doi:10.1109/WPC.1994.341255)
 
- Mark Lomas and Bruce
  Christianson.
To whom am I speaking: Remote booting in a hostile world.
Computer, 28(1):50–54, January 1995.
 
- Qi Lu and M. Satyanaranyanan.
Isolation-only transactions for mobile computing.
Operating Systems Review, 28(2):81–87, 1994.
(doi:10.1145/198153.198164)
 
- Helmut Lucke.
Using the
  HP200LX to label mini discs.
Online. http://www.jyu.fi/minidisc/minidisc/mdlbl/mdlbl.htm. 11 April
  1998, August 1997.
 
- Kim Man Lui,
  K.C.C. Chan, and J.T. Nosek.
The effect of pairs in program design tasks.
IEEE Transactions on Software Engineering, 34(2):197–211, 2008.
(doi:10.1109/TSE.2007.70755)
 
- K. Lum and
  J. Curran.
Personality similarity and interpersonal attraction in the computer dating
  situation.
Journal of Social Psychology, 95(2):233–239, April 1975.
 
- Alan
  MacCormack, John Rusnak, and Carliss Y.
  Baldwin.
Exploring the structure of complex software designs: An empirical study of open
  source and proprietary code.
Management Science, 52(7):1015–1030, 2006.
(doi:10.1287/mnsc.1060.0552)
 
- T. R.
  Madanmohan and Rahul De'.
Open source reuse in commercial firms.
IEEE Software, 21(6):62–69, November/December 2004.
(doi:10.1109/MS.2004.45)
 
- Pattie Maes.
Concepts
  and experiments in computational reflection.
ACM SIGPLAN Notices, 22(12):147–155, December 1987.
Proceedings of the 1987 ACM SIGPLAN Conference on Object-Oriented Programming
  Systems, Languages and Applications (OOPSLA '87).
 
- David P. Maher.
Fault induction attacks, tamper resistance, and hostile reverse engineering in
  perspective.
In Rafael Hirschfeld, editor, Financial Cryptography:
  First International Conference, FC '97, pages 109–121, Berlin,
  February 1997. Springer-Verlag.
Lecture Notes in Computer Science 1318.
 
- Tsugio
  Makimoto, Kazuhiko Eguchi, and Mitsugu
  Yoneyama.
The cooler the beter: New directions in the nomadic age.
Computer, 34(4):38–42, April 2001.
 
- David
  Mandelin, Lin Xu, Rastislav Bodík, and
  Doug Kimelman.
Jungloid mining:
  helping to navigate the API jungle.
In PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on
  Programming Language Design and Implementation, pages 48–61, New
  York, 2005. ACM Press.
(doi:10.1145/1065010.1065018)
 
- Steve Mann.
Wearable
  computing: Toward humanistic intelligence.
IEEE Intelligent Systems, 16(3):10–15, May/June 2001.
Special Issue on Wearable Computing and Humanistic Intelligence.
 
- M. Lynne
  Markus, Brook Manville, and Carole E. Agres.
What makes a virtual organization work?
Sloan Management Review, 42:13–26, 2000.
 
- Larry
  Matthies, Mark Maimone, Andrew Johnson,
  Yang Cheng, Reg Willson, Carlos
  Villalpando, Steve Goldberg, Andres Huertas,
  Andrew Stein, and Anelia Angelova.
Computer vision on Mars.
International Journal of Computer Vision, 75(1):67–92, 2007.
(doi:10.1007/s11263-007-0046-z)
 
- Peter M. Maurer.
Components: What if they gave a revolution and nobody came.
IEEE Software, 33(6):28–34, June 2000.
 
- Katrina
  Maxwell, Luk Van Wassenhove, and Soumitra
  Dutta.
Performance evaluation of general and company specific models in software
  development effort estimation.
Management Science, 45(6):787–803, 1999.
(doi:10.1287/mnsc.45.6.787)
 
- John D.
  McGregor, Linda M. Northrop, Salah Jarrad, and
  Klaus Pohl.
Initiating software product lines.
IEEE Software, 19(4):24–27, July/August 2002.
 
- Nimrod
  Megiddo and Dharmendra S. Modha.
Outperforming LRU with an adaptive replacement cache algorithm.
Computer, 37(4):58–65, April 2004.
 
- Rajiv Mehrotra.
In
  the news: Dueling over DVD and DIVX.
IEEE Multimedia, 6(1):14–19, January-March 1999.
 
- Marjan
  Mernik, Jan Heering, and Anthony M. Sloane.
When and how to develop domain-specific languages.
ACM Computing Surveys, 37(4):316–344, 2005.
(doi:10.1145/1118890.1118892)
 
- Robert K. Merton.
The Matthew effect in science.
Science, 159(3810):56–63, January 1968.
 
- Regine Meunier.
The pipes and filters
  architecture.
In James O. Coplien and Douglas C. Schmidt,
  editors, Pattern Languages of Program Design, chapter 22, pages
  427–440. Addison-Wesley, Reading, MA, 1995.
 
- Bertrand
  Meyer, Christine Choppy, Jorgen Staunstrup,
  and Jan van Leeuwen.
Research evaluation for computer science, 2008.
 
- Ana
  Milanova, Atanas Rountev, and Barbara G.
  Ryder.
Precise call graphs for C programs with function pointers.
Automated Software Engineering, 11(1):7–26, January 2004.
(doi:10.1023/B:AUSE.0000008666.56394.a1)
 
- Hafedh Mili,
  Fatma Mili, and Ali Mili.
Reusing
  software: Issues and research directions.
IEEE Transactions on Software Engineering, 21(6):528–562, June
  1995.
 
- Barton P.
  Miller, Lars Fredriksen, and Bryan So.
An empirical study of the reliability of UNIX utilities.
Communications of the ACM, 33(12):32–44, December 1990.
 
- Ray Miller.
Configuration
  management with Subversion, YAML and Perl template toolkit.
In Alexios Zavras, editor, Proceedings of the 5th
  International System Administration and Network Engineering Conference SANE
  06. NLUUG, Stichting SANE, May 2006.
 
- Jonathan W. Mills.
Stiquito: A small simple, inexpensice hexapod robot.
Technical Report 363a, Indiana University, Bloomington, Indiana 47405,
  1992.
 
- John Mingers.
The long and winding road: Getting papers published in top journals.
Communications of the Association for Information Systems,
  8:330–339, 2002.
 
- Audris
  Mockus, Roy T. Fielding, and James D.
  Herbsleb.
Two case studies of open source software development: Apache and Mozilla.
ACM Transactions on Software Engineering and Methodology (TOSEM),
  11(3):309–346, 2002.
(doi:10.1145/567793.567795)
 
- Audris Mockus.
Amassing and indexing
  a large sample of version control systems: Towards the census of public
  source code history.
In Proceedings of the 2009 6th IEEE International Working Conference on
  Mining Software Repositories, MSR '09, pages 11–20, Washington, DC,
  USA, 2009. IEEE Computer Society.
(doi:10.1109/MSR.2009.5069476)
 
- Alistair Moffat.
Resource-limited index construction ofr large texts.
Technical Report 93/16, Department of Computer Science, University of
  Melbourne, Parkville, Victoria 3052, July 1994.
 
- C. Mohan, B. Lindsay, and
  R. Obermarck.
Transaction management in the r* distributed database management system.
ACM Transactions on Database Systems, 11(4):379–396, December
  1986.
 
- C Mohan, B. Lindsay, and
  R. Obermarck.
Transaction management in the R* distributed database management system.
ACM Transactions on Database Systems, 11(4):O378–396, December
  1986.
 
- Ivan Moore.
Automatic inheritance hierarchy and method refactoring.
ACM SIGPLAN Notices, 31(10):235–250, October 1996.
Proceedings of the 1996 ACM SIGPLAN Conference on Object-Oriented Programming
  Systems, Languages and Applications (OOPSLA '96).
 
- Mike
  Morrison, Joline Morrison, and Anthony Keyes.
Integrating web sites and databases.
Communications of the ACM, 45(9):81–86, September 2002.
 
- Donald R.
  Morrison.
Patricia—practical algorithm to retrieve information coded in alphanumeric.
J. ACM, 15(4):514–534, 1968.
(doi:10.1145/321479.321481)
 
- Motor Industry Research Association.
Development guidelines for vehicle based software, November 1994.
 
- Gail C.
  Murphy, Mik Kersten, and Leah Findlater.
How are Java software developers using the Eclipse IDE?
IEEE Software, 23(4):76–83, July/August 2006.
(doi:10.1109/MS.2006.105)
 
- Sharon L. Murrel and
  Thaddeus J. Kowlaski.
Monk: A high-level text compiler.
AT&T Technical Journal, 68(4):45–60, July/August 1989.
 
- M. E. J.
  Newman and M. Girvan.
Finding and evaluating community structure in networks.
Phys. Rev. E, 69(2):026113, Feb 2004.
(doi:10.1103/PhysRevE.69.026113)
 
- M. E. J. Newman.
Scientific collaboration networks. I. Network construction and fundamental
  results.
Phys. Rev. E, 64(1):016131, Jun 2001.
(doi:10.1103/PhysRevE.64.016131)
 
- M. E. J.
  Newman.
Scientific collaboration networks. II. Shortest paths, weighted networks,
  and centrality.
Phys. Rev. E, 64(1):016132, Jun 2001.
(doi:10.1103/PhysRevE.64.016132)
 
- Oscar
  Nierstrasz, Simon Gibbs, and Dennis
  Tsichritzis.
Component-oriented software development.
Communications of the ACM, 35(9):160–165, September 1992.
 
- Tobias Nipkow and David von
  Oheimb.
Javalight is type-safe—definitely.
In Conference Record of POPL '98: The 25th ACM SIGPLAN-SIGACT Symposium
  on Principles of Programming Languages, pages 161–170, 1998.
 
- Haruo Noma,
  Tsutomu Miyasato, and Fumio Kishino.
A
  palmtop display for dextrous manipulation with haptic sensation.
In CHI '96. Conference Proceedings on Human Factors in Computing
  Systems, pages 126–133. ACM, 1996.
 
- Donald A. Norman.
Home theater: Not ready for prime time.
Computer, 35(6):100–102, June 2002.
 
- Chris
  Nyberg, Tom Barclay, Zarka Cvetanovic,
  Jim Gray, and David B. Lomet.
AlphaSort: A
  cache-sensitive parallel external sort.
VLDB Journal, 4(4):603–627, 1995.
 
- Hideto
  Ogasawara, Atsushi Yamada, and Michiko Kojo.
Experiences
  of software quality management using metrics through the life-cycle.
In 18th International Conference on Software Engineering, ICSE
  '96, pages 179–188, New York, 1993. ACM, ACM Press.
 
- Masaaki
  Oka and Masakazu Suzuoki.
Designing and programming the emotion engine.
IEEE Micro, pages 20–28, November/December 1999.
 
- One
  laptop per child (OLPC), a $100 laptop for the world's children
  education.
Available online http://www.laptop.org. Current March 2007, 2007.
 
- William F.
  Opdyke.
Refactoring
  Object-Oriented Frameworks.
PhD thesis, University of Illinois at Urbana-Champaign, Urbana-Champaign, IL,
  1992.
 
- Martin
  Oppermann and Kye-Sung Chon.
Convention participation decision-making process.
Annals of Tourism Research, 24(1):178–191, 1997.
(doi:10.1016/S0160-7383(96)00049-7)
 
- OPSiS, Alimos, Greece.
PhotoGPS Users Guide, July 2001.
Available online http://www.digital-opsis.com.
 
- George Orwell.
Politics and
  the english language.
Horizon, April 1946.
Also available online
  http://orwell.ru/library/essays/politics/english/e_polit.
 
- Thomas J. Ostrand and
  Elaine J. Weyuker.
Collecting and categorizing software error data in an industrial environment.
Journal of Systems and Software, 4(4):289–300, 1984.
(doi:10.1016/0164-1212(84)90028-1)
 
- Linda M.
  Ott and Jeffrey J. Thuss.
The relationship between slices and module cohesion.
In Proceedings of the 11th ACM conference on Software
  Engineering, pages 198–204, New York, May 1989. ACM, ACM Press.
 
- John K.
  Ousterhout.
Scripting:
  Higher-level programming for the 21st century.
IEEE Computer, 31(3):23–30, March 1998.
 
- David A.
  Padua and Michael J. Wolfe.
Advanced compiler optimizations for supercomputers.
Communications of the ACM, 29(12):1184–1201, December
  1986.
 
- Seung-Taek
  Park, David Pennock, Lee Giles, and
  Robert Krovetz.
Analysis of lexical
  signatures for finding lost or related documents.
In Proceedings of the 25th Annual International ACM-SIGIR Conference on
  Research and Development in Information Retrieval, pages 11–18, New
  York, August 2002. ACM, ACM Press.
(doi:10.1145/564376.564381)
 
- Geoffrey G. Parker and
  Marshall W. Van Alstyne.
Two-sided network effects: A theory of information product design.
Management Science, 51(10):1494–1504, 2005.
(doi:10.1287/mnsc.1050.0400)
 
- David L.
  Parnas, A. John van Schouwen, and Shu Po Kwan.
Evaluation of safety-critical software.
Communications of the ACM, 33(6):636–648, June 1990.
(doi:10.1145/78973.78974)
 
- David L. Parnas.
Software aging.
In 16th International Conference on Software Engineering, ICSE
  '94, pages 279–287, Washington, DC, May 1994. IEEE Computer Society.
Also in  cite [Chapter 29]HW01.
 
- T. J. Parr
  and R. W. Quong.
ANTLR: A predicated-LL(k) parser generator.
Software: Practice & Experience, 25(7):789–810, 1995.
 
- Mohammad N. Paryavi and
  William J. Hankley.
OOSPEC:
  an executable object-oriented specification language.
In ACM 23rd annual computer science conference. CSC '95, pages
  169–177, New York, 1995. ACM, ACM Press.
 
- Norman Paskin.
E-citations: actionable identifiers and
  scholarly referencing.
Learned Publishing, 13(3):159–168, July 2000.
 
- Oren
  Patashnik.
Designing BibTeX styles.
Available from the TeX archives, February 1988.
 
- David A.
  Patterson.
Reduced instruction set computers.
Communications of the ACM, 28(1):8–21, January 1985.
 
- David A.
  Patterson.
How to have a
  bad career in research/academia.
Available online
  http://www.cs.utah.edu/ lepreau/osdi94/keynote/abstract.html and
  http://www.cs.berkeley.edu/ pattrsn/talks/BadCareer.pdf. Current
  November 2005, November 1994.
Invited Talk. First Symposium on Operating Systems Design and Implementation
  (OSDI '94) keynote address, November 14-17, 1994 Monterey, CA.
 
- James W.
  Paulson, Giancarlo Succi, and Armin Eberlein.
An empirical study of open-source and closed-source software products.
IEEE Transactions on Software Engineering, 30(4):246–256, April
  2004.
 
- Linda Dailey
  Paulson.
Exploring the wireless LANscape.
Computer, 33(10):12–16, October 2000.
 
- Vern Paxson.
Strategies
  for sound internet measurement.
In Proceedings of the Internet Measurement Conference, Taormina,
  Sicily, Italy, October 2004.
 
- Christian Payne.
On
  the security of open source software.
Information Systems Journal, 12(1):61–78, 2002.
 
- Roger D. Peng.
Reproducible research in computational science.
Science, 334(6060):1226–1227, 2011.
(doi:10.1126/science.1213847)
 
- Alan J. Perlis.
Epigrams of
  programming.
ACM SIGPLAN Notices, 17(9):7–13, September 1982.
 
- Chad Perry.
A structured
  approach to presenting PhD theses: Notes for candidates and their
  supervisors.
In ANZ Doctoral Consortium. University of Sydney, February
  1994.
 
- Thomas A. Phelps and Robert
  Wilensky.
Robust
  hyperlinks: Cheap, everywhere, now.
In Proceedings of Digital Documents and Electronic Publishing
  (DDEP00), New York, September 2000.
 
- Rob
  Pike and Ken Thompson.
Hello world.
In Dan Geer, editor, USENIX Technical Conference
  Proceedings, pages 43–50, Berkeley, CA, Winter 1993. USENIX
  Association.
 
- Rob Pike,
  Dave Presotto, Ken Thompson, and
  Howard Trickey.
Plan 9 from Bell Labs.
In Proceedings of the Summer 1990 UKUUG Conference, pages 1–9.
  UKUUG, July 1990.
 
- Rob Pike,
  Dave Presotto, Ken Thompson, and
  Gerard Holzmann.
Process sleep and wakeup on a shared-memory multiprocessor.
In Proceedings of the Spring 1991 EurOpen Conference, pages
  161–166. EurOpen, May 1991.
 
- Rob Pike.
Notes on programming in C.
Available by anonymous ftp from
  relay.cs.toronto.edu:doc/programming/pikestyle.ps, 1989.
 
- Shamim Pirzada.
Evolution of the Unix system.
University of California at Berkeley Progress Report, July 1986.
 
- James E. Pitkow.
Summary of WWW
  characterizations.
World Wide Web, 2(1–2):3–13, January 1999.
 
- P. J. Plauger.
The Standard C Library.
Prentice Hall, 1992.
 
- Stefan Podlipnig and Laszlo
  Böszörmenyi.
A survey of web cache replacement strategies.
ACM Computing Surveys, 35(4):374–398, December 2003.
 
- Mason A.
  Porter, Jukka-Pekka Onnela, and Peter J.
  Mucha.
Communities in networks.
Notices of the American Mathematical Society, 56(9), 2009.
 
- Dave
  Presotto, Rob Pike, Ken Thompson, and
  Howard Trickey.
Plan 9, a distributed system.
In Proceedings of the Spring 1991 EurOpen Conference, pages
  43–50. EurOpen, May 1991.
 
- Dave Presotto.
Multiprocessor streams for plan 9.
In Proceedings of the Summer 1990 UKUUG Conference, pages
  11–19. UKUUG, July 1990.
 
- John S. Quarterman and
  Josiah C. Hoskins.
Notable computer networks.
Communications of the ACM, 29(10):932–971, October 1986.
 
- M. V. Ramakrishna and Justin
  Zobel.
Performance in
  practice of string hashing functions.
In Rodney W. Topor and Katsumi Tanaka, editors,
  Database Systems for Advanced Applications '97, Proceedings of the
  Fifth International Conference on Database Systems for Advanced Applications
  (DASFAA), Melbourne, Australia, April 1-4, 1997, volume 6 of
  Advanced Database Research and Development Series, pages
  215–224. World Scientific, 1997.
 
- J. Christopher
  Ramming, editor.
USENIX
  Conference on Domain-Specific Languages, Berkeley, CA, October
  1997. USENIX Association.
 
- Eric S. Raymond and David G.
  Messerschmitt.
Up from alchemy — back to the user.
IEEE Software, 21(1):88–91, January/February 2004.
 
- Jesse Reisman.
Web site design: Less
  is more.
IT Professional, 1(5):63–64, September/October 1999.
 
- David N.
  Reshef, Yakir A. Reshef, Hilary K. Finucane,
  Sharon R. Grossman, Gilean McVean,
  Peter J. Turnbaugh, Eric S. Lander,
  Michael Mitzenmacher, and Pardis C. Sabeti.
Detecting novel associations in large data sets.
Science, 334(6062):1518–1524, 2011.
(doi:10.1126/science.1205438)
 
- Glenn Ricart and Ashok K.
  Agrawala.
An optimal algorithm for mutual exclusion in computer networks.
Communications of the ACM, 24(1):9–17, January 1981.
 
- Matthew
  Richardson.
Learning about the world through long-term query logs.
ACM Transactions on the Web, 2(4):1–27, 2008.
(doi:10.1145/1409220.1409224)
 
- Dennis M.
  Ritchie.
Reflections on software research.
Communications of the ACM, 27(8):758–760, 1984.
 
- Dennis M.
  Ritchie.
The development of the C language.
ACM SIGPLAN Notices, 28(3):201–208, March 1993.
Preprints of the History of Programming Languages Conference (HOPL-II).
 
- R. L.
  Rivest, A. Shamir, and L. Adleman.
A method for obtaining digital signatures and public–key cryptosystems.
Communications of the ACM, 21(2), February 1978.
 
- R. Rivest.
The MD4 message digest algorithm.
In A. J. Menezes and S. A. Vanstone, editors,
  Advances in Cryptology — CRYPTO '90, pages 303–311, Berlin,
  1991. Springer Verlag.
 
- J.E.
  Robbins and D.F. Redmiles.
Cognitive
  support, UML adherence, and XMI interchange in Argo/UML.
Information and Software Technology, 42(2):79–89, 2000.
 
- Rich Robinson.
DigitaScript:
  A scripting language for digital cameras.
Dr. Dobb's Journal, 26(1):126–132, January 2001.
 
- R. Rodriguez.
A system call tracer for UNIX.
In USENIX Conference Proceedings, pages 72–80, Berkeley, CA,
  Summer 1986. USENIX Association.
 
- Eva Rose
  and Kristoffer Høgsbro Rose.
Java access protection through typing.
In S. Drossopoulou, S. Eisenbach,
  B. Jacobs, G. T. Leavens,
  P. Müller, and A. Poetzsch-Heffter,
  editors, Formal Techniques for Java Programs, pages 136–142.
  Technical Report 269, Fernuniversität Hagen, 2000.
Available online
  http://www.informatik.fernuni-hagen.de/pi5/publications.html.
 
- David S.
  Rosenblum.
Towards a method of programming with assertions.
In 14th International Conference on Software Engineering, pages
  92–104, New York, May 1992. ACM Press.
 
- David Rosental.
A simple X11 client program — or — how hard can it really be to write
  ``Hello, World''?
In USENIX Conference Proceedings, pages 229–242, Berkeley, CA,
  Winter 1988. USENIX Association.
 
- Douglas T. Ross.
Homilies for humble standards.
Communications of the ACM, 19(11):595–600, November 1976.
 
- Jeff
  Rothenberg.
Avoiding
  technological quicksand: Finding a viable technical foundation for digital
  preservation.
Technical report, Council on Library and Information Resources, 1755
  Massachusetts Av., Washington DC 20036, January 1999.
Online http://www.clir.org/pubs/reports/rothenberg/pub77.pdf, current December
  2002.
 
- Howard
  Rubin, Margaret Johnson, and Susan Iventosch.
The US software industry.
IEEE Software, 19(1):95–97, 2002.
(doi:10.1109/52.976948)
 
- David N. Reshef
  ; Yakir A. Reshef ; Hilary K. Finucane ; Sharon R. Grossman ; Gilean McVean ;
  Peter J. Turnbaugh ; Eric S. L;er ; Michael Mitzenmacher ; Pardis C. Sabeti.
Supporting
  online material for detecting novel associations in large data sets,
  December 2011.
Available online
  http://www.sciencemag.org/content/suppl/2011/12/14/334.6062.1518.DC1.
  Archived through WebCite at http://www.webcitation.org/64DaiQxPC.
 
- H. Sackman, W. J. Erikson,
  and E. H. Grant.
Exploratory experimental studies comparing online and offline programming
  performance.
Communications of the ACM, 11(1):3–11, January 1968.
 
- Ioannis
  Samoladas, Ioannis Stamelos, Lefteris Angelis,
  and Apostolos Oikonomou.
Open source software development should strive for even greater code
  maintainability.
Communications of the ACM, 47(10):83–87, 2004.
(doi:10.1145/1022594.1022598)
 
- Pamela
  Samuelson.
Why the look and feel of software user interfaces should not be protected by
  copyright law.
Communications of the ACM, 32(5):563–572, May 1989.
 
- Bo Sandén.
Coping with Java threads.
Computer, 37(4):20–27, April 2004.
 
- M. Satyanarayanan, Henry H.
  Mashburn, Puneet Kumar, David C. Steere, and
  James J. Kistler.
Lightweight recoverable virtual memory.
ACM Transactions on Computer Systems, 12(1):33–57, 1994.
(doi:10.1145/174613.174615)
 
- Mary Ann
  Scheirer.
The life cycle of an innovation:
  Adoption versus discontinuation of the fluoride mouth rinse program in
  schools.
Journal of Health and Social Behavior, 31(2):203–215, 1990.
 
- Panagiotis Sfetsos, Ioannis
  Stamelos, Lefteris Angelis, and Ignatios S.
  Deligiannis.
Investigating the impact of personality types on communication and
  collaboration-viability in pair programming — an empirical study.
In Pekka Abrahamsson, Michele Marchesi, and
  Giancarlo Succi, editors, Extreme Programming and Agile
  Processes in Software Engineering, 7th International Conference, XP
  2006, pages 43–52, 2006.
Lecture Notes in Computer Science 4044.
(doi:10.1007/11774129_5)
 
- Graeme
  Shanks, Elizabeth Tansley, and Ron Weber.
Representing composites in conceptual modeling.
Communications of the ACM, 47(7):77–80, July 2004.
 
- Jonathan
  Shapiro.
Programming language
  challenges in systems codes: why systems programmers still use C, and what
  to do about it.
In PLOS '06: Proceedings of the 3rd workshop on Programming languages and
  operating systems, page 9, New York, NY, USA, 2006. ACM Press.
(doi:10.1145/1215995.1216004)
 
- Mary Shaw
  and David Garlan.
Formulations and formalisms in software architecture.
In Jan van Leeuwen, editor, Computer Science Today: Recent
  Trends and Developments, pages 307–323. Springer Verlag, Berlin,
  1995.
Lecture Notes in Computer Science 1000.
 
- Mary Shaw.
Writing good
  software engineering research papers.
In Proceedings of the 25th International Conference on Software
  Engineering, pages 726–726. IEEE Computer Society, May 2003.
 
- Blair H.
  Sheppard, Jon Hartwick, and Paul R. Warshaw.
The theory of reasoned action: A
  meta-analysis of past research with recommendations for modifications and
  future research.
The Journal of Consumer Research, 15(3):325–343, 1988.
 
- Jim Shore.
Fail fast.
IEEE Software, 21(5):21–25, September/October 2004.
 
- Jeremy
  Siek and Andrew Lumsdaine.
Concept checking: Binding
  parametric polymorphism in C++.
In First Workshop on C++ Template Programming, October
  2000.
 
- Charles Simonyi.
The death of computer languages and the birth of intentional programming.
Technical Report MSR-TR-95-52, Microsoft Corporation, Redmond, WA, September
  1995.
Available online at ftp://ftp.research.microsoft.com/pub/tr/tr-95-52.ps.
 
- Charles
  Simonyi.
The death of computer languages and the birth of intentional programming.
In NATO Science Committee Conference, 1995.
 
- Alok Sinha.
Client-server computing.
Communications of the ACM, 35(7):77–98, July 1992.
 
- I. Skaldidis, A. E. Germenis,
  N. Patsopoulos, and D. Trichopoulos.
The impact of
  Greek publications on the international literature by scientific
  category.
Archives of Hellenic Medicine, 21(5):472–479, September 2004.
In Greek.
 
- Brian K.
  Smith, Erik Blankinship, Alfred Ashford III,
  Michael Baker, and Timothy Hirzel.
Inquiry with imagery:
  Historical archive retrieval with digital cameras.
In Proceedings of the seventh ACM International Conference on Multimedia
  (Part 1), pages 405–408, New York, 1999. ACM Press.
(doi:10.1145/319463.319675)
 
- B. Smith,
  W. Yurcik, and D. Doss.
Ethical hacking: The security justification redux.
In ISTAS'02: International Symposium on Technology and Society,
  pages 374–379, June 2002.
(doi:10.1109/ISTAS.2002.1013840)
 
- Brian Cantwell
  Smith.
Procedural
  Reflection in Programming Languages.
PhD thesis, Massachusetts Institute of Technology, January 1982.
 
- William Smith.
Nuber cruncing in C.
The C Users Journal, pages 37–45, May 1992.
 
- Steven R.
  Snapp, Stephen E. Smaha, Daniel M. Teal, and
  Tim Grance.
The DIDS (distributed intrusion detection system) prototype.
In USENIX Conference Proceedings, pages 227–233, Berkeley, CA,
  Summer 1992. USENIX Association.
 
- Gregor
  Snelting.
Reengineering of configurations based on mathematical concept analysis.
ACM Transactions on Software Engineering and Methodology,
  5(2):146–189, 1996.
(doi:10.1145/227607.227613)
 
- Eugene H.
  Spafford.
The internet worm program: An analysis.
Technical Report CSD-TR-823, Purdue University, West Lafayette, IN 47907-2004,
  November 1988.
 
- Yiannis E.
  Spanos, Gregory P. Prastacos, and Angeliki
  Poulymenakou.
The
  relationship between information and communication technologies adoption and
  management.
Information and Management, 39(8):659 – 675, 2002.
(doi:10.1016/S0378-7206(01)00141-0)
 
- Alfred Z. Spector and David
  Gifford.
The Space Shuttle primary computer system.
Communications of the ACM, 27(9):874–900, September 1984.
 
- Alfred Z. Spector and David
  Gifford.
A computer science perspective of bridge design.
Communications of the ACM, 29(4):268–283, April 1986.
 
- Terry Speed.
A correlation for the 21st century.
Science, 334:1502, 2011.
(doi:10.1126/science.1215894)
 
- James C.
  Spohrer.
Information in
  places.
IBM Systems Journal, 38(4):602–628, 1999.
 
- Rahul Srivastava.
XML
  schema: Understanding structures.
Available online
  http://www.oracle.com/technology/pub/articles/srivastava_structures.html.
 
- Ian St James-Roberts, Marissa
  Alvarez, Emese Csipke, Tanya Abramsky,
  Jennifer Goodwin, and Esther Sorgenfrei.
Infant Crying and Sleeping in London, Copenhagen and When Parents Adopt a
  "Proximal" Form of Care.
Pediatrics, 117(6):e1146–1155, 2006.
(doi:10.1542/peds.2005-2387)
 
- Carl
  Staelin and Larry McVoy.
mhz:
  Anatomy of a micro-benchmark.
In USENIX Conference Proceedings, Berkeley, CA, June 1998.
  USENIX Association.
 
- Michael Stal.
Web services: Beyoond component-based computing.
Communications of the ACM, 45(10):71–76, October 2002.
 
- Ioannis
  Stamelos, Lefteris Angelis, Apostolos
  Oikonomou, and Georgios L. Bleris.
Code
  quality analysis in open source software development.
Information Systems Journal, 12(1):43–60, 2002.
 
- J. T. Stasko.
Tango: A framework and system for algorithm animation.
IEEE Computer, 23(9):27–39, September 1990.
 
- Joseph L.
  Stephen.
Adding run-time checking to the portable C compiler.
Software: Practice & Experience, 22(4):306–316, April 1992.
 
- W. Richard Stevens and
  Jan-Simon Pendry.
Portals in 4.4bsd.
In USENIX 1995 Technical Conference Proceedings, Berkeley, CA,
  January 1995. USENIX Association.
 
- Katherine J. Stewart and
  Sanjay Gosain.
The impact of ideology on effectiveness in open source software development
  teams.
Management Information Systems Quarterly, 30(2):291–314, June
  2006.
 
- James M. Stichnoth and Thomas
  Gross.
Code composition as
  an implementation language for compilers.
In Ramming [Ramming, 1997], pages 119–132.
 
- Kevin J. Stiroh.
Investing
  in information technology: Productivity payoffs for U.S. industries.
Current Issues in Economics and Finance, 7(6), June 2001.
 
- K.-J.
  Stol and M. Ali Babar.
Challenges in using open source software in product development: A review of
  the literature.
In International Conference on Software Engineering, pages 17–22,
  2010.
(doi:10.1145/1833272.1833276)
 
- Clifford Stoll.
Stalking the wily hacker.
Communications of the ACM, 31(5):484–497, May 1988.
 
- Bjarne
  Stroustrup.
Data abstraction in C.
Bell System Technical Journal, 63(8):1701–1732, October
  1984.
 
- B. Stvilia, M. B. Twidale,
  L. C. Smith, and L. Gasser.
Assessing
  information quality of a community-based encyclopedia.
In Proceedings of the International Conference on Information Quality -
  ICIQ 2005, pages 442–454, 2005.
 
- Fernando F.
  Suarez, Michael A. Cusumano, and Steven J.
  Kahl.
Services and the business models of product firms: An empirical analysis of the
  software industry.
Management Science.
 
- John O.
  Summers.
Guidelines for conducting research and publishing in marketing: From
  conceptualization through the review process.
Journal of the Academy of Marketing Science, 29(4):404–415, 2001.
(doi:10.1177/03079450094243)
 
- Ivan
  Sutherland.
Technology
  and courage.
Sun Labs Perspectives Essay Series 96-1, Sun Microsystems Laboratories, Santa
  Clara, CA, April 1996.
Available online
  http://research.sun.com/techrep/Perspectives/smli_ps-1.pdf.
 
- Robert A.
  Sutterfield.
Low-cost IP connectivity, December 1991.
 
- Joe Tajnai.
Serial
  Infrared Physical Layer Link Specification.
Infrared Data Association, version 1.2 edition, November 1997.
Online. http://www.irda.org/standards/pubs/IrPHY_1_2.PDF. 11 April 1998.
 
- M. Kobayashi K.
  Takeda.
Information retrieval on the Web.
ACM Computing Surveys, 32(2):144–173, June 2000.
 
- Paul Tanner.
Software portability: still an open issue?
StandardView, 4(2):88–93, June 1996.
 
- Herb
  Taylor, Danny Chin, Stan Knight, and
  James Kaba.
The
  magic video-on-demand server and real-time simulation system.
IEEE Parallel & Distributed Technology, 3(2):40–51, Summer
  1995.
 
- Rahul
  Telang and Sunil Wattal.
An empirical analysis of the impact of software vulnerability announcements on
  firm stock price.
IEEE Transactions on Software Engineering, 33(8):544–557, 2007.
(doi:10.1109/TSE.2007.70712)
 
- C. Teng.
Personality differences between online game players and nonplayers in a student
  sample.
CyberPsychology & Behavior, 11(2):232–234, April 2008.
 
- John Thackara.
The design challenge of pervasive computing.
Interactions, 8(3):46–52, 2001.
 
- Harold
  Thimberly.
A critique of Java.
Software: Practice & Experience, 29(5):457–478, 1999.
 
- K. Thomas, R. Wall,
  A. S. James, and P. Mann.
A methodology for assessment of the carbon neutrality of products.
In M. Hadfield and Y. Wang, editors, 2nd
  International Conference on Tribology in Environmental Design, pages
  31–38, 2003.
 
- Ken Thompson.
Programming techniques: Regular expression search algorithm.
Communications of the ACM, 11(6):419–422, 1968.
(doi:10.1145/363347.363387)
 
- Ken L.
  Thompson.
Reflections on trusting trust.
Communications of the ACM, 27(8):761–763, August 1984.
 
- Ken Thompson.
A new C compiler.
In Proceedings of the Summer 1990 UKUUG Conference, pages
  41–51. UKUUG, July 1990.
 
- Walter F. Tichy.
Programming-in-the-large: Past, present and future.
In 14th International Conference on Software Engineering, pages
  362–367, New York, May 1992. ACM Press.
 
- Frank Tip.
A survey of program slicing techniques.
Technical Report CS-R9438, Centrum voor Wiskunde en Informatica, Amsterdam,
  1994.
 
- Frank Tip.
A survey of program slicing techniques.
Journal of Programming Languages, 3(3):121–189, September
  1995.
 
- Lance
  Tokuda and Don Batory.
Evolving
  object-oriented designs with refactorings.
Automated Software Engineering, 8:89–120, 2001.
 
- Charles E. Trevethan,
  Thomas D. Taylor, Raymond G. Hartenstein,
  Ann C. Merwarth, and William N. Stewart.
Development and application of NASA's first standard spacecraft computer.
Communications of the ACM, 27(9):902–925, September 1984.
 
- Q. Tu and
  M.W. Godfrey.
The build-time software architecture view.
In ICSM'01: Proceedings of the IEEE International Conference on Software
  Maintenance, pages 398–407, 2001.
(doi:10.1109/ICSM.2001.972753)
 
- Edward R. Tufte.
The Cognitive
  Style of PowerPoint.
Graphics Press, Cheshire, CT, 2004.
 
- Shmuel Tyszberowicz and Amiram
  Yehudai.
OBSERV
  — a prototyping language and environment.
ACM Transactions on Software Engineering and Methodology,
  1(3):269–309, July 1992.
 
- Mark D. Uncles.
Journal rankings: How much credence should we give them.
Australasian Marketing Journal, 12(2):67–72, 2004.
 
- USENIX Association.
Very High Level Languages Workshop (VHLL), Berkeley, CA, October
  1994. USENIX Association.
 
- Lauera A. Valaer and Robert G.
  Babb II.
Choosing a user interface development tool.
IEEE Software, 14(4):29–39, July / August 1997.
 
- Arie
  van Deursen and Paul Klint.
Little languages: Little maintenance.
Journal of Software Maintenance, 10(2):75–92, 1998.
(doi:10.1002/(SICI)1096-908X(199803/04)10:2<75::AID-SMR168>3.0.CO;2-5)
 
- Fiona Veira.
Analysis: Greece.
PC Europa, 8(9):13–17, May 1998.
 
- Todd L.
  Veldhuizen.
Five
  compilation models for C++ templates.
In First Workshop on C++ Template Programming, Erfurt, Germany,
  October 2000.
 
- László Vidács and
  Árpád Beszédes.
Opening up the C/C++ preprocessor black box.
In Proceedings of the Eight Symposium on Programming Languages and
  Software Tools (SPLST'03), pages 45–57, June 2003.
 
- László Vidács, Árpád
  Beszédes, and Rudolf Ferenc.
Columbus schema for C/C++ preprocessing.
In CSMR '04: Proceedings of the Eighth European Conference on Software
  Maintenance and Reengineering, pages 75–84. IEEE Computer Society,
  March 2004.
 
- John
  Viega, Joshua T. Bloch, Tadayoshi Kohno, and
  Gary McGraw.
ITS4: A static
  vulnerability scanner for C and C++ code.
In Proceedings of the 16th Annual Computer Security Applications
  Conference (ACSAC'00), page 257, Washington, DC, December 2000. IEEE
  Computer Society.
 
- Fernanda B. Viégas, Martin
  Wattenberg, and Kushal Dave.
Studying cooperation
  and conflict between authors with history flow visualizations.
In CHI '04: Proceedings of the SIGCHI conference on Human factors in
  computing systems, pages 575–582, New York, NY, USA, 2004. ACM Press.
(doi:10.1145/985692.985765)
 
- Marian Vittek.
Refactoring browser
  with preprocessor.
In CSMR '03: Proceedings of the Seventh European Conference on Software
  Maintenance and Reengineering, page 101. IEEE Computer Society,
  2003.
 
- Jeffrey M. Voas.
Certifying off-the-shelf software components.
Computer, 31(6):53–59, June 1998.
 
- Jeffrey M. Voas.
The challenges of using COTS software in component-based development.
Computer, 31(6):44–45, June 1998.
 
- Werner Vogels.
Web services are not distributed objects.
IEEE Internet Computing, 7(6):59–66, November/December 2003.
 
- Jakob Vo s .
Measuring
  Wikipedia.
In 10th International Conference of the International Society for
  Scientometrics and Informetrics, pages 221–231, July 2005.
 
- George
  Vouros, Vangelis Karkaletsis, and Costas
  Spyropoulos.
Documentation and translation.
In P. A. V. Hall and R. Hudson, editors,
  Software Without Frontiers, chapter 10. Wiley, 1996.
 
- Daniel G. Waddington and Bin
  Yao.
High-fidelity C/C++ code transformation.
Electronic Notes in Theoretical Computer Science, 141(4):35–56,
  2005.
(doi:10.1016/j.entcs.2005.04.037)
 
- Gregory K.
  Wallace.
The JPEG still picture compression standard.
Communications of the ACM, 34(4):30–44, April 1991.
 
- Gregory K.
  Wallace.
The JPEG picture compression standard.
IEEE Transactions on Consumer Electronics, 38(1), 1992.
 
- Roy
  Want and Gaetano Borriello.
Survey on
  information appliances.
Computers Graphics and Applications, 20(3):24–31, May/June
  2000.
 
- Roy Want
  and Bill Schilit.
Expanding the horizons of location-aware computing.
Computer, 34(8):31–34, August 2001.
 
- Roy Want,
  Trevor Pering, Gaetano Borriello, and
  Keith I. Farkas.
Disappearing hardware.
IEEE Pervasive Computing, 1(1):36–47, January-March 2002.
 
- Karsten Weihe.
A software engineering perspective on algorithmics.
ACM Computing Surveys, 33(3):89–134, March 2001.
 
- Mark Weiser.
The computer of the 21st century.
Scientific American, 265(3):66–75, September 1991.
 
- Laurie Honour
  Werth.
Predicting student
  performance in a beginning computer science class.
In SIGCSE '86: Proceedings of the seventeenth SIGCSE technical symposium
  on Computer science education, pages 138–143, New York, NY, USA,
  1986. ACM.
(doi:10.1145/5600.5701)
 
- P. Wessel and W. H. F. Smith.
Free software helps map and display data.
EOS Transactions American Geophysical Union, 72(41):441, 445–446,
  1991.
 
- James C.
  Wetherbe.
Research
  center models for attracting corporate funding.
Communications of AIS, 7(7), August 2001.
 
- Michael J.
  Wiener.
Efficient DES key search, August 1993.
 
- Jeremiah
  Willcock, Jaakko Järvi, Andrew Lumsdaine,
  and David Musser.
A
  formalization of concepts for generic programming.
In Concepts: a Linguistic Foundation of Generic Programming at Adobe Tech
  Summit, San Jose, CA. Adobe Systems, April 2004.
 
- Laurie Williams and Alistair
  Cockburn.
Agile software development: It's about feedback and change.
IEEE Computer, 36(6):39–43, July 2003.
Feature issue on Agile Methods.
 
- H. E.
  Williams, J. Zobel, and S. Heinz.
Self-adjusting trees in practice for large text collections.
Software: Practice & Experience, 31(10):925–940, August
  2001.
 
- Ross N.
  Williams.
An
  introduction to digest algorithms.
Online. ftp://ftp.rocksoft.com/clients/rocksoft/papers/digest10.ps,
  September 1994.
Australian Decus Symposium 1994, Canberra, Australia.
 
- Alan
  Cameron Wills and Desmond D'Souza.
Catalysis — rigorous
  component-based development.
Available online http://www.trireme.com/catalysis/catpaper.pdf, December 1999,
  October 1997.
 
- Alan Cameron
  Wills.
Designing component
  kits and architectures.
In Barroca et al. [Barroca et al.,
  1999].
 
- Victor L.
  Winter, John M. Covan, Larry J. Dalton,
  Leon Alkalai, Ann T. Tai, Rick
  Harper, Barry Flahive, Wei-Tek Tsai,
  Ramin Mojdehbakhsh, Sanjai Rayadurgam,
  Kinji Mori, and Michael R. Lowry.
Key applications for
  high-assurance systems.
Computer, 31(4):35–45, April 1998.
 
- Niklaus Wirth.
From programming language design to computer construction.
Communications of the ACM, 28(2):159–164, February 1985.
 
- W. Eric
  Wong, Joseph R. Horgan, Swapna S. Gokhale, and
  Kishor S. Trivedi.
Locating program features using execution slices.
In Proceedings of the 1999 IEEE Symposium on Application-Specific Systems
  and Software Engineering & Technology, 1999.
 
- W. Eric
  Wonga, Robert L. Glass, Victor R. Basili, and
  T.Y. Chen.
An assessment of systems and software engineering scholars and institutions
  (2003–2007 and 2004–2008).
Journal of Systems and Software, 84(1):162–168, January
  2011.
 
- Gene Woolsey.
An exemplary essay on communication or corporate style, corporate substance, &
  the sting.
Interfaces, 9(3):10–12, May 1979.
 
- M. T. Wright.
The Antikythera mechanism.
A & G, 42:3.9, June 2001.
 
- M. T. Wright.
The Antikythera mechanism: A new gearing scheme.
Bulletin of the Scientific Instrument Society, 85:2–7, June
  2005.
 
- M. T. Wright.
The Antikythera mechanism and the early history of the moon-phase display.
Antiquarian Horology, 29:319–329, March 2006.
 
- David R. Wright.
Towards a theory of software design: Timeless principles of software system
  design.
In Hisham Al-Mubaid and Marc Garbey, editors,
  SEDE, pages 320–325. ISCA, 2007.
 
- R. Wuyts.
Declarative reasoning
  about the structure of object-oriented systems.
In TOOLS '98: Proceedings of the Technology of Object-Oriented Languages
  and Systems, pages 112–124, Washington, DC, 1998. IEEE Computer
  Society.
 
- Jie Yang,
  Weiyi Yang, Matthias Denecke, and
  Alex Waibel.
Smart sight: A tourist assistant system.
In Third International Symposium on Wearable Computers (ISWC '99),
  pages 73–78. IEEE Computer Society, October 1999.
 
- H. Yang,
  H. Kang, and R. Mason.
An exploratory study on meta skills in software development teams: antecedent
  cooperation skills and personality for shared mental models.
European Journal of Information Systems, 17(1):47–61, February
  2008.
 
- Jonathan Yavner.
Back-progrpagation of knowledge from syntax tree to c source code.
ACM SIGPLAN Notices, 39(3):31–37, March 2004.
 
- Ozan Yigit.
Sdbm — substitute DBM or Berkeley ndbm for every UN*X made simple.
Part of the Perl 5 distribution, December 1990.
 
- Yasuhiko Yokote.
The
  Apertos reflective operating system: The concept and its
  implementation.
ACM SIGPLAN Notices, 27(10):414–434, October 1992.
Proceedings of the 1992 ACM SIGPLAN Conference on Object-Oriented Programming
  Systems, Languages and Applications (OOPSLA '92).
 
- Doug Young.
Programming with the X toolkit.
Unix World, pages 123–135, January 1990.
 
- Yijun Yu,
  Homy Dayani-Fard, and John Mylopoulos.
Removing false code dependencies to speedup software build processes.
In CASCON '03: Proceedings of the 2003 Conference of the Centre for
  Advanced Studies on Collaborative Research, pages 343–352. IBM Press,
  2003.
 
- Huiming Yu.
Using
  object-oriented techniques to develop reusable components.
In Proceedings of the conference on TRI-Ada '97, pages 117–124.
  ACM, 1997.
 
- Justin
  Zobel, Steffen Heinz, and Hugh E. Williams.
In-memory hash tables for accumulating text vocabularies.
Information Processing Letters, 80(6):271–277, December
  2001.