85 papers:
- ICSME-2015-XiaLWY #analysis #bibliography #recommendation
- Who should review this change?: Putting text and file location analyses together for more accurate recommendations (XX, DL, XW, XY), pp. 261–270.
- SANER-2015-ThongtanunamTKY #approach #bibliography #code review #perspective #recommendation
- Who should review my code? A file location-based code-reviewer recommendation approach for Modern Code Review (PT, CT, RGK, NY, HI, KiM), pp. 141–150.
- CSCW-2015-TrainerCKH #community #question #what
- From Personal Tool to Community Resource: What’s the Extra Work and Who Will Do It? (EHT, CC, AK, JDH), pp. 417–430.
- DUXU-IXD-2015-RaffaeleAJCPCS #analysis #game studies #legacy #multi #usability
- Doctor Who: Legacy, an Analysis of Usability and Playability of a Multi-platform Game (RR, RA, IJ, BC, GP, BJAdC, MMS), pp. 283–291.
- KDD-2015-FlaxmanWS
- Who Supported Obama in 2012?: Ecological Inference through Distribution Regression (SRF, YXW, AJS), pp. 289–298.
- HT-2014-CunhaMGCA #how #social
- How you post is who you are: characterizing google+ status updates across social groups (EC, GM, MAG, CC, VA), pp. 212–217.
- CHI-2014-HaimsonBH #online
- DDFSeeks same: sexual health-related language in online personal ads for men who have sex with men (OLH, JRB, GRH), pp. 1615–1624.
- HIMI-AS-2014-GotzeBPB #quote
- “A Careful Driver is One Who Looks in Both Directions When He Passes a Red Light” — Increased Demands in Urban Traffic (MG, FB, IPS, KB), pp. 229–240.
- LCT-NLE-2014-Jo0L #analysis #empirical #people
- Empirical Analysis of Changes in Human Creativity in People Who Work with Humanoid Robots and Their Avatars (DJ, JGL, KCL), pp. 273–281.
- KDD-2014-BarbieriBM #predict #why
- Who to follow and why: link prediction with explanations (NB, FB, GM), pp. 1266–1275.
- KDD-2014-BiKWC #resource management #topic
- Who are experts specializing in landscape photography?: analyzing topic-specific authority on content sharing services (BB, BK, CW, JC), pp. 1506–1515.
- SEKE-2014-CostaFM #collaboration #development #distributed #question
- Collaborative Merge in Distributed Software Development: Who Should Participate? (CC, JJCF, LM), pp. 268–273.
- SIGIR-2014-ChengCBB #approach #twitter
- Who is the barbecue king of texas?: a geo-spatial approach to finding local experts on twitter (ZC, JC, HB, VB), pp. 335–344.
- MoDELS-2014-ReggioLR #bibliography #uml #what
- Who Knows/Uses What of the UML: A Personal Opinion Survey (GR, ML, FR), pp. 149–165.
- MSR-2013-HamasakiKYCFI #bibliography #code review #dataset #repository #what
- Who does what during a code review? datasets of OSS peer review repositories (KH, RGK, NY, AECC, KF, HI), pp. 49–52.
- WCRE-2013-ChenSB #c #detection #memory management
- Who allocated my memory? Detecting custom memory allocators in C binaries (XC, AS, HB), pp. 22–31.
- CSCW-2013-GrayEVL #facebook
- Who wants to know?: question-asking and answering practices among facebook users (RG, NBE, JV, CL), pp. 1213–1224.
- OCSC-2013-YueSC #network #social
- Who Are Seeking Friends? The Portrait of Stranger-Seeker in Social Network Sites (XY, YS, HC), pp. 120–125.
- ICEIS-v3-2013-BorgesRMS #facebook #privacy
- Who Is This Guy Who Liked My Picture? — Privacy Control Mechanisms on Facebook for Generations X and Y (GB, TR, CM, PCdS), pp. 179–186.
- KDD-2013-YuanCMSM #topic #twitter #what
- Who, where, when and what: discover spatio-temporal topics for twitter users (QY, GC, ZM, AS, NMT), pp. 605–613.
- SIGIR-2013-LuoOTW #twitter
- Who will retweet me?: finding retweeters in twitter (ZL, MO, JT, TW), pp. 869–872.
- CAV-2013-HeizmannHP #automaton #model checking #people
- Software Model Checking for People Who Love Automata (MH, JH, AP), pp. 36–52.
- SIGMOD-2012-GuoPG
- So who won?: dynamic max discovery with the crowd (SG, AGP, HGM), pp. 385–396.
- VLDB-2012-ChengSCWY #named
- K-Reach: Who is in Your Small World (JC, ZS, HC, HW, JXY), pp. 1292–1303.
- VLDB-2012-DasTADY #analysis #framework #what
- Who Tags What? An Analysis Framework (MD, ST, SAY, GD, CY), pp. 1567–1578.
- ICSM-2012-KoutersVSB #gnome #repository #using
- Who’s who in Gnome: Using LSA to merge software repository identities (EK, BV, AS, MvdB), pp. 592–595.
- MSR-2012-BirdN #development #distributed #open source #scalability #what
- Who? Where? What? Examining distributed development in two large open source projects (CB, NN), pp. 237–246.
- FM-2012-Wassyng #question #what
- Who Are We, and What Are We Doing Here? (AW), pp. 7–9.
- CHI-2012-WangK #development #exclamation #topic #twitter
- Twitter and the development of an audience: those who stay on topic thrive! (YCW, RK), pp. 1515–1518.
- CSCW-2012-AndreBL #microblog #twitter
- Who gives a tweet?: evaluating microblog content value (PA, MSB, KL), pp. 471–474.
- SIGIR-2012-LeiCCIH #layout #retrieval #scalability
- Where is who: large-scale photo retrieval by facial attributes and canvas layout (YHL, YYC, BCC, LI, WHH), pp. 701–710.
- FSE-2012-CanforaPOP #open source #question
- Who is going to mentor newcomers in open source projects? (GC, MDP, RO, SP), p. 44.
- CHI-2011-GuyPDGT #crowdsourcing #game studies #graph #social
- Guess who?: enriching the social graph through a crowdsourcing game (IG, AP, TD, OG, IT), pp. 1373–1382.
- HCI-MIIE-2011-AhmadTSSK #framework #interactive
- Guess Who? An Interactive and Entertaining Game-Like Platform for Investigating Human Emotions (MIA, HT, MS, SS, EK), pp. 543–551.
- HCI-UA-2011-FangZ #game studies #question #what
- Extraversion and Computer Game Play: Who Plays What Games? (XF, MZ), pp. 659–667.
- CIKM-2011-HopcroftLT #predict
- Who will follow you back?: reciprocal relationship prediction (JEH, TL, JT), pp. 1137–1146.
- KDD-2011-DrorKMS #exclamation #recommendation
- I want to answer; who has a question?: Yahoo! answers recommender system (GD, YK, YM, IS), pp. 1109–1117.
- KDD-2011-HendersonGLAETF #graph #mining #recursion #using
- It’s who you know: graph mining using recursive structural features (KH, BG, LL, LA, TER, HT, CF), pp. 663–671.
- KDD-2011-SnowsillFBC #question
- Refining causality: who copied from whom? (TMS, NF, TDB, NC), pp. 466–474.
- SIGIR-2011-CuiWLOYS #predict #ranking #social #what
- Who should share what?: item-level social influence prediction for users and posts ranking (PC, FW, SL, MO, SY, LS), pp. 185–194.
- DAC-2010-NSRKALPST #problem #question #variability
- Who solves the variability problem? (NN, JCR, JK, RCA, CL, VP, AJS, ST), pp. 218–219.
- CHI-2010-ChettyBHRSGKK
- Who’s hogging the bandwidth: the consequences of revealing the invisible in the home (MC, RB, RHRH, TR, AS, CG, TK, PBK), pp. 659–668.
- CHI-2010-Sarcevic #quote
- “Who’s scribing?”: documenting patient encounter during trauma resuscitation (AS), pp. 1899–1908.
- CHI-2010-ShengHKCD #analysis #effectiveness
- Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions (SS, MBH, PK, LFC, JSD), pp. 373–382.
- CIKM-2010-BethardJ #behaviour #learning #modelling
- Who should I cite: learning literature search models from citation behavior (SB, DJ), pp. 609–618.
- RecSys-2010-ZhaoZYZZF #recommendation #social #what
- Who is talking about what: social map-based recommendation for content-centric social websites (SZ, MXZ, QY, XZ, WZ, RF), pp. 143–150.
- RE-2010-Gervasi #design #interactive #problem
- Who Framed Roger User? Problem Frames as a User Interaction Design Tool (VG), pp. 377–378.
- ICPC-2009-KagdiP #question
- Who can help me with this change request? (HHK, DP), pp. 273–277.
- WCRE-1999-PentaG99a #how #question #source code
- Who are Source Code Contributors and How do they Change? (MDP, DMG), pp. 11–20.
- CHI-2009-SchechterER #approach #authentication #social #what
- It’s not what you know, but who you know: a social approach to last-resort authentication (SES, SE, RWR), pp. 1983–1992.
- CHI-2009-TsaiKDCHS #feedback #mobile
- Who’s viewed you?: the impact of feedback in a mobile location-sharing application (JYT, PGK, PHD, LFC, JIH, NMS), pp. 2003–2012.
- IDGD-2009-EugeneHMBRL #authentication #design #process #what
- This Is Who I Am and This Is What I Do: Demystifying the Process of Designing Culturally Authentic Technology (WE, LH, KM, QB, YAR, SL), pp. 19–28.
- OCSC-2009-MilettoPHF #question #web
- Who Are the Web Composers? (EMM, MSP, AFH, LVF), pp. 381–390.
- OCSC-2009-OganAKJ #education #game studies #learning #question #social
- Antecedents of Attributions in an Educational Game for Social Learning: Who’s to Blame? (AO, VA, JK, CJ), pp. 593–602.
- CIKM-2009-CarmelRY #framework
- Who tags the tags?: a framework for bookmark weighting (DC, HR, EYT), pp. 1577–1580.
- SIGIR-2009-KapteinMK #what
- Who said what to whom?: capturing the structure of debates (RK, MM, JK), pp. 831–832.
- DAC-2008-ReyKRCVKT #challenge #generative #multi #question
- Next generation wireless-multimedia devices: who is up for the challenge? (JCR, AK, JMR, CC, TV, IK, TBT), pp. 353–354.
- ICSM-2008-KagdiHM #question #source code
- Who can help me with this source code change? (HHK, MH, JIM), pp. 157–166.
- CSCW-2008-CummingsK #collaboration #distributed #experience #research
- Who collaborates successfully?: prior experience reduces collaboration barriers in distributed interdisciplinary research (JNC, SBK), pp. 437–446.
- RecSys-2008-KrishnanNNDK #online #predict #recommendation
- Who predicts better?: results from an online study comparing humans and an online recommender system (VK, PKN, MN, RTD, JAK), pp. 211–218.
- HT-2007-SteinH #case study #matter #wiki
- Does it matter who contributes: a study on featured articles in the german wikipedia (KS, CH), pp. 171–174.
- RE-2007-KwanMD #requirements
- Viewing Project Collaborators WhoWork on Interrelated Requirements (IK, SM, DD), pp. 369–370.
- ICSE-2007-HonidenTYTW #architecture #development #re-engineering #tool support
- Top SE: Educating Superarchitects Who Can Apply Software Engineering Tools to Practical Development in Japan (SH, YT, NY, KT, HW), pp. 708–718.
- ICEIS-DISI-2006-Jain #how #question #recognition
- Biometric Recognition: How Do I Know Who You Are? (AKJ), pp. 17–18.
- RE-2006-Rosson #requirements
- End Users Who Meet Their Own Requirements (MBR), p. 2.
- ICSE-2006-AnvikHM #debugging #question
- Who should fix this bug? (JA, LH, GCM), pp. 361–370.
- DATE-2005-ZorianFWESGR #industrial #question
- Semiconductor Industry Disaggregation vs Reaggregation: Who Will be the Shark? (YZ, BF, DW, JE, GS, MG, KNR), p. 572.
- CHI-2005-PatilL #configuration management #privacy #what
- Who gets to know what when: configuring privacy permissions in an awareness application (SP, JL), pp. 101–110.
- KDD-2005-NorenOB #database #detection #safety
- A hit-miss model for duplicate detection in the WHO drug safety database (GNN, RO, AB), pp. 459–468.
- DAC-2004-StrojwasCGHKLNPT #fault #question
- When IC yield missed the target, who is at fault? (AJS, MC, VG, JH, JK, ML, WN, DP, MT), p. 80.
- CSCW-2004-TwidaleR #collaboration
- Where am I and who am I?: issues in collaborative technical help (MT, KR), pp. 378–387.
- ICPR-v3-2004-SantanaGD #question
- Who Are You? (MCS, EG, OD), pp. 938–941.
- VLDB-2003-Cluet #database #question #xml
- Who needs XML Databases? (SC), p. 1045.
- DATE-2002-GerousisLPPRS #framework #question
- Who Owns the Platform? (VG, OL, PGP, MP, CR, GS), p. 238.
- CSCW-2002-GrassoM #question
- Who can claim complete abstinence from peeking at print jobs? (AG, JLM), pp. 296–305.
- HT-2001-Hall01a #question #semantics #web
- The semantic web: who needs it? (WH), p. 5.
- KDD-2001-AdderleyM #behaviour #case study #commit #data mining #mining #modelling
- Data mining case study: modeling the behavior of offenders who commit serious sexual assaults (RA, PBM), pp. 215–220.
- ICEIS-2000-MooreICMS #adaptation #what #workflow
- Who Does What? Matching Agents to Tasks in Adaptive Workflow (JPM, RI, PWHC, AM, JS), pp. 181–185.
- TOOLS-USA-2000-MaleyS #question
- But Who Will Guard the Guardians? (DM, ITAS), pp. 227–238.
- CHI-1999-VeinottOOF #video
- Video Helps Remote Work: Speakers Who Need to Negotiate Common Ground Benefit from Seeing Each Other (ESV, JSO, GMO, XF), pp. 302–309.
- HCI-CCAD-1999-MeleES #case study #user interface
- The impact of mobility on user interfaces for subjects who are motor impaired: case study in a wireless LAN environment (IVM, KE, AS), pp. 1018–1022.
- HCI-EI-1999-HeldK99a #design #process
- Who is the Designer? — The B-VOR Process of Participatory Design (JH, HK), pp. 1162–1166.
- CHI-1995-MullerCADWEC #information management
- Telephone Operators as Knowledge Workers: Consultants Who Meet Customer Needs (MJM, RC, CA, BD, CW, CE, JC), pp. 130–137.
- VLDB-1994-Spaccapietra #question #user interface
- User Interfaces; Who Cares? (SS), p. 751.
- CSCW-1988-Linde
- Who’s in Charge here? Cooperative Work and Authority Negotiation in Police Helicopter Missions (CL), pp. 52–64.