Papers
2019
- Wolff, Annika; Wermelinger, Michel and Petre, Marian (2019). Exploring design principles for data literacy activities to support children’s inquiries from complex data. International Journal of Human-Computer Studies, 129 pp. 41–54.
- Bjarnason, Elizabeth; Sharp, Helen and Regnell, Bjorn (2019). Improving Requirements-Test Alignment by Prescribing Practices that Mitigate Communication Gaps. Empirical Software Engineering, 24(4) pp. 2364–2409.
- Petre, Marian (2019). Lessons from Experts. In: ITiCSE '19 - Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, ACM Press p. 331.
- Peters, Fayola; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar (2019). Text Filtering and Ranking for Security Bug Report Prediction. IEEE Transactions on Software Engineering, 45(6) pp. 615–631.
- Lopez, Tamara; Sharp, Helen; Tun, Thein; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar (2019). Talking about Security with Professional Developers. In: 7th International Workshop Series on Conducting Empirical Studies in Industry (CESSER-IP), 28 May 2019, Montréal, Canada.
- Lopez, Tamara; Sharp, Helen; Tun, Thein; Bandara, Arosha; Levine, Mark and Nuseibeh, Bashar (2019). Hopefully We Are Mostly Secure: Views on Secure Code in Professional Practice. In: Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering pp. 61–68.
- Maia, Paulo; Vieira, Lucas; Chagas, Matheus; Yu, Yijun; Zisman, Andrea and Nuseibeh, Bashar (2019). Dragonfly: a Tool for Simulating Self-Adaptive Drone Behaviours. In: The 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 25-26 May 2019, Montreal, Canada, IEEE.
- Liu, Huihui; Yu, Yijun; Li, Bixin; Yang, Yibiao and Jia, Ru (2019). Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical Study. In: Proceedings of the 25th Asia-Pacific Software Engineering Conference (APSEC 2018).
- Chowdhury, Niaz; Price, Blaine; Smith, Andrew; Gooch, Daniel and van der Linden, Janet (2019). 50 Shades of Green and Brown: Comparing Grid Carbon Intensity with Consumption for Households with PV Generation and Battery Storage. In: 2018 IEEE Conference on Technologies for Sustainability (SusTech), 11-13 Nov . 2018, Long Beach, CA, USA.
- Pearson, Simon; May, David; Leontidis, Georgios; Swainson, Mark; Brewer, Steve; Bidaut, Luc; Frey, Jeremy G.; Parr, Gerard; Maull, Roger and Zisman, Andrea (2019). Are Distributed Ledger Technologies the panacea for food traceability? Global Food Security, 20 pp. 145–149.
- Bennaceur, Amel; Tun, Thein Than; Yu, Yijun and Nuseibeh, Bashar (2019). Requirements Engineering. In: Cha, Sungdeok (Steve); Taylor, Richard N. and Kang, Kyo C. eds. Handbook of Software Engineering. Springer, pp. 51–92.
- Hudson, Lorraine; Wolff, Annika; Gooch, Daniel; van der Linden, Janet; Kortuem, Gerd; Petre, Marian; ten Veen, Rianne and O'Connor-Gotra, Sinead (2019). Supporting urban change: using a MOOC to facilitate attitudinal learning and participation in smart cities. Computers & Education, 129 pp. 37–47.
- Hidaka, Soichiro; Hu, Zhenjiang; Litoiu, Marin; Liu, Lin; Martin, Patrick; Peng, Xin; Wang, Guilin and Yu, Yijun (2019). Design and Engineering of Adaptive Software Systems. In: Yu, Yijun; Bandara, Arosha; Honiden, Shinichi; Hu, Zhenjiang; Tamai, Tetsuo; Muller, Hausi; Mylopoulos, John and Nuseibeh, Bashar eds. Engineering Adaptive Software Systems. Singapore: Springer, Singapore, pp. 1–33.
- Yu, Yijun; Nobukazu, Yoshioka and Tamai, Tetsuo (2019). Assessing Security and Privacy Behavioural Risks for Self-Protection Systems. In: Yu, Yijun; Bandara, Arosha; Honiden, Shinichi; Hu, Zhenjiang; Tamai, Tetsuo; Muller, Hausi; Mylopoulos, John and Nuseibeh, Bashar eds. Engineering Adaptive Software Systems. Singapore: Springer, Singapore, pp. 135–147.
- Aschoff, Rafael; Zisman, Andrea and Alexandre, Pedro (2019). Parallel Adaptation of Multiple Service Composition Instances. In: Yu, Yijun; Bandara, Arosha; Honiden, Shinichi; Hu, Zhenjiang; Tamai, Tetsuo; Muller, Haussi; Mylopoulos, John and Nuseibeh, Bashar eds. Engineering Adaptive Software Systems: Communications of NII Shonan Meetings. Springer, pp. 115–134.
- Piwek, Paul; Wermelinger, Michel; Laney, Robin and Walker, Richard (2019). Learning to program: from problems to code. In: Third Conference in Computing Education Practice (CEP), 9 Jan 2019, Durham, UK, Association for Computing Machinery (ACM).
- Yu, Yijun; Bandara, Arosha; Honiden, Shinichi; Hu, Zhenjiang; Tamai, Tetsuo; Muller, Hausi; Mylopoulos, John and Nuseibeh, Bashar eds. (2019). Engineering Adaptive Software Systems. Springer Singapore.
- Barroca, Leonor; Sharp, Helen; Dingsøyr, Torgeir; Gregory, Peggy; Taylor, Katie and AlQaisi, Raid (2019). Enterprise agility: A Balancing Act - a local government case study. In: Agile Processes in Software Engineering and Extreme Programming: 20th International Conference, Proceedings (Kruchten, Philippe; Fraser, Steven and Coallier, François eds.), Lecture Notes in Business Information Processing, Springer, pp. 207–223.
- Bennaceur, Amel; Ghezzi, Carlo; Tei, Kenji; Kehrer, Timo; Weyns, Danny; Calinescu, Radu; Dustdar, Schahram; Honiden, Shinichi; Ishikawa, Fuyuki; Jin, Zhi; Kramer, Jeffrey; Litoiu, Marin; Loreti, Michele; Moreno, Gabriel; Muller, Hausi; Nenzi, Laura; Nuseibeh, Bashar; Pasquale, Liliana; Reisig, Wolfgang; Schmidt, Heinz; Tsigkanos, Christos and Zhao, Haiyan Zhao (2019). Modelling and Analysing Resilient Cyber-Physical Systems. In: 14th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2019, 25-26 May 2019, Montréal, Canada.
- Bennaceur, Amel; Zisman, Andrea; Mccormick, Ciaran; Barthaud, Danny and Nuseibeh, Bashar (2019). Won’t Take No for an Answer: Resource-driven Requirements Adaptation. In: 14th Symposium on Software Engineering for Adaptive and Self-Managing Systems 2019, 25-26 May 2019, Montréal, Canada.
- Blackwell, Alan F.; Petre, Marian and Church, Luke (2019). Fifty years of the Psychology of Programming. International Journal of Human-Computer Studies (Early Access).
- Brewer, Steve; Pearson, Simon; Bidaut, Luc; Frey, Jeremy G; Parr, Gerard and Zisman, Andrea (2019). The Internet of Food Things: Adding Values to the Digitalisation of the UK Food Supply Chain. In: 2nd Living in the Internet of Things Conference, 01-02 May 2019, London, UK.
- Brown, Megan; Patel, Manish; Lewis, Stephen and Bennaceur, Amel (2019). Measuring the variation and distribution of ozone in the martian atmosphere. In: 8th Conference of Astrobiology Society of Britain, 25-26 Apr 2019, Newcastle University.
- Bui, Nghi; Yu, Yijun and Jiang, Lingxiao (2019). Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification. In: The 26th IEEE International Conference on Software Analysis, Evolution, and Reengineering (Lo, David and Shihab, Emad eds.), 24-27 Feb 2019, Hangzhou, China, IEEE Computer Society.
- Bui, Nghi D. Q.; Yu, Yijun and Jiang, Lingxiao (2019). SAR: Learning Cross-Language API Mappings with Little Knowledge. In: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (Apel, Sven and Russo, Alessandra eds.), 26-30 Aug 2019, Tallinn, Estonia, ACM.
- França, César; da Silva, Fabio Q. B. and Sharp, Helen (2019). Motivation and Satisfaction of Software Engineers. IEEE Transactions on Software Engineering (Early Access).
- Kear, Karen; Smith, Andrew; Donelan, Helen; Mikroyannidis, Alexander; Jones, Allan; Rosewell, Jonathan; Wermelinger, Michel; Connolly, Teresa; Sanders, Chris; Peasgood, Alice; Williams, Judith; Moss, Nicky and Third, Allan (2019). An Open Networking Lab for practical open education. In: OER19: Recentering Open, 10-11 Apr 2019, National University of Ireland, Galway.
- Leigh, Andrew; Wermelinger, Michel and Zisman, Andrea (2019). Risk Containers – A Help or Hindrance to Practitioners? In: IEEE International Conference on Software Architecture (ICSA 2019), 25-29 Mar 2019, Hamburg.
- Lopez, Tamara; Tun, Thein; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen (2019). An Anatomy of Security Conversations in Stack Overflow. In: 41st ACM/IEEE International Conference on Software Engineering, 25 May - 1 Jun 2019, Montréal, Canada, (In Press).
- Lotz, Nicole and Sharp, Helen (2019). Challenges for interaction design education in the South: a case study of Botswan. Journal of International Development (In Press).
- Wilkins, Denise; Nuseibeh, Bashar and Levine, Mark (2019). Monetize This? Marketized-Commons Platforms, New Opportunities and Challenges for Collective Action. In: HCII 2019, Proceedings Part III: Human-Computer Interaction. Design Practice in Contemporary Societies, Lecture Notes in Computer Science, Springer, pp. 130–147.
- Yu, Yijun (2019). fAST: Flattening Abstract Syntax Trees for Efficiency. In: 41st ACM/IEEE International Conference on Software Engineering, 25-31 May 2019, Montreal, Canada, ACM and IEEE.
- Yu, Yijun; Wang, Xiaozhu; Dil, Anton and Rauf, Irum (2019). Teaching the Art of Computer Programming at a Distance by Generating Dialogues using Deep Neural Networks. In: 28th ICDE World Conference on Online Learning, 3-7 Nov 2019, Dublin, Ireland, (In Press).
2018
- Liu, Huihui; Yu, Yijun; Li, Bixin; Yang, Yibiao and Jia, Ru (2018). Are Smell-Based Metrics Actually Useful in Effort-Aware Structural Change-Proneness Prediction? An Empirical Study. In: 25th Asia-Pacific Software Engineering Conference, 4-7 Dec 2018, Nara, Japan.
- Yuan, Zhengheng; Chen, Xiaohong; Liu, Jing; Yu, Yijun; Sun, Haiying; Zhou, Tingliang and Jin, Zhi (2018). Simplifying the Formal Verification of Safety Requirements in Zone Controllers through Problem Frames and Constraints based Projection. IEEE Transactions on Intelligent Transportation Systems, 19(11) pp. 3517–3528.
- Hutton, Luke; Price, Blaine A.; Kelly, Ryan; McCormick, Ciaran; Bandara, Arosha K.; Hatzakis, Tally; Meadows, Maureen and Nuseibeh, Bashar (2018). Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach. JMIR mHealth and uHealth, 6(10), article no. e185.
- Mikroyannidis, Alexander; Kear, Karen; Smith, Andrew; Jones, Allan; Rosewell, Jonathan; Donelan, Helen; Wermelinger, Michel; Sanders, Chris; Third, Allan and Connolly, Teresa (2018). The Open Networking Lab: Hands-on Vocational Learning in Computer Networking. In: IEEE Frontiers in Education Conference (FIE), 3-6 Oct 2018, San Jose, California, USA.
- Rosewell, Jonathan; Kear, Karen; Jones, Allan; Smith, Andrew; Donelan, Helen; Mikroyannidis, Alexander; Peasgood, Alice; Sanders, Chris; Third, Allan; Wermelinger, Michel; Moss, Nicky; Williams, Judith and Connolly, Teresa (2018). Open Networking Lab: online practical learning of computer networking. In: The Online, Open and Flexible Higher Education Conference: Blended and online Learning: Changing the Educational Landscape, 10-12 Oct 2018, Aarhus University, Denmark.
- Hall, Alan Geoffrey; Wermelinger, Michel; Hirst, Tony and Phithakkitnukoon, Santi (2018). Wide, long, or nested data? Reconciling the machine and human viewpoints. In: Proceedings of the 2018 Conference of the Psychology of Programming Interest Group (PPIG), 5-7 Sep 2018, London.
- Dilshener, Tezcan; Wermelinger, Michel and Yu, Yijun (2018). Locating bugs without looking back. Automated Software Engineering, 25(3) pp. 383–434.
- Bennaceur, Amel; Tun, Thein Than; Bandara, Arosha K.; Yu, Yijun and Nuseibeh, Bashar (2018). Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. ACM Transactions on Cyber-Physical Systems, 2(3), article no. 21.
- Islam, Riasat; Holland, Simon; Georgiou, Theodoros; Price, Blaine and Mulholland, Paul (2018). Wearable Haptic Devices for Long-Term Gait Re-education for Neurological Conditions. In: Haptic Technologies for Healthcare, EuroHaptics 2018, 13-16 Jun 2018, Pisa, Italy.
- Bennaceur, A.; Cano, A.; Georgieva, L.; Kiran, M.; Salama, M. and Yadav, P. (2018). Issues in Gender Diversity and Equality in the UK. In: GE '18: Proceedings of the 1st International Workshop on Gender Equality in Software Engineering, ACM Press pp. 5–9.
- Tun, T. T.; Yang, M.; Bandara, A. K.; Yu, Y.; Nhlabatsi, A.; Khan, N.; Khan, K. M. and Nuseibeh, B. (2018). Requirements and Specifications for Adaptive Security: Concepts and Analysis. In: SEAMS ’18: Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 161–171.
- Tun, Thein and Bennaceur, Amel (2018). Security Requirements Are Different, But Mechanisms For Security Adaptation Are Not. In: SEAMS ’18: Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 194–195.
- Karvonen, Teemu; Sharp, Helen and Barroca, Leonor (2018). Enterprise Agility: Why Is Transformation so Hard? In: Agile Processes in Software Engineering and Extreme Programming, Lecture Notes in Business Information Processing, Springer, pp. 131–145.
- Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo and Nuseibeh, Bashar (2018). On the Interplay Between Cyber and Physical Spaces for Adaptive Security. IEEE Transactions on Dependable and Secure Computing, 15(3) pp. 466–480.
- Islam, Riasat; Georgiou, Theodoros; Holland, Simon; Price, Blaine and Mulholland, Paul (2018). How can rhythmic haptic cueing using wearable haptic devices help gait rehabilitation for stroke survivors: a longitudinal pilot study. In: 2nd Digital Health & Wellbeing Conference 2018, 01-03 May 2018, The Open University, Milton Keynes, UK.
- Giles, Emilie; van der Linden, Janet and Petre, Marian (2018). Weaving Lighthouses and Stitching Stories: Blind and Visually Impaired People Designing E-textiles. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems.
- Islam, Riasat; Holland, Simon; Price, Blaine; Georgiou, Theodoros and Mulholland, Paul (2018). Wearables for Long Term Gait Rehabilitation of Neurological Conditions. In: A Short Workshop on Next Steps Towards Long Term Self Tracking, CHI 2018: CHI Conference on Human Factors in Computing Systems, 21-26 Apr 2018, Montreal, QC, Canada.
- Katz, Dmitri S.; Price, Blaine A.; Holland, Simon and Dalton, Nicholas Sheep (2018). Designing for Diabetes Decision Support Systems with Fluid Contextual Reasoning. In: CHI '18 Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, New York, NY, USA, article no. 625.
- Price, Blaine; Kelly, Ryan; Mehta, Vikram; Mccormick, Ciaran; Ahmed, Hanad and Pearce, Oliver (2018). Feel My Pain: Design and Evaluation of Painpad, a Tangible Device for Supporting Inpatient Self-Logging of Pain. In: CHI '18 Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, New York, article no. 169.
- French, Fiona; Mancini, Clara and Sharp, Helen (2018). High tech cognitive and acoustic enrichment for captive elephants. Journal of Neuroscience Methods, 300 pp. 173–183.
- Islam, Riasat; Holland, Simon; Georgiou, Theodoros; Price, Blaine and Mulholland, Paul (2018). A longitudinal rehabilitation case study for hemiparetic gait using outdoor rhythmic haptic cueing via a wearable device. In: 27th European Stroke Conference, 11-13 Apr 2018, Athens, Greece.
- Barroca, Leonor; Sharp, Helen; Salah, Dina; Taylor, Katie and Gregory, Peggy (2018). Bridging the gap between research and agile practice: an evolutionary model. International Journal of System Assurance Engineering and Management, 9(2) pp. 323–334.
- Islam, Riasat; Holland, Simon; Georgiou, Theodoros; Price, Blaine and Mulholland, Paul (2018). Gait rehabilitation by outdoor rhythmic haptic cueing using wearable technology for neurological conditions: a case study. In: ACPIN International Neurophysiotherapy Conference, 19-20 Mar 2018, Manchester, UK.
- Gooch, Daniel; Barker, Matthew; Hudson, Lorraine; Kelly, Ryan; Kortuem, Gerd; van der Linden, Janet; Petre, Marian; Brown, Rebecca; Klis-Davies, Anna; Forbes, Hannah; MacKinnon, Jessica; Macpherson, Robbie and Walton, Clare (2018). Amplifying Quiet Voices: Challenges and Opportunities for Participatory Design at an Urban Scale. ACM Transactions on Computer-Human Interaction (TOCHI), 25(1), article no. 2.
- Bui, Nghi D. Q.; Jiang, Lingxiao and Yu, Yijun (2018). Cross-Language Learning for Program Classification using Bilateral Tree-Based Convolutional Neural Networks. In: Statistical Modeling of Natural Software Corpora (NL4SE) (Devanbu, Prem ed.), AAAI-2018.
- Alrimawi, Faeq; Pasquale, Liliana; Mehta, Deepak and Nuseibeh, Bashar (2018). I’ve Seen This Before: Sharing Cyber-Physical Incident Knowledge. In: 1st International Workshop on Security Awareness from Design to Deployment (SEAD’18), 27 May 2018, Gothenburg, Sweden..
- Barroca, Leonor; Gregory, Peggy; Kuusinen, Kati; Sharp, Helen and AlQaisi, Raid (2018). Sustaining Agile Beyond Adoption. In: Proceedings - 44th Euromicro Conference on Software Engineering and Advanced Applications: SEAA 2018 (Bures, Tomas and Angelis, Lefteris eds.), Prague pp. 22–25.
- Borda, Aimee; Pasquale, Liliana; Koutavas, Vasileios and Nuseibeh, Bashar (2018). Compositional Verification of Self-Adaptive Cyber-Physical Systems. In: 13th ACM/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 28-29 May 2018, Gothenburg, Sweden.
- França, César; da Silva, Fabio Q. B. and Sharp, Helen (2018). Motivation and Satisfaction of Software Engineers. IEEE Transactions on Software Engineering (Early Access).
- Katz, Dmitri S.; Price, Blaine A.; Holland, Simon and Dalton, Nicholas Sheep (2018). Data, Data Everywhere, and Still Too Hard to Link: Insights from User Interactions with Diabetes Apps. In: CHI 2018: CHI Conference on Human Factors in Computing Systems, 21-26 Apr 2018, Montreal, QC, Canada.
- Kear, Karen; Smith, Andrew; Mikroyannidis, Alex; Jones, Allan; Rosewell, Jon; Donelan, Helen; Wermelinger, Michel; Sanders, Chris; Third, Allan and Connolly, Teresa (2018). The Open Networking Lab: an open online course for experiential learning of computer networking. In: Association for Learning Technology (ALT) annual conference 2018, 11-13 Sep 2018, Manchester.
- Lopez, Tamara; Tun, Thein T.; Bandara, Arosha; Levine, Mark; Nuseibeh, Bashar and Sharp, Helen (2018). An Investigation of Security Conversations in Stack Overflow: Perceptions of Security and Community Involvement. In: First International Workshop on Security Awareness from Design to Deployment (SEAD'18), 27 May 2018, Gothenburg, ACM.
- Meinke, Karl and Bennaceur, Amel (2018). Machine Learning for Software Engineering: Models, Methods, and Applications. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings pp. 548–549.
- Pasquale, Liliana; Alrajeh, Dalal; Peersman, Claudia; Tun, Thein; Nuseibeh, Bashar and Rashid, Awais (2018). Towards forensic-ready software systems. In: Proceedings of the 40th International Conference on Software Engineering New Ideas and Emerging Results - ICSE-NIER '18, ACM Press pp. 9–12.
- Peters, Fayola; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar (2018). Text Filtering and Ranking for Security Bug Report Prediction. IEEE Transactions on Software Engineering (Early Access).
- Petre, Marian and van der Hoek, André (2018). Beyond coding: toward software development expertise. XRDS: Crossroads, The ACM Magazine for Students, 25(1) pp. 22–26.
- Spiller, Keith; Ball, Kirstie; Bandara, Arosha; Meadows, Maureen; Mccormick, Ciaran; Nuseibeh, Bashar and Price, Blaine A. (2018). Data Privacy: Users’ Thoughts on Quantified Self Personal Data. In: Ajana, Btihaj ed. Self-Tracking: Empirical and Philosophical Investigations. Cham: Palgrave Macmillan, pp. 111–124.
2017
- Grispos, George; Hanvey, Sorren and Nuseibeh, Bashar (2017). Use of Organisational Topologies for Forensic Investigations. In: Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics, September 4, 2017, Paderborn, Germany.
- Viana, Thiago; Zisman, Andrea and Bandara, Arosha K. (2017). Identifying Conflicting Requirements in Systems of Systems. In: IEEE International Requirements Engineering Conference (RE@NEXT), 4-8 Sep 2017.
- Yu, Yijun and Tun, Thein (2017). Snap Forensics: A Tradeoff between Ephemeral Intelligence and Persistent Evidence Collection. In: 1st International Workshop on Software Engineering and Digital Forensics, 4 September, 2017, Padeborn, Germany, ACM.
- Gooch, Daniel; Hudson, Lorraine; Barker, Matthew; Wolff, Annika and Petre, Marian (2017). Mining a MOOC to examine international views of the “Smart City”. In: Proceedings of the 2017 IEEE First International Conference on Smart City Innovations (SCI 2017), 4-8 August 2017, California, USA.
- Alrimawi, Faeq; Pasquale, Liliana and Nuseibeh, Bashar (2017). Software Engineering Challenges for Investigating Cyber-Physical Incidents. In: Proceedings of the 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS ’17), 20 - 28 May 2017, Buenos Aires, Argentina.
- Pasquale, Liliana; Ghezzi, Carlo; Pasi, Edoardo; Tsigkanos, Christos; Boubekeur, Menouer; Florentino-Liano, Blanca; Hadzic, Tarik and Nuseibeh, Bashar (2017). Topology-Aware Access Control of Smart Spaces. IEEE Computer, 50(7) pp. 54–63.
- Hall, Alan Geoffrey; Wermelinger, Michel; Hirst, Tony and Phithakkitnukoon, Santi (2017). Structuring Spreadsheets with the “Lish” Data Model. In: Proceedings of the EuSpRIG 2017 Conference "Spreadsheet Risk Management".
- Price, Blaine A.; Stuart, Avelie; Calikli, Gul; Mccormick, Ciaran; Mehta, Vikram; Hutton, Luke; Bandara, Arosha K.; Levine, Mark and Nuseibeh, Bashar (2017). Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies, 1(2), article no. 22.
- Wolff, Annika; Barker, Matthew and Petre, Marian (2017). Creating a Datascape: a game to support communities in using open data. In: 8th international conference on Communities and Technologies, 26-30 Jun 2017, Troyes, France.
- Avellis, Giovanna; Harty, Julian Mark Alistair and Yu, Yijun (2017). Towards Mobile Twin Peaks for App Development. In: 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 22-23 May 2017, Buenos Aires (Argentina), IEEE.
- Kuusinen, K; Gregory , P; Sharp, Helen; Barroca, Leonor and Taylor, K (2017). Knowledge Sharing in a Large Agile Organisation: a Survey Study. In: XP 2017: 18th International Conference on Agile Software Development, 22-26 May 2017, Cologne.
- Wolff, Annika; Petre, Marian and van der Linden, Janet (2017). Pixels or plasticine: evoking curiosity to engage children with data. In: Designing for Curiosity workshop at CHI 2017, 7 May 2017, Denver, Colorado.
- Barhamgi, Mahmoud; Yang, Mu; Yu, Chia-Mu; Yu, Yijun; Bandara, Arosha K.; Benslimane, Djamal and Nuseibeh, Bashar (2017). Enabling End-Users to Protect Their Privacy. In: ASIA CCS '17 Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ACM, New York, NY, pp. 905–907.
- Bjarnason, Elizabeth and Sharp, Helen (2017). The role of distances in requirements communication: a case study. Requirements Engineering, 22(1) pp. 1–26.
- Yu, Yijun; Yang, Mu and Nuseibeh, Bashar (2017). Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion. In: SCiA 2017 : 4th Software Challenges in Aerospace Symposium, 9–13 January 2017, Grapevine, Texas.
- Perera, Charith; Wakenshaw, Susan Y. L.; Baarslag, Tim; Haddadi, Hamed; Bandara, Arosha K.; Mortier, Richard; Crabtree, Andy; Ng, Irene C. L.; McAuley, Derek and Crowcroft, Jon (2017). Valorising the IoT Databox: creating value for everyone. Transactions on Emerging Telecommunications Technologies, 28(1), article no. e3125.
- Akiki, Pierre A.; Bandara, Arosha K. and Yu, Yijun (2017). Visual Simple Transformations: Empowering End-Users to Wire Internet of Things Objects. Transactions on Computer-Human Interaction (In Press).
- Bennaceur, Amel; Tun, Thein Than; Bandara, Arosha K.; Yu, Yijun and Nuseibeh, Bashar (2017). Feature-driven Mediator Synthesis: Supporting Collaborative Security in the Internet of Things. ACM Transactions on Cyber-Physical Systems (In Press).
- Leigh, Andrew Philip; Wermelinger, Michel and Zisman, Andrea (2017). Software Architecture Risk Containers. In: European Conference on Software Architecture, 11-15 September 2017, Canterbury, UK.
- Lotz, Nicole and Sharp, Helen (2017). The influence of cognitive style, design setting and cultural background on sketch-based ideation by novice interaction designers. The Design Journal, 20(3) pp. 333–356.
- Paixao, Matheus; Harman, Mark; Zhang, Yuanyuan and Yu, Yijun (2017). An Empirical Study of Cohesion and Coupling: Balancing Optimisation and Disruption. IEEE Transactions on Evolutionary Computation (In press).
- Peng, Xin; Gu, Lingxiao; Tan, Tian Huat; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2017). CrowdService: Optimizing Mobile Crowdsourcing and Service Composition. ACM Transactions on Internet Technology (TOIT) (In press).
- Qian, Wenyi; Peng, Xin; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyu (2017). O2O Service Composition with Social Collaboration. In: 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2017) (Di Penta, Massimiliano and Nyguen, Tien N. eds.), 30 October - 3 November 2017, University of Illinois at Urbana-Champaign, Illinois, USA.
- Smith, Neil; Richards, Michael; Caldwell, Helen and Bandara, Arosha (2017). A comparison of MOOC development and delivery approaches. International Journal of Information and Learning Technology, 34(2) pp. 152–164.
2016
- Akiki, Pierre A.; Bandara, Arosha K. and Yu, Yijun (2016). Engineering Adaptive Model-Driven User Interfaces. IEEE Transactions on Software Engineering, 42(12) pp. 1118–1147.
- Viana, Thiago; Bandara, Arosha and Zisman, Andrea (2016). Towards a Framework for Managing Inconsistencies in Systems of Systems. In: Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture, 29th November 2016, Copenhagen, ACM.
- Paci, Patrizia; Mancini, Clara and Price, Blaine A. (2016). Designing for Wearability in Animal Biotelemetry. In: ACI'16, 16-17 Nov 2016, Milton Keynes, ACM.
- French, Fiona; Mancini, Clara and Sharp, Helen (2016). Exploring methods for interaction design with animals: a case-study with Valli. In: ACI '16: Proceedings of the Third International Conference on Animal-Computer Interaction, ACM, article no. 3.
- Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar (2016). Examining Active Error in Software Development. In: 2016 IEEE Symposium on Visual Languages and Human-Centric Computing pp. 152–156.
- Perera, Charith; Mccormick, Ciaran; Bandara, Arosha; Price, Blaine and Nuseibeh, Bashar (2016). Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. In: International Conference on the Internet of Things (IOT 2016), 7-9 November 2016, Stuttgart, Germany.
- Gray, Joshua; Franqueira, Virginia N. L. and Yu, Yijun (2016). Forensically-Sound Analysis of Security Risks of using Local Password Managers. In: 1st International Workshop on Requirements Engineering for Investigating and Countering Crime, 13 September 2016, Beijing, IEEE.
- Mehta, Vikram; Price, Blaine; Bandara, Arosha and Nuseibeh, Bashar (2016). Wearables for Physical Privacy. In: UbiComp 2016, 12-16 Sep 2016, Heidelberg, Germany.
- Tun, Thein; Price, Blaine; Bandara, Arosha; Yu, Yijun and Nuseibeh, Bashar (2016). Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations. In: iRENIC: 1st International Workshop on Requirements Engineering for Investigating and Countering Crime, 12th September 2016, Beijing, China.
- Peng, Xin; Gu, Jingxiao; Tan, Tian Huat; Sun, Jun; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2016). CrowdService: Serving the Individuals through Mobile Crowdsourcing and Service Composition. In: Proceedings of the31st ACM/IEEE international conference on Automated software engineering, ACM, New York, USA, (In press).
- Bennaceur, Amel and Nuseibeh, Bashar (2016). The Many Facets of Mediation: A Requirements-driven Approach for Trading-off Mediation Solutions. In: Mistrík, Ivan; Ali, Nour; Grundy, John; Kazman, Rick and Schmerl, Bradley eds. Managing trade-offs in adaptable software architectures. Elsevier.
- Gregory, Peggy; Barroca, Leonor; Sharp, Helen; Deshpande, Advait and Taylor, Katie (2016). The challenges that challenge: Engaging with agile practitioners’ concerns. Information and Software Technology, 77 pp. 92–104.
- Kuusinen, Kati; Gregory, Peggy; Sharp, Helen and Barroca, Leonor (2016). Strategies for doing Agile in a non-Agile Environment. In: ESEM 2016, 8-9 September 2016, Ciudad Spain, ACM.
- Sharp, Helen; Dittrich, Yvonne and de Souza, Cleidson (2016). The Role of Ethnographic Studies in Empirical Software Engineering. IEEE Transactions on Software Engineering, 42(8) pp. 786–804.
- Katz, Dmitri; Dalton, Nick; Holland, Simon; O'Kane, Aisling and Price, Blaine A. (2016). Questioning the Reflection Paradigm for Diabetes Mobile Apps. In: EAI International Conference on Wearables in Healthcare, 14-15 June 2016, Budapest, European Alliance for Innovation.
- Pasquale, Liliana; Hanvey, Sorren; Mcgloin, Mark and Nuseibeh, Bashar (2016). Adaptive evidence collection in the cloud using attack scenarios. Computers & Security, 59 pp. 236–254.
- Calikli, Gul; Law, Mark; Bandara, Arosha K.; Russo, Alesandra; Dickens, Luke; Price, Blaine A.; Stuart, Avelie; Levine, Mark and Nuseibeh, Bashar (2016). Privacy Dynamics: Learning Privacy Norms for Social Software. In: 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Association of Computing Machinery pp. 47–56.
- Dilshener, Tezcan; Wermelinger, Michel and Yu, Yijun (2016). Locating Bugs without Looking Back. In: MSR '16: Proceedings of the 13th International Conference on Mining Software Repositories, ACM, New York, pp. 286–290.
- García-Galán , Jesús ; Pasquale , Liliana ; Grispos , George and Nuseibeh, Bashar (2016). Towards Adaptive Compliance. In: SEAMS '16: Proceedings of the 11th International Workshop on Software Engineering for Adaptive and Self-Managing Systems, ACM, New York, pp. 108–114.
- Tsigkanos, Christos; Kehrer, Timo; Ghezzi, Carlo; Pasquale, Liliana and Nuseibeh, Bashar (2016). Adding static and dynamic semantics to building information models. In: SEsCPS '16: Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, ACM, New York, USA, pp. 1–7.
- Mehta, Vikram; Bandara, Arosha; Price, Blaine and Nuseibeh, Bashar (2016). Privacy Itch and Scratch: On Body Privacy Warnings and Controls. In: ACM Conference on Human Factors in Computing Systems, ACM, San Jose, 34.
- Leigh, Andrew; Wermelinger, Michel and Zisman, Andrea (2016). An Evaluation of Design Rule Spaces as Risk Containers. In: Proceedings of the Working International Conference on Software Architecture, 5-8 April 2016, IEEE.
- Barhamgi, Mahmoud; Bandara, Arosha K.; Yu, Yijun; Belhajjame, Khalid and Nuseibeh, Bashar (2016). Protecting Privacy in the Cloud: Current Practices, Future Directions. Computer, 49(2) pp. 68–72.
- Barroca, Leonor; Sharp, Helen; Salah, Dina; Taylor, Katie and Gregory, Peggy (2016). Bridging the gap between research and agile practice: an evolutionary model. International Journal of System Assurance Engineering and Management (Early Access).
- Bennaceur, Amel; Mccormick, Ciaran; García Galán, Jesús; Naranwala Gonaduwage, Charith; Smith, Andrew; Zisman, Andrea and Nuseibeh, Bashar (2016). Feed me, Feed me: An Exemplar for Engineering Adaptive Software. In: 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 16-17 May 2016.
- Deshpande, Advait; Sharp, Helen; Barroca, Leonor and Gregory, Peggy (2016). Remote Working and Collaboration in Agile Teams. In: International Conference on Information Systems, 11-14 December 2016, Dublin (forthcoming).
- French, Fiona; Mancini, Clara and Sharp, Helen (2016). Playful UX for Elephants. In: Proceedings of Measuring Behavior 2016: 10th International Conference on Methods and Techniques in Behavioral Research pp. 445–448.
- Paci, Patrizia; Mancini, Clara and Price, Blaine A. (2016). Towards a Wearer-Centred Framework for Animal Biotelemetry. In: Proceedings of Measuring Behaviour 2016 (Spink, A.J ed.), 25-27 May 2016, Dublin.
- Tsigkanos, Christos; Pasquale, Liliana; Ghezzi, Carlo and Nuseibeh, Bashar (2016). On the Interplay Between Cyber and Physical Spaces for Adaptive Security. IEEE Transactions on Dependable and Secure Computing (Early Access).
2015
- Cavero, Jose; Wermelinger, Michel and Wolff, Annika (2015). Some future scenarios for ‘in the wild’ visualisations. In: Death of the Desktop: Envisioning Visualization without Desktop Computing Workshop, 09 November 2014, Paris.
- Yu, Yijun (2015). The aftermath of mystery flight MH370: what can engineers do? Proceedings of the IEEE, 103(11) pp. 1948–1951.
- Zhang, Tian; Pan, Minxue; Zhao, Jizhou; Yu, Yijun and Li, Xuandong (2015). An open framework for semantic code queries on heterogeneous repositories. In: Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering (Sun, Jun ed.), IEEE, pp. 39–46.
- Butler, Simon; Wermelinger, Michel and Yu, Yijun (2015). Investigating naming convention adherence in Java references. In: Proceedings of 2015 IEEE 31st International Conference on Software Maintenance and Evolution (ICSME), IEEE, pp. 41–50.
- Yu, Yijun; Franqueira, Virginia N. L.; Tun, Thein; Wieringa, Roel J. and Nuseibeh, Bashar (2015). Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software, 106 pp. 102–116.
- Nhlabatsi, Armstrong; Yu, Yijun; Zisman, Andrea; Tun, Thein; Khan, Niamul; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar (2015). Managing security control assumptions using causal traceability. In: 8th International Symposium on Software and Systems Traceability (SST 2015), 17 July 2015, Florence, Italy.
- Bourgeois, Jacky; Kortuem, Gerd; Baudry, Benoit; van der Linden, Janet; Bourcier, Johann and Price, Blaine A. (2015). Understanding and Supporting Emerging Domestic Energy Practices. In: British HCI Conference - 'Sustainable HCI in the UK' workshop, 13 - 17 July 2015, Lincoln.
- Stiver, Alexandra; Barroca, Leonor; Petre, Marian; Richards, Michael and Roberts, Dave (2015). Civic crowdfunding: how do offline communities engage online? In: Proceedings of the 2015 British HCI Conference, ACM, pp. 37–45.
- Bennaceur, Amel; Andriescu , Emil; Speicys Cardoso, Roberto and Issarny, Valérie (2015). A unifying perspective on protocol mediation: interoperability in the Future Internet. Journal of Internet Services and Applications, 6(12)
- Segal, Judith; Petre, Marian and Sharp, Helen (2015). The future of e-infrastructures. Computing in Science & Engineering, 17(3) pp. 78–84.
- Butler, Simon; Wermelinger, Michel and Yu, Yijun (2015). A survey of the forms of Java reference names. In: Proceedings of the 2015 IEEE 23rd International Conference on Program Comprehension, IEEE Press, pp. 196–206.
- Gregory, Peggy; Barroca, Leonor; Taylor, Katie; Salah, Dina and Sharp, Helen (2015). Agile challenges in practice: a thematic analysis. In: 16th International Conference on Agile Software Development, XP 2015, 25-29 May 2015, Helsinki.
- Tun, Thein; Lutz, Robyn; Nakayama, Brian; Yu, Yijun; Mathur, Divita and Nuseibeh, Bashar (2015). The Role of Environmental Assumptions in Failures of DNA Nanosystems. In: 2015 IEEE/ACM 1st International Workshop on Complex Faults and Failures in Large Software Systems (COUFLESS), pp. 27–33.
- Wermelinger, Michel; Hall, Jon; Rapanotti, Lucia; Barroca, Leonor; Ramage, Magnus and Bandara, Arosha (2015). Teaching software systems thinking at The Open University. In: Proceedings of the 37th International Conference on Software Engineering, IEEE, pp. 307–310.
- Wermelinger, Michel and Yu, Yijun (2015). An architectural evolution dataset. In: Proceedings of the 12th Working Conference on Mining Software Repositories, IEEE, pp. 502–505.
- Bennaceur, Amel and Issarny, Valérie (2015). Automated synthesis of mediators to support component interoperability. IEEE Transactions on Software Engineering, 41(3) pp. 221–240.
- Akiki, Pierre A.; Bandara, Arosha K. and Yu, Yijun (2015). Adaptive model-driven user interface development systems. ACM Computing Surveys, 47(1), article no. 9.
- Katz, Dmitri; Dalton, Nicholas and Price, Blaine (2015). Failing the challenge: Diabetes apps & long-term daily adoption. In: 8th International Conference on Advanced Technologies & Treatments for Diabetes (ATTD 2015), 18-21 Feb 2015, Paris.
- Preece, Jenny; Rogers, Yvonne and Sharp, Helen (2015). Interaction Design: Beyond human-computer interaction (4th ed). Chichester: John Wiley & Sons.
- Mangano, N.; LaToza, T.; Petre, M. and van der Hoek, A. (2015). How software designers interact with sketches at the whiteboard. IEEE Transactions on Software Engineering, 41(2) pp. 135–156.
- Pawlik, Aleksandra; Segal, Judith; Petre, Marian and Sharp, Helen (2015). Crowdsourcing scientific software documentation: a case study of the NumPy documentation project. Computing in Science & Engineering , 17(1) pp. 28–36.
- Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled M. and Nuseibeh, Bashar (2015). “Why can’t I do that?”: tracing adaptive security decisions. EAI Endorsed Transactions on Self-Adaptive Systems, 1(1), article no. e2.
- Plonka, Laura; Sharp, Helen; van der Linden, Janet and Dittrich, Yvonne (2015). Knowledge transfer in pair programming: an in-depth analysis. International Journal of Human-Computer Studies, 73(1) pp. 66–78.
- Rawassizadeh, Reza; Price, Blaine A. and Petre, Marian (2015). Wearables: has the age of smartwatches finally arrived? Communications of the ACM, 58(1) pp. 45–47.
- Bjarnason, Elizabeth and Sharp, Helen (2015). The role of distances in requirements communication: a case study. Requirements Engineering (Early view).
- Elbanhawy, Eiman and Price, Blaine A. (2015). Understanding the social practice of EV workplace charging. In: Adjunct Proceedings UbiComp/ISWC'15, ACM, pp. 1133–1141.
2014
- Yu, Yijun; Piwek, Paul; Tun, Thein Than and Nuseibeh, Bashar (2014). Towards explaining rebuttals in security arguments. In: 14th Workshop on Computational Models of Natural Argument, 10 December 2014, Krakow, Poland.
- Petre, Marian; Minocha, Shailey and Barroca, Leonor (2014). Digital technologies for doctoral dialogues at a distance. In: 2014 IEEE Frontiers in Education: Opening doors to Innovation and Internationalization in Engineering Education Conference, 22-25 October 2014, Madrid, Spain, pp. 2432–2439.
- Petre, Marian (2014). ‘No shit’ or ‘Oh, shit!’: responses to observations on the use of UML in professional practice. Software and Systems Modeling, 13(4) pp. 1225–1235.
- Yang, Mu; Yu, Yijun; Bandara, Arosha and Nuseibeh, Bashar (2014). Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), 24-26 September 2014, Beijing, China, IEEE, pp. 45–52.
- Calikli, Gul; Andersen, Mads Schaarup; Bandara, Arosha; Price, Blaine A. and Nuseibeh, Bashar (2014). Personal Informatics for Non-Geeks: Lessons Learned from Ordinary People. In: Proceedings of 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct Publication (UbiComp 2014 Adjunct), pp. 683–686.
- Petre, Marian and Wilson, Greg (2014). Code review for and by scientists: preliminary findings. In: 2nd Workshop on Sustainable Software for Science: Practice and Experiences (WSSSPE2), 16 November 2014, New Orleans, LA, USA.
- Bourgeois, Jacky; Kortuem, Gerd; Bourcier, Johann; van der Linden, Janet; Price, Blaine A. and Baudry, Benoit (2014). Energy Demand Shifting in Residential Households: The Interdependence between Social Practices and Technology Design. In: Behave 2014, 3-4 Oct 2014, Oxford.
- Bourgeois, Jacky; van der Linden, Janet; Kortuem, Gerd; Price, Blaine A. and Rimmer, Christopher (2014). Conversations with my washing machine: an in-the-wild study of demand-shifting with self-generated energy. In: 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), 13-17 September 2014, Seattle, Washington, US, ACM, pp. 459–470.
- Kortuem, Gerd; Bourgeois, Jacky; van der Linden, Janet and Price, Blaine (2014). Participatory Data Analysis: A New Method for Investigating Human Energy Practices. In: CEUR Workshop Proceedings (Penzenstadler, Birgit and Lohmann , Wolfgang eds.), 1203 pp. 35–37.
- Bennaceur, Amel and Issarny, Valérie (2014). Layered connectors: revisiting the formal basis of architectural connection for complex distributed systems. In: ECSA'14 - The 8th European Conference on Software Architecture.
- Bourgeois, J.; van der Linden, J.; Kortuem, G.; Price, B. A. and Rimmer, C. (2014). Using participatory data analysis to understand social constraints and opportunities of electricity demand-shifting. In: 2nd International Conference on ICT for Sustainability (ICT4S 2014), 24-27 August 2014, Stockholm, Sweden, Atlantis Press.
- Nhlabatsi, Armstrong; Tun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; Khan, Khaled and Nuseibeh, Bashar (2014). Traceability for adaptive information security in the cloud. In: Proceedings of the 2014 IEEE Seventh International Conference on Cloud Computing, IEEE, pp. 958–959.
- Bailey, Christopher; Montrieux, Lionel; de Lemos, Rogério; Yu, Yijun and Wermelinger, Michel (2014). Run-time generation, transformation, and verification of access control models for self-protection. In: SEAMS 2014 Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, ACM, pp. 135–144.
- Chen, Bihuan; Peng, Xin; Yu, Yijun; Nuseibeh, Bashar and Zhao, Wenyun (2014). Self-adaptation through incremental generative model transformations at runtime. In: 36th International Conference on Software Engineering, Hyderabad, ACM/IEEE.
- Lotz, Nicole; Sharp, Helen; Woodroffe, Mark; Blyth, Richard; Rajah, Dino and Ranganai, Turugare (2014). Framing behaviours in novice interaction designers. In: Proceedings of DRS 2014: Design's Big Debates, Umeå Institute of Design, Umeå University, pp. 1178–1190.
- Thomas, Keerthi; Bandara, Arosha K.; Price, Blaine A. and Nuseibeh, Bashar (2014). Distilling Privacy Requirements for Mobile Applications. In: 36th International Conference on Software Engineering (ICSE 2014), 31 May-7 June, 2014, Hyderabad, India.
- Plonka, Laura; Sharp, Helen; Gregory, Peggy and Taylor, Katie (2014). UX design in agile: a DSDM case study. In: Agile Processes in Software Engineering and Extreme Programming: 15th International Conference, XP 2014, Lecture Notes in Business Information Processing, Springer.
- Chen, Bihuan; Peng, Xin; Yu, Yijun and Zhao, Wenyun (2014). Uncertainty handling in goal-driven self-optimization – limiting the negative effect on adaptation. Journal of Systems and Software, 90 pp. 114–127.
- Akiki, Pierre A.; Bandara, Arosha K. and Yu, Yijun (2014). Integrating adaptive user interface capabilities in enterprise applications. In: 36th International Conference on Software Engineering (ICSE 2014), 31 May-7 June, 2014, Hyderabad, India, ACM.
- Bennaceur, Amel; Bandara, Arosha; Jackson, Michael; Liu, Wei; Montrieux, Lionel; Tun, Thein; Yu, Yijun and Nuseibeh, Bashar (2014). Requirements-driven mediation for collaborative security. In: SEAMS'14 - The 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2-3 June 2014, Hyderabad.
- Bennaceur, Amel; France, Robert B.; Tamburrelli, Giordano; Vogel, Thomas; Mosterman, Pieter J.; Cazzola, Walter; Costa, Fábio M.; Pierantonio, Alfonso; Tichy, Matthias; Akşit, Mehmet; Emmanuelson, Pär; Gang, Huang; Georgantas, Nikolaos and Redlich, David (2014). Mechanisms for leveraging models at runtime in self-adaptive software. In: Bencomo, Nelly; France, Robert B.; Cheng, Betty H. and Assmann, Uwe eds. Models@run.time: Foundations, Applications, and Roadmaps. Lecture Notes in Computer Science (8378). Cham: Springer , 19-46 .
- Chen, Bihuan; Peng, Xin; Yu, Yijun and Zhao, Wenyun (2014). Requirements-driven self-optimization of composite services using feedback control. IEEE Transactions on Services Computing, 8(1) pp. 107–120.
- Felderer, Michael; Katt, Basel; Kalb, Philipp; Jürjens, Jan; Ochoa, Martín; Paci, Federica; Tran, Le Minh Sang; Tun, Thein; Yskout, Koen; Scandariato, Riccardo; Piessens, Frank; Vanoverberghe, Dries; Fourneret, Elizabeta; Gander, Matthias; Solhaug, Bjørnar and Breu, Ruth (2014). Evolution of security engineering artifacts: a state of the art survey. International Journal of Secure Software Engineering, 5(4) pp. 48–98.
- Mangano, Nicolas; LaToza, Thomas D.; Petre, Marian and van der Hoek, André (2014). Supporting informal design with interactive whiteboards. In: CHI '14 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 331–340.
- Pasquale, Liliana; Ghezzi, Carlo; Menghi, Claudio; Tsigkanos, Christos and Nuseibeh, Bashar (2014). Topology aware adaptive security. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, ACM, pp. 43–48.
- Petre, Marian and Damian, Daniela (2014). Methodology and culture: drivers of mediocrity in software engineering? In: FSE 2014 Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, ACM, pp. 829–832.
- Price, B.A.; Janicke, H.; Lallie, H.S.; Sinclair, J.E.; Joy, M.S. and Howley, R. (2014). Pedagogic Challenges in Teaching Cyber Security – a UK perspective. In: ICC 2014 - Computer Networks and Security (Venugopal, K.R. and Lingareddy, S.C. eds.), Elsevier, pp. 605–615.
- Tsigkanos, Christos; Pasquale, Liliana; Menghi, Claudio; Ghezzi, Carlo and Nuseibeh, Bashar (2014). Engineering topology aware adaptive security: preventing requirements violations at runtime. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE): Proceedings, Institute of Electrical and Electronics Engineers, pp. 203–212.
- Yu, Yijun; Tun, Thein Than; Bandara, Arosha K.; Zhang, Tian and Nuseibeh, Bashar (2014). From model-driven software development processes to problem diagnoses at runtime. In: Bencome, Nelly; France, Robert; Cheng, Betty H.C. and Aßmann, Uwe eds. Models@run.time -- Foundations, Applications, and Roadmaps. Lecture Notes in Computer Science (8378). Cham: Springer International Publishing, pp. 188–207.
2013
- Silva, Icamaan and Zisman, Andrea (2013). Decomposing ratings in service compositions. In: 11th International Conference on Service Oriented Computing, 2-5 December, 2013, Berlin, Springer.
- Abelein, Ulrike; Sharp, Helen and Paech, Barbara (2013). Does involving users in software development really influence system success? IEEE Software, 30(6) pp. 17–23.
- Tun, Thein; Yu, Yijun; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar (2013). Aspect interactions: a requirements engineering perspective. In: Moreira, Ana; Chitchyan, Ruzanna; Araujo, João and Rashid, Awais eds. Aspect-Oriented Requirements Engineering. Heidelberg: Springer, pp. 271–286.
- Yu, Yijun; Peng, Xin and Leite, Julio Cesar Sampaio do Prado (2013). Reasoning about dynamic aspectual requirements. In: Moreira, Ana; Chitchyan, Ruzanna; Araújo, João and Rashid, Awais eds. Aspect-Oriented Requirements Engineering. Heidelberg: Springer, pp. 23–42.
- Van Der Hoek, Andre and Petre, Marian (2013). Software Designers in Action: A Human-Centric Look at Design Work. Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series. Abingdon: Chapman and Hall/CRC.
- Sharp, Helen; Lotz, Nicole; Blyth, Richard; Woodroffe, Mark; Rajah, Dino and Ranganai, Turugare (2013). A protocol study of novice interaction design behaviour in Botswana: solution-driven interaction design. In: BCS HCI Conference 2013, 9-13 September 2013, London.
- Hubaux, Arnaud; Tun, Thein Than and Heymans, Patrick (2013). Separation of concerns in feature diagram languages: a systematic survey. ACM Computing Surveys, 45(4), article no. 51.
- Lohar, Sugandha; Amornborvornwong, Sorowit; Zisman, Andrea and Cleland-Huang, Jane (2013). Improving trace accuracy through data-driven configuration and composition of tracing features. In: 9th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 18-26 August 2013, St Petersburg, Russia, ACM, pp. 378–388.
- Lotz, Nicole; Sharp, Helen; Woodroffe, Mark; Richard, Blyth; Rajah, Dino and Ranganai, Turugare (2013). Co-evolving problems and solutions: The case of novice interaction designers in Botswana and the UK. In: IASDR, 26-30 August, Tokyo, Japan, International Association of Societies of Design Research, pp. 1004–1015.
- Pasquale, Liliana; Yu, Yijun; Salehie, Mazeiar; Cavallaro, Luca; Tun, Thein Than and Nuseibeh, Bashar (2013). Requirements-driven adaptive digital forensics. In: 21st IEEE Requirements Engineering Conference, 15-19 July, 2013, Rio de Janeiro, Brazil.
- Taubenberger, Stefan; Jurjens, Jan; Yu, Yijun and Nuseibeh, Bashar (2013). Resolving vulnerability identification errors using security requirements on business process models. Information Management and Computer Security, 21(3) pp. 202–223.
- Dong, Rui-Zhi; Peng, Xin; Yu, Yi-Jun and Zhao, Wen-Yun (2013). Requirements-driven self-repairing against environmental failures. In: 7th International Symposium on Theoretical Aspects of Software Engineering, 1-3 July 2013, Birmingham.
- Montrieux, Lionel; Yu, Yijun and Wermelinger, Michel (2013). Developing a domain-specific plug-in for a modelling platform: the good, the bad, the ugly. In: 3rd Workshop on Developing Tools as Plug-ins, 21 May 2013, San Francisco.
- Montrieux, Lionel; Yu, Yijun; Wermelinger, Michel and Hu, Zhenjiang (2013). Issues in representing domain-specific concerns in model-driven engineering. In: Workshop on Modeling in Software Engineering @ ICSE 2013, 18-19 May 2013, San Francisco.
- Petre, Marian (2013). UML in practice. In: 35th International Conference on Software Engineering (ICSE 2013), 18-26 May 2013, San Francisco, CA, USA, pp. 722–731.
- Bourgeois, Jacky; van der Linden, Janet; Price, Blaine and Kortuem, Gerd (2013). Technology probes: experiences with home energy feedback. In: Methods for Studying Technology in the Home, 27 Apr 2013, Paris.
- Omoronyia, Inah; Cavallaro, Luca; Salehie, Mazeiar; Pasquale, Liliana and Nuseibeh, Bashar (2013). Engineering adaptive privacy: on the role of privacy awareness requirements. In: 35th International Conference on Software Engineering (ICSE 2013), 18-26 May 2013, San Francisco, CA, USA (forthcoming), pp. 632–641.
- Hartnett, Elizabeth; Minocha, Shailey; Palmer, Jane; Petre, Marian; Evans, Shirley; Middup, Christopher Paul; Dunn, Kathryn; Murphy, Brendan; Heap, Tania and Roberts, Dave (2013). Older people and online social interactions: an empirical investigation. In: The UKAIS International Conference on Information Systems (UKAIS), 18-20 March 2013, Worcester College, University of Oxford.
- Bencomo, N.; Bennaceur, A.; Grace, P.; Blair, G. and Issarny, V. (2013). The role of models@run.time in supporting on-the-fly interoperability. Computing, 95(3) pp. 167–190.
- Price, Blaine; van der Linden, Janet; Bourgeois, Jacky and Kortuem, Gerd (2013). When looking out of the window is not enough: informing the design of in-home technologies for domestic energy microgeneration. In: First International Conference on Information and Communication Technologies for Sustainability, 14-16 February 2013, Zurich, Switzerland.
- Kortuem, Gerd; Bandara, Arosha; Smith, Neil; Richards, Michael and Petre, Marian (2013). Educating the Internet-of-Things generation. Computer, 46(2) pp. 53–61.
- Akiki, Pierre; Bandara, Arosha and Yu, Yijun (2013). Cedar Studio: an IDE supporting adaptive model-driven user interfaces for enterprise applications. In: Fifth ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), 24–27 June 2013, London, UK.
- Akiki, Pierre; Bandara, Arosha and Yu, Yijun (2013). Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications. In: Fifth ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), 24–27 June 2013, London, UK.
- Akiki, Pierre; Bandara, Arosha and Yu, Yijun (2013). Preserving designer input on concrete user interfaces using constraints while maintaining adaptive behavior. In: 2nd Workshop on Context-Aware Adaptation of Service Front-Ends (CASFE 2013), 24 June 2013, London, UK.
- Akiki, Pierre; Bandara, Arosha and Yu, Yijun (2013). RBUIS: simplifying enterprise application user interfaces through engineering role-based adaptive behavior. In: Fifth ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS 2013), 24–27 June 2013, London, UK, ACM New York, NY, USA, pp. 3–12.
- Bennaceur, Amel; Chilton, Chris; Isberner, Malte and Jonsson, Bengt (2013). Automated mediator synthesis: combining behavioural and ontological reasoning. In: Software Engineering and Formal Methods, Springer-Verlag, pp. 274–288.
- Bennaceur, Amel; Issarny, Valérie; Johansson, Richard; Moschitti, Alessandro; Spalazzese, Romina and Sykes, Daniel (2013). Automatic service categorisation through machine learning in emergent middleware. In: Formal Methods for Components and Objects, Springer, pp. 133–149.
- Bennaceur, Amel; Issarny, Valérie; Sykes, Daniel; Howar, Falk; Isberner, Malte; Steffen, Bernhard; Johansson, Richard and Moschitti, Alessandro (2013). Machine learning for emergent middleware. In: Trustworthy Eternal Systems via Evolving Software, Data and Knowledge, Springer, pp. 16–29.
- Butler, Simon; Wermelinger, Michel; Yu, Yijun and Sharp, Helen (2013). INVocD: Identifier Name Vocabulary Dataset. In: 10th Working Conference on Mining Software Repositories, 18-19 May 2013, San Francisco.
- Hubaux, Arnaud; Acher, Mathieu; Tun, Thein Than; Heymans, Patrick; Collet, Philippe and Lahire, Philippe (2013). Separating concerns in feature models: retrospective and support for multi-views. In: Reinhartz-Berger, Iris; Sturm, Arnon; Clark, Tony; Cohen, Sholom and Bettin, Jorn eds. Domain Engineering: Product Lines, Languages, and Conceptual Models. Berlin: Springer, pp. 3–28.
- Issarny, Valérie and Bennaceur, Amel (2013). Composing distributed systems: overcoming the interoperability challenge. In: Elena, Giachino; Reiner, Hähnle; Frank, de Boer and Marcello, Bosangue eds. Formal Methods for Components and Objects. Lecture Notes in Computer Science (7866). Berlin: Springer, pp. 168–196.
- Moore, Kevin and Wermelinger, Michel (2013). The Challenge of Software Complexity. In: Proceedings of the European Conference on Complex Systems 2012, pp. 179–187.
- Peng, Xin; Xing, Zhenchang; Tan, Xi; Yu, Yijun and Zhao, Wenyun (2013). Improving feature location using structural similarity and iterative graph mapping. Journal of Systems and Software, 86(3) pp. 664–676.
- Saleem, Saad Bin; Montrieux, Lionel; Yu, Yijun; Tun, Thein and Nuseibeh, Bashar (2013). Maintaining security requirements of software systems using evolving crosscutting dependencies. In: Chitchyan, Ruzanna; Moreira, Ana; Araujo, Joao and Rashid, Awais eds. Aspect Oriented Requirements Engineering. Springer.
- Tun, Thein; Laney, Robin; Yu, Yijun and Nuseibeh, Bashar (2013). Specifying software features for composition: a tool-supported approach. Computer Networks, 57(12) pp. 2454–2464.
- Zisman, A.; Spanoudakis, G.; Dooley, J. and Siveroni, I. (2013). Proactive and reactive runtime service discovery: a framework and its evaluation. IEEE Transactions on Software Engineering, 39(7) pp. 954–974.
2012
- Hundhausen, C. D.; Fairbrother, D. and Petre, M. (2012). An empirical study of the “prototype walkthrough”: a studio-based activity for HCI education. ACM Transactions on Computer-Human Interaction (TOCHI), 19(4), article no. 26.
- Sajjad, Ali; Zisman, Andrea; Rajarajan, Muttukrishnan; Nair, Srijith K. and Dimitrakos, Theo (2012). Secure communication using dynamic VPN provisioning in an Inter-Cloud environment. In: Networks (ICON), 2012 18th IEEE International Conference On , IEEE, pp. 428–433.
- da Silva, Icamaan and Zisman, Andrea (2012). A framework for trustworthy services. In: Service-Oriented Computing : 10th International Conference, ICSOC 2012, Shanghai, China, November 12-15, 2012. Proceedings, Lecture Notes in Computer Science, Springer Berlin Heidelberg, pp. 328–343.
- Pasquale, Liliana; Menghi, Claudio; Salehie, Mazeiar; Cavallaro, Luca; Omoronyia, Inah and Nuseibeh, Bashar (2012). SecuriTAS: a tool for engineering adaptive security. In: ACM SIGSOFT 20th International Symposium on Foundations of Software Engineering (FSE 2012), 11-16 November 2012, North Carolina, USA.
- Fu, Lingxiao; Peng, Xin; Yu, Yijun; Mylopoulos, John and Zhao, Wenyun (2012). Stateful requirements monitoring for self-repairing socio-technical systems. In: 20th IEEE International Requirements Engineering Conference, 24-28 September 2012 , Chicago, Illinois.
- Blyth, Richard; Schadewitz, Nicole; Sharp, Helen; Woodroffe, Mark; Rajah, Dino and Turugare, Ranganai (2012). A frame signature matrix for analysing and comparing interaction design behaviour. In: BCS HCI Conference, 12-14 September 2012, Birmingham.
- Dyba, Tore and Sharp, Helen (2012). What's the evidence for Lean? IEEE Software, 29(5) pp. 19–21.
- Minocha, Shailey and Petre, Marian (2012). Handbook of Social Media for Researchers and Supervisors. The Open University.
- Ferreira, Jennifer; Sharp, Helen and Robinson, Hugh (2012). Agile development and user experience design integration as an ongoing achievement in practice. In: Agile 2012, 13-17 August 2012, Dallas, TX, pp. 11–20.
- Salifu, Mohammed; Yu, Yijun; Bandara, Arosha K. and Nuseibeh, Bashar (2012). Analysing monitoring and switching problems for adaptive systems. Journal of Systems and Software, 85(12) pp. 2829–2839.
- Bergin, Joseph; Eckstein, Jutta; Volter, Markus; Sipos, Marianna; Wallingford, Eugene; Marquardt, Klaus; Chandler, Jane; Sharp, Helen and Manns, Mary Lynn eds. (2012). Pedagogical Patterns: Advice For Educators. Joseph Bergin Software Tools.
- Yu, Yijun; Lin, Yu; Hu, Zhenjiang; Hidaka, Soichiro; Hiroyuki, Kato and Montrieux, Lionel (2012). Maintaining invariant traceability through bidirectional transformations. In: 34th International Conference on Software Engineering, 2-9 June 2012, Zurich, Switzerland, pp. 540–550.
- Abdelnour-Nocera, Jose and Sharp, Helen (2012). Understanding conflicts in Agile adoption through technological frames. International Journal of Sociotechnology and Knowledge Development, 4(2) pp. 29–45.
- Alebrahim, Azadeh; Tun, Thein Than; Yu, Yijun; Heisel, Maritta and Nuseibeh, Bashar (2012). An aspect-oriented approach to relating security requirements and access control. In: CAiSE'12 Forum, 28 June 2012, Gdansk, Poland.
- Ali, Raian; Solis, Carlos; Omoronyia, Inah; Salehie, Mazeiar and Nuseibeh, Bashar (2012). Social adaptation: when software gives users a voice. In: ENASE 2012: 7th International Conference Evaluation of Novel Approaches to Software Engineering , 28-30 June 2012, Wroclaw, Poland.
- Lopez, Tamara; Petre, Marian and Nuseibeh, Bashar (2012). Getting at ephemeral flaws. In: Cooperative and Human Aspects of Software Engineering (CHASE), 2012 5th International Workshop on, 2 June, 2012, Zurich.
- Sharp, Helen; Giuffrida, Rosalba and Melnik, Grigori (2012). Information flow within a dispersed agile team: a distributed cognition perspective. In: 13th International Conference on Agile Software Development: XP2012 , 20-25 May 2012, Malmö Sweden, pp. 62–76.
- Peng, Xin; Chen, Bihuan; Yu, Yijun and Zhao, Wenyun (2012). Self-tuning of software systems through goal-based feedback control loop. Journal of Systems and Software, 85(12) pp. 2707–2719.
- Petre, Marian; Baines, Chris; Baker, Michael; Copcutt, Ed; Martindale, Adam; Matharu, Taranjit and Petre Eastty, Max (2012). The interactive punching bag. ACM.
- Sardinha, Alberto; Niu, Nan; Yu, Yijun and Rashid, Awais (2012). EA-Tracer: identifying traceability links between code aspects and early aspects. In: 27th Annual ACM Symposium on Applied Computing (SAC 2012), 26-30 March 2012 , Riva del Garda (Trento) Italy.
- Richards, Michael; Petre, Marian and Bandara, Arosha (2012). Starting with Ubicomp: using the SenseBoard to introduce computing. In: 43rd ACM Technical Symposium on Computer Science Education, 29 February - 3 March 2012, Raleigh, NC.
- Yang, Hui; Willis, Alistair; De Roeck, Anne and Nuseibeh, Bashar (2012). A hybrid model for automatic emotion recognition in suicide notes. Biomedical Informatics Insights, 5(Supp 1) pp. 17–30.
- Baker, Alex; Van Der Hoek, André; Ossher, Harold and Petre, Marian (2012). Studying professional software design. IEEE Software , 29(1) pp. 28–33.
- Akiki, Pierre A.; Bandara, Arosha K. and Yu, Yijun (2012). Using interpreted runtime models for devising adaptive user interfaces of enterprise applications. In: 14th International Conference on Enterprise Information Systems (ICEIS 2012), 28 June - 1 July 2012, Wroclaw, Poland.
- Bennaceur, Amel; Issarny, Valérie; Spalazzese, Romina and Tyagi, Shashank (2012). Achieving interoperability through semantics-based technologies: the instant messaging case. In: ISWC 2012 - 11th International Semantic Web Conference, 11-15 Nov 2012, Boston, Springer-Verlag, pp. 17–33.
- Bennaceur, Amel; Johansson, Richard; Moschitti, Alessandro; Spalazzese, Romina; Sykes, Daniel; Saadi, Rachid and Issarny, Valérie (2012). Inferring affordances using learning techniques. In: Eternal Systems, Springer, pp. 79–87.
- Damian, Daniela; Petre, Marian; Miller, Mariel and Hadwin, Allyson F. (2012). Instructional strategies in the EGRET course: an international graduate forum on becoming a researcher. In: WCCCE '12 17th Western Canadian Conference on Computing Education, 4 - 5 May, 2012, Vancouver, British Columbia, Canada.
- Goulão, Miguel; Fonte, Nelson; Wermelinger, Michel and Brito e Abreu, Fernando (2012). Software evolution prediction using seasonal time analysis: a comparative study. In: 16th European Conference on Software Maintenance and Reengineering, 27-30 March 2012, Szeged, Hungary.
- Omoronyia, Inah; Pasquale, Liliana; Salehie, Mazeiar; Cavallaro, Luca; Doherty, Gavin and Nuseibeh, Bashar (2012). Caprice: a tool for engineering adaptive privacy. In: 27th IEEE/ACM International Conference on Automated Software Engineering (ASE 2012), 3-7 September 2012, Essen, Germany.
- Pasquale, Liliana; Salehie, Mazeiar; Ali, Raian; Omoronyia, Inah and Nuseibeh, Bashar (2012). On the role of primary and secondary assets in adaptive security: An application in smart grids. In: Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2012 ICSE Workshop , 4-5 June 2012, Switzerland.
- Pawar, P. S.; Rajarajan, M.; Krishnan Nair, S. and Zisman, A. (2012). Trust model for optimized cloud services. In: Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings, IFIP Advances in Information and Communication Technology , Springer Berlin Heidelberg, pp. 97–112.
- Petre, Marian; Sharp, Helen and Freudenberg, Sallyann (2012). The mystery of the writing that isn’t on the wall: differences in public representations in traditional and agile software development. In: 5th International Workshop on Cooperative and Human Aspects of Software Engineering (CHASE 2012), 2-9 June 2012, Zurich, Switzerland.
- Plonka, Laura; Sharp, Helen and van der Linden, Janet (2012). Disengagement in pair programming: does it matter? In: ICSE 2012, 02-09 June 2012, Zurich, pp. 496–506.
- Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah; Ali, Raian and Nuseibeh, Bashar (2012). Requirements-driven adaptive security: protecting variable assets at runtime. In: 20th International Requirements Engineering Conference (RE'12), 24-28 September 2012, Chicago, USA, pp. 111–120.
- Salehie, Mazeiar; Pasquale, Liliana; Omoronyia, Inah and Nuseibeh, Bashar (2012). Adaptive security and privacy in smart grids: A software engineering vision. In: Software Engineering for the Smart Grid (SE4SG), 2012 International Workshop, 3 June 2012 , University of Zurich.
- Tun, Thein Than; Bandara, Arosha K.; Price, Blaine A.; Yu, Yijun; Haley, Charles; Omoronyia, Inah and Nuseibeh, Bashar (2012). Privacy arguments: analysing selective disclosure requirements for mobile applications. In: 20th IEEE International Requirements Engineering Conference, 24-28 September 2012 , Chicago, Illinois, pp. 131–140.
- Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2012). Speculative requirements: automatic detection of uncertainty in natural language requirements. In: The 20th IEEE International Requirements Engineering Conference, 24-28 September 2012, Chicago, ILL, USA, IEEE, pp. 11–20.
2011
- Yu, Yijun; Tun, Thein and Nuseibeh, Bashar (2011). Specifying and detecting meaningful changes in programs. In: 26th IEEE/ACM International Conference On Automated Software Engineering, 6-10 Nov 2011, Lawrence, Kansas, USA , pp. 273–282.
- Yu, Yijun; Bandara, Arosha; Tun, Thein Than and Nuseibeh, Bashar (2011). Towards learning to detect meaningful changes in software. In: Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering, 12 November 2011, Lawrence, Kansas, ACM, pp. 51–54.
- Bergmann, Gábor; Massacci, Fabio; Paci, Federica; Tun, Thein; Varró, Dániel and Yu, Yijun (2011). SeCMER: a tool to gain control of security requirements Evolution. In: Towards a Service-Based Internet, pp. 321–322.
- Prechett, Lutz and Petre, Marian (2011). Credibility, or why should I insist on being convinced? In: Oram, Adam and Wilson , Greg eds. Making Software: What Really Works, and Why We Believe It. Sebastapol, CA: O'Reilly Media , pp. 17–34.
- Sach, Rien; Sharp, Helen and Petre, Marian (2011). Software engineers’ perceptions of factors in motivation. In: 5th International Symposium on Empirical Software Engineering and Measurement, ESEM 2011, 22-23 September 2011, Banff, Alberta, Canada.
- Sach, Rien; Sharp, Helen and Petre, Marian (2011). What makes software engineers go that extra mile? In: 23rd Annual Psychology of Programming Interest Group 2011, 6-8 September 2011, York, UK.
- Ali, Raian; Solís, Carlos; Salehie, Mazeiar; Omoronyia, Inah; Nuseibeh, Bashar and Maalej, Walid (2011). Social sensing: when users become monitors. In: 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC/FSE 2011), 5-9 September 2011, Szeged, Hungary.
- Franqueira, Virginia N. L.; Bakalova, Zornitza; Tun, Thein Than and Daneva, Maya (2011). Towards agile security risk management in RE and beyond. In: Workshop on Empirical Requirements Engineering (EmpiRE 2011), pp. 33–36.
- Chen, Bihuan; Peng, Xin; Yu, Yijun and Zhao, Wenyun (2011). Are your sites down? Requirements-driven self-tuning for the survivability of web systems. In: 19th International Conference on Requirements Engineering, August 29 - September 2, 2011 , Trento, Italy.
- Franqueira, Virginia Nunes Leas; Tun, Thein Than; Yu, Yijun; Wieringa, Roel and Nuseibeh, Bashar (2011). Risk and argument: a risk-based argumentation method for practical security. In: 19th IEEE International Conference on Requirements Engineering, 29 Aug - 2 Sep 2011, Trento, Italy, pp. 239–248.
- Yu, Yijun; Tun, Thein; Tedeschi, Alessandra; Franqueira, Virginia N. L. and Nuseibeh, Bashar (2011). OpenArgue: supporting argumentation to evolve secure software systems. In: 2011 IEEE 19th International Requirements Engineering Conference, pp. 351–352.
- Peng, Xin; Yu, Yijun and Zhao, Wenyun (2011). Analyzing evolution of variability in a software product line: from contexts and requirements to features. Information and Software Technology, 53(7) pp. 707–721.
- Massacci, Fabio; Mylopoulos, John; Paci, Federica; Tun, Thein and Yu, Yijun (2011). An extended ontology for security requirements. In: Advanced Information Systems Engineering Workshops, pp. 622–636.
- Wermelinger, Michel; Yu, Yijun; Lozano, Angela and Capiluppi, Andrea (2011). Assessing architectural evolution: a case study. Empirical Software Engineering, 16(5) pp. 623–666.
- Benats, Guillaume; Bandara, Arosha; Yu, Yijun; Colin, Jean-Noel and Nuseibeh, Bashar (2011). PrimAndroid: privacy policy modelling and analysis for Android applications. In: IEEE International Symposium on Policies for Distributed Systems and Networks, 6-8 June 2011, Pisa, Italy.
- Borges, Rafael V.; Garcez, Artur D'Avila; Lamb, Luís C. and Nuseibeh, Bashar (2011). Learning to adapt requirements specifications of evolving systems (NIER Track). In: 33rd International Conference on Software Engineering (ICSE 2011), 21-28 May 2011, Honolulu, Hawaii, USA.
- Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo ; Willis, Alistair and Nuseibeh, Bashar (2011). Analysing anaphoric ambiguity in natural language requirements. Requirements Engineering, 16(3) pp. 163–189.
- Rogers, Yvonne; Sharp, Helen and Preece, Jenny (2011). Interaction Design: Beyond Human-Computer Interaction (3rd ed). Chichester: Wiley.
- Bauer, Andreas; Jürjens, Jan and Yu, Yijun (2011). Run-time security traceability for evolving systems. The Computer Journal, 54(1) pp. 58–87.
- Aschoff, Rafael and Zisman, Andrea (2011). QoS-driven proactive adaptation of service composition. In: 9th International Conference on Service Oriented Computing (ICSOC 2011), 5-8 December 2011, Paphos, Cyprus.
- Bergmann, Gábor; Massacci, Fabio; Paci, Federica; Tun, Thein; Varró, Dániel and Yu, Yijun (2011). A tool for managing evolving security requirements. In: CAiSE Forum, 22-24 June 2011, London, pp. 49–56.
- Blair, Gordon S.; Bennaceur, Amel; Georgantas, Nikolaos; Grace, Paul; Issarny, Valérie; Nundloll, Vatsala and Paolucci, Massimo (2011). The role of ontologies in emergent middleware: supporting interoperability in complex distributed systems. In: Middleware 2011, Springer-Verlag, pp. 410–430.
- Butler, Simon; Wermelinger, Michel; Yu, Yijun and Sharp, Helen (2011). Improving the tokenisation of identifier names. In: ECOOP 2011 – Object-Oriented Programming (Mira, Mezini ed.), Lecture Notes in Computer Science, Springer Verlag, pp. 130–154.
- Butler, Simon; Wermelinger, Michel; Yu, Yijun and Sharp, Helen (2011). Mining Java Class Naming Conventions. In: 27th IEEE International Conference on Software Maintenance, 25-30 September 2011, Williamsburg, VA, USA, pp. 93–102.
- Chen, Bihuan; Peng, Xin; Yu, Yijun and Zhao, Wenyun (2011). Survivability-oriented self-tuning of web systems. In: 20th International World Wide Web Conference, 28 March-1 April 2011, Hyderabad, India.
- Dilshener, Tezcan and Wermelinger, Michel (2011). Relating Developers’ Concepts and Artefact Vocabulary in a Financial Software Module. In: 27th IEEE International Conference on Software Maintenance, 25-30 September 2011, Williamsburg VA, USA.
- Ferreira, Jennifer; Sharp, Helen and Robinson, Hugh (2011). User experience design and agile development: managing cooperation through articulation work. Software: Practice and Experience, 41(9) pp. 963–974.
- González, Antonio; Therón, Roberto; García-Peñalvo, Francisco; Wermelinger, Michel and Yu, Yijun (2011). Maleku: an evolutionary visual software analytics tool for providing insights into software evolution. In: 27th International Conference on Software Maintenance, 25-30 September 2011, Williamsburg VA, USA.
- Grace, Paul; Georgantas, Nikolaos; Bennaceur, Amel; Blair, Gordon S.; Chauvel, Franck; Issarny, Valérie; Paolucci, Massimo; Saadi, Rachid; Souville, Betrand and Sykes, Daniel (2011). The CONNECT architecture. In: Bernardo, Marco and Issarny, Valérie eds. Formal Methods for Eternal Networked Software Systems. Lecture Notes in Computer Science (6659). Berlin: Springer, pp. 27–52.
- Heyman, Thomas; Yskout, Koen; Scandariato, Riccardo; Schmidt, Holger and Yu, Yijun (2011). The Security Twin Peaks. In: Engineering Secure Software and Systems - Third International Symposium, 09-10 Feb 2011, Madrid, Spain.
- Hughes, Craig; Wermelinger, Michel and Holland, Simon (2011). Sound Spheres: A Design Study of the Articulacy of a Non-Contact Finger Tracking Virtual Musical Instrument. In: 8th Sound and Music Computing Conference, 6-9 July 2011, Padova, Italy.
- Hundhausen, Christopher; Fairbrother, Dana and Petre, Marian (2011). The "prototype walkthrough": a studio-based learning activity for human-computer interaction courses. In: ICER: 7th International Computing Education Research Workshop, 8-9 Aug 2011, Providence, RI, USA.
- Issarny, Valérie; Bennaceur, Amel and Bromberg, Yérom-David (2011). Middleware-layer connector synthesis: beyond state of the art in middleware interoperability. In: Bernardo, Marco and Issarny, Valérie eds. Formal Methods for Eternal Networked Software Systems: 11th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2011, Bertinoro, Italy, June 13-18, 2011. Advanced Lectures. Lecture Notes in Computer Science (6659). Berlin Heidelberg: Springer, pp. 217–255.
- Mancini, Clara; Rogers, Yvonne; Thomas, Keerthi; Joinson, Adam; Price, Blaine; Bandara, Arosha; Jedrzejczyk, Lukasz and Nuseibeh, Bashar (2011). In the best families: tracking and relationships. In: 29th International ACM Conference on Human Factors in Computing Systems, ACM CHI 2011, 07-12 May 2011, Vancouver, Canada, pp. 2419–2428.
- Montrieux, Lionel; Wermelinger, Michel and Yu, Yijun (2011). Challenges in Model-Based Evolution and Merging of Access Control Policies. In: Joint 12th International Workshop on Principles on Software Evolution and 7th ERCIM Workshop on Software Evolution, 5-6 Sep 2011, Szeged, Hungary.
- Montrieux, Lionel; Wermelinger, Michel and Yu, Yijun (2011). Tool support for UML-based specification and verification of role-based access control properties. In: 8th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering , 4-9 Sep 2011, Szeged, Hungary.
- Peng, Xin; Xing, Zhenchang; Tan, Xi; Yu, Yijun and Zhao, Wenyun (2011). Iterative context-aware feature location (NIER track). In: 33rd International Conference on Software Engineering (ICSE 2011), 21-28 May 2011, Honolulu, Hawaii, USA.
- Plonka, Laura; Segal, Judith; Sharp, Helen and van der Linden, Janet (2011). Collaboration in Pair Programming: driving and switching. In: XP 2011 : 12th International Conference on Agile Software Development, 10-13 May 2011.
- Sharp, Helen and Yu, Yijun (2011). Analysing requirements in a case study of pairing. In: Workdhop on Agile Requirements Engineering (Agile RE) at ECOOP 2011 25th European Conference on Object-Oriented Programming, 26 July 2011, Lancaster, UK.
- Trew, Tim; Botterweck, Goetz and Nuseibeh, Bashar (2011). A reference architecture for consumer electronics products and its application in requirements engineering. In: Avgeriou, P.; Grundy, J.; Hall, J. G.; Lago, P. and Mistrik, I. eds. Relating Software Requirements and Architectures. Heidelberg, Germany and London, UK and New York, USA: Springer, pp. 203–231.
- Wermelinger, Michel and Yu, Yijun (2011). Some issues in the 'archaeology' of software evolution. In: Fernandes, J. M.; Lämmel, R.; Visser, J. and Saraiva, J. eds. Generative and Transformational Techniques in Software Engineering III. Lecture Notes in Computer Science (6491). Springer, pp. 426–445.
- Yu, Yijun; Petre, Marian and Tun, Thein Than (2011). Miki: a wiki for synchronous modeling of software requirements. In: 4th FlexiTools workshop @ ICSE 2011, 22 May 2011, Waikiki, Honolulu, Hawaii.
2010
- Barroca, Leonor; Rapanotti, Lucia; Petre, Marian; Vargas-Vera, Maria and Reeves, Ahmad (2010). Developing research degrees online. In: International Conference on Education, Research and Innovation, 15-17 Nov 2010, Madrid, Spain.
- Petre, Marian; van der Hoek, André and Baker, Alex (2010). Editorial. Design Studies, 31(6) pp. 533–544.
- Bandara, Arosha; Shinpei, Hayashi; Jurjens, Jan; Kaiya, Haruhiko; Kubo, Atsuto; Laney, Robin; Mouratidis, Haris; Nhlabatsi, Armstrong; Nuseibeh, Bashar; Tahara, Yasuyuki; Tun, Thein; Washizaki, Hironori; Yoshioka, Nobukazi and Yu, Yijun (2010). Security patterns: comparing modeling approaches. In: Mouratidis, Haris ed. Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: IGI Global, pp. 75–111.
- Freudenberg, SallyAnn and Sharp, Helen (2010). The top 10 burning research questions from practitioners. IEEE Software, 27(5) pp. 8–9.
- Sach, Rien; Petre, Marian and Sharp, Helen (2010). The use of MBTI in software engineering. In: 22nd Annual Psychology of Programming Interest Group 2010, 19-22 September 2010, Universidad Carlos III de Madrid.
- Sach, Rien; Sharp, Helen and Petre, Marian (2010). Continued Involvement in Software Development: Motivational Factors. In: Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ACM, pp. 331–334.
- Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha and Nuseibeh, Bashar (2010). “Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications. In: MobileHCI '10: Proceedings of the 12th International Conference on Human Computer Interaction with Mobile Devices and Services, 7-10 September 2010, Libon, Portugal, ACM, pp. 411–412.
- Niu, Nan; Savolainen, Juha and Yu, Yijun (2010). Variability modeling for product line viewpoints integration. In: 34th Annual IEEE Computer Software and Applications Conference, 19-23 July 2010, Seoul, South Korea.
- Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2010). Requirements-driven design of service-oriented interactions. IEEE Software, 27(6) pp. 25–32.
- Jedrzejczyk, Lukasz; Price, Blaine A.; Bandara, Arosha K. and Nuseibeh, Bashar (2010). On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. In: SOUPS '10: Proceedings of the Sixth Symposium on Usable Privacy and Security, 14-16 July 2010, ACM, pp. 1–12.
- Tun, Thein Than; Yu, Yijun; Haley, C. and Nuseibeh, B. (2010). Model-Based argument analysis for evolving security requirements. In: Fourth International Conference on Secure Software Integration and Reliability Improvement (SSIRI), 2010, IEEE, pp. 88–97.
- Nuseibeh, Bashar and Zave, Pamela eds. (2010). Software Requirements and Design: The Work of Michael Jackson. Good Friends Publishing Company.
- Spanoudakis, George and Zisman, Andrea (2010). Discovering services during service-based system design using UML. IEEE Transactions on Software Engineering, 36(3) pp. 371–389.
- Mancini, Clara; Rogers, Yvonne; Bandara, Arosha; Coe, Tony; Jedrzejczyk, Lukasz; Joinson, Adam; Price, Blaine; Thomas, Keerthi and Nuseibeh, Bashar (2010). Contravision: Exploring users' reactions to futuristic technology. In: Proceedings of the 28th International Conference on Human factors in computing systems, 10-15 April 2010, Atlanta Georgia, USA, pp. 153–162.
- Price, Blaine A.; Mancini, Clara; Rogers, Yvonne; Bandara, Arosha K.; Coe, Tony; Joinson, Adam N.; Lay, Jeffery A. and Nuseibeh, Bashar (2010). ContraVision: presenting contrasting visions of future technology. In: 28th International Conference on Human Factors in Computing Systems, 10-15 Apr 2010, Atlanta, GA, USA, pp. 4759–4764.
- Butler, Simon; Wermelinger, Michel; Yu, Yijun and Sharp, Helen (2010). Exploring the Influence of Identifier Names on Code Quality: An empirical study. In: 14th European Conference on Software Maintenance and Reengineering, 15-18 March 2010, Madrid, Spain, pp. 156–165.
- Bennaceur, Amel; Blair, Gordon; Chauvel, Franck; Gang, Huang; Georgantas, Nikolaos; Grace, Paul; Howar, Falk; Inverardi, Paola; Issarny, Valrie; Paolucci, Massimo; Pathak, Animesh; Spalazzese, Romina; Steffen, Bernhard and Souville, Bertrand (2010). Towards an architecture for runtime interoperability. In: Leveraging Applications of Formal Methods, Verification, and Validation, Springer, pp. 206–220.
- Calo, Seraphin B.; Karat, Clare-Marie; Karat, John; Lobo, Jorge; Craven, Robert; Lupu, Emil ; Ma, Jiefei; Russo, Alessandra; Sloman, Morris and Bandara, Arosha (2010). Policy technologies for security management in coalition networks. In: Verma, Dinesh ed. Network Science for Military Coalition Operations: Information Exchange and Interaction. Premier Reference Source. Pennsylvania, USA: IGI Global, pp. 146–173.
- Hundhausenm , Christopher; Fairbrother, Dana and Petre, Marian (2010). The “prototype walkthrough”: a studio-based learning activity for the next generation of HCI education. In: Next Generation of HCI and Education: CHI 2010 Workshop on UI Technologies and Educational Pedagogy, 11 Apr 2010, Atlanta, GA.
- Lozano Rodriguez, Angela and Wermelinger, Michel (2010). Tracking clones' imprint. In: 4th International Workshop on Software Clones, 8 May 2010, Cape Town, South Africa.
- Montrieux, Lionel; Jürjens, Jan; Haley, Charles; Yu, Yijun; Schobbens, Pierre-Yves and Toussaint, Hubert (2010). Tool support for code generation from a UMLsec property. In: ASE'10 - 25th International Conference on Automated Software Engineering, 20-24 September 2010, Antwerp, Belgium.
- Nhlabatsi, Armstrong; Nuseibeh, Bashar and Yu, Yijun (2010). Security requirements engineering for evolving software systems: a survey. International Journal of Secure Software Engineering (IJSSE), 1(1) pp. 54–73.
- Peng, Xin; Chen, Bihuan; Yu, Yijun and Zhao, Wenyun (2010). Self-tuning of software systems through goal-based feedback loop control. In: 18th IEEE International Requirements Engineering Conference (RE 2010), 27September-1 October 2010, Sydney, Australia.
- Petre, Marian (2010). Mental imagery and software visualization in high-performance software development teams. Journal of Visual Languages & Computing, 21(3) pp. 171–183.
- Robinson, Hugh and Sharp, Helen (2010). Collaboration, communication and coordination in Agile software development practice. In: Mistrík, Ivan; Grundy, John; Hoek, André and Whitehead, Jim eds. Collaborative Software Engineering. Berlin/Heidelberg: Springer, pp. 93–108.
- Sharp, Helen and Robinson, Hugh (2010). Three ‘c’s of agile practice: collaboration, coordination and communication. In: Dingsøyr, Torgeir; Dybå, Tore and Moe, Nils Brede eds. Agile Software Development: Current Research and Future Directions. Berlin: Springer, pp. 61–85.
- Siveroni, Igor; Zisman, Andrea and Spanoudakis, George (2010). A UML-based static verification framework for security. Requirements Engineering , 15(1) pp. 95–118.
- Supakkul, Sam; Hill, Tom; Chung, Lawrence; Tun, Thein Than and do Prado Leite, Julio Cesar Sampaio (2010). An NFR pattern approach to dealing with NFRs. In: 2010 18th IEEE International Requirements Engineering Conference, pp. 179–188.
- Wermelinger, Michel and Bandara, Arosha (2010). Commentary on ‘Software architectures and mobility: A roadmap’. Journal of Systems and Software, 83(6) pp. 899–901.
- Yang, Hui; De Roeck, Anne; Gervasi, Vincenzo; Willis, Alistair and Nuseibeh, Bashar (2010). Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements. In: 18th International IEEE Requirements Engineering Conference (RE'10), 27 Sep - 1 Oct 2010, Sydney, Australia, pp. 25–34.
- Yang, Hui; De Roeck, Anne; Willis, Alistair and Nuseibeh, Bashar (2010). A methodology for automatic identification of nocuous ambiguity. In: The 23rd International Conference on Computational Linguistics (Coling 2010), 23-27 Aug 2010, Beijing, China, pp. 1218–1226.
- Yang, Hui; Willis, Alistair; De Roeck, Anne and Nuseibeh, Bashar (2010). Automatic detection of nocuous coordination ambiguities in natural language requirements. In: Proceedings of the IEEE/ACM international conference on Automated software engineering, ACM, pp. 53–62.
2009
- Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2009). Requirements-driven collaborative choreography customization. In: 7th International Joint Conference on Service Oriented Computing, 23-27 November 2009, Stockholm, Sweden.
- Overton, Jerry; Hall, Jon; Rapanotti, Lucia and Yu, Yijun (2009). Towards a problem oriented engineering theory of pattern-oriented analysis and design. In: Computer Software and Applications Conference, 2009. COMPSAC '09. 33rd Annual IEEE International pp. 255–260.
- Gacitua, R.; Ma, L.; Nuseibeh, B.; Piwek, P.; De Roeck, A.; Rouncefield, M.; Sawyer, P.; Willis, A. and Yang, H. (2009). Making tacit requirements explicit. In: Second International Workshop on Managing Requirements Knowledge (MaRK’09) , 1 Sep 2009, Altanta, USA.
- Ma, Lin; Nuseibeh, Bashar; Piwek, Paul; De Roeck, Anne and Willis, Alistair (2009). On presuppositions in requirements. In: 2009 Second International Workshop on Managing Requirements Knowledge (MaRK'09), 1 September 2009, Atlanta, Georgia, USA.
- Nuseibeh, Bashar; Haley, Charles B. and Foster, Craig (2009). Securing the skies: In requirements we trust. Computer, 42(9) pp. 64–72.
- Tun, Thein Than; Trew, Tim; Jackson, Michael; Laney, Robin and Nuseibeh, Bashar (2009). Specifying features of an evolving software system. Software: Practice and Experience, 39(11) pp. 973–1002.
- Petre, Marian (2009). Insights from expert software design practice. In: 7th joint meeting of the European Software Engineering Conference (ESEC) and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 24-28 August 2009, Amsterdam, The Netherlands, pp. 233–242.
- Tun, Thein; Jackson, Michael; Laney, Robin; Nuseibeh, Bashar and Yu, Yijun (2009). Are your lights off? Using problem frames to diagnose system failures. In: 17th IEEE International Requirements Engineering Conference, 31 August - 4 September 2009, Atlanta, Georgia, USA.
- Thomas, Keerthi; Mancini, Clara; Jedrzejczyk, Lukasz; Bandara, Arosha K.; Joinson, Adam; Price, Blaine A.; Rogers, Yvonne and Nuseibeh, Bashar (2009). Studying location privacy in mobile applications: 'predator vs. prey' probes. In: Proceedings of the 5th Symposium on Usable Privacy and Security, 15-17 July 2009, California, ACM, p. 1.
- Govaerts, John; Bandara, Arosha and Curran, Kevin (2009). A formal logic approach to firewall packet filtering analysis and generation. Artificial Intelligence Review, 29(3-4) pp. 223–248.
- Nhlabatsi, Armstrong; Laney, Robin and Nuseibeh, Bashar (2009). Feature interaction as a context sharing problem. In: International Conference on Feature Interactions, 11-12 June, University of Lisbon, Portugal.
- Niu, Nan; Yu, Yijun; González-Baixauli, Bruno; Ernst, Neil; Leite, Julio Cesar Sampaio do Prado and Mylopoulos, John (2009). Aspects across Software Life Cycle: A Goal-Driven Approach. In: Katz, Shmuel; Ossher, Harold; France, Robert and Jézéquel, Jean-Marc eds. Transactions on Aspect-Oriented Software Development VI. Lecture Notes in Computer Science, VI. Springer, pp. 83–110.
- Hall, Tracy; Baddoo, Nathan; Beecham, Sarah; Robinson, Hugh and Sharp, Helen (2009). A systematic review of theory use in studies investigating the motivations of software engineers. ACM Transactions on Software Engineering and Methodology, 18(3), article no. 10.
- Robinson, Hugh and Sharp, Helen (2009). The emergence of object-oriented technology: the role of community. Behaviour & Information Technology, 28(3) pp. 211–222.
- Wermelinger, Michel; Yu, Yijun and Strohmaier, Markus (2009). Using formal concept analysis to construct and visualise hierarchies of socio-technical relations. In: Proceedings of the 31st International Conference on Software Engineering, Companion Volume, 18-24 May 2009, Vancouver, IEEE.
- Craven, Robert; Lobo, Jorge; Lupu, Emil C.; Ma, Jiefei; Russo, Alessandra; Bandara, Arosha K.; Calo, Seraphin and Sloman, Morris (2009). Expressive policy analysis with enhanced system dynamicity. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 10-12 March 2009, Sydney, Australia, ACM.
- Wang, Yiqiao; Mcilraith, Sheila A.; Yu, Yijun and Mylopoulos, John (2009). Monitoring and diagnosing software requirements. Automated Software Engineering, 16(1) pp. 3–35.
- Jirapanthong, Waraporn and Zisman, Andrea (2009). XTraQue: traceability for product line systems. Software and Systems Modeling, 8(1) pp. 117–144.
- Sharp, Helen; Robinson, Hugh and Petre, Marian (2009). The role of physical artefacts in agile software development: Two complementary perspectives. Interacting with Computers, 21(1-2) pp. 108–116.
- Yu, Yijun; Niu, Nan; González-Baixauli, Bruno; Mylopoulos, John; Easterbrook, Steve and Leite, Julio Cesar Sampaio do Prado (2009). Requirements engineering and aspects. In: Lyytinen, Kalle; Loucopoulos, Pericles; Mylopoulos, John and Robinson, Bill eds. Design Requirements Engineering: A Ten-Year Perspective. Lecture Notes in Business Information Processing, 14. Springer Berlin Heidelberg, pp. 432–452.
- Bandara, A. K.; Kakas, A. C.; Lupu, E. C. and Russo, A. (2009). Using argumentation logic for firewall configuration management. In: IFIP/IEEE International Symposium on Integrated Network Management (IM '09), 1-5 June 2009, Long Island, USA, pp. 180–187.
- Bennaceur, Amel; Singh, Pushpendra; Raverdy, Pierre-Guillaume and Issarny, Valerie (2009). The iBICOOP middleware: enablers and services for emerging pervasive computing environments. In: 2009 IEEE International Conference on Pervasive Computing and Communications, IEEE.
- Butler, Simon; Wermelinger, Michel; Yu, Yijun and Sharp, Helen (2009). Relating identifier naming flaws and code quality: An empirical study. In: 16th Working Conference on Reverse Engineering, 13-16 October 2009, Lille, France.
- Charalambides, M.; Flegkas, P.; Pavlou, G.; Rubio-Loyola, J.; Bandara, A. K.; Lupu, E. C.; Russo, A.; Dulay, N. and Sloman, M. (2009). Policy conflict analysis for diffserv quality of service management. IEEE Transactions on Network and Service Management, 6(1) pp. 15–30.
- Classen, Andreas; Heymans, Patrick; Tun, Thein and Nuseibeh, Bashar (2009). Towards safer composition. In: 2009 31st International Conference on Software Engineering - Companion Volume, pp. 227–230.
- Corapi, Domenico; Ray, Oliver; Russo, Alessandra; Bandara, Arosha and Lupu, Emil (2009). Learning rules from user behaviour. In: Artificial Intelligence Applications and Innovations III: Proceedings of the 5TH IFIP Conference on Artificial Intelligence Applications and Innovations (AIAI '2009), 23-25 April 2009, Thessaloniki, Greece, pp. 459–468.
- Haley, Debra; Thomas, Pete; Petre, Marian and De Roeck, Anne (2009). Human fallibility: How well do human markers agree? In: The Eleventh Australasian Computing Education Conference (ACE2009), 20-23 Jan 2009, Wellington, New Zealand.
- Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2009). From organizational requirements to service choreography. In: 2009 IEEE Congress on Services (SERVICES 2009), 6-10 July, 2009, Los Angeles, CA, USA.
- Mancini, Clara; Rogers, Yvonne; Jedrzejczyk, Lukasz; Thomas, Keerthi; Price, Blaine; Joinson, Adam; Bandara, Arosha and Nuseibeh, Bashar (2009). A multi-pronged empirical approach to mobile privacy investigation. In: Workshop on Mobile User Experience Research: Challenges, Methods & Tools. 27th ACM International Conference on Human Factors in Computing Systems, ACM CHI 2009, 4-9 Apr 2009, Boston, USA.
- Mancini, Clara; Thomas, Keerthi; Rogers, Yvonne; Price, Blaine A.; Jedrzejczyk, Lukazs; Bandara, Arosha K.; Joinson, Adam N. and Nuseibeh, Bashar (2009). From spaces to places: Emerging contexts in mobile privacy. In: Proceedings of the 11th International conference on Ubiquitous computing, 30 Sept - 3 Oct 2009, Orlando, Florida, USA, ACM, pp. 1–10.
- Ostacchini, Ireo and Wermelinger, Michel (2009). Managing assumptions during agile development. In: Fourth ICSE Workshop on Sharing and Reusing Architectural Knowledge, 16 May 2009, Vancouver, Canada.
- Sharp, Helen; Baddoo, Nathan; Beecham, Sarah; Hall, Tracy and Robinson, Hugh (2009). Models of motivation in software engineering. Information and Software Technology, 51(1) pp. 219–233.
- Tun, Thein; Boucher, Quentin; Classen, Andreas; Hubaux, Arnaud and Heymans, Patrick (2009). Relating requirements and feature configurations: a systematic approach. In: Proceedings of the 13th International Software Product Line Conference, 24-28 Aug 2009, Carnegie Mellon University Pittsburgh, PA, USA, Carnegie Mellon University, pp. 201–210.
- Tun, Thein; Chapman, Rod; Haley, Charles; Laney, Robin and Nuseibeh, Bashar (2009). A framework for developing feature-rich software systems. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ECBS 2009), 14-16 April 2009, San Francisco, California, USA.
- Tun, Thein and Heymans, Patrick (2009). Concerns and their separation in feature diagram languages: An informal survey. In: Workshop on Scalable Modelling Techniques for Software Product Lines, August 24, 2009, San Francisco, CA, USA.
- Tun, Thein Than; Yu, Yijun; Laney, Robin and Nuseibeh, Bashar (2009). Early identification of problem interactions: A tool-supported approach. In: Glinz, Martin and Heymans, Patrick eds. Requirements Engineering: Foundation for Software Quality, 15th International Working Conference. Lecture Notes in Computer Science (5512). Germany: Springer Verlag, pp. 74–88.
2008
- Jackson, Michael (2008). Automated software engineering: supporting understanding. Automated Software Engineering, 15(3-4) pp. 275–281.
- Lozano, Angela and Wermelinger, Michel (2008). Assessing the effect of clones on changeability. In: Proceedings of the 24th IEEE International Conference on Software Maintenance, 28 Sept - 4 Oct 2008, Beijing, China, IEEE, pp. 227–236.
- Sharp, Helen and Robinson, Hugh (2008). Collaboration and co-ordination in mature eXtreme programming teams. International Journal of Human-Computer Studies, 66(7) pp. 506–518.
- Wermelinger, Michel; Yu, Yijun and Lozano Rodriguez, Angela (2008). Design Principles in Architectural Evolution: a Case Study. In: Proceedings of the 24th IEEE International Conference on Software Maintenance, 28 Sept - 4 Oct 2008, Beijing, China, IEEE, pp. 396–405.
- Lozano Rodriguez, Angela; Wermelinger, Michel and Nuseibeh, Bashar (2008). Evaluating the relation between changeability decay and the characteristics of clones and methods. In: 4th International ERCIM Workshop on Software Evolution and Evolvability, 15-16 September 2008, L'Aquila, Italy, IEEE, pp. 100–109.
- Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2008). Customizing choreography: Deriving conversations from organizational dependencies. In: 12th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2008), 15-19 September 2008, München, Germany.
- Haley, Charles B. and Nuseibeh, Bashar (2008). Bridging requirements and architecture for systems of systems. In: 3rd International Symposium on Information Technology (ITSIM'08), 26-28 Aug 2008, Kuala Lumpur, Malaysia.
- Beecham, Sarah; Baddoo, Nathan; Hall, Tracy; Robinson, Hugh and Sharp, Helen (2008). Motivation in software engineering: a systematic literature review. Information and Software Technology, 50(9-10) pp. 860–878.
- Hall, Tracy; Sharp, Helen; Beecham, Sarah; Baddoo, Nathan and Robinson, Hugh (2008). What do we know about developer motivation? IEEE Software, 25(4) pp. 92–94.
- Yu, Yijun; Lapouchnian, Alexei; Liaskos, Sotirios; Mylopoulos, John and Leite, Julio C. S. P. (2008). From goals to high-variability software design. In: Proceedings of Foundations of Intelligent Systems: 17th International Symposium, ISMIS 2008, Springer, pp. 1–16.
- Yu, Yijun; Leite, Julio Cesar Sampaio do Prado; Lapouchnian, Alexei and Mylopoulos, John (2008). Configuring features with stakeholder goals. In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 16-20 Mar 2008, Fortaleza, Ceara, Brazil.
- Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2008). Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering, 34(1) pp. 133–153.
- Bandara, A. K.; Damianou, N.; Lupu, E. C. and Sloman, M. (2008). Policy based management. In: Bergstra, J. and Burgess, M. eds. Handbook of Network and System Administration. Elsevier, pp. 507–564.
- Classen, Andreas; Laney, Robin; Tun, Thein Than; Heymans, Patrick and Hubaux, Arnaud (2008). Using the event calculus to reason about problem diagrams. In: Proceedings of the 3rd international workshop on applications and advances of problem frames, May 2008, Leipzig, Germany.
- Ellims, Mike; Ince, Darrel and Petre, Marian (2008). The effectiveness of t-way test data generation. In: Computer Safety, Reliability, and Security: 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, 22-25 September 2008, Berlin.
- Ernst, Neil; Mylopoulos, John; Yu, Yijun and Ngyuen, Tien T. (2008). Supporting requirements model evolution throughout the system life-cycle. In: 16th IEEE International Requirements Engineering Conference, 08-12 Sep 2008, Barcelona, Spain.
- Fernandez-Ramil, Juan; Lozano, Angela; Wermelinger, Michel and Capiluppi, Andrea (2008). Empirical studies of open source evolution. In: Mens, Tom and Demeyer, Serge eds. Software Evolution. Berlin: Springer, pp. 263–288.
- Haley, Charles B; Laney, Robin; Moffett, Jonathan D and Nuseibeh, Bashar (2008). Arguing satisfaction of security requirements. In: Nemati, Hamid ed. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Volume 4. Information Science Reference.
- Jurjens, Jan; Schreck, Jörg and Yu, Yijun (2008). Automated analysis of permission-based security using UMLsec (TOOL DEMO). In: ETAPS 2008 , 29 March - 6 April 2008, Budapest, Hungary.
- Minocha, Shailey; Petre, Marian and Roberts, Dave (2008). Using wikis to simulate distributed requirements development in a software engineering course. International Journal of Engineering Education, 24(4) pp. 689–704.
- Richards, Mike; Price, Blaine A. and Nuseibeh, Bashar (2008). Placing computer security at the heart of learning. Progress in Informatics, 5(2008) pp. 91–98.
- Tun, Thein Than; Hall, Jon G.; Rapanotti, Lucia; Cox, Karl and Jin, Zhi (2008). 3rd international workshop on advances and applications of problem frames. In: International Conference on Software Engineering, 10 May 2008, Leipzig, Germany, pp. 1029–1030.
- Yu, Yijun; Jurjens, Jan and Mylopoulos, John (2008). Traceability for the maintenance of secure software. In: 2008 IEEE International Conference on Software Maintenance, p. 297.
- Yu, Yijun; Kaiya, Haruhiko; Washizaki, Hironori; Xiong, Yingfei; Hu, Zhenjiang and Yoshioka, Nobukazu (2008). Enforcing a security pattern in stakeholder goal models. In: 4th ACM Workshop on Quality of Protection in conjunction with CCS '08, 15th ACM Conference on Computer and Communications Security, 27-31 October 2008, Alexandria, VA, USA.
- Yu, Yijun and Wermelinger, Michel (2008). Graph-centric tools for understanding the evolution and relationships of software structures. In: 2008 15th Working Conference on Reverse Engineering, p. 329.
2007
- Wang, Yiqiao; McIlraith, Sheila A.; Yu, Yijun and Mylopoulos, John (2007). An automated approach to monitoring and diagnosing requirements. In: 22nd IEEE/ACM international conference on Automated software engineering, 7-9 Nov 2007, Atlanta, Georgia, USA.
- Salifu, Mohammed; Yu, Yijun and Nuseibeh, Bashar (2007). Specifying Monitoring and Switching Problems in Context. In: 15th IEEE International Requirements Engineering Conference (RE 2007), 15 Oct - 19 Oct 2007, Delhi, India.
- Haley, Debra; Thomas, Pete; De Roeck, Anne and Petre, Marian (2007). Seeing the whole picture: evaluating automated assessment systems. Innovation in Teaching And Learning in Information and Computer Sciences, 6(4) pp. 203–224.
- Lapouchnian, Alexei; Yu, Yijun and Mylopoulos, John (2007). Requirements-driven design and configuration management of business processes. In: ed. Business process management. Lecture Notes in Computer Science, 4714/2. Berlin: Springer.
- Hall, Jon G.; Rapanotti, Lucia and Jackson, Michael (2007). Problem Oriented Software Engineering: A design-theoretic approach for software engineering. In: Proceedings of the 11th IEEE International Requirements Engineering Conference, pp. 181–187.
- Hall, Jon G.; Rapanotti, Lucia and Jackson, Michael (2007). Problem oriented software engineering: A design-theoretic framework for software engineering. In: Proceedings of the Fifth IEEE International Conference on Software Engineering and Formal Methods (SEFM 2007), 10 -14 September 2007, London, UK.
- Petre, Marian and Blackwell, Alan (2007). Children as unwitting end-user programmers. In: IEEE Symposium on Visual Languages and Human-Centric Computing, 23-27 Sep 2007, Coeur d'Alène, Idaho.
- Yu, Yijun; Lu, Jianguo; Ramil, Juan F. and Yuan, Phil (2007). Comparing Web Services with other Software Components. In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA.
- Bandara, A. K.; Russo, A. and Lupu, E. C. (2007). Towards learning privacy policies. In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (Western Ontario, University of ed.), 13-15 June, Bologna, Italy, IEEE Computer Society, p. 274.
- Robinson, Hugh; Segal, Judith and Sharp, Helen (2007). Ethnographically-informed empirical studies of software practice. Information and Software Technology, 49(6) pp. 540–551.
- Capiluppi, A.; Fernandez-Ramil, J.; Higman, J.; Sharp, H.C. and Smith, N. (2007). An Empirical Study of the Evolution of an Agile-Developed Software System. In: 29th International Conference on Software Engineering, 20-26 May 2007, Minneapolis, USA.
- Nocera, Jose Abdelnour; Dunckley, Lynne and Sharp, Helen (2007). An approach to the evaluation of usefulness as a social construct using technological frames. International Journal of Human-Computer Interaction, 22(1-2) pp. 153–172.
- Classen, Andreas; Heymans, Patrick; Laney, Robin; Nuseibeh, Bashar and Tun, Thein Than (2007). On the structure of problem variability: From feature diagrams to problem frames. In: Proceedings of International workshop on Variability Modeling of Software-intensive Systems, 16-18 January 2007, Limerick, Ireland, pp. 109–118.
- Oliveira, Cristóvão and Wermelinger, Michel (2007). A model-driven approach to extract views from an architecture description language. In: Proceedings of the Working IEEE/IFIP Conference on Software Architecture (WICSA'07), 6-9 January 2007, Mumbai, India.
- Salifu, Mohammed; Nuseibeh, Bashar; Rapanotti, Lucia and Tun, Thein Than (2007). Using problem descriptions to represent variabilities for context-aware applications. In: Proceedings of 1st International workshop on Variability Modeling of Software-intensive Systems (VaMoS 2007), 16-18 Jan 2007, Limerick, Ireland, pp. 149–156.
- Sharp, Helen; Rogers, Yvonne and Preece, Jenny (2007). Interaction Design: Beyond Human-Computer Interaction. Second Edition. UK: John Wiley.
- Haley, Debra; Thomas, Pete; De Roeck, Anne and Petre, Marian (2007). Measuring improvement in latent semantic analysis-based marking systems: using a computer to mark questions about HTML. In: ACM 9th International Australasian Computing Education Conference, 30 Jan - 02 Feb 2007, Ballarat, Victoria, Australia.
- Heath, Tom; Motta, Enrico and Petre, Marian (2007). Computing word-of-mouth trust relationships in social networks from Semantic Web and Web 2.0 data sources. In: The 4th European Semantic Web Conference (ESWC 2007), 3-7Jun e2007, Innsbruck, Austria.
- Jackson, Michael (2007). Testing the machine in the world. In: Bin, Eyal; Ziv, Avi and Ur, Shmuel eds. Hardware and Software, Verification and Testing. Lecture Notes in Computer Science; Programming and Software Engineering (Vol. 4383). Springer, pp. 198–203.
- Jürjens, Jan and Yu, Yijun (2007). Tools for model-based security engineering: models vs. code. In: 22nd IEEE/ACM International Conference on Automated Software Engineering, 5-9 November 2007, Atlanta, Georgia, USA.
- Laney, Robin; Tun, Thein Than; Jackson, Michael and Nuseibeh, Bashar (2007). Composing features by managing inconsistent requirements. In: Proceedings of 9th International Conference on Feature Interactions in Software and Communication Systems (ICFI 2007), 3-5 September 2007, Grenoble, France, pp. 141–156.
- Lu, Jianguo and Yu, Yijun (2007). Web service search: who, when, what, and how. In: 8th International Conference on Web Information Systems Engineering (WISE 2007) 2007, 3-7 Dec 2007, Nancy, France.
- Lu, Jianguo; Yu, Yijun; Roy, Debashis and Saha, Deepa (2007). Web service composition: a reality check. In: The 8th International Conference on Web Information Systems Engineering (WISE'07), 03-07 Dec 2007, Nancy, France.
- Niu, Nan; Easterbrook, Steve and Yu, Yijun (2007). A taxonomy of asymmetric requirements aspects. In: 6th International Conference on Aspect-Oriented Software Development (AOSD'07) , 12-16 Mar 2007, Vancouver, Canada.
- Oliveira, Cristóvão and Wermelinger, Michel (2007). The CommUnity Workbench. Science of Computer Programming, 69(1-3) pp. 46–55.
- Olsen, Anneli; Rogers, Yvonne and Sharp, Helen (2007). The snap method. In: Beyond Current User Research: Designing Methods for New Users, Technologies, and Design Processes, 27 April 2007, San Jose, California, USA.
2006
- Bandara, Arosha K.; Kakas, Antonis; Lupu, Emil C. and Russo, Alessandra (2006). Using Argumentation Logic for Firewall Policy Specification and Analysis. In: Lecture Notes in Computer Science, 4269 pp. 185–196.
- Jackson, Michael (2006). What can we expect from program verification? IEEE Computer, 39(10) pp. 65–71.
- Lapouchnian, Alexei; Yu, Yijun; Liaskos, Sotirios and Mylopoulos, John (2006). Requirements-driven design of autonomic application software. In: 16th IBM Centre for Advanced Studies Conference, 16-19 Oct 2006, Toronto, Canada.
- Chantree, Francis; Nuseibeh, Bashar; De Roeck, Anne and Willis, Alistair (2006). Identifying nocuous ambiguities in natural language requirements. In: 14th IEEE International Requirements Engineering Conference (RE'06), IEEE, pp. 56–65.
- Haley, Charles B.; Laney, Robin; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Arguing satisfaction of security requirements. In: Mouratidis, Haralambos and Giorgini, Paolo eds. Integrating security and software engineering: advances and future vision. Hershey, PA and London: Idea Group Publishing, pp. 15–42.
- Petre, Marian (2006). Cognitive dimensions 'beyond the notation'. Journal of Visual Languages & Computing, 17(4) pp. 292–301.
- Sharp, Helen; Robinson, Hugh; Segal, Judith and Furniss, Dominic (2006). The Role of Story Cards and the Wall in XP teams: a distributed cognition perspective. In: AGILE Conference, 2006, IEEE, pp. 65–75.
- Chamberlain, Stephanie; Sharp, Helen and Maiden, Neil (2006). Towards a framework for integrating agile development and user-centred design. In: Abrahamsson, Pekka; Marchesi, Michele and Succi, Giancarlo eds. Extreme Programming and Agile Processes in Software Engineering: 7th International Conference, XP 2006, Oulu, Finland, June 17-22, 2006. Proceedings. Springer Berlin, pp. 143–153.
- Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2006). A framework for security requirements engineering. In: Software Engineering for Secure Systems Workshop (SESS'06), co-located with the 28th International Conference on Software Engineering (ICSE'06), 20-21 May 2006, Shanghai, China.
- Minocha, Shailey; Petre, Marian; Tzanidou, Ekaterini; van Dijk, Geke; Roberts, Dave; Gassman, Nick; Millard, Nicola; Day, Barry and Travis, David (2006). Evaluating e-commerce environments: approaches to cross-disciplinary investigation. In: CHI 06 extended abstracts on Human factors in computing systems - CHI 06 CHI 06, p. 1121.
- Charalambides, M.; Flegkas, P.; Pavlou, G.; Rubio-Loyola, J.; Bandara, A. K.; Lupu, E. C.; Russo, A.; Sloman, M. and Dulay, N. (2006). Dynamic policy analysis and conflict resolution for DiffServ quality of service management. In: 10th IEEE/IFIP Network Operations and Management Symposium (NOMS 2006), 3-7 April 2006, Vancouver, Canada, pp. 294–304.
- Bandara, Arosha K.; Lupu, Emil C.; Russo, Alessandra; Dulay, Naranker; Sloman, Morris; Flegkas, Paris; Charalambides, Marinos and Pavlou, George (2006). Policy refinement for IP differentiated services quality of service management. IEEE Transactions on Network and Service Management, 3(2) pp. 2–13.
- Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2006). Using trust assumptions with security requirements. Requirements Engineering, 11(2) pp. 138–151.
- Petre, Marian; Minocha, Shailey and Roberts, Dave (2006). Usability beyond the website: an empirically-grounded e-commerce evaluation instrument for the total customer experience. Behaviour & Information Technology, 25(2) pp. 189–203.
- Sharp, Helen; Petre, Marian and Johnson, Jeffrey (2006). Complexity through combination: an account of knitwear design. Design Studies, 27(2) pp. 183–222.
- Buckingham Shum, Simon; Selvin, A.M.; Sierhuis, Maarten; Conklin, Jeffrey; Haley, C.B. and Nuseibeh, Bashar (2006). Hypermedia support for argumentation-based rationale: 15 years on from gIBIS and QOC. In: Dutoit, A.; McCall, R.; Mistrik, I. and Paech, B. eds. Rationale Management in Software Engineering. Berlin: Springer-Verlag, pp. 111–132.
- Ernst, Neil A.; Yu, Yijun and Mylopoulos, John (2006). Visualizing non-functional requirements. In: First International Workshop on Requirements Engineering Visualisation (REV'06), 11-15 Sep 2006, Minneapolis, Minnesota, USA.
- Heath, Thomas; Motta, Enrico and Petre, Marian (2006). Person to person trust factors in word of mouth recommendation. In: Conference on Human Factors in Computing Systems (CHI'06), 22-27 Apr 2006, Montreal, Quebec, Canada.
- Liaskos, Sotirios; Lapouchnian, Alexei; Yu, Yijun; Yu, Eric and Mylopoulos, John (2006). On Goal-based Variability Acquisition and Analysis. In: 14th IEEE International Requirements Engineering Conference (RE'06), 11-15 Sep 2006, Mineapolis/St. Paul, USA.
- Mahfouz, Ayman; Barroca, Leonor; Laney, Robin and Nuseibeh, Bashar (2006). Patterns for service-oriented information exchange requirements. In: PLoP Pattern Languages of Programs 2006, 21-23 October 2006, Portland, Oregon.
- Quinn, Brendan; Barroca, Leonor; Nuseibeh, Bashar; Fernandez-Ramil, Juan; Rapanotti, Lucia; Thomas, Pete and Wermelinger, Michel (2006). Learning software engineering at a distance. IEEE Software, 23(6) pp. 36–43.
- Sharp, Helen and Robinson, Hugh (2006). A distributed cognition account of mature XP teams. In: Abrahamsson, P.; Marchesi, M. and Succi, G. eds. Extreme Programming and Agile Processes in Software Engineering. Lecture Notes in Computer Science, 4044/2006. Berlin, Germany: Springer, pp. 1–10.
- Tun, Thein and Hall, Jon G. (2006). Developer requirements in the PF approach. In: ed. Proceedings of the 2006 international workshop on Advances and applications of problem frames. New York: ACM Press, pp. 87–90.
- Tzanidou, E.; Minocha, S.; Petre, M. and Grayson, A. (2006). Revisiting web design guidelines by exploring users' expectations, preferences and visual search behaviour. In: McEwan, T.; Gulliksen, J. and Benyon, D. eds. People and Computers XIX — The Bigger Picture. London, UK: Springer, pp. 421–438.
2005
- Lu, Jianguo; Yu, Yijun and Mylopoulos, J. (2005). A lightweight approach to semantic web service synthesis. In: International Workshop on Challenges in Web Information Retrieval and Integration (WIRI'05), 8-9 April 2005, Tokyo, Japan.
- Oliveira, Cristóvão; Wermelinger, Michel; Fiadeiro, José Luiz and Lopes, Antónia (2005). Modelling the GSM handover protocol in CommUnity. Electronic Notes in Theoretical Computer Science, 141(3) pp. 3–25.
- Haley, Debra; Nuseibeh, Bashar; Thomas, Pete; Taylor, Josie and Lefrere, Paul (2005). The Learning Grid and E-Assessment using Latent Semantic Analysis. In: Ritrovato, P.; Allison, C.; Cerri, S.; Dimitrakos, T.; Gaeta, M. and Salerno, S. eds. Towards the Learning Grid. Advances in Human Learning Services. Frontiers in Artificial Intelligence and Applications, Volume. Amsterdam, Holland: IOS Press.
- Yu, Yijun; Dayani-Fard, Homayoun; Mylopoulos, John and Andritsos, Periklis (2005). Reducing Build Time through Precompilations for Evolving Large Software. In: 21st IEEE International Conference on Software Maintenance, 26-29 Sep 2005, Budapest, Hungary.
- Petre, Marian; Tzanidou, Ekaterini; Minocha, Shailey and Grayson, Andrew (2005). Combining Eye Tracking and Conventional Techniques for Indications of User-Adaptability. In: Human-Computer Interaction - INTERACT 2005, Lecture Notes in Computer Science, Springer, Berlin, pp. 753–766.
- Yu, Yijun; Wang, Yiqiao; Mylopoulos, J.; Liaskos, S.; Lapouchnian, A. and do Prado Leite, J.C.S. (2005). Reverse Engineering Goal Models from Legacy Code. In: 13th IEEE International Conference on Requirements Engineering (RE'05), 29 Aug - 2 Sep 2005, Paris, France.
- Crook, R.; Ince, D. and Nuseibeh, Bashar (2005). On Modelling access policies: relating roles to their organisational Context. In: Proceedings of 13th IEEE International Conference on Requirements Engineering, 29 Aug-2 Sept 2005, Paris, France.
- Hall, J.G.; Mistrik, I.; Nuseibeh, B. and Silva, A. (2005). Editorial: Relating software requirements and architectures. IEE Proceedings: Software, 152(4) pp. 141–142.
- Robinson, Hugh and Sharp, Helen (2005). Organisational culture and XP: three case studies. In: Proceedings of the Agile Conference 2005, 24-29 July 2005, Denver, Colorado, USA.
- Price, Blaine A.; Adam, Karim and Nuseibeh, Bashar (2005). Keeping ubiquitous computing to yourself: a practical model for user control of privacy. International Journal of Human-Computer Studies, 63(1-2) pp. 228–253.
- Sharp, Helen; Woodman, Mark and Hovenden, Fiona (2005). Using metaphor to analyse qualitative data: Vulcans and Humans in software development. Empirical Software Engineering, 10(3) 343 -365.
- Bandara, Arosha K.; Lupu, Emil C.; Russo, Alessandra; Dulay, Naranker; Sloman, Morris; Flegkas, Paris; Charalambides, Marinos and Pavlou, George (2005). Policy refinement for DiffServ quality of service. In: IEEE eTransactions on Network and Service Management, 3(2).
- Yu, Yijun; Lu, Jianguo; Mylopoulos, John; Sun, Weiwei; Xue, Jing-Hao and D'Hollander, Erik H. (2005). Making XML Document Markups International. Software: Practice and Experience, 35(1) pp. 1–14.
- Charalambides, M.; Flegkas, P.; Pavlou, G.; Bandara, A. K.; Lupu, E. C.; Russo, A.; Dulav, N.; Sloman, M. and Rubio-Loyola, J. (2005). Policy conflict analysis for quality of service management. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, 6-8 June 2005, Stockholm, Sweden, pp. 99–108.
- Dayani-Fard, Homayoun; Yu, Yijun; Mylopoulos, John and Periklis, Andritsos (2005). Improving the build architecture of legacy C/C++ software systems. In: 8th International Conference on Fundamental Approaches to Software Engineering (FASE), 04-08 Apr 2005, Edinburgh, UK.
- do Prado Leite, Julio Cesar Sampaio; Yu, Yijun; Liu, Lin; Yu, Eric S.K. and Mylopoulos, John (2005). Quality-Based Software Reuse. In: 17th International Conference on Advanced Information Systems Engineering (CAiSE'05), 13-17 Jun 2005, Porto, Portugal.
- Haley, Charles B.; Moffett, Jonathan D.; Laney, Robin and Nuseibeh, Bashar (2005). Arguing security: validating security requirements using structured argumentation. In: Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), 29 Aug 2005, Paris, France.
- Jackson, Michael (2005). Problem structure and dependable architecture. In: De Lemos, Rojerio; Gacek, Cristina and Romanovsky, Alexander B. eds. Architecting Dependable Systems III. Lecture Notes in Computer Science (3549). Berlin: Springer, pp. 322–330.
- Lapouchnian, Alexei; Liaskos, Sotoris; Mylopoulos, John and Yu, Yijun (2005). Towards requirements-driven autonomic systems design. In: DEAS 2005 Design and Evolution of Autonomic Application Software, 21 May 2005, St. Louis, Missouri, USA.
- Liaskos, Sotirios; Lapouchnian, Alexei; Wang, Yiqiao; Yu, Yijun and Easterbrook, Steve (2005). Configuring common personal software: a requirements-driven approach. In: 13th IEEE International Conference on Requirements Engineering, 29 Aug - 2 Sep 2005, Paris, France.
- Mens, Tom; Wermelinger, Michel; Ducasse, Stéphane; Demeyer, Serge; Hirschfeld, Robert and Jazayeri, Mehdi (2005). Challenges in Software Evolution. In: 8th International Workshop on Principles of Software Evolution, 5-6 September 2005, Lisbon, Portugal.
- Robinson, Hugh and Sharp, Helen (2005). The social side of technical practices. In: Baumeister, Hubert; Marchesi, Michele and Holcombe, Mike eds. Extreme Programming and Agile Processes in Software Engineering: Proceedings of the 6th International Conference, XP 2005, Sheffield, UK, June 18-23, 2005. Lecture Notes in Computer Science, 3556 (3556). Berlin, Germany: Springer, pp. 100–108.
- Rosewell, Jonathan; Johnson, Jeffrey; Hirst, Tony and Price, Blaine (2005). Robotics and the meaning of life: a practical guide to things that think. In: CAL '05 'Virtual Learning?', 4-6 April 2005, Bristol, UK.
- Segal, Judith; Grinyer, Antony and Sharp, Helen (2005). The type of evidence produced by empirical software engineers. In: ed. Proceedings of the 2005 workshop on Realising evidence-based software engineering. New York, NY, USA: ACM Press, pp. 1–4.
- Sharp, Helen and Robinson, Hugh (2005). Some social factors of software engineering: the maverick, community and technical practices. In: ACM SIGSOFT Software Engineering Notes, 30(4).
- Tzanidou, Ekaterini; Petre, Marian; Minocha, Shailey and Grayson, Andrew (2005). Combining eye tracking and conventional techniques for indications of user-adaptability. Lecture Notes in Computer Science, 3585 pp. 753–766.
- Wermelinger, Michel and Dias, Artur Miguel (2005). A Prolog toolkit for formal languages and automata. In: Proceedings of the 10th annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 27-29 June 2005, Caparica, Portugal, ACM.
- Zhang, Charles; Jacobsen, Hans-Arno and Yu, Yijun (2005). Linking goals to aspects. In: Early Aspects 2005: Aspect-Oriented Requirements Engineering and Architecture Design, 15 March 2005, Chicago, Illinois, USA.
- Zhang, Qing; Chen, Huiqiong; Yu, Yijun; Xie, Zhipeng and Shi, Baile (2005). Dynamically self-organized service composition in wireless ad hoc networks. In: 5th VLDB Workshop on Technologies for E-Services , 29 August - 3 September 2004, Toronto, Canada.
2004
- Jackson, Michael (2004). Routing optimizations for telecomms network system and method. Michael Jackson, 6829346.
- Sharp, Helen and Robinson, Hugh (2004). An Ethnographic study of XP practice. Empirical Software Engineering, 9(4) pp. 353–375.
- Wermelinger, Michel; Koutsoukos, Georgios; Lourenço, Hugo; Avillez, Richard; Gouveia, João; Andrade, Luís and Fiadeiro, José Luiz (2004). Enhancing dependability through flexible adaptation to changing requirements. In: de Lemos, Rogério; Gacek, Cristina and Romanovsky, Alexander eds. Architecting Dependable Systems II. Lecture Notes in Computer Science (3069). Springer-Verlag, pp. 3–24.
- Rapanotti, L.; Hall, J.G.; Jackson, M. and Nuseibeh, B. (2004). Architecture-driven problem decomposition. In: 12th IEEE International Conference on Requirements Engineering (RE 2004), 6-11 Sep 2004, Kyoto, Japan.
- Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). The Effect of trust assumptions on the elaboration of security requirements. In: 12th IEEE International Requirements Engineering Conference (RE'04), 6-10 Sep 2004, Kyoto, Japan.
- Yu, Yijun; Leite, J.C.S.P. and Mylopoulos, J. (2004). From Goals to Aspects: Discovering Aspects from Requirements Goal Models. In: 12th IEEE International Requirements Engineering Conference, 6-10 Sep 2004, Kyoto, Japan.
- Laney, Robin; Barroca, Leonor; Jackson, Michael and Nuseibeh, Bashar (2004). Composing requirements using problem frames. In: Proceedings of the 12th IEEE International Requirements Engineering Conference (RE 2004), IEEE, pp. 122–131.
- Petre, Marian (2004). How expert engineering teams use disciplines of innovation. Design Studies, 25(5) pp. 477–493.
- Petre, Marian (2004). Team coordination through externalised mental imagery. International Journal of Human-Computer Studies, 61(2) pp. 205–218.
- Petre, Marian (2004). Team coordination through externalized mental imagery. International Journal of Human-Computer Studies, 61(2) pp. 205–218.
- Sharp, Helen; Woodman, Mark and Hovenden, Fiona (2004). Tensions around the adoption and evolution of software quality management systems: a discourse analytic approach. International Journal of Human-Computer Studies, 61(2) pp. 219–236.
- Bandara, Arosha; Lupu, Emil C; Moffett, Jonathan and Russo, Alessandra (2004). A Goal-based Approach to Policy Refinement. In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks, 7-9 Jun 2004, Yorktown Heights, USA.
- Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Using Problem Frames and projections to analyze requirements for distributed systems. In: Proceedings of the Tenth International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'04), co-located with the 16th International Conference on Advanced Information Systems Engineering (CAiSE'04), 7-8 Jun 2004, Riga, Latvia.
- Petre, Marian and Price, Blaine (2004). Using robotics to motivate 'back door' learning. Education and Information Technologies, 9(2) pp. 147–158.
- Minocha, Shailey and Sharp, Helen (2004). Learner-Centred Design and Evaluation of Web-Based E-Learning Environments. In: The 7th HCI Educators Workshop: Effective Teaching and Training in HCI, 1-2 April 2004, University of Central Lancashire, Preston.
- Haley, Charles B.; Laney, Robin C.; Moffett, Jonathan D. and Nuseibeh, Bashar (2004). Picking battles: The impact of trust assumptions on the elaboration of security requirements. In: Proceedings of the Second International Conference on Trust Management (iTrust'04), 29 Mar - 1 Apr 2004, Oxford, UK.
- Haley, Charles B.; Laney, Robin C. and Nuseibeh, Bashar (2004). Deriving security requirements from crosscutting threat descriptions. In: Proceedings of the 3rd international conference on aspect-oriented software development, ACM Press, New York, USA, pp. 112–121.
- Barroca, Leonor; Fiadeiro, J.L.; Jackson, M.; Laney, Robin and Nuseibeh, B. (2004). Problem frames: a case for coordination. In: De Nicola, Rocco; Ferrari, Gianluigi and Meredith, Greg eds. Coordination models and languages: 6th International Conference, COORDINATION 2004 Pisa Italy, February 24-27, 2004: Proceedings. Lecture notes in computer science, 2949 (2949/2004). Heidleburg, Germany: Springer, pp. 5–19.
- Wermelinger, Michel and Margaria-Steffen, Tiziana eds. (2004). Fundamental Approaches to Software Engineering: 7th International Conference Proceedings. Lecture Notes in Computer Science, 2984. Berlin: Springer-Verlag.
- Bradbury, Jeremy S.; Cordy, James R.; Dingel, Juergen and Wermelinger, Michel (2004). A survey of self-management in dynamic software architecture specifications. In: Proceedings of the 1st ACM SIGSOFT Workshop on Self-managed Systems, 31 Oct - 1 Nov 2004, ACM, pp. 28–33.
- Haley, Debra; Nuseibeh, Bashar; Sharp, Helen and Taylor, Josie (2004). The conundrum of categorising requirements: managing requirements for learning on the move. In: 12th International Requirements Engineering Conference (RE'04), 6-10 Sept 2004, Kyoto, Japan.
- Johnson, Jeffrey and Price, Blaine A. (2004). Complexity science and representation in robot soccer. In: Polani, Daniel; Browning, Brett; Bonarini, Andrea and Yoshida, Kazuo eds. RoboCup 2003: Robot Soccer World Cup VII. Lecture Notes in Computer Science, 3020. Berlin: Springer, pp. 67–76.
- Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel and Jackson, Michael (2004). Using abuse frames to bound the scope of security problems. In: ed. 12th IEEE International Requirements Engineering Conference (RE'04). IEEE Computer Society, pp. 354–355.
- Robinson, Hugh; Segal, Judith and Sharp, Helen (2004). The case for empirical studies of the practice of software development. In: Jedlitschka, Andreas and Ciolkowski, Marcus eds. The Future of Empirical Studies in Software Engineering. Workshop Series on Empirical Software Engineering, 2. Stuttgart, Germany: Fraunhofer IRB Verlag, pp. 98–107.
- Robinson, Hugh and Sharp, Helen (2004). The characteristics of XP teams. In: Eckstein, Jutta and Baumeister, Hubert eds. Extreme Programming and Agile Processes in Software Engineering. Lecture Notes in Computer Science (3092). Berlin, Germany: Springer, pp. 135–147.
- Yu, Y.; Beyls, K. and D'Hollander, E. (2004). Performance visualization using XML representations. In: 8th International Conference on Information Visualisation, 14-16 July 2004, London, UK.
- Yu, Yijun; Beyls, Kristof and D'Hollander, Erik H. (2004). Visualizing the Impact of the Cache on Program Execution. Journal for the Integrated Study of AI, Cognitive Science and Applied Epistemology, 19(3-4) pp. 1–23.
- Yu, Yijun and D'Hollander, E. H. (2004). Non-uniform dependences partitioned by recurrence chains. In: 2004 International Conference on Parallel Processing (ICPP'04), 15-18 Aug 2004, Montreal, Canada.
2003
- Hayes, Ian J.; Jackson, Michael A. and Jones, Cliff B. (2003). Determining the specification of a control system from that of its environment. In: FME 2003: Formal Methods: International Symposium of Formal Methods Europe Pisa, Italy, September 8-14, 2003, Lecture Notes in Computer Science, Springer Berlin, Heidelberg, Germany, pp. 154–169.
- Crook, Robert; Ince, Darrel and Nuseibeh, Bashar (2003). Modelling access policies using roles in requirements engineering. Information and Software Technology, 45(14) pp. 979–991.
- Bandara, Arosha; Lupu, Emil C and Russo, Alessandra (2003). Using Event Calculus to Formalise Policy Specification and Analysis. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 4-6 Jun 2003, Lake Como, Italy.
- Sun, Weiwei; Shi, Weibin; Shi, Bole and Yu, Yijun (2003). A cost-efficient scheduling algorithm of on-demand broadcasts. Wireless Networks, 9(3) pp. 239–247.
- Haley, Charles and Nuseibeh, Bashar (2003). Going on-line on a shoestring: An experiment in concurrent development of requirements and architecture. In: International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, 6-12 Jan 2003, L'Aquila Italy.
- Lopes, Antónia; Wermelinger, Michel and Fiadeiro, José Luiz (2003). Higher-order architectural connectors. ACM Transactions on Software Engineering and Methodology, 12(1) pp. 64–104.
- Fiadeiro, José Luiz; Lopes, Antónia and Wermelinger, Michel (2003). A mathematical semantics for architectural connectors. In: Backhouse, R and Gibbons, J eds. Generic programming: advanced lectures. Lecture notes in computer science (2793). Berlin, Germany: Springer-Verlag, pp. 178–221.
- Johnson, Jeffrey and Price, Blaine (2003). Representing Patterns of autonomous agent dynamics in multi-robot systems. In: International Journal of Human-Computer Studies, 63(1-2) pp. 228–253.
- Lin, Luncheng; Nuseibeh, Bashar; Ince, Darrel; Jackson, Michael and Moffett, Jonathan (2003). Introducing abuse frames to analyse security requirements. In: Proceedings of the 11th International Conference on Requirements Engineering, 8th-12th Sept 2003, Monterey, USA.
- Price, Blaine A.; Richards, Mike; Petre, Marian; Hirst, Anthony and Johnson, Jeffrey (2003). Developing Robotics e-teaching for teamwork. International Journal of Continuing Engineering Education and Life-long Learning, 13(1-2) pp. 190–205.
- Robinson, Hugh and Sharp, Helen (2003). XP culture: why the twelve practices both are and are not the most significant thing. In: ed. Proceedings of the Conference on Agile Development. IEEE, p. 12.
- Sharp, Helen; Taylor, Josie; Löber, Andreas; Frohberg, Dirk; Mwanza, Daisy and Murelli, Elena (2003). Establishing user requirements for a mobile learning environment. In: Conference proceedings of Eurescom 2003, 29 Sept- 1 Oct 2003, Heidelberg, Germany.
- Yu, Y; Mylopoulos, J; Leite, J.C.S.P; Liu, L and D'Hollander, E.H (2003). Software refactoring guided by multiple soft-goals. In: 1st workshop on Refactoring: Achievements, Challenges, and Effects (REFACE'03), 13-16 November 2003, Victoria, Canada.
2002
- Beyls, Kristof; D'Hollander, Erik H. and Yu, Yijun (2002). Visualization enables the programmer to reduce cache misses. In: IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS 2002), 4-6 November 2002, Cambridge, MA, USA.
- Thomas, Pete; Price, Blaine; Paine, Carina and Richards, Michael (2002). Remote electronic examinations: student experiences. British Journal of Educational Technology, 33(5) pp. 537–549.
- Hall, J.G.; Jackson, M.; Laney, R. C.; Nuseibeh, B. and Rapanotti, L. (2002). Relating software requirements and architectures using problem frames. In: Proceedings of the IEEE Joint International Conference on Requirements Engineering, 2002, 09-13 Sep 2002, Essen, Germany.
- Wermelinger, Michel and Fiadeiro, José Luiz (2002). A Graph Transformation Approach to Software Architecture Reconfiguration. Science of Computer Programming, 44(2) pp. 133–155.
- Russo, Alessandra; Miller, Rob; Nuseibeh, Bashar and Kramer, Jeff (2002). An abductive approach for analysing event-based requirements specifications. In: 18th International Conference on Logic Programming, 29 July - 01 August 2002, Copenhagen, Denmark.
- Petre, Marian (2002). Mental imagery, visualisation tools and team work. In: Proceedings of the Second Program Visualisation Workshop pp. 3–14.
- Gervasi, Vincenzo and Nuseibeh, Bashar (2002). Lightweight Validation of Natural Language Requirements. Software: Practice and Experience, 32(2) pp. 113–133.
- Preece, Jenny; Rogers, Yvonne and Sharp, Helen eds. (2002). Interaction Design: Beyond Human-Computer Interaction. John Wiley.
- Crook, Robert; Ince, Darrel; Lin, Luncheng and Nuseibeh, Bashar (2002). Security Requirements Engineering: when anti-requirements hit the fan. In: Proc IEEE International Conference on Requirements Engineering, 8-13 Sept 2002, Germany.
- Lopes, Antónia; Fiadeiro, José Luiz and Wermelinger, Michel (2002). Architectural primitives for distribution and mobility. In: Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering, ACM Press, pp. 41–50.
- Mens, Kim; Mens, Tom and Wermelinger, Michel (2002). Maintaining software through intentional source-code views. In: Proceedings of the 14th international conference on Software engineering and knowledge engineering, ACM International Conference Proceeding Series, pp. 289–296.
2001
- Jackson, Michael (2001). Problem Frames: Analysing and Structuring Software Development Problems. New York: Addison-Wesley.
- Yu, Yijun and D'Hollander, Erik H. (2001). Loop Parallelization using the 3D Iteration Space Visualizer. Journal of Visual Languages & Computing, 12(2) pp. 163–181.
- Nuseibeh, B. (2001). Weaving together requirements and architecture. Computer, 34(3) pp. 115–119.
- Demeyer, Serge; Mens, Tom and Wermelinger, Michel (2001). Towards a software evolution benchmark. In: IWPSE '01 Proceedings of the 4th International Workshop on Principles of Software Evolution, ACM, pp. 174–177.
- Wermelinger, Michel; Lopes, Antónia and Fiadeiro, José Luiz (2001). A Graph based architectural (re)configuration language. In: Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ACM, pp. 21–32.
1999
- Wermelinger, Michel (1999). Specification of Software Architecture Reconfiguration. PhD thesis Universidade Nova de Lisboa.
1998
- Wermelinger, Michel (1998). Towards a chemical model for software architecture reconfiguration. IEE Proceedings - Software, 145(5) pp. 130–136.
- Wermelinger, Michel and Fiadeiro, José Luiz (1998). Connectors for mobile programs. IEEE Transactions on Software Engineering, 24(5) pp. 331–341.
- Stasko, John; Domingue, John; Brown, Marc H and Price, Blaine eds. (1998). Software Visualization: Programming as a Multimedia Experience. Cambridge, Mass: MIT Press.
1997
- Price, Blaine and Petre, Marian (1997). Teaching programming through paperless assignments: an empirical evaluation of instructor feedback. In: Proceedings of the 2nd conference on Integrating technology into computer science education, ACM, New York, NY, pp. 94–99.
- Wermelinger, Michel (1997). A different perspective on canonicity. In: Conceptual Structures: Fulfilling Peirce's Dream: Fifth International Conference on Conceptual Structures, ICCS'97 Seattle, Washington, USA, August 3–8, 1997 Proceedings, Lecture Notes in Computer Science (Lecture Notes in Computer Science), Springer, pp. 110–124.
- Wermelinger, Michel (1997). A hierarchic architecture model for dynamic reconfiguration. In: Software Engineering for Parallel and Distributed Systems, 1997. Proceedings., Second International Workshop on , IEEE, pp. 243–254.
- Wermelinger, Michel (1995). Teoria Básica das Estruturas Conceptuais. MPhil thesis Universidade Nova de Lisboa.
1995
- Wermelinger, Michel (1995). Conceptual graphs and first-order logic. In: Conceptual Structures: Applications, Implementation and Theory: Third International Conference on Conceptual Structures, ICCS '95 Santa Cruz, CA, USA, August 14–18, 1995 Proceedings, Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence), Springer, pp. 323–337.
1994
- Jones, Ann and Petre, Marian (1994). Computer-based practical work at a distance: a case study. Computers and Education, 22(1-2) pp. 27–37.
- Wermelinger, Michel and Lopes, José Gabriel (1994). Basic conceptual structures theory. In: Conceptual Structures: Current Practices, Lecture Notes in Computer Science, Springer, pp. 144–159.
1993
- Wermelinger, Michel and Bejan, Alex (1993). Conceptual structures for modeling in CIM. In: Conceptual Graphs for Knowledge Representation: First International Conference on Conceptual Structures, ICCS'93 Quebec City, Canada, August 4–7, 1993 Proceedings, Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence), Springer, pp. 345–360.
1992
- Wermelinger, Michel and Lopes, José Gabriel (1993). An X-Windows Toolkit for knowledge acquisition and representation based on conceptual structures. In: Conceptual Structures: Theory and Implementation: 7th Annual Workshop Las Cruces, NM, USA, July 8–10, 1992 Proceedings, Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence), Springer, pp. 262–271.
1991
- Petre, Marian (1991). Shifts in reasoning about software and hardware systems: do operational models underpin declarative ones? In: Psychology of Programming Interest Group , 3-5 January 1991, Hatfield.