Stephen Michael Kellat

Slurping References

Stephen Michael Kellat at

Acerbo, F. S., & Rossi, C. (2017). Filtering Informative Tweets During Emergencies: A Machine Learning Approach. In Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief (pp. 1–6). New York, NY, USA: ACM. https://doi.org/10.1145/3152896.3152897

Bainbridge, D., & Bell, T. C. (2009). An Ajax-based Digital Music Stand for Greenstone. In Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries (pp. 463–464). New York, NY, USA: ACM. https://doi.org/10.1145/1555400.1555515

Bainbridge, D., & Witten, I. H. (2011). Perambulating Libraries: Demonstrating How a Victorian Idea Can Help OLPC Users Share Books. In Proceedings of the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries (pp. 471–472). New York, NY, USA: ACM. https://doi.org/10.1145/1998076.1998191

Basu, M. (2017). Utilizing Online Social Media for Disaster Relief: Practical Challenges in Retrieval. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 1385–1385). New York, NY, USA: ACM. https://doi.org/10.1145/3077136.3084160

Blume, L., Baecker, R., Collins, C., & Donohue, A. (2009). A “Communication Skills for Computer Scientists” Course. In Proceedings of the 14th Annual ACM SIGCSE Conference on Innovation and Technology in Computer Science Education (pp. 65–69). New York, NY, USA: ACM. https://doi.org/10.1145/1562877.1562903

Brill, S. (2016, September). The $47 Billion Network That’s Already Obsolete. The Atlantic. Retrieved from https://www.theatlantic.com/magazine/archive/2016/09/the-47-billion-network-thats-already-obsolete/492764/?single_page=true

Calefato, F., Lanubile, F., & Novielli, N. (2018). How to Ask for Technical Help? Evidence-based Guidelines for Writing Questions on Stack Overflow. Information and Software Technology, 94, 186–207. https://doi.org/10.1016/j.infsof.2017.10.009

Carter, K. (2017). How to Turn the Weather Channel, Dilbert, and Jurassic World into Computing Course Assignments: Conference Tutorial. J. Comput. Sci. Coll., 32(3), 100–101. Retrieved from http://dl.acm.org/citation.cfm?id=3015220.3015248

Clark, D. D., Sollins, K., Wroclawski, J., & Faber, T. (2003). Addressing Reality: An Architectural Response to Real-world Demands on the Evolving Internet. In Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture (pp. 247–257). New York, NY, USA: ACM. https://doi.org/10.1145/944759.944761

Cunningham, S. J., & Bennett, E. K. (2009). Tailoring Greenstone for Seniors. In Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries (pp. 377–378). New York, NY, USA: ACM. https://doi.org/10.1145/1555400.1555471

Cunningham, S. J., & Bennett, E. K. (2010a). Tailoring the Greenstone “Librarian” for Seniors: Eliciting Metadata and Browsing Structures. In Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem - Volume 47 (p. 131:1–131:2). Silver Springs, MD, USA: American Society for Information Science. Retrieved from http://dl.acm.org/citation.cfm?id=1920331.1920503

Cunningham, S. J., & Bennett, E. K. (2010b). Usability of Greenstone’s “Librarian” to Create and Maintain a Digital Library: The Case of Senior Users. In Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem - Volume 47 (p. 132:1–132:3). Silver Springs, MD, USA: American Society for Information Science. Retrieved from http://dl.acm.org/citation.cfm?id=1920331.1920504

Dhivvya, J. P., Rao, S. N., & Simi, S. (2017). Towards Maximizing Throughput and Coverage of a Novel Heterogeneous Maritime Communication Network. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (p. 39:1–39:2). New York, NY, USA: ACM. https://doi.org/10.1145/3084041.3084077

Di Felice, M., Bedogni, L., & Bononi, L. (2016). The Emergency Direct Mobile App: Safety Message Dissemination over a Multi-Group Network of Smartphones Using Wi-Fi Direct. In Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access (pp. 99–106). New York, NY, USA: ACM. https://doi.org/10.1145/2989250.2989257

Fairbairn, L. D., & Sankupellay, M. (2016). Twitter out Loud: Connecting People in Organisations. In Proceedings of the 28th Australian Conference on Computer-Human Interaction (pp. 220–223). New York, NY, USA: ACM. https://doi.org/10.1145/3010915.3010966

Fox, A., & Patterson, D. (2015). Do-it-yourself Textbook Publishing. Commun. ACM, 58(2), 40–43. https://doi.org/10.1145/2656333

Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and Harnessing Adversarial Examples. ArXiv:1412.6572 [Cs, Stat]. Retrieved from http://arxiv.org/abs/1412.6572

Gupta, A., Lamba, H., Kumaraguru, P., & Joshi, A. (2013). Faking Sandy: Characterizing and Identifying Fake Images on Twitter During Hurricane Sandy. In Proceedings of the 22Nd International Conference on World Wide Web (pp. 729–736). New York, NY, USA: ACM. https://doi.org/10.1145/2487788.2488033

Hamilton, W. A., Lupfer, N., & Kerne, A. (2018). LiveDissent: A Media Platform for Remote Participation in Activist Demonstrations. In Proceedings of the 2018 ACM Conference on Supporting Groupwork (pp. 257–266). New York, NY, USA: ACM. https://doi.org/10.1145/3148330.3149406

Hwang, K., Wah, B. W., & Briggs, F. A. (1981). Engineering Computer Network (ECN): A Hardwired Network of UNIX Computer Systems. In Proceedings of the May 4-7, 1981, National Computer Conference (pp. 191–201). New York, NY, USA: ACM. https://doi.org/10.1145/1500412.1500439

Kille, S. E., & Brink, D. H. (1985). A Model of Message Flow Control. SIGCOMM Comput. Commun. Rev., 15(5), 40–49. https://doi.org/10.1145/1570499.1570502

Kott, A., Swami, A., & West, B. J. (2017). The Internet of Battle Things. ArXiv:1712.08980 [Cs]. Retrieved from http://arxiv.org/abs/1712.08980

Lerner, A., Kohno, T., & Roesner, F. (2017). Rewriting History: Changing the Archived Web from the Present. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1741–1755). New York, NY, USA: ACM. https://doi.org/10.1145/3133956.3134042

Li, H., Dombrowski, L., & Brady, E. (2018). Working Toward Empowering a Community: How Immigrant-Focused Nonprofit Organizations Use Twitter During Political Conflicts. In Proceedings of the 2018 ACM Conference on Supporting Groupwork (pp. 335–346). New York, NY, USA: ACM. https://doi.org/10.1145/3148330.3148336

Maity, S. K., Gajula, R., & Mukherjee, A. (2018). Why Did They #Unfollow Me?: Early Detection of Follower Loss on Twitter. In Proceedings of the 2018 ACM Conference on Supporting Groupwork (pp. 127–131). New York, NY, USA: ACM. https://doi.org/10.1145/3148330.3154514

Malandrino, F., & Chiasserini, C. F. (2017). Quantifying and Minimizing the Impact of Disasters on Wireless Communications. In Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief (pp. 26–30). New York, NY, USA: ACM. https://doi.org/10.1145/3152896.3152902

Margolis, J., Oh, T. (Tom), Jadhav, S., Jeong, J. (Paul), Kim, Y. H., & Kim, J. N. (2017). Analysis and Impact of IoT Malware. In Proceedings of the 18th Annual Conference on Information Technology Education (pp. 187–187). New York, NY, USA: ACM. https://doi.org/10.1145/3125659.3125710

Mertz, A., Slough, W., & Van Cleave, N. (2016). LATEX Tips for the Academic. J. Comput. Sci. Coll., 32(1), 91–99. Retrieved from http://dl.acm.org/citation.cfm?id=3007225.3007245

Murai, J., & Kato, A. (1988). Researches in Network Development of JUNET. In Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology (pp. 68–77). New York, NY, USA: ACM. https://doi.org/10.1145/55482.55491

Ngamassi, L.-M., Maitland, C., & Tapia, A. H. (2011). Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels. In Proceedings of the 2011 iConference (pp. 817–818). New York, NY, USA: ACM. https://doi.org/10.1145/1940761.1940919

Owen, D. (2017). Using GitHub Pages for a Computer Science Course Website: Conference Tutorial. J. Comput. Sci. Coll., 32(3), 36–36. Retrieved from http://dl.acm.org/citation.cfm?id=3015220.3015229

Pandey, Y., & Bansal, S. (2017). Safety Check: A Semantic Web Application for Emergency Management. In Proceedings of The International Workshop on Semantic Big Data (p. 7:1–7:6). New York, NY, USA: ACM. https://doi.org/10.1145/3066911.3066917

Powers, B., Vilk, J., & Berger, E. D. (2017). Browsix: Bridging the Gap Between Unix and the Browser. In Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 253–266). New York, NY, USA: ACM. https://doi.org/10.1145/3037697.3037727

Romanoff, Z. (2017, December 4). The Consumerist Church of Fitness Classes. The Atlantic. Retrieved from https://www.theatlantic.com/health/archive/2017/12/my-body-is-a-temple/547346/?single_page=true

Roy, H., Kase, S. E., & Bowman, E. K. (2017). Crowdsourcing Social Media for Military Operations. In Proceedings of the 2Nd International Workshop on Social Sensing (pp. 23–27). New York, NY, USA: ACM. https://doi.org/10.1145/3055601.3055606

Saeki, T., Nishiwaki, Y., Shinagawa, T., & Honiden, S. (2017). Bash on Ubuntu on macOS. In Proceedings of the 8th Asia-Pacific Workshop on Systems (p. 17:1–17:8). New York, NY, USA: ACM. https://doi.org/10.1145/3124680.3124733

Safey, S., & Bainbridge, D. (2014). When Catalogs Collide: A Mashup of the Bibliographic Records from New Zealand’s National Bibliography and the HathiTrust. In Proceedings of the 14th ACM/IEEE-CS Joint Conference on Digital Libraries (pp. 421–422). Piscataway, NJ, USA: IEEE Press. Retrieved from http://dl.acm.org/citation.cfm?id=2740769.2740847

Smith, A. M., Niemeyer, K. E., Katz, D. S., Barba, L. A., Githinji, G., Gymrek, M., … Vanderplas, J. T. (2017). Journal of Open Source Software (JOSS): design and first-year review. ArXiv:1707.02264 [Cs]. Retrieved from http://arxiv.org/abs/1707.02264

Sriramulu, R. K., Park, Y., Chang, S.-Y., & Liu, K. (2017). Dynamic Cost-effective Emergency Network Provision. In Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief (pp. 37–43). New York, NY, USA: ACM. https://doi.org/10.1145/3152896.3152904

Sweeton, J. C. (1990). The Automation of User Services in the Coming Information Age. In Proceedings of the 18th Annual ACM SIGUCCS Conference on User Services (pp. 395–398). New York, NY, USA: ACM. https://doi.org/10.1145/99186.99269

Taylor, D. (2017). Work the Shell: Ubuntu Linux and Bash As a Windows Program! Linux J., 2017(282). Retrieved from http://dl.acm.org/citation.cfm?id=3170577.3170581

Toriumi, F., Sakaki, T., Shinoda, K., Kazama, K., Kurihara, S., & Noda, I. (2013). Information Sharing on Twitter During the 2011 Catastrophic Earthquake. In Proceedings of the 22Nd International Conference on World Wide Web (pp. 1025–1028). New York, NY, USA: ACM. https://doi.org/10.1145/2487788.2488110

Vasilchenko, A., Green, D. P., Qarabash, H., Preston, A., Bartindale, T., & Balaam, M. (2017). Media Literacy As a By-Product of Collaborative Video Production by CS Students. In Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education (pp. 58–63). New York, NY, USA: ACM. https://doi.org/10.1145/3059009.3059047

Xu, Y., Holzer, A., Maitland, C., & Gillet, D. (2017). Community Building with Co-located Social Media: A Field Experiment with Syrian Refugees. In Proceedings of the Ninth International Conference on Information and Communication Technologies and Development (p. 16:1–16:11). New York, NY, USA: ACM. https://doi.org/10.1145/3136560.3136580

Zimmermann, M., Ntoutsi, I., Siddiqui, Z. F., Spiliopoulou, M., & Kriegel, H.-P. (2012). Discovering Global and Local Bursts in a Stream of News. In Proceedings of the 27th Annual ACM Symposium on Applied Computing (pp. 807–812). New York, NY, USA: ACM. https://doi.org/10.1145/2245276.2245433