Slurping References
Acerbo, F. S., & Rossi, C. (2017). Filtering Informative Tweets During Emergencies: A Machine Learning Approach. In Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief (pp. 1–6). New York, NY, USA: ACM. https://doi.org/10.1145/3152896.3152897
Bainbridge, D., & Bell, T. C. (2009). An Ajax-based Digital Music Stand for Greenstone. In Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries (pp. 463–464). New York, NY, USA: ACM. https://doi.org/10.1145/1555400.1555515
Bainbridge, D., & Witten, I. H. (2011). Perambulating Libraries: Demonstrating How a Victorian Idea Can Help OLPC Users Share Books. In Proceedings of the 11th Annual International ACM/IEEE Joint Conference on Digital Libraries (pp. 471–472). New York, NY, USA: ACM. https://doi.org/10.1145/1998076.1998191
Basu, M. (2017). Utilizing Online Social Media for Disaster Relief: Practical Challenges in Retrieval. In Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 1385–1385). New York, NY, USA: ACM. https://doi.org/10.1145/3077136.3084160
Blume, L., Baecker, R., Collins, C., & Donohue, A. (2009). A “Communication Skills for Computer Scientists” Course. In Proceedings of the 14th Annual ACM SIGCSE Conference on Innovation and Technology in Computer Science Education (pp. 65–69). New York, NY, USA: ACM. https://doi.org/10.1145/1562877.1562903
Brill, S. (2016, September). The $47 Billion Network That’s Already Obsolete. The Atlantic. Retrieved from https://www.theatlantic.com/magazine/archive/2016/09/the-47-billion-network-thats-already-obsolete/492764/?single_page=true
Calefato, F., Lanubile, F., & Novielli, N. (2018). How to Ask for Technical Help? Evidence-based Guidelines for Writing Questions on Stack Overflow. Information and Software Technology, 94, 186–207. https://doi.org/10.1016/j.infsof.2017.10.009
Carter, K. (2017). How to Turn the Weather Channel, Dilbert, and Jurassic World into Computing Course Assignments: Conference Tutorial. J. Comput. Sci. Coll., 32(3), 100–101. Retrieved from http://dl.acm.org/citation.cfm?id=3015220.3015248
Clark, D. D., Sollins, K., Wroclawski, J., & Faber, T. (2003). Addressing Reality: An Architectural Response to Real-world Demands on the Evolving Internet. In Proceedings of the ACM SIGCOMM Workshop on Future Directions in Network Architecture (pp. 247–257). New York, NY, USA: ACM. https://doi.org/10.1145/944759.944761
Cunningham, S. J., & Bennett, E. K. (2009). Tailoring Greenstone for Seniors. In Proceedings of the 9th ACM/IEEE-CS Joint Conference on Digital Libraries (pp. 377–378). New York, NY, USA: ACM. https://doi.org/10.1145/1555400.1555471
Cunningham, S. J., & Bennett, E. K. (2010a). Tailoring the Greenstone “Librarian” for Seniors: Eliciting Metadata and Browsing Structures. In Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem - Volume 47 (p. 131:1–131:2). Silver Springs, MD, USA: American Society for Information Science. Retrieved from http://dl.acm.org/citation.cfm?id=1920331.1920503
Cunningham, S. J., & Bennett, E. K. (2010b). Usability of Greenstone’s “Librarian” to Create and Maintain a Digital Library: The Case of Senior Users. In Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem - Volume 47 (p. 132:1–132:3). Silver Springs, MD, USA: American Society for Information Science. Retrieved from http://dl.acm.org/citation.cfm?id=1920331.1920504
Dhivvya, J. P., Rao, S. N., & Simi, S. (2017). Towards Maximizing Throughput and Coverage of a Novel Heterogeneous Maritime Communication Network. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing (p. 39:1–39:2). New York, NY, USA: ACM. https://doi.org/10.1145/3084041.3084077
Di Felice, M., Bedogni, L., & Bononi, L. (2016). The Emergency Direct Mobile App: Safety Message Dissemination over a Multi-Group Network of Smartphones Using Wi-Fi Direct. In Proceedings of the 14th ACM International Symposium on Mobility Management and Wireless Access (pp. 99–106). New York, NY, USA: ACM. https://doi.org/10.1145/2989250.2989257
Fairbairn, L. D., & Sankupellay, M. (2016). Twitter out Loud: Connecting People in Organisations. In Proceedings of the 28th Australian Conference on Computer-Human Interaction (pp. 220–223). New York, NY, USA: ACM. https://doi.org/10.1145/3010915.3010966
Fox, A., & Patterson, D. (2015). Do-it-yourself Textbook Publishing. Commun. ACM, 58(2), 40–43. https://doi.org/10.1145/2656333
Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and Harnessing Adversarial Examples. ArXiv:1412.6572 [Cs, Stat]. Retrieved from http://arxiv.org/abs/1412.6572
Gupta, A., Lamba, H., Kumaraguru, P., & Joshi, A. (2013). Faking Sandy: Characterizing and Identifying Fake Images on Twitter During Hurricane Sandy. In Proceedings of the 22Nd International Conference on World Wide Web (pp. 729–736). New York, NY, USA: ACM. https://doi.org/10.1145/2487788.2488033
Hamilton, W. A., Lupfer, N., & Kerne, A. (2018). LiveDissent: A Media Platform for Remote Participation in Activist Demonstrations. In Proceedings of the 2018 ACM Conference on Supporting Groupwork (pp. 257–266). New York, NY, USA: ACM. https://doi.org/10.1145/3148330.3149406
Hwang, K., Wah, B. W., & Briggs, F. A. (1981). Engineering Computer Network (ECN): A Hardwired Network of UNIX Computer Systems. In Proceedings of the May 4-7, 1981, National Computer Conference (pp. 191–201). New York, NY, USA: ACM. https://doi.org/10.1145/1500412.1500439
Kille, S. E., & Brink, D. H. (1985). A Model of Message Flow Control. SIGCOMM Comput. Commun. Rev., 15(5), 40–49. https://doi.org/10.1145/1570499.1570502
Kott, A., Swami, A., & West, B. J. (2017). The Internet of Battle Things. ArXiv:1712.08980 [Cs]. Retrieved from http://arxiv.org/abs/1712.08980
Lerner, A., Kohno, T., & Roesner, F. (2017). Rewriting History: Changing the Archived Web from the Present. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1741–1755). New York, NY, USA: ACM. https://doi.org/10.1145/3133956.3134042
Li, H., Dombrowski, L., & Brady, E. (2018). Working Toward Empowering a Community: How Immigrant-Focused Nonprofit Organizations Use Twitter During Political Conflicts. In Proceedings of the 2018 ACM Conference on Supporting Groupwork (pp. 335–346). New York, NY, USA: ACM. https://doi.org/10.1145/3148330.3148336
Maity, S. K., Gajula, R., & Mukherjee, A. (2018). Why Did They #Unfollow Me?: Early Detection of Follower Loss on Twitter. In Proceedings of the 2018 ACM Conference on Supporting Groupwork (pp. 127–131). New York, NY, USA: ACM. https://doi.org/10.1145/3148330.3154514
Malandrino, F., & Chiasserini, C. F. (2017). Quantifying and Minimizing the Impact of Disasters on Wireless Communications. In Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief (pp. 26–30). New York, NY, USA: ACM. https://doi.org/10.1145/3152896.3152902
Margolis, J., Oh, T. (Tom), Jadhav, S., Jeong, J. (Paul), Kim, Y. H., & Kim, J. N. (2017). Analysis and Impact of IoT Malware. In Proceedings of the 18th Annual Conference on Information Technology Education (pp. 187–187). New York, NY, USA: ACM. https://doi.org/10.1145/3125659.3125710
Mertz, A., Slough, W., & Van Cleave, N. (2016). LATEX Tips for the Academic. J. Comput. Sci. Coll., 32(1), 91–99. Retrieved from http://dl.acm.org/citation.cfm?id=3007225.3007245
Murai, J., & Kato, A. (1988). Researches in Network Development of JUNET. In Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology (pp. 68–77). New York, NY, USA: ACM. https://doi.org/10.1145/55482.55491
Ngamassi, L.-M., Maitland, C., & Tapia, A. H. (2011). Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels. In Proceedings of the 2011 iConference (pp. 817–818). New York, NY, USA: ACM. https://doi.org/10.1145/1940761.1940919
Owen, D. (2017). Using GitHub Pages for a Computer Science Course Website: Conference Tutorial. J. Comput. Sci. Coll., 32(3), 36–36. Retrieved from http://dl.acm.org/citation.cfm?id=3015220.3015229
Pandey, Y., & Bansal, S. (2017). Safety Check: A Semantic Web Application for Emergency Management. In Proceedings of The International Workshop on Semantic Big Data (p. 7:1–7:6). New York, NY, USA: ACM. https://doi.org/10.1145/3066911.3066917
Powers, B., Vilk, J., & Berger, E. D. (2017). Browsix: Bridging the Gap Between Unix and the Browser. In Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems (pp. 253–266). New York, NY, USA: ACM. https://doi.org/10.1145/3037697.3037727
Romanoff, Z. (2017, December 4). The Consumerist Church of Fitness Classes. The Atlantic. Retrieved from https://www.theatlantic.com/health/archive/2017/12/my-body-is-a-temple/547346/?single_page=true
Roy, H., Kase, S. E., & Bowman, E. K. (2017). Crowdsourcing Social Media for Military Operations. In Proceedings of the 2Nd International Workshop on Social Sensing (pp. 23–27). New York, NY, USA: ACM. https://doi.org/10.1145/3055601.3055606
Saeki, T., Nishiwaki, Y., Shinagawa, T., & Honiden, S. (2017). Bash on Ubuntu on macOS. In Proceedings of the 8th Asia-Pacific Workshop on Systems (p. 17:1–17:8). New York, NY, USA: ACM. https://doi.org/10.1145/3124680.3124733
Safey, S., & Bainbridge, D. (2014). When Catalogs Collide: A Mashup of the Bibliographic Records from New Zealand’s National Bibliography and the HathiTrust. In Proceedings of the 14th ACM/IEEE-CS Joint Conference on Digital Libraries (pp. 421–422). Piscataway, NJ, USA: IEEE Press. Retrieved from http://dl.acm.org/citation.cfm?id=2740769.2740847
Smith, A. M., Niemeyer, K. E., Katz, D. S., Barba, L. A., Githinji, G., Gymrek, M., … Vanderplas, J. T. (2017). Journal of Open Source Software (JOSS): design and first-year review. ArXiv:1707.02264 [Cs]. Retrieved from http://arxiv.org/abs/1707.02264
Sriramulu, R. K., Park, Y., Chang, S.-Y., & Liu, K. (2017). Dynamic Cost-effective Emergency Network Provision. In Proceedings of the First CoNEXT Workshop on ICT Tools for Emergency Networks and DisastEr Relief (pp. 37–43). New York, NY, USA: ACM. https://doi.org/10.1145/3152896.3152904
Sweeton, J. C. (1990). The Automation of User Services in the Coming Information Age. In Proceedings of the 18th Annual ACM SIGUCCS Conference on User Services (pp. 395–398). New York, NY, USA: ACM. https://doi.org/10.1145/99186.99269
Taylor, D. (2017). Work the Shell: Ubuntu Linux and Bash As a Windows Program! Linux J., 2017(282). Retrieved from http://dl.acm.org/citation.cfm?id=3170577.3170581
Toriumi, F., Sakaki, T., Shinoda, K., Kazama, K., Kurihara, S., & Noda, I. (2013). Information Sharing on Twitter During the 2011 Catastrophic Earthquake. In Proceedings of the 22Nd International Conference on World Wide Web (pp. 1025–1028). New York, NY, USA: ACM. https://doi.org/10.1145/2487788.2488110
Vasilchenko, A., Green, D. P., Qarabash, H., Preston, A., Bartindale, T., & Balaam, M. (2017). Media Literacy As a By-Product of Collaborative Video Production by CS Students. In Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education (pp. 58–63). New York, NY, USA: ACM. https://doi.org/10.1145/3059009.3059047
Xu, Y., Holzer, A., Maitland, C., & Gillet, D. (2017). Community Building with Co-located Social Media: A Field Experiment with Syrian Refugees. In Proceedings of the Ninth International Conference on Information and Communication Technologies and Development (p. 16:1–16:11). New York, NY, USA: ACM. https://doi.org/10.1145/3136560.3136580
Zimmermann, M., Ntoutsi, I., Siddiqui, Z. F., Spiliopoulou, M., & Kriegel, H.-P. (2012). Discovering Global and Local Bursts in a Stream of News. In Proceedings of the 27th Annual ACM Symposium on Applied Computing (pp. 807–812). New York, NY, USA: ACM. https://doi.org/10.1145/2245276.2245433