Robert Biddle

Orcid: 0000-0001-5971-2705

According to our database1, Robert Biddle authored at least 208 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring Content Concealment in Email.
CoRR, 2024

Eyes on the Phish(er): Towards Understanding Users' Email Processing Pattern and Mental Models in Phishing Detection.
Proceedings of the 2024 European Symposium on Usable Security, 2024

Reducing Workload in Using AI-based API REST Test Generation.
Proceedings of the 5th ACM/IEEE International Conference on Automation of Software Test (AST 2024), 2024

2023
SoK: Human-centered Phishing Susceptibility.
ACM Trans. Priv. Secur., August, 2023

What You See is Not What You Get: The Role of Email Presentation in Phishing Susceptibility.
CoRR, 2023

Waste Self-reporting for Software Development Productivity Improvement.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2023

A Large-Scale Study of Device and Link Presentation in Email Phishing Susceptibility.
Proceedings of the 35th Australian Computer-Human Interaction Conference, 2023

programmingLanguage as Language;.
Proceedings of the 2023 ACM SIGPLAN International Symposium on New Ideas, 2023

2022
What is Beautiful is Secure.
ACM Trans. Priv. Secur., 2022

Understanding Leadership in Agile Software Development Teams: Who and How?
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2022

2021
User Perception of Data Breaches.
IEEE Trans. Prof. Commun., 2021

Emics and Etics of Usable Security: Culturally-Specific or Culturally-Universal?
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

2020
Satisfaction and its correlates in agile software development.
J. Syst. Softw., 2020

Out of Sight, Out of Mind: UI Design and the Inhibition of Mental Models of Security.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020

We're Here to Help: Company Image Repair and User Perception of Data Breaches.
Proceedings of the 46th Graphics Interface Conference 2020, 2020

Home and Away: UI Design Patterns for Supporting End-User Security.
Proceedings of the EuroPLoP '20: European Conference on Pattern Languages of Programs 2020, 2020

2019
The influence of textual and verbal word-of-mouth on website usability and visual appeal.
J. Supercomput., 2019

From Incident to Insight: Incident Responders and Software Innovation.
IEEE Softw., 2019

Website Identity Notification: Testing the Simplest Thing That Could Possibly Work.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Mixed Pictures: Mental Models of Malware.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Helping Users Secure Their Data by Supporting Mental Models of VeraCrypt.
Proceedings of the HCI International 2019 - Posters - 21st International Conference, 2019

Learning with Trees: - A Non-linear E-Textbook Format for Deep Learning.
Proceedings of the Learning and Collaboration Technologies. Designing Learning Experiences, 2019

Control and Understanding in Malware and Legitimate Software.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

2018
The Password Life Cycle.
ACM Trans. Priv. Secur., 2018

Stress in Agile Software Development: Practices and Outcomes.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2018

Hide-and-Seek with Website Identity Information.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Building Website Certificate Mental Models.
Proceedings of the Persuasive Technology - 13th International Conference, 2018

Myagile: sociological and cultural effects of agile on teams and their members.
Proceedings of the 11th International Workshop on Cooperative and Human Aspects of Software Engineering, 2018

Sources of satisfaction in agile software development.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Satisfaction, Practices, and Influences in Agile Software Development.
Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018

An exploratory study of children's online password behaviours.
Proceedings of the 17th ACM Conference on Interaction Design and Children, 2018

2017
How can our publication models best serve our research? (panel).
Proceedings of the 2017 ACM SIGPLAN International Symposium on New Ideas, 2017

Affective Walkthroughs and Heuristics: Evaluating Minecraft Hour of Code.
Proceedings of the Learning and Collaboration Technologies. Technology in Education, 2017

Secure comics: an interactive comic series for improving cyber security and privacy.
Proceedings of the HCI 2017, 2017

2016
The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity.
Int. J. Hum. Comput. Interact., 2016

Incident response teams in IT operations centers: the T-TOCs model of team functionality.
Cogn. Technol. Work., 2016

Cesar: Visual representation of source code vulnerabilities.
Proceedings of the 13th IEEE Symposium on Visualization for Cyber Security, 2016

Agile Practices, Collaboration and Experience - An Empirical Study About the Effect of Experience in Agile Software Development.
Proceedings of the Product-Focused Software Process Improvement, 2016

Does textual word-of-mouth affect look and feel?
Proceedings of the 28th Australian Conference on Computer-Human Interaction, 2016

Hacking with multi-touch for Java (MT4j).
Proceedings of the 1st International Workshop on Mobile Development, 2016

Evaluating Software for Affective Education: A Case Study of the Affective Walkthrough.
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016

MADE Ratio: Affective Multimodal Software for Mathematical Concepts.
Proceedings of the Learning and Collaboration Technologies, 2016

Geo-Phisher: the design and evaluation of information visualizations about internet phishing trends.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Teaching Agile Collaboration Skills in the Classroom.
Proceedings of the 29th IEEE International Conference on Software Engineering Education and Training, 2016

Interactive Digital Cardwalls for Agile Software Development.
Proceedings of the Collaboration Meets Interactive Spaces, 2016

Surface Applications for Security Analysis.
Proceedings of the Collaboration Meets Interactive Spaces, 2016

2015
User-centred authentication feature framework.
Inf. Comput. Secur., 2015

Expert Password Management.
Proceedings of the Technology and Practice of Passwords - 9th International Conference, 2015

Supporting "what-if" in touch-screen web Applications.
Proceedings of the 3rd International Workshop on Programming for Mobile and Touch, 2015

Collaborative annotations for large touchscreen web Applications.
Proceedings of the 3rd International Workshop on Programming for Mobile and Touch, 2015

Choose Your Own Authentication.
Proceedings of the 2015 New Security Paradigms Workshop, 2015

Understanding Digital Cardwall Usage.
Proceedings of the 2015 Agile Conference, 2015

2014
The Password Life Cycle: User Behaviour in Managing Passwords.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Beyond Usable Security.
Proceedings of the 25th Annual Workshop of the Psychology of Programming Interest Group, 2014

Stop Clicking on "Update Later": Persuading Users They Need Up-to-Date Antivirus Protection.
Proceedings of the Persuasive Technology - 9th International Conference, 2014

A Password Manager that Doesn't Remember Passwords.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

ACH Walkthrough: A Distributed Multi-Device Tool for Collaborative Security Analysis.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

SIW 2014: First Workshop on Security Information Workers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Surface Computing and Collaborative Analysis Work
Synthesis Lectures on Human-Centered Informatics, Morgan & Claypool Publishers, ISBN: 978-3-031-02202-9, 2013

SourceVis: Collaborative software visualization for co-located environments.
Proceedings of the 2013 First IEEE Working Conference on Software Visualization (VISSOFT), 2013

Memory retrieval and graphical passwords.
Proceedings of the Symposium On Usable Privacy and Security, 2013

A Sketching Game for Art History Instruction.
Proceedings of the 10th International Symposium on Sketch-Based Interfaces and Modeling, 2013

Distributed Data and Displays via SVG and HTML5.
Proceedings of the Distributed User Interfaces: Models, Methods and Tools, 2013

Complex activities in an operations center: a case study and model for engineering interaction.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013

Password advice shouldn't be boring: Visualizing password guessing attacks.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

2012
Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism.
IEEE Trans. Dependable Secur. Comput., 2012

Graphical passwords: Learning from the first twelve years.
ACM Comput. Surv., 2012

Visual end-user security.
Proceedings of the 2012 IEEE Symposium on Visual Languages and Human-Centric Computing, 2012

Do you see your password?: applying recognition to textual passwords.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Risk perception of internet-related activities.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Joint implicit alignment work of interaction designers and software developers.
Proceedings of the Nordic Conference on Human-Computer Interaction, 2012

The MVP Web-Based Authentication Framework - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

Interactional identity: designers and developers making joint work meaningful and effective.
Proceedings of the CSCW '12 Computer Supported Cooperative Work, 2012

2011
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects.
IEEE Trans. Inf. Forensics Secur., 2011

SourceVis: a tool for multi-touch software visualization.
Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces, 2011

StoryTrek: experiencing stories in the real world.
Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, 2011

Collaborative Events and Shared Artefacts: Agile Interaction Designers and Developers Working Toward Common Aims.
Proceedings of the 2011 Agile Conference, 2011

Facing the facts about image type in recognition-based graphical passwords.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Abstraction and Activity in Computer-Mediated Music Production.
Comput. Music. J., 2010

User evaluation of polymetric views using a large visualization wall.
Proceedings of the ACM 2010 Symposium on Software Visualization, 2010

Guessing click-based graphical passwords by eye tracking.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Input precision for gaze-based graphical passwords.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Exploring usability effects of increasing security in click-based graphical passwords.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

An Ideal Customer: A Grounded Theory of Requirements Elicitation, Communication and Acceptance on Agile Projects.
Proceedings of the Agile Software Development - Current Research and Future Directions, 2010

2009
User interface design affects security: patterns in click-based graphical passwords.
Int. J. Inf. Sec., 2009

Game design strategies for collectivist persuasion.
Proceedings of the 2009 ACM SIGGRAPH Symposium on Video Games, 2009

Cloud computing beyond objects: seeding the cloud.
Proceedings of the Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2009

Let's clean up this mess: exploring multi-touch collaborative play.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Lessons from brain age on persuasion for computer security.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Multiple password interference in text passwords and click-based graphical passwords.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Browser interfaces and extended validation SSL certificates: an empirical study.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

The XP Customer Team: A Grounded Theory.
Proceedings of the 2009 Agile Conference, Chicago, IL, USA, 24-28 August 2009, 2009

XP Customer Practices: A Grounded Theory.
Proceedings of the 2009 Agile Conference, Chicago, IL, USA, 24-28 August 2009, 2009

2008
Experience on the Human Side of Agile.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2008

Culture and Agile: Challenges and Synergies.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2008

Improving text passwords through persuasion.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Web software visualization using extensible 3D (X3D) graphics.
Proceedings of the ACM 2008 Symposium on Software Visualization, 2008

A Qualitative Study of Culture and Persuasion in a Smoking Cessation Game.
Proceedings of the Persuasive Technology, Third International Conference, 2008

Persuasion for Stronger Passwords: Motivation and Pilot Study.
Proceedings of the Persuasive Technology, Third International Conference, 2008

Centered Discretization with Application to Graphical Passwords.
Proceedings of the Usability, Psychology, and Security, 2008

Collaboration in serious game development: a case study.
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008

Lessons from Brain Age on password memorability.
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008

Understanding game design for affective learning.
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008

Exploring User Reactions to New Browser Cues for Extended Validation Certificates.
Proceedings of the Computer Security, 2008

Memorability of persuasive passwords.
Proceedings of the Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

Influencing users towards better passwords: persuasive cued click-points.
Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction, 2008

Stories, Sketches, and Lists: Developers and Interaction Designers Interacting Through Artefacts.
Proceedings of the Agile Development Conference, 2008

2007
Video game values: Human-computer interaction and games.
Interact. Comput., 2007

Motivation and Cohesion in Agile Teams.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

Up-Front Interaction Design in Agile Development.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2007

Helping users create better passwords: is this the right approach?
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

A second look at the usability of click-based graphical passwords.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Fine Tuning the Persuasion in Persuasive Games.
Proceedings of the Persuasive Technology, 2007

X3D web software visualization in action!
Proceedings of the Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

Cognitive dimensions of a game scripting tool.
Proceedings of the 2007 conference on Future Play, Toronto, ON, Canada, November 15, 2007

Making players laugh: the value of humour in computer games.
Proceedings of the 2007 conference on Future Play, Toronto, ON, Canada, November 15, 2007

Playscripts a new method for analyzing game design and play.
Proceedings of the 2007 conference on Future Play, Toronto, ON, Canada, November 15, 2007

Patterns for Story Authoring Tools.
Proceedings of the 12th European Conference on Pattern Languages of Programs (EuroPLoP '2007), 2007

Graphical Password Authentication Using Cued Click Points.
Proceedings of the Computer Security, 2007

The Social Nature of Agile Teams.
Proceedings of the AGILE 2007 Conference (AGILE 2007), 2007

Agile Development Iterations and UI Design.
Proceedings of the AGILE 2007 Conference (AGILE 2007), 2007

2006
Featherweight generic confinement.
J. Funct. Program., 2006

Live Hypernarrative and Cybercartography: You Are Here, Now.
Cartogr. Int. J. Geogr. Inf. Geovisualization, 2006

Role-Playing Games in Cybercartography: Multiple Perspectives and Critical Thinking.
Cartogr. Int. J. Geogr. Inf. Geovisualization, 2006

A Usability Study and Critique of Two Password Managers.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Evaluating X3D for use in software visualization.
Proceedings of the ACM 2006 Symposium on Software Visualization, 2006

Humour theory and videogames: laughter in the slaughter.
Proceedings of the 2006 ACM SIGGRAPH symposium on Videogames, 2006

Our Place or Mine? Exploration into Collectivism-Focused Persuasive Technology Design.
Proceedings of the Persuasive Technology, 2006

Investigating Social Software as Persuasive Technology.
Proceedings of the Persuasive Technology, 2006

Well-Being to "Well Done!": The Development Cycle in Role-Playing Games.
Proceedings of the Persuasive Technology, 2006

Feeling Strangely Fine: The Well-Being Economy in Popular Games.
Proceedings of the Persuasive Technology, 2006

Factoring culture into the design of a persuasive game.
Proceedings of the 2006 Australasian Computer-Human Interaction Conference, 2006

Playing the interface: a case study of Grand Theft Auto: San Andreas.
Proceedings of the 2006 Australasian Computer-Human Interaction Conference, 2006

Generic ownership for generic Java.
Proceedings of the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2006

VET3D: a tool for execution trace web 3D visualization.
Proceedings of the Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2006

Activity Theory for Design From Checklist to Interview - From Checklist to Interview.
Proceedings of the Human Work Interaction Design: Designing for Human Work, 2006

Agile development: opportunity or fad?
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

Persuasive interaction for collectivist cultures.
Proceedings of the User Interfaces 2006, 2006

A case for iconic icons.
Proceedings of the User Interfaces 2006, 2006

From pushing buttons to play and progress: value and interaction in <i>fable</i>.
Proceedings of the User Interfaces 2006, 2006

Postmodern prospects for conceptual modelling.
Proceedings of the Conceptual Modelling 2006, 2006

2005
Scale-free geometry in OO programs.
Commun. ACM, 2005

An Analysis of Persuasive Technology Tool Strategies.
Proceedings of the Designing for Global Markets 7, 2005

A Taxonomy of Sequencer User-Interfaces.
Proceedings of the 2005 International Computer Music Conference, 2005

Share and enjoy - Patterns for Successful Knowledge Sharing in Large Online Communities.
Proceedings of the EuroPLoP' 2005, 2005

Clicki: A Framework for Light-weightWeb-based Visual Applications.
Proceedings of the User Interfaces 2005, 2005

A Taxonomic Analysis of User-Interface Metaphors in the Microsoft O ce Project Gallery.
Proceedings of the User Interfaces 2005, 2005

2004
Notes on notes on postmodern programming.
ACM SIGPLAN Notices, 2004

Checking ownership and confinement.
Concurr. Pract. Exp., 2004

When XP Met Outsourcing.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2004

Generic ownership: practical ownership control in programming languages.
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

Notes on notes on postmodern programming: radio edit.
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

Visualisation for learning OOP, using AOP and eclipse.
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

ConstrainedJava.
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

The role of the customer in software development: the XP customer - fad or fashion?
Proceedings of the Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

My Friend the Customer.
Proceedings of the 9th European Conference on Pattern Languages of Programms (EuroPLoP '2004), 2004

Metaphorscape.
Proceedings of the 9th European Conference on Pattern Languages of Programms (EuroPLoP '2004), 2004

Delegation Diagrams: Visual Support for the Development of Object-Oriented Designs.
Proceedings of the User Interfaces 2004, 2004

Snapshot Query-Based Debugging.
Proceedings of the 15th Australian Software Engineering Conference (ASWEC 2004), 2004

Using Software Visualisation to Enhance Online Component Markets.
Proceedings of the Australasian Symposium on Information Visualisation, 2004

XML Database Support for Program Trace Visualisation.
Proceedings of the Australasian Symposium on Information Visualisation, 2004

Towards a General Model for Assisting Navigation.
Proceedings of the Computer Human Interaction, 6th Asia Pacific Conference, 2004

Metaphors for Electronic Music Production in <i>Reason</i> and <i>Live</i>.
Proceedings of the Computer Human Interaction, 6th Asia Pacific Conference, 2004

The XP Customer Role in Practice: Three Studies.
Proceedings of the 2004 Agile Development Conference (ADC 2004), 2004

Less Extreme Programming.
Proceedings of the Sixth Australasian Computing Education Conference (ACE 2004), 2004

2003
Being Jane Malkovich: A Look Into the World of an XP Customer.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2003

A technology for lightweight web-based visual applications.
Proceedings of the 2003 IEEE Symposium on Human Centric Computing Languages and Environments (HCC 2003), 2003

No name: just notes on software reuse.
Proceedings of the Companion of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2003

Usage-Centered Design and Software Engineering: Models for Integration.
Proceedings of ICSE 2003 Workshop on Bridging the Gaps Between Software Engineering and Human-Computer Interaction, 2003

Software Visualisation of Java Programs in InspectJ.
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003

A Lightweight Web-Based Case Tool for UML Class Diagrams.
Proceedings of the User Interfaces 2003, 2003

Icons R Icons.
Proceedings of the User Interfaces 2003, 2003

Spreadsheet structure inspection using low level access and visualisation.
Proceedings of the User Interfaces 2003, 2003

Aspects to Visualising Reusable Components.
Proceedings of the Australasian Symposium on Information Visualisation, 2003

A Case Study of Cartoon Visualisation Using Aspect.
Proceedings of the Australasian Symposium on Information Visualisation, 2003

Evaluating Scalable Vector Graphics for Use in Software Visualisation.
Proceedings of the Australasian Symposium on Information Visualisation, 2003

Spreadsheet Visualisation to Improve End-user Understanding.
Proceedings of the Australasian Symposium on Information Visualisation, 2003

InspectJ: Program Monitoring for Visualisation Using AspectJ.
Proceedings of the Computer Science 2003, 2003

Use Case Analysis with Narrative Semiotics.
Proceedings of the Australasian Conference on Information Systems, 2003

Teaching the Evaluation of Object-Oriented Designs.
Proceedings of the Fifth Australasian Computing Education Conference (ACE 2003), 2003

2002
Supporting Reusable Use Cases.
Proceedings of the Software Reuse: Methods, 2002

Patterns as Signs.
Proceedings of the ECOOP 2002, 2002

A lightweight web-based case tool for sequence diagrams.
Proceedings of the SIGCHI-NZ Symposium on Computer-Human Interaction, 2002

A taxonomy of user-interface metaphors.
Proceedings of the SIGCHI-NZ Symposium on Computer-Human Interaction, 2002

How (Not) To Help People Test Drive Code.
Proceedings of the User Interfaces 2002, 2002

Program Visualisation for Visual Programs.
Proceedings of the User Interfaces 2002, 2002

Metaphor and Metonymy in Object-Oriented Design Patterns.
Proceedings of the Computer Science 2002, 2002

Essential Use Cases and Responsibility in Object-Oriented Development.
Proceedings of the Computer Science 2002, 2002

2001
Smarter Cut-and-Paste for Programming Text Editors.
Proceedings of the 2nd Australasian User Interface Conference (AUIC 2001), 29 January, 2001

Visual Programs Module Choice and Layout in the Nord Modular Patch Language.
Proceedings of the Australasian Symposium on Information Visualisation, 2001

Visualising Reusable Software Over The Web.
Proceedings of the Australasian Symposium on Information Visualisation, 2001

2000
Simulating multiple inheritance in Java.
J. Syst. Softw., 2000

Understanding Frameworks through Visualisation.
Proceedings of the TOOLS Pacific 2000: 37th International Conference on Technology of Object-Oriented Languages and Systems, 2000

Active learning for object-oriented design (poster session).
Proceedings of the Addendum to the 2000 Proceedings of the Conference on Object-Oriented Programming Systems, 2000

1999
Reuse of Debuggers for Visualization of Reuse.
Proceedings of the Fifth ACM SIGSOFT Symposium on Software Reusability, 1999

1998
Java pitfalls for beginners.
ACM SIGCSE Bull., 1998

Teaching programming by teaching principles of reusability.
Inf. Softw. Technol., 1998

The retention of women in the computing sciences (panel).
Proceedings of the 29th SIGCSE Technical Symposium on Computer Science Education, 1998

Evaluating object-oriented design.
Proceedings of the Addendum to the 1998 Proceedings of the Conference on Object-Oriented Programming, 1998

Inheritance and Reusability.
Proceedings of the 1998 Australian Software Engineering Conference (ASWEC '98), 1998

Tools to aid learning reusability.
Proceedings of the ACM SIGCSE 3rd Australasian Conference on Computer Science Education, 1998

1997
Women in introductory computer science: experience at Victoria University of Wellington.
Proceedings of the 28th SIGCSE Technical Symposium on Computer Science Education, 1997

Resources for early object design education.
Proceedings of the Addendum to the 1997 ACM SIGPLAN Conference on Object-Oriented Programming, 1997

Explaining issues in software reusability via an audio system analogy.
Proceedings of the ACM SIGCSE 2nd Australasian Conference on Computer Science Education, 1997

1996
Explaining inheritance: a code reusability perspective.
Proceedings of the 27th SIGCSE Technical Symposium on Computer Science Education, 1996

Understanding the impact of language features on reusability.
Proceedings of Fourth IEEE International Conference on Software Reuse, 1996

1995
Object Oriented Program Visualisation in Tarraingim.
Aust. Comput. J., 1995


  Loading...