default search action
Stephen Barrett
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Wei Ren, Stephen Barrett:
An empirical investigation on the benefits of gamification in communication within university development teams. Comput. Appl. Eng. Educ. 31(6): 1808-1822 (2023) - [j6]Wei Ren, Stephen Barrett:
Test-driven development, engagement in activity, and maintainability: An empirical study. IET Softw. 17(4): 509-525 (2023) - 2020
- [c33]Wei Ren, Stephen Barrett, Sourojit Das:
Toward Gamification to Software Engineering and Contribution of Software Engineer. ICMSS 2020: 1-5
2010 – 2019
- 2019
- [j5]Barbara Barabasz, Stephen Barrett, Leszek Siwik, Marcin Los, Krzysztof Podsiadlo, Maciej Wozniak:
Speeding up multi-objective optimization of liquid fossil fuel reserve exploitation with parallel hybrid memory integration. J. Comput. Sci. 31: 126-136 (2019) - 2018
- [c32]Brendan Cody-Kenny, Michael O'Neill, Stephen Barrett:
Performance localisation. GI@ICSE 2018: 27-34 - 2017
- [c31]Barbara Barabasz, Marcin Los, Maciej Wozniak, Leszek Siwik, Stephen Barrett:
Coupled isogeometric Finite Element Method and Hierarchical Genetic Strategy with balanced accuracy for solving optimization inverse problem. ICCS 2017: 828-837 - 2016
- [i1]Brendan Cody-Kenny, Stephen Barrett:
Performance Localisation. CoRR abs/1603.01489 (2016) - 2015
- [c30]Brendan Cody-Kenny, Edgar Galván López, Stephen Barrett:
locoGP: Improving Performance by Genetic Programming Java Source Code. GECCO (Companion) 2015: 811-818 - 2013
- [c29]Brendan Cody-Kenny, Stephen Barrett:
Self-focusing genetic programming for software optimisation. GECCO (Companion) 2013: 203-204 - [c28]Hui Song, Stephen Barrett, Aidan Clarke, Siobhán Clarke:
Self-adaptation with End-User Preferences: Using Run-Time Models and Constraint Solving. MoDELS 2013: 555-571 - [c27]Amit Raj, Stephen Barrett, Siobhán Clarke:
Run-Time Root Cause Analysis in Adaptive Distributed Systems. OTM Workshops 2013: 292-301 - [c26]Brendan Cody-Kenny, Stephen Barrett:
The Emergence of Useful Bias in Self-focusing Genetic Programming for Software Optimisation. SSBSE 2013: 306-311 - 2012
- [c25]Luca Longo, Fabio Rusconi, Lucia Noce, Stephen Barrett:
The Importance of Human Mental Workload in Web Design. WEBIST 2012: 403-409 - 2011
- [j4]Basel Magableh, Stephen Barrett:
Productivity Evaluation of Self-Adaptive Software Model Driven Architecture. Int. J. Inf. Technol. Web Eng. 6(4): 1-19 (2011) - [c24]Basel Magableh, Stephen Barrett:
Self-adaptive application for indoor wayfinding for individuals with cognitive impairments. CBMS 2011: 1-6 - [c23]Basel Magableh, Stephen Barrett:
Model-Driven Productivity Evaluation for Self-Adaptive Context-Oriented Software Development. NGMAST 2011: 87-93 - [c22]Basel Magableh, Stephen Barrett:
Adaptive Context Oriented Component-Based Application Middleware (COCA-Middleware). UIC 2011: 137-151 - 2010
- [j3]Luca Longo, Pierpaolo Dondio, Stephen Barrett:
Enhancing Social Search: A Computational Collective Intelligence Model of Behavioural Traits, Trust and Time. Trans. Comput. Collect. Intell. 2: 46-69 (2010) - [j2]Brendan Tangney, Elizabeth Oldham, Claire Conneely, Stephen Barrett, John Lawlor:
Pedagogy and Processes for a Computer Programming Outreach Workshop - The Bridge to College Model. IEEE Trans. Educ. 53(1): 53-60 (2010) - [c21]Luca Longo, Stephen Barrett:
A Computational Analysis of Cognitive Effort. ACIIDS (2) 2010: 65-74 - [c20]Pierpaolo Dondio, Stephen Barrett:
Argumentation vs aggregation of trust evidence. AAMAS 2010: 1567-1568 - [c19]Luca Longo, Stephen Barrett:
Cognitive Effort for Multi-agent Systems. Brain Informatics 2010: 55-66 - [c18]Pierpaolo Dondio, Stephen Barrett:
Comparison of six aggregation strategies to compute users' trustworthiness. CIKM 2010: 1773-1776
2000 – 2009
- 2009
- [c17]Luca Longo, Stephen Barrett, Pierpaolo Dondio:
Information Foraging Theory as a Form of Collective Intelligence for Social Search. ICCCI 2009: 63-74 - [c16]Paul Laird, Stephen Barrett:
Towards Dynamic Evolution of Domain Specific Languages. SLE 2009: 144-153 - [c15]Luca Longo, Stephen Barrett, Pierpaolo Dondio:
Toward Social Search - From Explicit to Implicit Collaboration to Predict Users' Interests. WEBIST 2009: 693-696 - 2008
- [c14]Pierpaolo Dondio, Luca Longo, Stephen Barrett:
A Translation Mechanism for Recommendations. IFIPTM 2008: 87-102 - 2007
- [j1]Pierpaolo Dondio, Stephen Barrett:
Computational Trust in Web Content Quality: A Comparative Evalutation on the Wikipedia Project. Informatica (Slovenia) 31(2): 151-160 (2007) - [c13]Pierpaolo Dondio, Stephen Barrett:
Presumptive Selection of Trust Evidences: A Non Invasive Application-Contained Solution. AINA Workshops (2) 2007: 493-499 - [c12]Pierpaolo Dondio, Stephen Barrett:
Presumptive selection of trust evidence. AAMAS 2007: 166 - [c11]Stephen Barrett, Julie Spratt, Ralph Depping, Ramachandran Ranganathan:
PowerPC Kernel Implementation for GSM Radio Platform. ESA 2007: 98-106 - [c10]Pierpaolo Dondio, Edmondo Manzo, Stephen Barrett:
Applied Computational Trust in Utilities Management: a Case Study on The Town Council of Cava de' Tirreni. IFIPTM 2007: 153-168 - [c9]Simone Grassi, Stephen Barrett, Francesco Sordillo:
Ontology based algorithm modeling: obtaining adaptation for SOA environment. MW4SOC 2007: 18-23 - [c8]Luca Longo, Pierpaolo Dondio, Stephen Barrett:
Temporal factors to evaluate trustworthiness of virtual identities. SecureComm 2007: 11-19 - 2006
- [c7]Pierpaolo Dondio, Stephen Barrett, Stefan Weber, Jean-Marc Seigneur:
Extracting Trust from Domain Analysis: A Case Study on the Wikipedia Project. ATC 2006: 362-373 - [c6]John Butler, Stephen Barrett:
Providing for change through Adaptive Object Models and Autonomous Computing techniques. ICAS 2006: 3 - [c5]Simone Grassi, Stephen Barrett:
Dynamic Architecture Adaptation in WS Environment. ICAS 2006: 26 - 2000
- [c4]Stephen Barrett, Brendan Tangney:
Wilde: Supporting Change in Groupware. COORDINATION 2000: 329-334 - [c3]Stephen Barrett, Brendan Tangney:
Wilde: An Open Systems Paradigm for Groupware. PDPTA 2000
1990 – 1999
- 1998
- [c2]Stephen Barrett, Brendan Tangney, Vinny Cahill:
Constructing distributed groupware systems: a walk on the Wilde side. ACM SIGOPS European Workshop 1998: 138-145 - 1995
- [c1]Stephen Barrett, Brendan Tangney:
Aspects - Composing CSCW Applications. OOIS 1995: 51-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint