Name
Affiliation
Papers
JUSTIN SMITH
Miami University of Ohio, Ohio, USA
28
Collaborators
Citations 
PageRank 
60
97
11.74
Referers 
Referees 
References 
256
555
217
Search Limit
100555
Title
Citations
PageRank
Year
How Students Unit Test: Perceptions, Practices, and Pitfalls10.432021
Field Study on Usability and Security Perceptions Surrounding Social Robots00.342021
NavTuner: Learning a Scene-Sensitive Family of Navigation Policies00.342021
Towards Ethical Data-Driven Software: Filling the Gaps in Ethics Research & Practice30.452021
egoTEB - Egocentric, Perception Space Navigation Using Timed-Elastic-Bands.00.342020
A Case Study of Software Security Red Teams at Microsoft00.342020
MatchingRef: Matching Variable Names in a Reference Page to Help Introductory CS Students Fix Compiler Errors00.342020
Closed-Loop Benchmarking of Stereo Visual-Inertial SLAM Systems: Understanding the Impact of Drift and Latency on Tracking Accuracy00.342020
Collective intelligence for the common good: cultivating the seeds for an intentional collaborative enterprise.20.432018
Learning to Navigate: Exploiting Deep Networks to Inform Sample-Based Planning During Vision-Based Navigation.00.342018
Does ACM's code of ethics change ethical decision making in software development?50.452018
2019 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2019, Memphis, Tennessee, USA, October 14-18, 201900.342018
Just-in-time static analysis.70.472017
ANI-1: A data set of 20M off-equilibrium DFT calculations for organic molecules.00.342017
Do developers read compiler error messages?160.712017
Spreadsheet practices and challenges in a large multinational conglomerate.00.342017
Cheetah: just-in-time taint analysis for Android apps.20.362017
Flower: Navigating program flow in the IDE.10.342017
PiPS: Planning in perception space.00.342017
Paradise unplugged: identifying barriers for female participation on stack overflow.260.972016
Resolving input validation vulnerabilities by retracing taint flow through source code.00.342016
Identifying successful strategies for resolving static analysis notifications.10.352016
A cross-tool communication study on program analysis tool notifications.70.472016
What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool.50.412016
Questions developers ask while diagnosing potential security vulnerabilities with static analysis210.832015
CADENCE for Collaboration and Companionship with Robots.00.342014
A Business-Rules Approach for Departmental Advising00.342002
Leibnizian Organisms, Nested Individuals, and Units of Selection00.342002