


default search action
Lori L. Pollock
- > Home > Persons > Lori L. Pollock
Publications
- 2023
- [c148]Douglas Lusa Krug
, Yifan Zhang
, Chrystalla Mouza
, Taylor Barnett
, Lori L. Pollock
, David C. Shepherd
:
Using Domain-Specific, Immediate Feedback to Support Students Learning Computer Programming to Make Music. ITiCSE (1) 2023: 368-374 - 2022
- [c145]Yifan Zhang
, Douglas Lusa Krug
, Chrystalla Mouza, David C. Shepherd
, Lori L. Pollock:
A Case Study of Middle Schoolers' Use of Computational Thinking Concepts and Practices during Coded Music Composition. ITiCSE (1) 2022: 33-39 - 2021
- [c142]Douglas Lusa Krug
, Edtwuan Bowman, Taylor Barnett, Lori L. Pollock, David C. Shepherd
:
Code Beats: A Virtual Camp for Middle Schoolers Coding Hip Hop. SIGCSE 2021: 397-403 - 2018
- [j34]Kostadin Damevski
, Hui Chen
, David C. Shepherd
, Nicholas A. Kraft
, Lori L. Pollock:
Predicting Future Developer Behavior in the IDE Using Topic Models. IEEE Trans. Software Eng. 44(11): 1100-1111 (2018) - [c129]Kostadin Damevski
, Hui Chen, David C. Shepherd
, Nicholas A. Kraft, Lori L. Pollock:
Predicting future developer behavior in the IDE using topic models. ICSE 2018: 932 - 2017
- [j32]Kostadin Damevski
, David C. Shepherd
, Johannes Schneider, Lori L. Pollock:
Mining Sequences of Developer Interactions in Visual Studio for Usage Smells. IEEE Trans. Software Eng. 43(4): 359-371 (2017) - [c123]Zack Coker, Kostadin Damevski
, Claire Le Goues
, Nicholas A. Kraft, David C. Shepherd
, Lori L. Pollock:
Behavior Metrics for Prioritizing Investigations of Exceptions. ICSME 2017: 554-563 - 2016
- [j31]Kostadin Damevski
, David C. Shepherd
, Lori L. Pollock:
A field study of how developers locate features in source code. Empir. Softw. Eng. 21(2): 724-747 (2016) - [c116]Irene Manotas, Christian Bird, Rui Zhang, David C. Shepherd
, Ciera Jaspan, Caitlin Sadowski, Lori L. Pollock, James Clause:
An empirical study of practitioners' perspectives on green software engineering. ICSE 2016: 237-248 - [c114]Kostadin Damevski
, Hui Chen
, David C. Shepherd
, Lori L. Pollock:
Interactive exploration of developer interaction traces using a hidden markov model. MSR 2016: 126-136 - 2015
- [c112]David C. Shepherd
, Kostadin Damevski
, Lori L. Pollock:
How and When to Transfer Software Engineering Research via Extensions. ICSE (2) 2015: 239-240 - [c110]Emily Hill, David C. Shepherd
, Lori L. Pollock:
Exploring the use of concern element role information in feature location evaluation. ICPC 2015: 140-150 - [c107]Kostadin Damevski
, David C. Shepherd
, Lori L. Pollock:
Scaling up evaluation of code search tools through developer usage metrics. SANER 2015: 181-190 - [i2]Kostadin Damevski, David C. Shepherd, Nicholas A. Kraft, Lori L. Pollock:
Supporting Developers in Porting Software via Combined Textual and Structural Analysis of Software Artifacts. CoRR abs/1508.04044 (2015) - 2014
- [c106]Kostadin Damevski
, David C. Shepherd
, Lori L. Pollock:
A case study of paired interleaving for evaluating code search techniques. CSMR-WCRE 2014: 54-63 - 2013
- [c97]Emily Hill, David C. Shepherd
, Lori L. Pollock, K. Vijay-Shanker:
Differentiating Roles of Program Elements in Action-Oriented Concerns. ICSM 2013: 376-379 - 2011
- [c83]Lori L. Pollock, K. Vijay-Shanker, Emily Hill, Giriprasad Sridhara, David C. Shepherd
:
Natural Language-Based Software Analyses and Tools for Software Maintenance. ISSSE 2011: 94-125 - 2008
- [j25]Zachary P. Fry, David C. Shepherd
, Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Analysing source code: looking for useful verbdirect object pairs in all the right places. IET Softw. 2(1): 27-36 (2008) - 2007
- [c68]David C. Shepherd
, Zachary P. Fry, Emily Hill, Lori L. Pollock, K. Vijay-Shanker:
Using natural language program analysis to locate and understand action-oriented concerns. AOSD 2007: 212-224 - [c64]Lori L. Pollock, K. Vijay-Shanker, David C. Shepherd
, Emily Hill, Zachary P. Fry, Kishen Maloor:
Introducing natural language program analysis. PASTE 2007: 15-16 - [c63]David C. Shepherd
, Lori L. Pollock, K. Vijay-Shanker:
Case study: supplementing program analysis with natural language analysis to improve a reverse engineering task. PASTE 2007: 49-54 - 2006
- [c61]David C. Shepherd
, Lori L. Pollock, K. Vijay-Shanker:
Towards supporting on-demand virtual remodularization using program graphs. AOSD 2006: 3-14 - 2005
- [j17]David C. Shepherd, Lori L. Pollock, Tom Tourwé:
Using language clues to discover crosscutting concerns. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-6 (2005) - [c49]David C. Shepherd, Thomas Roper, Lori L. Pollock:
Using AOP to Ease Evolution. ICSM (Industrial and Tool Volume) 2005: 16-25 - [c47]David C. Shepherd
, Jeffrey Palm, Lori L. Pollock, Mark Chu-Carroll:
Timna: a framework for automatically combining aspect mining analyses. ASE 2005: 184-193 - 2004
- [c40]David C. Shepherd, Emily Gibson, Lori L. Pollock:
Design and Evaluation of an Automated Aspect Mining Tool. Software Engineering Research and Practice 2004: 601-607 - 2003
- [c38]Amie L. Souter, David C. Shepherd
, Lori L. Pollock:
Testing with Respect to Concerns. ICSM 2003: 54-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-05 20:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
