default search action
Allen Cypher
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [p2]Allen Cypher:
Semiotic Engineering as Teaching. Conversations Around Semiotic Engineering 2017: 65-69 - 2014
- [j12]Jalal Mahmud, Allen Cypher, Eben M. Haber, Tessa Lau:
Design and industrial evaluation of a tool supporting semi-automated website testing. Softw. Test. Verification Reliab. 24(1): 61-82 (2014) - 2013
- [c27]Jilin Chen, Allen Cypher, Clemens Drews, Jeffrey Nichols:
CrowdE: Filtering Tweets for Direct Customer Engagements. ICWSM 2013 - 2012
- [c26]Allen Cypher:
Automating data entry for end users. VL/HCC 2012: 23-30 - 2011
- [c25]Brad A. Myers, Alexander Repenning, Peter Lucas, Walter van Roggen, Allen Cypher, Andrew P. Dove, Ofer Brandes:
Successful visual and end-user programming systems from industry. VL/HCC 2011: 5 - [e1]Gennaro Costagliola, Amy J. Ko, Allen Cypher, Jeffrey Nichols, Christopher Scaffidi, Caitlin Kelleher, Brad A. Myers:
2011 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2011, Pittsburgh, PA, USA, September 18-22, 2011. IEEE 2011, ISBN 978-1-4577-1246-3 [contents] - 2010
- [j11]Christopher Scaffidi, Christopher Bogart, Margaret M. Burnett, Allen Cypher, Brad A. Myers, Mary Shaw:
Using traits of web macro scripts to predict reuse. J. Vis. Lang. Comput. 21(5): 277-291 (2010) - [c24]Ian Li, Jeffrey Nichols, Tessa A. Lau, Clemens Drews, Allen Cypher:
Here's what i did: sharing and reusing web activity with ActionShot. CHI 2010: 723-732
2000 – 2009
- 2009
- [c23]Allen Cypher, Tessa A. Lau, Jeffrey Nichols, Mira Dontcheva:
Workshop on end user programming for the web. CHI Extended Abstracts 2009: 4779-4782 - [c22]James Lin, Jeffrey Wong, Jeffrey Nichols, Allen Cypher, Tessa A. Lau:
End-user programming of mashups with vegemite. IUI 2009: 97-106 - [c21]Allen Cypher:
The evolution of end user programming. VL/HCC 2009: 3 - [c20]Christopher Scaffidi, Christopher Bogart, Margaret M. Burnett, Allen Cypher, Brad A. Myers, Mary Shaw:
Predicting reuse of end-user web macro scripts. VL/HCC 2009: 93-100 - 2008
- [j10]Christopher Scaffidi, Allen Cypher, Sebastian G. Elbaum, Andhy Koesnandar, Brad A. Myers:
Using scenario-based requirements to direct research on web macro tools. J. Vis. Lang. Comput. 19(4): 485-498 (2008) - [c19]Clarisse Sieckenius de Souza, Allen Cypher:
Semiotic engineering in practice: redesigning the CoScripter interface. AVI 2008: 165-172 - [c18]Christopher Scaffidi, Allen Cypher, Sebastian G. Elbaum, Andhy Koesnandar, James Lin, Brad A. Myers, Mary Shaw:
Using topes to validate and reformat data in end-user programming tools. WEUSE@ICSE 2008: 11-15 - [c17]Christopher Scaffidi, Christopher Bogart, Margaret M. Burnett, Allen Cypher, Brad A. Myers, Mary Shaw:
Characterizing reusability of end-user web macro scripts. RSSE@SIGSOFT FSE 2008: 1 - [c16]Christopher Bogart, Margaret M. Burnett, Allen Cypher, Christopher Scaffidi:
End-user programming in the wild: A field study of CoScripter scripts. VL/HCC 2008: 39-46 - 2007
- [c15]Greg Little, Tessa A. Lau, Allen Cypher, James Lin, Eben M. Haber, Eser Kandogan:
Koala: capture, share, automate, personalize business processes on the web. CHI 2007: 943-946 - [c14]Christopher Scaffidi, Allen Cypher, Sebastian G. Elbaum, Andhy Koesnandar, Brad A. Myers:
Scenario-Based Requirements for Web Macro Tools. VL/HCC 2007: 197-204 - 2005
- [c13]Eben M. Haber, Eser Kandogan, Allen Cypher, Paul P. Maglio, Rob Barrett:
A1: Spreadsheet-based Scripting for Developing Web Tools. LISA 2005: 197-208 - [c12]Eser Kandogan, Eben M. Haber, Rob Barrett, Allen Cypher, Paul P. Maglio, Haixia Zhao:
A1: end-user programming for web-based system administration. UIST 2005: 211-220 - [c11]Allen Cypher:
A Stagecast Retrospective. VL/HCC 2005: 14 - 2001
- [j9]Chris DiGiano, Kenneth M. Kahn, Allen Cypher, David Canfield Smith:
Integrating Learning Supports into the Design of Visual Programming Systems. J. Vis. Lang. Comput. 12(5): 501-524 (2001) - [p1]David Canfield Smith, Allen Cypher, Larry Tesler:
Novice Programming Comes of Age. Your Wish is My Command 2001: 7-20 - 2000
- [j8]David Canfield Smith, Allen Cypher, Lawrence G. Tesler:
Novice Programming Comes of Age. Commun. ACM 43(3): 75-81 (2000)
1990 – 1999
- 1999
- [c10]B. J. Fogg, Allen Cypher, Allison Druin, Batya Friedman, Erik Strommen:
Is ActiMates Barney ethical?: the potential good, bad, and ugly of interactive plush toys. CHI Extended Abstracts 1999: 91-92 - 1998
- [j7]Nikolaus Heger, Allen Cypher, David Canfield Smith:
Cocoa at the Visual Programming Challenge 1997. J. Vis. Lang. Comput. 9(2): 151-169 (1998) - [c9]Allen Cypher:
Programming for Children. PPIG 1998: 4 - 1996
- [j6]David Canfield Smith, Allen Cypher, Kurt J. Schmucker:
Making programming easier for children. Interactions 3(5): 58-67 (1996) - 1995
- [c8]Allen Cypher, David Canfield Smith:
KidSim: End User Programming of Simulations. CHI 1995: 27-34 - [c7]Allen Cypher, David Canfield Smith:
KidSim: end user programming of simulations. CHI 95 Conference Companion 1995: 35-36 - 1994
- [j5]David Canfield Smith, Allen Cypher, James C. Spohrer:
KidSim: Programming Agents Without a Programming Language. Commun. ACM 37(7): 54-67 (1994) - [j4]Karen H. Kvavik, Shifteh Karimi, Allen Cypher, Deborah J. Mayhew:
User-centered processes and evaluation in product development. Interactions 1(3): 65-71 (1994) - [j3]Keith Instone, Allen Cypher, Claus Unger:
EWHCI '93 (East-West international conference on Human-Computer Interaction): conference report, Moscow, Russia, August 3-7. ACM SIGCHI Bull. 26(1): 31-34 (1994) - 1993
- [c6]Allen Cypher:
The Practical Use of Macro Recording: A Case Study. EWHCI 1993: 327-333 - 1991
- [j2]Allen Cypher, Jonathan Grudin, Allan MacLean, Michael Naimark, Ken-ichi Okada, Mukesh Patel, Larry Press, Blaine A. Price, Carlo Tarantola, Marilyn Welles:
The first Moscow international workshop on human-computer interaction. ACM SIGCHI Bull. 23(4): 11-12 (1991) - [c5]Allen Cypher:
EAGER: programming repetitive tasks by example. CHI 1991: 33-39 - [c4]Brad A. Myers, Allen Cypher, David Maulsby, David Canfield Smith, Ben Shneiderman:
Demonstrational interfaces: Coming soon? CHI 1991: 393-396 - [c3]Allen Cypher:
Video presentation Eager: programming repetitive tasks by example. CHI 1991: 445-446
1980 – 1989
- 1988
- [j1]Marilyn Stelzner, Allen Cypher:
Graphical Knowledge-Based Structure Editors. ACM SIGCHI Bull. 20(1): 74-75 (1988) - 1983
- [c2]Liam Bannon, Allen Cypher, Steven Greenspan, Melissa Lee Monty:
Evaluation and analysis of users' activity organization. CHI 1983: 54-57 - 1980
- [c1]Allen Cypher:
An Approach to The k Paths Problem. STOC 1980: 211-217
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint