default search action
Jim Waldo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2010
- [b1]Jim Waldo:
Java - The Good Parts: Unearthing the Excellence in Java. O'Reilly 2010, ISBN 978-0-596-80373-5, pp. I-XII, 1-178
Journal Articles
- 2020
- [j29]Miguel Guevara, Damien Desfontaines, Jim Waldo, Terry Coatta:
Differential Privacy: The Pursuit of Protections by Default: A discussion with Miguel Guevara, Damien Desfontaines, Jim Waldo, and Terry Coatta. ACM Queue 18(5): 93-112 (2020) - 2019
- [j28]Jim Waldo:
A hitchhiker's guide to the blockchain universe. Commun. ACM 62(3): 38-42 (2019) - [j27]Barbara J. Grosz, David Gray Grant, Kate Vredenburgh, Jeff Behrends, Lily Hu, Alison Simmons, Jim Waldo:
Embedded EthiCS: integrating ethics across CS education. Commun. ACM 62(8): 54-61 (2019) - [j26]Michelle Vaccaro, Jim Waldo:
The effects of mixing machine learning and human judgment. Commun. ACM 62(11): 104-110 (2019) - [j25]Michelle Vaccaro, Jim Waldo:
The Effects of Mixing Machine Learning and Human Judgment. ACM Queue 17(4): 30 (2019) - 2018
- [j24]Jim Waldo:
A Hitchhiker's Guide to the Blockchain Universe. ACM Queue 16(6): 10 (2018) - 2015
- [j23]Olivia Angiuli, Joe Blitzstein, Jim Waldo:
How to de-identify your data. Commun. ACM 58(12): 48-55 (2015) - [j22]Olivia Angiuli, Joe Blitzstein, Jim Waldo:
How to De-identify Your Data. ACM Queue 13(8): 20 (2015) - 2014
- [j21]Robert F. Sproull, Jim Waldo:
The API performance contract. Commun. ACM 57(3): 45-51 (2014) - [j20]Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew D. Ho, Daniel T. Seaton, Isaac L. Chuang:
Privacy, anonymity, and big data in the social sciences. Commun. ACM 57(9): 56-63 (2014) - [j19]Robert F. Sproull, Jim Waldo:
The API Performance Contract. ACM Queue 12(1): 10 (2014) - 2010
- [j18]James Waldo, Herbert S. Lin, Lawrence H. Cox:
Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age". J. Priv. Confidentiality 2(1) (2010) - [j17]James Waldo, Herbert S. Lin, Lynette I. Millett:
Engaging Privacy and Information Technology in a Digital Age: Executive Summary. J. Priv. Confidentiality 2(1) (2010) - 2009
- [j16]Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo:
A threat analysis of RFID passports. Commun. ACM 52(12): 38-42 (2009) - [j15]Jim Waldo, Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary:
A Threat Analysis of RFID Passports. ACM Queue 7(9): 10 (2009) - 2008
- [j14]Jim Waldo:
Scaling in games and virtual worlds. Commun. ACM 51(8): 38-44 (2008) - [j13]Jim Waldo:
Scaling in Games & Virtual Worlds. ACM Queue 6(7): 10-16 (2008) - 2005
- [j12]Jim Waldo:
Embedded computing and Formula One racing. IEEE Pervasive Comput. 4(3): 18-21 (2005) - 2002
- [j11]Jim Waldo:
Virtual Organizations, Pervasive Computing, and an Infrastructure for Networking at the Edge. Inf. Syst. Frontiers 4(1): 9-18 (2002) - 2001
- [j10]Jim Waldo:
When the network is everything. Commun. ACM 44(3): 68-69 (2001) - [j9]Jim Waldo:
Mobile Code, Distributed Computing, and Agents. IEEE Intell. Syst. 16(2): 10-12 (2001) - 2000
- [j8]Jim Waldo:
Alive and Well: Jini Technology Today. Computer 33(6): 107-109 (2000) - 1999
- [j7]Jim Waldo:
The Jini Architecture for Network-Centric Computing. Commun. ACM 42(7): 76-82 (1999) - [j6]Jim Waldo:
Portability Is Key. Computer 32(5): 55-56 (1999) - 1998
- [j5]Jim Waldo:
Remote procedure calls and Java Remote Method Invocation. IEEE Concurr. 6(3): 5-7 (1998) - 1997
- [j4]Ann Wollrath, Jim Waldo, Roger Riggs:
Java-centric distributed computing. IEEE Micro 17(3): 44-53 (1997) - 1996
- [j3]Ann Wollrath, Roger Riggs, Jim Waldo:
A Distributed Object Model for the Java System. Comput. Syst. 9(4): 265-290 (1996) - [j2]Roger Riggs, Jim Waldo, Ann Wollrath, Krishna Bharat:
Pickling State in the Java System. Comput. Syst. 9(4): 291-312 (1996) - 1991
- [j1]Jim Waldo:
Controversy: The Case for Multiple Inheritance in C++. Comput. Syst. 4(2): 157-171 (1991)
Conference and Workshop Papers
- 2024
- [c21]Alex Cabral, Jim Waldo, Amy V. Mueller:
Poster Abstract: Towards a Predictive Model for Improved Placement of Solar-Powered Urban Sensing Nodes. IoTDI 2024: 215-216 - 2023
- [c20]Alex Cabral, Jim Waldo:
Designing Large-Scale Wireless Sensor Networks for Urban Environmental Sensing. UbiComp/ISWC Adjunct 2023: 253-257 - 2017
- [c19]Serena Booth, James Tompkin, Hanspeter Pfister, Jim Waldo, Krzysztof Gajos, Radhika Nagpal:
Piggybacking Robots: Human-Robot Overtrust in University Dormitory Security. HRI 2017: 426-434 - 2016
- [c18]Olivia Angiuli, Jim Waldo:
Statistical Tradeoffs between Generalization and Suppression in the De-identification of Large-Scale Data Sets. COMPSAC Workshops 2016: 589-593 - 2006
- [c17]Jim Waldo:
On system design. OOPSLA 2006: 467-480 - [c16]Richard P. Gabriel, Guy L. Steele Jr., Friedrich Steimann, Jim Waldo, Gregor Kiczales, Kevin J. Sullivan:
Aspects and/versus modularity the grand debate. OOPSLA Companion 2006: 935-936 - 2002
- [c15]Jim Waldo:
Coordination and System Design in a Network-Centric Age. COORDINATION 2002: 2-3 - 2001
- [c14]Jim Waldo:
JINI Networking Technology and Ad-Hoc Networks. LISA 2001 - [c13]Jim Waldo:
Constructing Ad Hoc Networks. NCA 2001: 9-20 - 1999
- [c12]Jim Waldo:
Object-Oriented Programming on the Network. ECOOP 1999: 441-448 - 1998
- [c11]Jim Waldo:
Code reuse, distributed systems, and language-centric design. ICSR 1998: 17-23 - [c10]Jim Waldo:
The solution to the re-use problem. ICSR 1998: 369-370 - 1997
- [c9]Jim Waldo:
Java: A Language for Software Engineering (Tutorial). ICSE 1997: 630 - 1996
- [c8]Roger Riggs, Jim Waldo, Ann Wollrath:
Pickling State in the Java(tm) System. COOTS 1996 - [c7]Ann Wollrath, Roger Riggs, Jim Waldo:
A Distributed Object Model for the Java System. COOTS 1996 - [c6]Jim Waldo:
Using the Java Programming Environment to Build Collaborative Applications (Tutorial). CSCW 1996: 3 - [c5]Jim Waldo, Geoff Wyant, Ann Wollrath, Samuel C. Kendall:
A Note on Distributed Computing. Mobile Object Systems 1996: 49-64 - [c4]Jim Waldo, Ann Wollrath, Samuel C. Kendall:
Afterword. Mobile Object Systems 1996: 65-66 - 1995
- [c3]Ann Wollrath, Geoff Wyant, Jim Waldo:
Simple Activation for Distributed Objects. COOTS 1995 - [c2]Jim Waldo, Ann Wollrath, Geoff Wyant, Samuel C. Kendall:
Events in an RPC Based Distributed System. USENIX 1995: 131-142 - 1987
- [c1]Jim Waldo:
Using C++ to Develop a WYSIWYG Hypertext Toolkit. C++ Workshop 1987: 246-255
Informal and Other Publications
- 2024
- [i4]Eric Li, Jim Waldo:
WebSuite: Systematically Evaluating Why Web Agents Fail. CoRR abs/2406.01623 (2024) - 2023
- [i3]Alex Cabral, Vaishnavi Nattar Ranganathan, Jim Waldo:
Cellular LTE and Solar Energy Harvesting for Long-Term, Reliable Urban Sensor Networks: Challenges and Opportunities. CoRR abs/2307.04016 (2023) - 2018
- [i2]Barbara J. Grosz, David Gray Grant, Kate Vredenburgh, Jeff Behrends, Lily Hu, Alison Simmons, Jim Waldo:
Embedded EthiCS: Integrating Ethics Broadly Across Computer Science Education. CoRR abs/1808.05686 (2018) - 2017
- [i1]Finale Doshi-Velez, Mason Kortz, Ryan Budish, Chris Bavitz, Sam Gershman, David O'Brien, Stuart Schieber, James Waldo, David Weinberger, Alexandra Wood:
Accountability of AI Under the Law: The Role of Explanation. CoRR abs/1711.01134 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 21:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint