default search action
Harold Abelson
Person information
- affiliation: MIT, Cambridge, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our pockets: the risks of client-side scanning. J. Cybersecur. 10(1) (2024) - [c21]Safinah Arshad Ali, Prerna Ravi, Katherine S. Moore, Hal Abelson, Cynthia Breazeal:
A Picture Is Worth a Thousand Words: Co-designing Text-to-Image Generation Learning Materials for K-12 with Educators. AAAI 2024: 23260-23267 - [c20]Hanya Elhashemy, Harold Abelson, Tilman Michaeli:
Adapting Computational Skills for AI Integration. CSEE&T 2024: 1-5 - [c19]Prerna Ravi, Robert Parks, John Masla, Hal Abelson, Cynthia Breazeal:
"Data comes from the real world": A Constructionist Approach to Mainstreaming K12 Data Science Education. SIGCSE Virtual (1) 2024 - [i4]Evan W. Patton, David Y. J. Kim, Ashley M. Granquist, Robin Liu, Arianna Scott, Jennet Zamanova, Harold Abelson:
Aptly: Making Mobile Apps from Natural Language. CoRR abs/2405.00229 (2024) - 2023
- [c18]H. Nicole Pang, Robert Parks, Cynthia Breazeal, Hal Abelson:
"How Can I Code A.I. Responsibly?": The Effect of Computational Action on K-12 Students Learning and Creating Socially Responsible A.I. AAAI 2023: 16017-16024 - [c17]Xiaoxue Du, Robert Parks, Selim Tezel, Jeff Freilich, H. Nicole Pang, Hal Abelson, Cynthia Breazeal:
Designing a Computational Action Program to Tackle Global Challenges. SIGCSE (2) 2023: 1320 - [i3]Prerna Ravi, Annalisa Broski, Glenda Stump, Hal Abelson, Eric Klopfer, Cynthia Breazeal:
Understanding Teacher Perspectives and Experiences after Deployment of AI Literacy Curriculum in Middle-school Classrooms. CoRR abs/2312.04839 (2023) - 2022
- [c16]Julius Adebayo, Michael Muelly, Harold Abelson, Been Kim:
Post hoc Explanations may be Ineffective for Detecting Unknown Spurious Correlation. ICLR 2022 - [i2]Julius Adebayo, Michael Muelly, Hal Abelson, Been Kim:
Post hoc Explanations may be Ineffective for Detecting Unknown Spurious Correlation. CoRR abs/2212.04629 (2022) - 2021
- [j23]Ting-Chia Hsu, Hal Abelson, Natalie Lao, Yu-Han Tseng, Yi-Ting Lin:
Behavioral-pattern exploration and development of an instructional tool for young children to learn AI. Comput. Educ. Artif. Intell. 2: 100012 (2021) - [j22]Ting-Chia Hsu, Hal Abelson, Evan W. Patton, Shih-Chu Chen, Hsuan-Ning Chang:
Self-efficacy and behavior patterns of learners using a real-time collaboration system developed for group programming. Int. J. Comput. Support. Collab. Learn. 16(4): 559-582 (2021) - [i1]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Vanessa Teague, Carmela Troncoso:
Bugs in our Pockets: The Risks of Client-Side Scanning. CoRR abs/2110.07450 (2021)
2010 – 2019
- 2019
- [j21]Mike Tissenbaum, Josh Sheldon, Hal Abelson:
From computational thinking to computational action. Commun. ACM 62(3): 34-36 (2019) - [c15]David C. Vladeck, Hal Abelson, Niva Elkin-Koren, Erik Neuenschwander, Jason Schultz, Christopher C. Yoo:
Educational programs in computer science and law: panel. CSLAW 2019: 1 - 2018
- [c14]Mike Tissenbaum, Mark A. Sherman, Josh Sheldon, Hal Abelson:
From Computational Thinking to Computational Action: Understanding Changes in Computational Identity through App Inventor and the Internet of Things. ICLS 2018 - [c13]Mike Tissenbaum, Josh Sheldon, Mark A. Sherman, Hal Abelson, David Weintrop, Kemi Jona, Mike S. Horn, Uri Wilensky, Satabdi Basu, Daisy Rutstein, Eric Snow, Linda Shear, Shuchi Grover, Irene A. Lee, Eric Klopfer, Gayithri Jayathirtha, Mia S. Shaw, Yasmin B. Kafai, Eni Mustafaraj, Will Temple, R. Benjamin Shapiro, Debora Lui, Clara Sorensen:
The State of the Field in Computational Thinking Assessment. ICLS 2018 - 2016
- [c12]Benjamin Xie, Hal Abelson:
Skill progression in MIT app inventor. VL/HCC 2016: 213-217 - 2015
- [j20]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j19]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [c11]Benjamin Xie, Isra Shabir, Hal Abelson:
Measuring the usability and capability of App inventor to create mobile Applications. PROMOTO@SPLASH 2015: 1-8 - 2014
- [j18]David Wolber, Harold Abelson, Mark Friedman:
Democratizing Computing with APP Inventor. GetMobile Mob. Comput. Commun. 18(4): 53-58 (2014) - [c10]Ilaria Liccardi, Joseph N. Pato, Daniel J. Weitzner, Hal Abelson, David De Roure:
No technical understanding required: helping users make informed choices about access to their personal data. MobiQuitous 2014: 140-150 - [c9]Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay:
Can apps play by the COPPA Rules? PST 2014: 1-9 - 2012
- [j17]Paul Lukowicz, Sanjiv Nanda, Vidya Narayanan, Hal Abelson, Deborah L. McGuinness, Michael I. Jordan:
Qualcomm Context-Awareness Symposium Sets Research Agenda for Context-Aware Smartphones. IEEE Pervasive Comput. 11(1): 76-79 (2012) - [c8]Jeff Gray, Hal Abelson, David Wolber, Michèlle Friend:
Teaching CS principles with app inventor. ACM Southeast Regional Conference 2012: 405-406 - [c7]Hal Abelson:
From computational thinking to computational values. SIGCSE 2012: 239-240 - [c6]Hal Abelson, David Wolber, Ralph A. Morelli, Jeff Gray, Chinma Uche:
Teaching with app inventor for android (abstract only). SIGCSE 2012: 681 - 2011
- [b5]David Wolber, Hal Abelson, Ellen Spertus, Liz Looney:
App Inventor - Create Your Own Android Apps. O'Reilly 2011, ISBN 978-1-449-39748-7, pp. I-XXII, 1-360 - 2010
- [p1]John Wilbanks, Hal Abelson:
Open Access versus "Open Viewing" for a Web of Science: The Neurocommons Example. World Wide Research 2010: 322-324
2000 – 2009
- 2009
- [r1]Harold Abelson, Jacob Beal, Gerald J. Sussman:
AmorphousComputing. Encyclopedia of Complexity and Systems Science 2009: 257-271 - 2008
- [j16]Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Joan Feigenbaum, James A. Hendler, Gerald J. Sussman:
Information accountability. Commun. ACM 51(6): 82-87 (2008) - [j15]Hal Abelson, Phillip D. Long:
MIT's Strategy for Educational Technology Innovation, 1999-2003. Proc. IEEE 96(6): 1012-1034 (2008) - 2006
- [c5]Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Chris Hanson, James A. Hendler, Lalana Kagal, Deborah L. McGuinness, Gerald Jay Sussman, K. Krasnow Waterman:
Transparent Accountable Data Mining: New Strategies for Privacy Protection. AAAI Spring Symposium: Semantic Web Meets eGovernment 2006: 141- - 2000
- [j14]Harold Abelson, Don Allen, Daniel Coore, Chris Hanson, George Homsy, Thomas F. Knight Jr., Radhika Nagpal, Erik Rauch, Gerald J. Sussman, Ron Weiss:
Amorphous Computing. Commun. ACM 43(5): 74-82 (2000) - [j13]Harold Abelson, Nancy Forbes:
Amorphous computing. Complex. 5(3): 22-25 (2000)
1990 – 1999
- 1998
- [b4]Harold Abelson, Gerald J. Sussman, Julie Sussman:
Struktur und Interpretation von Computerprogrammen - eine Informatik-Einführung (3. Aufl.). Springer 1998, ISBN 978-3-540-63898-8, pp. I-XXIII, 1-682 - [j12]Harold Abelson, R. Kent Dybvig, Christopher T. Haynes, Guillermo Juan Rozas, N. I. Adams IV, Daniel P. Friedman, Eugene E. Kohlbecker, Guy L. Steele Jr., David H. Bartley, Robert H. Halstead Jr., Don Oxley, Gerald J. Sussman, G. Brooks, Chris Hanson, Kent M. Pitman, Mitchell Wand:
Revised Report on the Algorithmic Language Scheme. High. Order Symb. Comput. 11(1): 7-105 (1998) - 1997
- [j11]Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier:
The risks of key recovery, key escrow, and trusted third-party encryption. World Wide Web J. 2: 241-257 (1997) - 1996
- [b3]Harold Abelson, Gerald J. Sussman:
Structure and Interpretation of Computer Programs, Second Edition. MIT Press 1996, ISBN 0-262-01153-0 - 1993
- [b2]Harold Abelson, Gerald J. Sussman, Julie Sussman:
Struktur und Interpretation von Computerprogrammen - eine Informatik-Einführung (2. Aufl.). Springer 1993, ISBN 978-3-540-56934-3, pp. I-XXI, 1-651 - 1990
- [c4]Harold Abelson, Andrew A. Berlin, Jacob Katzenelson, William H. McAllister, Guillermo Juan Rozas, Gerald Jay Sussman:
The Supercomputer Toolkit and its applications. Jerusalem Conference on Information Technology 1990: 76-81
1980 – 1989
- 1989
- [j10]Terry Cline, Harold Abelson, Warren Harris:
Symbolic computing in engineering design. Artif. Intell. Eng. Des. Anal. Manuf. 3(3): 195-206 (1989) - [j9]Harold Abelson, Michael Eisenberg, Matthew Halfant, Jacob Katzenelson, Elisha Sacks, Gerald J. Sussman, Jack Wisdom, Kenneth Yip:
Intelligence in Scientific Computing. Commun. ACM 32(5): 546-562 (1989) - 1986
- [j8]Andrea A. diSessa, Harold Abelson:
Boxer: A Reconstructible Computational Medium. Commun. ACM 29(9): 859-868 (1986) - 1985
- [b1]Harold Abelson, Gerald J. Sussman:
Structure and Interpretation of Computer Programs. MIT Press 1985, ISBN 0-262-51036-7 - 1982
- [j7]Harold Abelson, Andrzej Ehrenfeucht, James Fickett, Jan Mycielski:
Compositional complexity of Boolean functions. Discret. Appl. Math. 4(1): 1-10 (1982) - 1980
- [j6]Harold Abelson, Peter Andreae:
Information Transfer and Area-Time Tradeoffs for VLSI Multiplication. Commun. ACM 23(1): 20-23 (1980) - [j5]Harold Abelson:
Lower Bounds on Information Transfer in Distributed Computations. J. ACM 27(2): 384-392 (1980)
1970 – 1979
- 1979
- [j4]Harold Abelson:
A Note on Time-Space Tradeoffs for Computing Continuous Functions. Inf. Process. Lett. 8(4): 215-217 (1979) - 1978
- [j3]Harold Abelson:
Towards a Theory of Local and Global in Computation. Theor. Comput. Sci. 6: 41-67 (1978) - [j2]Harold Abelson:
Corrigendum: Towards a Theory of Local and Global in Computation. Theor. Comput. Sci. 6: 343 (1978) - [c3]Harold Abelson:
Lower Bounds on Information Transfer in Distributed Computations. FOCS 1978: 151-158 - 1977
- [j1]Harold Abelson:
Computational Geometry of Linear Threshold Functions. Inf. Control. 34(1): 66-92 (1977) - 1976
- [c2]Stuart D. Milner, Karl L. Zinn, Robert Parnes, Helen Hench, Thomas A. Dwyer, Harold Abelson:
SIGCUE (Paper Session). ACM Annual Conference 1976: 149 - [c1]Harold Abelson:
Logo graphics as a mathematical environment. ACM Annual Conference 1976: 159-163
Coauthor Index
aka: Gerald Jay Sussman
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint