Alexander Nolte
Applied Filters
- Alexander Nolte
- AuthorRemove filter
People
Colleagues
- Alexander Nolte (32)
- James Herbsleb (6)
- Michael Prilla (5)
- Irene Angelica Chounta (4)
- Thomas Herrmann (4)
- Abasi Amefon Obot Affia (3)
- Ei Pa Pa Pe-Than (3)
- Raimundas Matulevičius (3)
- Anna Filippova (2)
- Christian A. Bird (2)
- Fredrik P Milani (2)
- Rosta Farzan (2)
- Steve Scallen (2)
- Alexander Serebrenik (1)
- Audris Mockus (1)
- Craig Anslow (1)
- Gwendolyn L Kolfschoten (1)
- Jan Mendling (1)
- Ross Andrew Brown (1)
- Stephan G. Lukosch (1)
Publication
Proceedings/Book Names
- Collaboration Technologies and Social Computing (2)
- PDC '10: Proceedings of the 11th Biennial Participatory Design Conference (2)
- Advanced Information Systems Engineering (1)
- CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (1)
- CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (1)
- Collaboration Technologies and Social Computing (1)
- CRIWG'10: Proceedings of the 16th international conference on Collaboration and technology (1)
- CRIWG'12: Proceedings of the 18th international conference on Collaboration and Technology (1)
- Human Aspects of Information Security, Privacy and Trust (1)
- ICGJ '21: Proceedings of the 6th Annual International Conference on Game Jams, Hackathons, and Game Creation Events (1)
- ICSE '19: Proceedings of the 41st International Conference on Software Engineering (1)
- ICSE-SEET '22: Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Software Engineering Education and Training (1)
- IS-EUD'11: Proceedings of the Third international conference on End-user development (1)
- ITS '15: Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces (1)
- IWSiB 2019: Proceedings of the 2nd ACM SIGSOFT International Workshop on Software-Intensive Business: Start-ups, Platforms, and Ecosystems (1)
- LAK '24: Proceedings of the 14th Learning Analytics and Knowledge Conference (1)
- MuC '22: Proceedings of Mensch und Computer 2022 (1)
- On the Move to Meaningful Internet Systems. OTM 2018 Conferences (1)
- On the Move to Meaningful Internet Systems: OTM 2019 Conferences (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOpen AccessPublished By ACMPublished By ACM
Field report for Platform mBox: Designing an Open MMLA Platform
- Zaibei Li
Center for Digital Education & DIKU, University of Copenhagen, Denmark
, - Martin Thoft Jensen
University of Copenhagen, Denmark
, - Alexander Nolte
University of Tartu, Estonia
, - Daniel Spikol
Center for Digital Education & DIKU, University of Copenhagen, Denmark
LAK '24: Proceedings of the 14th Learning Analytics and Knowledge Conference•March 2024, pp 785-791• https://doi.org/10.1145/3636555.3636872Multimodal Learning Analytics (MMLA) is an evolving sector within learning analytics that has become increasingly useful for examining complex learning and collaboration dynamics for group work across all educational levels. The availability of low-cost ...
- 0Citation
- 157
- Downloads
MetricsTotal Citations0Total Downloads157Last 12 Months157Last 6 weeks38
- Zaibei Li
- ArticleOpen Access
Design and Evaluation of a User Interface Concept for Prescriptive Process Monitoring
- Kateryna Kubrak
University of Tartu, Tartu, Estonia
, - Fredrik Milani
University of Tartu, Tartu, Estonia
, - Alexander Nolte
University of Tartu, Tartu, Estonia
Carnegie Mellon University, Pittsburgh, PA, USA
, - Marlon Dumas
University of Tartu, Tartu, Estonia
Advanced Information Systems Engineering•June 2023, pp 347-363• https://doi.org/10.1007/978-3-031-34560-9_21AbstractPrescriptive process monitoring methods recommend interventions during the execution of a process to maximize its success rate. Current research in this field focuses on algorithms to learn intervention policies that maximize the expected payoff ...
- 0Citation
MetricsTotal Citations0
- Kateryna Kubrak
- research-article
One-off events? An empirical study of hackathon code creation and reuse
- Ahmed Samir Imam Mahmoud
University of Tartu, Tartu, Estonia
, - Tapajit Dey
Lero—the Irish Software Research Centre, University of Limerick, Limerick, Ireland
, - Alexander Nolte
University of Tartu, Tartu, Estonia
Carnegie Mellon University, Pittsburgh, PA, USA
, - Audris Mockus
University of Tennessee, Knoxville, TN, USA
, - James D. Herbsleb
Carnegie Mellon University, Pittsburgh, PA, USA
Empirical Software Engineering, Volume 27, Issue 7•Dec 2022 • https://doi.org/10.1007/s10664-022-10201-xAbstractContextHackathons have become popular events for teams to collaborate on projects and develop software prototypes. Most existing research focuses on activities during an event with limited attention to the evolution of the hackathon code.
Objective...
- 0Citation
MetricsTotal Citations0
- Ahmed Samir Imam Mahmoud
- research-articlePublished By ACMPublished By ACM
Socio-technical Constraints and Affordances of Virtual Collaboration - A Study of Four Online Hackathons
- Wendy Mendes
Federal University of Pará - UFPA, Belém, Brazil
, - Albert Richard
Federal University of Pará - UFPA, Belém, Brazil
, - Tähe-Kai Tillo
University of Tartu, Tartu, Estonia
, - Gustavo Pinto
Zup Innovation & Federal University of Pará - UFPA, Belém, Brazil
, - Kiev Gama
Federal University of Pernambuco - UFPE, Recife, Brazil
, - Alexander Nolte
University of Tartu & Carnegie Mellon University, Tartu, Estonia
Proceedings of the ACM on Human-Computer Interaction, Volume 6, Issue CSCW2•November 2022, Article No.: 330, pp 1-32 • https://doi.org/10.1145/3555221Hackathons and similar time-bounded events have become a popular form of collaboration in various domains. They are commonly organized as in-person events during which teams engage in intense collaboration over a short period of time to complete a ...
- 6Citation
- 172
- Downloads
MetricsTotal Citations6Total Downloads172Last 12 Months96Last 6 weeks16
- Wendy Mendes
- research-articlePublished By ACMPublished By ACM
Integrating hackathons into an online cybersecurity course
- Abasi-amefon Obot Affia
University of Tartu, Tartu, Estonia
, - Alexander Nolte
University of Tartu, Tartu, Estonia and Carnegie Mellon University
, - Raimundas Matulevičius
University of Tartu, Tartu, Estonia
ICSE-SEET '22: Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: Software Engineering Education and Training•May 2022, pp 134-145• https://doi.org/10.1145/3510456.3514151Cybersecurity educators have widely introduced hackathons to facilitate practical knowledge gaining in cybersecurity education. Introducing such events into cybersecurity courses can provide valuable learning experiences for students. The nature of the ...
- 4Citation
- 105
- Downloads
MetricsTotal Citations4Total Downloads105Last 12 Months53Last 6 weeks5
- Abasi-amefon Obot Affia
- short-paperPublished By ACMPublished By ACM
Sentiment Analysis of Participants Interactions in a Hackathon Context: The Example of a Slack Corpus
- Sarah Feislachen
University of Duisburg-Essen, Germany
, - Philip Garus
University of Duisburg-Essen, Germany
, - Hong Wang
University of Duisburg-Essen, Germany
, - Eduard Podkolin
University of Duisburg-Essen, Germany
, - Sarah Schlüter
University of Duisburg-Essen, Germany
, - Nadine Schulze Bernd
University of Duisburg-Essen, Germany
, - Sven Manske
University of Duisburg-Essen, Germany
, - Alexander Nolte
University of Tartu, Estonia
, - Irene-Angelica Chounta
University of Duisburg-Essen, Germany
MuC '22: Proceedings of Mensch und Computer 2022•September 2022, pp 493-497• https://doi.org/10.1145/3543758.3547563This paper presents the analysis of participants’ interactions during an online hackathon using Natural Language Processing (NLP) techniques. In particular, we explored the communication of groups facilitated by Slack focusing on the use of emojis. Our ...
- 1Citation
- 95
- Downloads
MetricsTotal Citations1Total Downloads95Last 12 Months34Last 6 weeks2
- Sarah Feislachen
- research-articlePublished By ACMPublished By ACM
The CAT Effect: Exploring the Impact of Casual Affective Triggers on Online Surveys’ Response Rates
- Irene-Angelica Chounta
Department of Computer Science and Applied Cognitive Science, University of Duisburg-Essen, Germany
, - Alexander Nolte
Institute of Computer Science, University of Tartu, Estonia
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems•April 2022, Article No.: 583, pp 1-13• https://doi.org/10.1145/3491102.3517481We explore the impact of Casual Affective Triggers (CAT) on response rates of online surveys. As CAT, we refer to objects that can be included in survey participation invitations and trigger participants’ affect. The hypothesis is that participants who ...
- 1Citation
- 236
- Downloads
MetricsTotal Citations1Total Downloads236Last 12 Months51Last 6 weeks9- 1
Supplementary Material3491102.3517481-talk-video.mp4
- Irene-Angelica Chounta
- short-paperPublished By ACMPublished By ACM
Organizing online hackathons for newcomers to a scientific community – Lessons learned from two events
- Jeaime Powell
The University of Texas at Austin, United States
, - Linda Bailey Hayden
NSF Science Gateway Community Institute, United States
, - Amy Cannon
Omnibond Systems, LLC, United States
, - Boyd Wilson
Omnibond Systems, LLC, United States
, - Alexander Nolte
University of Tartu, Estonia
ICGJ '21: Proceedings of the 6th Annual International Conference on Game Jams, Hackathons, and Game Creation Events•August 2021, pp 78-82• https://doi.org/10.1145/3472688.3472700Acquiring computing skills is essential not only to work in computer science but also because many impactful discoveries occur at the interface between traditional scientific disciplines and computing and data science. Time-bounded events such as ...
- 6Citation
- 117
- Downloads
MetricsTotal Citations6Total Downloads117Last 12 Months24
- Jeaime Powell
- research-articlePublished By ACMPublished By ACM
What Happens to All These Hackathon Projects?: Identifying Factors to Promote Hackathon Project Continuation
- Alexander Nolte
University of Tartu, Tartu, Estonia
, - Irene-Angelica Chounta
University of Tartu, Tartu, Estonia
, - James D. Herbsleb
Carnegie Mellon University, Pittsburgh, PA, USA
Proceedings of the ACM on Human-Computer Interaction, Volume 4, Issue CSCW2•October 2020, Article No.: 145, pp 1-26 • https://doi.org/10.1145/3415216Time-based events, such as hackathons and codefests, have become a global phenomenon attracting thousands of participants to hundreds of events every year. While research on hackathons has grown considerably, there is still limited insight into what ...
- 23Citation
- 589
- Downloads
MetricsTotal Citations23Total Downloads589Last 12 Months173Last 6 weeks16
- Alexander Nolte
- Article
What Do We Know About Hackathon Outcomes and How to Support Them? – A Systematic Literature Review
- Maria Angelica Medina Angarita
University of Tartu, Tartu, Estonia
, - Alexander Nolte
University of Tartu, Tartu, Estonia
Carnegie Mellon University, Pittsburgh, PA, USA
Collaboration Technologies and Social Computing •September 2020, pp 50-64• https://doi.org/10.1007/978-3-030-58157-2_4AbstractHackathons are time-bounded events where participants gather in teams to develop projects that interest them. Such events have been adopted in various domains to generate innovative solutions, foster learning, build and expand communities and to ...
- 3Citation
MetricsTotal Citations3
- Maria Angelica Medina Angarita
- Article
Developing and Evaluating a Hackathon Approach to Foster Cyber Security Learning
- Abasi-amefon O. Affia
University of Tartu, Tartu, Estonia
, - Alexander Nolte
University of Tartu, Tartu, Estonia
Carnegie Mellon University, Pittsburgh, PA, USA
, - Raimundas Matulevičius
University of Tartu, Tartu, Estonia
Collaboration Technologies and Social Computing •September 2020, pp 3-19• https://doi.org/10.1007/978-3-030-58157-2_1AbstractSecuring information systems and teaching people about how to use them securely is one of the significant challenges of the coming years. There is, however, a considerable lack of feasible approaches to train potential future professionals on ...
- 2Citation
MetricsTotal Citations2
- Abasi-amefon O. Affia
- research-articlePublished By ACMPublished By ACM
How to Support Newcomers in Scientific Hackathons - An Action Research Study on Expert Mentoring
- Alexander Nolte
University of Tartu & Carnegie Mellon University, Tartu, Estonia
, - Linda Bailey Hayden
NSF Science Gateway Community Institute, San Diego, CA, USA
, - James D. Herbsleb
Carnegie Mellon University, Pittsburgh, PA, USA
Proceedings of the ACM on Human-Computer Interaction, Volume 4, Issue CSCW1•May 2020, Article No.: 25, pp 1-23 • https://doi.org/10.1145/3392830Time-bounded events such as hackathons have become a global phenomenon. Scientific communities in particular show growing interest in organizing them to attract newcomers and develop technical artifacts to expand their code base. Current hackathon ...
- 26Citation
- 393
- Downloads
MetricsTotal Citations26Total Downloads393Last 12 Months52Last 6 weeks11
- Alexander Nolte
- Article
Security Risk Management in Cooperative Intelligent Transportation Systems: A Systematic Literature Review
- Abasi-Amefon O. Affia
Institute of Computer Science, University of Tartu, Tartu, Estonia
, - Raimundas Matulevičius
Institute of Computer Science, University of Tartu, Tartu, Estonia
, - Alexander Nolte
Institute of Computer Science, University of Tartu, Tartu, Estonia
On the Move to Meaningful Internet Systems: OTM 2019 Conferences•October 2019, pp 282-300• https://doi.org/10.1007/978-3-030-33246-4_18AbstractThe automotive industry is maximizing cooperative interactions between vehicular sensors and infrastructure components to make intelligent decisions in its application (i.e., traffic management, navigation, or autonomous driving services). This ...
- 3Citation
MetricsTotal Citations3
- Abasi-Amefon O. Affia
- Article
Identifying Socio-Technical Means to Support Small Loosely Coupled Groups of Volunteers
- Alexander Nolte
University of Tartu, Tartu, Estonia
Carnegie Mellon University, Pittsburgh, PA, USA
, - Rosta Farzan
University of Pittsburgh, Pittsburgh, PA, USA
Collaboration Technologies and Social Computing•September 2019, pp 17-35• https://doi.org/10.1007/978-3-030-28011-6_2AbstractVolunteers provide a large variety of valuable services to society spanning from local community efforts to global non-profit organizations and online communities. While larger volunteer groups and online communities in particular have been ...
- 0Citation
MetricsTotal Citations0
- Alexander Nolte
- research-articlePublished By ACMPublished By ACM
Touched by the Hackathon: a study on the connection between Hackathon participants and start-up founders
- Alexander Nolte
University of Tartu, Estonia / Carnegie Mellon University, USA
IWSiB 2019: Proceedings of the 2nd ACM SIGSOFT International Workshop on Software-Intensive Business: Start-ups, Platforms, and Ecosystems•August 2019, pp 31-36• https://doi.org/10.1145/3340481.3342735Time-bounded events such as hackathons, code fests and others have become a global phenomenon. Entrepreneurial hackathons in particular have gained wide spread popularity because they come with the prospect to being the grounds where the next billion ...
- 30Citation
- 243
- Downloads
MetricsTotal Citations30Total Downloads243Last 12 Months28Last 6 weeks3
- Alexander Nolte
- research-article
Going farther together: the impact of social capital on sustained participation in open source
- Huilian Sophie Qiu
Carnegie Mellon Univ.
, - Alexander Nolte
University of Tartu
, - Anita Brown
Bryn Mawr College
, - Alexander Serebrenik
Eindhoven Univ. of Tech.
, - Bogdan Vasilescu
Carnegie Mellon Univ.
ICSE '19: Proceedings of the 41st International Conference on Software Engineering•May 2019, pp 688-699• https://doi.org/10.1109/ICSE.2019.00078Sustained participation by contributors in open-source software is critical to the survival of open-source projects and can provide career advancement benefits to individual contributors. However, not all contributors reap the benefits of open-source ...
- 31Citation
- 174
- Downloads
MetricsTotal Citations31Total Downloads174Last 12 Months7Last 6 weeks1
- Huilian Sophie Qiu
- research-article
Designing Corporate Hackathons With a Purpose: The Future of Software Development
- Ei Pa Pa Pe-Than
Software Research, Carnegie Mellon University, Pittsburg, Pennsylvania United States
, - Alexander Nolte
Computer Science, University of Tartu
, - Anna Filippova
GitHub
, - Christian Bird
Empirical Software Engineering, Microsoft Research
, - Steve Scallen
Principal Design, Microsoft Garage
, - James D. Herbsleb
Software Research, Carnegie Mellon University, Pittsburg, Pennsylvania United States
IEEE Software, Volume 36, Issue 1•January 2019, pp 15-22 • https://doi.org/10.1109/MS.2018.290110547Based on our empirical studies of 10 hackathons held by scientific communities, a corporation, and universities as well as the review of published literature, we discuss that hackathons can be organized around goals such as enriching social networks, ...
- 22Citation
MetricsTotal Citations22
- Ei Pa Pa Pe-Than
- research-articlePublished By ACMPublished By ACM
You Hacked and Now What?: - Exploring Outcomes of a Corporate Hackathon
- Alexander Nolte
Carnegie Mellon University & University of Tartu, Tartu, Estonia
, - Ei Pa Pa Pe-Than
Carnegie Mellon University, Pittsburgh, PA, USA
, - Anna Filippova
GitHub Inc., San Francisco, CA, USA
, - Christian Bird
Microsoft Research, Redmond, WA, USA
, - Steve Scallen
Microsoft Garage, Redmond, WA, USA
, - James D. Herbsleb
Carnegie Mellon University, Pittsburgh, PA, USA
Proceedings of the ACM on Human-Computer Interaction, Volume 2, Issue CSCW•November 2018, Article No.: 129, pp 1-23 • https://doi.org/10.1145/3274398Time bounded events such as hackathons, data dives, codefests, hack-days, sprints or edit-a-thons have increasingly gained attention from practitioners and researchers. Existing research, however, has mainly focused on the event itself, while potential ...
- 79Citation
- 796
- Downloads
MetricsTotal Citations79Total Downloads796Last 12 Months97Last 6 weeks11
- Alexander Nolte
- Article
Designing Process Diagrams – A Framework for Making Design Choices When Visualizing Process Mining Outputs
- Marit Sirgmets
University of Tartu, Tartu, Estonia
, - Fredrik Milani
University of Tartu, Tartu, Estonia
, - Alexander Nolte
University of Tartu, Tartu, Estonia
, - Taivo Pungas
Datamob, Tallinn, Estonia
On the Move to Meaningful Internet Systems. OTM 2018 Conferences•October 2018, pp 463-480• https://doi.org/10.1007/978-3-030-02610-3_26AbstractModern information systems can log the executions of the business processes it supports. Such event logs contain useful information on the performance and health of business processes. Event logs can be used in process analysis with the aid of ...
- 0Citation
MetricsTotal Citations0
- Marit Sirgmets
- abstractPublished By ACMPublished By ACM
The 2nd Workshop on Hacking and Making at Time-Bounded Events: Current Trends and Next Steps in Research and Event Design
- Ei Pa Pa Pe Than
Carnegie Mellon University, Pittsburgh, PA, USA
, - James Herbsleb
Carnegie Mellon University, Pittsburgh, PA, USA
, - Alexander Nolte
Carnegie Mellon University, Pittsburgh, PA, USA
, - Elizabeth Gerber
Northwestern University, Evanston, IL, USA
, - Brittany Fiore-Gartland
University of Washington, Seattle, WA, USA
, - Brad Chapman
Harvard T.H. Chan School of Public Health, Boston, MA, USA
, - Aurelia Moser
Mozilla Science Lab, Brooklyn, NY, USA
, - Nancy Wilkins-Diehr
San Diego Supercomputer Center, Science Gateways Community Institute, San Diego, CA, USA
CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems•April 2018, Paper No.: W35, pp 1-8• https://doi.org/10.1145/3170427.3170615Hackathons or Hackathon-style events, describe increasingly popular time-bounded intensive events across different fields and sectors. Often cited examples of hackathons include the demanding overnight competitive coding events, but there are many ...
- 1Citation
- 176
- Downloads
MetricsTotal Citations1Total Downloads176Last 12 Months10Last 6 weeks1
- Ei Pa Pa Pe Than
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner