Andrew James Malton
Applied Filters
- Andrew James Malton
- AuthorRemove filter
People
Colleagues
- Andrew Walenstein (7)
- Eric Charles Roy Hehner (4)
- Thomas Roy Dean (4)
- Burak Kantarci (3)
- James R. Cordy (3)
- Kevin Arnold Schneider (3)
- Melike Erol-Kantarci (3)
- Richard Craig Holt (3)
- Kyle Quintal (2)
- Lorene E Gupta (2)
- Olga Baysal (2)
- A Trevors (1)
- Ahmed E Hassan (1)
- Ayaz Isazadeh (1)
- Glenn Hilton MacEwen (1)
- Michael Wallace Godfrey (1)
- Paul Edward Kearney (1)
- Ryan B Hayward (1)
- Yuan Lin (1)
Publication
Proceedings/Book Names
- CASCON '95: Proceedings of the 1995 conference of the Centre for Advanced Studies on Collaborative research (2)
- Proceedings of the NATO Advanced Study Institute on Logic of programming and calculi of discrete design (2)
- 2018 IEEE Intelligent Vehicles Symposium (IV) (1)
- 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC) (1)
- CESSER-IP '19: Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice (1)
- Functional interpretation of programming methods (1)
- ICSEW '07: Proceedings of the 29th International Conference on Software Engineering Workshops (1)
- ICSM '01: Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01) (1)
- IWPSE '03: Proceedings of the 6th International Workshop on Principles of Software Evolution (1)
- MSR '07: Proceedings of the Fourth International Workshop on Mining Software Repositories (1)
- SCAM '02: Proceedings of the Second IEEE International Workshop on Source Code Analysis and Manipulation (1)
- WCRE '01: Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01) (1)
- WCRE '02: Proceedings of the Ninth Working Conference on Reverse Engineering (WCRE'02) (1)
- WCRE '03: Proceedings of the 10th Working Conference on Reverse Engineering (1)
- WCRE '05: Proceedings of the 12th Working Conference on Reverse Engineering (1)
Publisher
- IEEE Computer Society (9)
- Springer-Verlag (4)
- IEEE Press (3)
- Association for Computing Machinery (2)
- IBM Press (2)
- Elsevier Science Inc. (1)
- Elsevier Science Publishers B. V. (1)
- IEEE Educational Activities Department (1)
- Kluwer Academic Publishers (1)
- Pergamon Press, Inc. (1)
- University of Toronto (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
Finding associations between natural and computer languages: A case-study of bilingual LDA applied to the bleeping computer forum posts
- Kundi Yao
Software Analysis and Intelligence Lab (SAIL) at Queen’s University, Kingston, Canada
, - Gustavo A. Oliva
Software Analysis and Intelligence Lab (SAIL) at Queen’s University, Kingston, Canada
, - Ahmed E. Hassan
Software Analysis and Intelligence Lab (SAIL) at Queen’s University, Kingston, Canada
, - Muhammad Asaduzzaman
Lakehead University, Thunderbay, Canada
, - Andrew J. Malton
Blackberry Ltd, Canada
, - Andrew Walenstein
Blackberry Ltd, Canada
Journal of Systems and Software, Volume 201, Issue C•Jul 2023 • https://doi.org/10.1016/j.jss.2023.111651AbstractIn the context of technical support, trails of technical discussions often contain a mixture of natural language (e.g., English) and software log excerpts. Uncovering latent links between certain problems and log excerpts that are often requested ...
Highlights- We expanded the selection of related studies from the bimodality/dual-channel area.
- We discussed alternative approaches that balance two languages in LDA models.
- We revised certain paragraphs of the paper to improve its soundness ...
- 0Citation
MetricsTotal Citations0
- Kundi Yao
- research-articleOpen AccessPublished By ACMPublished By ACM
Risk-aware Fine-grained Access Control in Cyber-physical Contexts
- Jinxin Liu
University of Ottawa, Ottawa, ON, Canada
, - Murat Simsek
University of Ottawa, Ottawa, ON, Canada
, - Burak Kantarci
University of Ottawa, Ottawa, ON, Canada
, - Melike Erol-kantarci
University of Ottawa, Ottawa, ON, Canada
, - Andrew Malton
BlackBerry Ltd., Waterloo, ON, Canada
, - Andrew Walenstein
BlackBerry Ltd., BlackBerry, Bellevue WA, Canada
Digital Threats: Research and Practice, Volume 3, Issue 4•December 2022, Article No.: 43, pp 1-29 • https://doi.org/10.1145/3480468Access to resources by users may need to be granted only upon certain conditions and contexts, perhaps particularly in cyber-physical settings. Unfortunately, creating and modifying context-sensitive access control solutions in dynamic environments ...
- 3Citation
- 911
- Downloads
MetricsTotal Citations3Total Downloads911Last 12 Months388Last 6 weeks59
- Jinxin Liu
- research-articlePublished By ACMPublished By ACM
Autonomic Security Management for IoT Smart Spaces
- Changyuan Lin
University of Alberta, Edmonton, Alberta, Canada
, - Hamzeh Khazaei
York University, North York, Ontario, Canada
, - Andrew Walenstein
BlackBerry, Waterloo, Ontario, Canada
, - Andrew Malton
BlackBerry, Waterloo, Ontario, Canada
ACM Transactions on Internet of Things, Volume 2, Issue 4•November 2021, Article No.: 27, pp 1-20 • https://doi.org/10.1145/3466696Embedded sensors and smart devices have turned the environments around us into smart spaces that could automatically evolve, depending on the needs of users, and adapt to the new conditions. While smart spaces are beneficial and desired in many aspects, ...
- 8Citation
- 239
- Downloads
MetricsTotal Citations8Total Downloads239Last 12 Months50Last 6 weeks8
- Changyuan Lin
- research-article
Enterprise Security with Adaptive Ensemble Learning on Cooperation and Interaction Patterns
- Kyle Quintal
School of Electrical Engineering and Computer Science, University of Ottawa,Ottawa,ON,Canada
, - Burak Kantarci
School of Electrical Engineering and Computer Science, University of Ottawa,Ottawa,ON,Canada
, - Melike Erol-Kantarci
School of Electrical Engineering and Computer Science, University of Ottawa,Ottawa,ON,Canada
, - Andrew Malton
BlackBerry Limited,Canada
, - Andrew Walenstein
BlackBerry Limited,Canada
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)•January 2020, pp 1-7• https://doi.org/10.1109/CCNC46108.2020.9045328Social networking research has primarily focused on public social networking services and applications, while rich social interactions in an enterprise setting and their related context has received less attention. In this paper, we focus on using the ...
- 0Citation
MetricsTotal Citations0
- Kyle Quintal
- research-article
Contextual, Behavioral, and Biometric Signatures for Continuous Authentication
- Kyle Quintal
School of Electrical Engineering and Computer ScienceUniversity of Ottawa
, - Burak Kantarci
School of Electrical Engineering and Computer ScienceUniversity of Ottawa
, - Melike Erol-Kantarci
School of Electrical Engineering and Computer ScienceUniversity of Ottawa
, - Andrew Malton
BlackBerry Limited
, - Andrew Walenstein
BlackBerry Limited
IEEE Internet Computing, Volume 23, Issue 5•Sept.-Oct. 2019, pp 18-28 • https://doi.org/10.1109/MIC.2019.2941391Continuous authentication in the Mobile Internet of Things should be based as broadly as possible, since a wide range of factors continuously reveal unexpected correlations. Such factors may include captured events (e.g., password, fingerprint, ...
- 3Citation
MetricsTotal Citations3
- Kyle Quintal
- research-article
Generative modeling games for exploratory industry-academic research
- Andrew Walenstein
BlackBerry
, - Andrew Malton
BlackBerry
CESSER-IP '19: Proceedings of the Joint 7th International Workshop on Conducting Empirical Studies in Industry and 6th International Workshop on Software Engineering Research and Industrial Practice•May 2019, pp 18-21• https://doi.org/10.1109/CESSER-IP.2019.00011We present an approach to industry-academic research collaboration in which generative modeling is the central mechanism for not only enabling tactical coordination in exploratory research, but also for ensuring strategic alignment of both partners ...
- 0Citation
- 37
- Downloads
MetricsTotal Citations0Total Downloads37Last 12 Months4
- Andrew Walenstein
- research-article
A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety
- Gopi Krishnan Rajbahadur
School of Computing, Queen’s University, Canada
, - Andrew J. Malton
BlackBerry
, - Andrew Walenstein
BlackBerry
, - Ahmed E. Hassan
School of Computing, Queen’s University, Canada
2018 IEEE Intelligent Vehicles Symposium (IV)•June 2018, pp 421-426• https://doi.org/10.1109/IVS.2018.8500383Anomaly detection techniques have been applied to the challenging problem of ensuring both cybersecurity and safety of connected vehicles. We propose a taxonomy of prior research in this domain. Our proposed taxonomy has 3 overarching dimensions subsuming ...
- 3Citation
MetricsTotal Citations3
- Gopi Krishnan Rajbahadur
- Article
Correlating Social Interactions to Release History During Software Evolution
- Olga Baysal
University of Waterloo
, - Andrew J. Malton
University of Waterloo
ICSEW '07: Proceedings of the 29th International Conference on Software Engineering Workshops•May 2007, pp 7In this paper, we propose a method to reason about the nature of software changes by mining and correlating discussion archives. We employ an information retrieval approach to find correlation between source code change history and history of social ...
- 0Citation
MetricsTotal Citations0
- Olga Baysal
- Article
Correlating Social Interactions to Release History during Software Evolution
- Olga Baysal
University of Waterloo, Canada
, - Andrew J. Malton
University of Waterloo, Canada
MSR '07: Proceedings of the Fourth International Workshop on Mining Software Repositories•May 2007, pp 7• https://doi.org/10.1109/MSR.2007.4In this paper, we propose a method to reason about the nature of software changes by mining and correlating discussion archives. We employ an information retrieval approach to find correlation between source code change history and history of social ...
- 9Citation
- 193
- Downloads
MetricsTotal Citations9Total Downloads193Last 12 Months1
- Olga Baysal
- Article
Boxology of NBA and TA: A Basis for Understanding Software Architecture
- Andrew J. Malton
University of Waterloo
, - Richard C. Holt
University of Waterloo
WCRE '05: Proceedings of the 12th Working Conference on Reverse Engineering•November 2005, pp 187-195• https://doi.org/10.1109/WCRE.2005.10Box-and-arrow diagrams seem inevitable for presentation of software architecture; however, the term "boxology" often mocks their over-use, especially when informal. We introduce in this paper a formal boxology to serve as a semantic domain for graph-...
- 0Citation
MetricsTotal Citations0
- Andrew J. Malton
- Article
Completeness of a Fact Extractor
The process of software reverse engineering commonlyuses an extractor, which parses source code and extractsfacts about the code. The level of detail in these factsvaries from extractor to extractor. This paper describesfour levels of increasingly ...
- 3Citation
MetricsTotal Citations3
- article
Agile Parsing in TXL
- Thomas R. Dean
Queen's University, Kingston, Canada. [email protected]
, - James R. Cordy
Queen's University, Kingston, Canada. [email protected]
, - Andrew J. Malton
University of Waterloo, Waterloo, Canada. [email protected]
, - Kevin A. Schneider
University of Saskatchewan, Saskatoon, Canada. [email protected]
Automated Software Engineering, Volume 10, Issue 4•October 2003, pp 311-336 • https://doi.org/10.1023/A:1025801405075Syntactic analysis forms a foundation of many source analysis and reverse engineering tools. However, a single standard grammar is not always appropriate for all source analysis and manipulation tasks. Small custom modifications to the grammar can make ...
- 21Citation
MetricsTotal Citations21
- Thomas R. Dean
- Article
Stability and Volatility in the Linux Kernel
IWPSE '03: Proceedings of the 6th International Workshop on Principles of Software Evolution•September 2003, pp 95Packages are the basic units of release and reuse in software development. The contents and boundaries of packages should therefore be chosen to minimize change propagation and maximize reusability. This suggests the need for a predictive measure of ...
- 1Citation
MetricsTotal Citations1
- Article
Semantic Grep: Regular Expressions + Relational Abstraction
WCRE '02: Proceedings of the Ninth Working Conference on Reverse Engineering (WCRE'02)•October 2002, pp 267Searching source code is one of the most common activitiesof software engineers. Text editors and other supporttools normally provide searching based on lexical expressions(regular expressions). Some more advanced editorsprovide a way to add semantic ...
- 2Citation
MetricsTotal Citations2
- Article
Grammar Programming in TXL
SCAM '02: Proceedings of the Second IEEE International Workshop on Source Code Analysis and Manipulation•October 2002, pp 93Syntactic analysis forms a foundation of many source analysis and reverse engineering tools. However, a single grammar is not always appropriate for all source analysis and manipulation tasks. Small changes to the grammar can make the programs used to ...
- 9Citation
MetricsTotal Citations9
- article
NeST graphs
- Ryan B. Hayward
Department of Computing Science, University of Alberta, Edmonton, Alberta, Canada T6G 2E1
, - Paul E. Kearney
Department of Computer Science, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1
, - Andrew Malton
Department of Computer Science, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1
Discrete Applied Mathematics, Volume 121, Issue 1-3•15 September 2002, pp 139-153 • https://doi.org/10.1016/S0166-218X(01)00207-4We establish results on NeST graphs (intersection tolerance graphs of neighborhood subtrees of a tree) and several subclasses. In particular, we show the equivalence of proper NeST graphs and unit NeST graphs, the equivalence of fixed distance NeST ...
- 3Citation
MetricsTotal Citations3
- Ryan B. Hayward
- Articlefree
Using Design Recovery Techniques to Transform Legacy Systems
- Thomas R. Dean
Queen's University
, - James R. Cordy
Queen's University
, - Kevin A. Schneider
University of Saskatchewan
, - Andrew J. Malton
University of Waterloo
ICSM '01: Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)•November 2001, pp 622• https://doi.org/10.1109/ICSM.2001.972779The year 2000 problem posed a difficult problem for many IT shops world wide. The most difficult part of the problem was not the actual changes to ensure compliance, but finding and classifying the data fields that represent dates. This is a problem ...
- 12Citation
- 33
- Downloads
MetricsTotal Citations12Total Downloads33Last 12 Months11
- Thomas R. Dean
- Article
Union Schemas as a Basis for a C++ Extractor
WCRE '01: Proceedings of the Eighth Working Conference on Reverse Engineering (WCRE'01)•October 2001, pp 59An extractor is a program which processes source code and outputs facts about the code in a software exchange format (SEF). An SEF can be further specified by a schema, analogous to a schema for a data base. This paper explains how two such schemas can ...
- 4Citation
MetricsTotal Citations4
- Articlefree
Behavioral patterns for software requirement engineering
- Ayaz Isazadeh
Electrical Engineering and Computer Science from Princeton University
, - Glenn H. MacEwen
Department of Computing and Information Science at Queen's University, Kingston, Ontario
, - Andrew Malton
Department of Computing and Information Science at Queen's University, Canada
CASCON '95: Proceedings of the 1995 conference of the Centre for Advanced Studies on Collaborative research•November 1995, pp 33A software behavioral pattern is a typical pattern of event interaction at the level of modules up to independent software components. Behavioral patterns are specified using a form of D. Harel's Statecharts, and we call them type-charts . They provide a ...
- 0Citation
- 767
- Downloads
MetricsTotal Citations0Total Downloads767Last 12 Months31Last 6 weeks8
- Ayaz Isazadeh
- Articlefree
Phased development of critical real-time systems in timed CSP
- Homayoun Dayani-Fard
Department of Computer Science at Queen's University, Kingston, Ontario
, - Andrew J. Malton
Department of Computer Science at Queen's University
CASCON '95: Proceedings of the 1995 conference of the Centre for Advanced Studies on Collaborative research•November 1995, pp 17High-assurance real-time software must be designed and verified in the light of its dependence on the underlying operating system and hardware. This is true both because timing is critical to correctness and because critical safety requirements must be ...
- 0Citation
- 220
- Downloads
MetricsTotal Citations0Total Downloads220Last 12 Months11Last 6 weeks3
- Homayoun Dayani-Fard
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner