OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

How Users Interpret Bugs in Trigger-Action Programming
Will Brackenbury, Abhimanyu Deora, Jillian Ritchey, et al.
(2019), pp. 1-12
Closed Access | Times Cited: 68

Showing 26-50 of 68 citing articles:

Situated Live Programming for Human-Robot Collaboration
Emmanuel Senft, Michael Hagenow, Robert G. Radwin, et al.
(2021)
Open Access | Times Cited: 14

Understanding In-Situ Programming for Smart Home Automation
X. Liu, Yingtian Shi, Chun Yu, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2023) Vol. 7, Iss. 2, pp. 1-31
Open Access | Times Cited: 5

Trace2TAP
Lefan Zhang, Weijia He, Olivia Morkved, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2020) Vol. 4, Iss. 3, pp. 1-26
Open Access | Times Cited: 13

Recommendations for creating trigger-action rules in a block-based environment
Andrea Mattioli, Fabio Paternò
Behaviour and Information Technology (2021) Vol. 40, Iss. 10, pp. 1024-1034
Closed Access | Times Cited: 11

A conflicts’ classification for IoT-based services: a comparative survey
Hamada Ibrhim, Hesham Hassan, Emad Nabil
PeerJ Computer Science (2021) Vol. 7, pp. e480-e480
Open Access | Times Cited: 11

How do end-users program the Internet of Things?
Fulvio Corno, Luigi De Russis, Alberto Monge Roffarello
Behaviour and Information Technology (2022) Vol. 41, Iss. 9, pp. 1865-1887
Closed Access | Times Cited: 8

Defining Configurable Virtual Reality Templates for End Users
Valentino Artizzu, Gianmarco Cherchi, Davide Fara, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. EICS, pp. 1-35
Open Access | Times Cited: 8

TapChecker: A Lightweight SMT-Based Conflict Analysis for Trigger-Action Programming
Liangyu Chen, Chen Wang, Cheng Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21411-21426
Closed Access | Times Cited: 1

TAP with ease: A generic recommendation system for trigger-action programming based on multi-model representation learning
Gang Wu, Ming Wang, Feng Wang
Applied Soft Computing (2024) Vol. 166, pp. 112163-112163
Closed Access | Times Cited: 1

Toolkit Design for Building Camera Sensor-Driven DIY Smart Homes
Sojeong Yun, Youn-kyung Lim
(2024) Vol. 7, pp. 256-261
Closed Access | Times Cited: 1

Helping Users Debug Trigger-Action Programs
Lefan Zhang, Cyrus Zhou, Michael L. Littman, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2022) Vol. 6, Iss. 4, pp. 1-32
Open Access | Times Cited: 7

The IoT Meta-Control Firewall
Soteris Constantinou, Andreas Konstantinidis, Demetrios Zeinalipour-Yazti, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2021), pp. 2523-2534
Closed Access | Times Cited: 8

IoTBox: Sandbox Mining to Prevent Interaction Threats in IoT Systems
Hong Jin Kang, Sheng Qin Sim, David Lo
(2021), pp. 182-193
Open Access | Times Cited: 7

SENSATION: An Authoring Tool to Support Event–State Paradigm in End-User Development
Giuseppe Desolda, Francesco Greco, Francisco Guarnieri, et al.
Lecture notes in computer science (2021), pp. 373-382
Closed Access | Times Cited: 7

FortClash: Predicting and Mediating Unintended Behavior in Home Automation
Sven Coppers, Davy Vanacken, Kris Luyten
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. EICS, pp. 1-20
Closed Access | Times Cited: 4

Comparative Analysis of Composition Paradigms for Personalization Rules in IoT Settings
Simone Gallo, Marco Manca, Andrea Mattioli, et al.
Lecture notes in computer science (2021), pp. 53-70
Closed Access | Times Cited: 5

Learning to Recommend Trigger-Action Rules for End-User Development
Qinyue Wu, Beijun Shen, Yuting Chen
Lecture notes in computer science (2020), pp. 190-207
Closed Access | Times Cited: 4

Adaptive End-User Development for Social Robotics
Giacomo Vaiani
(2024), pp. 1-3
Closed Access

RuleCraft: an End-User Development Hub for Education
Margherita Andrao, Federica Gini, Davide Frageri, et al.
(2024), pp. 1-3
Open Access

A conversational agent for creating automations exploiting large language models
Simone Gallo, Fabio Paternò, Alessio Malizia
Personal and Ubiquitous Computing (2024)
Open Access

Language and Temporal Aspects: A Qualitative Study on Trigger Interpretation in Trigger-Action Rules
Margherita Andrao, Barbara Treccani, Massimo Zancanaro
Lecture notes in computer science (2023), pp. 84-103
Closed Access | Times Cited: 1

How End Users Develop Point-and-Click Games
Valentino Artizzu, Ivan Blečić, Vittoria Frau, et al.
Lecture notes in computer science (2023), pp. 220-229
Closed Access | Times Cited: 1

End-User Development
Fabio Paternò
Springer eBooks (2023), pp. 1-27
Closed Access | Times Cited: 1

Scroll to top