
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
How Users Interpret Bugs in Trigger-Action Programming
Will Brackenbury, Abhimanyu Deora, Jillian Ritchey, et al.
(2019), pp. 1-12
Closed Access | Times Cited: 68
Will Brackenbury, Abhimanyu Deora, Jillian Ritchey, et al.
(2019), pp. 1-12
Closed Access | Times Cited: 68
Showing 26-50 of 68 citing articles:
Situated Live Programming for Human-Robot Collaboration
Emmanuel Senft, Michael Hagenow, Robert G. Radwin, et al.
(2021)
Open Access | Times Cited: 14
Emmanuel Senft, Michael Hagenow, Robert G. Radwin, et al.
(2021)
Open Access | Times Cited: 14
Understanding In-Situ Programming for Smart Home Automation
X. Liu, Yingtian Shi, Chun Yu, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2023) Vol. 7, Iss. 2, pp. 1-31
Open Access | Times Cited: 5
X. Liu, Yingtian Shi, Chun Yu, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2023) Vol. 7, Iss. 2, pp. 1-31
Open Access | Times Cited: 5
Trace2TAP
Lefan Zhang, Weijia He, Olivia Morkved, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2020) Vol. 4, Iss. 3, pp. 1-26
Open Access | Times Cited: 13
Lefan Zhang, Weijia He, Olivia Morkved, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2020) Vol. 4, Iss. 3, pp. 1-26
Open Access | Times Cited: 13
Recommendations for creating trigger-action rules in a block-based environment
Andrea Mattioli, Fabio Paternò
Behaviour and Information Technology (2021) Vol. 40, Iss. 10, pp. 1024-1034
Closed Access | Times Cited: 11
Andrea Mattioli, Fabio Paternò
Behaviour and Information Technology (2021) Vol. 40, Iss. 10, pp. 1024-1034
Closed Access | Times Cited: 11
A conflicts’ classification for IoT-based services: a comparative survey
Hamada Ibrhim, Hesham Hassan, Emad Nabil
PeerJ Computer Science (2021) Vol. 7, pp. e480-e480
Open Access | Times Cited: 11
Hamada Ibrhim, Hesham Hassan, Emad Nabil
PeerJ Computer Science (2021) Vol. 7, pp. e480-e480
Open Access | Times Cited: 11
How do end-users program the Internet of Things?
Fulvio Corno, Luigi De Russis, Alberto Monge Roffarello
Behaviour and Information Technology (2022) Vol. 41, Iss. 9, pp. 1865-1887
Closed Access | Times Cited: 8
Fulvio Corno, Luigi De Russis, Alberto Monge Roffarello
Behaviour and Information Technology (2022) Vol. 41, Iss. 9, pp. 1865-1887
Closed Access | Times Cited: 8
Defining Configurable Virtual Reality Templates for End Users
Valentino Artizzu, Gianmarco Cherchi, Davide Fara, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. EICS, pp. 1-35
Open Access | Times Cited: 8
Valentino Artizzu, Gianmarco Cherchi, Davide Fara, et al.
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. EICS, pp. 1-35
Open Access | Times Cited: 8
TapChecker: A Lightweight SMT-Based Conflict Analysis for Trigger-Action Programming
Liangyu Chen, Chen Wang, Cheng Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21411-21426
Closed Access | Times Cited: 1
Liangyu Chen, Chen Wang, Cheng Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21411-21426
Closed Access | Times Cited: 1
TAP with ease: A generic recommendation system for trigger-action programming based on multi-model representation learning
Gang Wu, Ming Wang, Feng Wang
Applied Soft Computing (2024) Vol. 166, pp. 112163-112163
Closed Access | Times Cited: 1
Gang Wu, Ming Wang, Feng Wang
Applied Soft Computing (2024) Vol. 166, pp. 112163-112163
Closed Access | Times Cited: 1
Toolkit Design for Building Camera Sensor-Driven DIY Smart Homes
Sojeong Yun, Youn-kyung Lim
(2024) Vol. 7, pp. 256-261
Closed Access | Times Cited: 1
Sojeong Yun, Youn-kyung Lim
(2024) Vol. 7, pp. 256-261
Closed Access | Times Cited: 1
Exploration of User Perspectives around Software and Data-Related Challenges Associated with IoT Repair and Maintenance against Obsolescence: User Study on Software and Data Interactions and Considerations for IoT Repair and Maintenance against Obsolescence
Tanvi Vats, Neelima Sailaja, Fabiana Anselmo Polido Lopes
Nordic Conference on Human-Computer Interaction (2024) Vol. 02, pp. 1-17
Closed Access | Times Cited: 1
Tanvi Vats, Neelima Sailaja, Fabiana Anselmo Polido Lopes
Nordic Conference on Human-Computer Interaction (2024) Vol. 02, pp. 1-17
Closed Access | Times Cited: 1
Helping Users Debug Trigger-Action Programs
Lefan Zhang, Cyrus Zhou, Michael L. Littman, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2022) Vol. 6, Iss. 4, pp. 1-32
Open Access | Times Cited: 7
Lefan Zhang, Cyrus Zhou, Michael L. Littman, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2022) Vol. 6, Iss. 4, pp. 1-32
Open Access | Times Cited: 7
The IoT Meta-Control Firewall
Soteris Constantinou, Andreas Konstantinidis, Demetrios Zeinalipour-Yazti, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2021), pp. 2523-2534
Closed Access | Times Cited: 8
Soteris Constantinou, Andreas Konstantinidis, Demetrios Zeinalipour-Yazti, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2021), pp. 2523-2534
Closed Access | Times Cited: 8
IoTBox: Sandbox Mining to Prevent Interaction Threats in IoT Systems
Hong Jin Kang, Sheng Qin Sim, David Lo
(2021), pp. 182-193
Open Access | Times Cited: 7
Hong Jin Kang, Sheng Qin Sim, David Lo
(2021), pp. 182-193
Open Access | Times Cited: 7
SENSATION: An Authoring Tool to Support Event–State Paradigm in End-User Development
Giuseppe Desolda, Francesco Greco, Francisco Guarnieri, et al.
Lecture notes in computer science (2021), pp. 373-382
Closed Access | Times Cited: 7
Giuseppe Desolda, Francesco Greco, Francisco Guarnieri, et al.
Lecture notes in computer science (2021), pp. 373-382
Closed Access | Times Cited: 7
FortClash: Predicting and Mediating Unintended Behavior in Home Automation
Sven Coppers, Davy Vanacken, Kris Luyten
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. EICS, pp. 1-20
Closed Access | Times Cited: 4
Sven Coppers, Davy Vanacken, Kris Luyten
Proceedings of the ACM on Human-Computer Interaction (2022) Vol. 6, Iss. EICS, pp. 1-20
Closed Access | Times Cited: 4
Comparative Analysis of Composition Paradigms for Personalization Rules in IoT Settings
Simone Gallo, Marco Manca, Andrea Mattioli, et al.
Lecture notes in computer science (2021), pp. 53-70
Closed Access | Times Cited: 5
Simone Gallo, Marco Manca, Andrea Mattioli, et al.
Lecture notes in computer science (2021), pp. 53-70
Closed Access | Times Cited: 5
Learning to Recommend Trigger-Action Rules for End-User Development
Qinyue Wu, Beijun Shen, Yuting Chen
Lecture notes in computer science (2020), pp. 190-207
Closed Access | Times Cited: 4
Qinyue Wu, Beijun Shen, Yuting Chen
Lecture notes in computer science (2020), pp. 190-207
Closed Access | Times Cited: 4
RuleCraft: an End-User Development Hub for Education
Margherita Andrao, Federica Gini, Davide Frageri, et al.
(2024), pp. 1-3
Open Access
Margherita Andrao, Federica Gini, Davide Frageri, et al.
(2024), pp. 1-3
Open Access
A conversational agent for creating automations exploiting large language models
Simone Gallo, Fabio Paternò, Alessio Malizia
Personal and Ubiquitous Computing (2024)
Open Access
Simone Gallo, Fabio Paternò, Alessio Malizia
Personal and Ubiquitous Computing (2024)
Open Access
Mul-O: Encouraging Olfactory Innovation in Various Scenarios Through a Task-Oriented Development Platform
Peizhong Gao, Liu Fan, Di Wen, et al.
(2024), pp. 1-17
Closed Access
Peizhong Gao, Liu Fan, Di Wen, et al.
(2024), pp. 1-17
Closed Access
Language and Temporal Aspects: A Qualitative Study on Trigger Interpretation in Trigger-Action Rules
Margherita Andrao, Barbara Treccani, Massimo Zancanaro
Lecture notes in computer science (2023), pp. 84-103
Closed Access | Times Cited: 1
Margherita Andrao, Barbara Treccani, Massimo Zancanaro
Lecture notes in computer science (2023), pp. 84-103
Closed Access | Times Cited: 1
How End Users Develop Point-and-Click Games
Valentino Artizzu, Ivan Blečić, Vittoria Frau, et al.
Lecture notes in computer science (2023), pp. 220-229
Closed Access | Times Cited: 1
Valentino Artizzu, Ivan Blečić, Vittoria Frau, et al.
Lecture notes in computer science (2023), pp. 220-229
Closed Access | Times Cited: 1