Photos of Keith Miller in a banner display

Conference Proceedings


  1. F. Grodzinsky, K. Miller, and M. Wolf. When AI Moves Downstream. International Conference on Computer Ethics 1, 1 (May 2023).
  2. F. Grodzinsky, K. Miller, and M. Wolf. Ethical reflections on digital death and digital remains: Computing Professionals picking up bones. CEPE/IACAP Joint Conference 2021 (5-9 July 2021), online.
  3. F. Mardi, K. Miller, and P. Balcerzak. Novice-expert pair coaching: Teaching Python in a pandemic. ACM SIGCSE Technical Symposium (11-14 March 2021), 226-231.
  4. F. Grodzinsky, K. Miller, and M. Wolf. On using a model for downstream responsibility. Ethicomp (17-19 June 2020), Logrono, Spain.
  5. J. Borenstein, J. Herkert, and K. Miller.  Self-driving cars: Ethical issues at the micro and macro scale. 2017 Professional Engineers Conference (July 19-23, 2017), Atlanta, Georgia.
  6. B. Brinkman and K. Miller. The Code of Ethics Quiz Show. In Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE ’17). ACM, New York, NY, USA (9 March 2017) 679-680.
  7. M. Wolf, F. Grodzinsky, and K. Miller. Augmented reality all around us: power and perception at a crossroads. ACM SIGCAS Computers and Society – Special Issue on Ethicomp 2016, Vol. 45, No. 3 (September 2015), 126-131, http://dl.acm.org/citation.cfm?id=2874239.
  8. K. Miller, M. Wolf, & F. Grodzinsky  This “Ethical Trap” is for Roboticists, Not Robots: Why use a robot when a human will do? CEPE – IACAP 2015 (22-25 June 2015), Newark, Delaware.
  9. M. Wolf, F. Grodzinsky and K. Miller. Robots, ethics and software – FOSS vs. proprietary licenses. IACAP 2014 (2-4 July 2014), Thessaloniki, Greece.
  10. F. Grodzinsky, K. Miller and M. Wolf. Augmented reality in your eye: Google Glass, Space Glasses, and Beyond. CEPE 2014 (23-25 June 2014), Paris, France.
  11. E. Buchanan, K. Dins, S. Dexter and K. Miller. Ethics: what, how, and when is it taught in computer science and information technology graduate programs? CEPE 2013 (1-3 July 2013), Lisbon, Portugal.
  12. S. Dexter, E. Buchanan, K. Dins, K. R. Fleischmann, and K. Miller. Characterizing the need for graduate ethics education. In Proceeding of the 44th ACM technical symposium on Computer science education (SIGCSE ’13). (6-9 March 2013) New York, NY, USA, 153-158.
  13. K. Miller, F. Grodzinsky and M. Wolf. Behind the mask: machine morality. The Machine Question Symposium at the AISB/IACAP World Congress (2-6 July 2012), Birmingham, UK.
  14. F. Grodzinsky, K. Miller and M. J. Wolf. The problem with comparing machine morality to human morality is NOT the machines. The Information and Computer Ethics in the Age of Information Revolution Symposium at the AISB/IACAP World Congress (2-6 July 2012), Birmingham, UK.
  15. F. Grodzinsky, K. Miller and M. Wolf. Moral responsibility for computing artifacts: “The Rules” and issues of trust. EthiComp (Sept. 14-16, 2011), Sheffield, UK.
  16. M. Wolf, F. Grodzinsky, and K. Miller. Is quantum computing inherently evil? Computer Ethics Philosophical Enquiry Conference (CEPE) (May 31 – June 3, 2011), Milwaukee, WI.
  17. M. Wolf, F. Grodzinsky, and K. Miller. Quantum computing and cloud computing: Humans trusting humans via machines. ISTAS 2011 (23-25 May 2011), Chicago, IL.
  18. F. Grodzinsky, K. Miller and M. Wolf. Towards a model of trust and e-trust processes using object oriented methodologies. Proceedings of ETHICOMP 2010 (Apr. 14-16, 2010), Editors:  Arias-Oliva, Bynum, Rogerson, Torres-Coronas. Universitat Rovira I Virgili Tarragona, Spain, 265- 272.
  19. F. Grodzinsky, K. Miller and M. Wolf. Why Turing Shouldn’t Have to Guess. Asia-Pacific Computing and Philosophy Conference (Oct. 1-2, 2009) Tokyo. http://bentham.k2.t.u-tokyo.ac.jp/ap-cap09/openconf/data/papers/13.pdf
  20. F. Grodzinsky, K. Miller and M. Wolf. Humans and artificial agents: whom or what should you trust? Computer Ethics Philosophical Enquiry (CEPE) Conference (June 26-28, 2009), Editor: M. Bottis, Corfu, Greece, 288-302.
  21. M. Wolf, K. Miller and F. Grodzinsky. Free Software, Proprietary Software, and the Value of Software Context in Ethical Analysis. ETHICOMP (Sept. 24-26, 2008), Mantua, Italy.
  22. J. Voas and K.Miller. One in a baker’s dozen: debugging debugging. IEEE High Assurance Systems Engineering Symposium (Nov. 14-16, 2007), Dallas, TX.
  23. F. Grodzinsky, K. Miller, and M. Wolf. The ethics of designing artificial agents. CEPE 2007 (July 12-14, 2007), San Diego, CA.
  24. D. Gotterbarn, K. Miller, and J. Impagliazzo. Plagiarism and Scholarly Publications: An Ethical Analysis. Frontiers in Education (October 28-31, 2006), San Diego, CA.
  25. D. Johnson and K. Miller. A dialogue on responsibility, moral agency, and IT Systems. ACM Symposium on Applied Computing (April 23-27, 2006), Dijon, France.
  26. F. Grodzinsky, K. Miller, and M. Wolf. The ethical implications of the messenger’s haircut: Steganography in the digital age. EthiComp 2005 (Sept. 12-15, 2005),  Linkoping, Sweden.
  27. K. Miller and D. Larson. Angels and artifacts: Moral agents in the age of computers and networks. Ethics & Technology Conference (June 24-25, 2005), St. Louis, MO.
  28. F. Appel, K. Miller, and M. Quinn. Techniques for Teaching Computer Ethics. Midwest Instruction and Computing Symposium (April 8-9, 2005), Eau Claire, WI.
  29. D. Thayer and K. Miller. Four UNIX programs in four UNIX collections: seeking consistency in an Open Source icon. 37th Midwest Instruction and Computing Symposium (April 16-17, 2004), Morris, MN.
  30. B. Moskal, L. King, K. Miller, and T. Camp. Preparing to teach computer ethics: results from the DOLCE project ASEE Annual Conference (June 22-25, 2003), Nashville, TN.
  31. F. Grodzinsky, K. Miller, and M. Wolf. Ethical issues in open source software. Ethics and Technology Conference (June 27-28, 2003), Boston College, MA.
  32. B. Moskal, K. Miller, and L. Smith King. Grading essays in computer ethics: rubrics considered helpful. ACM SIGCSE Technical Symposium (February 26- March 2, 2002), Cincinnati, OH.
  33. D. Johnson and K. Miller. The ties that bind: connections, Comet Cursors, and consent. CEPE 2000 (July 14-16, 2000), Dartmouth, New Hampshire.
  34. K. Miller. Teaching computer ethics using the World Wide Web. Frontiers in Education 1999 (November 10-13, 1999), San Juan, Puerto Rico.
  35. K. Miller. The Future looks dim: building the information society with shoddy materials. ETHICOMP International Conference on the Social and Ethical Impacts of Information and Communication Technologies (October 6-8, 1999), Rome, Italy.
  36. D. Gotterbarn and K. Miller. Maturing standards and the current software engineering code of ethics. Fourth Annual Ethics and Technology Conference, Boston, MA (June 5-6, 1999).
  37. K. Miller. Dramatics and dialectics: bar stools and computer ethics in the classroom. Integrating Ethics into Technical Education, Somerville, NJ (June 3-4, 1999).
  38. K. Werries, D. Dufner, O. Kwon, and K. Miller. Development of the CyberCollaboratory testing methodology. Thirtieth Annual Meeting of the Midwest Decision Sciences Institute, (April 22-24, 1999), Springfield, IL.
  39. K. Miller. Computer security and human values interact. 1997 Frontiers in Education Conference (November 5-8, 1997), Pittsburgh, Pennsylvania.
  40. K. Miller. Good enough for whom?: Informed consent for computer software. Interface ’97 (October 15-17, 1997), Atlanta, Georgia.
  41. K. Miller. Ethical standards in software engineering: a proposed informed consent standard. Ethics and Technology Conference 1997 (June 6-7, 1997), Chicago, Illinois.
  42. S. Limbach and K. Miller. Neural nets and computer security. Midwest Computer Conference.Springfield, IL (March 21, 1997), http://www.uis.edu/~mcc97/html/mcc_menu.html
  43. J. Voas and K. Miller. Software testability: investing in testing. EuroStar ’96 (December 1996), Amsterdam.
  44. J. Voas, F. Charron, and K. Miller. Investigating rare-event failure tolerance: reductions in uncertainty. IEEE High-Assurance Systems Engineering Workshop (HASE ’96) (October 1996), Niagara-on-the-Lake, Canada.
  45. J. Voas, G. McGraw, A. Ghosh and K. Miller. Gluing together software components: how good is your glue? Proc. of the Northwest Software Quality Conference (October, 1996), 338-349.
  46. J. Voas, F. Charron and K. Miller. Robust software interfaces: can COTS-based software be trusted without them? Proc. of 15th Int’l. Conf. on Computer Safety (October, 1996) Vienna, Austria.
  47. J. Voas, A. Ghosh, G. McGraw, F. Charron and K. Miller. Defining an adaptive software security metric from dynamic software tolerance measure. COMPASS ’96: Conference on Computer Assurance (June 17-21, 1996), Gaithersburg, MD.
  48. J. Voas and K. Miller. Assessing the quality of large-scale systems composed of commercial-off-the-shelf software components by studying interface failure-tolerance. 2nd Annual ENCRESS Conference (June 13-14, 1996), Paris.
  49. K. Miller and J. Voas. How faults cause failures. Software Testing Analysis & Review (May 15-17, 1996), Orlando, Florida.
  50. C. D. Martin, C. Huff, D. Gotterbarn and K. Miller. Curriculum guidelines for teaching the consequences of computing. ACM SIGCAS Symposium on Computers and the Quality of Life (Feb. 14-15, 1996), Philadelphia.
  51. J. Voas and K. Miller. Predicting software’s minimum-time-to-hazard and mean-time-to-hazard for rare input events. International Symposium on Software Reliability Engineering (October 24-27, 1995), Toulouse, France.
  52. J. Voas, C. Michael, and K. Miller. Using fault injection to assess software engineering standards. Pacific Northwest Software Quality Conference (September 27-29, 1995), Portland, Oregon.
  53. J. Voas and K. Miller. Using fault injection to assess software engineering standards. Software Engineering Standards Symposium, ‘Experience and Practice’, Proceedings. (August 21-25, 1995), Montreal. 139-145.
  54. J. Voas and K. Miller. A statistical and automated code-based fault-tree mitigation framework for C++. Conference on the Safety and Reliability of Software Based Systems (September 12-15, 1995), Bruges, Belgium.
  55. J. Voas and K. Miller. Using fault injection to assess software engineering standards. International Software Engineering Standards Symposium (August, 1995), Montreal, Canada.
  56. J. Voas and K. Miller. Examining software quality (fault-tolerance) using unlikely inputs: turning the test distribution upside down. 10th Annual Conference on Computer Assurance (June, 1995), Gaithersburg, Maryland.
  57. J. Voas and K. Miller. Putting assertions in their place. International Symposium on Software Reliability Engineering (November 6-9, 1994), Monterey, CA.
  58. J. Voas, K. Miller and J. Payne. A comparison of a dynamic software testability metric to static cyclometric complexity. Second International Conference on Software Quality Management (July 1994), Edinburgh, Scotland.
  59. K. Miller and J. Voas. Classifying methods to assess software quality. Eleventh Annual Conference on Testing Computer Software (June 1994), Washington, D.C.
  60. J. Voas and K. Miller. Enhanced software testing, testability, and fault-tolerance through output space redefinition. Eleventh Annual Conference on Testing Computer Software (June 1994), Washington, D.C.
  61. J. Voas, K. Miller and J. Payne. An empirical comparison of a dynamic software testability metric to static cyclomatic complexity. 18th Annual Software Engineering Workshop. NASA Goddard (Dec. 1-2, 1993).
  62. J. Voas, C. Michael, and K. Miller. Confidently assessing a zero probability of software failure. 12th International Conference on Computer Safety, Reliability, and Security (October 27-29, 1993), Poznan, Poland.
  63. J. Voas, K. Miller and J. Payne. Software testability and its application to avionic software. Computers in Aerospace, Vol. 9 (October, 1993), San Diego, California.
  64. J. Voas, K. Miller and J. Payne. Automating test case generation for coverages required by FAA standard DO-178B. Computers in Aerospace, Vol. 9 (October, 1993), San Diego, California.
  65. J. Voas, K. Miller, and J. Payne. Dynamic testability analysis for software safety. 2nd IASTED Inter. Conference on Reliability, Quality Control and Risk Assessment, (Oct. 13-15, 1993), Cambridge, Mass.
  66. J. Voas, J. Payne, C. Michael and K. Miller. Experimental evidence of sensitivity analysis predicting minimum failure probabilities. 8th Annual Conf. on Computer Assurance (COMPASS 93), (June, 1993), Gaithersburg, Maryland, 123-133.
  67. J. Voas, K. Miller, and J. Payne. A software analysis technique for quantifying reliability in high-risk medical devices. 6th IEEE Symposium on Computer-Based Medical Systems (June 1993), Ann Arbor, Michigan.
  68. J. Voas, J. Payne, C. Michael and K. Miller. Data state capture. 5th Annual Oregon Workshop on Software Metrics (March 21-23, 1993), Silverton, Oregon.
  69. J. Burton, K. Miller, and S. Park. Rectangularly and Hexagonally Sampled Digital Imaging System Fidelity Analysis. Conference on Visual Information Processing II. (1993).
  70. J. Voas and K. Miller. A reverse flow graph model for statically predicting data state error propagation. 1992 Software Engineering Research Forum (November 5-6, 1992), Orlando, Florida.
  71. J. Voas, L. Voas, and K. Miller. A model for assessing the liability of seemingly correct software. IASTED International Conference on Reliability, Quality Control, and Risk Assessment (November 4-6, 1992), Washington, D.C. 32-35.
  72. J. Voas and K. Miller. A model for improving the testing of reusable software components. 10th Pacific Northwest Software Quality Conference (October 19-21, 1992), Portland, Oregon. 353-360.
  73. J. Voas, K. Miller and J. Payne. Software testability and reliability estimation. 2nd Workshop on Issues in Software Reliability Estimation (October 12-13, 1992), Livingston, New Jersey.
  74. J. Voas and K. Miller. Improving the software development process using testability research. 3rd International Symposium on Software Reliability Engineering (October 7-9, 1992), Research Triangle Park, North Carolina. 114-121.
  75. J. Voas, K. Miller, and R. Noonan. Designing programs that do not hide data state errors during random black-box testing. 5th International Conference on Putting into Practice Methods and Tools for Information System Design (September 25-27, 1992), Nantes, France.
  76. J. Voas, K. Miller and J. Payne. Assessing the ultra-reliability of software via software testing. Test Technology Symposium V (July 14-16, 1992), Laurel, Maryland.
  77. J. Voas, K. Miller, and J. Payne. Transforming semantic testability analysis into a useful software tool. 9th International Conference on Testing Computer Software (June 15-18, 1992), WashingtonDC.
  78. J. Voas, K. Miller, and J. Payne. PISCES: a tool for predicting software testability. Symposium on the Assessment of Quality Software Development Tools (May 27-29, 1992), New Orleans, Louisiana.
  79. T. Wood, K. Miller, and R. Noonan. Local exhaustive testing: a software reliability tool. SouthEast Regional ACM Conference (April 8-10, 1992), Raleigh, North Carolina, 77-84.
  80. J. Voas and K. Miller. A design phase semantic metric for software testability. 4th Annual Oregon Workshop on Software Metrics (March 22-24, 1992), Silver Falls, Oregon.
  81. J. Voas and K. Miller. A tool that estimates software quality by predicting state error propagation. 1st International Software Quality Exchange (March 10-11, 1992), San Francisco, California, Section 7B, 25-40.
  82. S. Park, S. Harvey, R. Kincaid, and K. Miller. Alternate server disciplines for mobile-servers on a congested network. Computer Science and Operations Research: New Developments in their Interfaces (January 8-10, 1992), Williamsburg, Virginia.
  83. J. Voas, K. Miller, and J. Payne. Designing programs that are less likely to hide faults. International Conference on Software Quality (October 7-9, 1991), Dayton, Ohio, 44-49.
  84. J. Voas, J. Payne, and K. Miller. A future direction for software certification testing using sensitivity analysis. 1st International Conference on Software Quality (October 6-9, 1991), Dayton, Ohio, 202-207.
  85. J. Voas and K. Miller. Improving software reliability by estimating the fault hiding ability of a program before it is written. 9th Annual Software Reliability Symposium (May 2-3, 1991), Colorado Springs, Colorado.
  86. K. Miller. Informed consent and the software engineer. 13th International Conference on Software Engineering (May 13-17, 1991), Austin, Texas, 270-271.
  87. 75. J. Burton, K. Miller, and S. Park. Hexagonally sampled digital imaging system fidelity analysis. Conference of the Soc. for Imaging Science and Technology (May 25, 1990).
  88. R. Hazra, K. Miller, and S. Park. Model-based quantification of image quality. International Workshop on Visual Information Processing for Television and Telerobotics (May 10-12, 1989), Williamsburg, Virginia, 11-22.
  89. R. Kincaid, K. Miller, and S. Park. Locating P mobile servers on a congested network: A Simulation Analysis. Impact of Recent Computer Advances on Operations Research, Operations Research Society of America (January 4-6, 1989), Williamsburg, Virginia, 396-406.
  90. K. Miller and D. Nicol. The implementation of a parallelized simulation of a queueing network using FORTRAN and data abstraction. Winter Simulation Conference (December 12-14, 1988), San Diego, California, 333-338.
  91. K. Miller, L. Morell, and B. Collins. Maintaining FORTRAN software by enforcing information hiding. Conference on Software Maintenance (October 24-27, 1988), Phoenix, Arizona, 286-291.
  92. L. Morell and K. Miller. Specifying syntax-directed tools and their implementation. Technical Symposium of Washington D.C. ACM (June 9, 1988), Washington DC, 69-76.
  93. K. Miller. FORTRAN and abstract data types: synthesizing old and new. Technical Symposium of Washington D.C. ACM (June 11, 1987), WashingtonDC, 1-6.
  94. K. Miller and M. A. Kaczynski. Real and complex arithmetic using 6 image tiles, an IP8500 and a real-time digital disk. Joint SIGGRAPH/Gould Users’ Group Meeting (Aug. 20, 1986), Dallas, Texas.