ISR Bibliography

Export 1616 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Saini, V., H. Sajnani, and C. Lopes, "Cloned and non-cloned Java methods: a comparative study", Empirical Software Engineering., vol. 23, issue 4, pp. 2232-2278, August, 2018.
Saini, V., "Towards Accurate and Scalable Clone Detection using Software Metrics", Doctoral Dissertation, 2018.
Saini, V., H. Sajnani, and C. Lopes, "Comparing Quality Metrics for Cloned and Non-Cloned Java Methods: A Large Scale Empirical Study", IEEE 32nd International Conference on Software Maintenance and Evolution (ICSME 2016), Raleigh, North Carolina, USA, IEEE, October, 2016.
Saini, V., H. Sajnani, J. Ossher, and C. V. Lopes, "A Dataset for Maven Artifacts and Bug Patterns Found in Them", 11th Working Conference on Mining Software Repositories (MSR 2014), Hyderabad, India, ACM, pp. 416-419, May 31-June 1, 2014.
Saini, V., H. Sajnani, J. Kim, and C. Lopes, "SourcererCC and SourcererCC-I: Tools to Detect Clones in Batch mode and During Software Development", 38th International Conference on Software Engineering, Companion Proceedings, Austin, TX, ACM, pp. 597-600, 2016.
Sadeghi, A., N. Esfahani, and S. Malek, "Mining Mobile App Markets for Prioritization of Security Assessment Effort", 2nd International Workshop on App Market Analytics (WAMA 2017), Paderborn, Germany, Sept 5, 2017.
Sadeghi, A.., N.. Esfahani, and S.. Malek, "Ensuring the Consistency of Adaptation through Inter-and Intra-Component Dependency Analysis", ACM Transactions on Software Engineering and Methodology (TOSEM), May, vol. 26, no. 1, pp. 2:1--2:27, July 1, 2017.
Sadeghi, A., H. Bagheri, J. Garcia, and S. Malek, A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Apps, : UCI Institute for Software Research, January, 2016.
Sadeghi, A., "Efficient Permission-Aware Analysis of Android Applications", Doctoral Dissertation, 2017.
Sadeghi, A., H. Bagheri, J. Garcia, and S. Malek, "A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software", IEEE Transactions on Software Engineering, Oct 5, 2016, vol. 43, no. 6, pp. 492-530, June 1, 2017.
Sadeghi, A., H. Bagheri, and S. Malek, "Analysis of Android Inter-App Security Vulnerabilities Using COVERT", 37th International Conference on Software Engineering (ICSE 2015), Demonstrations Track, Florence, Italy, May, 2015.
Sadeghi, A., R. Jabbarvand, and S. Malek, "PATDroid: Permission-Aware GUI Testing of Android", 11th joint meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017), Paderborn, Germany, pp. 220-232, Sept 4-8, 2017.
Sadeghi, A., R. Jabbarvand, N. Ghorbani, H. Bagheri, and S. Malek, "A Temporal Permission Analysis and Enforcement Framework for Android", International Conference of Software Engineering (ICSE 2018), May, 2018.
R
Ruengmee, W., "Designing and Evaluating a Tool to Support Program Comprehension and Evaluation in AOSD", Doctoral Dissertation: University of California, Irvine, 2010.
Ruengmee, W., R S. Silva Filho, S K. Bajracharya, D. F. Redmiles, and C V. Lopes, "XE (eXtreme Editor) - Tool Support for Evolution in Aspect-Oriented Programming", Technical Report, no. UCI-ISR-08-1: Institute for Software Research, University of California, Irvine, June, 2008.
Ruegmee, W., R. S. silva Filho, S. K. Bajracharya, C. V. Lopes, and D. F. Redmiles, "XE (eXtreme Editor) – Bridging the Aspect-Oriented Programming Usability Gap", 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), L'Aquila, Italy, September 15-19, 2008.
Rousseau, M., "Can One-To-One Laptops Level the Playing Field?", Doctoral Dissertation: University of California, Irvine, 2007.
Rouquette, N., K. Reinholtz, T. Canham, V. Carson, L. Charest, A. van der Hoek, E. Dashofy, and R. N. Taylor, CAR: Component Architecture, , no. #30591: JPL, May 9, 2002.
Rouquette, N., N. Medvidović, and D. Garlan, "Dependable Autonomous Systems = knowing well what to do + knowing how to do it well", NASA High Dependability Computing Consortium Workshop, NASA AMES, Moffet Field, CA, January 10-12, 2001.
Roshandel, R., and N. Medvidović, "Modeling Multiple Aspects of Software Components", Workshop on Specification and Verification of Component-Based System, ESEC-FSE03, Helsinki, Finland, September, 2003.
Roshandel, R., A. van der Hoek, M. Mikic-Rakic, and N. Medvidović, "Mae - A System Model and Environment for Managing Architectural Evolution", ACM Transactions on Software Engineering and Methodology (TOSEM)ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 13, no. 2, pp. 240-276, April, 2004.
Roshandel, R., B. Schmerl, N. Medvidović, D. Garlan, and D. Zhang, "Understanding Tradeoffs among Different Architectural Modeling Approaches", Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA'04), Oslo, Norway, June, 2004.
Romero-Mariona, J., H. Ziv, and D. Richardson, "ASSURE: automated support for secure and usable requirements engineering", Proceedings of the 2010 international symposium on Software testing and analysis, Trento, Italy, ACM, pp. 279-282, July 12-16, 2010.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Later stages support for security requirements", The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, ACM, pp. 103-107, 2009.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Toward Mapping of Security Requirements into Software Architectures", Computer Security Conference 2007, Myrtle Beach, SC, April 11-13, 2007.

Pages