ISR Bibliography

Export 1599 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Asuncion, H. U., and R. N. Taylor, "A Holistic Approach to Software Traceability ", 24th International Conference on Software Engineering and Knowledge Engineering (SEKE 2012), Redwood City, CA, July 1-3, 2012.
Asuncion, H., "Architecture-Centric Traceability of Stakeholders", Doctoral Dissertation: University of California, Irvine, 2009.
Asuncion, H. U., A. U. Asuncion, and R. N. Taylor, "Software traceability with topic modeling", Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, Cape Town, South Africa, ACM, pp. 95-104, 2010.
Asuncion, H., F. François, and R. N. Taylor, "An End-To-End Software Traceability Tool in an Industrial Context", Technical Report, no. UCI-ISR-06-16: Institute for Software Research, University of California, Irvine, October, 2006.
Asuncion, H. U., and R. N. Taylor, "Automated Techniques for Capturing Custom Traceability Links across Heterogeneous Artefacts", Software and Systems Traceability: Springer-Verlag, January, pp. 129-146, 2012.
Asuncion, H., and R. N. Taylor, "Capturing Custom Link Semantics among Heterogeneous Artifacts and Tools", 5th Int'l Workshop on Traceability in Emerging Forms of Software Engineering, Vancouver, British Columbia, May, 2009.
Asuncion, H., F. François, and R. N. Taylor, "An End-To-End Industrial Software Traceability Tool", 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Int'l Symposium on the Foundations of Software Engineering (ESEC/FSE), Dubrovnik,Croatia, pp. 115-124, Sept 3-7, 2007.
Asuncion, H. U., and R. N. Taylor, "Architecture-Centric Traceability for Stakeholders: Technical Foundations", Technical Report, no. UCI-ISR-11-2: Institute for Software Research, University of California, Irvine, May, 2011.
Asuncion, H., and R. N. Taylor, "Establishing the Connection Between Software Traceability and Data Provenance", Technical Report, no. UCI-ISR-07-9: Institute for Software Research, University of California, Irvine, November, 2007.
B
Bagheri, H., E. Kang, S. Malek, and D. Jackson, "Detection of Design Flaws in Android Permission Protocol through Bounded Verification", 20th International Symposium on Formal Methods (FM 2015), Oslo, Norway, pp. 73-89, June, 2015.
Bagheri, H., J. Garcia, A. Sadeghi, S. Malek, and N. Medvidovic, "Software Architectural Principles in Contemporary Mobile Software: From Conception to Practice", Journal of Systems and Software, June 1, 2016, vol. 119, pp. 31-44, September 30, 2016.
Bagheri, H., and K. Sullivan, "Model-Driven Synthesis of Formally Precise, Stylized Software Architectures", Formal Aspects of Computing, vol. 28, no. 3, pp. 441-467, May 1, 2016.
Bagheri, H., E. Kang, S. Malek, and D. Jackson, "A Formal Approach for Detection of Security Flaws in the Android Permission System", Springer Journal on Formal Aspects of Computing, 2017.
Bagheri, H., and S. Malek, "Titanium: Efficient Analysis of Evolving Alloy Specifications", 24th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2016), Seattle, WA, ACM, pp. 27-38, Nov 13-18, 2016.
Bagheri, H.., J.. Wang, J.. Arets, and S. Malek, "Efficient, Evolutionary Security Analysis of Interacting Android Apps", 34th IEEE International Conference on Software Maintenance and Evolution (ICSME 2018), Madrid, Spain, September, In Press.
Bagheri, H., C. Tang, and K. Sullivan, "Automated Synthesis and Dynamic Analysis of Tradeoff Spaces for Object-Relational Mapping", IEEE Transactions on Software Engineering, vol. 43, issue 2, 02/2017.
Bagheri, H., A. Sadeghi, R. Jabbarvand, and S. Malek, "Practical, Formal Synthesis and Autonomic Enforcement of Security Policies for Android", 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Toulouse, France, June, 2016.
Bagheri, H., and S. Malek, Titanium: Efficient Analysis of Evolving Alloy Specifications, : UCI Institute for Software Research, September, 2015.
Bagheri, H., A. Sadeghi, J. Garcia, and S. Malek, "COVERT: Compositional Analysis of Android Inter-App Security Vulnerabilities", IEEE Transactions on Software Engineering (IEEE TSE), vol. 41, issue 9, pp. 866-886, 09/2015.
Bajcharya, S K., T C. Ngo, and C V. Lopes, "On Using Net Options Value as a Value Based Design Framework", Seventh International Workshop on Economics-Driven Software Engineering Research (EDSER) at ICSE'05, St. Louis, Missouri, pp. 1-3, May 15, 2005.
Bajracharya, S., T. Ngo, and C V. Lopes, "On Using Net Options Value as a Value Based Design Framework", 7th International Workshop on Economics-Driven Software Engineering Research (EDSER) at ICSE'05, St. Louis, Missouri, USA, 2005.
Bajracharya, S., T. Ngo, E. Linstead, Y. Dou, P. Baldi, and C. Lopes, "Sourcerer: A Search Engine for Open Source Code Supporting Structure-Based Search ", OOPSLA '06: Companion to the 21st ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications: ACM Press, New York, NY, pp. 681-682, 2006.
Bajracharya, S., "Facilitating Internet-Scale Code Retrieval", Doctoral Dissertation: University of California, Irvine, 2010.
Bajracharya, S., and C. Lopes, "Mining search topics from a code search engine usage log", 6th IEEE International Working Conference on Mining Software Repositories, 2009 (MSR '09), pp. 111-120, 16-17 May 2009.
Bajracharya, S K., and C V. Lopes, "Analyzing and mining a code search engine usage log ", Empirical Software Engineering, Special Issue MSR09Empirical Software Engineering, Special Issue MSR09: Springer Netherlands, September, 2010.

Pages