ISR Bibliography

Export 1615 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Dias, M., "A Flexible and Dynamic Approach for Reconfigurable Software Monitoring", Doctoral Dissertation: University of California, Irvine, 2005.
Dias, M., M. Vieira, and D. J. Richardson, "Analyzing Software Architecture based on Statechart Semantics", 15th Brazilian Symposium on Software Engineering (SBES 2001), Rio de Janeiro, Brazil, October, 2001.
Diallo, M. H., L. Naslavsky, T. A. Alspaugh, H. Ziv, and D. J. Richardson, "Toward Architecture Evaluation Through Ontology-based Requirements-level Scenarios", Architecting Dependable Systems VArchitecting Dependable Systems V, 5135 : Springer, pp. 225-247, 2008.
Diallo, M. H., G. Suryanarayana, and R. N. Taylor, "Tool Support for Incorporating Trust Models into Decentralized Applications", Technical Report, no. UCI-ISR-06-4: Institute for Software Research, University of California, Irvine, April, 2006.
Diallo, M. H., S E. Sim, and T. A. Alspaugh, "Case Study, Interrupted: The Paucity of Subject Systems that Span the Requirements-Architecture Gap", First Workshop on Empirical Assessment of Software Engineering Languages and Technologies (WEASELTech'07), held in conjunction with ASE 2007, Atlanta, GA, November, 2007.
Diallo, M. H., J. Romero-Mariona, S E. Sim, T. A. Alspaugh, and D. J. Richardson, "A Comparative Evaluation of Three Approaches to Specifying Security Requirements", 12th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'06), Luxembourg, Grand-Ducky of Luxembourg, June 5-6, 2006.
Diallo, M. H., L. Naslavsky, H. Ziv, T. A. Alspaugh, and D. J. Richardson, "Evaluating Software Architectures Against Requirements-level Scenarios ", Third International Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA'07), Boston, MA, USA, July, 2007.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R. S. Silva Filho, "Two Experiences Designing for Effective Security", Symposium On Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA, July 6-8, 2005.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R S. Filho, "In the Eye of the Beholder: A Visualization-based Approach to Information System Security", International Journal of Human-Computer StudiesInternational Journal of Human-Computer Studies (IJHCS) Special Issue on HCI Research in Privacy and Security, vol. 64, no. 1-2, pp. 5-24, July 2005.
DePaula, R., and P. Dourish, "Cognitive and Cultural Views of Emotions", Human Computer Interaction Consortium Winter Meeting, Douglas, CO, February, 2005.
Deng, F., and J. A. Jones, "Inferred Dependence Coverage to Support Fault Contextualization", 26th IEEE/ACM International Conference on Automated Software Engineering (ASE), Short paper track, Lawrence, KS, pp. 512-515, November, 2011.
Deng, F., and J. A. Jones, "Weighted System Dependence Graph", Fifth International Conference on Software Testing, Verification and Validation (ICST), Montreal, Quebec, Canada, April, 2012.
Deng, F., and J. A. Jones, "Constellation Visualization: Augmenting Program Dependence with Dynamic Information", 6th IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT 2011), Williamsburg, VA, September 29-30, 2011.
Demsky, B., and M. Rinard, "Automatic Extraction of Heap Reference Properties in Object-Oriented Programs", IEEE Transactions on Software Engineering, vol. 35, no. 3, pp. 305-324, May-June, 2009.
Demsky, B., J. Zhou, and W. Montaz, "Recovery Tasks: An Automated Approach to Failure Recovery", Proceedings on the First International Conference on Runtime Verification, Malta, November, 2010.
Demsky, B., and A. Dash, "Bristlecone: A Language for Robust Software Systems", Technical Report, no. UCI-ISR-07-6: Institute for Software Research, University of California, Irvine, October, 2007.
Demsky, B., "Using Discrete Event Simulation to Analyze Contention Managers", International Journal of Parallel ProgrammingInternational Journal of Parallel Programming, vol. 39, no. 6, pp. 783-808, December, 2011.
Demsky, B., "Cross Application Data Provenance and Policy Enforcement", ACM Transactions on Information and System Security, vol. 14, no. 1, May, 2011.
Demsky, B., "Garm: Cross Application Data Provenance and Policy Enforcement", 4th USENIX Workshop on Hot Topics in Security, August, 2009.
Demsky, B., and S. Sundaramurthy, "Static Analysis of Task Interactions in Bristlecone for Program Understanding", Technical Report, no. UCI-ISR-07-7: Institute for Software Research, University of California, Irvine, October, 2007.
Demsky, B., and S. Sundaramurthy, "Bristlecone: Language Support for Robust Software Applications", IEEE Transactions on Software EngineeringIEEE Transactions on Software Engineering, 2009.
Demsky, B., and A. Dash, "Evaluating Contention Management Using Discrete Event Simulation", Fifth ACM SIGPLAN Workshop on Transactional Computing, April, 2010.
Demsky, B., and A. Dash, "Bristlecone: A Language for Robust Software Systems", Proceedings of the 22nd European Conference on Object-Oriented Programming (Lecture Notes in Computer Science), pp. 490-515, July, 2008.
Demsky, B., and P. Lam, "Views: Object-Inspired Concurrency Control", Proceedings of the 2010 International Conference on Software Engineering, pp. 395-404, May, 2010.
Demsky, B., and A. Dash, "Bristlecone: A Language for Robust Software Systems", 22nd European Conference on Object-Oriented Programming (ECOOP'08), Paphos, Cyprus, July 7-11, 2008.

Pages