ISR Bibliography

Export 184 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Penzenstadler, B., A. Raturi, D. Richardson, and B. Tomlinson, "Safety, Security, Now Sustainability: The Nonfunctional Requirement for the 21st Century", IEEE Software, vol. 31, no. 3, pp. 40-47, May-June, 2014.
Hammad, M., J. Garcia, and S. Malek, "SALMA: Self-Protection of Android Systems from Inter-Component Communication Attacks", 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2018), Montpellier, France, pp. 726-737, September, 2018.
Martie, L.., and A. van der Hoek, "Sameness: An Experiment in Code Search", Twelfth Working Conference on Mining Software Repositories (MSR), Florence, Italy, May, 2015.
Cole, M., V. Kaptelinin, B. Nardi, and J. A. Vadeboncoeur, "Scale, Agency, and Relationships: The Work of Cultural-Historical and Activity Theoretical Research", Mind, Culture, and Activity, May 11, 2016, vol. 23, issue 2, pp. 93-94, April 2, 2016.
Oh Navarro, E., and A. van der Hoek, "Scaling up: How Thirty-two Students Collaborated and Succeeded in Developing a Prototype Software Design Environment", Eighteenth Conference on Software Engineering Education & Training, pp. 155-162, February, 2005.
Alspaugh, T. A., and A. I. Antón, "Scenario Networks: A Case Study of the Enhanced Messaging System", Seventh International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ '01), Interlaken, Switzerland, pp. 113-124, June, 2001.
Alspaugh, T. A., Scenario Networks and Formalization for Scenario Management, , Raleigh, NC, North Carolina State University, 2002.
Alspaugh, T. A., and A. I. Antón, "Scenario Networks for Software Specification and Scenario Management", Computer Science Technical Report, no. TR-2001-15: North Carolina State University, Raleigh, NC, December, 2001.
Alspaugh, T. A., and A. I. Antón, "Scenario Support for Effective Requirements ", Information and Software TechnologyInformation and Software Technology, vol. 50, no. 3, pp. 198-220, February, 2007.
Alspaugh, T. A., and A. I. Antón, "Scenario Support for Effective Requirements ", Information and Software TechnologyInformation and Software Technology, vol. 50, no. 3, February, 2008.
Naslavsky, L., D. J. Richardson, and H. Ziv, "Scenario-based and State Machine-based Testing: An Evaluation of Automated Approaches", Technical Report, no. UCI-ISR-06-13: Institute for Software Research, University of California, Irvine, August, 2006.
Naslavsky, L., H. Muccini, and D. J. Richardson, "Scenario-based and State Machine-based Testing: An Evaluation of Automated Approaches", First International Workshop on Model-based Testing and Object-Oriented Systems (M-TOOS 2006), in conjunction with OOPSLA 2006, Portland, OR, October, 2006.
Alspaugh, T. A., D. J. Richardson, T. A. Standish, and H. Ziv, "Scenario-driven Specification-based Testing against Goals and Requirements", 11th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'05), Porto, Portugal, June, 2005.
Alspaugh, T. A., "Scenarios, Business Rules, and Matching", Technical Report, no. UCI-ISR-06-5: Institute for Software Research, University of California, Irvine, April, 2006.
Alspaugh, T. A., D. J. Richardson, and T. A. Standish, "Scenarios, State Machines, and Purpose-Driven Testing", 4th International Workshop on Scenarios and State Machines: Models, Algorithms and Tools (SCESM'05), held in conjunction with ICSE 2005, St. Louis, MO, 2005.
Dourish, P., "The Secret Life of Secrets, opinion piece", AmbidextrousAmbidextrous, no. 8 (Winter), pp. 36-38, 2008.
Baquero, A., and R. Taylor, "Secure and Customizable EHR Management Services with COASTmed", 4th International Symposium on Foundations on Software Engineering in Health Care, held with the 6th International Workshop on Sofwtare Engineering in Healthcare (FHIES/SEHC 2014), Washington D. C., July 17-18, 2014.
Ren, J., and R. N. Taylor, "A Secure Software Architecture Description Language", Workshop on Software Security Assurance Tools, Techniques, and Metrics, Co-located with the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), Long Beach, CA, 2005.
Malek, S., H. Bagheri, J. Garcia, and A. Sadeghi, "Security and Software Engineering", Handbook of Software Engineering, Editors: Sungdeok Cha, Richard N. Taylor, Kyo C. Kang: Springer International, 2019.
Dourish, P., R. E. Grinter, B. Dalal, J. Delgado de la Flor, and M. Joseph, "Security Day-to-Day: User Strategies for Managing Security as an Everyday, Practical Problem", Technical Report, no. UCI-ISR-03-5: Institute for Software Research, University of California, Irvine, June, 2003.
Dourish, P., R. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem", Personal and Ubiquitous ComputingPersonal and Ubiquitous Computing, vol. 8, no. 6, pp. 391-401, November, 2004.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Security Requirements Engineering: A Survey", Technical Report, no. UCI-ISR-08-2: Institute for Software Research, University of California, Irvine, CA, 2008.
Rode, J., C. Johansson, P. DiGioia, R. S. silva Filho, K. A. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. F. Redmiles, "Seeing Further: Extending Visualization as a Basis for Usable Security", Symposium On Usable Privacy and Security (SOUPS 2006), Pittsburgh, PA, pp. 145-155, July 12-14, 2006.
Dourish, P., "Seeing Like an Interface", Australasian Computer-Human Interaction Conference (OzCHI 2007), Adelaide, Australia, pp. 1-8, Nov 28-30, 2007.
Dourish, P., "Seeking a Foundation for Context-Aware Computing", Human-Computer InteractionHuman-Computer Interaction, vol. 16, no. 2-3, 2000.

Pages