ISR Bibliography

Export 184 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Kobsa, A., R. Sonawalla, G. Tsudik, E. Uzun, and Y. Wang, "Serial hook-ups: a comparative usability study of secure device pairing methods", Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, California, ACM, pp. 1-12, 2009.
Hilbert, D., and D. Redmiles, "Separating the Wheat from the Chaff in Internet-Mediated User Feedback", ACM SIGGROUP Bulletin, vol. 20, no. 1, pp. 35-40, April, 1999.
Mazieres, D., M. Kaminsky, F. M. Kaashoek, and E. Witchel, "Separating Key Management from File System Security", Seventeenth ACM Symposium on Operating Systems Principles (SOSP), pp. 124-139, 1999.
Jakobac, V., N. Medvidović, and A. Egyed, "Separating Architectural Concerns to Ease Program Understanding", 1<sup>st</sup> International Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005), St. Louis, Missouri, USA, pp. 1-5, May 16, 2005.
DiGiuseppe, N., and J. A. Jones, "Semantic Fault Diagnosis: Automatic Natural-Language Fault Descriptions", ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, New Ideas Track (FSE-NIER), Cary, NC, pp. 23:1--23:4, November, 2012.
Eom, Y. Hun, "Self-stabilizing Java: Tool Support for Building Robust Software", Doctoral Dissertation: University of California, Irvine, 2016.
hun Eom, Y., and B. Demsky, "Self-Stabilizing Java", 2012 Conference on Programming Language Design and Implementation, June, 2012.
Suryanarayana, G., "Selection and Architecture-Based Composition of Trust Models in Decentralized Applications", Doctoral Dissertation: University of California, Irvine, 2007.
De Souza, C. R. B., J. Froehlich, and P. Dourish, "Seeking the Source: Software Source Code as a Social and Technical Artifact", ACM Conf. Supporting Group Work (GROUP 2005), Sanibel Island, FL, November, 2005.
Dourish, P., "Seeking a Foundation for Context-Aware Computing", Human-Computer InteractionHuman-Computer Interaction, vol. 16, no. 2-3, 2000.
Dourish, P., "Seeing Like an Interface", Australasian Computer-Human Interaction Conference (OzCHI 2007), Adelaide, Australia, pp. 1-8, Nov 28-30, 2007.
Rode, J., C. Johansson, P. DiGioia, R. S. silva Filho, K. A. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. F. Redmiles, "Seeing Further: Extending Visualization as a Basis for Usable Security", Symposium On Usable Privacy and Security (SOUPS 2006), Pittsburgh, PA, pp. 145-155, July 12-14, 2006.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Security Requirements Engineering: A Survey", Technical Report, no. UCI-ISR-08-2: Institute for Software Research, University of California, Irvine, CA, 2008.
Dourish, P., R. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem", Personal and Ubiquitous ComputingPersonal and Ubiquitous Computing, vol. 8, no. 6, pp. 391-401, November, 2004.
Dourish, P., R. E. Grinter, B. Dalal, J. Delgado de la Flor, and M. Joseph, "Security Day-to-Day: User Strategies for Managing Security as an Everyday, Practical Problem", Technical Report, no. UCI-ISR-03-5: Institute for Software Research, University of California, Irvine, June, 2003.
Malek, S., H. Bagheri, J. Garcia, and A. Sadeghi, "Security and Software Engineering", Handbook of Software Engineering, Editors: Sungdeok Cha, Richard N. Taylor, Kyo C. Kang: Springer International, 2019.
Ren, J., and R. N. Taylor, "A Secure Software Architecture Description Language", Workshop on Software Security Assurance Tools, Techniques, and Metrics, Co-located with the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), Long Beach, CA, 2005.
Baquero, A., and R. Taylor, "Secure and Customizable EHR Management Services with COASTmed", 4th International Symposium on Foundations on Software Engineering in Health Care, held with the 6th International Workshop on Sofwtare Engineering in Healthcare (FHIES/SEHC 2014), Washington D. C., July 17-18, 2014.
Dourish, P., "The Secret Life of Secrets, opinion piece", AmbidextrousAmbidextrous, no. 8 (Winter), pp. 36-38, 2008.
Alspaugh, T. A., D. J. Richardson, and T. A. Standish, "Scenarios, State Machines, and Purpose-Driven Testing", 4th International Workshop on Scenarios and State Machines: Models, Algorithms and Tools (SCESM'05), held in conjunction with ICSE 2005, St. Louis, MO, 2005.
Alspaugh, T. A., "Scenarios, Business Rules, and Matching", Technical Report, no. UCI-ISR-06-5: Institute for Software Research, University of California, Irvine, April, 2006.
Alspaugh, T. A., D. J. Richardson, T. A. Standish, and H. Ziv, "Scenario-driven Specification-based Testing against Goals and Requirements", 11th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'05), Porto, Portugal, June, 2005.
Naslavsky, L., D. J. Richardson, and H. Ziv, "Scenario-based and State Machine-based Testing: An Evaluation of Automated Approaches", Technical Report, no. UCI-ISR-06-13: Institute for Software Research, University of California, Irvine, August, 2006.
Naslavsky, L., H. Muccini, and D. J. Richardson, "Scenario-based and State Machine-based Testing: An Evaluation of Automated Approaches", First International Workshop on Model-based Testing and Object-Oriented Systems (M-TOOS 2006), in conjunction with OOPSLA 2006, Portland, OR, October, 2006.
Alspaugh, T. A., and A. I. Antón, "Scenario Support for Effective Requirements ", Information and Software TechnologyInformation and Software Technology, vol. 50, no. 3, pp. 198-220, February, 2007.

Pages