ISR Bibliography

Export 78 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is Z  [Clear All Filters]
2008
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Security Requirements Engineering: A Survey", Technical Report, no. UCI-ISR-08-2: Institute for Software Research, University of California, Irvine, CA, 2008.
Winbladh, K., H. Ziv, and D. J. Richardson, "Surveying the Usability of Requirements Approaches using a 3-Dimensional Framework", Technical Report, no. UCI-ISR-08-3: Institute for Software Research, University of California, Irvine, CA, 2008.
Diallo, M. H., L. Naslavsky, T. A. Alspaugh, H. Ziv, and D. J. Richardson, "Toward Architecture Evaluation Through Ontology-based Requirements-level Scenarios", Architecting Dependable Systems VArchitecting Dependable Systems V, 5135 : Springer, pp. 225-247, 2008.
Naslavsky, L., H. Ziv, and D. J. Richardson, "Using Model Transformation to Support Model-Based Test Coverage Measurement", Third International Workshop on Automation of Software Test (AST’08), held in conjunction with ICSE 2008, Leipzig, Germany, May 11, 2008.
2009
Zhou, J., and B. Demsky, "Automatically Tuning Task-Based Programs for Multi-core Processors", The 4th International Workshop on Automatic Performance Tuning, October, 2009.
Winbladh, K., H. Ziv, and D. J. Richardson, "Eliciting required characteristics for usable requirements engineering approaches", Proceedings of the 2009 ACM symposium on Applied Computing, Honolulu, Hawaii, ACM, pp. 360-364, 2009.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Later stages support for security requirements", The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, ACM, pp. 103-107, 2009.
Naslavsky, L., H. Ziv, and D. J. Richardson, "A model-based regression test selection technique", 2009 IEEE International Conference on Software Maintenance, pp. 515-518, 2009.
Wang, Y., and A. Kobsa, "Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites", User Modeling, Adaptation, and Personalization, vol. 5535: Springer Berlin / Heidelberg, pp. 78-89, 2009.
2010
Romero-Mariona, J., H. Ziv, and D. Richardson, "ASSURE: automated support for secure and usable requirements engineering", Proceedings of the 2010 international symposium on Software testing and analysis, Trento, Italy, ACM, pp. 279-282, July 12-16, 2010.
Zhou, J., and B. Demsky, "Bamboo: A Data-Centric, Object-Oriented Approach to Multi-core Software", 2010 Conference on Programming Language Design and Implementation, pp. 388-399, June, 2010.
Ziv, H., and S. Patil, "Capstone Project: From Software Engineering to "Informatics"", Proceedings of the 2010 23rd IEEE Conference on Software Engineering Education and Training: IEEE Computer Society, pp. 185-188, 2010.
Zimmerman, A., and B. Nardi, "The Competition to Be Big: An Analysis of LTER and NEON", Collaboration in the New Life Sciences, Surrey, England, Ashgate, 2010.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Formality of the Security Specification Process: Benefits Beyond Requirements", Proceedings of the 2010 43rd Hawaii International Conference on System Sciences: IEEE Computer Society, pp. 1-6, 2010.
Winbladh, K., H. Ziv, and D. J. Richardson, "iMuse: interactive model-based use-case and storytelling environment", Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, Santa Fe, New Mexico, USA, ACM, pp. 383-384, 2010.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Increasing Trustworthiness through Security Testing Support", Social Computing (SocialCom), 2010 IEEE Second International Conference on, Minneapolis, MN, IEEE , pp. 920-925, August 20-22, 2010.
Naslavsky, L., H. Ziv, and D. J. Richardson, "MbSRT2: Model-Based Selective Regression Testing with Traceability", Proceedings of the 2010 Third International Conference on Software Testing, Verification and Validation, Trento, Italy, ACM, pp. 89-98, July 12-16, 2010.
Demsky, B., J. Zhou, and W. Montaz, "Recovery Tasks: An Automated Approach to Failure Recovery", Proceedings on the First International Conference on Runtime Verification, Malta, November, 2010.
Richardson, D., B. Al-Ani, and H. Ziv, "Requirements engineering at the margins: avoiding technological hubris through alternative approaches", Proceedings of the FSE/SDP workshop on Future of software engineering research, Santa Fe, New Mexico, USA, ACM, pp. 303-308, 2010.
2011
Winbladh, K., H. Ziv, and D. Richardson, "Evolving requirements in patient-centered software", 3rd workshop on Software Engineering in Health Care (SEHC 11), at the 33rd International Conference on Software Engineering, Waikiki, Honolulu, HI, ACM, May, 2011.
Ganjisaffar, Y., A. Zilio, S. Javanmardi, I. Cetindil, M. Sikka, S. Katumalla, N. Khatib, C. Li, and C. V. Lopes, "qSpell: Spelling Correction of Web Search Queries using Ranking Models and Iterative Correction ", Spelling Alteration for Web Search Workshop, Bellevue, WA, Microsoft, July 19, 2011.
Zheng, Y., and R. N. Taylor, "A Rationalization of Confusion, Challenges, and Techniques in Model-Based Software Development", Technical Report, no. UCI-ISR-11-5: Institute for Software Research, University of California, Irvine, August , 2011.
Zheng, Y., and R. N. Taylor, "Taming Changes With 1.x-Way Architecture-Implementation Mapping", 26th IEEE/ACM International Conference On Automated Software Engineering, Lawrence, Kansas, pp. 396 - 399, November 6-10, 2011.
2012
Asuncion, H. U., and R. N. Taylor, "Automated Techniques for Capturing Custom Traceability Links across Heterogeneous Artefacts", Software and Systems Traceability: Springer-Verlag, January, pp. 129-146, 2012.
Zheng, Y., and R. N. Taylor, "Enhancing Architecture-Implementation Conformance with Change Management and Support for Behavioral Mapping", International Conference on Software Engineering (ICSE 2012), Zurich, Switzerland, June, 2012.

Pages