S
Saini, V., H. Sajnani, and C. Lopes,
"Comparing Quality Metrics for Cloned and Non-Cloned Java Methods: A Large Scale Empirical Study",
IEEE 32nd International Conference on Software Maintenance and Evolution (ICSME 2016), Raleigh, North Carolina, USA, IEEE, October, 2016.
Saini, V., H. Sajnani, J. Ossher, and C. V. Lopes,
"A Dataset for Maven Artifacts and Bug Patterns Found in Them",
11th Working Conference on Mining Software Repositories (MSR 2014), Hyderabad, India, ACM, pp. 416-419, May 31-June 1, 2014.
Saini, V., H. Sajnani, J. Kim, and C. Lopes,
"SourcererCC and SourcererCC-I: Tools to Detect Clones in Batch mode and During Software Development",
38th International Conference on Software Engineering, Companion Proceedings, Austin, TX, ACM, pp. 597-600, 2016.
Sadeghi, A., R. Jabbarvand, and S. Malek,
"PATDroid: Permission-Aware GUI Testing of Android",
11th joint meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017), Paderborn, Germany, pp. 220-232, Sept 4-8, 2017.
Sadeghi, A., N. Esfahani, and S. Malek,
"Mining Mobile App Markets for Prioritization of Security Assessment Effort",
2nd International Workshop on App Market Analytics (WAMA 2017), Paderborn, Germany, Sept 5, 2017.
Sadeghi, A., R. Jabbarvand, N. Ghorbani, H. Bagheri, and S. Malek,
"A Temporal Permission Analysis and Enforcement Framework for Android",
International Conference of Software Engineering (ICSE 2018), May, 2018.
Sadeghi, A.., N.. Esfahani, and S.. Malek,
"Ensuring the Consistency of Adaptation through Inter-and Intra-Component Dependency Analysis",
ACM Transactions on Software Engineering and Methodology (TOSEM), May, vol. 26, no. 1, pp. 2:1--2:27, July 1, 2017.
Sadeghi, A., H. Bagheri, J. Garcia, and S. Malek,
"A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software",
IEEE Transactions on Software Engineering, Oct 5, 2016, vol. 43, no. 6, pp. 492-530, June 1, 2017.
Sadeghi, A., H. Bagheri, and S. Malek,
"Analysis of Android Inter-App Security Vulnerabilities Using COVERT",
37th International Conference on Software Engineering (ICSE 2015), Demonstrations Track, Florence, Italy, May, 2015.
R
Ruengmee, W., R S. Silva Filho, S K. Bajracharya, D. F. Redmiles, and C V. Lopes,
"XE (eXtreme Editor) - Tool Support for Evolution in Aspect-Oriented Programming",
Technical Report, no. UCI-ISR-08-1: Institute for Software Research, University of California, Irvine, June, 2008.
Ruegmee, W., R. S. silva Filho, S. K. Bajracharya, C. V. Lopes, and D. F. Redmiles,
"XE (eXtreme Editor) – Bridging the Aspect-Oriented Programming Usability Gap",
23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), L'Aquila, Italy, September 15-19, 2008.
Rousseau, M.,
"Can One-To-One Laptops Level the Playing Field?",
Doctoral Dissertation: University of California, Irvine, 2007.
Rouquette, N., K. Reinholtz, T. Canham, V. Carson, L. Charest, A. van der Hoek, E. Dashofy, and R. N. Taylor,
CAR: Component Architecture,
, no. #30591: JPL, May 9, 2002.
Rouquette, N., N. Medvidović, and D. Garlan,
"Dependable Autonomous Systems = knowing well what to do + knowing how to do it well",
NASA High Dependability Computing Consortium Workshop, NASA AMES, Moffet Field, CA, January 10-12, 2001.
Roshandel, R., and N. Medvidović,
"Modeling Multiple Aspects of Software Components",
Workshop on Specification and Verification of Component-Based System, ESEC-FSE03, Helsinki, Finland, September, 2003.
Roshandel, R., A. van der Hoek, M. Mikic-Rakic, and N. Medvidović,
"Mae - A System Model and Environment for Managing Architectural Evolution",
ACM Transactions on Software Engineering and Methodology (TOSEM)ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 13, no. 2, pp. 240-276, April, 2004.
Roshandel, R., B. Schmerl, N. Medvidović, D. Garlan, and D. Zhang,
"Understanding Tradeoffs among Different Architectural Modeling Approaches",
Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA'04), Oslo, Norway, June, 2004.
Romero-Mariona, J., H. Ziv, and D. J. Richardson,
"Security Requirements Engineering: A Survey",
Technical Report, no. UCI-ISR-08-2: Institute for Software Research, University of California, Irvine, CA, 2008.
Romero-Mariona, J., H. Ziv, and D. Richardson,
"ASSURE: automated support for secure and usable requirements engineering",
Proceedings of the 2010 international symposium on Software testing and analysis, Trento, Italy, ACM, pp. 279-282, July 12-16, 2010.
Romero-Mariona, J., H. Ziv, and D. J. Richardson,
"Later stages support for security requirements",
The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, ACM, pp. 103-107, 2009.
Romero-Mariona, J., H. Ziv, and D. J. Richardson,
"Toward Mapping of Security Requirements into Software Architectures",
Computer Security Conference 2007, Myrtle Beach, SC, April 11-13, 2007.
Romero-Mariona, J., H. Ziv, and D. J. Richardson,
"Increasing Trustworthiness through Security Testing Support",
Social Computing (SocialCom), 2010 IEEE Second International Conference on, Minneapolis, MN, IEEE , pp. 920-925, August 20-22, 2010.