ISR Bibliography

Export 78 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is Z  [Clear All Filters]
2012
Asuncion, H. U., and R. N. Taylor, "Automated Techniques for Capturing Custom Traceability Links across Heterogeneous Artefacts", Software and Systems Traceability: Springer-Verlag, January, pp. 129-146, 2012.
Zheng, Y., and R. N. Taylor, "Enhancing Architecture-Implementation Conformance with Change Management and Support for Behavioral Mapping", International Conference on Software Engineering (ICSE 2012), Zurich, Switzerland, June, 2012.
Zheng, Y., "Enhancing Architecture-Implementation Conformance with Change Management and Support for Behavioral Mapping,", Doctoral Dissertation: University of California, Irvine, 2012.
Zhou, J., and B. Demsky, "Memory Management for Many-Core Processors with software configurable locality policies", 2012 International Symposium on Memory Management, Beijing, China, June, 2012.
Zheng, Y., and R. N. Taylor, "xMapper: An Architecture-Implementation Mapping Tool (Informal Research Demonstration)", International Conference on Software Engineering (ICSE 2012), Zurich, Switzerland, June, 2012.
2011
Winbladh, K., H. Ziv, and D. Richardson, "Evolving requirements in patient-centered software", 3rd workshop on Software Engineering in Health Care (SEHC 11), at the 33rd International Conference on Software Engineering, Waikiki, Honolulu, HI, ACM, May, 2011.
Ganjisaffar, Y., A. Zilio, S. Javanmardi, I. Cetindil, M. Sikka, S. Katumalla, N. Khatib, C. Li, and C. V. Lopes, "qSpell: Spelling Correction of Web Search Queries using Ranking Models and Iterative Correction ", Spelling Alteration for Web Search Workshop, Bellevue, WA, Microsoft, July 19, 2011.
Zheng, Y., and R. N. Taylor, "A Rationalization of Confusion, Challenges, and Techniques in Model-Based Software Development", Technical Report, no. UCI-ISR-11-5: Institute for Software Research, University of California, Irvine, August , 2011.
Zheng, Y., and R. N. Taylor, "Taming Changes With 1.x-Way Architecture-Implementation Mapping", 26th IEEE/ACM International Conference On Automated Software Engineering, Lawrence, Kansas, pp. 396 - 399, November 6-10, 2011.
2010
Romero-Mariona, J., H. Ziv, and D. Richardson, "ASSURE: automated support for secure and usable requirements engineering", Proceedings of the 2010 international symposium on Software testing and analysis, Trento, Italy, ACM, pp. 279-282, July 12-16, 2010.
Zhou, J., and B. Demsky, "Bamboo: A Data-Centric, Object-Oriented Approach to Multi-core Software", 2010 Conference on Programming Language Design and Implementation, pp. 388-399, June, 2010.
Ziv, H., and S. Patil, "Capstone Project: From Software Engineering to "Informatics"", Proceedings of the 2010 23rd IEEE Conference on Software Engineering Education and Training: IEEE Computer Society, pp. 185-188, 2010.
Zimmerman, A., and B. Nardi, "The Competition to Be Big: An Analysis of LTER and NEON", Collaboration in the New Life Sciences, Surrey, England, Ashgate, 2010.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Formality of the Security Specification Process: Benefits Beyond Requirements", Proceedings of the 2010 43rd Hawaii International Conference on System Sciences: IEEE Computer Society, pp. 1-6, 2010.
Winbladh, K., H. Ziv, and D. J. Richardson, "iMuse: interactive model-based use-case and storytelling environment", Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering, Santa Fe, New Mexico, USA, ACM, pp. 383-384, 2010.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Increasing Trustworthiness through Security Testing Support", Social Computing (SocialCom), 2010 IEEE Second International Conference on, Minneapolis, MN, IEEE , pp. 920-925, August 20-22, 2010.
Naslavsky, L., H. Ziv, and D. J. Richardson, "MbSRT2: Model-Based Selective Regression Testing with Traceability", Proceedings of the 2010 Third International Conference on Software Testing, Verification and Validation, Trento, Italy, ACM, pp. 89-98, July 12-16, 2010.
Demsky, B., J. Zhou, and W. Montaz, "Recovery Tasks: An Automated Approach to Failure Recovery", Proceedings on the First International Conference on Runtime Verification, Malta, November, 2010.
Richardson, D., B. Al-Ani, and H. Ziv, "Requirements engineering at the margins: avoiding technological hubris through alternative approaches", Proceedings of the FSE/SDP workshop on Future of software engineering research, Santa Fe, New Mexico, USA, ACM, pp. 303-308, 2010.
2009
Zhou, J., and B. Demsky, "Automatically Tuning Task-Based Programs for Multi-core Processors", The 4th International Workshop on Automatic Performance Tuning, October, 2009.
Winbladh, K., H. Ziv, and D. J. Richardson, "Eliciting required characteristics for usable requirements engineering approaches", Proceedings of the 2009 ACM symposium on Applied Computing, Honolulu, Hawaii, ACM, pp. 360-364, 2009.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Later stages support for security requirements", The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, ACM, pp. 103-107, 2009.
Naslavsky, L., H. Ziv, and D. J. Richardson, "A model-based regression test selection technique", 2009 IEEE International Conference on Software Maintenance, pp. 515-518, 2009.
Wang, Y., and A. Kobsa, "Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites", User Modeling, Adaptation, and Personalization, vol. 5535: Springer Berlin / Heidelberg, pp. 78-89, 2009.
2008
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Security Requirements Engineering: A Survey", Technical Report, no. UCI-ISR-08-2: Institute for Software Research, University of California, Irvine, CA, 2008.

Pages