ISR Bibliography

Export 1617 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Alspaugh, T. A., D. J. Richardson, T. A. Standish, and H. Ziv, "Scenario-driven Specification-based Testing against Goals and Requirements", 11th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'05), Porto, Portugal, June, 2005.
Alspaugh, T. A., "Scenarios, Business Rules, and Matching", Technical Report, no. UCI-ISR-06-5: Institute for Software Research, University of California, Irvine, April, 2006.
Alspaugh, T. A., D. J. Richardson, and T. A. Standish, "Scenarios, State Machines, and Purpose-Driven Testing", 4th International Workshop on Scenarios and State Machines: Models, Algorithms and Tools (SCESM'05), held in conjunction with ICSE 2005, St. Louis, MO, 2005.
Dourish, P., "The Secret Life of Secrets, opinion piece", AmbidextrousAmbidextrous, no. 8 (Winter), pp. 36-38, 2008.
Baquero, A., and R. Taylor, "Secure and Customizable EHR Management Services with COASTmed", 4th International Symposium on Foundations on Software Engineering in Health Care, held with the 6th International Workshop on Sofwtare Engineering in Healthcare (FHIES/SEHC 2014), Washington D. C., July 17-18, 2014.
Ren, J., and R. N. Taylor, "A Secure Software Architecture Description Language", Workshop on Software Security Assurance Tools, Techniques, and Metrics, Co-located with the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), Long Beach, CA, 2005.
Malek, S., H. Bagheri, J. Garcia, and A. Sadeghi, "Security and Software Engineering", Handbook of Software Engineering, Editors: Sungdeok Cha, Richard N. Taylor, Kyo C. Kang: Springer International, 2019.
Dourish, P., R. E. Grinter, B. Dalal, J. Delgado de la Flor, and M. Joseph, "Security Day-to-Day: User Strategies for Managing Security as an Everyday, Practical Problem", Technical Report, no. UCI-ISR-03-5: Institute for Software Research, University of California, Irvine, June, 2003.
Dourish, P., R. Grinter, J. Delgado de la Flor, and M. Joseph, "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem", Personal and Ubiquitous ComputingPersonal and Ubiquitous Computing, vol. 8, no. 6, pp. 391-401, November, 2004.
Romero-Mariona, J., H. Ziv, and D. J. Richardson, "Security Requirements Engineering: A Survey", Technical Report, no. UCI-ISR-08-2: Institute for Software Research, University of California, Irvine, CA, 2008.
Rode, J., C. Johansson, P. DiGioia, R. S. silva Filho, K. A. Nies, D. H. Nguyen, J. Ren, P. Dourish, and D. F. Redmiles, "Seeing Further: Extending Visualization as a Basis for Usable Security", Symposium On Usable Privacy and Security (SOUPS 2006), Pittsburgh, PA, pp. 145-155, July 12-14, 2006.
Dourish, P., "Seeing Like an Interface", Australasian Computer-Human Interaction Conference (OzCHI 2007), Adelaide, Australia, pp. 1-8, Nov 28-30, 2007.
Dourish, P., "Seeking a Foundation for Context-Aware Computing", Human-Computer InteractionHuman-Computer Interaction, vol. 16, no. 2-3, 2000.
De Souza, C. R. B., J. Froehlich, and P. Dourish, "Seeking the Source: Software Source Code as a Social and Technical Artifact", ACM Conf. Supporting Group Work (GROUP 2005), Sanibel Island, FL, November, 2005.
Suryanarayana, G., "Selection and Architecture-Based Composition of Trust Models in Decentralized Applications", Doctoral Dissertation: University of California, Irvine, 2007.
hun Eom, Y., and B. Demsky, "Self-Stabilizing Java", 2012 Conference on Programming Language Design and Implementation, June, 2012.
Eom, Y. Hun, "Self-stabilizing Java: Tool Support for Building Robust Software", Doctoral Dissertation: University of California, Irvine, 2016.
DiGiuseppe, N., and J. A. Jones, "Semantic Fault Diagnosis: Automatic Natural-Language Fault Descriptions", ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, New Ideas Track (FSE-NIER), Cary, NC, pp. 23:1--23:4, November, 2012.
Jakobac, V., N. Medvidović, and A. Egyed, "Separating Architectural Concerns to Ease Program Understanding", 1<sup>st</sup> International Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005), St. Louis, Missouri, USA, pp. 1-5, May 16, 2005.
Mazieres, D., M. Kaminsky, F. M. Kaashoek, and E. Witchel, "Separating Key Management from File System Security", Seventeenth ACM Symposium on Operating Systems Principles (SOSP), pp. 124-139, 1999.
Hilbert, D., and D. Redmiles, "Separating the Wheat from the Chaff in Internet-Mediated User Feedback", ACM SIGGROUP Bulletin, vol. 20, no. 1, pp. 35-40, April, 1999.
Kobsa, A., R. Sonawalla, G. Tsudik, E. Uzun, and Y. Wang, "Serial hook-ups: a comparative usability study of secure device pairing methods", Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, California, ACM, pp. 1-12, 2009.
Colan, M., Service-Oriented Architecture expands the vision of Web services, Part 1, , 2004.
Fluor, K.., W. Scacchi, and A. Szeto, SFSKIds.org: A Walkthrough Guide for Teachers and Parents, , Fall, 2014.
Fielding, R. T., "Shared Leadership in the Apache Project", Communications of the ACMCommunications of the ACM, vol. 42, no. 4, pp. 42-43, 1999.

Pages