ISR Bibliography

Export 247 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
Conference Proceedings
Taylor, R. N., Requirements Engineering is SO Twentieth Century, Keynote at STRAW, , 2001.
Erenkrantz, J. R., M. M. Gorlick, and R. N. Taylor, "Rethinking Web Services from First Principles", 2nd International Conference on Design Science Research in Information Systems and Technology, Pasadena, California, May, 2007.
Tsudik, G., M. Burmester, A. Juels, A. Kobsa, D. Molnar, R. Di Pietro, and M. Rieback, "RFID Security and Privacy: Long-term Research or Short-term Tinkering? Invited Paper", First ACM Conference on Wireless Network Security (WiSec '08), Alexandria, VA, pp. 160, March 31-April 2, 2008.
Ren, J., and R. N. Taylor, "A Secure Software Architecture Description Language", Workshop on Software Security Assurance Tools, Techniques, and Metrics, Co-located with the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), Long Beach, CA, 2005.
Medvidović, N., and R. N. Taylor, "Software architecture: foundations, theory, and practice", ICSE 2010 Tutorial summary. Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering-Volume 2: ACM, pp. 471-472, 2010.
Turner, C., and D. J. Richardson, "Software Control and Strict Products Liability: A Technical Challenge to Current Legal Notion of Responsibility", IASTED International Conference Law and Technology (LAWTECH 2000), San Francisco, California, November, 2000.
Erenkrantz, J. R., and R. N. Taylor, "Supporting Distributed and Decentralized Projects: Drawing Lessons from the Open Source Community", 1st Workshop on Open Source in an Industrial Context, in conjunction with OOPSLA 2003, Anaheim, California, October, 2003.
Georgas, J. C., and R. N. Taylor, "Towards a Knowledge-based Approach to Architectural Adaptation Management", 1st ACM SIGSOFT Workshop on Self-managed Systems (WOSS '04), Newport Beach, CA, ACM Press, pp. 59-63, October, 2004.
Ren, J., R. N. Taylor, P. Dourish, and D. Redmiles, "Towards An Architectural Treatment of Software Security: A Connector-Centric Approach", Workshop on Software Engineering for Secure Systems (SESS 05), in conjunction with ICSE 2005, St. Louis, MO, May, 2005.
Dashofy, E., A. van der Hoek, and R. N. Taylor, "Towards Architecture-Based Self-Healing Systems", First ACM SIGSOFT Workshop on Self-Healing Systems, Charleston, South Carolina, ACM, pp. 21-26, November 18-19, 2002.
Kobsa, A., R. Nithyanand, G. Tsudik, and E. Uzun, "Usability of Display-Equipped RFID Tags for Security Purposes", European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011.
Dashofy, E. M., N. Medvidović, and R. N. Taylor, "Using Off-the-Shelf Middleware to Implement Connectors in Distributed Software Architectures", 21st International Conference on Software Engineering (ICSE'99), Los Angeles, CA, pp. 3-12, May 16-22, 1999.
Alspaugh, T. A., B. Tomlinson, and E. Baumer, "Using Social Agents to Visualize Software Scenarios ", CM Symposium on Software Visualization (SoftVis'06), Brighton, United Kingdom, pp. 87-94, September, 2006.
Ren, J., and R. N. Taylor, "Utilizing Commercial Object Libraries within Loosely-coupled, Event-based Systems", IASTED International Conference on Software Engineering and Applications (SEA 2004), Cambridge, MA, November 9-11, 2004.
Ren, J., and R. N. Taylor, "Visualizing Software Architecture with Off-The-Shelf Components", Fifteenth International Conference on Software Engineering and Knowledge Engineering (SEKE 2003), San Francisco, CA, pp. 132-141, July 1-3, 2003.
Khare, R., M. Guntersdorfer, P. Oreizy, N. Medvidović, and R. N. Taylor, "xADL: Enabling Architecture-Centric Tool Integration with XML", 34th Hawaii International Conference on System Sciences (HICSS-34), Software mini-track, Maui, Hawaii, January 3-6, 2001.
Journal Article
Edwards, A., S. Tucker, and B. Demsky, "AFID: An Automated Approach to Collecting Software Faults", Automated Software Engineering JournalAutomated Software Engineering Journal, vol. 17, no. 3, pp. 347-372, September, 2010.
Dorn, C., and R. N. Taylor, "Analyzing Runtime Adaptability of Collaboration Patterns", Concurrency and Computation: Practice and ExperienceConcurrency and Computation: Practice and Experience, Online: November 28, 2014, vol. 27, no. 11, pp. 2725-2750, July 16, 2015.
Taylor, R., and D. Redmiles, "Arabica", SIGSOFT Software Engineering Notes, vol. 25, no. 1, January, 2000.
Suryanarayana, G., M. H. Diallo, J. R. Erenkrantz, and R. N. Taylor, "Architecting Trust-enabled Peer-to-Peer File-sharing Applications", ACM Crossroads, issue on Software Engineering, vol. 12, no. 4, pp. 11-19, Summer, 2006.
Georgas, J. C., E. M. Dashofy, and R. N. Taylor, "Architecture-Centric Development: A Different Approach to Software Engineering", ACM Crossroads, issue on Software Engineering, vol. 12, no. 4, Summer, 2006.
Taylor, R., and D. Redmiles, "ArchStudio", SIGSOFT Software Engineering Notes, vol. 25, no. 1, January, 2000.
Taylor, R., and D. Redmiles, "Argo/UML", SIGSOFT Software Engineering Notes, vol. 25, no. 1, January, 2000.
Bagheri, H., C. Tang, and K. Sullivan, "Automated Synthesis and Dynamic Analysis of Tradeoff Spaces for Object-Relational Mapping", IEEE Transactions on Software Engineering, vol. 43, issue 2, 02/2017.

Pages