D
Dias, M., M. Vieira, and D. J. Richardson,
"Understanding the Dynamic Behavior of Concurrent Event-Based Components",
16th IEEE International Conference, Automated Software Engineering (ASE '01), San Diego, CA, November 26-29, 2001.
Dias, M. S., and D. J. Richardson,
"Identifying Cause and Effect Relations between Events in Concurrent Event-Based Components",
17th IEEE International Conference on Automated Software Engineering (ASE '02), Edinburgh, Scotland, UK, September, 2002.
Diallo, M. H., L. Naslavsky, T. A. Alspaugh, H. Ziv, and D. J. Richardson,
"Toward Architecture Evaluation Through Ontology-based Requirements-level Scenarios",
Architecting Dependable Systems VArchitecting Dependable Systems V, 5135 : Springer, pp. 225-247, 2008.
Diallo, M. H., G. Suryanarayana, and R. N. Taylor,
"Tool Support for Incorporating Trust Models into Decentralized Applications",
Technical Report, no. UCI-ISR-06-4: Institute for Software Research, University of California, Irvine, April, 2006.
Diallo, M. H., S E. Sim, and T. A. Alspaugh,
"Case Study, Interrupted: The Paucity of Subject Systems that Span the Requirements-Architecture Gap",
First Workshop on Empirical Assessment of Software Engineering Languages and Technologies (WEASELTech'07), held in conjunction with ASE 2007, Atlanta, GA, November, 2007.
Diallo, M. H., J. Romero-Mariona, S E. Sim, T. A. Alspaugh, and D. J. Richardson,
"A Comparative Evaluation of Three Approaches to Specifying Security Requirements",
12th Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ'06), Luxembourg, Grand-Ducky of Luxembourg, June 5-6, 2006.
Diallo, M. H., L. Naslavsky, H. Ziv, T. A. Alspaugh, and D. J. Richardson,
"Evaluating Software Architectures Against Requirements-level Scenarios ",
Third International Workshop on the Role of Software Architecture for Testing and Analysis (ROSATEA'07), Boston, MA, USA, July, 2007.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R. S. Silva Filho,
"Two Experiences Designing for Effective Security",
Symposium On Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA, July 6-8, 2005.
DePaula, R., X. Ding, P. Dourish, K. A. Nies, B. Pillet, D. Redmiles, J. Ren, J. Rode, and R S. Filho,
"In the Eye of the Beholder: A Visualization-based Approach to Information System Security",
International Journal of Human-Computer StudiesInternational Journal of Human-Computer Studies (IJHCS) Special Issue on HCI Research in Privacy and Security, vol. 64, no. 1-2, pp. 5-24, July 2005.
DePaula, R., and P. Dourish,
"Cognitive and Cultural Views of Emotions",
Human Computer Interaction Consortium Winter Meeting, Douglas, CO, February, 2005.
Deng, F., and J. A. Jones,
"Inferred Dependence Coverage to Support Fault Contextualization",
26th IEEE/ACM International Conference on Automated Software Engineering (ASE), Short paper track, Lawrence, KS, pp. 512-515, November, 2011.
Deng, F., and J. A. Jones,
"Weighted System Dependence Graph",
Fifth International Conference on Software Testing, Verification and Validation (ICST), Montreal, Quebec, Canada, April, 2012.
Deng, F., and J. A. Jones,
"Constellation Visualization: Augmenting Program Dependence with Dynamic Information",
6th IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT 2011), Williamsburg, VA, September 29-30, 2011.
Demsky, B., and N F. Tehrany,
"Integrating File Operations into Transactional Memory",
Journal of Parallel and Distributed ComputingJournal of Parallel and Distributed Computing, vol. 71, no. 10, October, 2011.
Demsky, B., and M. Rinard,
"Automatic Extraction of Heap Reference Properties in Object-Oriented Programs",
IEEE Transactions on Software Engineering, vol. 35, no. 3, pp. 305-324, May-June, 2009.
Demsky, B., J. Zhou, and W. Montaz,
"Recovery Tasks: An Automated Approach to Failure Recovery",
Proceedings on the First International Conference on Runtime Verification, Malta, November, 2010.
Demsky, B., and A. Dash,
"Bristlecone: A Language for Robust Software Systems",
Technical Report, no. UCI-ISR-07-6: Institute for Software Research, University of California, Irvine, October, 2007.
Demsky, B.,
"Using Discrete Event Simulation to Analyze Contention Managers",
International Journal of Parallel ProgrammingInternational Journal of Parallel Programming, vol. 39, no. 6, pp. 783-808, December, 2011.
Demsky, B.,
"Cross Application Data Provenance and Policy Enforcement",
ACM Transactions on Information and System Security, vol. 14, no. 1, May, 2011.
Demsky, B., and S. Sundaramurthy,
"Static Analysis of Task Interactions in Bristlecone for Program Understanding",
Technical Report, no. UCI-ISR-07-7: Institute for Software Research, University of California, Irvine, October, 2007.
Demsky, B., and S. Sundaramurthy,
"Bristlecone: Language Support for Robust Software Applications",
IEEE Transactions on Software EngineeringIEEE Transactions on Software Engineering, 2009.
Demsky, B., and A. Dash,
"Bristlecone: A Language for Robust Software Systems",
Proceedings of the 22nd European Conference on Object-Oriented Programming (Lecture Notes in Computer Science), pp. 490-515, July, 2008.