Seguir
Byron J. Williams
Byron J. Williams
Dirección de correo verificada de cise.ufl.edu
Título
Citado por
Citado por
Año
Characterizing software architecture changes: A systematic review
BJ Williams, JC Carver
Information and Software Technology 52 (1), 31-51, 2010
2122010
Managing technical debt: An industrial case study
Z Codabux, B Williams
2013 4th International Workshop on Managing Technical Debt (MTD), 8-15, 2013
1702013
Exception handling defects: An empirical study
P Sawadpong, EB Allen, BJ Williams
2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012
592012
The correspondence between software quality models and technical debt estimation approaches
I Griffith, D Reimanis, C Izurieta, Z Codabux, A Deo, B Williams
2014 sixth international workshop on managing technical debt, 19-26, 2014
482014
Long-timescale fluctuations in zero-field magnetic vortex oscillations driven by dc spin-polarized current
VS Pribiag, G Finocchio, BJ Williams, DC Ralph, RA Buhrman
Physical Review B 80 (18), 180411, 2009
462009
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
BJ Williams, JC Carver, RB Vaughn
Software Engineering Research and Practice, 966-971, 2006
392006
Technical debt prioritization using predictive analytics
Z Codabux, BJ Williams
Proceedings of the 38th International Conference on Software Engineering …, 2016
332016
An empirical assessment of technical debt practices in industry
Z Codabux, BJ Williams, GL Bradshaw, M Cantor
Journal of software: Evolution and Process 29 (10), e1894, 2017
302017
Empirical evidence of code decay: A systematic mapping study
A Bandi, BJ Williams, EB Allen
2013 20th Working Conference on Reverse Engineering (WCRE), 341-350, 2013
302013
High false positive detection of security vulnerabilities: a case study
M Nadeem, BJ Williams, EB Allen
Proceedings of the 50th Annual Southeast Regional Conference, 359-360, 2012
262012
Cyber security for emergency management
J Walker, BJ Williams, GW Skelton
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
252010
{BigMAC}:{Fine-Grained} Policy Analysis of Android Firmware
G Hernandez, DJ Tian, AS Yadav, BJ Williams, KRB Butler
29th USENIX Security Symposium (USENIX Security 20), 271-287, 2020
242020
Correlation analysis among java nano-patterns and software vulnerabilities
KZ Sultana, A Deo, BJ Williams
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
242017
A preliminary study examining relationships between nano-patterns and software security vulnerabilities
KZ Sultana, A Deo, BJ Williams
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
202016
A quality assurance approach to technical debt
Z Codabux, BJ Williams, N Niu
Proceedings of the International Conference on Software Engineering Research …, 2014
192014
Preliminary study on assessing software defects using nano-pattern detection
A Deo, BJ Williams
Proceedings of the 24th International Conference on Software Engineering and …, 2015
152015
Examination of the software architecture change characterization scheme using three empirical studies
BJ Williams, JC Carver
Empirical Software Engineering 19, 419-464, 2014
152014
Evaluating micro patterns and software metrics in vulnerability prediction
KZ Sultana, BJ Williams
2017 6th International Workshop on Software Mining (SoftwareMining), 40-47, 2017
142017
Characterizing software architecture changes: an initial study
BJ Williams, JC Carver
First International Symposium on Empirical Software Engineering and …, 2007
142007
Permpress: Machine learning-based pipeline to evaluate permissions in app privacy policies
MS Rahman, P Naghavi, B Kojusner, S Afroz, B Williams, S Rampazzi, ...
IEEE Access 10, 89248-89269, 2022
112022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20