Sciweavers

1040 search results - page 62 / 208
» The Role of Controlled Experiments in Software Engineering R...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CHI
2003
ACM
16 years 4 months ago
A context-aware experience sampling tool
A new software tool for user-interface development and assessment of ubiquitous computing applications is available for CHI researchers. The software permits researchers to use co...
Stephen S. Intille, John Rondoni, Chuck Kukla, Isa...
WER
2007
Springer
15 years 10 months ago
Test-case Driven versus Checklist-based Inspections of Software Requirements - An Experimental Evaluation
Software inspections have proved to be an effective means to find faults in different software artifacts, and the application of software inspections on requirements specification...
Nina Dzamashvili-Fogelström, Tony Gorschek
CHI
2005
ACM
16 years 4 months ago
Interrupted cognition and design for non-disruptiveness: the skilled memory approach
Interruptions have gained in importance as a topic in current HCI research. Through a series of experiments, we take a step toward analyzing the active role of human memory in con...
Antti Oulasvirta
ICSE
2007
IEEE-ACM
16 years 4 months ago
The Social Dynamics of Pair Programming
This paper presents data from a four month ethnographic study of professional pair programmers from two software development teams. Contrary to the current conception of pair prog...
Jan Chong, Tom Hurlbutt