var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=http://www.bibsonomy.org/bib/author/Harvey%20Siy?items=1000&jsonp=1&css=%27css/main.css%27&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=http://www.bibsonomy.org/bib/author/Harvey%20Siy?items=1000&jsonp=1&css=%27css/main.css%27\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=http://www.bibsonomy.org/bib/author/Harvey%20Siy?items=1000&jsonp=1&css=%27css/main.css%27\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Exploring the Potential of Frama-C in IoT Static Analysis.\n \n \n \n \n\n\n \n Tran, M. L. K.; King, W.; and Siy, H. P.\n\n\n \n\n\n\n In Wu, J.; Subramaniam, S.; Ji, B.; and Chiasserini, C., editor(s), MobiHoc, pages 436-441, 2023. ACM\n \n\n\n\n
\n\n\n\n \n \n \"ExploringLink\n  \n \n \n \"ExploringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/mobihoc/TranKS23,\n  added-at = {2023-10-27T00:00:00.000+0200},\n  author = {Tran, Minh Le Kim and King, William and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/25e048c0d341c0ec6986e46c087adc461/dblp},\n  booktitle = {MobiHoc},\n  crossref = {conf/mobihoc/2023},\n  editor = {Wu, Jie and Subramaniam, Suresh and Ji, Bo and Chiasserini, Carla-Fabiana},\n  ee = {https://doi.org/10.1145/3565287.3617617},\n  interhash = {7e223f854fa056c643dccc64548658b1},\n  intrahash = {5e048c0d341c0ec6986e46c087adc461},\n  isbn = {978-1-4503-9926-5},\n  keywords = {dblp},\n  pages = {436-441},\n  publisher = {ACM},\n  timestamp = {2024-04-09T11:19:46.000+0200},\n  title = {Exploring the Potential of Frama-C in IoT Static Analysis.},\n  url = {http://dblp.uni-trier.de/db/conf/mobihoc/mobihoc2023.html#TranKS23},\n  year = 2023\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SSDTutor: A feedback-driven intelligent tutoring system for secure software development.\n \n \n \n \n\n\n \n Newar, D. K. P.; Zhao, R.; Siy, H. P.; Soh, L.; and Song, M.\n\n\n \n\n\n\n Sci. Comput. Program., 227: 102933. 04 2023.\n \n\n\n\n
\n\n\n\n \n \n \"SSDTutor:Link\n  \n \n \n \"SSDTutor:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/scp/NewarZSSS23,\n  added-at = {2023-08-28T00:00:00.000+0200},\n  author = {Newar, Dip Kiran Pradhan and Zhao, Rui and Siy, Harvey P. and Soh, Leen-Kiat and Song, Myoungkyu},\n  biburl = {https://www.bibsonomy.org/bibtex/2d2b13766fd1eb93b23e45bb2ff1501f8/dblp},\n  ee = {https://www.wikidata.org/entity/Q121356549},\n  interhash = {cb5e3b8c40749c4de9cb984f43d0ef32},\n  intrahash = {d2b13766fd1eb93b23e45bb2ff1501f8},\n  journal = {Sci. Comput. Program.},\n  keywords = {dblp},\n  month = {04},\n  pages = 102933,\n  timestamp = {2024-04-09T05:27:56.000+0200},\n  title = {SSDTutor: A feedback-driven intelligent tutoring system for secure software development.},\n  url = {http://dblp.uni-trier.de/db/journals/scp/scp227.html#NewarZSSS23},\n  volume = 227,\n  year = 2023\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Statistical Method for API Usage Learning and API Misuse Violation Finding.\n \n \n \n \n\n\n \n Panda, D.; Basia, P.; Nallavolu, K.; Zhong, X.; Siy, H. P.; and Song, M.\n\n\n \n\n\n\n In SERA, pages 358-365, 2023. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ALink\n  \n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sera/PandaBNZSS23,\n  added-at = {2023-08-17T00:00:00.000+0200},\n  author = {Panda, Deepak and Basia, Piyush and Nallavolu, Kushal and Zhong, Xin and Siy, Harvey P. and Song, Myoungkyu},\n  biburl = {https://www.bibsonomy.org/bibtex/23782feac929ff006555aaf379723c17b/dblp},\n  booktitle = {SERA},\n  crossref = {conf/sera/2023},\n  ee = {https://doi.org/10.1109/SERA57763.2023.10197708},\n  interhash = {052784934afe5a8e47e26dc99ae4da21},\n  intrahash = {3782feac929ff006555aaf379723c17b},\n  isbn = {979-8-3503-4588-9},\n  keywords = {dblp},\n  pages = {358-365},\n  publisher = {IEEE},\n  timestamp = {2024-04-09T21:36:40.000+0200},\n  title = {A Statistical Method for API Usage Learning and API Misuse Violation Finding.},\n  url = {http://dblp.uni-trier.de/db/conf/sera/sera2023.html#PandaBNZSS23},\n  year = 2023\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An Intelligent Tutoring System for API Misuse Correction by Instant Quality Feedback.\n \n \n \n \n\n\n \n Zhao, R.; Siy, H. P.; Pack, C.; Soh, L.; and Song, M.\n\n\n \n\n\n\n In Leong, H. V.; Sarvestani, S. S.; Teranishi, Y.; Cuzzocrea, A.; Kashiwazaki, H.; Towey, D.; Yang, J.; and Shahriar, H., editor(s), COMPSAC, pages 123-128, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AnLink\n  \n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/compsac/ZhaoSPSS22,\n  added-at = {2023-02-12T00:00:00.000+0100},\n  author = {Zhao, Rui and Siy, Harvey P. and Pack, Chulwoo and Soh, Leen-Kiat and Song, Myoungkyu},\n  biburl = {https://www.bibsonomy.org/bibtex/2f4728862544afdbe666302ad3d6af7d2/dblp},\n  booktitle = {COMPSAC},\n  crossref = {conf/compsac/2022},\n  editor = {Leong, Hong Va and Sarvestani, Sahra Sedigh and Teranishi, Yuuichi and Cuzzocrea, Alfredo and Kashiwazaki, Hiroki and Towey, Dave and Yang, Ji-Jiang and Shahriar, Hossain},\n  ee = {https://doi.org/10.1109/COMPSAC54236.2022.00026},\n  interhash = {3bfba12c7d33035cf29df84a498c1287},\n  intrahash = {f4728862544afdbe666302ad3d6af7d2},\n  isbn = {978-1-6654-8810-5},\n  keywords = {dblp},\n  pages = {123-128},\n  publisher = {IEEE},\n  timestamp = {2024-04-09T16:54:34.000+0200},\n  title = {An Intelligent Tutoring System for API Misuse Correction by Instant Quality Feedback.},\n  url = {http://dblp.uni-trier.de/db/conf/compsac/compsac2022.html#ZhaoSPSS22},\n  year = 2022\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Feasibility Study of Using Code Clone Detection for Secure Programming Education.\n \n \n \n \n\n\n \n Menard, M.; Nelson, T.; Shahi, M.; Morton, H.; DeTavernier, A.; Siy, H. P.; Zhao, R.; and Song, M.\n\n\n \n\n\n\n In Leong, H. V.; Sarvestani, S. S.; Teranishi, Y.; Cuzzocrea, A.; Kashiwazaki, H.; Towey, D.; Yang, J.; and Shahriar, H., editor(s), COMPSAC, pages 1502-1507, 2022. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ALink\n  \n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/compsac/MenardNSMDSZS22,\n  added-at = {2022-10-14T00:00:00.000+0200},\n  author = {Menard, Michael and Nelson, Tommy and Shahi, Milan and Morton, Hugh and DeTavernier, Adam and Siy, Harvey P. and Zhao, Rui and Song, Myoungkyu},\n  biburl = {https://www.bibsonomy.org/bibtex/2beefa38ae2808e3ccbf0732ba836c048/dblp},\n  booktitle = {COMPSAC},\n  crossref = {conf/compsac/2022},\n  editor = {Leong, Hong Va and Sarvestani, Sahra Sedigh and Teranishi, Yuuichi and Cuzzocrea, Alfredo and Kashiwazaki, Hiroki and Towey, Dave and Yang, Ji-Jiang and Shahriar, Hossain},\n  ee = {https://doi.org/10.1109/COMPSAC54236.2022.00238},\n  interhash = {a1f8848496a0e3c46d87ef2f6f592847},\n  intrahash = {beefa38ae2808e3ccbf0732ba836c048},\n  isbn = {978-1-6654-8810-5},\n  keywords = {dblp},\n  pages = {1502-1507},\n  publisher = {IEEE},\n  timestamp = {2024-04-09T16:54:34.000+0200},\n  title = {A Feasibility Study of Using Code Clone Detection for Secure Programming Education.},\n  url = {http://dblp.uni-trier.de/db/conf/compsac/compsac2022.html#MenardNSMDSZS22},\n  year = 2022\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n FireBugs: Finding and Repairing Cryptography API Misuses in Mobile Applications.\n \n \n \n \n\n\n \n Singleton, L.; Zhao, R.; Siy, H. P.; and Song, M.\n\n\n \n\n\n\n In COMPSAC, pages 1194-1201, 2021. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"FireBugs:Link\n  \n \n \n \"FireBugs:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/compsac/SingletonZSS21,\n  added-at = {2022-10-14T00:00:00.000+0200},\n  author = {Singleton, Larry and Zhao, Rui and Siy, Harvey P. and Song, Myoungkyu},\n  biburl = {https://www.bibsonomy.org/bibtex/2e3eeb8300de04e747db5eb2044713e0b/dblp},\n  booktitle = {COMPSAC},\n  crossref = {conf/compsac/2021},\n  ee = {https://doi.org/10.1109/COMPSAC51774.2021.00165},\n  interhash = {1c48d071b192cf55e1395bb76d328162},\n  intrahash = {e3eeb8300de04e747db5eb2044713e0b},\n  isbn = {978-1-6654-2463-9},\n  keywords = {dblp},\n  pages = {1194-1201},\n  publisher = {IEEE},\n  timestamp = {2024-04-09T16:54:26.000+0200},\n  title = {FireBugs: Finding and Repairing Cryptography API Misuses in Mobile Applications.},\n  url = {http://dblp.uni-trier.de/db/conf/compsac/compsac2021.html#SingletonZSS21},\n  year = 2021\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Understanding User Engagement With Multi-Representational License Comprehension Interfaces.\n \n \n \n \n\n\n \n Avande, M. O.; Gandhi, R. A.; and Siy, H. P.\n\n\n \n\n\n\n Int. J. Open Source Softw. Process., 11(4): 27-45. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingLink\n  \n \n \n \"UnderstandingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/ijossp/AvandeGS20,\n  added-at = {2023-08-28T00:00:00.000+0200},\n  author = {Avande, Mahugnon Olivier and Gandhi, Robin A. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2d025b3109230f32755968495de19421c/dblp},\n  ee = {https://www.wikidata.org/entity/Q114928325},\n  interhash = {c35e614c0aa811b1dc066ab31980e2a2},\n  intrahash = {d025b3109230f32755968495de19421c},\n  journal = {Int. J. Open Source Softw. Process.},\n  keywords = {dblp},\n  number = 4,\n  pages = {27-45},\n  timestamp = {2024-04-08T16:08:21.000+0200},\n  title = {Understanding User Engagement With Multi-Representational License Comprehension Interfaces.},\n  url = {http://dblp.uni-trier.de/db/journals/ijossp/ijossp11.html#AvandeGS20},\n  volume = 11,\n  year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Interdisciplinary Approach for Teaching Artificial Intelligence to Computer Science Students.\n \n \n \n \n\n\n \n Mishra, A.; and Siy, H. P.\n\n\n \n\n\n\n In Khazanchi, D.; Siy, H. P.; Grispos, G.; and Setor, T. K., editor(s), SIGITE, pages 344, 2020. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AnLink\n  \n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sigite/MishraS20,\n  added-at = {2023-05-01T00:00:00.000+0200},\n  author = {Mishra, Anoop and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/220248951c3d26ee126b3b42110e99135/dblp},\n  booktitle = {SIGITE},\n  crossref = {conf/sigite/2020},\n  editor = {Khazanchi, Deepak and Siy, Harvey P. and Grispos, George and Setor, Tenace Kwaku},\n  ee = {https://doi.org/10.1145/3368308.3415440},\n  interhash = {e27fdf96cf1b108c8480c2efad01b708},\n  intrahash = {20248951c3d26ee126b3b42110e99135},\n  isbn = {978-1-4503-7045-5},\n  keywords = {dblp},\n  pages = 344,\n  publisher = {ACM},\n  timestamp = {2024-04-10T11:48:58.000+0200},\n  title = {An Interdisciplinary Approach for Teaching Artificial Intelligence to Computer Science Students.},\n  url = {http://dblp.uni-trier.de/db/conf/sigite/sigite2020.html#MishraS20},\n  year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CryptoTutor: Teaching Secure Coding Practices through Misuse Pattern Detection.\n \n \n \n \n\n\n \n Singleton, L.; Zhao, R.; Song, M.; and Siy, H. P.\n\n\n \n\n\n\n In Khazanchi, D.; Siy, H. P.; Grispos, G.; and Setor, T. K., editor(s), SIGITE, pages 403-408, 2020. ACM\n \n\n\n\n
\n\n\n\n \n \n \"CryptoTutor:Link\n  \n \n \n \"CryptoTutor:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sigite/SingletonZSS20,\n  added-at = {2022-10-14T00:00:00.000+0200},\n  author = {Singleton, Larry and Zhao, Rui and Song, Myoungkyu and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2df81b5c4225f742c39604d18a91240d9/dblp},\n  booktitle = {SIGITE},\n  crossref = {conf/sigite/2020},\n  editor = {Khazanchi, Deepak and Siy, Harvey P. and Grispos, George and Setor, Tenace Kwaku},\n  ee = {https://doi.org/10.1145/3368308.3415419},\n  interhash = {4e6be29f9e63a59c43648cdc8d586505},\n  intrahash = {df81b5c4225f742c39604d18a91240d9},\n  isbn = {978-1-4503-7045-5},\n  keywords = {dblp},\n  pages = {403-408},\n  publisher = {ACM},\n  timestamp = {2024-04-10T11:48:58.000+0200},\n  title = {CryptoTutor: Teaching Secure Coding Practices through Misuse Pattern Detection.},\n  url = {http://dblp.uni-trier.de/db/conf/sigite/sigite2020.html#SingletonZSS20},\n  year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modular norm models: practical representation and analysis of contractual rights and obligations.\n \n \n \n \n\n\n \n Mandal, S.; Gandhi, R. A.; and Siy, H. P.\n\n\n \n\n\n\n Requir. Eng., 25(3): 383-412. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"ModularLink\n  \n \n \n \"ModularPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/re/MandalGS20,\n  added-at = {2021-05-14T00:00:00.000+0200},\n  author = {Mandal, Sayonnha and Gandhi, Robin A. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2219ba9460fe040fff92197f76e88f9c3/dblp},\n  ee = {https://doi.org/10.1007/s00766-019-00323-y},\n  interhash = {5ba4cd9f2c08e459df23cf2f42cfe0f3},\n  intrahash = {219ba9460fe040fff92197f76e88f9c3},\n  journal = {Requir. Eng.},\n  keywords = {dblp},\n  number = 3,\n  pages = {383-412},\n  timestamp = {2024-04-08T14:26:30.000+0200},\n  title = {Modular norm models: practical representation and analysis of contractual rights and obligations.},\n  url = {http://dblp.uni-trier.de/db/journals/re/re25.html#MandalGS20},\n  volume = 25,\n  year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Modular norm models: practical representation and analysis of contractual rights and obligations.\n \n \n \n\n\n \n Mandal, S.; Gandhi, R.; and Siy, H.\n\n\n \n\n\n\n Requirements Engineering, 25(3): 383-412. 09 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Mandal_20,\n  added-at = {2020-11-16T00:29:59.000+0100},\n  author = {Mandal, Sayonnha and Gandhi, Robin and Siy, Harvey},\n  biburl = {https://www.bibsonomy.org/bibtex/28a16c2f40aa9cd2001ce2d742d0a5559/derek-jones},\n  data = {available},\n  interhash = {5ba4cd9f2c08e459df23cf2f42cfe0f3},\n  intrahash = {8a16c2f40aa9cd2001ce2d742d0a5559},\n  journal = {Requirements Engineering},\n  keywords = {imported},\n  month = {09},\n  number = 3,\n  online = {Modular_norm_models.pdf},\n  pages = {383-412},\n  timestamp = {2020-11-16T00:29:59.000+0100},\n  title = {Modular norm models: practical representation and analysis of contractual rights and obligations},\n  volume = 25,\n  year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Agro-AI Education: Artificial Intelligence for Future Farmers.\n \n \n \n \n\n\n \n Orn, D.; Duan, L.; Liang, Y.; Siy, H. P.; and Subramaniam, M.\n\n\n \n\n\n\n In Khazanchi, D.; Siy, H. P.; Grispos, G.; and Setor, T. K., editor(s), SIGITE, pages 54-57, 2020. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Agro-AILink\n  \n \n \n \"Agro-AIPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sigite/OrnDLSS20,\n  added-at = {2020-10-15T00:00:00.000+0200},\n  author = {Orn, Donovan and Duan, Lian and Liang, Yi and Siy, Harvey P. and Subramaniam, Mahadevan},\n  biburl = {https://www.bibsonomy.org/bibtex/2574d2d1410be359e341d74a1cd230719/dblp},\n  booktitle = {SIGITE},\n  crossref = {conf/sigite/2020},\n  editor = {Khazanchi, Deepak and Siy, Harvey P. and Grispos, George and Setor, Tenace Kwaku},\n  ee = {https://doi.org/10.1145/3368308.3415457},\n  interhash = {e0c92675654c1ecfbcb1d3afbca4dc86},\n  intrahash = {574d2d1410be359e341d74a1cd230719},\n  isbn = {978-1-4503-7045-5},\n  keywords = {dblp},\n  pages = {54-57},\n  publisher = {ACM},\n  timestamp = {2020-10-16T11:35:19.000+0200},\n  title = {Agro-AI Education: Artificial Intelligence for Future Farmers.},\n  url = {http://dblp.uni-trier.de/db/conf/sigite/sigite2020.html#OrnDLSS20},\n  year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Correction to: Modular norm models: practical representation and analysis of contractual rights and obligations.\n \n \n \n \n\n\n \n Mandal, S.; Gandhi, R. A.; and Siy, H. P.\n\n\n \n\n\n\n Requir. Eng., 25(3): 413. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"CorrectionLink\n  \n \n \n \"CorrectionPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/re/MandalGS20a,\n  added-at = {2020-10-06T00:00:00.000+0200},\n  author = {Mandal, Sayonnha and Gandhi, Robin A. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2c7f4f89f52e6ea2f903d602733380d40/dblp},\n  ee = {https://doi.org/10.1007/s00766-019-00327-8},\n  interhash = {0d738976bc6ef15602eb5986ece513e7},\n  intrahash = {c7f4f89f52e6ea2f903d602733380d40},\n  journal = {Requir. Eng.},\n  keywords = {dblp},\n  number = 3,\n  pages = 413,\n  timestamp = {2020-10-07T11:35:27.000+0200},\n  title = {Correction to: Modular norm models: practical representation and analysis of contractual rights and obligations.},\n  url = {http://dblp.uni-trier.de/db/journals/re/re25.html#MandalGS20a},\n  volume = 25,\n  year = 2020\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n FireBugs: finding and repairing bugs with security patterns.\n \n \n \n \n\n\n \n Singleton, L.; Zhao, R.; Song, M.; and Siy, H. P.\n\n\n \n\n\n\n In Tilevich, E., editor(s), MOBILESoft@ICSE, pages 30-34, 2019. IEEE / ACM\n \n\n\n\n
\n\n\n\n \n \n \"FireBugs:Link\n  \n \n \n \"FireBugs:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/SingletonZSS19,\n  added-at = {2022-10-14T00:00:00.000+0200},\n  author = {Singleton, Larry and Zhao, Rui and Song, Myoungkyu and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/27ba47cf2678273e5a2b586325e0b6f84/dblp},\n  booktitle = {MOBILESoft@ICSE},\n  crossref = {conf/icse/2019mobilesoft},\n  editor = {Tilevich, Eli},\n  ee = {https://dl.acm.org/citation.cfm?id=3340738},\n  interhash = {8e758adec1ff04f9f57b8903e3093169},\n  intrahash = {7ba47cf2678273e5a2b586325e0b6f84},\n  isbn = {978-1-7281-3395-9},\n  keywords = {dblp},\n  pages = {30-34},\n  publisher = {IEEE / ACM},\n  timestamp = {2024-04-10T11:37:11.000+0200},\n  title = {FireBugs: finding and repairing bugs with security patterns.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/mobilesoft2019.html#SingletonZSS19},\n  year = 2019\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n SPARCS: A personalized problem-based learning approach for developing successful computer science learning experiences in middle school.\n \n \n \n \n\n\n \n Siy, H. P.; Dorn, B.; Engelmann, C.; Grandgenett, N.; Reding, T. E.; Youn, J.; and Zhu, Q.\n\n\n \n\n\n\n In EIT, pages 611-616, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"SPARCS:Link\n  \n \n \n \"SPARCS:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/eit/SiyDEGRYZ17,\n  added-at = {2023-09-30T00:00:00.000+0200},\n  author = {Siy, Harvey P. and Dorn, Brian and Engelmann, Carol and Grandgenett, Neal and Reding, Tracie Evans and Youn, Jong-Hoon and Zhu, Qiuming},\n  biburl = {https://www.bibsonomy.org/bibtex/275bb75afd3cc1b44dc47af018a93f6a1/dblp},\n  booktitle = {EIT},\n  crossref = {conf/eit/2017},\n  ee = {https://doi.org/10.1109/EIT.2017.8053436},\n  interhash = {a9b5f294f7d37d073ea3a44cf95adf1e},\n  intrahash = {75bb75afd3cc1b44dc47af018a93f6a1},\n  isbn = {978-1-5090-4767-3},\n  keywords = {dblp},\n  pages = {611-616},\n  publisher = {IEEE},\n  timestamp = {2024-04-10T22:29:37.000+0200},\n  title = {SPARCS: A personalized problem-based learning approach for developing successful computer science learning experiences in middle school.},\n  url = {http://dblp.uni-trier.de/db/conf/eit/eit2017.html#SiyDEGRYZ17},\n  year = 2017\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Modular Norm Models: A Lightweight Approach for Modeling and Reasoning about Legal Compliance.\n \n \n \n \n\n\n \n Mandal, S.; Gandhi, R. A.; and Siy, H. P.\n\n\n \n\n\n\n In DASC/PiCom/DataCom/CyberSciTech, pages 657-662, 2017. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"ModularLink\n  \n \n \n \"ModularPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/dasc/MandalGS17,\n  added-at = {2023-03-23T00:00:00.000+0100},\n  author = {Mandal, Sayonnha and Gandhi, Robin A. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2657eec4d7c89ac1172653dcc5e47dd65/dblp},\n  booktitle = {DASC/PiCom/DataCom/CyberSciTech},\n  crossref = {conf/dasc/2017},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.115},\n  interhash = {abe9dd52f67963b9fc43a10849cb58de},\n  intrahash = {657eec4d7c89ac1172653dcc5e47dd65},\n  isbn = {978-1-5386-1956-8},\n  keywords = {dblp},\n  pages = {657-662},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T09:28:44.000+0200},\n  title = {Modular Norm Models: A Lightweight Approach for Modeling and Reasoning about Legal Compliance.},\n  url = {http://dblp.uni-trier.de/db/conf/dasc/dasc2017.html#MandalGS17},\n  year = 2017\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Identification of the Emergent Leaders within a CSE Professional Development Program.\n \n \n \n \n\n\n \n Reding, T. E.; Dorn, B.; Grandgenett, N.; Siy, H. P.; Youn, J.; Zhu, Q.; and Engelmann, C.\n\n\n \n\n\n\n In Vahrenhold, J.; and Barendsen, E., editor(s), WiPSCE, pages 37-44, 2016. ACM\n \n\n\n\n
\n\n\n\n \n \n \"IdentificationLink\n  \n \n \n \"IdentificationPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/wipsce/RedingDGSYZE16,\n  added-at = {2023-09-30T00:00:00.000+0200},\n  author = {Reding, Tracie Evans and Dorn, Brian and Grandgenett, Neal and Siy, Harvey P. and Youn, Jon and Zhu, Quiming and Engelmann, Carol},\n  biburl = {https://www.bibsonomy.org/bibtex/210128e2e00f8e7a3ff79a40ed3ff2f03/dblp},\n  booktitle = {WiPSCE},\n  crossref = {conf/wipsce/2016},\n  editor = {Vahrenhold, Jan and Barendsen, Erik},\n  ee = {https://doi.org/10.1145/2978249.2978254},\n  interhash = {d3a114d1635659f9a2b6af5317ca4f7d},\n  intrahash = {10128e2e00f8e7a3ff79a40ed3ff2f03},\n  isbn = {978-1-4503-4223-0},\n  keywords = {dblp},\n  pages = {37-44},\n  publisher = {ACM},\n  timestamp = {2024-04-10T04:17:41.000+0200},\n  title = {Identification of the Emergent Leaders within a CSE Professional Development Program.},\n  url = {http://dblp.uni-trier.de/db/conf/wipsce/wipsce2016.html#RedingDGSYZE16},\n  year = 2016\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security.\n \n \n \n \n\n\n \n Mandal, S.; Gandhi, R. A.; and Siy, H. P.\n\n\n \n\n\n\n In RELAW, pages 1-9, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"SemanticLink\n  \n \n \n \"SemanticPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/re/MandalGS15,\n  added-at = {2023-03-24T00:00:00.000+0100},\n  author = {Mandal, Sayonnha and Gandhi, Robin A. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/262511ec05ba4a888cb6a974cb77c15ea/dblp},\n  booktitle = {RELAW},\n  crossref = {conf/re/2015relaw},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/RELAW.2015.7330205},\n  interhash = {cce9a5b0660db01d2e8264dfd4abcfb5},\n  intrahash = {62511ec05ba4a888cb6a974cb77c15ea},\n  isbn = {978-1-5090-0104-0},\n  keywords = {dblp},\n  pages = {1-9},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T05:00:31.000+0200},\n  title = {Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security.},\n  url = {http://dblp.uni-trier.de/db/conf/re/relaw2015.html#MandalGS15},\n  year = 2015\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Semantics-based Automated Web Testing.\n \n \n \n \n\n\n \n Guo, H.; Ouyang, Q.; and Siy, H. P.\n\n\n \n\n\n\n In ter Beek, M. H.; and Lluch-Lafuente, A., editor(s), WWV, volume 188, of EPTCS, pages 59-74, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"Semantics-basedLink\n  \n \n \n \"Semantics-basedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{journals/corr/GuoOS15,\n  added-at = {2018-09-12T00:00:00.000+0200},\n  author = {Guo, Hai-Feng and Ouyang, Qing and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/28c1ff9a4b1f69ab44249252cd18be0bc/dblp},\n  booktitle = {WWV},\n  crossref = {journals/corr/BeekL15},\n  editor = {ter Beek, Maurice H. and Lluch-Lafuente, Alberto},\n  ee = {http://arxiv.org/abs/1508.03905},\n  interhash = {0429b46c6cb9252edbf75d0b41ea04ae},\n  intrahash = {8c1ff9a4b1f69ab44249252cd18be0bc},\n  keywords = {dblp},\n  pages = {59-74},\n  series = {EPTCS},\n  timestamp = {2018-11-15T15:42:50.000+0100},\n  title = {Semantics-based Automated Web Testing.},\n  url = {http://dblp.uni-trier.de/db/series/eptcs/eptcs188.html#GuoOS15},\n  volume = 188,\n  year = 2015\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Gauging the Impact of FISMA on Software Security.\n \n \n \n \n\n\n \n Gandhi, R. A.; Crosby, K.; Siy, H. P.; and Mandal, S.\n\n\n \n\n\n\n Computer, 47(9): 103-107. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"GaugingLink\n  \n \n \n \"GaugingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/computer/GandhiCSM14,\n  added-at = {2023-08-28T00:00:00.000+0200},\n  author = {Gandhi, Robin A. and Crosby, Keesha and Siy, Harvey P. and Mandal, Sayonnha},\n  biburl = {https://www.bibsonomy.org/bibtex/24efda6bdb06953523bdbfe5da60c7b6e/dblp},\n  ee = {https://www.wikidata.org/entity/Q114988386},\n  interhash = {ae1dbe2de27fd2814e81c602105568bb},\n  intrahash = {4efda6bdb06953523bdbfe5da60c7b6e},\n  journal = {Computer},\n  keywords = {dblp},\n  number = 9,\n  pages = {103-107},\n  timestamp = {2024-04-08T18:09:42.000+0200},\n  title = {Gauging the Impact of FISMA on Software Security.},\n  url = {http://dblp.uni-trier.de/db/journals/computer/computer47.html#GandhiCSM14},\n  volume = 47,\n  year = 2014\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Identifying Important Classes of Large Software Systems through k-Core Decomposition.\n \n \n \n \n\n\n \n Meyer, P.; Siy, H. P.; and Bhowmick, S.\n\n\n \n\n\n\n Adv. Complex Syst., 17(7-8). 2014.\n \n\n\n\n
\n\n\n\n \n \n \"IdentifyingLink\n  \n \n \n \"IdentifyingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/advcs/MeyerSB14,\n  added-at = {2020-10-08T00:00:00.000+0200},\n  author = {Meyer, P. and Siy, Harvey P. and Bhowmick, Sanjukta},\n  biburl = {https://www.bibsonomy.org/bibtex/2ba067c173a79aec237eead7c6007d74d/dblp},\n  ee = {https://doi.org/10.1142/S0219525915500046},\n  interhash = {d8412066a6267c2b652c34066e17299c},\n  intrahash = {ba067c173a79aec237eead7c6007d74d},\n  journal = {Adv. Complex Syst.},\n  keywords = {dblp},\n  number = {7-8},\n  timestamp = {2020-10-09T11:35:33.000+0200},\n  title = {Identifying Important Classes of Large Software Systems through k-Core Decomposition.},\n  url = {http://dblp.uni-trier.de/db/journals/advcs/advcs17.html#MeyerSB14},\n  volume = 17,\n  year = 2014\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Architectural reliability analysis of framework-intensive applications: A web service case study.\n \n \n \n \n\n\n \n Rahmani, M.; Azadmanesh, A. H.; and Siy, H. P.\n\n\n \n\n\n\n J. Syst. Softw., 94: 186-201. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"ArchitecturalLink\n  \n \n \n \"ArchitecturalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/jss/RahmaniAS14,\n  added-at = {2020-02-24T00:00:00.000+0100},\n  author = {Rahmani, M. and Azadmanesh, Azad H. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2a2e8e34f6e058fe4a1b9141c67929a55/dblp},\n  ee = {https://doi.org/10.1016/j.jss.2014.03.070},\n  interhash = {28bf2029de228076cb69975619d951b8},\n  intrahash = {a2e8e34f6e058fe4a1b9141c67929a55},\n  journal = {J. Syst. Softw.},\n  keywords = {dblp},\n  pages = {186-201},\n  timestamp = {2020-02-25T13:38:15.000+0100},\n  title = {Architectural reliability analysis of framework-intensive applications: A web service case study.},\n  url = {http://dblp.uni-trier.de/db/journals/jss/jss94.html#RahmaniAS14},\n  volume = 94,\n  year = 2014\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Locating fault-inducing patterns from structural inputs.\n \n \n \n \n\n\n \n Guo, H.; Qiu, Z.; and Siy, H. P.\n\n\n \n\n\n\n In Cho, Y.; Shin, S. Y.; Kim, S.; Hung, C.; and Hong, J., editor(s), SAC, pages 1100-1107, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"LocatingLink\n  \n \n \n \"LocatingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sac/GuoQS14,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Guo, Hai-Feng and Qiu, Zongyan and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/24c1db471a24204c71bfc49ed75dce87c/dblp},\n  booktitle = {SAC},\n  crossref = {conf/sac/2014},\n  editor = {Cho, Yookun and Shin, Sung Y. and Kim, Sang-Wook and Hung, Chih-Cheng and Hong, Jiman},\n  ee = {https://doi.org/10.1145/2554850.2554938},\n  interhash = {c2deb4f1e2ce7606b61ef869d3284a67},\n  intrahash = {4c1db471a24204c71bfc49ed75dce87c},\n  isbn = {978-1-4503-2469-4},\n  keywords = {dblp},\n  pages = {1100-1107},\n  publisher = {ACM},\n  timestamp = {2018-11-07T16:23:54.000+0100},\n  title = {Locating fault-inducing patterns from structural inputs.},\n  url = {http://dblp.uni-trier.de/db/conf/sac/sac2014.html#GuoQS14},\n  year = 2014\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Lightweight formal models of software weaknesses.\n \n \n \n \n\n\n \n Gandhi, R. A.; Siy, H. P.; and Wu, Y.\n\n\n \n\n\n\n In FormaliSE@ICSE, pages 50-56, 2013. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"LightweightLink\n  \n \n \n \"LightweightPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/GandhiSW13,\n  added-at = {2024-03-01T00:00:00.000+0100},\n  author = {Gandhi, Robin A. and Siy, Harvey P. and Wu, Yan},\n  biburl = {https://www.bibsonomy.org/bibtex/2ff8ffbc829ad6dd31f109a3d19189edb/dblp},\n  booktitle = {FormaliSE@ICSE},\n  crossref = {conf/icse/2013formalise},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/FormaliSE.2013.6612277},\n  interhash = {78973eb189e3fe120942ad6375ffd3e9},\n  intrahash = {ff8ffbc829ad6dd31f109a3d19189edb},\n  isbn = {978-1-4673-6292-4},\n  keywords = {dblp},\n  pages = {50-56},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T03:01:38.000+0200},\n  title = {Lightweight formal models of software weaknesses.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/formalise2013.html#GandhiSW13},\n  year = 2013\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Semi-Automatic Annotation of Natural Language Vulnerability Reports.\n \n \n \n \n\n\n \n Wu, Y.; Gandhi, R. A.; and Siy, H. P.\n\n\n \n\n\n\n Int. J. Secur. Softw. Eng., 4(3): 18-41. 2013.\n \n\n\n\n
\n\n\n\n \n \n \"Semi-AutomaticLink\n  \n \n \n \"Semi-AutomaticPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/ijsse/WuGS13,\n  added-at = {2024-03-01T00:00:00.000+0100},\n  author = {Wu, Yan and Gandhi, Robin A. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2edae48550ef6382c5440f51fd682a391/dblp},\n  ee = {https://www.wikidata.org/entity/Q120784694},\n  interhash = {0f7cf5b01d83e7e08affa8f89752d215},\n  intrahash = {edae48550ef6382c5440f51fd682a391},\n  journal = {Int. J. Secur. Softw. Eng.},\n  keywords = {dblp},\n  number = 3,\n  pages = {18-41},\n  timestamp = {2024-04-08T09:42:10.000+0200},\n  title = {Semi-Automatic Annotation of Natural Language Vulnerability Reports.},\n  url = {http://dblp.uni-trier.de/db/journals/ijsse/ijsse4.html#WuGS13},\n  volume = 4,\n  year = 2013\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Test-driven learning in high school computer science.\n \n \n \n \n\n\n \n Stejskal, R.; and Siy, H. P.\n\n\n \n\n\n\n In Cowling, T.; Bohner, S. A.; and Ardis, M. A., editor(s), CSEE&T, pages 289-293, 2013. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"Test-drivenLink\n  \n \n \n \"Test-drivenPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/csee/StejskalS13,\n  added-at = {2023-03-24T00:00:00.000+0100},\n  author = {Stejskal, Ryan and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/24418f5ba345351c661aee47fae155a24/dblp},\n  booktitle = {CSEE&T},\n  crossref = {conf/csee/2013},\n  editor = {Cowling, Tony and Bohner, Shawn A. and Ardis, Mark A.},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/CSEET.2013.6595263},\n  interhash = {4fdf3aabd16087375e014b05f18fe767},\n  intrahash = {4418f5ba345351c661aee47fae155a24},\n  keywords = {dblp},\n  pages = {289-293},\n  publisher = {IEEE},\n  timestamp = {2024-04-09T17:08:15.000+0200},\n  title = {Test-driven learning in high school computer science.},\n  url = {http://dblp.uni-trier.de/db/conf/csee/csee2013.html#StejskalS13},\n  year = 2013\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Concept to commit: A pattern designed to trace code changes from user requests to change implementation by analyzing mailing lists and code repositories.\n \n \n \n \n\n\n \n McGrath, S.; Bastola, K.; and Siy, H. P.\n\n\n \n\n\n\n In DAPSE@ICSE, pages 6-8, 2013. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"ConceptLink\n  \n \n \n \"ConceptPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/McGrathBS13,\n  added-at = {2023-03-23T00:00:00.000+0100},\n  author = {McGrath, Scott and Bastola, Kiran and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2f51f8a4c18e8a4a2f50e29a3df7441e2/dblp},\n  booktitle = {DAPSE@ICSE},\n  crossref = {conf/icse/2013dapse},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/DAPSE.2013.6603799},\n  interhash = {ffd15366994d1168aecac1d76660aab3},\n  intrahash = {f51f8a4c18e8a4a2f50e29a3df7441e2},\n  keywords = {dblp},\n  pages = {6-8},\n  publisher = {IEEE},\n  timestamp = {2024-04-10T14:34:41.000+0200},\n  title = {Concept to commit: A pattern designed to trace code changes from user requests to change implementation by analyzing mailing lists and code repositories.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/dapse2013.html#McGrathBS13},\n  year = 2013\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Chicken and the Pig: User Involvement in Developing Usability Heuristics.\n \n \n \n \n\n\n \n Lechner, B.; Fruhling, A. L.; Petter, S.; and Siy, H. P.\n\n\n \n\n\n\n In AMCIS, 2013. Association for Information Systems\n \n\n\n\n
\n\n\n\n \n \n \"TheLink\n  \n \n \n \"ThePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/amcis/LechnerFPS13,\n  added-at = {2014-07-01T00:00:00.000+0200},\n  author = {Lechner, Bettina and Fruhling, Ann L. and Petter, Stacie and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2bea0d582b9fcd03545677a9ff16a948e/dblp},\n  booktitle = {AMCIS},\n  crossref = {conf/amcis/2013},\n  ee = {http://aisel.aisnet.org/amcis2013/HumanComputerInteraction/GeneralPresentations/14},\n  interhash = {a66a1ea9d8a3791314b1d1bd0584f682},\n  intrahash = {bea0d582b9fcd03545677a9ff16a948e},\n  keywords = {dblp},\n  publisher = {Association for Information Systems},\n  timestamp = {2015-06-19T00:32:04.000+0200},\n  title = {The Chicken and the Pig: User Involvement in Developing Usability Heuristics.},\n  url = {http://dblp.uni-trier.de/db/conf/amcis/amcis2013.html#LechnerFPS13},\n  year = 2013\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Petri Net Modeling of Application Server Performance for Web Services.\n \n \n \n \n\n\n \n Rahmani, M.; Azadmanesh, A. H.; and Siy, H. P.\n\n\n \n\n\n\n In SEKE, pages 305-310, 2012. Knowledge Systems Institute Graduate School\n \n\n\n\n
\n\n\n\n \n \n \"PetriLink\n  \n \n \n \"PetriPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/seke/RahmaniAS12,\n  added-at = {2012-08-20T00:00:00.000+0200},\n  author = {Rahmani, M. and Azadmanesh, Azad H. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2d8d0a620a11886b2435bcad67be36f2c/dblp},\n  booktitle = {SEKE},\n  crossref = {conf/seke/2012},\n  ee = {http://ksiresearchorg.ipage.com/seke/Proceedings/seke/SEKE2012_Proceedings.pdf},\n  interhash = {95b68941276de8d19920ad27280d3c5c},\n  intrahash = {d8d0a620a11886b2435bcad67be36f2c},\n  isbn = {1-891706-31-4},\n  keywords = {dblp},\n  pages = {305-310},\n  publisher = {Knowledge Systems Institute Graduate School},\n  timestamp = {2020-03-13T12:22:02.000+0100},\n  title = {Petri Net Modeling of Application Server Performance for Web Services.},\n  url = {http://dblp.uni-trier.de/db/conf/seke/seke2012.html#RahmaniAS12},\n  year = 2012\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Empirical results on the study of software vulnerabilities.\n \n \n \n \n\n\n \n Wu, Y.; Siy, H. P.; and Gandhi, R. A.\n\n\n \n\n\n\n In Taylor, R. N.; Gall, H. C.; and Medvidovic, N., editor(s), ICSE, pages 964-967, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"EmpiricalLink\n  \n \n \n \"EmpiricalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/WuSG11,\n  added-at = {2024-03-01T00:00:00.000+0100},\n  author = {Wu, Yan and Siy, Harvey P. and Gandhi, Robin A.},\n  biburl = {https://www.bibsonomy.org/bibtex/28d8a7ddd1ae02314d1854ed148604d53/dblp},\n  booktitle = {ICSE},\n  crossref = {conf/icse/2011},\n  editor = {Taylor, Richard N. and Gall, Harald C. and Medvidovic, Nenad},\n  ee = {https://doi.org/10.1145/1985793.1985960},\n  interhash = {6bbcefc42f322d14d40d8d0899b2774c},\n  intrahash = {8d8a7ddd1ae02314d1854ed148604d53},\n  isbn = {978-1-4503-0445-0},\n  keywords = {dblp},\n  pages = {964-967},\n  publisher = {ACM},\n  timestamp = {2024-04-10T05:37:25.000+0200},\n  title = {Empirical results on the study of software vulnerabilities.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/icse2011.html#WuSG11},\n  year = 2011\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Measuring disruption from software evolution activities using graph-based metrics.\n \n \n \n \n\n\n \n Paymal, P.; Patil, R.; Bhowmick, S.; and Siy, H. P.\n\n\n \n\n\n\n In ICSM, pages 532-535, 2011. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"MeasuringLink\n  \n \n \n \"MeasuringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icsm/PaymalPBS11,\n  added-at = {2023-03-24T00:00:00.000+0100},\n  author = {Paymal, Prashant and Patil, Rajvardhan and Bhowmick, Sanjukta and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/21a146861e59d412213e321c9da970bd1/dblp},\n  booktitle = {ICSM},\n  crossref = {conf/icsm/2011},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/ICSM.2011.6080825},\n  interhash = {bf94c0632e1e67e3f46d73f01018b7e0},\n  intrahash = {1a146861e59d412213e321c9da970bd1},\n  isbn = {978-1-4577-0663-9},\n  keywords = {dblp},\n  pages = {532-535},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T22:04:14.000+0200},\n  title = {Measuring disruption from software evolution activities using graph-based metrics.},\n  url = {http://dblp.uni-trier.de/db/conf/icsm/icsm2011.html#PaymalPBS11},\n  year = 2011\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Applying Environmental Factors to Trust Algorithms in Competitive Multi-Agent Systems.\n \n \n \n \n\n\n \n de Freitas, M.; Siy, H. P.; and Zand, M.\n\n\n \n\n\n\n J. Softw., 6(11): 2263-2270. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"ApplyingLink\n  \n \n \n \"ApplyingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/jsw/FreitasSZ11,\n  added-at = {2020-09-15T00:00:00.000+0200},\n  author = {de Freitas, Michael and Siy, Harvey P. and Zand, Mansour},\n  biburl = {https://www.bibsonomy.org/bibtex/2b8f608b47b490e8ec42d47ebd7769a6b/dblp},\n  ee = {http://www.jsoftware.us/show-107-1849-1.html},\n  interhash = {89d450f4f01bc22c90463eda3e962e51},\n  intrahash = {b8f608b47b490e8ec42d47ebd7769a6b},\n  journal = {J. Softw.},\n  keywords = {dblp},\n  number = 11,\n  pages = {2263-2270},\n  timestamp = {2020-09-16T11:39:36.000+0200},\n  title = {Applying Environmental Factors to Trust Algorithms in Competitive Multi-Agent Systems.},\n  url = {http://dblp.uni-trier.de/db/journals/jsw/jsw6.html#FreitasSZ11},\n  volume = 6,\n  year = 2011\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Ontology-based product line modeling and generation.\n \n \n \n \n\n\n \n Siy, H. P.; Wolfson, A.; and Zand, M.\n\n\n \n\n\n\n In Rubin, J.; Botterweck, G.; Pleuss, A.; and Weiss, D. M., editor(s), PLEASE@ICSE, pages 50-54, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Ontology-basedLink\n  \n \n \n \"Ontology-basedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/SiyWZ11,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Siy, Harvey P. and Wolfson, Aaron and Zand, Mansour},\n  biburl = {https://www.bibsonomy.org/bibtex/2108c0115874ebec7dc7379a81f313832/dblp},\n  booktitle = {PLEASE@ICSE},\n  crossref = {conf/icse/2011please},\n  editor = {Rubin, Julia and Botterweck, Goetz and Pleuss, Andreas and Weiss, David M.},\n  ee = {https://doi.org/10.1145/1985484.1985497},\n  interhash = {3fc888d2dded4e2ca9330b17cb2f9296},\n  intrahash = {108c0115874ebec7dc7379a81f313832},\n  isbn = {978-1-4503-0584-6},\n  keywords = {dblp},\n  pages = {50-54},\n  publisher = {ACM},\n  timestamp = {2024-04-10T00:11:00.000+0200},\n  title = {Ontology-based product line modeling and generation.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/please2011.html#SiyWZ11},\n  year = 2011\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Architecture-based reliability analysis of web services in multilayer environment.\n \n \n \n \n\n\n \n Rahmani, M.; Azadmanesh, A. H.; and Siy, H. P.\n\n\n \n\n\n\n In Carro, M.; Karastoyanova, D.; Lewis, G. A.; and Liu, A., editor(s), PESOS@ICSE, pages 57-60, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Architecture-basedLink\n  \n \n \n \"Architecture-basedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/RahmaniAS11,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Rahmani, M. and Azadmanesh, Azad H. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/20c862e88a73b0916434f2e82d5b76be9/dblp},\n  booktitle = {PESOS@ICSE},\n  crossref = {conf/icse/2011pesos},\n  editor = {Carro, Manuel and Karastoyanova, Dimka and Lewis, Grace A. and Liu, Anna},\n  ee = {https://doi.org/10.1145/1985394.1985403},\n  interhash = {d4f1791bca427520c3c99a9e4c432f39},\n  intrahash = {0c862e88a73b0916434f2e82d5b76be9},\n  isbn = {978-1-4503-0591-4},\n  keywords = {dblp},\n  pages = {57-60},\n  publisher = {ACM},\n  timestamp = {2018-11-07T15:11:49.000+0100},\n  title = {Architecture-based reliability analysis of web services in multilayer environment.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/pesos2011.html#RahmaniAS11},\n  year = 2011\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Measuring the effects of aspect-oriented refactoring on component relationships: two case studies.\n \n \n \n \n\n\n \n Yokomori, R.; Siy, H. P.; Yoshida, N.; Noro, M.; and Inoue, K.\n\n\n \n\n\n\n In Borba, P.; and Chiba, S., editor(s), AOSD, pages 215-226, 2011. ACM\n \n\n\n\n
\n\n\n\n \n \n \"MeasuringLink\n  \n \n \n \"MeasuringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/aosd/YokomoriSYNI11,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Yokomori, Reishi and Siy, Harvey P. and Yoshida, Norihiro and Noro, Masami and Inoue, Katsuro},\n  biburl = {https://www.bibsonomy.org/bibtex/2fb6621b7cf7d13b29e20d0c37e86a367/dblp},\n  booktitle = {AOSD},\n  crossref = {conf/aosd/2011},\n  editor = {Borba, Paulo and Chiba, Shigeru},\n  ee = {https://doi.org/10.1145/1960275.1960301},\n  interhash = {f343e42d8e4b8af1cf073afefc9bc57f},\n  intrahash = {fb6621b7cf7d13b29e20d0c37e86a367},\n  isbn = {978-1-4503-0605-8},\n  keywords = {dblp},\n  pages = {215-226},\n  publisher = {ACM},\n  timestamp = {2018-11-07T16:02:04.000+0100},\n  title = {Measuring the effects of aspect-oriented refactoring on component relationships: two case studies.},\n  url = {http://dblp.uni-trier.de/db/conf/aosd/aosd2011.html#YokomoriSYNI11},\n  year = 2011\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n The Tyranny of the Vital Few: The Pareto Principle in Language Design.\n \n \n \n \n\n\n \n Winter, V. L.; Perry, J. T.; Siy, H. P.; Srinivasan, S. M.; Farkas, B.; and McCoy, J. A.\n\n\n \n\n\n\n JSEA, 4(3): 146-155. 2011.\n \n\n\n\n
\n\n\n\n \n \n \"TheLink\n  \n \n \n \"ThePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/jsea/WinterPSSFM11,\n  added-at = {2018-08-14T00:00:00.000+0200},\n  author = {Winter, Victor L. and Perry, James T. and Siy, Harvey P. and Srinivasan, Satish Mahadevan and Farkas, Ben and McCoy, James A.},\n  biburl = {https://www.bibsonomy.org/bibtex/213b45d48d2f0468af424a79e5f40e805/dblp},\n  ee = {https://doi.org/10.4236/jsea.2011.43016},\n  interhash = {f2d9e6fb1efe4b72ff8f45d29d23dcfd},\n  intrahash = {13b45d48d2f0468af424a79e5f40e805},\n  journal = {JSEA},\n  keywords = {dblp},\n  number = 3,\n  pages = {146-155},\n  timestamp = {2018-08-15T11:48:16.000+0200},\n  title = {The Tyranny of the Vital Few: The Pareto Principle in Language Design.},\n  url = {http://dblp.uni-trier.de/db/journals/jsea/jsea4.html#WinterPSSFM11},\n  volume = 4,\n  year = 2011\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Using semantic templates to study vulnerabilities recorded in large software repositories.\n \n \n \n \n\n\n \n Wu, Y.; Gandhi, R. A.; and Siy, H. P.\n\n\n \n\n\n\n In Lee, S.; Monga, M.; and Jürjens, J., editor(s), SESS@ICSE, pages 22-28, 2010. ACM\n \n\n\n\n
\n\n\n\n \n \n \"UsingLink\n  \n \n \n \"UsingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/WuGS10,\n  added-at = {2024-03-01T00:00:00.000+0100},\n  author = {Wu, Yan and Gandhi, Robin A. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/292e818db7faca854e11888f11535980d/dblp},\n  booktitle = {SESS@ICSE},\n  crossref = {conf/icse/2010sess},\n  editor = {Lee, Seok-Won and Monga, Mattia and Jürjens, Jan},\n  ee = {https://doi.org/10.1145/1809100.1809104},\n  interhash = {1c3c6ca89741a7b1cc8b51c7397e777a},\n  intrahash = {92e818db7faca854e11888f11535980d},\n  isbn = {978-1-60558-965-7},\n  keywords = {dblp},\n  pages = {22-28},\n  publisher = {ACM},\n  timestamp = {2024-04-10T21:51:39.000+0200},\n  title = {Using semantic templates to study vulnerabilities recorded in large software repositories.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/sess2010.html#WuGS10},\n  year = 2010\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Architecture-Based Reliability Modeling of Web Services Using Petri Nets.\n \n \n \n \n\n\n \n Rahmani, C.; Azadmanesh, A. H.; and Siy, H. P.\n\n\n \n\n\n\n In HASE, pages 164-165, 2010. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"Architecture-BasedLink\n  \n \n \n \"Architecture-BasedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/hase/RahmaniAS10,\n  added-at = {2023-03-24T00:00:00.000+0100},\n  author = {Rahmani, Cobra and Azadmanesh, Azad H. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/207a52214fc198aac48e08a211fce9ca6/dblp},\n  booktitle = {HASE},\n  crossref = {conf/hase/2010},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/HASE.2010.18},\n  interhash = {41ee9773d2f368fc75fbfd7c428ddc52},\n  intrahash = {07a52214fc198aac48e08a211fce9ca6},\n  isbn = {978-1-4244-9091-2},\n  keywords = {dblp},\n  pages = {164-165},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T18:23:48.000+0200},\n  title = {Architecture-Based Reliability Modeling of Web Services Using Petri Nets.},\n  url = {http://dblp.uni-trier.de/db/conf/hase/hase2010.html#RahmaniAS10},\n  year = 2010\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Assessing the impact of refactoring activities on the JHotDraw project.\n \n \n \n \n\n\n \n Thapa, I.; and Siy, H. P.\n\n\n \n\n\n\n In Shin, S. Y.; Ossowski, S.; Schumacher, M.; Palakal, M. J.; and Hung, C., editor(s), SAC, pages 2369-2370, 2010. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AssessingLink\n  \n \n \n \"AssessingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sac/ThapaS10,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Thapa, Ishwor and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2505eeaf4186ff3baad7fdf78ee627770/dblp},\n  booktitle = {SAC},\n  crossref = {conf/sac/2010},\n  editor = {Shin, Sung Y. and Ossowski, Sascha and Schumacher, Michael and Palakal, Mathew J. and Hung, Chih-Cheng},\n  ee = {https://doi.org/10.1145/1774088.1774578},\n  interhash = {d7ab74d6fda4c94337a4f5698ef36408},\n  intrahash = {505eeaf4186ff3baad7fdf78ee627770},\n  isbn = {978-1-60558-639-7},\n  keywords = {dblp},\n  pages = {2369-2370},\n  publisher = {ACM},\n  timestamp = {2019-06-04T12:58:30.000+0200},\n  title = {Assessing the impact of refactoring activities on the JHotDraw project.},\n  url = {http://dblp.uni-trier.de/db/conf/sac/sac2010.html#ThapaS10},\n  year = 2010\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Assessing the impact of framework changes using component ranking.\n \n \n \n \n\n\n \n Yokomori, R.; Siy, H. P.; Noro, M.; and Inoue, K.\n\n\n \n\n\n\n In ICSM, pages 189-198, 2009. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AssessingLink\n  \n \n \n \"AssessingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icsm/YokomoriSNI09,\n  added-at = {2023-03-24T00:00:00.000+0100},\n  author = {Yokomori, Reishi and Siy, Harvey P. and Noro, Masami and Inoue, Katsuro},\n  biburl = {https://www.bibsonomy.org/bibtex/240ecb1d59a073afd39e335664e883dcb/dblp},\n  booktitle = {ICSM},\n  crossref = {conf/icsm/2009},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/ICSM.2009.5306323},\n  interhash = {232acc0c4ce3f5abb57cd33781ed2095},\n  intrahash = {40ecb1d59a073afd39e335664e883dcb},\n  isbn = {978-1-4244-4897-5},\n  keywords = {dblp},\n  pages = {189-198},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T22:03:36.000+0200},\n  title = {Assessing the impact of framework changes using component ranking.},\n  url = {http://dblp.uni-trier.de/db/conf/icsm/icsm2009.html#YokomoriSNI09},\n  year = 2009\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Making aspect-orientation accessible through syntax-based language composition.\n \n \n \n \n\n\n \n Kniesel, G.; Winter, V. L.; Siy, H. P.; and Zand, M.\n\n\n \n\n\n\n IET Softw., 3(3): 219-237. 2009.\n \n\n\n\n
\n\n\n\n \n \n \"MakingLink\n  \n \n \n \"MakingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/iee/KnieselWSZ09,\n  added-at = {2020-05-22T00:00:00.000+0200},\n  author = {Kniesel, Günter and Winter, Victor L. and Siy, Harvey P. and Zand, Mansour},\n  biburl = {https://www.bibsonomy.org/bibtex/2bcffdbba2ca879e7490506b20f4cdf5c/dblp},\n  ee = {https://doi.org/10.1049/iet-sen.2007.0125},\n  interhash = {eed34159fc8f6e9abeb1bfff579022b6},\n  intrahash = {bcffdbba2ca879e7490506b20f4cdf5c},\n  journal = {IET Softw.},\n  keywords = {dblp},\n  number = 3,\n  pages = {219-237},\n  timestamp = {2020-05-23T11:55:42.000+0200},\n  title = {Making aspect-orientation accessible through syntax-based language composition.},\n  url = {http://dblp.uni-trier.de/db/journals/iet-sen/iet-sen3.html#KnieselWSZ09},\n  volume = 3,\n  year = 2009\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Survey on Model Driven Software Development.\n \n \n \n \n\n\n \n Rahmani, C.; Zand, M.; Siy, H. P.; and Srinivasan, S. M.\n\n\n \n\n\n\n In SEDE, pages 105-110, 2009. ISCA\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sede/RahmaniZSS09,\n  added-at = {2009-07-06T00:00:00.000+0200},\n  author = {Rahmani, Cobra and Zand, Mansour and Siy, Harvey P. and Srinivasan, Satish Mahadevan},\n  biburl = {https://www.bibsonomy.org/bibtex/2b894059af7ccdecacd2dfad654084b30/dblp},\n  booktitle = {SEDE},\n  crossref = {conf/sede/2009},\n  date = {2009-07-06},\n  description = {dblp},\n  interhash = {26fbead53273be9e4a85e3408f51c887},\n  intrahash = {b894059af7ccdecacd2dfad654084b30},\n  keywords = {dblp},\n  pages = {105-110},\n  publisher = {ISCA},\n  timestamp = {2009-07-16T14:49:47.000+0200},\n  title = {A Survey on Model Driven Software Development.},\n  url = {http://dblp.uni-trier.de/db/conf/sede/sede2009.html#RahmaniZSS09},\n  year = 2009\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Discovering Meaningful Clusters from Mining the Software Engineering Literature.\n \n \n \n \n\n\n \n Wu, Y.; Siy, H. P.; and Fan, L.\n\n\n \n\n\n\n In SEKE, pages 613-618, 2008. Knowledge Systems Institute Graduate School\n \n\n\n\n
\n\n\n\n \n \n \"DiscoveringLink\n  \n \n \n \"DiscoveringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/seke/WuSF08,\n  added-at = {2024-03-01T00:00:00.000+0100},\n  author = {Wu, Yan and Siy, Harvey P. and Fan, Li},\n  biburl = {https://www.bibsonomy.org/bibtex/2debe052c3b321e9d997fe41974e84e4f/dblp},\n  booktitle = {SEKE},\n  crossref = {conf/seke/2008},\n  ee = {http://ksiresearchorg.ipage.com/seke/Proceedings/seke/SEKE2008_Proceedings.pdf},\n  interhash = {a7a7b047734729f3e2e9ba6aca08987e},\n  intrahash = {debe052c3b321e9d997fe41974e84e4f},\n  isbn = {1-891706-22-5},\n  keywords = {dblp},\n  pages = {613-618},\n  publisher = {Knowledge Systems Institute Graduate School},\n  timestamp = {2024-04-10T20:46:01.000+0200},\n  title = {Discovering Meaningful Clusters from Mining the Software Engineering Literature.},\n  url = {http://dblp.uni-trier.de/db/conf/seke/seke2008.html#WuSF08},\n  year = 2008\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Summarizing developer work history using time series segmentation: challenge report.\n \n \n \n \n\n\n \n Siy, H. P.; Chundi, P.; and Subramaniam, M.\n\n\n \n\n\n\n In Hassan, A. E.; Lanza, M.; and Godfrey, M. W., editor(s), MSR, pages 137-140, 2008. ACM\n \n\n\n\n
\n\n\n\n \n \n \"SummarizingLink\n  \n \n \n \"SummarizingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/msr/SiyCS08,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Siy, Harvey P. and Chundi, Parvathi and Subramaniam, Mahadevan},\n  biburl = {https://www.bibsonomy.org/bibtex/2177220f545555154cd5e6c06c6f7fd4f/dblp},\n  booktitle = {MSR},\n  crossref = {conf/msr/2008},\n  editor = {Hassan, Ahmed E. and Lanza, Michele and Godfrey, Michael W.},\n  ee = {https://doi.org/10.1145/1370750.1370784},\n  interhash = {dc8c368e730a8df4b0440b377e3c257d},\n  intrahash = {177220f545555154cd5e6c06c6f7fd4f},\n  isbn = {978-1-60558-024-1},\n  keywords = {dblp},\n  pages = {137-140},\n  publisher = {ACM},\n  timestamp = {2018-11-07T13:09:10.000+0100},\n  title = {Summarizing developer work history using time series segmentation: challenge report.},\n  url = {http://dblp.uni-trier.de/db/conf/msr/msr2008.html#SiyCS08},\n  year = 2008\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A segmentation-based approach for temporal analysis of software version repositories.\n \n \n \n \n\n\n \n Siy, H. P.; Chundi, P.; Rosenkrantz, D. J.; and Subramaniam, M.\n\n\n \n\n\n\n Journal of Software Maintenance, 20(3): 199-222. 2008.\n \n\n\n\n
\n\n\n\n \n \n \"ALink\n  \n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/smr/SiyCRS08,\n  added-at = {2008-11-19T00:00:00.000+0100},\n  author = {Siy, Harvey P. and Chundi, Parvathi and Rosenkrantz, Daniel J. and Subramaniam, Mahadevan},\n  biburl = {https://www.bibsonomy.org/bibtex/28544f0b50d444124448cc7d1ef8945b1/dblp},\n  date = {2008-11-19},\n  description = {dblp},\n  ee = {http://dx.doi.org/10.1002/smr.368},\n  interhash = {2627a3c4c7bfad6208f6c323e2238d29},\n  intrahash = {8544f0b50d444124448cc7d1ef8945b1},\n  journal = {Journal of Software Maintenance},\n  keywords = {dblp},\n  number = 3,\n  pages = {199-222},\n  timestamp = {2008-11-20T11:35:53.000+0100},\n  title = {A segmentation-based approach for temporal analysis of software version repositories.},\n  url = {http://dblp.uni-trier.de/db/journals/smr/smr20.html#SiyCRS08},\n  volume = 20,\n  year = 2008\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Construction of Ontology-Based Software Repositories by Text Mining.\n \n \n \n \n\n\n \n Wu, Y.; Siy, H. P.; Zand, M.; and Winter, V. L.\n\n\n \n\n\n\n In Shi, Y.; van Albada, G. D.; Dongarra, J. J.; and Sloot, P. M. A., editor(s), International Conference on Computational Science (3), volume 4489, of Lecture Notes in Computer Science, pages 790-797, 2007. Springer\n \n\n\n\n
\n\n\n\n \n \n \"ConstructionLink\n  \n \n \n \"ConstructionPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/iccS/WuSZW07,\n  added-at = {2024-03-01T00:00:00.000+0100},\n  author = {Wu, Yan and Siy, Harvey P. and Zand, Mansour and Winter, Victor L.},\n  biburl = {https://www.bibsonomy.org/bibtex/26ea9e269491a28853ebe7f107085e3b7/dblp},\n  booktitle = {International Conference on Computational Science (3)},\n  crossref = {conf/iccS/2007-3},\n  editor = {Shi, Yong and van Albada, G. Dick and Dongarra, Jack J. and Sloot, Peter M. A.},\n  ee = {https://doi.org/10.1007/978-3-540-72588-6_128},\n  interhash = {347a9abcae9f615f9c77a72f3c717280},\n  intrahash = {6ea9e269491a28853ebe7f107085e3b7},\n  isbn = {978-3-540-72587-9},\n  keywords = {dblp},\n  pages = {790-797},\n  publisher = {Springer},\n  series = {Lecture Notes in Computer Science},\n  timestamp = {2024-04-09T20:38:18.000+0200},\n  title = {Construction of Ontology-Based Software Repositories by Text Mining.},\n  url = {http://dblp.uni-trier.de/db/conf/iccS/iccS2007-3.html#WuSZW07},\n  volume = 4489,\n  year = 2007\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Consistently Incorporating Changes to Evolve Transition-based Systems.\n \n \n \n \n\n\n \n Subramaniam, M.; and Siy, H. P.\n\n\n \n\n\n\n In Krikhaar, R. L.; Verhoef, C.; and Lucca, G. A. D., editor(s), CSMR, pages 17-26, 2007. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"ConsistentlyLink\n  \n \n \n \"ConsistentlyPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/csmr/SubramaniamS07,\n  added-at = {2023-03-24T00:00:00.000+0100},\n  author = {Subramaniam, Mahadevan and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2919cb08235f53b93578ff5a0a96ff273/dblp},\n  booktitle = {CSMR},\n  crossref = {conf/csmr/2007},\n  editor = {Krikhaar, René L. and Verhoef, Chris and Lucca, Giuseppe A. Di},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/CSMR.2007.20},\n  interhash = {375b6f81574abac96db8f8ef5f32bc86},\n  intrahash = {919cb08235f53b93578ff5a0a96ff273},\n  isbn = {0-7695-2802-3},\n  keywords = {dblp},\n  pages = {17-26},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T12:08:17.000+0200},\n  title = {Consistently Incorporating Changes to Evolve Transition-based Systems.},\n  url = {http://dblp.uni-trier.de/db/conf/csmr/csmr2007.html#SubramaniamS07},\n  year = 2007\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Aspectual Support for Specifying Requirements in Software Product Lines.\n \n \n \n \n\n\n \n Siy, H. P.; Aryal, P.; Winter, V. L.; and Zand, M.\n\n\n \n\n\n\n In EA@ICSE, pages 2, 2007. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"AspectualLink\n  \n \n \n \"AspectualPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/SiyAWZ07,\n  added-at = {2021-12-21T00:00:00.000+0100},\n  author = {Siy, Harvey P. and Aryal, Prasanna and Winter, Victor L. and Zand, Mansour},\n  biburl = {https://www.bibsonomy.org/bibtex/29f003786adaf47ff9bef76085634c8ec/dblp},\n  booktitle = {EA@ICSE},\n  crossref = {conf/icse/2007ea},\n  ee = {https://doi.org/10.1109/EARLYASPECTS.2007.4},\n  interhash = {c1a76258e385c5d6d25b870c1ba4dcc2},\n  intrahash = {9f003786adaf47ff9bef76085634c8ec},\n  isbn = {0-7695-2957-7},\n  keywords = {dblp},\n  pages = 2,\n  publisher = {IEEE},\n  timestamp = {2024-04-10T00:12:45.000+0200},\n  title = {Aspectual Support for Specifying Requirements in Software Product Lines.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/ea2007.html#SiyAWZ07},\n  year = 2007\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ERTSAL: a prototype of a domain-specific aspect language for analysis of embedded real-time systems.\n \n \n \n \n\n\n \n Sousan, W. L.; Winter, V. L.; Zand, M.; and Siy, H. P.\n\n\n \n\n\n\n In Fabry, J.; Rebernak, D.; Cleenewerck, T.; Meur, A. L.; Noyé, J.; and Tanter, É., editor(s), DSAL@AOSD, pages 1, 2007. ACM\n \n\n\n\n
\n\n\n\n \n \n \"ERTSAL:Link\n  \n \n \n \"ERTSAL:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/aosd/SousanWZS07,\n  added-at = {2021-12-21T00:00:00.000+0100},\n  author = {Sousan, William L. and Winter, Victor L. and Zand, Mansour and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/29842ed06aefe848e791f13e24a9c590d/dblp},\n  booktitle = {DSAL@AOSD},\n  crossref = {conf/aosd/2007dsal},\n  editor = {Fabry, Johan and Rebernak, Damijan and Cleenewerck, Thomas and Meur, Anne-Françoise Le and Noyé, Jacques and Tanter, Éric},\n  ee = {https://doi.org/10.1145/1255400.1255401},\n  interhash = {331abbbd7135640a13cb27fd28710881},\n  intrahash = {9842ed06aefe848e791f13e24a9c590d},\n  isbn = {978-1-59593-659-2},\n  keywords = {dblp},\n  pages = 1,\n  publisher = {ACM},\n  timestamp = {2024-04-09T22:47:31.000+0200},\n  title = {ERTSAL: a prototype of a domain-specific aspect language for analysis of embedded real-time systems.},\n  url = {http://dblp.uni-trier.de/db/conf/aosd/dsal2007.html#SousanWZS07},\n  year = 2007\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Aggregating changes to efficiently check consistency.\n \n \n \n \n\n\n \n Subramaniam, M.; Chundi, P.; and Siy, H. P.\n\n\n \n\n\n\n In Penta, M. D.; and Lanza, M., editor(s), IWPSE, pages 39-42, 2007. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AggregatingLink\n  \n \n \n \"AggregatingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/iwpse/SubramaniamCS07,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Subramaniam, Mahadevan and Chundi, Parvathi and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2bc163d5eefbf6f8c5d5b4ee790ccbf1c/dblp},\n  booktitle = {IWPSE},\n  crossref = {conf/iwpse/2007},\n  editor = {Penta, Massimiliano Di and Lanza, Michele},\n  ee = {https://doi.org/10.1145/1294948.1294959},\n  interhash = {5fc9a064df05dee623aea7eb128d4b50},\n  intrahash = {bc163d5eefbf6f8c5d5b4ee790ccbf1c},\n  isbn = {978-1-59593-722-3},\n  keywords = {dblp},\n  pages = {39-42},\n  publisher = {ACM},\n  timestamp = {2024-04-09T10:08:24.000+0200},\n  title = {Aggregating changes to efficiently check consistency.},\n  url = {http://dblp.uni-trier.de/db/conf/iwpse/iwpse2007.html#SubramaniamCS07},\n  year = 2007\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Discovering Dynamic Developer Relationships from Software Version Histories by Time Series Segmentation.\n \n \n \n \n\n\n \n Siy, H. P.; Chundi, P.; Rosenkrantz, D. J.; and Subramaniam, M.\n\n\n \n\n\n\n In ICSM, pages 415-424, 2007. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"DiscoveringLink\n  \n \n \n \"DiscoveringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icsm/SiyCRS07,\n  added-at = {2017-05-22T00:00:00.000+0200},\n  author = {Siy, Harvey P. and Chundi, Parvathi and Rosenkrantz, Daniel J. and Subramaniam, Mahadevan},\n  biburl = {https://www.bibsonomy.org/bibtex/275ea0f9a5c4486e0a3a47065baee079c/dblp},\n  booktitle = {ICSM},\n  crossref = {conf/icsm/2007},\n  ee = {https://doi.org/10.1109/ICSM.2007.4362654},\n  interhash = {ee4a96b53ff106a42a650654a2b4301b},\n  intrahash = {75ea0f9a5c4486e0a3a47065baee079c},\n  isbn = {978-1-4244-1256-3},\n  keywords = {dblp},\n  pages = {415-424},\n  publisher = {IEEE Computer Society},\n  timestamp = {2019-02-13T11:42:12.000+0100},\n  title = {Discovering Dynamic Developer Relationships from Software Version Histories by Time Series Segmentation.},\n  url = {http://dblp.uni-trier.de/db/conf/icsm/icsm2007.html#SiyCRS07},\n  year = 2007\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Construction of Ontology-Based Software Repositories by Text Mining.\n \n \n \n \n\n\n \n Wu, Y.; Siy, H.; Zand, M.; and Winter, V.\n\n\n \n\n\n\n In Computational Science – ICCS 2007 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III , pages 790–797, 2007. \n \n\n\n\n
\n\n\n\n \n \n \"ConstructionPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{keyhere,\n  abstract = {Software document repositories store artifacts produced in the course of developing software products. But most repositories\r\nare simply archives of documents. It is not unusual to find projects where different software artifacts are scattered in unrelatedrepositories with varying levels of granularity and without a centralized management system. This makes the information availablein existing repositories difficult to reuse. In this paper, a methodology for constructing an ontology-based repository ofreusable knowledge is presented. The information in the repository is extracted from specification documents using text mining.Ontologies are used to guide the extraction process and organize the extracted information. The methodology is being usedto develop a repository of recurring and crosscutting aspects in software specification documents.},\n  added-at = {2008-03-07T18:17:18.000+0100},\n  author = {Wu, Yan and Siy, Harvey and Zand, Mansour and Winter, Victor},\n  biburl = {https://www.bibsonomy.org/bibtex/2a4549281d473c562152904f4e7393f43/renew},\n  booktitle = { Computational Science – ICCS 2007\r\n7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III },\n  description = {SpringerLink - Book Chapter},\n  interhash = {347a9abcae9f615f9c77a72f3c717280},\n  intrahash = {a4549281d473c562152904f4e7393f43},\n  keywords = {mining software engineering text repository ontology},\n  pages = {790--797},\n  timestamp = {2008-03-07T18:17:18.000+0100},\n  title = {Construction of Ontology-Based Software Repositories by Text Mining},\n  url = {http://dx.doi.org/10.1007/978-3-540-72588-6_128},\n  year = 2007\n}\n\n
\n
\n\n\n
\n Software document repositories store artifacts produced in the course of developing software products. But most repositories are simply archives of documents. It is not unusual to find projects where different software artifacts are scattered in unrelatedrepositories with varying levels of granularity and without a centralized management system. This makes the information availablein existing repositories difficult to reuse. In this paper, a methodology for constructing an ontology-based repository ofreusable knowledge is presented. The information in the repository is extracted from specification documents using text mining.Ontologies are used to guide the extraction process and organize the extracted information. The methodology is being usedto develop a repository of recurring and crosscutting aspects in software specification documents.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Quantifying the Value of New Technologies for Software Development.\n \n \n \n \n\n\n \n Atkins, D. L.; Mockus, A.; and Siy, H. P.\n\n\n \n\n\n\n In Biffl, S.; Aurum, A.; Boehm, B. W.; Erdogmus, H.; and Grünbacher, P., editor(s), Value-Based Software Engineering, pages 327-344. Springer, 2006.\n \n\n\n\n
\n\n\n\n \n \n \"QuantifyingLink\n  \n \n \n \"QuantifyingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@incollection{books/sp/06/AtkinsMS06,\n  added-at = {2017-05-16T00:00:00.000+0200},\n  author = {Atkins, David L. and Mockus, Audris and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/284b0bc722077424f373fdd982a32455b/dblp},\n  booktitle = {Value-Based Software Engineering},\n  crossref = {books/sp/2006BABEG},\n  editor = {Biffl, Stefan and Aurum, Aybüke and Boehm, Barry W. and Erdogmus, Hakan and Grünbacher, Paul},\n  ee = {https://doi.org/10.1007/3-540-29263-2_16},\n  interhash = {eb58ce48940a832f3352e67078fa860e},\n  intrahash = {84b0bc722077424f373fdd982a32455b},\n  isbn = {978-3-540-29263-0},\n  keywords = {dblp},\n  pages = {327-344},\n  publisher = {Springer},\n  timestamp = {2024-04-09T07:53:24.000+0200},\n  title = {Quantifying the Value of New Technologies for Software Development.},\n  url = {http://dblp.uni-trier.de/db/books/collections/BABEG2006.html#AtkinsMS06},\n  year = 2006\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2004\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n The Long Term Impact of Domain Engineering on Software Quality and Change Effort.\n \n \n \n \n\n\n \n Siy, H. P.\n\n\n \n\n\n\n In IEEE METRICS, 2004. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"TheLink\n  \n \n \n \"ThePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/metrics/Siy04,\n  added-at = {2005-01-11T00:00:00.000+0100},\n  author = {Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2aee8e7f6d325ab055d4eb4c501e233ea/dblp},\n  booktitle = {IEEE METRICS},\n  crossref = {conf/metrics/2004},\n  ee = {http://www.computer.org/csdl/proceedings/metrics/2004/2129/00/index.html},\n  interhash = {178fdc4ee484fe60d1f36d4cd7c6057e},\n  intrahash = {aee8e7f6d325ab055d4eb4c501e233ea},\n  isbn = {0-7695-2129-0},\n  keywords = {dblp},\n  publisher = {IEEE Computer Society},\n  timestamp = {2019-10-17T12:52:09.000+0200},\n  title = {The Long Term Impact of Domain Engineering on Software Quality and Change Effort.},\n  url = {http://dblp.uni-trier.de/db/conf/metrics/metrics2004.html#Siy04},\n  year = 2004\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2001\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Does the Modern Code Inspection Have Value?.\n \n \n \n \n\n\n \n Siy, H. P.; and Votta, L. G.\n\n\n \n\n\n\n In ICSM, pages 281-, 2001. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"DoesLink\n  \n \n \n \"DoesPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icsm/SiyV01,\n  added-at = {2023-03-24T00:00:00.000+0100},\n  author = {Siy, Harvey P. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/24d078673aba59313f0065139f103933d/dblp},\n  booktitle = {ICSM},\n  crossref = {conf/icsm/2001},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/ICSM.2001.972741},\n  interhash = {94392e527b34ab453992cfb8f721a698},\n  intrahash = {4d078673aba59313f0065139f103933d},\n  isbn = {0-7695-1189-9},\n  keywords = {dblp},\n  pages = {281-},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T22:03:19.000+0200},\n  title = {Does the Modern Code Inspection Have Value?},\n  url = {http://dblp.uni-trier.de/db/conf/icsm/icsm2001.html#SiyV01},\n  year = 2001\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Making the Software Factory Work: Lessons from a Decade of Experience.\n \n \n \n \n\n\n \n Siy, H. P.; Herbsleb, J. D.; Mockus, A.; Tucker, G. T.; and Krishnan, M. S.\n\n\n \n\n\n\n In IEEE METRICS, pages 317-, 2001. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"MakingLink\n  \n \n \n \"MakingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/metrics/SiyHMTK01,\n  added-at = {2023-03-23T00:00:00.000+0100},\n  author = {Siy, Harvey P. and Herbsleb, James D. and Mockus, Audris and Tucker, George T. and Krishnan, Mayuram S.},\n  biburl = {https://www.bibsonomy.org/bibtex/2cd917272ab36d3dfcfc9fc4b0557c668/dblp},\n  booktitle = {IEEE METRICS},\n  crossref = {conf/metrics/2001},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/METRIC.2001.915539},\n  interhash = {75a6515cba485015dfe5dabe34c9f2c7},\n  intrahash = {cd917272ab36d3dfcfc9fc4b0557c668},\n  isbn = {0-7695-1043-4},\n  keywords = {dblp},\n  pages = {317-},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T10:05:23.000+0200},\n  title = {Making the Software Factory Work: Lessons from a Decade of Experience.},\n  url = {http://dblp.uni-trier.de/db/conf/metrics/metrics2001.html#SiyHMTK01},\n  year = 2001\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Parallel changes in large-scale software development: an observational case study.\n \n \n \n \n\n\n \n Perry, D. E.; Siy, H. P.; and Votta, L. G.\n\n\n \n\n\n\n ACM Trans. Softw. Eng. Methodol., 10(3): 308-337. 2001.\n \n\n\n\n
\n\n\n\n \n \n \"ParallelLink\n  \n \n \n \"ParallelPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/tosem/PerrySV01,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Perry, Dewayne E. and Siy, Harvey P. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/2dc01e62b9b4e35e01890251f3de81e1d/dblp},\n  ee = {https://doi.org/10.1145/383876.383878},\n  interhash = {ec6330519d62f394ded0f10d2d00cbd0},\n  intrahash = {dc01e62b9b4e35e01890251f3de81e1d},\n  journal = {ACM Trans. Softw. Eng. Methodol.},\n  keywords = {dblp},\n  number = 3,\n  pages = {308-337},\n  timestamp = {2018-11-07T12:16:11.000+0100},\n  title = {Parallel changes in large-scale software development: an observational case study.},\n  url = {http://dblp.uni-trier.de/db/journals/tosem/tosem10.html#PerrySV01},\n  volume = 10,\n  year = 2001\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2000\n \n \n (11)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Software product lines: a case study.\n \n \n \n \n\n\n \n Ardis, M. A.; Daley, N.; Hoffman, D.; Siy, H. P.; and Weiss, D. M.\n\n\n \n\n\n\n Softw. Pract. Exp., 30(7): 825-847. 2000.\n \n\n\n\n
\n\n\n\n \n \n \"SoftwareLink\n  \n \n \n \"SoftwarePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/spe/ArdisDHSW00,\n  added-at = {2023-09-01T00:00:00.000+0200},\n  author = {Ardis, Mark A. and Daley, Nigel and Hoffman, Daniel and Siy, Harvey P. and Weiss, David M.},\n  biburl = {https://www.bibsonomy.org/bibtex/2dc53c5ecc10477fa66211060758258f6/dblp},\n  ee = {https://doi.org/10.1002/(SICI)1097-024X(200006)30:7<825::AID-SPE322>3.0.CO;2-1},\n  interhash = {cde952558eca640275122b494efe21cf},\n  intrahash = {dc53c5ecc10477fa66211060758258f6},\n  journal = {Softw. Pract. Exp.},\n  keywords = {dblp},\n  number = 7,\n  pages = {825-847},\n  timestamp = {2024-04-09T06:40:38.000+0200},\n  title = {Software product lines: a case study.},\n  url = {http://dblp.uni-trier.de/db/journals/spe/spe30.html#ArdisDHSW00},\n  volume = 30,\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Measuring technology effects on software change cost.\n \n \n \n \n\n\n \n Atkins, D. L.; Mockus, A.; and Siy, H. P.\n\n\n \n\n\n\n Bell Labs Tech. J., 5(2): 7-18. 2000.\n \n\n\n\n
\n\n\n\n \n \n \"MeasuringLink\n  \n \n \n \"MeasuringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/bell/AtkinsMS00,\n  added-at = {2020-02-27T00:00:00.000+0100},\n  author = {Atkins, David L. and Mockus, Audris and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2f07d324fce8e52cb9c4427976cff9aa8/dblp},\n  ee = {https://doi.org/10.1002/bltj.2218},\n  interhash = {51958cd373148c56f241170cf67a25b3},\n  intrahash = {f07d324fce8e52cb9c4427976cff9aa8},\n  journal = {Bell Labs Tech. J.},\n  keywords = {dblp},\n  number = 2,\n  pages = {7-18},\n  timestamp = {2020-02-28T11:40:23.000+0100},\n  title = {Measuring technology effects on software change cost.},\n  url = {http://dblp.uni-trier.de/db/journals/bell/bell5.html#AtkinsMS00},\n  volume = 5,\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Predicting Fault Incidence Using Software Change History.\n \n \n \n \n\n\n \n Graves, T. L.; Karr, A. F.; Marron, J. S.; and Siy, H. P.\n\n\n \n\n\n\n IEEE Trans. Software Eng., 26(7): 653-661. 2000.\n \n\n\n\n
\n\n\n\n \n \n \"PredictingLink\n  \n \n \n \"PredictingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/tse/GravesKMS00,\n  added-at = {2015-12-10T00:00:00.000+0100},\n  author = {Graves, Todd L. and Karr, Alan F. and Marron, J. S. and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/27be9d79f54578ebdb43ec63f2c67b190/dblp},\n  ee = {http://doi.ieeecomputersociety.org/10.1109/32.859533},\n  interhash = {a1cb6dd1e38a1ab97abdc81733b72313},\n  intrahash = {7be9d79f54578ebdb43ec63f2c67b190},\n  journal = {IEEE Trans. Software Eng.},\n  keywords = {dblp},\n  number = 7,\n  pages = {653-661},\n  timestamp = {2015-12-12T11:50:41.000+0100},\n  title = {Predicting Fault Incidence Using Software Change History.},\n  url = {http://dblp.uni-trier.de/db/journals/tse/tse26.html#GravesKMS00},\n  volume = 26,\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Measuring Technology Effects on Software Change Cost.\n \n \n \n\n\n \n Atkins, D. L.; Mockus, A.; and Siy, H. P.\n\n\n \n\n\n\n Bell Labs Technical Journal,7–18. 04 2000.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{Atkins&al2000,\n  added-at = {2008-07-07T16:45:32.000+0200},\n  author = {Atkins, David L. and Mockus, Audris and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2bdf2d495b5d0e1553134282fae74b999/pdeleenh},\n  date-modified = {2007-09-26 10:34:50 +0200},\n  interhash = {51958cd373148c56f241170cf67a25b3},\n  intrahash = {bdf2d495b5d0e1553134282fae74b999},\n  journal = {Bell Labs Technical Journal},\n  keywords = {change, estimation cost software},\n  month = {04},\n  owner = {pdeleenh},\n  pages = {7--18},\n  publisher = {Lucent Technologies Inc.},\n  timestamp = {2008-07-07T16:45:53.000+0200},\n  title = {Measuring Technology Effects on Software Change Cost},\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Predicting Fault Incidence Using Software Change History.\n \n \n \n\n\n \n Graves, T. L.; Karr, A. F.; Marron, J.; and Siy, H.\n\n\n \n\n\n\n , 26(7): 653-661. 04 2000.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Graves&al2000,\n  added-at = {2008-07-07T16:45:32.000+0200},\n  address = {Los Alamitos, CA, USA},\n  author = {Graves, Todd L. and Karr, Alan F. and Marron, J.S. and Siy, Harvey},\n  biburl = {https://www.bibsonomy.org/bibtex/2d0aa5d010d9c9f36b430e8f476e4d825/pdeleenh},\n  doi = {http://doi.ieeecomputersociety.org/10.1109/32.859533},\n  interhash = {a1cb6dd1e38a1ab97abdc81733b72313},\n  intrahash = {d0aa5d010d9c9f36b430e8f476e4d825},\n  issn = {0098-5589},\n  keywords = {imported},\n  month = {04},\n  number = 7,\n  owner = {pdeleenh},\n  pages = {653-661},\n  publisher = {IEEE Press},\n  timestamp = {2008-07-07T16:46:47.000+0200},\n  title = {Predicting Fault Incidence Using Software Change History},\n  volume = 26,\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Measuring Technology Effects on Software Change Cost.\n \n \n \n\n\n \n Atkins, D. L.; Mockus, A.; and Siy, H. P.\n\n\n \n\n\n\n Bell Labs Technical Journal,7–18. 04 2000.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Atkins&al2000,\n  added-at = {2007-09-26T12:09:12.000+0200},\n  author = {Atkins, David L. and Mockus, Audris and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2bdf2d495b5d0e1553134282fae74b999/kimmens},\n  description = {AOEvolutionchapter short paper},\n  interhash = {51958cd373148c56f241170cf67a25b3},\n  intrahash = {bdf2d495b5d0e1553134282fae74b999},\n  journal = {Bell Labs Technical Journal},\n  keywords = {imported},\n  month = {04},\n  pages = {7--18},\n  publisher = {Lucent Technologies Inc.},\n  timestamp = {2007-09-26T12:09:17.000+0200},\n  title = {Measuring Technology Effects on Software Change Cost},\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Predicting Fault Incidence Using Software Change History.\n \n \n \n\n\n \n Graves, T. L.; Karr, A. F.; Marron, J.; and Siy, H.\n\n\n \n\n\n\n IEEE Computer Society Trans. Software Engineering, 26(7): 653-661. 04 2000.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Graves&al2000,\n  added-at = {2007-09-26T12:09:12.000+0200},\n  address = {Los Alamitos, CA, USA},\n  author = {Graves, Todd L. and Karr, Alan F. and Marron, J.S. and Siy, Harvey},\n  biburl = {https://www.bibsonomy.org/bibtex/26b3622584e7f42043a62509a7d688f5b/kimmens},\n  description = {AOEvolutionchapter short paper},\n  doi = {http://doi.ieeecomputersociety.org/10.1109/32.859533},\n  interhash = {a1cb6dd1e38a1ab97abdc81733b72313},\n  intrahash = {6b3622584e7f42043a62509a7d688f5b},\n  issn = {0098-5589},\n  journal = { IEEE Computer Society Trans. Software Engineering},\n  keywords = {imported},\n  month = {04},\n  number = 7,\n  pages = {653-661},\n  publisher = {IEEE Computer Society},\n  timestamp = {2007-09-26T12:09:18.000+0200},\n  title = {Predicting Fault Incidence Using Software Change History},\n  volume = 26,\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Predicting Fault Incidence Using Software Change History.\n \n \n \n\n\n \n Graves, T. L.; Karr, A. F.; Marron, J.; and Siy, H.\n\n\n \n\n\n\n IEEE Trans. Software Engineering, 26(7): 653-661. 04 2000.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Graves&al2000,\n  added-at = {2007-09-26T10:37:27.000+0200},\n  address = {Los Alamitos, CA, USA},\n  author = {Graves, Todd L. and Karr, Alan F. and Marron, J.S. and Siy, Harvey},\n  biburl = {https://www.bibsonomy.org/bibtex/2093dbfef4f6e54dde29f30b3fa44e4c0/evol},\n  description = {The entire bibliography of the book "Software Evolution" co-edited by Tom Mens and Serge Demeyer, published by Springer in 2008},\n  doi = {http://doi.ieeecomputersociety.org/10.1109/32.859533},\n  interhash = {a1cb6dd1e38a1ab97abdc81733b72313},\n  intrahash = {093dbfef4f6e54dde29f30b3fa44e4c0},\n  issn = {0098-5589},\n  journal = {IEEE Trans. Software Engineering},\n  keywords = {software change prediction fault},\n  month = {04},\n  number = 7,\n  pages = {653-661},\n  publisher = { IEEE Computer Society  Press },\n  timestamp = {2007-09-26T10:37:49.000+0200},\n  title = {Predicting Fault Incidence Using Software Change History},\n  volume = 26,\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Measuring Technology Effects on Software Change Cost.\n \n \n \n\n\n \n Atkins, D. L.; Mockus, A.; and Siy, H. P.\n\n\n \n\n\n\n Bell Labs Technical Journal,7–18. 04 2000.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Atkins&al2000,\n  added-at = {2007-09-26T10:37:27.000+0200},\n  author = {Atkins, David L. and Mockus, Audris and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2bdf2d495b5d0e1553134282fae74b999/evol},\n  date-modified = {2007-09-26 10:34:50 +0200},\n  description = {The entire bibliography of the book "Software Evolution" co-edited by Tom Mens and Serge Demeyer, published by Springer in 2008},\n  interhash = {51958cd373148c56f241170cf67a25b3},\n  intrahash = {bdf2d495b5d0e1553134282fae74b999},\n  journal = {Bell Labs Technical Journal},\n  keywords = {estimation cost software change},\n  month = {04},\n  pages = {7--18},\n  publisher = {Lucent Technologies Inc.},\n  timestamp = {2007-09-26T10:37:46.000+0200},\n  title = {Measuring Technology Effects on Software Change Cost},\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Predicting Fault Incidence Using Software Change History.\n \n \n \n\n\n \n Graves, T. L.; Karr, A. F.; Marron, J.; and Siy, H.\n\n\n \n\n\n\n IEEE Trans. Software Engineering, 26(7): 653-661. 04 2000.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Graves&al2000,\n  added-at = {2007-09-25T21:44:52.000+0200},\n  address = {Los Alamitos, CA, USA},\n  author = {Graves, Todd L. and Karr, Alan F. and Marron, J.S. and Siy, Harvey},\n  biburl = {https://www.bibsonomy.org/bibtex/2093dbfef4f6e54dde29f30b3fa44e4c0/tommens},\n  description = {software evolution bibliography},\n  doi = {http://doi.ieeecomputersociety.org/10.1109/32.859533},\n  interhash = {a1cb6dd1e38a1ab97abdc81733b72313},\n  intrahash = {093dbfef4f6e54dde29f30b3fa44e4c0},\n  issn = {0098-5589},\n  journal = {IEEE Trans. Software Engineering},\n  keywords = {imported},\n  month = {04},\n  number = 7,\n  pages = {653-661},\n  publisher = { IEEE Computer Society  Press },\n  timestamp = {2007-09-25T21:45:19.000+0200},\n  title = {Predicting Fault Incidence Using Software Change History},\n  volume = 26,\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Measuring Technology Effects on Software Change Cost.\n \n \n \n\n\n \n Atkins, D. L.; Mockus, A.; and Siy, H. P.\n\n\n \n\n\n\n Bell Labs Technical Journal,7–18. 04 2000.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Atkins&al2000,\n  added-at = {2007-09-25T21:44:52.000+0200},\n  author = {Atkins, David L. and Mockus, Audris and Siy, Harvey P.},\n  biburl = {https://www.bibsonomy.org/bibtex/2bdf2d495b5d0e1553134282fae74b999/tommens},\n  description = {software evolution bibliography},\n  interhash = {51958cd373148c56f241170cf67a25b3},\n  intrahash = {bdf2d495b5d0e1553134282fae74b999},\n  journal = {Bell Labs Technical Journal},\n  keywords = {imported},\n  month = {04},\n  pages = {7--18},\n  publisher = {Lucent Technologies Inc.},\n  timestamp = {2007-09-25T21:45:14.000+0200},\n  title = {Measuring Technology Effects on Software Change Cost},\n  year = 2000\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1999\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Measuring Domain Engineering Effects on Software Change Cost.\n \n \n \n \n\n\n \n Siy, H. P.; and Mockus, A.\n\n\n \n\n\n\n In IEEE METRICS, pages 304-311, 1999. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"MeasuringLink\n  \n \n \n \"MeasuringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/metrics/SiyM99,\n  added-at = {2023-03-23T00:00:00.000+0100},\n  author = {Siy, Harvey P. and Mockus, Audris},\n  biburl = {https://www.bibsonomy.org/bibtex/284a594927f40194bf9489bef792e5efd/dblp},\n  booktitle = {IEEE METRICS},\n  crossref = {conf/metrics/1999},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/METRIC.1999.809751},\n  interhash = {b14d9804260557264c35f001d194eabc},\n  intrahash = {84a594927f40194bf9489bef792e5efd},\n  isbn = {0-7695-0403-5},\n  keywords = {dblp},\n  pages = {304-311},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T13:16:27.000+0200},\n  title = {Measuring Domain Engineering Effects on Software Change Cost.},\n  url = {http://dblp.uni-trier.de/db/conf/metrics/metrics1999.html#SiyM99},\n  year = 1999\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1998\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Parallel Changes in Large Scale Software Development: An Observational Case Study.\n \n \n \n \n\n\n \n Perry, D. E.; Siy, H. P.; and Votta, L. G.\n\n\n \n\n\n\n In Torii, K.; Futatsugi, K.; and Kemmerer, R. A., editor(s), ICSE, pages 251-260, 1998. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"ParallelLink\n  \n \n \n \"ParallelPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/PerrySV98,\n  added-at = {2023-03-23T00:00:00.000+0100},\n  author = {Perry, Dewayne E. and Siy, Harvey P. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/2b613a9f60c2b3a3e69ca2ff0e9ce1a84/dblp},\n  booktitle = {ICSE},\n  crossref = {conf/icse/1998},\n  editor = {Torii, Koji and Futatsugi, Kokichi and Kemmerer, Richard A.},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/ICSE.1998.671134},\n  interhash = {2796822ca7776483c648dfdf27d3c8c2},\n  intrahash = {b613a9f60c2b3a3e69ca2ff0e9ce1a84},\n  isbn = {0-8186-8368-6},\n  keywords = {dblp},\n  pages = {251-260},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T12:14:40.000+0200},\n  title = {Parallel Changes in Large Scale Software Development: An Observational Case Study.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/icse98.html#PerrySV98},\n  year = 1998\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Understanding the Sources of Variation in Software Inspections.\n \n \n \n\n\n \n Porter, A.; Siy, H.; Mockus, A.; and Votta, L.\n\n\n \n\n\n\n ACM Transactions on Software Engineering Methodology, 7(1): 41–79. 01 1998.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{Porter_98,\n  added-at = {2020-11-16T00:29:59.000+0100},\n  author = {Porter, Adam and Siy, Harvey and Mockus, Audris and Votta, Lawrence},\n  biburl = {https://www.bibsonomy.org/bibtex/2a02804f65b32634dd3c381d5bc2936f1/derek-jones},\n  data = {website},\n  interhash = {b6d6cfbe8d1fac41a344f90c3b348cda},\n  intrahash = {a02804f65b32634dd3c381d5bc2936f1},\n  journal = {ACM Transactions on Software Engineering Methodology},\n  keywords = {imported},\n  month = {01},\n  number = 1,\n  online = {porter-siy.pdf},\n  pages = {41--79},\n  timestamp = {2020-11-16T00:29:59.000+0100},\n  title = {Understanding the Sources of Variation in Software Inspections},\n  volume = 7,\n  year = 1998\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding the Sources of Variation in Software Inspections.\n \n \n \n \n\n\n \n Porter, A. A.; Siy, H. P.; Mockus, A.; and Votta, L. G.\n\n\n \n\n\n\n ACM Trans. Softw. Eng. Methodol., 7(1): 41-79. 1998.\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingLink\n  \n \n \n \"UnderstandingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/tosem/PorterSMV98,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Porter, Adam A. and Siy, Harvey P. and Mockus, Audris and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/2a1a8838de1210b960471a7b12293caf1/dblp},\n  ee = {https://doi.org/10.1145/268411.268421},\n  interhash = {b6d6cfbe8d1fac41a344f90c3b348cda},\n  intrahash = {a1a8838de1210b960471a7b12293caf1},\n  journal = {ACM Trans. Softw. Eng. Methodol.},\n  keywords = {dblp},\n  number = 1,\n  pages = {41-79},\n  timestamp = {2018-11-07T12:16:11.000+0100},\n  title = {Understanding the Sources of Variation in Software Inspections.},\n  url = {http://dblp.uni-trier.de/db/journals/tosem/tosem7.html#PorterSMV98},\n  volume = 7,\n  year = 1998\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Understanding the sources of variation in software inspections.\n \n \n \n\n\n \n Porter, A.; Siy, H.; Mockus, A.; and Votta, L.\n\n\n \n\n\n\n ACM Trans. Softw. Eng. Methodol., 7(1): 41–79. 1998.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{por_ym_1998,\n  added-at = {2008-08-22T13:06:59.000+0200},\n  address = {New York, NY, USA},\n  author = {Porter, Adam and Siy, Harvey and Mockus, Audris and Votta, Lawrence},\n  biburl = {https://www.bibsonomy.org/bibtex/200f29d37189e31c092fe59cdac489160/kolli},\n  doi = {http://doi.acm.org/10.1145/268411.268421},\n  interhash = {b6d6cfbe8d1fac41a344f90c3b348cda},\n  intrahash = {00f29d37189e31c092fe59cdac489160},\n  issn = {1049-331X},\n  journal = {ACM Trans. Softw. Eng. Methodol.},\n  keywords = {inspection},\n  number = 1,\n  pages = {41--79},\n  publisher = {ACM},\n  timestamp = {2008-08-22T13:06:59.000+0200},\n  title = {Understanding the sources of variation in software inspections},\n  volume = 7,\n  year = 1998\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1997\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Understanding the Effects of Developer Activities on Inspection Interval.\n \n \n \n \n\n\n \n Porter, A. A.; Siy, H. P.; and Votta, L. G.\n\n\n \n\n\n\n In Adrion, W. R.; Fuggetta, A.; Taylor, R. N.; and Wasserman, A. I., editor(s), ICSE, pages 128-138, 1997. ACM\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingLink\n  \n \n \n \"UnderstandingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/icse/PorterSV97,\n  added-at = {2018-11-06T00:00:00.000+0100},\n  author = {Porter, Adam A. and Siy, Harvey P. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/2286aadae2c5b02c344f249b7b3cc9359/dblp},\n  booktitle = {ICSE},\n  crossref = {conf/icse/1997},\n  editor = {Adrion, W. Richards and Fuggetta, Alfonso and Taylor, Richard N. and Wasserman, Anthony I.},\n  ee = {https://doi.org/10.1145/253228.253253},\n  interhash = {88f5b5807033b019e7c9c33a3c967669},\n  intrahash = {286aadae2c5b02c344f249b7b3cc9359},\n  isbn = {0-89791-914-9},\n  keywords = {dblp},\n  pages = {128-138},\n  publisher = {ACM},\n  timestamp = {2018-11-07T16:33:41.000+0100},\n  title = {Understanding the Effects of Developer Activities on Inspection Interval.},\n  url = {http://dblp.uni-trier.de/db/conf/icse/icse97.html#PorterSV97},\n  year = 1997\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Experiment ot Assess the Cost-Benefits of Code Inspections in Large Scale Software Development.\n \n \n \n \n\n\n \n Porter, A. A.; Siy, H. P.; Toman, C. A.; and Votta, L. G.\n\n\n \n\n\n\n IEEE Trans. Software Eng., 23(6): 329-346. 1997.\n \n\n\n\n
\n\n\n\n \n \n \"AnLink\n  \n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/tse/PorterSTV97,\n  added-at = {2015-12-10T00:00:00.000+0100},\n  author = {Porter, Adam A. and Siy, Harvey P. and Toman, Carol A. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/248b67a705e5cd89690ce8b343c023eef/dblp},\n  ee = {http://doi.ieeecomputersociety.org/10.1109/32.601071},\n  interhash = {a9ec849bab2112e7cfa4f9e5284c01ac},\n  intrahash = {48b67a705e5cd89690ce8b343c023eef},\n  journal = {IEEE Trans. Software Eng.},\n  keywords = {dblp},\n  number = 6,\n  pages = {329-346},\n  timestamp = {2015-12-12T11:51:05.000+0100},\n  title = {An Experiment ot Assess the Cost-Benefits of Code Inspections in Large Scale Software Development.},\n  url = {http://dblp.uni-trier.de/db/journals/tse/tse23.html#PorterSTV97},\n  volume = 23,\n  year = 1997\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development.\n \n \n \n\n\n \n Porter, A. A.; Siy, H. P.; Toman, C. A.; and Votta, L. G.\n\n\n \n\n\n\n IEEE Transactions on Software Engineering, 23(6): 329–346. 1997.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{por_ym_1997,\n  added-at = {2009-03-24T14:14:32.000+0100},\n  address = {Piscataway, NJ, USA},\n  author = {Porter, Adam A. and Siy, Harvey P. and Toman, Carol A. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/25a09dabcbe44276f5f6310ff00c9af29/kolli},\n  doi = {http://dx.doi.org/10.1109/32.601071},\n  interhash = {52484b24eea1c42e57aa8f4136cdbce2},\n  intrahash = {5a09dabcbe44276f5f6310ff00c9af29},\n  issn = {0098-5589},\n  journal = {IEEE Transactions on Software Engineering},\n  keywords = {inspection},\n  number = 6,\n  pages = {329--346},\n  publisher = {IEEE Press},\n  timestamp = {2009-03-24T14:14:32.000+0100},\n  title = {An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development},\n  volume = 23,\n  year = 1997\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1996\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An experiment to assess cost-benefits of inspection meetings and their alternatives: a pilot study.\n \n \n \n \n\n\n \n McCarthy, P.; Porter, A. A.; Siy, H. P.; and Votta, L. G.\n\n\n \n\n\n\n In IEEE METRICS, pages 100-111, 1996. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"AnLink\n  \n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/metrics/McCarthyPSV96,\n  added-at = {2023-03-23T00:00:00.000+0100},\n  author = {McCarthy, Patricia and Porter, Adam A. and Siy, Harvey P. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/25d4e8accc1e74bdb20af4841801c3eb4/dblp},\n  booktitle = {IEEE METRICS},\n  crossref = {conf/metrics/1996},\n  ee = {https://doi.ieeecomputersociety.org/10.1109/METRIC.1996.492447},\n  interhash = {bef4ce9bd26df06fe87fb408cca67e65},\n  intrahash = {5d4e8accc1e74bdb20af4841801c3eb4},\n  isbn = {0-8186-7364-8},\n  keywords = {dblp},\n  pages = {100-111},\n  publisher = {IEEE Computer Society},\n  timestamp = {2024-04-10T13:16:25.000+0200},\n  title = {An experiment to assess cost-benefits of inspection meetings and their alternatives: a pilot study.},\n  url = {http://dblp.uni-trier.de/db/conf/metrics/metrics1996.html#McCarthyPSV96},\n  year = 1996\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Review of Software Inspections.\n \n \n \n \n\n\n \n Porter, A. A.; Siy, H. P.; and Votta, L. G.\n\n\n \n\n\n\n Advances in Computers, 42: 39-76. 1996.\n \n\n\n\n
\n\n\n\n \n \n \"ALink\n  \n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{journals/ac/PorterSV96,\n  added-at = {2011-11-29T00:00:00.000+0100},\n  author = {Porter, Adam A. and Siy, Harvey P. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/26e5053bd5ba2c6f34fcc0a42f0615595/dblp},\n  ee = {http://dx.doi.org/10.1016/S0065-2458(08)60484-2},\n  interhash = {9eceb4a93b7546dd5002c253c6e6452d},\n  intrahash = {6e5053bd5ba2c6f34fcc0a42f0615595},\n  journal = {Advances in Computers},\n  keywords = {dblp},\n  pages = {39-76},\n  timestamp = {2011-12-01T11:34:57.000+0100},\n  title = {A Review of Software Inspections.},\n  url = {http://dblp.uni-trier.de/db/journals/ac/ac42.html#PorterSV96},\n  volume = 42,\n  year = 1996\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 1995\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development.\n \n \n \n \n\n\n \n Porter, A. A.; Siy, H. P.; Toman, C. A.; and Votta, L. G.\n\n\n \n\n\n\n In Kaiser, G. E., editor(s), SIGSOFT FSE, pages 92-103, 1995. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AnLink\n  \n \n \n \"AnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{conf/sigsoft/PorterSTV95,\n  added-at = {2021-07-27T00:00:00.000+0200},\n  author = {Porter, Adam A. and Siy, Harvey P. and Toman, Carol A. and Votta, Lawrence G.},\n  biburl = {https://www.bibsonomy.org/bibtex/29feb752db460084b35bffc5dfa1b7fa5/dblp},\n  booktitle = {SIGSOFT FSE},\n  crossref = {conf/sigsoft/1995},\n  editor = {Kaiser, Gail E.},\n  ee = {https://doi.org/10.1145/222132.222144},\n  interhash = {467b47a8920c1bf819e3099d41a2bcb8},\n  intrahash = {9feb752db460084b35bffc5dfa1b7fa5},\n  isbn = {978-0-89791-716-2},\n  keywords = {dblp},\n  pages = {92-103},\n  publisher = {ACM},\n  timestamp = {2024-04-09T17:51:45.000+0200},\n  title = {An Experiment to Assess the Cost-Benefits of Code Inspections in Large Scale Software Development.},\n  url = {http://dblp.uni-trier.de/db/conf/sigsoft/fse95.html#PorterSTV95},\n  year = 1995\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);