2018 article

Are Vulnerabilities Discovered and Resolved like Other Defects?

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 498–498.

By: P. Morrison n, R. Pandita*, X. Xiao*, R. Chillarege* & L. Williams n

Source: Web Of Science
Added: January 21, 2019

2018 journal article

Mapping the field of software life cycle security metrics

INFORMATION AND SOFTWARE TECHNOLOGY, 102, 146–159.

By: P. Morrison n, D. Moye n, R. Pandita n & L. Williams n

author keywords: Metrics; Measurement; Security
TL;DR: The field of software life cycle security metrics has yet to converge on an accepted set of metrics, and the most-cited and most used metric, vulnerability count, has multiple definitions and operationalizations. (via Semantic Scholar)
Source: Web Of Science
Added: October 19, 2018

2016 article

Designing for Dystopia Software Engineering Research for the Post-apocalypse

FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 924–927.

By: T. Barik n, R. Pandita n, J. Middleton n & E. Murphy-Hill n

author keywords: culture; design fiction; dystopia; ideation; post-apocalypse; software engineering
TL;DR: This paper demonstrates through three pop culture dystopias, Battlestar Galactica, Fallout 3, and Children of Men, how reflecting on dystopian scenarios provides research opportunities as well as implications, such as making research accessible to non-experts, that are relevant to the authors' present. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

ICON: Inferring temporal constraints from natural language API descriptions

32nd ieee international conference on software maintenance and evolution (icsme 2016), 378–388.

By: R. Pandita, K. Taneja, T. Tung & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Veteran developers' contributions and motivations: an open source perspective

2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 171–179.

By: P. Morrison n, R. Pandita n, E. Murphy-Hill n & A. McLaughlin n

TL;DR: The results suggest that veterans' are less motivated by social interactions than their younger peers, and could contribute a broader knowledge of software development than their young peers, as well as knowledge of old technologies that can be applied to newer technologies. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Bespoke Tools: Adapted to the Concepts Developers Know

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 878–881.

By: B. Johnson n, R. Pandita n, E. Murphy-Hill n & S. Heckman n

author keywords: adaptive tools; IDE; concept models
TL;DR: This paper proposes the idea of automatically customizing development tools by modeling what a developer knows about software concepts and sketches three such ``bespoke'' tools and describes how development data can be used to infer what adeveloper knows about relevant concepts. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Discovering likely mappings between APIs using text mining

Ieee international working conference on source code analysis and, 231–240.

By: R. Pandita n, R. Jetley*, S. Sudarsan* & L. Williams n

TL;DR: This paper proposes TMAP: Text Mining based approach to discover likely API mappings using the similarity in the textual description of the source and target API documents to address the shortcoming of manually writingAPI mappings. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Inferring method specifications from natural language API descriptions

2012 34th international conference on software engineering (icse), 815–825.

By: R. Pandita n, X. Xiao n, H. Zhong*, T. Xie n, S. Oney* & A. Paradkar*

TL;DR: This work proposes a novel approach to infer formal specifications from natural language text of API documents and shows that this approach has an average 83% accuracy in inferring specifications from over 1600 sentences describing code contracts. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

Guided test generation for coverage criteria

2010 ieee international conference on software maintenance.

By: R. Pandita n, T. Xie n, N. Tillmann* & J. Halleux*

TL;DR: This work proposes a general approach that uses instrumentation to guide existing test-generation approaches to generate test inputs that achieve boundary-value and logical coverage for the program under test. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.