Follow
Byron J. Williams
Title
Cited by
Cited by
Year
Characterizing software architecture changes: A systematic review
BJ Williams, JC Carver
Information and Software Technology 52 (1), 31-51, 2010
2082010
Managing technical debt: An industrial case study
Z Codabux, B Williams
2013 4th International Workshop on Managing Technical Debt (MTD), 8-15, 2013
1672013
Exception handling defects: An empirical study
P Sawadpong, EB Allen, BJ Williams
2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012
582012
The correspondence between software quality models and technical debt estimation approaches
I Griffith, D Reimanis, C Izurieta, Z Codabux, A Deo, B Williams
2014 sixth international workshop on managing technical debt, 19-26, 2014
462014
Long-timescale fluctuations in zero-field magnetic vortex oscillations driven by dc spin-polarized current
VS Pribiag, G Finocchio, BJ Williams, DC Ralph, RA Buhrman
Physical Review B 80 (18), 180411, 2009
462009
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
BJ Williams, JC Carver, RB Vaughn
Software Engineering Research and Practice, 966-971, 2006
392006
Technical debt prioritization using predictive analytics
Z Codabux, BJ Williams
Proceedings of the 38th International Conference on Software Engineering …, 2016
332016
An empirical assessment of technical debt practices in industry
Z Codabux, BJ Williams, GL Bradshaw, M Cantor
Journal of software: Evolution and Process 29 (10), e1894, 2017
302017
Empirical evidence of code decay: A systematic mapping study
A Bandi, BJ Williams, EB Allen
2013 20th Working Conference on Reverse Engineering (WCRE), 341-350, 2013
302013
Correlation analysis among java nano-patterns and software vulnerabilities
KZ Sultana, A Deo, BJ Williams
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
242017
{BigMAC}:{Fine-Grained} Policy Analysis of Android Firmware
G Hernandez, DJ Tian, AS Yadav, BJ Williams, KRB Butler
29th USENIX Security Symposium (USENIX Security 20), 271-287, 2020
232020
Cyber security for emergency management
J Walker, BJ Williams, GW Skelton
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
232010
High false positive detection of security vulnerabilities: a case study
M Nadeem, BJ Williams, EB Allen
Proceedings of the 50th Annual Southeast Regional Conference, 359-360, 2012
212012
A preliminary study examining relationships between nano-patterns and software security vulnerabilities
KZ Sultana, A Deo, BJ Williams
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
202016
A quality assurance approach to technical debt
Z Codabux, BJ Williams, N Niu
Proceedings of the International Conference on Software Engineering Research …, 2014
182014
Preliminary study on assessing software defects using nano-pattern detection
A Deo, BJ Williams
Proceedings of the 24th International Conference on Software Engineering and …, 2015
152015
Examination of the software architecture change characterization scheme using three empirical studies
BJ Williams, JC Carver
Empirical Software Engineering 19, 419-464, 2014
152014
Evaluating micro patterns and software metrics in vulnerability prediction
KZ Sultana, BJ Williams
2017 6th International Workshop on Software Mining (SoftwareMining), 40-47, 2017
142017
Characterizing software architecture changes: an initial study
BJ Williams, JC Carver
First International Symposium on Empirical Software Engineering and …, 2007
142007
Examining the relationship of code and architectural smells with software vulnerabilities
KZ Sultana, Z Codabux, B Williams
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 31-40, 2020
112020
The system can't perform the operation now. Try again later.
Articles 1–20