Byron J. Williams
Cited by
Cited by
Characterizing software architecture changes: A systematic review
BJ Williams, JC Carver
Information and Software Technology 52 (1), 31-51, 2010
Managing technical debt: An industrial case study
Z Codabux, B Williams
2013 4th International Workshop on Managing Technical Debt (MTD), 8-15, 2013
Exception handling defects: An empirical study
P Sawadpong, EB Allen, BJ Williams
2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012
The correspondence between software quality models and technical debt estimation approaches
I Griffith, D Reimanis, C Izurieta, Z Codabux, A Deo, B Williams
2014 sixth international workshop on managing technical debt, 19-26, 2014
Long-timescale fluctuations in zero-field magnetic vortex oscillations driven by dc spin-polarized current
VS Pribiag, G Finocchio, BJ Williams, DC Ralph, RA Buhrman
Physical Review B 80 (18), 180411, 2009
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
BJ Williams, JC Carver, RB Vaughn
Software Engineering Research and Practice, 966-971, 2006
Technical debt prioritization using predictive analytics
Z Codabux, BJ Williams
Proceedings of the 38th International Conference on Software Engineering …, 2016
An empirical assessment of technical debt practices in industry
Z Codabux, BJ Williams, GL Bradshaw, M Cantor
Journal of software: Evolution and Process 29 (10), e1894, 2017
Empirical evidence of code decay: A systematic mapping study
A Bandi, BJ Williams, EB Allen
2013 20th Working Conference on Reverse Engineering (WCRE), 341-350, 2013
Correlation analysis among java nano-patterns and software vulnerabilities
KZ Sultana, A Deo, BJ Williams
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
Cyber security for emergency management
J Walker, BJ Williams, GW Skelton
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
{BigMAC}:{Fine-Grained} Policy Analysis of Android Firmware
G Hernandez, DJ Tian, AS Yadav, BJ Williams, KRB Butler
29th USENIX Security Symposium (USENIX Security 20), 271-287, 2020
High false positive detection of security vulnerabilities: a case study
M Nadeem, BJ Williams, EB Allen
Proceedings of the 50th Annual Southeast Regional Conference, 359-360, 2012
A preliminary study examining relationships between nano-patterns and software security vulnerabilities
KZ Sultana, A Deo, BJ Williams
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
A quality assurance approach to technical debt
Z Codabux, BJ Williams, N Niu
Proceedings of the International Conference on Software Engineering Research …, 2014
Preliminary study on assessing software defects using nano-pattern detection
A Deo, BJ Williams
Proceedings of the 24th International Conference on Software Engineering and …, 2015
Examination of the software architecture change characterization scheme using three empirical studies
BJ Williams, JC Carver
Empirical Software Engineering 19, 419-464, 2014
Evaluating micro patterns and software metrics in vulnerability prediction
KZ Sultana, BJ Williams
2017 6th International Workshop on Software Mining (SoftwareMining), 40-47, 2017
Characterizing software architecture changes: an initial study
BJ Williams, JC Carver
First International Symposium on Empirical Software Engineering and …, 2007
Examining the relationship of code and architectural smells with software vulnerabilities
KZ Sultana, Z Codabux, B Williams
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 31-40, 2020
The system can't perform the operation now. Try again later.
Articles 1–20