BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Canada
1 × China
1 × Germany
1 × Hungary
1 × India
1 × Ireland
1 × Norway
1 × The Netherlands
2 × Spain
4 × USA
Collaborated with:
A.Meneely B.Robinson L.Layman C.Ho J.Zheng P.Francis B.H.Smith M.Sherriff P.Rotella E.F.Gehringer A.I.Antón S.E.Smith M.Rappa W.Snipes J.A.Osborne K.Smiley T.Zimmermann N.Nagappan K.Herzig R.Premraj K.M.Slaten S.B.Berenson C.B.Seaman
Talks about:
softwar (5) network (3) develop (3) analysi (3) failur (3) applic (3) engin (3) empir (3) regress (2) perform (2)

♂ Person: Laurie Williams

DBLP DBLP: Williams:Laurie

Facilitated 5 volumes:

ASE 2013ExpertReviewPa
ASE 2013PrBoard
MSR 2013PrCo
MSR 2011PrCo
MSR 2010PrCo

Contributed to:

ICSM 20132013
ESEC/FSE 20112011
ICSE 20112011
ICST 20112011
FSE 20082008
ICST 20082008
ITiCSE 20082008
RE 20082008
ASE 20072007
CSEE&T 20072007
ICSE 20072007
RE 20072007
ICSE 20062006
CSEE&T 20052005
ESEC/FSE 20172017

Wrote 17 papers:

ICSM-2013-FrancisW #debugging #policy
Determining “Grim Reaper” Policies to Prevent Languishing Bugs (PF, LW), pp. 436–439.
ESEC-FSE-2011-MeneelyRW #analysis #empirical #quality
Does adding manpower also affect quality?: an empirical, longitudinal analysis (AM, PR, LW), pp. 81–90.
ICSE-2011-MeneelyW #developer #metric #network #question #trust
Socio-technical developer networks: should we trust our measurements? (AM, LW), pp. 281–290.
ICST-2011-SmithW #detection #heuristic #sql #using #web
Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
ICST-2011-ZimmermannNHPW #dependence #empirical
An Empirical Study on the Relation between Dependency Neighborhoods and Failures (TZ, NN, KH, RP, LW), pp. 347–356.
FSE-2008-MeneelyWSO #analysis #developer #network #predict #social
Predicting failures with developer networks and social network analysis (AM, LW, WS, JAO), pp. 13–23.
ICST-2008-SherriffW #composition #empirical #impact analysis #using
Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
ITiCSE-2008-MeneelyWG #named #open source #repository
ROSE: a repository of education-friendly open-source projects (AM, LW, EFG), pp. 7–11.
RE-2008-HoWR #fault #performance #problem #requirements
Examining the Relationships between Performance Requirements and “Not a Problem” Defect Reports (CWH, LW, BR), pp. 135–144.
ASE-2007-ZhengWR #automation #named #testing
Pallino: automation to support regression test selection for cots-based applications (JZ, LW, BR), pp. 224–233.
CSEET-2007-WilliamsL #question #why
Lab Partners: If They’re Good Enough for the Natural Sciences, Why Aren’t They Good Enough for Us? (LW, LL), pp. 72–82.
ICSE-2007-WilliamsLSBS #collaboration #on the #re-engineering #student
On the Impact of a Collaborative Pedagogy on African American Millennial Students in Software Engineering (LW, LL, KMS, SBB, CBS), pp. 677–687.
RE-2007-HoWA #performance #requirements #specification
Improving Performance Requirements Specifications from Field Failure Reports (CWH, LW, AIA), pp. 79–88.
ICSE-2006-ZhengRWS #testing
Applying regression test selection for COTS-based applications (JZ, BR, LW, KS), pp. 512–522.
CSEET-2005-Williams #education #re-engineering
Debunking the Geek Stereotype with Software Engineering Education (LW), p. 4.
CSEET-2005-WilliamsSR #agile #development #re-engineering
Resources for Agile Software Development in the Software Engineering Course (LW, SES, MR), pp. 236–238.
ESEC-FSE-2017-Williams #security
The rising tide lifts all boats: the advancement of science in cyber security (invited talk) (LW), p. 1.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.