Travelled to:
1 × Canada
1 × Croatia
1 × France
1 × Italy
1 × Sweden
7 × USA
Collaborated with:
B.George S.S.Heckman N.Nagappan M.Sherriff E.M.Maximilien A.Dagnino A.Shukla ∅ R.R.Kessler R.A.Syed B.Robinson T.Zimmermann M.Gegick P.Rotella N.Katira J.A.Osborne R.Pandita R.P.Jetley S.D.Sudarsan M.Riaz J.T.King J.Slankas J.M.Lake M.A.Vouk P.Baheti A.Cordes R.A.Carter A.I.Antón C.Theisen K.Herzig P.Morrison B.Murphy H.Srikanth E.Wiebe C.Miller S.Balik M.J.Lutz G.W.Hislop M.McCracken N.R.Mead J.F.Naveda
Talks about:
softwar (5) pair (5) identifi (4) develop (4) process (3) driven (3) model (3) engin (3) cours (3) test (3)
Person: Laurie A. Williams
DBLP: Williams:Laurie_A=
Facilitated 1 volumes:
Contributed to:
Wrote 20 papers:
- ICSE-v2-2015-TheisenHMMW #approximate #stack
- Approximating Attack Surfaces with Stack Traces (CT, KH, PM, BM, LAW), pp. 199–208.
- SCAM-2015-PanditaJSW #api #mining #using
- Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
- RE-2014-RiazKSW #automation #identification #natural language #requirements #security
- Hidden in plain sight: Automatically identifying security requirements from natural language artifacts (MR, JTK, JS, LAW), pp. 183–192.
- ICST-2010-SyedRW #fault #hardware #question
- Does Hardware Configuration and Processor Load Impact Software Fault Observability? (RAS, BR, LAW), pp. 285–294.
- ICST-2010-ZimmermannNW #predict #security
- Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista (TZ, NN, LAW), pp. 421–428.
- ICST-2009-GegickRW #component #predict
- Predicting Attack-prone Components (MG, PR, LAW), pp. 181–190.
- ICST-2009-HeckmanW #identification #process #static analysis
- A Model Building Process for Identifying Actionable Static Analysis Alerts (SSH, LAW), pp. 161–170.
- ESEC-FSE-2007-SherriffHLW #identification #static analysis #using
- Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
- A-MOST-2005-SherriffNWV #estimation #fault #haskell #metric #using
- Early estimation of defect density using an in-process Haskell metrics model (MS, NN, LAW, MAV), pp. 64–69.
- ICSE-2005-KatiraWO #student #towards
- Towards increasing the compatibility of student pair programmers (NK, LAW, JAO), pp. 625–626.
- CSEET-2004-SrikanthWWMB #on the
- On Pair Rotation in the Computer Science Course (HS, LAW, EW, CM, SB), pp. 144–149.
- ICSE-2003-MaximilienW #agile #development #testing
- Assessing Test-Driven Development at IBM (EMM, LAW), pp. 564–569.
- SAC-2003-GeorgeW #development #industrial
- An Initial Investigation of Test Driven Development in Industry (BG, LAW), pp. 1135–1139.
- SAC-J-2003-GeorgeW04 #agile #development #empirical #testing
- A structured experiment of test-driven development (BG, LAW), pp. 337–342.
- SEKE-2003-BahetiWDC #identification #information management #on the
- On Identifying Deficiencies in a Knowledge Management System (PB, LAW, AD, AC), pp. 385–392.
- CSEET-2002-ShuklaW #adaptation #programming #re-engineering
- Adapting Extreme Programming for a Core Software Engineering Course (AS, LAW), pp. 184–191.
- CSEET-2002-WilliamsLHMMN #agile #re-engineering
- Workshop 3: Integrating Agile Practices into Software Engineering Courses (LAW, MJL, GWH, MM, NRM, JFN), pp. 263–264.
- CSEET-2001-Williams #development #process #programming
- Integrating Pair Programming into a Software Development Process (LAW), p. 27–?.
- RE-2001-CarterAWD #evolution #prototype #requirements
- Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model (RAC, AIA, LAW, AD), pp. 94–101.
- CSEET-2000-WilliamsK #education #re-engineering
- The Effects of “Pair-Pressure” and “Pair-Learning” on Software Engineering Education (LAW, RRK), pp. 59–65.