Byron J. Williams
Cited by
Cited by
Characterizing software architecture changes: A systematic review
BJ Williams, JC Carver
Information and Software Technology 52 (1), 31-51, 2010
Managing technical debt: An industrial case study
Z Codabux, B Williams
2013 4th International Workshop on Managing Technical Debt (MTD), 8-15, 2013
Exception handling defects: An empirical study
P Sawadpong, EB Allen, BJ Williams
2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012
The correspondence between software quality models and technical debt estimation approaches
I Griffith, D Reimanis, C Izurieta, Z Codabux, A Deo, B Williams
2014 sixth international workshop on managing technical debt, 19-26, 2014
Long-timescale fluctuations in zero-field magnetic vortex oscillations driven by dc spin-polarized current
VS Pribiag, G Finocchio, BJ Williams, DC Ralph, RA Buhrman
Physical Review B—Condensed Matter and Materials Physics 80 (18), 180411, 2009
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
BJ Williams, JC Carver, RB Vaughn
Software Engineering Research and Practice, 966-971, 2006
Technical debt prioritization using predictive analytics
Z Codabux, BJ Williams
Proceedings of the 38th International Conference on Software Engineering …, 2016
An empirical assessment of technical debt practices in industry
Z Codabux, BJ Williams, GL Bradshaw, M Cantor
Journal of software: Evolution and Process 29 (10), e1894, 2017
Empirical evidence of code decay: A systematic mapping study
A Bandi, BJ Williams, EB Allen
2013 20th Working Conference on Reverse Engineering (WCRE), 341-350, 2013
{BigMAC}:{Fine-Grained} policy analysis of android firmware
G Hernandez, DJ Tian, AS Yadav, BJ Williams, KRB Butler
29th USENIX Security Symposium (USENIX Security 20), 271-287, 2020
High false positive detection of security vulnerabilities: a case study
M Nadeem, BJ Williams, EB Allen
Proceedings of the 50th Annual Southeast Regional Conference, 359-360, 2012
Cyber security for emergency management
J Walker, BJ Williams, GW Skelton
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
Correlation analysis among java nano-patterns and software vulnerabilities
KZ Sultana, A Deo, BJ Williams
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
A preliminary study examining relationships between nano-patterns and software security vulnerabilities
KZ Sultana, A Deo, BJ Williams
2016 IEEE 40th annual computer software and applications conference (COMPSAC …, 2016
A quality assurance approach to technical debt
Z Codabux, BJ Williams, N Niu
Proceedings of the International Conference on Software Engineering Research …, 2014
Examination of the software architecture change characterization scheme using three empirical studies
BJ Williams, JC Carver
Empirical Software Engineering 19, 419-464, 2014
Preliminary study on assessing software defects using nano-pattern detection
A Deo, BJ Williams
Proceedings of the 24th International Conference on Software Engineering and …, 2015
Evaluating micro patterns and software metrics in vulnerability prediction
KZ Sultana, BJ Williams
2017 6th International Workshop on Software Mining (SoftwareMining), 40-47, 2017
Characterizing software architecture changes: an initial study
BJ Williams, JC Carver
First International Symposium on Empirical Software Engineering and …, 2007
Permpress: Machine learning-based pipeline to evaluate permissions in app privacy policies
MS Rahman, P Naghavi, B Kojusner, S Afroz, B Williams, S Rampazzi, ...
IEEE Access 10, 89248-89269, 2022
The system can't perform the operation now. Try again later.
Articles 1–20