We report on the fourth in a series of studies on the reliability of application programs in the face of random input. Over the previous 15 years, we have studied the reliability ...
The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
The recent emergence of web mash-ups and open source software is driving the development of new practices in software and systems development. In this paper we explore novel pract...
Ingbert R. Floyd, M. Cameron Jones, Dinesh Rathi, ...
Estimating remaining defects or failures in software can help test managers make release decisions during testing. Several methods exist to estimate defect content, among them a v...
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...