Sciweavers

25 search results - page 1 / 5
» esem 2008
Sort
View
115
Voted
ESEM
2008
ACM
15 years 2 months ago
An empirical investigation of scenarios gained and lost in architecture evaluation meetings
Dietmar Winkler, Stefan Biffl, Muhammad Ali Babar
117
Voted
ESEM
2009
ACM
14 years 11 months ago
Security of open source web applications
In an empirical study of fourteen widely used open source PHP web applications, we found that the vulnerability density of the aggregate code base decreased from 8.88 vulnerabilit...
James Walden, Maureen Doyle, Grant A. Welch, Micha...
109
Voted
ESEM
2008
ACM
15 years 2 months ago
Fit data selection for software effort estimation models
To construct a better multivariate regression model for software effort estimation, this paper proposes a method to select projects as a fit data from a given project data set bas...
Koji Toda, Akito Monden, Ken-ichi Matsumoto
102
Voted
ESEM
2008
ACM
15 years 2 months ago
An empirical model to predict security vulnerabilities using code complexity metrics
Complexity is often hypothesized to be the enemy of software security. If this hypothesis is true, complexity metrics may be used to predict the locale of security problems and ca...
Yonghee Shin, Laurie Williams
111
Voted
ESEM
2008
ACM
15 years 2 months ago
Using students as subjects - an empirical evaluation
An important task in Requirements Engineering is to select which requirements that should go into a specific release of a system. This is a complex decision that requires balancin...
Mikael Svahnberg, Aybüke Aurum, Claes Wohlin