Byron J. Williams
Title
Cited by
Cited by
Year
Characterizing software architecture changes: A systematic review
BJ Williams, JC Carver
Information and Software Technology 52 (1), 31-51, 2010
1702010
Managing technical debt: An industrial case study
Z Codabux, B Williams
2013 4th International Workshop on Managing Technical Debt (MTD), 8-15, 2013
782013
Exception handling defects: An empirical study
P Sawadpong, EB Allen, BJ Williams
2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012
462012
The correspondence between software quality models and technical debt estimation approaches
I Griffith, D Reimanis, C Izurieta, Z Codabux, A Deo, B Williams
2014 Sixth International Workshop on Managing Technical Debt, 19-26, 2014
292014
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
BJ Williams, J Carver, RB Vaughn
Software Engineering Research and Practice, 966-971, 2006
272006
Cyber security for emergency management
J Walker, BJ Williams, GW Skelton
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
192010
A preliminary study examining relationships between nano-patterns and software security vulnerabilities
KZ Sultana, A Deo, BJ Williams
2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016
142016
Empirical evidence of code decay: A systematic mapping study
A Bandi, BJ Williams, EB Allen
2013 20th Working Conference on Reverse Engineering (WCRE), 341-350, 2013
142013
Preliminary study on assessing software defects using nano-pattern detection
A Deo, BJ Williams
Proceedings of the 24th International Conference on Software Engineering and …, 2015
132015
Correlation analysis among java nano-patterns and software vulnerabilities
KZ Sultana, A Deo, BJ Williams
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
122017
Technical debt prioritization using predictive analytics
Z Codabux, BJ Williams
2016 IEEE/ACM 38th International Conference on Software Engineering …, 2016
122016
Characterizing software architecture changes: an initial study
BJ Williams, JC Carver
First International Symposium on Empirical Software Engineering and …, 2007
122007
High false positive detection of security vulnerabilities: a case study
M Nadeem, BJ Williams, EB Allen
Proceedings of the 50th Annual Southeast Regional Conference, 359-360, 2012
112012
Examination of the software architecture change characterization scheme using three empirical studies
BJ Williams, JC Carver
Empirical Software Engineering 19 (3), 419-464, 2014
102014
A quality assurance approach to technical debt
Z Codabux, BJ Williams, N Niu
Proceedings of the International Conference on Software Engineering Research …, 2014
92014
A study examining relationships between micro patterns and security vulnerabilities
KZ Sultana, BJ Williams, T Bhowmik
Software Quality Journal 27 (1), 5-41, 2019
52019
Evaluating micro patterns and software metrics in vulnerability prediction
KZ Sultana, BJ Williams
2017 6th International Workshop on Software Mining (SoftwareMining), 40-47, 2017
52017
A method for recommending computer-security training for software developers: Leveraging the power of static analysis techniques and vulnerability repositories
M Nadeem, EB Allen, BJ Williams
2015 12th International Conference on Information Technology-New Generations …, 2015
52015
An empirical assessment of technical debt practices in industry
Z Codabux, BJ Williams, GL Bradshaw, M Cantor
Journal of Software: Evolution and Process 29 (10), e1894, 2017
42017
The Relationship Between Code Smells and Traceable Patterns—Are They Measuring the Same Thing?
Z Codabux, KZ Sultana, BJ Williams
International Journal of Software Engineering and Knowledge Engineering 27 …, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20