Laurie A. Williams, Ph.D. - Publications

Affiliations: 
2000 University of Utah, Salt Lake City, UT 
Area:
Computer Science, Industrial Engineering

60 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2022 Rahman MR, Imtiaz N, Storey MA, Williams L. Why secret detection tools are not enough: It's not just about false positives - An industrial case study. Empirical Software Engineering. 27: 59. PMID 35313538 DOI: 10.1007/s10664-021-10109-y  0.303
2020 Mirakhorli M, Galster M, Williams L. Understanding Software Security from Design to Deployment Acm Sigsoft Software Engineering Notes. 45: 25-26. DOI: 10.1145/3385678.3385687  0.351
2020 Theisen C, Williams L. Better Together: Comparing Vulnerability Prediction Models Information & Software Technology. 119: 106204. DOI: 10.1016/J.Infsof.2019.106204  0.346
2020 Rahman A, Farhana E, Williams L. The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code Empirical Software Engineering. 25: 3430-3467. DOI: 10.1007/S10664-020-09841-8  0.347
2020 Guo H, Kafalı Ö, Jeukeng A, Williams L, Singh MP. Çorba : crowdsourcing to obtain requirements from regulations and breaches Empirical Software Engineering. 25: 532-561. DOI: 10.1007/S10664-019-09753-2  0.403
2019 Yu Z, Theisen C, Williams L, Menzies T. Improving Vulnerability Inspection Efficiency Using Active Learning Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2019.2949275  0.379
2019 Rahman A, Williams L. Source code properties of defective infrastructure as code scripts Information & Software Technology. 112: 148-163. DOI: 10.1016/J.Infsof.2019.04.013  0.326
2019 Rahman A, Mahdavi-Hezaveh R, Williams L. A systematic mapping study of infrastructure as code research Information & Software Technology. 108: 65-77. DOI: 10.1016/J.Infsof.2018.12.004  0.378
2018 Theisen C, Dunaiski M, Williams L, Visser W. Software Engineering Research at the International Conference on Software Engineering in 2016 Acm Sigsoft Software Engineering Notes. 42: 1-7. DOI: 10.1145/3149485.3149496  0.401
2018 Williams L, McGraw G, Migues S. Engineering Security Vulnerability Prevention, Detection, and Response Ieee Software. 35: 76-80. DOI: 10.1109/Ms.2018.290110854  0.414
2018 Theisen C, Munaiah N, Al-Zyoud M, Carver JC, Meneely A, Williams L. Attack surface definitions: A systematic literature review Information & Software Technology. 104: 94-103. DOI: 10.1016/J.Infsof.2018.07.008  0.302
2018 Morrison P, Moye D, Pandita R, Williams L. Mapping the field of software life cycle security metrics Information & Software Technology. 102: 146-159. DOI: 10.1016/J.Infsof.2018.05.011  0.408
2018 Morrison PJ, Pandita R, Xiao X, Chillarege R, Williams L. Are vulnerabilities discovered and resolved like other defects Empirical Software Engineering. 23: 1383-1421. DOI: 10.1007/S10664-017-9541-1  0.365
2017 Parnin C, Helms E, Atlee C, Boughton H, Ghattas M, Glover A, Holman J, Micco J, Murphy B, Savor T, Stumm M, Whitaker S, Williams L. The Top 10 Adages in Continuous Deployment Ieee Software. 34: 86-95. DOI: 10.1109/Ms.2017.86  0.368
2017 Riaz M, King JT, Slankas J, Williams L, Massacci F, Quesada-López C, Jenkins M. Identifying the implied: Findings from three differentiated replications on the use of security requirements templates Empirical Software Engineering. 22: 2127-2178. DOI: 10.1007/S10664-016-9481-1  0.332
2017 King JT, Stallings J, Riaz M, Williams L. To log, or not to log: using heuristics to identify mandatory log events – a controlled experiment Empirical Software Engineering. 22: 2684-2717. DOI: 10.1007/S10664-016-9449-1  0.31
2017 Pandita R, Jetley R, Sudarsan S, Menzies T, Williams L. TMAP: Discovering relevant API methods through text mining of API documentation Journal of Software: Evolution and Process. 29. DOI: 10.1002/Smr.1845  0.301
2016 Hibshi H, Breaux TD, Riaz M, Williams L. A grounded analysis of experts’ decision-making during security assessments Journal of Cybersecurity. 2: 147-163. DOI: 10.1093/Cybsec/Tyw010  0.313
2015 Riaz M, Breaux T, Williams L. How have we evaluated software pattern application? A systematic mapping study of research design practices Information and Software Technology. 65: 14-38. DOI: 10.1016/J.Infsof.2015.04.002  0.368
2014 Srikanth H, Banerjee S, Williams L, Osborne J. Towards the prioritization of system test cases Software Testing, Verification & Reliability. 24: 320-337. DOI: 10.1002/Stvr.1500  0.366
2013 Austin A, Holmgreen C, Williams L. A comparison of the efficiency and effectiveness of vulnerability discovery techniques Information & Software Technology. 55: 1279-1288. DOI: 10.1016/J.Infsof.2012.11.007  0.378
2012 Meneely A, Smith B, Williams L. Validating software metrics: A spectrum of philosophies Acm Transactions On Software Engineering and Methodology. 21: 24. DOI: 10.1145/2377656.2377661  0.364
2012 Williams L. What agile teams think of agile principles Communications of the Acm. 55: 71-76. DOI: 10.1145/2133806.2133823  0.368
2011 Shin Y, Meneely A, Williams L, Osborne JA. Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities Ieee Transactions On Software Engineering. 37: 772-787. DOI: 10.1109/Tse.2010.81  0.402
2011 Heckman S, Williams L. A systematic literature review of actionable alert identification techniques for automated static code analysis Information & Software Technology. 53: 363-387. DOI: 10.1016/J.Infsof.2010.12.007  0.338
2010 Meneely A, Williams L. On the Use of Issue Tracking Annotations for Improving Developer Activity Metrics Advances in Software Engineering. 2010: 1-9. DOI: 10.1155/2010/273080  0.353
2010 Williams L. Agile Software Development Methodologies and Practices Advances in Computers. 80: 1-44. DOI: 10.1016/S0065-2458(10)80001-4  0.429
2010 Williams L. Guest editorial: Special issue on software reliability engineering Empirical Software Engineering. 15: 321-322. DOI: 10.1007/S10664-010-9129-5  0.367
2009 Everett W, Cusick J, Williams L. John D. Musa Ieee Software. 26: 102-102. DOI: 10.1109/Ms.2009.132  0.326
2009 Smith BH, Williams L. Should software testers use mutation analysis to augment a test set Journal of Systems and Software. 82: 1819-1832. DOI: 10.1016/J.Jss.2009.06.031  0.312
2008 Nagappan N, Maximilien EM, Bhat T, Williams L. Realizing quality improvement through test driven development: Results and experiences of four industrial teams Empirical Software Engineering. 13: 289-302. DOI: 10.1007/S10664-008-9062-Z  0.427
2007 Johnson MJ, Maximilien EM, Ho CW, Williams L. Incorporating performance testing in test-driven development Ieee Software. 24: 67-73. DOI: 10.1109/Ms.2007.77  0.321
2007 Gegick M, Williams L. On the design of more secure software-intensive systems by use of attack patterns Information & Software Technology. 49: 381-397. DOI: 10.1016/J.Infsof.2006.06.002  0.415
2006 Garzia M, Hudepohl J, Snipes W, Lyu M, Musa J, Smidts C, Williams L. How should software reliability engineering (SRE) be taught? Acm Sigsoft Software Engineering Notes. 31: 1-5. DOI: 10.1145/1142958.1142961  0.405
2006 Zheng J, Williams L, Nagappan N, Snipes W, Hudepohl JP, Vouk MA. On the value of static analysis for fault detection in software Ieee Transactions On Software Engineering. 32: 240-253. DOI: 10.1109/Tse.2006.38  0.331
2006 Williams L. Debunking the nerd stereotype with pair programming Ieee Computer. 39: 83-85. DOI: 10.1109/Mc.2006.160  0.344
2006 Layman L, Williams L, Cunningham L. Motivations and measurements in an agile case study Journal of Systems Architecture. 52: 654-667. DOI: 10.1016/J.Sysarc.2006.06.009  0.365
2006 Layman L, Williams L, Damian D, Bures H. Essential communication practices for Extreme Programming in a global software development team Information and Software Technology. 48: 781-794. DOI: 10.1016/J.Infsof.2006.01.004  0.335
2005 Nagappan N, Williams L, Vouk M, Osborne J. Early estimation of software quality using in-process testing metrics: A controlled case study Proceedings - International Conference On Software Engineering. 46-52. DOI: 10.1145/1082983.1083304  0.381
2005 Gegick M, Williams L. Matching attack patterns to security vulnerabilities in software-intensive system designs Acm Sigsoft Software Engineering Notes. 30: 1-7. DOI: 10.1145/1082983.1083211  0.372
2005 Williams L, Layman L, Abrahamsson P. On establishing the essential components of a technology-dependent framework: a strawman framework for industrial case study-based research Acm Sigsoft Software Engineering Notes. 30: 1-5. DOI: 10.1145/1082983.1083179  0.366
2005 Srikanth H, Williams L. On the economics of requirements-based test case prioritization Acm Sigsoft Software Engineering Notes. 30: 1-3. DOI: 10.1145/1082983.1083100  0.35
2005 Zheng J, Robinson B, Williams L, Smiley K. A process for identifying changes when source code is not available Acm Sigsoft Software Engineering Notes. 30: 1-4. DOI: 10.1145/1082983.1082957  0.336
2004 Williams L. On the need for a process for making reliable quality comparisons with industrial data Acm Sigsoft Software Engineering Notes. 29: 1-4. DOI: 10.1145/1022494.1022546  0.35
2004 Ho C, Slaten K, Williams L, Berenson S. Work in progress-unexpected student outcome from collaborative agile software development practices and paired programming in a software engineering course Frontiers in Education. 621-622. DOI: 10.1109/Fie.2004.1408595  0.394
2004 George B, Williams LA. A structured experiment of test-driven development Information & Software Technology. 46: 337-342. DOI: 10.1016/J.Infsof.2003.09.011  0.398
2003 Williams L, Cockburn A. Agile software development: it's about feedback and change Ieee Computer. 36: 39-43. DOI: 10.1109/Mc.2003.1204373  0.378
2003 Erdogmus H, Williams L. The Economics Of Software Development By Pair Programmers The Engineering Economist. 48: 283-319. DOI: 10.1080/00137910309408770  0.422
2003 Melnik G, Williams LA, Geras A. 2nd International Workshop on Empirical Evaluation of Agile Methods (“The Data Workshop”) Lecture Notes in Computer Science. 211-211. DOI: 10.1007/978-3-540-45122-8_26  0.363
2003 Nagappan N, Williams LA, Wiebe EN, Miller C, Balik S, Ferzli M, Petlick J. Pair Learning: With an Eye Toward Future Success Lecture Notes in Computer Science. 185-198. DOI: 10.1007/978-3-540-45122-8_21  0.313
2003 Stotts PD, Williams LA, Nagappan N, Baheti P, Jen D, Jackson A. Virtual teaming: Experiments and experiences with distributed pair programming Lecture Notes in Computer Science. 2753: 129-141. DOI: 10.1007/978-3-540-45122-8_15  0.378
2002 Börstler J, Carrington D, Hislop GW, Lisack S, Olson K, Williams L. Teaching PSP: Challenges and lessons learned Ieee Software. 19: 42-48. DOI: 10.1109/Ms.2002.1032853  0.389
2002 Williams L, Wiebe E, Yang K, Ferzli M, Miller C. In Support of Pair Programming in the Introductory Computer Science Course Computer Science Education. 12: 197-212. DOI: 10.1076/Csed.12.3.197.8618  0.301
2002 Hislop GW, Lutz MJ, Naveda JF, McCracken WM, Mead NR, Williams LA. Integrating Agile Practices into Software Engineering Courses Computer Science Education. 12: 169-185. DOI: 10.1076/Csed.12.3.169.8619  0.421
2002 Williams L, Tomayko JE. Agile Software Development Computer Science Education. 12: 167-168. DOI: 10.1076/Csed.12.3.167.8613  0.393
2002 Lindvall M, Basili VR, Boehm BW, Costa P, Dangle K, Shull F, Tesoriero R, Williams LA, Zelkowitz MV. Empirical Findings in Agile Methods Lecture Notes in Computer Science. 197-207. DOI: 10.1007/3-540-45672-4_19  0.337
2001 Carter RA, Anton AI, Dagnino A, Williams L. Evolving beyond requirements creep: a risk-based evolutionary prototyping model Requirements Engineering. 94-101. DOI: 10.1109/Isre.2001.948548  0.389
2001 Williams LA, Kessler RR. Experiments with Industry's ''Pair-Programming'' Model in the Computer Science Classroom Computer Science Education. 11: 7-20. DOI: 10.1076/Csed.11.1.7.3846  0.328
2000 Williams L, Kessler RR, Cunningham W, Jeffries R. Strengthening the case for pair programming Ieee Software. 17: 19-25. DOI: 10.1109/52.854064  0.341
1999 Williams LA. Adjusting the instruction of the personal software process to improve student participation Computer Standards & Interfaces. 21: 162. DOI: 10.1016/S0920-5489(99)92164-5  0.313
Show low-probability matches.