37 results on '"Justin Smith"'
Search Results
2. Exploring Experiences with Automated Program Repair in Practice.
3. Py-holmes: Causal Testing for Deep Neural Networks in Python.
4. Can Language Models Employ the Socratic Method? Experiments with Code Debugging.
5. A Taxonomy of Machine Learning Fairness Tool Specifications, Features and Workflows.
6. Can Language Models Employ the Socratic Method? Experiments with Code Debugging.
7. Towards Ethical Data-Driven Software: Filling the Gaps in Ethics Research & Practice.
8. How Students Unit Test: Perceptions, Practices, and Pitfalls.
9. Field Study on Usability and Security Perceptions Surrounding Social Robots.
10. Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools for Security.
11. A Case Study of Software Security Red Teams at Microsoft.
12. Direct Multi-Step Forecasting with Multiple Time Series using XGBoost: Projecting COVID-19 Positive Hospitalization Census for a Southern Idaho Health System.
13. Does ACM's code of ethics change ethical decision making in software development?
14. An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the NICE Framework.
15. How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool.
16. Do developers read compiler error messages?
17. Cheetah: just-in-time taint analysis for Android apps.
18. Just-in-time static analysis.
19. Civic Intelligence in an Uncertain and Threatening World: Workshop.
20. Spreadsheet practices and challenges in a large multinational conglomerate.
21. Flower: Navigating program flow in the IDE.
22. Collective intelligence for the common good: cultivating the seeds for an intentional collaborative enterprise.
23. A cross-tool communication study on program analysis tool notifications.
24. Paradise unplugged: identifying barriers for female participation on stack overflow.
25. MatchingRef: Matching Variable Names in a Reference Page to Help Introductory CS Students Fix Compiler Errors.
26. Fuse: A Reproducible, Extendable, Internet-Scale Corpus of Spreadsheets.
27. Questions developers ask while diagnosing potential security vulnerabilities with static analysis.
28. A study of interactive code annotation for access control vulnerabilities.
29. Identifying successful strategies for resolving static analysis notifications.
30. Supporting Effective Strategies for Resolving Vulnerabilities Reported by Static Analysis Tools.
31. What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool.
32. The Responsibilities of Engineers.
33. Resolving input validation vulnerabilities by retracing taint flow through source code.
34. A Business-Rules Approach for Departmental Advising.
35. Resolving Input Validation Vulnerabilities by Retracing Taint Flow Through Source Code.
36. Leibnizian organisms, nested individuals, and units of selection.
37. 2019 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2019, Memphis, Tennessee, USA, October 14-18, 2019
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.