-
Kevic, K., C., Murphy, Williams, L., Beckman, J., Characterizing Experimentation in Continuous Deployment: A Case Study on Bing, International Conference on Software Engineering (ICSE) Software Engineering in Practice (SEIP) 2017, Buenos Aires, Argentina, DOI: 10.1109/ICSE-SEIP.2017.19.
-
Rahman, A., Partho, A., Meder, D., and Williams, L., Which Factors Influence Usage of Build Automation Tools? International Conference on Software Engineering (ICSE), 3rd International Workshop on Rapid Continuous Software Engineering (RCoSE) 2017, Buenos Aires, Argentina, pp. 20-26.
-
Parnin, C., Helms, E, Atlee, C., Boughton, H., Ghattas, M., Glover, A., Holman, J., Micco, J., Murphy, B., Savor, T., Stumm, M., Whitaker, S., Williams, L., Top 10 Adages in Continuous Deployment, IEEE Software, Vol. 34, Issue 3, pp. 86 - 95.
-
Best Paper, Savor, T., Douglas, M., Gentili, M., Williams, L., Beck, K., Stumm, M., Continuous Deployment at Facebook and OANDA, International Conference on Software Engineering (ICSE 2016) Software Engineering in Practice, Austin, TX, Companion pp. 21-30.
-
Rahman, A. and Williams, L., Security in DevOps: Synthesizing Practitioners Perceptions and Practices, International Workshop on Continuous Software Evolution and Delivery at the International Conference on Software Engineering (ICSE) 2016, Austin, TX, DOI: 10.1109/CSED.2016.021.
-
Rahman, A., Helms, E., Parnin, C., and Williams, L., Synthesizing Continuous Deployment Practices Used in Software Development, Agile 2015, Washington, DC, pp. 1-10.
-
Doyle, M., Williams, L. Cohn, M., and Rubin, K.,
Agile Software Development in Practice, 15th International Conference on Agile Software Development (XP2014), Rome, Italy, in Springer-Verlag Berlin, Heidelberg: Springer Agile Processes in Software Engineering and Extreme Programming, pp. 32-45.
-
Jinzenji, K., Williams, L., Hoshino, T., and Takahashi, K.,
An Experience Report for Software Quality Evaluation in Highly Iterative Development Methodology Using Traditional Metrics, International Symposium on Software Reliability Engineering (ISSRE) 2013, Pasadena, CA, pp, 310-319.
-
Murphy, B., Bird, C. Zimmerman, T., Williams, L., Nagappan, N., and Begel, A.
Have Agile Techniques Been the Silver Bullet for Software Development at Microsoft?, International Symposium on Empirical Software Engineering (ESEM) 2013, Baltimore, MD, pp, 75-84.
-
Williams, L., After All These Years, What Do Agile Teams Think About the Agile Principles?, Communications of the ACM, Vol.55, No. 4, April 2012,pp. 71-76.
-
Williams, L., Brown, G., Meltzer, A., Nagappan, N.,
Scrum + Engineering Practices: Experiences of Three Microsoft Teams, International Symposium on Empirical Software Engineering and Measurement (ESEM) 2011, Banff, Canada, DOI: 10.1109/ESEM.2011.65.
IEEE Software Best Exerience Paper Award
-
Williams, L., Kanban: Considered Helpful or Harmful in Software Development, Cutter Benchmark Review, Vol. 10. No 9, September 2010.
-
-
Williams, L., "Agile Software Development Methodologies and Practices ", in Advances in Computers, Volume 80, pp. 1-44, 2010.
-
Williams, L., On the Stickiness of Agility in Software Development, Cutter Benchmark Review, Vol. 7, No. 7, pp. 5-12, July 2007.
-
-
Ho, Chih-wei, Johnson, Michael, Williams, L.,
Maximilien, E. M.,
On Agile Performance
Requirements Specification and Testing, Agile 2006, Minneapolis, ISBN 0-7695-2562-8/06, electronic proceedings, 6 pages.
-
Layman, L., Williams, L., Cunningham, L.,
Motivations and Measurements in an Agile Case Study , Journal of System Architecture, Vol. 52, No. 11, pp. 654-667, November 2006.
-
Layman, L., Williams, L., Damian, D., Bures, H.,
Essential Communication Practices for Extreme Programming in a Global Software Development Team , Information and Software Technology, Vol. 48, No., 9, pp. 781-794, September 2006.
-
Dagnino, A., Smiley, K., Srikanth , H., Antón , A., Williams, L
. Experiences in Applying Agile Software Development Practices in New Product Development ,
International Association of Science and Technology for Development
(IASTED) Software Engineering and Applications (SEA) 2004.
-
-
-
Williams, L., Krebs, W., Layman, L., NCSU Technical Report, T
Extreme Programming Evaluation Framework for Object-Oriented Languages – Version 1.4, TR-2004-18, June 17, 2004 .
-
Williams, L., Krebs, W., Layman, L., Antón, A.,
Toward a Framework for Evaluating Extreme Programming, Empirical Assessment in Software Engineering (EASE) 2004, pp. 11-20.
-
Williams, L., “Software Engineering for Internet Applications” in The Practical Handbook of Internet Computing, Singh, M., ed., Chapman & Hall/CRC, invited, 2005, pp.43-1 – 43-13.
-
-
-
Marchesi, M., Succi, G., Wells, D., Williams,
L. (eds.),
Extreme
Programming Perspectives, Addison Wesley, 2003.
-
-
Lindvall, M., Basili, V., Boehm, B.,
Costa, P., Dangle, K., Shull, F., Tesoriero, R., Williams, L., Zelkowitz,
M.,
Empirical Findings in Agile Methods,
XP/Agile Universe 2002, Chicago, IL, Lecture Notes in Computer Science Vol. 2418, pp. 197-207.
-
Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, C., Williams, L., Attack Surface Definitions: A Systematic Literature Review, Information and Software Technology, 2018, to appear.
-
Morrison, P., Moye, D., Pandita, R., Williams, L.
Mapping the Field of Software Development Security Metrics, Information and Software Technology, Vol 102, October 2018, pp. 146-159, https://doi.org/10.1016/j.infsof.2018.05.011.
-
Kafali, O., Jones, J., Petruso, M., Williams, L. and Singh, M., How Good is a Security Policy against Real Breaches? A HIPAA Case Study, International Conference on Software Engineering (ICSE) 2017, Buenos Aires, Argentina, DOI: 10.1109/ICSE.2017.55.
-
Theisen, C., Murphy, B., Kerzig, K., Williams, L., Risk-Based Attack Surface Approximation: How Much Data is Enough?, International Conference on Software Engineering (ICSE) Software Engineering in Practice (SEIP) 2017, Buenos Aires, Argentina, DOI: 10.1109/ICSE-SEIP.2017.9.
-
King, J., Stallings, J., Riaz, M., and Williams, L., To Log, or Not to Log: Using Heuristics to Identify Mandatory Log Events – A Controlled Experiment, Empirical Software Engineering, doi:10.1007/s10664-016-9449-1, October 2017, Volume 22, Issue 5, pp 2684–2717.
-
Riaz, M., King, J., Massacci, F., Jenkins, M., Lopez, C. Q., and Williams, L., Identifying the Implied: Findings from Three Differentiated Replications on the Use of Security Requirements Templates, Empirical Software Engineering, 10.1007/s10664-016-9481-1, August 2017, Volume 22, Issue 4, pp 2127–2178.
-
Morrison, P. and Williams, L., Surveying Security Practice use in Software Development, Symposium and Bootcamp on the Science of Security (HotSoS) 2017, Hanover, MD, pp. 85-94.
-
Burcham, M., Al-Zyoud, M., Carver, J., Alsaleh, M., Du, H., Gilani, F., Jiang, J., Rahman, A., Kafali, O., Al-Shaer, E., Williams, L., Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Paper, Symposium and Bootcamp on the Science of Security (HotSoS) 2017, Hanover, MD, pp. 13-23.
-
Morrison, P. and Williams, L., Measuring Security Practice Use: A Case Study At IBM, 3rd International Workshop on Rapid Continuous Software Engineering (RCoSE) 2017, 5th International Workshop on Conducting empirical studies in industry (CESI) 2017, Buenos Aires, Argentina, DOI: 10.1109/CESI.2017.4
-
Rahman, A., Pradhan, P., Partho, A., and Williams, L., Predicting Android Application Security and Privacy Risk With Static Code Metrics, Short paper, 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft) 2017, Buenos Aires, Argentina, DOI: 10.1109/MOBILESoft.2017.14.
-
Riaz, M., Stallings, J., Singh, M., Slankas, J., and Williams, L., Discovering Goals for Security Requirements Engineering – DIGS Framework and Evaluation, International Symposium on Empirical Software Engineering and Measurement (ESEM) 2016, Ciudad Real, Spain, Article 35
-
Kafali, O., Singh, M., Williams, L. NANE: Identifying Misuse Cases Using Temporal Norm Enactments, International Conference on Requirements Engineering (RE 2016), Beijing, China, DOI: 10.1109/RE.2016.34.
-
Theisen, C., Williams, L., Oliver, K., and Murphy-Hill, E. Software Security Education at Scale, International Conference on Software Engineering (ICSE) Software Engineering Education and Training (SEET) track 2016, Austin, TX, 2016.
-
Riaz, M., Elder, S., and Williams, L., Prevention, Detection, and Response Patterns of Security Requirements, at Third International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) at Requirements Engineering (RE) 2016, DOI 10.1109/REW.2016.025.
-
Carver, J., Burcham, M., Kocak, S. A., Bener, A., Felderer, M., Gander, M., King, J., Markkula, J., Oivo, M., Sauerwein, C. and Williams, L., Establishing a Baseline for Measuring Advancement in the Science of Security – an Analysis of the 2015 IEEE Security & Privacy Proceedings, Symposium and Bootcamp on the Science of Security (HotSoS) 2016, Pittsburgh, PA, pp. 38-51.
-
Theisen, C., Herzig, K., Morrison, P., Murphy, B., and Williams, L., Approximating Attack Surfaces with Stack Traces, International Conference on Software Engineering (ICSE) Software Engineering in Practice 2015, Florence, Italy.
-
King, J., Pandita, R., and Williams, L., Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events, Symposium and bootcamp on the Science of Security (HotSoS 2015), Urbana-Champaign, IL, Article 6.
-
Morrison, P., Herzig, K., Murphy, B. and Williams, L., Challenges with Applying Vulnerability Prediction Models, Symposium and bootcamp on the Science of Security (HotSoS 2015), Urbana-Champaign, IL, Article 4.
-
King, J., Smith, B, and Williams, L.,Modifying Without a Trace: General Audit Guidelines are Inadequate for Electronic Health Record Audit Mechanisms, 2nd ACM SIGHIT International Health Informatics Symposium (IHI) 2012, Miami, FL, USA, pp.305-314r.
-
Shin, Y. and Williams, L., An Initial Study on the Use of Execution Complexity Metrics as Indicators of Software Vulnerabilities, 7th International Workshop on Software Engineering for Secure Systems 2011 at the International Conference on Software Engineering, Honolulu, USA, electronic proceedings.
-
Helms, E. and Williams, L., Evaluating Access Control of Open Source Health Record Systems, 3rd Workshop on Software Engineering in Healthcare (SEHC) at the International Conference on Software Engineering, Honolulu, USA, electronic proceedings.
-
Austin, A. and Williams, L., One Technique is Not Enough: An Empirical Comparison of Vulnerability Discovery Techniques, International Symposium on Empirical Software Engineering and Meaurement (ESEM) 2011, Banff, Canada, DOI: 10.1109/ESEM.2011.18.
-
-
Shin, Y., Meneely, A., Williams, L., Osbourne, J., Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities, IEEE Transactions in Software Engineering, Volume: 37, Issue: 6, Nov.-Dec. 2011, pp. 772 - 787.
-
B. Smith, A. Austin, M. Brown, J. King, J. Lankford, A. Meneely, L. Williams,
Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected, Security and Privacy in Medical and
Home-care Systems (SPIMACS 2010) Workshop of ACM Computers and Communication Security 2010, Chicago, IL, pp. 1-12.
-
Williams, L., Meneely, A., and Shipley, G.,
Protection Poker: The New Software Security "Game", IEEE Security and Privacy, Vol. 8, Number 3, May/June 2010, pp. 14-20.
-
-
Zimmermann, T., Nagappan, N. and Williams, L., ,
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista, International Conference on Software Testing, Verification, and Validation (ICST) 2010, Paris, France, pp.421-428.
-
B. Smith, L. Williams, A. Austin,
"Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks", Lecture Notes in Computer Science, vol. 5965, Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy, pp. 192-200, 2010.
- Austin, A., Smith, B., and Williams, L., Towards Improved Security Criteria for Certification of Electronic Health Record Systems, 2nd Workshop on Software Engineering in Healthcare at the International Conference on Software Engineering (ICSE) 2010, Cape Town, South Africa, electronic proceedings.
-
-
-
Gegick, M., Rotella, P. and Williams, L.,
Predicting Attack-Prone Components, International Conference on Software Testing, Verification, and Validation (ICST) 2009, Denver, CO, pp. 181-190.
-
Williams, L., Gegick, M., and Meneely, A.,
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer, International Symposium on Engineering Secure Software and Systems (ESSoS) 2009, Leuven, Belgium, pp. 122-134 [
Protection Poker tutorial]
-
-
-
- Shin, Y. and Williams, L., Is Complexity Really the Enemy of Software Security?, Quality of Protection Workshop at the ACM Conference on Computers and Communications Security (CCS) 2008, Alexandria, VA, pp. 47-50.
- Gegick, M., Williams, L., Osborne, J., and Vouk, M., Prioritizing Software Security Fortification through Code-Level Security Metrics, Quality of Protection Workshop at the ACM Conference on Computers and Communications Security (CCS) 2008, Alexandria, VA, pp. 31-38.
- Shin, Y. and Williams, L., An Empirical Model to Predict Security Vulnerabilities Using Code Complexity Metrics, IEEE Empirical Software Engineering and Metrics (ESEM) 2008 short paper, Kaiserslautern , Germany, pp. 315-317.
-
-
Smith, B.. Shin, Y. and Williams, L.,
Proposing SQL Statement Coverage Metrics, 4th Intl. Workshop on Software Engineering for Secure Systems (SESS 2008) at the International Conference on Software Engineering (ICSE), Leipzig, Germany, pp. 49-56.
-
-
-
-
Shin, Y., Williams, L., and Xie, T.,
SQLUnitGen: SQL Injection Testing Using Static and Dynamic Analysis, Student Paper at the International Symposium on Software Reliability Engineering (ISSRE) 2006, Raleigh, NC, ISBN 978-0-9671473-3-3-8.
-
-
-
-
Pandita. R., Kunal, T., Tung, T., ICON: Inferring Temporal Constraints from Natural Language API Descriptions, International Conference on Software Maintenance and Evolution (ICSME) 2016, Raleigh, NC DOI: 10.1109/ICSME.2016.59.
-
Menzies, T., Williams, L., Zimmerman, T., Perspective in Data Science for Software Engineering, Morgan Kaufmann, 2016.
-
Pandita, R., Jetley, R., Sudarsan, S., and Williams, L., TMAP: Discoving Likely Mappings between APIs using Text Mining, 15th IEEE International Working Conference on Source Code Anaalysis and Manipulation (SCAM) 2015, Bremen, Germany, pp. 231 - 240.
-
Riaz, M., Breaux, T., and Williams, L., How Have We Evaluated Software Patterns in Problem Solving? A Systematic Mapping Study of Research Design Practices, Information and Software Technology, April 2015.
-
Murphy, B., Czerwonka, J., and Williams, L, Using Data to Make Decisions in Software Engineering: Providing a Method to Our Madness, in "The Art and Science of Analyzing Software Data" Bird, C., Menzies, T., and Zimmerman, T. (eds), Morgan Kaufmann, 2015.
-
Schmidt, J. Y., Antón, A., Williams, L., and Otto, P., The Role of Data Use Agreements in Specifying Legally Compliant Software Requirements, Fourth Workshop on Requirements Engineering and Law at Requirements Engineering (RE) 2011, Trento, Italy, pp. 1-4,.
-
Meneely, A, Smith, B. and Williams, L., Validating Software Metrics: A Spectrum of Philosophies, ACM Transactions on Software Engineering, Volume 21 Issue 4, November 2012 Article No. 24.
-
Meneely, A, Rotella, P. and Williams, L., Does Adding Manpower Also Affect Quality? An Empirical Longitudinal Analysis, ACM Foundations of Software Engineering (FSE) 2011, Szeged, Hungary, pp. 81-90.
-
Meneely, A, Smith, B. and Williams, L., The iTrust Electronic Health Records System in Software and Systems Traceability, Huang, Jane, Gotel, Orlena, Zisman, Andrea (Eds.) ISBN: 978-1-4471-2238-8.
-
-
Meneely, A. and Williams, L., On the Use of Issue Tracking Annotations for Improving Developer Activity Metrics, Advances in Software Engineering, DOI: 10.1155/2010/273080.
-
Heckman, S. and Williams, L.,
Systematic Literature Review of Actionable Alert Identification Techniques for Automated Static Code Analysis, Information and Software Technology, Vol. 53, No. 4, April 2011.
-
-
-
-
-
Ho, C-w, Williams, L., and Robinson, B.,
Examining the Relationships between Performance Requirements and “Not a Problem” Defect Reports, Requirements Engineering (RE) 2008, Barcelona, Spain,
-
Layman, L., Williams, L., and St. Amant, L., MimEc: Intelligent User Notification of Faults in the Eclipse IDE, Cooperative and Human Aspects of Software Engineering (CHASE) workshop at the International Conference on Software Engineering (ICSE), Leipzig, Germany, pp. 73-76.
-
-
Sherriff, M. and Williams, L.,
Empirical Software Change Impact Analysis Using Singular Value Decomposition, International Conference on Software Testing, Verification and Validation 2008, Lillehammer, Norway, pp. 268-277.
-
Ho, C-w, Williams, L., Antón, A.,
Improving Performance Requirements Specification from Field Failure Reports, IEEE International Requirements Engineering Conference 2007, New Delhi, India, pp. 79-88.
-
Layman, L., Williams, L, St. Amant, R.,
Toward Reducing Fault Fix Time: Understanding Developer Behavior for the Design of Automated Fault Detection Tools, Empirical Software Engineering and Metrics (ESEM) 2007, Madrid, Spain, pp. 176-185.
Best Paper Award
-
Williams, L.,
Structuring Families of Industrial Case Studies in
Empirical Software Engineering Issues: Critical Assessment and Future Directions, edited by Basili, V., Rombach, D., Schneider, K., Kitchenham, B., Pfahl, D., and Selby, R., Berlin: Springer LNCS 4336, p. 134, 2007.
- Prechelt, L. and Williams, L.,Industry-Research Collaboration Working Group Results in Empirical Software Engineering Issues: Critical Assessment and Future Directions ,edited by Basili, V., Rombach, D., Schneider, K., Kitchenham, B., Pfahl, D., and Selby, R., Berlin: Springer LNCS 4336, p. 153-157, 2007.
-
Williams, L., Erdogmus, H., and Selby, R.,
Roadmapping Working Group 4 Results in
Empirical Software Engineering Issues: Critical Assessment and Future Directions, edited by Basili, V., Rombach, D., Schneider, K., Kitchenham, B., Pfahl, D., and Selby, R., Berlin: Springer LNCS 4336, p. 134, 2007.
-
Layman, L., Williams, L., and Slaten, K.,
Note to Self: Make Assignments Meaningful, ACM Technical Symposium on Computer Science Education (SIGCSE) 2007, Covington, KY, pp. 459-463.
-
Layman, L., Cornwell, T., Williams, L., Osborne, J.,
Personality Profiles and Learning Styles of Advanced Undergraduate Computer Science Students, NCSU CSC Technical Report, TR-2005-40, August 29, 2005.
-
-
Williams, L., Smith, S., Rappa, M.,
Resources for Agile Software Development in the Software Engineering Course, Course Materials, Conference on Software Engineering Education and Training (CSEET) 2005, Ottawa, CA, pp. 236-238.
-
Rappa, M., Smith, S., Yacoub, A
., Williams, L.,
OpenSeminar: A Web Based Collaboration Tool for Open Educational Resources , IEEE Collaborate Com, San Jose, CA.
-
Baheti, P., Williams, L., Dagnino, A.,
Cordes, A.,
On Identifying Defects in
a Knowledge Management System, Software Engineering Knowledge Engineering
(SEKE) 2003, San Francisco, pp. 385-392.
-
Borstler, J.
Carrington, D.
Hislop, G.W.
Lisack, S.
Olson, K.
Williams, L.
Teaching PSP: challenges
and lessons learned, IEEE Software, Vol. 19, No. 5, pp. 42-48, Sept/Oct 2002.
-
George, B., Mansour, M., Williams, L.,
A multidisciplinary virtual team,
14th international conference on college teaching and learning, 2002, Jacksonville, FL.
-
Carter, Ryan, Anton, Annie, Dagnino,
Aldo, and Williams, Laurie.
Evolving
Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping
Model. Requirements Engineering 2001, Toronto, Toronto, Canada, pp. 138-145..
-
Anton, A., Carter, R., Srikanth, H.,
Sureka, A., Williams, L., Yang, K.,
Tailored
CMM for Small e-Commerce Company-Level 2: Repeatable,
NCSU Technical Report, NCSU Technical Report, TR-2001-09, August
23, 2001.
-
Anton, A. Carter, R., Earp, J., and Williams,
L.
EPRAM: Evolutionary Prototyping
Risk Analysis and Mitigation (e-Commerce Software Development
Process Document), NCSU Technical Report, TR-2001-08, August 20, 2001.
-
-
Williams, L.
But,
isn't that cheating? Frontiers in Education Conference
Faculty Fellow, 1999. FIE '99. 29th Annual , Volume: 2, San Juan, 1999.
-
-
|
All
website content © NCSU, Laurie Williams, 2018. This page last
updated:
Wednesday, July 25, 2018 11:27 AM
|
|
|
|
|