Search Constraints
Search Results
Select an image to start the slideshow
Artifacts of `Detecting Software Vulnerabilities via Requirements Dependency Analysis'
1 of 15
Artifacts of Prompting Creative Requirements via Traceable and Adversarial Examples in Deep Learning
2 of 15
Code for SWMM's metamorphic testing
3 of 15
Completeness of Natural Language Requirements: A Comparative Study of User Stories and Feature Descriptions: Replication Package
4 of 15
Data of Classifying I/O Variables via Machine Learning
5 of 15
Data of Software Engineering Interviews and Video Resumes
6 of 15
Data of SWMM Developers' MR Constructions
7 of 15
Data of SWMM I/O Associations
8 of 15
Data of SysML Modeling Mistakes
9 of 15
Data of SysML SMD Environment Assumptions
10 of 15
A Process Mining Approach to Improving Defect Detection of SysML Models
11 of 15
RE'16 Viewpoint Merging Study Materials
12 of 15
Replication Package of Environmental Variations of Software Features: A Logical Test Cases' Perspective
13 of 15
Study Materials of Complementarity in Requirements Tracing
14 of 15
Subject Systems Dataset
15 of 15