Search Constraints
Search Results
Select an image to start the slideshow
Artifacts of `Detecting Software Vulnerabilities via Requirements Dependency Analysis'
1 of 18
Artifacts of Prompting Creative Requirements via Traceable and Adversarial Examples in Deep Learning
2 of 18
Code for SWMM's metamorphic testing
3 of 18
Completeness of Natural Language Requirements: A Comparative Study of User Stories and Feature Descriptions: Replication Package
4 of 18
Data of Classifying I/O Variables via Machine Learning
5 of 18
Data of Software Engineering Interviews and Video Resumes
6 of 18
Data of SWMM Developers' MR Constructions
7 of 18
Data of SWMM I/O Associations
8 of 18
Data of SWMM Unit Tests
9 of 18
Data of SysML Modeling Mistakes
10 of 18
Data of SysML SMD Environment Assumptions
11 of 18
Hidden assumptions and Disagreement between stakeholders document
12 of 18
A Process Mining Approach to Improving Defect Detection of SysML Models
13 of 18
RE'16 Viewpoint Merging Study Materials
14 of 18
Replication Package of Environmental Variations of Software Features: A Logical Test Cases' Perspective
15 of 18
Software delivery for PETTT BY15-080SP
16 of 18
Study Materials of Complementarity in Requirements Tracing
17 of 18
Subject Systems Dataset
18 of 18