Search Constraints
1 - 17 of 17
Number of results to display per page
Search Results
Select an image to start the slideshow
Artifacts of `Detecting Software Vulnerabilities via Requirements Dependency Analysis'
1 of 17
Artifacts of Prompting Creative Requirements via Traceable and Adversarial Examples in Deep Learning
2 of 17

Code for SWMM's metamorphic testing
3 of 17

Completeness of Natural Language Requirements: A Comparative Study of User Stories and Feature Descriptions: Replication Package
4 of 17
Data of Classifying I/O Variables via Machine Learning
5 of 17
Data of Software Engineering Interviews and Video Resumes
6 of 17
Data of SWMM Developers' MR Constructions
7 of 17
Data of SWMM I/O Associations
8 of 17
Data of SWMM Unit Tests
9 of 17

Data of SysML Modeling Mistakes
10 of 17
Data of SysML SMD Environment Assumptions
11 of 17
Hidden assumptions and Disagreement between stakeholders document
12 of 17
A Process Mining Approach to Improving Defect Detection of SysML Models
13 of 17
RE'16 Viewpoint Merging Study Materials
14 of 17

Software delivery for PETTT BY15-080SP
15 of 17
Study Materials of Complementarity in Requirements Tracing
16 of 17

Subject Systems Dataset
17 of 17