-
1
-
-
0036092636
-
Assessment of programmable systems using Bayesian belief nets
-
G. Axel Assessment of programmable systems using Bayesian belief nets Safety Science 40 2002 797 812
-
(2002)
Safety Science
, vol.40
, pp. 797-812
-
-
Axel, G.1
-
2
-
-
70449091784
-
Choquet integral based aggregation approach to software development risk assessment
-
G.N. Büyüközkan, and D. Ruan Choquet integral based aggregation approach to software development risk assessment Information Sciences 180 2010 441 451
-
(2010)
Information Sciences
, vol.180
, pp. 441-451
-
-
Büyüközkan, G.N.1
Ruan, D.2
-
3
-
-
53949092999
-
Risk and risk management in software projects: A reassessment
-
P.L. Bannerman Risk and risk management in software projects: a reassessment Journal of Systems and Software 81 2008 2118 2133
-
(2008)
Journal of Systems and Software
, vol.81
, pp. 2118-2133
-
-
Bannerman, P.L.1
-
6
-
-
67650126034
-
Bayesian gene regulatory network inference optimization by means of genetic algorithms
-
V. Bevilacqua, G. Mastronardi, F. Menolascina, P. Pannarale, and G. Romanazzi Bayesian gene regulatory network inference optimization by means of genetic algorithms Journal of Universal Computer Science 15 2009 826 839
-
(2009)
Journal of Universal Computer Science
, vol.15
, pp. 826-839
-
-
Bevilacqua, V.1
Mastronardi, G.2
Menolascina, F.3
Pannarale, P.4
Romanazzi, G.5
-
8
-
-
0029512703
-
Using influence diagrams for software risk analysis
-
C.L. Chee, V. Vij, C.V. Ramamoorthy, Using influence diagrams for software risk analysis, in: Proceedings of Seventh International Conference on Tools with Artificial Intelligence, 1995, pp. 128-131.
-
(1995)
Proceedings of Seventh International Conference on Tools with Artificial Intelligence
, pp. 128-131
-
-
Chee, C.L.1
Vij, V.2
Ramamoorthy, C.V.3
-
10
-
-
3042694356
-
Processes for producing secure software
-
N. Davis, W. Humphrey, S.T. Redwine Jr., G. Zibulski, and G. McGraw Processes for producing secure software IEEE Security & Privacy 2 2004 18 25
-
(2004)
IEEE Security & Privacy
, vol.2
, pp. 18-25
-
-
Davis, N.1
Humphrey, W.2
Redwine Jr., S.T.3
Zibulski, G.4
McGraw, G.5
-
11
-
-
36248973174
-
Software maintenance project delays prediction using Bayesian Networks
-
DOI 10.1016/j.eswa.2006.10.040, PII S0957417406003526
-
A.C.V. de Melo, and A.J. Sanchez Software maintenance project delays prediction using Bayesian Networks Expert Systems with Applications 34 2008 908 919 (Pubitemid 350123699)
-
(2008)
Expert Systems with Applications
, vol.34
, Issue.2
, pp. 908-919
-
-
De Melo, A.C.V.1
Sanchez, A.J.2
-
12
-
-
33751319003
-
A methodology for developing Bayesian networks: An application to information technology (IT) implementation
-
DOI 10.1016/j.ejor.2006.01.016, PII S0377221706000622
-
Eitel J.M. Lauria, and P.J. Duchessi A methodology for developing Bayesian networks: an application to information technology (IT) implementation European Journal of Operational Research 179 2007 234 252 (Pubitemid 44809554)
-
(2007)
European Journal of Operational Research
, vol.179
, Issue.1
, pp. 234-252
-
-
Lauria, E.J.M.1
Duchessi, P.J.2
-
13
-
-
78649818725
-
Software project and quality modelling using Bayesian networks
-
F. Meziane, S. Vadera (Eds.)
-
N. Fenton, P. Hearty, M. Neil, L. Radlinski, Software project and quality modelling using Bayesian networks, in: F. Meziane, S. Vadera (Eds.), Artificial Intelligence Applications for Improved Software Engineering Development: New Prospects, Information Science Reference, 2010, pp. 1-25.
-
(2010)
Artificial Intelligence Applications for Improved Software Engineering Development: New Prospects, Information Science Reference
, pp. 1-25
-
-
Fenton, N.1
Hearty, P.2
Neil, M.3
Radlinski, L.4
-
14
-
-
4544298446
-
Making resource decisions for software projects
-
IEEE Computer Society
-
N. Fenton, W. Marsh, M. Neil, P. Cates, S. Forey, and M. Tailor Making resource decisions for software projects Proceedings of the 26th International Conference on Software Engineering 2004 IEEE Computer Society 397 406
-
(2004)
Proceedings of the 26th International Conference on Software Engineering
, pp. 397-406
-
-
Fenton, N.1
Marsh, W.2
Neil, M.3
Cates, P.4
Forey, S.5
Tailor, M.6
-
15
-
-
33846017650
-
Predicting software defects in varying development lifecycles using Bayesian nets
-
DOI 10.1016/j.infsof.2006.09.001, PII S0950584906001194
-
N. Fenton, M. Neil, W. Marsh, P. Hearty, D. Marquez, P. Krause, and R. Mishra Predicting software defects in varying development lifecycles using Bayesian nets Information and Software Technology 49 2007 32 43 (Pubitemid 46053772)
-
(2007)
Information and Software Technology
, vol.49
, Issue.1
, pp. 32-43
-
-
Fenton, N.1
Neil, M.2
Marsh, W.3
Hearty, P.4
Marquez, D.5
Krause, P.6
Mishra, R.7
-
16
-
-
36949002235
-
Project data incorporating qualitative facts for improved software defect prediction
-
IEEE CS
-
N. Fenton, M. Neil, W. Marsh, P. Hearty, L. Radlinski, P. Krause, Project data incorporating qualitative facts for improved software defect prediction, in: Third International Workshop on Predictor Models in Software Engineering (PROMISE'07, ICSE Workshops), IEEE CS, 2007, p. 2.
-
(2007)
Third International Workshop on Predictor Models in Software Engineering (PROMISE'07, ICSE Workshops)
, pp. 2
-
-
Fenton, N.1
Neil, M.2
Marsh, W.3
Hearty, P.4
Radlinski, L.5
Krause, P.6
-
19
-
-
34047234602
-
Managing software process measurement: A metamodel-based approach
-
DOI 10.1016/j.ins.2007.01.018, PII S0020025507000424
-
F. García, M. Serrano, J. Cruz-Lemus, F. Ruiz, and M. Piattini Managing software process measurement: a metamodel-based approach Information Sciences 177 2007 2570 2586 (Pubitemid 46541687)
-
(2007)
Information Sciences
, vol.177
, Issue.12
, pp. 2570-2586
-
-
Garcia, F.1
Serrano, M.2
Cruz-Lemus, J.3
Ruiz, F.4
Piattini, M.5
-
21
-
-
33947118114
-
How much software quality investment is enough: A value-based approach
-
DOI 10.1109/MS.2006.127
-
L. Huang, and B. Boehm How much software quality investment is enough: a value-based approach IEEE Software 23 2006 88 95 (Pubitemid 46405207)
-
(2006)
IEEE Software
, vol.23
, Issue.5
, pp. 88-95
-
-
Huang, L.1
Boehm, B.2
-
23
-
-
84875216976
-
Software quality assessment using a multi-strategy classifier
-
doi:10.1016/j.ins.2010.1011.1028
-
T.M. Khoshgoftaar, Y. Xiao, K. Gao, Software quality assessment using a multi-strategy classifier, Information Sciences, (2011), doi:10.1016/j.ins.2010. 1011.1028.
-
(2011)
Information Sciences
-
-
Khoshgoftaar, T.M.1
Xiao, Y.2
Gao, K.3
-
25
-
-
56949107719
-
Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection
-
G. Kou, Y. Peng, Z. Chen, and Y. Shi Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection Information Sciences 179 2009 371 381
-
(2009)
Information Sciences
, vol.179
, pp. 371-381
-
-
Kou, G.1
Peng, Y.2
Chen, Z.3
Shi, Y.4
-
26
-
-
33748310590
-
Bayesian networks in reliability
-
DOI 10.1016/j.ress.2005.11.037, PII S0951832005001985
-
H. Langseth, and L. Portinale Bayesian networks in reliability Reliability Engineering & System Safety 92 2007 92 108 (Pubitemid 44332140)
-
(2007)
Reliability Engineering and System Safety
, vol.92
, Issue.1
, pp. 92-108
-
-
Langseth, H.1
Portinale, L.2
-
27
-
-
0030149211
-
Applying fuzzy set theory to evaluate the rate of aggregative risk in software development
-
H.-M. Lee Applying fuzzy set theory to evaluate the rate of aggregative risk in software development Fuzzy Sets and Systems 79 1996 323 336 (Pubitemid 126667415)
-
(1996)
Fuzzy Sets and Systems
, vol.79
, Issue.3
, pp. 323-336
-
-
Lee, H.-M.1
-
28
-
-
0038147369
-
A new algorithm for applying fuzzy set theory to evaluate the rate of aggregative risk in software development
-
H.-M. Lee, S.-Y. Lee, T.-Y. Lee, and J.-J. Chen A new algorithm for applying fuzzy set theory to evaluate the rate of aggregative risk in software development Information Sciences 153 2003 177 197
-
(2003)
Information Sciences
, vol.153
, pp. 177-197
-
-
Lee, H.-M.1
Lee, S.-Y.2
Lee, T.-Y.3
Chen, J.-J.4
-
29
-
-
68349155975
-
A multi-criteria risk optimization model for trustworthy software process management
-
CCIS, Springer
-
J. Li, M. Li, H. Song, D. Wu, A multi-criteria risk optimization model for trustworthy software process management, in: Cutting-Edge Research Topics on Multiple Criteria Decision Making, CCIS, Springer, 2009, pp. 535-539.
-
(2009)
Cutting-Edge Research Topics on Multiple Criteria Decision Making
, pp. 535-539
-
-
Li, J.1
Li, M.2
Song, H.3
Wu, D.4
-
30
-
-
73549096641
-
Risk management in the trustworthy software process: A novel risk and trustworthiness measurement model framework
-
IEEE Press
-
M. Li, J. Li, H. Song, D. Wu, Risk management in the trustworthy software process: a novel risk and trustworthiness measurement model framework, in: Fifth International Joint Conference on INC, IMS and IDC, IEEE Press, 2009, pp. 214-219.
-
(2009)
Fifth International Joint Conference on INC, IMS and IDC
, pp. 214-219
-
-
Li, M.1
Li, J.2
Song, H.3
Wu, D.4
-
31
-
-
21244433139
-
A survey of component based system quality assurance and assessment
-
DOI 10.1016/j.infsof.2005.03.007, PII S0950584905000601
-
S. Mahmood, R. Lai, Y. Soo Kim, J. Hong Kim, S. Cheon Park, and H. Suk Oh A survey of component based system quality assurance and assessment Information and Software Technology 47 2005 693 707 (Pubitemid 40893581)
-
(2005)
Information and Software Technology
, vol.47
, Issue.10
, pp. 693-707
-
-
Mahmood, S.1
Lai, R.2
Kim, Y.S.3
Kim, J.H.4
Park, S.C.5
Oh, H.S.6
-
32
-
-
75949126107
-
Improved reliability modeling using Bayesian networks and dynamic discretization
-
D. Marquez, M. Neil, and N. Fenton Improved reliability modeling using Bayesian networks and dynamic discretization Reliability Engineering & System Safety 95 2010 412 425
-
(2010)
Reliability Engineering & System Safety
, vol.95
, pp. 412-425
-
-
Marquez, D.1
Neil, M.2
Fenton, N.3
-
33
-
-
34247540488
-
Trustworthy software: Why we need it, why we don't have it, how we can get it
-
DOI 10.1109/COMPSAC.2006.84, 4020050, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006
-
J. McLean Trustworthy Software: Why we need it, Why we do not have it, How we can get it? 30th Annual International Computer Software and Applications Conference 2006 IEEE Press 32 33 (Pubitemid 46661621)
-
(2006)
Proceedings - International Computer Software and Applications Conference
, vol.1
, pp. 32-33
-
-
McLean, J.1
-
35
-
-
39749093206
-
Modelling dependable systems using hybrid Bayesian networks
-
DOI 10.1016/j.ress.2007.03.009, PII S0951832007001044
-
M. Neil, M. Tailor, D. Marquez, N. Fenton, and P. Hearty Modelling dependable systems using hybrid Bayesian networks Reliability Engineering & System Safety 93 2008 933 939 (Pubitemid 351305183)
-
(2008)
Reliability Engineering and System Safety
, vol.93
, Issue.7
, pp. 933-939
-
-
Neil, M.1
Tailor, M.2
Marquez, D.3
Fenton, N.4
Hearty, P.5
-
36
-
-
84857643031
-
-
Thesis for M.S., Stevens Institute of Technology, Hoboken, New York
-
A. Parikh, Trustworthy Software, Thesis for M.S., Stevens Institute of Technology, Hoboken, New York, 2004.
-
(2004)
Trustworthy Software
-
-
Parikh, A.1
-
37
-
-
84857643032
-
The design of polynomial function-based neural network predictors for detection of software defects
-
doi:10.1016/j.ins.2011.1001.1026
-
B.-J. Park, S.-K. Oh, W. Pedrycz, The design of polynomial function-based neural network predictors for detection of software defects, Information Sciences, (2011), doi:10.1016/j.ins.2011.1001.1026.
-
(2011)
Information Sciences
-
-
Park, B.-J.1
Oh, S.-K.2
Pedrycz, W.3
-
38
-
-
34548038217
-
Influence diagrams-historical and personal perspectives
-
J. Pearl Influence diagrams-historical and personal perspectives Decision Analysis 2 2005 232 234
-
(2005)
Decision Analysis
, vol.2
, pp. 232-234
-
-
Pearl, J.1
-
40
-
-
84857575716
-
User preferences based software defect detection algorithms selection using MCDM
-
Y. Peng, G. Wang, and H. Wang User preferences based software defect detection algorithms selection using MCDM Information Sciences 191 2011 3 13
-
(2011)
Information Sciences
, vol.191
, pp. 3-13
-
-
Peng, Y.1
Wang, G.2
Wang, H.3
-
41
-
-
56949083610
-
Estimating software readiness using predictive models
-
T.-S. Quah Estimating software readiness using predictive models Information Sciences 179 2009 430 445
-
(2009)
Information Sciences
, vol.179
, pp. 430-445
-
-
Quah, T.-S.1
-
42
-
-
0042131081
-
Cronbach's alpha: A tool for assessing the reliability of scales
-
J. Reynaldo, and A. Santos Cronbach's alpha: a tool for assessing the reliability of scales Journal of Extension 37 1999 2 3
-
(1999)
Journal of Extension
, vol.37
, pp. 2-3
-
-
Reynaldo, J.1
Santos, A.2
-
44
-
-
84857650690
-
An empirical study of the classification performance of learners on imbalanced and noisy software quality data
-
doi:10.1016/j.ins.2010.1012.1016
-
C. Seiffert, T.M. Khoshgoftaar, J. Van Hulse, A. Folleco, An empirical study of the classification performance of learners on imbalanced and noisy software quality data, Information Sciences, (2011), doi:10.1016/j.ins.2010. 1012.1016.
-
(2011)
Information Sciences
-
-
Seiffert, C.1
Khoshgoftaar, T.M.2
Van Hulse, J.3
Folleco, A.4
-
46
-
-
58749101855
-
A framework for developing measurement systems and its industrial evaluation
-
M. Staron, W. Meding, and C. Nilsson A framework for developing measurement systems and its industrial evaluation Information and Software Technology 51 2009 721 737
-
(2009)
Information and Software Technology
, vol.51
, pp. 721-737
-
-
Staron, M.1
Meding, W.2
Nilsson, C.3
-
47
-
-
48049093835
-
Trustworthy software systems: A discussion of basic concepts and terminology
-
B. Steffen, H. Wilhelm, P. Alexandra, B. Marko, K. Heiko, P. Jan, D. Abhishek, L. Henrik, R. Matthias, W. Daniel, G. Simon, M. Roland, S. Mani, H. Jens, M. Margarete, and W. Timo Trustworthy software systems: a discussion of basic concepts and terminology ACM SIGSOFT Software Engineering Notes 31 2006 1 18
-
(2006)
ACM SIGSOFT Software Engineering Notes
, vol.31
, pp. 1-18
-
-
Steffen, B.1
Wilhelm, H.2
Alexandra, P.3
Marko, B.4
Heiko, K.5
Jan, P.6
Abhishek, D.7
Henrik, L.8
Matthias, R.9
Daniel, W.10
Simon, G.11
Roland, M.12
Mani, S.13
Jens, H.14
Margarete, M.15
Timo, W.16
-
49
-
-
77953868793
-
A Bayesian network approach to assess and predict software quality using activity-based quality models
-
ACM, Vancouver, British Columbia, Canada
-
S. Wagner, A Bayesian network approach to assess and predict software quality using activity-based quality models, in: Proceedings of the 5th International Conference on Predictor Models in Software Engineering, ACM, Vancouver, British Columbia, Canada, 2009, pp. 1-9.
-
(2009)
Proceedings of the 5th International Conference on Predictor Models in Software Engineering
, pp. 1-9
-
-
Wagner, S.1
-
50
-
-
33846917664
-
Toward trustworthy software systems
-
H. Wilhelm, and R. Ralf Toward trustworthy software systems Computer 39 2006 91 92
-
(2006)
Computer
, vol.39
, pp. 91-92
-
-
Wilhelm, H.1
Ralf, R.2
-
51
-
-
67650287094
-
Process trustworthiness as a capability indicator for measuring and improving software trustworthiness
-
Springer
-
Y. Yang, Q. Wang, and M. Li Process trustworthiness as a capability indicator for measuring and improving software trustworthiness Trustworthy Software Development Processes, LNCS 2009 Springer 389 401
-
(2009)
Trustworthy Software Development Processes, LNCS
, pp. 389-401
-
-
Yang, Y.1
Wang, Q.2
Li, M.3
-
52
-
-
84857649708
-
A non-functional requirements tradeoff model in Trustworthy Software
-
doi:10.1016/j.ins.2011.1007.1046
-
M.-X. Zhu, X.-X. Luo, X.-H. Chen, D.D. Wu, A non-functional requirements tradeoff model in Trustworthy Software, Information Sciences, (2011), doi:10.1016/j.ins.2011.1007.1046.
-
(2011)
Information Sciences
-
-
Zhu, M.-X.1
Luo, X.-X.2
Chen, X.-H.3
Wu, D.D.4
|