Search Results - "Horton, Glen"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1
  2. 2

    Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis by Wang, Wentao, Dumont, Faryn, Niu, Nan, Horton, Glen

    Published in IEEE transactions on software engineering (01-05-2022)
    “…Cyber attacks targeting software applications have a tremendous impact on our daily life. For example, attackers have utilized vulnerabilities of web…”
    Get full text
    Journal Article
  3. 3

    Comparison of 13C- urea blood test to 13C-breath test and rapid urease test for the diagnosis of Helicobacter pylori infection by Fry, Lucía C, Curioso, Walter H, Rickes, Steffen, Horton, Glen, Hirschowitz, Basil I, Mönkemüller, Klaus

    “…At present, the available methods to diagnose active H. pylori infection are endoscopy with biopsy for histology, culture, rapid urease tests, 13C or 14C urea…”
    Get full text
    Journal Article
  4. 4

    Tracing Feature Tests to Textual Requirements by Dahiya, Mahima, Li, Mark, Horton, Glen, Scherz, Thomas, Niu, Nan

    “…Software features deliver values to the end users, and thus their qualities shall be assured. While the mainstream quality assurance technique is software…”
    Get full text
    Conference Proceeding
  5. 5

    Prompting Creative Requirements via Traceable and Adversarial Examples in Deep Learning by Gudaparthi, Hemanth, Niu, Nan, Wang, Boyang, Bhowmik, Tanmay, Liu, Hui, Zhang, Jianzhang, Savolainen, Juha, Horton, Glen, Crowe, Sean, Scherz, Thomas, Haitz, Lisa

    “…Creativity focuses on the generation of novel and useful ideas. In this paper, we propose an approach to automatically generating creative requirements…”
    Get full text
    Conference Proceeding