default search action
Edward B. Allen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [c43]Muhammad Nadeem, Byron J. Williams, Gary L. Bradshaw, Edward B. Allen:
Human Subject Evaluation of Computer-Security Training Recommender. COMPSAC 2016: 251-256 - [c42]Puntitra Sawadpong, Edward B. Allen:
Software Defect Prediction Using Exception Handling Call Graphs: A Case Study. HASE 2016: 55-62 - 2015
- [c41]Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories. ITNG 2015: 534-539 - 2014
- [c40]Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
Computer Security Training Recommender for Developers. RecSys Posters 2014 - 2013
- [c39]Ajay Bandi, Byron J. Williams, Edward B. Allen:
Empirical evidence of code decay: A systematic mapping study. WCRE 2013: 341-350 - 2012
- [c38]Muhammad Nadeem, Byron J. Williams, Edward B. Allen:
High false positive detection of security vulnerabilities: a case study. ACM Southeast Regional Conference 2012: 359-360 - [c37]Puntitra Sawadpong, Edward B. Allen, Byron J. Williams:
Exception Handling Defects: An Empirical Study. HASE 2012: 90-97 - 2011
- [p1]Edward B. Allen:
Information Theory-Based Measurement of Software. Towards an Information Theory of Complex Networks 2011: 347-364 - 2010
- [j27]Stephen C. Medders, Edward B. Allen, Edward A. Luke:
Using Rule Structure to Evaluate the Completeness of Rule-Based System Testing: a Case Study. Int. J. Softw. Eng. Knowl. Eng. 20(7): 975-986 (2010) - [j26]Alfred C. Bogen, David A. Dampier, Rayford B. Vaughn, Donna S. Reese, Edward B. Allen, Jeffrey C. Carver:
Structured Forensics Examination Planning with Domain Modeling: A Report of Three Experiment Trials. J. Digit. Forensic Pract. 3(1): 23-32 (2010) - [c36]Tanmay Bhowmik, Nan Niu, Edward B. Allen:
Modular development and verification of domain requirements via model checking. ACM Southeast Regional Conference 2010: 58
2000 – 2009
- 2009
- [c35]Edward B. Allen, Maheshwar Chandrasekar, Karolina A. Sarnowska:
C preprocessor use in numerical tools: an empirical analysis. ACM Southeast Regional Conference 2009 - [c34]Pooja Adhikari, Edward A. Luke, Edward B. Allen:
Verification of a Loop Scheduling Protocol using Finite State Verification. PDCCS 2009: 109-114 - 2007
- [j25]Edward B. Allen, Sampath Gottipati, Rajiv Govindarajan:
Measuring size, complexity, and coupling of hypergraph abstractions of software: An information-theory approach. Softw. Qual. J. 15(2): 179-212 (2007) - [c33]Krystle Lemon, Edward B. Allen, Jeffrey C. Carver, Gary L. Bradshaw:
An Empirical Study of the Effects of Gestalt Principles on Diagram Understandability. ESEM 2007: 156-165 - 2005
- [c32]Thomas Philip, Edward B. Allen:
Science of Design: Building Blocks and Current State of Instruction. CATA 2005: 367-372 - [c31]Wei Li, Edward B. Allen:
An Access Control Model for Secure Cluster-Computing Environments. HICSS 2005 - 2003
- [j24]Zhiwei Xu, Taghi M. Khoshgoftaar, Edward B. Allen:
Application of fuzzy expert systems in assessing operational risk of software. Inf. Softw. Technol. 45(7): 373-388 (2003) - [j23]Taghi M. Khoshgoftaar, Edward B. Allen:
Ordering Fault-Prone Software Modules. Softw. Qual. J. 11(1): 19-37 (2003) - 2002
- [j22]Taghi M. Khoshgoftaar, Xiaojing Yuan, Edward B. Allen, Wendell D. Jones, John P. Hudepohl:
Uncertain Classification of Fault-Prone Software Modules. Empir. Softw. Eng. 7(4): 295-295 (2002) - [j21]Taghi M. Khoshgoftaar, Edward B. Allen, Jianyu Deng:
Using regression trees to classify fault-prone software modules. IEEE Trans. Reliab. 51(4): 455-462 (2002) - [c30]Edward B. Allen:
Measuring Graph Abstractions of Software: An Information-Theory Approach. IEEE METRICS 2002: 182- - 2001
- [j20]Taghi M. Khoshgoftaar, Edward B. Allen:
Controlling Overfitting in Classification-Tree Models of Software Quality. Empir. Softw. Eng. 6(1): 59-79 (2001) - [j19]Taghi M. Khoshgoftaar, Edward B. Allen, Wendell D. Jones, John P. Hudepohl:
Cost-Benefit Analysis of Software Quality Models. Softw. Qual. J. 9(1): 9-30 (2001) - [j18]Taghi M. Khoshgoftaar, Edward B. Allen:
Empirical Assessment of a Software Metric: The Information Content of Operators. Softw. Qual. J. 9(2): 99-112 (2001) - [j17]Taghi M. Khoshgoftaar, Edward B. Allen, Wendell D. Jones, John P. Hudepohl:
Data Mining of Software Development Databases. Softw. Qual. J. 9(3): 161-176 (2001) - [c29]Edward B. Allen, Taghi M. Khoshgoftaar, Ye Chen:
Measuring Coupling and Cohesion of Software Modules: An Information-Theory Approach. IEEE METRICS 2001: 124-134 - [c28]Taghi M. Khoshgoftaar, Edward B. Allen, Jianyu Deng:
Controlling Overfitting in Software Quality Models: Experiments with Regression Trees and Classification. IEEE METRICS 2001: 190-198 - 2000
- [j16]Taghi M. Khoshgoftaar, Edward B. Allen, Wendell D. Jones, John P. Hudepohl:
Accuracy of software quality models over multiple releases. Ann. Softw. Eng. 9: 103-116 (2000) - [j15]Taghi M. Khoshgoftaar, Xiaojing Yuan, Edward B. Allen:
Balancing Misclassification Rates in Classification-Tree Models of Software Quality. Empir. Softw. Eng. 5(4): 313-330 (2000) - [j14]K. Ganesan, Taghi M. Khoshgoftaar, Edward B. Allen:
Case-Based Software Quality Prediction. Int. J. Softw. Eng. Knowl. Eng. 10(2): 139-152 (2000) - [j13]Taghi M. Khoshgoftaar, Edward B. Allen, Wendell D. Jones, John P. Hudepohl:
Classification-tree models of software-quality over multiple releases. IEEE Trans. Reliab. 49(1): 4-11 (2000) - [j12]Taghi M. Khoshgoftaar, Edward B. Allen:
A practical classification-rule for software-quality models. IEEE Trans. Reliab. 49(2): 209-216 (2000) - [c27]Zhiwei Xu, Taghi M. Khoshgoftaar, Edward B. Allen:
Prediction of software faults using fuzzy nonlinear regression modeling. HASE 2000: 281-290 - [c26]Taghi M. Khoshgoftaar, Ruqun Shan, Edward B. Allen:
Using product, process, and execution metrics to predict fault-prone software modules with classification trees. HASE 2000: 301-310 - [c25]Taghi M. Khoshgoftaar, Edward B. Allen, Jason C. Busboom:
Modeling software quality: the Software Measurement Analysis and Reliability Toolkit. ICTAI 2000: 54-61 - [c24]Taghi M. Khoshgoftaar, Ruqun Shan, Edward B. Allen:
Improving Tree-Based Models of Software Quality with Principal Components Analysis. ISSRE 2000: 198-209 - [c23]Taghi M. Khoshgoftaar, Vishal Thaker, Edward B. Allen:
Modeling Fault-Prone Modules of Subsystems. ISSRE 2000: 259-269
1990 – 1999
- 1999
- [j11]Taghi M. Khoshgoftaar, Edward B. Allen:
A Comparative Study of Ordering and Classification of Fault-Prone Software Modules. Empir. Softw. Eng. 4(2): 159-186 (1999) - [j10]Taghi M. Khoshgoftaar, Edward B. Allen, Archana Naik, Wendell D. Jones, John P. Hudepohl:
Using Classification Trees for Software Quality Models: Lessons Learned. Int. J. Softw. Eng. Knowl. Eng. 9(2): 217-231 (1999) - [j9]Taghi M. Khoshgoftaar, Edward B. Allen, Wendell D. Jones, John P. Hudepohl:
Data Mining for Predictors of Software Quality. Int. J. Softw. Eng. Knowl. Eng. 9(5): 547-563 (1999) - [j8]Taghi M. Khoshgoftaar, Edward B. Allen, Wendell D. Jones, John P. Hudepohl:
Which Software Modules have Faults which will be Discovered by Customers? J. Softw. Maintenance Res. Pract. 11(1): 1-18 (1999) - [c22]Wendell D. Jones, John P. Hudepohl, Taghi M. Khoshgoftaar, Edward B. Allen:
Application of a Usage Profile in Software Quality Models. CSMR 1999: 148-159 - [c21]Matthew P. Evett, Taghi M. Khoshgoftaar, Pei-der Chien, Edward B. Allen:
Using Genetic Programming to Determine Software Quality. FLAIRS 1999: 113-117 - [c20]Matthew P. Evett, Taghi M. Khoshgoftaar, Pei-der Chien, Edward B. Allen:
Modelling software quality with GP. GECCO 1999: 1232 - [c19]Taghi M. Khoshgoftaar, Edward B. Allen:
Predicting Fault-Prone Software Modules in Embedded Systems with Classification Trees. HASE 1999: 105-114 - [c18]Taghi M. Khoshgoftaar, Edward B. Allen, Xiaojing Yuan, Wendell D. Jones, John P. Hudepohl:
Experience Paper: Preparing Measurements of Legacy Software for Predicting Operational Faults. ICSM 1999: 359- - [c17]Taghi M. Khoshgoftaar, Edward B. Allen, Wendell D. Jones, John P. Hudepohl:
Classification tree models of software quality over multiple releases. ISSRE 1999: 116-125 - [c16]Edward B. Allen, Taghi M. Khoshgoftaar:
Measuring Coupling and Cohesion: An Information-Theory Approach. IEEE METRICS 1999: 119- - [c15]Taghi M. Khoshgoftaar, Edward B. Allen, Xiaojing Yuan, Wendell D. Jones, John P. Hudepohl:
Assessing Uncertain Predictions of Software Quality. IEEE METRICS 1999: 159- - 1998
- [j7]Taghi M. Khoshgoftaar, Edward B. Allen, Robert Halstead, Gary P. Trio, Ronald M. Flass:
Using Process History to Predict Software Quality. Computer 31(4): 66-72 (1998) - [j6]Taghi M. Khoshgoftaar, Edward B. Allen:
Classification of Fault-Prone Software Modules: Prior Probabilities, Costs, and Model Evaluation. Empir. Softw. Eng. 3(3): 275-298 (1998) - [c14]Taghi M. Khoshgoftaar, Edward B. Allen, Archana Naik, Wendell D. Jones, John P. Hudepohl:
Using Classification Trees for Software Quality Models: Lessons Learned. HASE 1998: 82-89 - [c13]Taghi M. Khoshgoftaar, Edward B. Allen:
Can a Software Quality Model Hit a Moving Target? ICSM 1998: 68-70 - [c12]Taghi M. Khoshgoftaar, Edward B. Allen:
Predicting the order of fault-prone modules in legacy software. ISSRE 1998: 344-353 - 1997
- [j5]Taghi M. Khoshgoftaar, Edward B. Allen, David L. Lanning:
An Information Theory-Based Approach to Quantifying the Contribution of a Software Metric. J. Syst. Softw. 36(2): 103-113 (1997) - [j4]Taghi M. Khoshgoftaar, Edward B. Allen, John P. Hudepohl, Stephen J. Aud:
Application of neural networks to software quality modeling of a very large telecommunications system. IEEE Trans. Neural Networks 8(4): 902-909 (1997) - [c11]Taghi M. Khoshgoftaar, Edward B. Allen, Robert Halstead, Gary P. Trio, Ronald M. Flass:
Process Measures for Predicting Software Quality. HASE 1997: 155-161 - [c10]Robert Hochman, Taghi M. Khoshgoftaar, Edward B. Allen, John P. Hudepohl:
Evolutionary neural networks: a robust approach to software reliability problems. ISSRE 1997: 13-26 - [c9]Taghi M. Khoshgoftaar, K. Ganesan, Edward B. Allen, Fletcher D. Ross, Rama Munikoti, Nishith Goel, Amit Nandi:
Predicting fault-prone modules with case-based reasoning. ISSRE 1997: 27-35 - [c8]Taghi M. Khoshgoftaar, Edward B. Allen:
The Impact of Costs of Misclassification on Software Quality Modeling. IEEE METRICS 1997: 54- - 1996
- [j3]Taghi M. Khoshgoftaar, Edward B. Allen, Kalai Kalaichelvan, Nishith Goel:
The impact of software evolution and reuse on software quality. Empir. Softw. Eng. 1(1): 31-44 (1996) - [j2]Taghi M. Khoshgoftaar, Edward B. Allen, Kalai Kalaichelvan, Nishith Goel:
Early Quality Prediction: A Case Study in Telecommunications. IEEE Softw. 13(1): 65-71 (1996) - [j1]John P. Hudepohl, Stephen J. Aud, Taghi M. Khoshgoftaar, Edward B. Allen, Jean Mayrand:
Emerald: Software Metrics and Models on the Desktop. IEEE Softw. 13(5): 56-60 (1996) - [c7]Taghi M. Khoshgoftaar, Edward B. Allen, Lofton A. Bullard, Robert Halstead, Gary P. Trio:
A tree-based classification model for analysis of a military software system. HASE 1996: 244-251 - [c6]Taghi M. Khoshgoftaar, Edward B. Allen, Robert Halstead, Gary P. Trio:
Detection of Fault-Prone Software Modules During a Spiral Life Cycle. ICSM 1996: 69-76 - [c5]John P. Hudepohl, Stephen J. Aud, Taghi M. Khoshgoftaar, Edward B. Allen, Jean Mayrand:
Integrating metrics and models for software risk assessment. ISSRE 1996: 93-98 - [c4]Robert Hochman, Taghi M. Khoshgoftaar, Edward B. Allen, John P. Hudepohl:
Using the genetic algorithm to build optimal neural networks for fault-prone module detection. ISSRE 1996: 152-162 - [c3]Taghi M. Khoshgoftaar, Edward B. Allen, Nishith Goel, Amit Nandi, John McMullan:
Detection of software modules with high debug code churn in a very large legacy system. ISSRE 1996: 364-371 - 1995
- [c2]Taghi M. Khoshgoftaar, Edward B. Allen:
Multivariate assessment of complex software systems: a comparative study. ICECCS 1995: 389-396 - [c1]Taghi M. Khoshgoftaar, Edward B. Allen, Kalai Kalaichelvan, Nishith Goel, John P. Hudepohl, Jean Mayrand:
Detection of fault-prone program modules in a very large telecommunications system. ISSRE 1995: 24-33
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint