Emerson Murphy-Hill
Affiliations: | North Carolina State University, Raleigh, NC |
Area:
Computer ScienceGoogle:
"Emerson Murphy-Hill"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Jaspan C, Jorde M, Egelman CD, et al. (2020) Studying Behavior of Software Developers With Cross-Tool Logs Ieee Software. 0-0 |
Smith J, Johnson B, Murphy-Hill E, et al. (2019) How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool Ieee Transactions On Software Engineering. 45: 877-897 |
Smith J, Johnson B, Murphy-Hill E, et al. (2015) Questions developers ask while diagnosing potential security vulnerabilities with static analysis 2015 10th Joint Meeting of the European Software Engineering Conference and the Acm Sigsoft Symposium On the Foundations of Software Engineering, Esec/Fse 2015 - Proceedings. 248-259 |
Thomas T, Chu B, Lipford H, et al. (2015) A study of interactive code annotation for access control vulnerabilities Proceedings of Ieee Symposium On Visual Languages and Human-Centric Computing, Vl/Hcc. 2015: 73-77 |
Murphy-Hill E, Zimmermann T, Bird C, et al. (2015) The design space of bug fixes and how developers navigate it Ieee Transactions On Software Engineering. 41: 65-81 |
Murphy-Hill E, Roberts D, Sommerlad P, et al. (2015) Refactoring Ieee Software. 32: 27-29 |
Barik T, Lubick K, Murphy-Hill E. (2015) Commit Bubbles Proceedings - International Conference On Software Engineering. 2: 631-634 |
Ge X, Shepherd DC, Damevski K, et al. (2015) Design and evaluation of a multi-recommendation system for local code search Journal of Visual Languages and Computing |
Murphy-Hill E, Lee DY, Murphy GC, et al. (2015) How Do Users Discover New Tools in Software Development and Beyond? Computer Supported Cooperative Work: Cscw: An International Journal |
Lipford H, Thomas T, Chu B, et al. (2014) Interactive code annotation for security vulnerability detection Proceedings of the Acm Conference On Computer and Communications Security. 2014: 17-22 |