default search action
Hadar Ziv
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Jason Lee Weber, Barbara Martinez Neda, Kitana Carbajal Juarez, Jennifer Wong-Ma, Sergio Gago Masagué, Hadar Ziv:
Beyond the Hype: Perceptions and Realities of Using Large Language Models in Computer Science Education at an R1 University. EDUCON 2024: 1-8 - [c30]Brandt Redd, Ying Tang, Hadar Ziv, Sameer Patil:
Layering Sociotechnical Cybersecurity Concepts Within Project-Based Learning. ICER (1) 2024: 406-418 - [c29]Jason Lee Weber, Barbara Martinez Neda, Kitana Carbajal Juarez, Jennifer Wong-Ma, Sergio Gago Masagué, Hadar Ziv:
Measuring CS Student Attitudes Toward Large Language Models. SIGCSE (2) 2024: 1846-1847
2010 – 2019
- 2011
- [c28]Kristina Winbladh, Hadar Ziv, Debra J. Richardson:
Evolving requirements in patient-centered software. SEHC@ICSE 2011: 1-4 - 2010
- [c27]Hadar Ziv, Sameer Patil:
Capstone Project: From Software Engineering to "Informatics". CSEE&T 2010: 185-188 - [c26]Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:
Formality of the Security Specification Process: Benefits Beyond Requirements. HICSS 2010: 1-6 - [c25]Leila Naslavsky, Hadar Ziv, Debra J. Richardson:
MbSRT2: Model-Based Selective Regression Testing with Traceability. ICST 2010: 89-98 - [c24]Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:
ASSURE: automated support for secure and usable requirements engineering. ISSTA 2010: 279-282 - [c23]Debra J. Richardson, Ban Al-Ani, Hadar Ziv:
Requirements engineering at the margins: avoiding technological hubris through alternative approaches. FoSER 2010: 303-308 - [c22]Kristina Winbladh, Hadar Ziv, Debra J. Richardson:
iMuse: interactive model-based use-case and storytelling environment. SIGSOFT FSE 2010: 383-384 - [c21]Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:
Increasing Trustworthiness through Security Testing Support. SocialCom/PASSAT 2010: 920-925
2000 – 2009
- 2009
- [c20]Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson, Dennis Bystritsky:
Towards usable cyber security requirements. CSIIRW 2009: 64 - [c19]Leila Naslavsky, Hadar Ziv, Debra J. Richardson:
A model-based regression test selection technique. ICSM 2009: 515-518 - [c18]Kristina Winbladh, Hadar Ziv, Debra J. Richardson:
Eliciting required characteristics for usable requirements engineering approaches. SAC 2009: 360-364 - [c17]Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:
Later stages support for security requirements. Richard Tapia Celebration of Diversity in Computing Conference 2009: 103-107 - 2008
- [c16]Leila Naslavsky, Hadar Ziv, Debra J. Richardson:
Using Model Transformation to Support Model-Based Test Coverage Measurement. AST 2008: 1-6 - [c15]Ravidutta Kodre, Hadar Ziv, Debra J. Richardson:
Statistical Sampling Based Approach to Alleviate Log Replay Testing. ICST 2008: 533-536 - [c14]Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:
SRRS: a recommendation system for security requirements. RSSE@SIGSOFT FSE 2008: 50-52 - 2007
- [c13]Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson:
CCARCH: Architecting Common Criteria Security Requirements. IAS 2007: 349-356 - [c12]Leila Naslavsky, Hadar Ziv, Debra J. Richardson:
Towards traceability of model-based testing artifacts. A-MOST 2007: 105-114 - [c11]Mamadou H. Diallo, Leila Naslavsky, Thomas A. Alspaugh, Hadar Ziv, Debra J. Richardson:
Toward Architecture Evaluation through Ontology-Based Requirements-Level Scenarios. WADS 2007: 225-247 - [c10]Leila Naslavsky, Hadar Ziv, Debra J. Richardson:
Towards leveraging model transformation to support model-based testing. ASE 2007: 509-512 - 2006
- [j2]Lihua Xu, Hadar Ziv, Thomas A. Alspaugh, Debra J. Richardson:
An architectural pattern for non-functional dependability requirements. J. Syst. Softw. 79(10): 1370-1378 (2006) - [c9]Kristina Winbladh, Thomas A. Alspaugh, Hadar Ziv, Debra J. Richardson:
Architecture-based testing using goals and plans. ROSATEA 2006: 64-68 - [c8]Lihua Xu, Scott A. Hendrickson, Eric Hettwer, Hadar Ziv, André van der Hoek, Debra J. Richardson:
Towards supporting the architecture design process through evaluation of design alternatives. ROSATEA 2006: 81-87 - [c7]Kristina Winbladh, Thomas A. Alspaugh, Hadar Ziv, Debra J. Richardson:
An Automated Approach for Goal-driven, Specification-based Testing. ASE 2006: 289-292 - 2005
- [j1]Lihua Xu, Hadar Ziv, Debra J. Richardson, Thomas A. Alspaugh:
An architectural pattern for non-functional dependability requirements. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-6 (2005) - [c6]Lihua Xu, Hadar Ziv, Debra J. Richardson, Thomas A. Alspaugh:
An architectural pattern for non-functional dependability requirements. WADS@ICSE 2005: 4:1-4:6 - [c5]Leila Naslavsky, Thomas A. Alspaugh, Debra J. Richardson, Hadar Ziv:
Using scenarios to support traceability. TEFSE@ASE 2005: 25-30 - 2004
- [c4]Yuewei Zhou, Hadar Ziv, Debra J. Richardson:
Towards A Practical Approach to Test Aspect-Oriented Software. SOQUA/TECOS 2004: 1-16
1990 – 1999
- 1999
- [c3]M. Fry, Hadar Ziv:
A Well-Defined Process for Requirements-Based Software Development. IIA/SOCO 1999 - 1997
- [c2]Hadar Ziv, Debra J. Richardson:
Constructing Bayesian-network models of software testing and maintenance uncertainties. ICSM 1997: 100- - 1994
- [c1]Hadar Ziv, Leon J. Osterweil:
Research Issues in the Intersection of Hypertext and Software Development Environments. ICSE Workshop on SE-HCI 1994: 268-279
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint