Остановите войну!
for scientists:
default search action
Robyn R. Lutz
- > Home > Persons > Robyn R. Lutz
Publications
- 2024
- [i9]Usman Gohar, Michael C. Hunter, Agnieszka Marczak-Czajka, Robyn R. Lutz, Myra B. Cohen, Jane Cleland-Huang:
Towards Engineering Fair and Equitable Software Systems for Managing Low-Altitude Airspace Authorizations. CoRR abs/2401.07353 (2024) - [i8]Tuba Yavuz, Chin Khor, Ken Yihang Bai, Robyn R. Lutz:
Generating Maximal Configurations and Their Variants Using Code Metrics. CoRR abs/2401.07898 (2024) - 2023
- [c74]Chin Khor, Robyn R. Lutz:
Requirements Analysis of Variability Constraints in a Configurable Flight Software System. RE 2023: 244-254 - [i7]Chin Khor, Robyn R. Lutz:
Requirements Analysis of Variability Constraints in a Configurable Flight Software System. CoRR abs/2309.03392 (2023) - 2022
- [c73]James I. Lathrop, Robyn R. Lutz, Cameron Brecount, Hugh D. Potter, Kathryn Rohlfing, Jesse Slater, Joshua Wallin:
SafeWalk: a Simulation Tool Kit for Exploring Software Requirements in a Safety-Critical Product Line. RE 2022: 268-269 - [i6]Mohammad Jamil Ahmad, Katerina Goseva-Popstojanova, Robyn R. Lutz:
The Untold Impact of Learning Approaches on Software Fault-Proneness Predictions. CoRR abs/2207.05710 (2022) - 2021
- [j30]Michael Vierhauser, Sean Bayley, Jane Wyngaard, Wandi Xiong, Jinghui Cheng, Joshua Huseman, Robyn R. Lutz, Jane Cleland-Huang:
Interlocking Safety Cases for Unmanned Autonomous Systems in Shared Airspaces. IEEE Trans. Software Eng. 47(5): 899-918 (2021) - [i5]Seyedehzahra Khoshmanesh, Tuba Yavuz, Robyn R. Lutz:
Learning Feature Interactions With and Without Specifications. CoRR abs/2104.07844 (2021) - 2020
- [c70]Seyedehzahra Khoshmanesh, Robyn R. Lutz:
Does Link Prediction Help Find Feature Interactions in Software Product Lines? AIRE@RE 2020: 87-90 - [c69]James I. Lathrop, Jack H. Lutz, Robyn R. Lutz, Hugh D. Potter, Matthew R. Riley:
Population-Induced Phase Transitions and the Verification of Chemical Reaction Networks. DNA 2020: 5:1-5:17 - [c68]Robyn R. Lutz, James I. Lathrop, Cameron Brecount, Kendal Gast, Kathryn Rohlfing, Joshua Wallin:
Using an Astronaut Jetpack Project to Teach Human-CPS Requirements Engineering. REET@RE 2020: 9-10 - [i4]Seyedehzahra Khoshmanesh, Robyn R. Lutz:
Does Link Prediction Help Detect Feature Interactions in Software Product Lines (SPLs)? CoRR abs/2009.07392 (2020) - 2019
- [j29]Samuel J. Ellis, Titus H. Klinge, James I. Lathrop, Jack H. Lutz, Robyn R. Lutz, Andrew S. Miner, Hugh D. Potter:
Runtime Fault Detection in Programmed Molecular Systems. ACM Trans. Softw. Eng. Methodol. 28(2): 6:1-6:20 (2019) - [c67]Jack H. Lutz, Neil Lutz, Robyn R. Lutz, Matthew R. Riley:
Robustness and games against nature in molecular programming. ICSE (NIER) 2019: 65-68 - [c66]Ankit Agrawal, Seyedehzahra Khoshmanesh, Michael Vierhauser, Mona Rahimi, Jane Cleland-Huang, Robyn R. Lutz:
Leveraging artifact trees to evolve and reuse safety cases. ICSE 2019: 1222-1233 - [c65]Seyedehzahra Khoshmanesh, Robyn R. Lutz:
Leveraging Feature Similarity for Earlier Detection of Unwanted Feature Interactions in Evolving Software Product Lines. SISAP 2019: 293-307 - [c64]Seyedehzahra Khoshmanesh, Robyn R. Lutz:
Feature Similarity: A Method to Detect Unwanted Feature Interactions Earlier in Software Product Lines. SISAP 2019: 356-361 - [i3]Jack H. Lutz, Neil Lutz, Robyn R. Lutz, Matthew R. Riley:
Robustness and Games Against Nature in Molecular Programming. CoRR abs/1902.06171 (2019) - [i2]James I. Lathrop, Jack H. Lutz, Robyn R. Lutz, Hugh D. Potter, Matthew R. Riley:
Quorum Sensing and Verification in Chemical Reaction Networks. CoRR abs/1909.05390 (2019) - 2018
- [c63]Michael Vierhauser, Sean Bayley, Jane Wyngaard, Jinghui Cheng, Wandi Xiong, Robyn R. Lutz, Joshua Huseman, Jane Cleland-Huang:
Interlocking safety cases for unmanned autonomous systems in urban environments. ICSE (Companion Volume) 2018: 416-417 - [c61]Chase Koehler, Divita Mathur, Eric R. Henderson, Robyn R. Lutz:
Probing the Security of DNA Origami. ISSRE Workshops 2018: 138-139 - [c60]Seyedehzahra Khoshmanesh, Robyn R. Lutz:
The Role of Similarity in Detecting Feature Interaction in Software Product Lines. ISSRE Workshops 2018: 286-292 - [c59]Jack H. Lutz, Robyn R. Lutz:
Writing Requirements for Molecular Programs. RE 2018: 512 - 2017
- [j28]Robyn R. Lutz, Jane Cleland-Huang:
The Risk of Overly Strict Requirements. IEEE Softw. 34(2): 26-29 (2017) - [c58]Mona Rahimi, Wandi Xiong, Jane Cleland-Huang, Robyn R. Lutz:
Diagnosing assumption problems in safety-critical products. ASE 2017: 473-484 - [c57]Samuel J. Ellis, James I. Lathrop, Robyn R. Lutz:
State logging in chemical reaction networks. NANOCOM 2017: 23:1-23:6 - [c56]Micayla Goodrum, Jane Cleland-Huang, Robyn R. Lutz, Jinghui Cheng, Ronald A. Metoyer:
What Requirements Knowledge Do Developers Need to Manage Change in Safety-Critical Systems? RE 2017: 90-99 - [i1]Samuel J. Ellis, Titus H. Klinge, James I. Lathrop, Jack H. Lutz, Robyn R. Lutz, Andrew S. Miner:
Runtime Fault Detection in Programmed Molecular Systems. CoRR abs/1710.09494 (2017) - 2016
- [j27]Thomas R. Devine, Katerina Goseva-Popstojanova, Sandeep Krishnan, Robyn R. Lutz:
Assessment and cross-product prediction of software product line quality: accounting for reuse across products, over multiple releases. Autom. Softw. Eng. 23(2): 253-302 (2016) - [c54]Robyn R. Lutz, Jack H. Lutz:
Software engineering for molecular programming. ICSE (Companion Volume) 2016: 888-889 - 2015
- [c52]Thein Than Tun, Robyn R. Lutz, Brian Nakayama, Yijun Yu, Divita Mathur, Bashar Nuseibeh:
The Role of Environmental Assumptions in Failures of DNA Nanosystems. COUFLESS@ICSE 2015: 27-33 - 2014
- [c51]Samuel J. Ellis, Eric R. Henderson, Titus H. Klinge, James I. Lathrop, Jack H. Lutz, Robyn R. Lutz, Divita Mathur, Andrew S. Miner:
Automated requirements analysis for a molecular watchdog timer. ASE 2014: 767-778 - 2013
- [j25]Sandeep Krishnan, Chris Strasburg, Robyn R. Lutz, Katerina Goseva-Popstojanova, Karin S. Dorman:
Predicting failure-proneness in an evolving software product line. Inf. Softw. Technol. 55(8): 1479-1495 (2013) - [c50]David M. Weiss, James Kirby, Robyn R. Lutz:
Moving Toward Evidence-Based Software Production. Perspectives on the Future of Software Engineering 2013: 275-298 - 2012
- [c49]Robyn R. Lutz, Jack H. Lutz, James I. Lathrop, Titus H. Klinge, Eric R. Henderson, Divita Mathur, Dalia Abo Sheasha:
Engineering and verifying requirements for programmable self-assembling nanomachines. ICSE 2012: 1361-1364 - [c48]Thomas R. Devine, Katerina Goseva-Popstojanova, Sandeep Krishnan, Robyn R. Lutz, J. Jenny Li:
An Empirical Study of Pre-release Software Faults in an Industrial Product Line. ICST 2012: 181-190 - [c47]Robyn R. Lutz, Jack H. Lutz, James I. Lathrop, Titus H. Klinge, Divita Mathur, Donald M. Stull, Taylor Bergquist, Eric R. Henderson:
Requirements analysis for a product family of DNA nanodevices. RE 2012: 211-220 - [c46]Jane Cleland-Huang, Mats Per Erik Heimdahl, Jane Huffman Hayes, Robyn R. Lutz, Patrick Maeder:
Trace Queries for Safety Requirements in High Assurance Systems. REFSQ 2012: 179-193 - 2011
- [j24]Jing Liu, Samik Basu, Robyn R. Lutz:
Compositional model checking of software product lines using variation point obligations. Autom. Softw. Eng. 18(1): 39-76 (2011) - [j22]Josh Dehlinger, Robyn R. Lutz:
Gaia-PL: A Product Line Engineering Approach for Efficiently Designing Multiagent Systems. ACM Trans. Softw. Eng. Methodol. 20(4): 17:1-17:27 (2011) - [c44]Sandeep Krishnan, Robyn R. Lutz, Katerina Goseva-Popstojanova:
Empirical evaluation of reliability improvement in an evolving software product line. MSR 2011: 103-112 - [c43]Sandeep Krishnan, Chris Strasburg, Robyn R. Lutz, Katerina Goseva-Popstojanova:
Are change metrics good predictors for an evolving software product line? PROMISE 2011: 7 - 2010
- [c41]Hongyu Sun, Samik Basu, Vasant G. Honavar, Robyn R. Lutz:
Automata-Based Verification of Security Requirements of Composite Web Services. ISSRE 2010: 348-357 - [c40]James Kirby Jr., David M. Weiss, Robyn R. Lutz:
Evidence-based software production. FoSER 2010: 191-194 - [c39]Robyn R. Lutz, David M. Weiss, Sandeep Krishnan, Jingwei Yang:
Software Product Line Engineering for Long-Lived, Sustainable Systems. SPLC 2010: 430-434 - [c38]Dinanath Nadkarni, Samik Basu, Vasant G. Honavar, Robyn R. Lutz:
Failure Analysis for Composition of Web Services Represented as Labeled Transition Systems. WS-FM 2010: 161-175 - 2009
- [c37]Josh Dehlinger, Robyn R. Lutz:
Evaluating the Reusability of Product-Line Software Fault Tree Analysis Assets for a Safety-Critical System. ICSR 2009: 160-169 - [c35]Hongyu Sun, Robyn R. Lutz, Samik Basu:
Product-line-based requirements customization for web service compositions. SPLC 2009: 141-150 - 2008
- [j21]Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant G. Honavar:
MOSCOE: an Approach for Composing Web Services through Iterative Reformulation of Functional Specifications. Int. J. Artif. Intell. Tools 17(1): 109-138 (2008) - [c34]Josh Dehlinger, Robyn R. Lutz:
Supporting requirements reuse in multi-agent system product line design and evolution. ICSM 2008: 207-216 - [c32]Qian Feng, Robyn R. Lutz:
Assessing the Effect of Software Failures on Trust Assumptions. ISSRE 2008: 291-292 - 2007
- [j20]Jing Liu, Josh Dehlinger, Robyn R. Lutz:
Safety analysis of software product lines using state-based modeling. J. Syst. Softw. 80(11): 1879-1892 (2007) - [c30]Jing Liu, Josh Dehlinger, Hongyu Sun, Robyn R. Lutz:
State-Based Modeling to Support the Evolution and Maintenance of Safety-Critical Software Product Lines. ECBS 2007: 596-608 - [c29]Hongyu Sun, Miriam Hauptman, Robyn R. Lutz:
Integrating Product-Line Fault Tree Analysis into AADL Models. HASE 2007: 15-22 - [c27]Josh Dehlinger, Meredith Humphrey, Lada Suvorov, Prasanna Padmanabhan, Robyn R. Lutz:
DECIMAL and PLFaultCAT: From Product-Line Requirements to Product-Line Member Software Fault Trees. ICSE Companion 2007: 49-50 - 2006
- [j18]Josh Dehlinger, Robyn R. Lutz:
PLFaultCAT: A Product-Line Software Fault Tree Analysis Tool. Autom. Softw. Eng. 13(1): 169-193 (2006) - [j17]Yanxin Wang, Smruti Ranjan Behera, Johnny Wong, Guy G. Helmer, Vasant G. Honavar, Les Miller, Robyn R. Lutz, Mark Slagell:
Towards the automatic generation of mobile agents for distributed intrusion detection system. J. Syst. Softw. 79(1): 1-14 (2006) - [c26]Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong:
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. DASC 2006: 333-340 - [c25]Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant G. Honavar:
Parallel Web Service Composition in MoSCoE: A Choreography-Based Approach. ECOWS 2006: 3-12 - [c24]Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant G. Honavar:
MoSCoE: A Framework for Modeling Web Service Composition and Execution. ICDE Workshops 2006: 143 - [c23]Jyotishman Pathak, Samik Basu, Robyn R. Lutz, Vasant G. Honavar:
Selecting and Composing Web Services through Iterative Reformulation of Functional Specifications. ICTAI 2006: 445-454 - 2005
- [j16]Prasanna Padmanabhan, Robyn R. Lutz:
Tool-Supported Verification of Product Line Requirements. Autom. Softw. Eng. 12(4): 447-465 (2005) - [j15]Qian Feng, Robyn R. Lutz:
Bi-directional safety analysis of product lines. J. Syst. Softw. 78(2): 111-127 (2005) - [j14]Josh Dehlinger, Robyn R. Lutz:
A product-line requirements approach to safe reuse in multi-agent systems. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [j13]Jing Liu, Robyn R. Lutz, Jeffrey M. Thompson:
Mapping concern space to software architecture: a connector-based approach. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-5 (2005) - [c21]Jing (Janet) Liu, Robyn R. Lutz, Jeffrey M. Thompson:
Mapping concern space to software architecture: a connector-based approach. MACS@ICSE 2005: 14:1-14:5 - [c20]Jing Liu, Josh Dehlinger, Robyn R. Lutz:
Safety Analysis of Software Product Lines Using State-Based Modeling. ISSRE 2005: 21-30 - [c17]Josh Dehlinger, Robyn R. Lutz:
A product-line requirements approach to safe reuse in multi-agent systems. SELMAS 2005: 1:1-1:7 - [c16]Josh Dehlinger, Robyn R. Lutz:
A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems. SELMAS (LNCS) 2005: 161-178 - 2004
- [j12]Robyn R. Lutz, Ines Carmen Mikulski:
Ongoing Requirements Discovery in High-Integrity Systems. IEEE Softw. 21(2): 19-25 (2004) - [j10]Robyn R. Lutz, Ines Carmen Mikulski:
Empirical Analysis of Safety-Critical Anomalies During Operations. IEEE Trans. Software Eng. 30(3): 172-180 (2004) - [c15]Josh Dehlinger, Robyn R. Lutz:
Software Fault Tree Analysis for Product Lines. HASE 2004: 12-21 - 2003
- [j9]Robyn R. Lutz, Ines Carmen Mikulski:
Operational anomalies as a cause of safety-critical requirements evolution. J. Syst. Softw. 65(2): 155-161 (2003) - [c14]Robyn R. Lutz, Ines Carmen Mikulski:
Requirements Discovery during the Testing of Safety-Critical Software. ICSE 2003: 578-585 - [c13]Robyn R. Lutz, Ines Carmen Mikulski:
Resolving Requirements Discovery in Testing and Operations. RE 2003: 33- - [c12]Tim Menzies, Robyn R. Lutz, Ines Carmen Mikulski:
Better Analysis of Defect Data at NASA. SEKE 2003: 607-611 - 2002
- [j7]Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant G. Honavar, Les Miller, Robyn R. Lutz:
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Requir. Eng. 7(4): 207-220 (2002) - 2001
- [c10]Robyn R. Lutz, Ines Carmen Mikulski:
Evolution of Safety-Critical Requirements Post-Launch. RE 2001: 222-227 - 1998
- [j4]Steve M. Easterbrook, Robyn R. Lutz, Richard Covington, John Kelly, Yoko Ampo, David Hamilton:
Experiences Using Lightweight Formal Methods for Requirements Modeling. IEEE Trans. Software Eng. 24(1): 4-14 (1998) - [c4]Robyn R. Lutz, Guy G. Helmer, Michelle M. Moseman, David E. Statezni, Stephen R. Tockey:
Safety Analysis of Requirements for a Product Family. ICRE 1998: 24- - 1992
- [j1]Robyn R. Lutz, Johnny S. Wong:
Detecting Unsafe Error Recovery Schedules. IEEE Trans. Software Eng. 18(8): 749-760 (1992)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 17:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint