default search action
Ashley Williams
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Charlie Roadhouse, Matthew Shardlow, Ashley Williams:
MMU NLP at CheckThat! 2024: Homoglyphs are Adversarial Attacks. CLEF (Working Notes) 2024: 580-589 - 2023
- [c18]Sam Attwood, Ashley Williams:
Exploring the UK Cyber Skills Gap through a mapping of active job listings to the Cyber Security Body of Knowledge (CyBOK). EASE 2023: 273-278 - 2022
- [c17]Ashley Williams, Jim Buchan:
Using the case survey methodology for finding high-quality grey literature in software engineering. EASE 2022: 1-9 - [c16]Ashley Williams, Matthew Shardlow:
Extending a corpus for assessing the credibility of software practitioner blog articles using meta-knowledge. EASE 2022: 305-310 - 2021
- [c15]Ashley Williams, Matthew Shardlow, Austen Rainer:
Towards a corpus for credibility assessment in software practitioner blog articles. EASE 2021: 100-108 - [i5]Austen Rainer, Ashley Williams:
Practitioner-generated blog posts as evidence for software engineering research: attitudinal survey and preliminary checklist. CoRR abs/2103.01845 (2021) - [i4]Ashley Williams, Matthew Shardlow, Austen Rainer:
Towards a corpus for credibility assessment in software practitioner blog articles. CoRR abs/2106.11159 (2021) - 2020
- [j3]Austen Rainer, Ashley Williams, Vahid Garousi, Michael Felderer:
Retrieving and mining professional experience of software practice from grey literature: an exploratory review. IET Softw. 14(6): 665-676 (2020) - [i3]Austen Rainer, Ashley Williams, Vahid Garousi, Michael Felderer:
Retrieving and mining professional experience of software practice from grey literature: an exploratory review. CoRR abs/2009.14740 (2020)
2010 – 2019
- 2019
- [j2]Austen Rainer, Ashley Williams:
Heuristics for improving the rigour and relevance of grey literature searches for software engineering research. Inf. Softw. Technol. 106: 231-233 (2019) - [j1]Austen Rainer, Ashley Williams:
Using blog-like documents to investigate software practice: Benefits, challenges, and research directions. J. Softw. Evol. Process. 31(11) (2019) - [c14]Ashley Williams, Austen Rainer:
How do empirical software engineering researchers assess the credibility of practitioner-generated blog posts? EASE 2019: 211-220 - [c13]Ashley Williams, Austen Rainer:
Do software engineering practitioners cite software testing research in their online articles?: A larger scale replication. EASE 2019: 292-297 - 2018
- [c12]Austen Rainer, Ashley Williams:
Using Blog Articles in Software Engineering Research: Benefits, Challenges and Case-Survey Method. ASWEC 2018: 201-209 - [c11]Ashley Williams:
Using reasoning markers to select the more rigorous software practitioners' online content when searching for grey literature. EASE 2018: 46-56 - [c10]Ashley Williams:
Do software engineering practitioners cite research on software testing in their online articles?: A preliminary survey. EASE 2018: 151-156 - [i2]Charles Schmitt, Vickie Walker, Ashley Williams, Arun Varghese, Yousuf Ahmad, Andy Rooney, Mary Wolfe:
Overview of the TAC 2018 Systematic Review Information Extraction Track. TAC 2018 - 2017
- [c9]Ashley Williams, Austen Rainer:
Toward the use of blog articles as a source of evidence for software engineering research. EASE 2017: 280-285 - 2016
- [c8]Ashley Williams, Austen Rainer:
Identifying Practitioners' Arguments and Evidence in Blogs: Insights from a Pilot Study. APSEC 2016: 345-348 - [c7]Scott Rosen, Peter Salemi, Brian Wickham, Ashley Williams, Christine Harvey, Erin Catlett, Sajjad Taghiyeh, Jie Xu:
Parallel Empirical Stochastic Branch and Bound for large-scale discrete optimization via Simulation. WSC 2016: 626-637 - 2015
- [i1]Ashley Williams:
A comparison of the performance and scalability of relational and document-based web-systems for large scale applications in a rehabilitation context. CoRR abs/1510.00216 (2015)
2000 – 2009
- 2009
- [c6]Ashley Williams:
User-centered design, activity-centered design, and goal-directed design: a review of three methods for designing web applications. SIGDOC 2009: 1-8 - [e1]Brad Mehlenbacher, Aristidis Protopsaltis, Ashley Williams, Shaun Slattery:
Proceedings of the 27th Annual International Conference on Design of Communication, SIGDOC 2009, Bloomington, Indiana, USA, October 5-7, 2009. ACM 2009, ISBN 978-1-60558-559-8 [contents] - 2006
- [c5]Ashley Williams, Mary Moore:
Designing communication: considering the dynamics of the discipline. SIGDOC 2006: 59-63 - 2004
- [c4]Rashad L. Moore, Ashley Williams, John W. Sheppard:
Multi-agent Simulation of Airline Travel Markets. GECCO (2) 2004: 1322-1323 - [c3]Ashley Williams:
The documentation of quality engineering: applying use cases to drive change in software engineering models. SIGDOC 2004: 4-13 - 2003
- [c2]Ashley Williams:
Examining the use case as genre in software development and documentation. SIGDOC 2003: 12-19 - 2002
- [c1]Ashley Williams:
Assessing prototypes' role in design. SIGDOC 2002: 248-257
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-22 19:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint