During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same files that were just changed, since the effects of a change in the code base can have ramifications in other parts of the system. We propose a methodology for determining the effect… (More)
Static analysis tools tend to generate more alerts than a development team can reasonably examine without some form of guidance. In this paper, we propose a technique for leveraging field failures and historical change records to determine which sets of alerts are often associated with a field failure using singular value decomposition. We performed a case… (More)
BACKGROUND The prevalence of nontuberculous mycobacterial (NTM) disease is rising. An understanding of known risk factors for disease sheds light on the immunological and physical barriers to infection, and how and why they may be overcome. This review focuses on human NTM infection, supported by experimental and in vitro data of relevance to the practising… (More)
In this position statement, we relate some of our current thoughts on Security, IT, and Risk Perception.
iii ACKNOWLEDGEMENTS The chemical analysis of water samples is a labor-intensive process. The total phosphorus and chlorophyll a results in this report would not have been possible were it not for the capable help and skills of many SPEA graduate research assistants who conducted the analyses. Julia Bond provided GIS graphics assistance as well as much… (More)