Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Gene Spafford

Known as: Spaf, Eugene H. Spafford, Spafford 
Eugene Howard Spafford (born 1956), commonly known as Spaf, is an American professor of computer science at Purdue University and a leading computer… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
The wide range of approaches to data analysis in qualitative research can seem daunting even for experienced researchers. This… Expand
  • table 6.1
Review
2011
Review
2011
  • A. Offutt
  • Inf. Softw. Technol.
  • 2011
  • Corpus ID: 15197594
Abstract Context The field of mutation analysis has been growing, both in the number of published papers and the number of active… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2007
Highly Cited
2007
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined… Expand
  • table 1
  • table 1
  • table 2
  • table 3
  • table 4
2005
2005
Direct payments are becoming an important means by which any disabled person can arrange their care in ways that give them more… Expand
Highly Cited
2004
Highly Cited
2004
The authors analyze 40 online privacy policy documents from nine financial institutions to examine their clarity and readability… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
2002
2002
This paper argues that there is significant benefit in providing multiple progressively stronger layers of security for hosts… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
Highly Cited
2002
Highly Cited
2002
Privacy has recently become a prominent issue in the context of electronic commerce websites. Increasingly, Privacy policies… Expand
  • table 1
  • table 2
  • table 3
Highly Cited
1997
Highly Cited
1997
In this paper we describe our preliminary experiments to extend the work pioneered by Forrest (see Forrest et al. 1996) on… Expand
  • table 1
  • table 2
  • table 3
  • table 4
1997
1997
  • F. Cohen
  • Comput. Secur.
  • 1997
  • Corpus ID: 25206954
This paper describes 140 different classes of protective methods gathered from many different sources. Where a single source for… Expand
Highly Cited
1990
Highly Cited
1990
Program slices are useful in debugging, testing, maintenance, and understanding of programs. The conventional notion of a program… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5