no code implementations • ACL 2018 • Benjamin S. Meyers, Nuthan Munaiah, Emily Prud{'}hommeaux, Andrew Meneely, Josephine Wolff, Cecilia Ovesdotter Alm, Pradeep Murukannaiah
Software developers and testers have long struggled with how to elicit proactive responses from their coworkers when reviewing code for security vulnerabilities and errors.