


default search action
5th SoMeT 2006: Quebec, Canada
- Hamido Fujita, Mohamed Mejri:

New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada. Frontiers in Artificial Intelligence and Applications 147, IOS Press 2006, ISBN 978-1-58603-673-7
Chapter 1. Software Specification and Comprehension Models
- David Lorge Parnas:

Component Interface Documentation: What do we Need and Why do we Need it? 3-21 - François Lemieux, Martin Salois:

Visualization Techniques for Program Comprehension - A Literature Review. 22-47 - Klaus Meffert, Ilka Philippow:

Supporting Program Comprehension for Refactoring Operations with Annotations. 48-67
Chapter 2. Software Development and Related Methodologies
- T. S. E. Maibaum:

On specifying systems that connect to the physical world. 71-83 - Asif Qumer, Brian Henderson-Sellers:

A Framework to Support Non-fragile Agile Agent-Oriented Software Development. 84-100 - Anna Maria Di Sciullo:

Information Processing and the Recovery of Argument Structure Asymmetries. 101-115 - George Feuerlicht:

System Development Life-Cycle Support for Service-Oriented Applications. 116-126 - Victor Malyshkin:

How to Create the Magic Wand? - Currently Implementable Formulation of the Problem. 127-132 - Rikio Maruta, Noriko Taniguchi:

Transforming a Non-Software Company to a Software Company by Exploiting the LYEE Methodology. 133-145 - Luciana de Paiva Silva, Elisa Hatsue Moriya Huzita, Tania Fatima Calvi Tait:

Comparing Approaches in AORE through ISO/IEC 9126. 146-156
Chapter 3. Network Security and Applications
- Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha:

A Formal Approach for the Forensic Analysis of Logs. 159-176 - Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:

Common Criteria Approach to J2ME CLDC Security Requirements. 177-194 - Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi:

Enforcing Security Policies on Programs. 195-207
Chapter 4. Software Security and Program Bugs
- Satish Narayanasamy

, Cristiano Pereira, Brad Calder:
Software Profiling for Deterministic Replay Debugging of User Code. 211-230 - Frédéric Michaud, Frédéric Painchaud:

Source Code Verification Tools for Software Security Bugs. 231-241
Chapter 5. Validation and Diagnosis and Practical Artefacts on Software Security
- Fumio Negoro, Hamido Fujita:

Theory on Software Diagnosis for Program Code Validation. 245-271 - François Gagnon, Mohamed Mejri:

A Decision Procedure for Structured Cryptographic Protocols. 272-286 - Osamu Atsumi, Shogo Hayashida, Rikio Maruta:

Unified OTP Cryptosystem with Authentication and Secrecy. 287-300 - Liviu Pene, Kamel Adi:

A Calculus for Distributed Firewall Specification and Verification. 301-315
Chapter 6. Program Conversion and Related Software Validation
- Daniel Godbout, Béchir Ktari, Mohamed Mejri:

A Formal Translation From an Imperative Language With Array to a Declarative Language. 319-339 - Osamu Arai, Hamido Fujita:

Verification of the Lyee requirement. 340-361
Chapter 7. Intelligent Software Design and Maintenance
- Jürgen Vörding, Maraike Schellmann, Sergei Gorlatch:

Enhancing and Parallelizing Legacy Software for Medical Imaging - A Case Study. 365-383 - Michael J. Oudshoorn, M. Muztaba Fuad, Debzani Deb:

Towards Autonomic Computing: Injecting Self-Organizing and Self-Healing Properties into Java Programs. 384-406 - Zenya Koono, Hassan Abolhassani, Hui Chen:

A New Way of Automatic Design of Software (Simulating Human Intentional Activity). 407-420
Chapter 8. End User Requirement Engineering and Testing
- Sergei Gorlatch, Tae Kameda, Hamido Fujita, Michiru Tanaka, Yutaka Funyu, Osamu Arai:

Towards Developing Adjustable Software: A Case Study with the Lyee Approach. 423-438 - Bee Bee Chua, June M. Verner, Darren Dalcher:

A Framework for Predicting Person-Effort on Requirements Changes. 439-451 - Nicolas Juillerat, Béat Hirsbrunner:

FOOD: An Intermediate Model for Automated Refactoring. 452-461 - Tanja Toroi:

Improving Software Test Processes. 462-473

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














