


default search action
ACM SIGSOFT Software Engineering Notes, Volume 30
Volume 30, Number 1, January 2005
- Shang-Wen Cheng, Robert L. Nord, Judith A. Stafford:

WICSA Wiki WAN Party: capturing experience in software architecture best practices. 1 - Holger Giese, Ingolf Krüger:

A summary of the ICSE 2004 workshop on "scenarios and state machines: models, algorithms, and tools". 2 - Rogério de Lemos, Cristina Gacek, Alexander B. Romanovsky:

ICSE 2004 workshop on architecting dependable systems. 3 - Ahmed E. Hassan, Richard C. Holt, Audris Mockus:

Report on MSR 2004: International workshop on mining software repositories. 4 - Shriram Krishnamurthi, Tevfik Bultan:

Discussion summary: characteristics of web services and their impact on testing, analysis and verification. 5
- Praful V. Bhansali:

Complexity measurement of data and control flow. 1 - Praful V. Bhansali:

Software dissimilarity debate revisited. 2 - Praful V. Bhansali:

Software safety: current status and future direction. 3 - D. Janakiram, M. S. Rajasree:

ReQuEst: Requirements-driven quality estimator. 4 - Ralph Kühne, Cornelius Wille, Reiner R. Dumke:

Software agents using simulation for decision-making. 5 - Robert Schaefer:

Systems of systems and coordinated atomic actions. 6 - Alexander Stuckenholz:

Component evolution and versioning state of the art. 7 - Qianxiang Wang:

Towards a rule model for self-adaptive software. 8 - Peter G. Neumann:

Risks to the public in computers and related systems. 9 - Lei Xu, Baowen Xu

, Jixiang Jiang:
Testing web applications focusing on their specialties. 10
- Larry Bernstein:

Trustworthy software systems. 4-5 - Michael Wing:

Towards a national academy of software engineering. 6-7
- Peter B. Henderson:

Software Engineering Education (SEEd). 8-9
- Peter G. Neumann:

Risks to the public in computers and related systems. 9-18
- Mark Doernhoefer:

Surfing the net for software engineering notes. 19-27
- Mordechai Ben-Menachem:

Review of "Interpreting the CMMI: A Process Improvement Approach by Margaret K. Kulpa and Kent A. Johnson". Auerbach Publications 2003. 33-34 - Mordechai Ben-Menachem:

Review of "Six Sigma Software Development by Christine B. Tayntor". Auerbach Publications, 2003. 34 - Haoyang Che:

Review of "The Object Primer, 2nd Edition by Scott W. Ambler". Cambridge University Press: Cambridge, 2001, 0-521-785197 (paperback). 35 - Haoyang Che:

Review of "The Object Primer, 3rd Edition by Scott W. Ambler". Cambridge University Press: Cambridge, 2004, 0-521-54018-6 (paperback). 35-36 - Haoyang Che:

Review of "Eclipse: Building Commercial Quality Plug-ins by Eric Clayberg and Dan Rubel". Addison Wesley, 2004, 0-321-22847-2 (paperback). 36 - Ken Frazer:

Review of "Memory as a Programming Concept in C and C++ by Frantisek Franek". Cambridge University Press, 2004, (paperback), 0-521-52043-6. 36-37 - Brian Lawler:

Review of "CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition by Dennis M. Ahern, Aaron Clouse and Richard Turner". Addison Wesley, 2004, paperback, ISBN 0-321-18613-3. 37-38 - Joe Saur:

Review of "Software Reliability Engineering: More Reliable Software Faster and Cheaper - 2nd Edition by John Musa". AuthorHouse, Inc., 2004, Hardback, ISBN 1-4184-9388-0, Paperback, ISBN 1-4184-9387-2. 38-39 - Joe Saur:

Review of "Software Development for Small Teams: a RUP-Centric Approach by Gary Pollice, Liz Augustine, Chris Lowe, and Jas Madhur". Addison-Wesley, 2004, paperback, ISBN 0-321-19950-2. 38 - Backmatter (Report abstracts, Paper abstracts, Book Reviews, Calendar of Future Events). 40

Volume 30, Number 2, March 2005
- Nasib Singh Gill:

Factors affecting effective software quality management revisited. 1-4 - Michael Breen:

Combinatorial completion by rule definition with interactive value colouring. 1-6 - Baowen Xu

, Ju Qian, Xiaofang Zhang, Zhongqiang Wu, Lin Chen:
A brief survey of program slicing. 1-36 - Shahid Nazir Bhatti

:
Why quality?: ISO 9126 software quality metrics (Functionality) support by UML suite. 1-5 - Keith A. Roberts:

Generic methodology for open source software development. 1-5 - Mehdi Sagheb-Tehrani:

Expert systems development: some issues of design process. 1-5
- Peter B. Henderson:

Software engineering education (SEEd). 3 - John C. Knight:

Focusing software education on engineering. 3-5
- Michael Wing:

It's our job to care for SE. 6-8
- Mark Doernhoefer:

Surfing the net for software engineering notes. 9-16
- Peter G. Neumann:

Risks to the Public. 17-25
- Haoyang Che:

Review of "Object Thinking by David West"; Microsoft Press: Microsoft, 2004, 0-7356-1965-4. 28-29 - Charles Beasley:

Review of "Balancing Agility and Discipline: A Guide for the Perplexed by Barry Boehm and Richard Turner"; Addison Wesley, 2004, ISBN 0-321-18612-5. 28 - Haoyang Che:

Review of "The Elements of C++ Style by Trevor Misfeldt, Gregory Bumgardner, and Andrew Gray"; Cambridge University Press: Cambridge, 2004, 0-521-89308-9. 29 - Haoyang Che:

Review of "Object-Oriented Programming with Visual Basic.NET by Michael McMillan"; Cambridge University Press: Cambridge, 2004, 0-521-53983-8. 29-30 - Mordechai Ben-Menachem:

Review of "Testing Embedded Software by Bart Broekman and Edwin Notenboom"; Addison Wesley.; 2003. 30 - Joe Saur:

Review of "Find the Bug: A Book of Incorrect Programs by Adam Barr"; Pearson Education, 2004, ISBN 0321223918. 30-31
Volume 30, Number 3, May 2005
- Joseph Feller, Brian Fitzgerald, Scott A. Hissam, Karim R. Lakhani:

Collaboration, conflict and control: report on the 4th workshop on open source software engineering. 1-2 - Ivica Crnkovic, Ralf H. Reussner, Heinz W. Schmidt, Kevin Simons, Judith A. Stafford, Kurt C. Wallnau:

Report of the International Symposium on Component-Based Software Engineering. 1-9
- Chia-Chu Chiang:

Implicit heterogeneous and parallel programming. 1-6 - Muthu Ramachandran:

Software reuse guidelines. 1-8 - Ananth Kendapadi, Matt Gandolfo, Amitosh Shukla:

BatchFlow: a method and notation to visualize RDBMS batch jobs. 1-5
- Donald J. Reifer:

Educating software engineers: an industry viewpoint. 8-9
- Michael Wing:

Toward a great and enduring profession. 9-11
- Mark Doernhoefer:

Surfing the net for software engineering notes. 12-21
- Peter G. Neumann:

Risks to the public. 22-37
- Mordechai Ben-Menachem:

Review of "Return on Software by Steve Tockey"; Addison Wesley, 2005. 39-40 - Debora Weber-Wulff:

Review of "Official eclipse 3.0 FAQs by John Arthorne and Chris Laffra"; Addison-Wesley, 2004, ISBN 0-321-26838-5. 40 - Debora Weber-Wulff:

Reveiw of "Contributing to eclipse: Principles, Patterns, and Plug-Ins by Erich Gamma and Kent Beck", Addison-Wesley, 2004, ISBN 0-321-20575-8. 40-41
Volume 30, Number 4, July 2005
- K. K. Aggarwal, Yogesh Singh, Pravin Chandra, Manimala Puri:

Evaluation of various training algorithms in a neural network model for software engineering applications. 1-4 - Qun Yang, Xian-Chun Yang, Man-Wu Xu:

A framework for dynamic software architecture-based self-healing. 1-4 - Muhammad Raza Ali:

Why teach reverse engineering? 1-4 - Russell Ovans:

All we really need to know about software engineering is in the film office space. 1-3 - K. K. Aggarwal, Yogesh Singh, Pravin Chandra, Manimala Puri:

Sensitivity analysis of fuzzy and neural network models. 1-4 - Esperanza Marcos:

Software engineering research versus software development. 1-7 - Robert Schaefer:

Deeper questions: the metaproblem of large organizations developing complex systems and the limits of process. 1-6
- Martin P. Robillard:

Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005). 1-3 - Alexander Pretschner, Christian Salzmann, Thomas Stauner

:
2nd Intl. ICSE Workshop on Software Engineering for Automotive Systems. 1-2 - Michael John, Frank Maurer, Bjørnar Tessem:

Human and social factors of software engineering: workshop summary. 1-6 - Lori L. Pollock, James H. Andrews:

ICSE 2005 workshop summary third international workshop on dynamic analysis (WODA 2005). 1-2 - Danilo Bruschi, Bart De Win, Mattia Monga

:
Software engineering for secure systems. 1-2 - Alessandro Garcia, Ricardo Choren, Carlos José Pereira de Lucena, Alexander B. Romanovsky, Holger Giese, Danny Weyns, Tom Holvoet, Paolo Giorgini:

Software Engineering for Large-Scale Multi-Agent Systems - SELMAS 2005: workshop report. 1-8 - Rogério de Lemos, Alexander B. Romanovsky:

ICSE 2005 Workshop on Architecting Dependable Systems (WADS 2005). 1-4
- David Lorge Parnas, Lillian Chik-Parnas:

Goals for software engineering student education. 6-8 - Peter B. Henderson:

Software Engineering Education (SEEd). 6 - Michael Wing:

In praise of SE Geeks. 8-9 - Joe Saur:

Project management: here we go again! 8
- Mark Doernhoefer:

Surfing the net for software engineering notes. 10-18
- Peter G. Neumann:

Risks to the public. 19-35
- David Garlan, Marin Litoiu, Hausi A. Müller, John Mylopoulos, Dennis B. Smith, Kenny Wong:

DEAS 2005: workshop on the design and evolution of autonomic application software. 1 - Karun N. Biyani, Sandeep S. Kulkarni:

Building component families to support adaptation. 1-7 - Naveed Arshad, Dennis Heimbigner, Alexander L. Wolf:

Dealing with failures during failure recovery of distributed systems. 1-6 - Michael E. Shin, Daniel E. Cooke:

Connector-based self-healing mechanism for components of a reliable system. 1-7 - Sherif A. Gurguis, Amir Zeid:

Towards autonomic web services: achieving self-healing using web services. 1-5 - Danny Weyns, Kurt Schelfthout, Tom Holvoet:

Architectural design of a distributed application with autonomic quality requirements. 1-7 - Minseong Kim, Jaemin Jeong, Sooyong Park:

From product lines to self-managed systems: an architecture-based runtime reconfiguration framework. 1-7 - Mazeiar Salehie, Ladan Tahvildari:

Autonomic computing: emerging trends and open problems. 1-7 - Scott D. Fleming, Betty H. C. Cheng, R. E. Kurt Stirewalt, Philip K. McKinley:

An approach to implementing dynamic adaptation in C++. 1-7 - Marin Litoiu, C. Murray Woodside, Tao Zheng:

Hierarchical model-based autonomic control of software systems. 1-7 - Dharini Balasubramaniam, Ronald Morrison, Graham N. C. Kirby, Kath Mickan, Brian Warboys, Ian Robertson, Bob Snowdon, Robert Mark Greenwood, Wykeen Seet:

A software architecture approach for structuring autonomic systems. 1-7 - Christian Bartelt, Thomas Fischer, Dirk Niebuhr, Andreas Rausch, Franz Seidl, Marcus Trapp:

Dynamic integration of heterogeneous mobile devices. 1-7 - Gerardo Canfora, Piero Corte, Antonio De Nigro

, Debora Desideri
, Massimiliano Di Penta, Raffaele Esposito, Amedeo Falanga, Gloria Renna, Rita Scognamiglio, Francesco Torelli, Maria Luisa Villani, Paolo Zampognaro:
The C-Cube framework: developing autonomic applications through web services. 1-6 - Michael G. Merideth, Priya Narasimhan:

Retrofitting networked applications to add autonomic reconfiguration. 1-7 - Piotr Kaminski, Priyanka Agrawal, Holger M. Kienle, Hausi A. Müller:

<username>, i need you!: initiative and interaction in autonomic systems. 1-4 - Bradley Simmons, Hanan Lutfiyya:

Policies, grids and autonomic computing. 1-5 - Dennis B. Smith, Edwin J. Morris, David J. Carney:

Interoperability issues affecting autonomic computing. 1-3 - Mohammad Ahmad Munawar, Paul A. S. Ward:

Better performance or better manageability? 1-4 - Alexei Lapouchnian, Sotirios Liaskos, John Mylopoulos, Yijun Yu:

Towards requirements-driven autonomic systems design. 1-7 - Seyed Masoud Sadjadi, Philip K. McKinley, Betty H. C. Cheng:

Transparent shaping of existing software to support pervasive and autonomic computing. 1-7 - Giovanni Denaro, Mauro Pezzè

, Davide Tosi:
Adaptive integration of third-party web services. 1-6 - Rean Griffith, Gail E. Kaiser:

Manipulating managed execution runtimes to support self-healing systems. 1-7
- Robert V. Binder

, James E. Hanlon:
The advanced mobile application testing environment. 1 - Peter B. Lakey:

Model-based specification and testing applied to the Ground-Based Midcourse Defense (GMD) system: an industry report. 1-7 - Fabrice Bouquet, Eddie Jaffuel, Bruno Legeard, Fabien Peureux, Mark Utting

:
Requirements traceability in automated test generation: application to smart card software validation. 1-7 - Xia Cai, Michael R. Lyu:

The effect of code coverage on fault detection under different testing profiles. 1-7 - Renée C. Bryce, Charles J. Colbourn:

Test prioritization for pairwise interaction coverage. 1-7 - Markus Clermont, David Lorge Parnas:

Using information about functions in selecting test cases. 1-7 - Kirk Sayre:

Usage model-based automated testing of C++ templates. 1-5 - David McGuinness, Liam Murphy:

A simulation model of a multi-server EJB system. 1-7 - Albert Schilling, Kelma Madeira, Paula Donegan, Kênia Soares Sousa, Elizabeth Furtado, Vasco Furtado

:
An integrated method for designing user interfaces based on tests. 1-5 - Christopher M. Lott, Ashish Jain, Siddhartha R. Dalal:

Modeling requirements for combinatorial software testing. 1-7 - Christopher Robinson-Mallett, Peter Liggesmeyer, Tilo Mücke, Ursula Goltz:

Generating optimal distinguishing sequences with a model checker. 1-7 - Mark Sherriff, Nachiappan Nagappan, Laurie A. Williams, Mladen A. Vouk:

Early estimation of defect density using an in-process Haskell metrics model. 1-6 - Alan F. Karr, Adam A. Porter:

Distributed performance testing using statistical modeling. 1-7 - Xing Li, Ramesh Nagarajan:

Modeling for image processing system validation, verification and testing. 1-4 - Mikhail Auguston, James Bret Michael, Man-tak Shing:

Environment behavior models for scenario generation and testing automation. 1-6 - Amit M. Paradkar:

Case studies on fault detection effectiveness of model based test generation techniques. 1-7 - Erika Mir Olimpiew

, Hassan Gomaa:
Model-based testing for applications derived from software product lines. 1-7
- Patrick Keil:

Principal agent theory and its application to analyze outsourcing of software development. 1-5 - Jarno Vähäniitty:

A tentative framework for connecting long-term business and product planning with iterative & incremental software product development. 1-4 - Yuanfang Cai, Kevin J. Sullivan:

A value-oriented theory of modularity in design. 1-4 - Hélio R. Costa, Márcio de Oliveira Barros, Guilherme Horta Travassos:

A risk based economical approach for evaluating software project portfolios. 1-5 - LiGuo Huang

, Barry W. Boehm:
Determining how much software assurance is enough?: a value-based approach. 1-5 - Christopher Scaffidi, Ashish Arora, Shawn A. Butler, Mary Shaw

:
A value-based approach to predicting system properties from design. 1-5 - Jyrki Kontio, Jani-Pekka Jokinen, Markus M. Mäkelä, Virve Leino:

Current practices and research opportunities in software business models. 1-4 - Hema Srikanth, Laurie A. Williams:

On the economics of requirements-based test case prioritization. 1-3 - Sushil Krishna Bajracharya, Trung Chi Ngo, Cristina Videira Lopes:

On using Net Options Value as a value based design framework. 1-3 - Ahilton Silva Barreto, Márcio de Oliveira Barros, Cláudia M. L. Werner:

Staffing a software project: a constraint satisfaction approach. 1-5 - Thomas Neubauer, Markus D. Klemen, Stefan Biffl:

Business process-based valuation of IT-security. 1-5 - Apurva Jain, Barry W. Boehm:

Developing a theory of value-based software engineering. 1-5 - Vahe Poladian, João Pedro Sousa, Frank Padberg, Mary Shaw

:
Anticipatory configuration of resource-aware applications. 1-4 - Sebastian Kiebusch, Bogdan Franczyk, Andreas Speck:

Metrics for software system families. 1-5
- Robert R. Painter, David Coppit:

A model for software plans. 1-5 - Marius Marin, Leon Moonen

, Arie van Deursen:
An approach to aspect refactoring based on crosscutting concern types. 1-5 - Martin P. Robillard, Gail C. Murphy:

Just-in-time concern modeling. 1-3 - Jing Liu, Robyn R. Lutz, Jeffrey M. Thompson:

Mapping concern space to software architecture: a connector-based approach. 1-5 - William H. Harrison, Harold Ossher, Stanley M. Sutton Jr., Peri L. Tarr:

Concern modeling in the concern manipulation environment. 1-5 - Haitham S. Hamza:

Separation of concerns for evolving systems: a stability-driven approach. 1-5 - David C. Shepherd, Lori L. Pollock, Tom Tourwé:

Using language clues to discover crosscutting concerns. 1-6 - Juri Memmert:

Concern patterns and analysis. 1-5 - Mazen Saleh, Hassan Gomaa:

Separation of concerns in software product line engineering. 1-5 - Annie T. T. Ying, James L. Wright, Steven Abrams:

An exploration of how comments are used for marking related code fragments. 1-4 - Naoyasu Ubayashi, Tetsuo Tamai:

Concern management for constructing model compilers. 1-5 - José Juan Pazos-Arias, Jorge García Duque, Martín López Nores:

Locating crosscutting concerns in the formal specification of distributed reactive systems. 1-5 - Vladimir Jakobac, Nenad Medvidovic, Alexander Egyed:

Separating architectural concerns to ease program understanding. 1-5 - Xiaoqing Wu, Barrett R. Bryant, Jeff Gray, Marjan Mernik:

Pattern transformation for two-dimensional separation of concerns. 1-5 - Jing Zhang, Jeff Gray, Yuehua Lin:

A model-driven approach to enforce crosscutting assertion checking. 1-5 - Wesley Coelho, Gail C. Murphy:

ActiveAspect: presenting crosscutting structure. 1-4
- Kendra M. L. Cooper, Lawrence Chung:

Managing change in an OTS-aware requirements engineering approach. 1-4 - Abdallah Mohamed, Günther Ruhe, Armin Eberlein:

Decision support for customization of the COTS selection process. 1-4 - Xavier Franch

, Marco Torchiano
:
Towards a reference framework for COTS-based development: a proposal. 1-4 - Michael Todd Gamble, Rose F. Gamble, Michelle Hepner:

Understanding solution architecture concerns. 1-4 - Tariq Al-Naeem, Ian Gorton, Fethi A. Rabhi, Boualem Benatallah:

Tool support for optimization-based architectural evaluation. 1-4 - Jing Dong, Sheng Yang, Lawrence Chung, Paulo S. C. Alencar, Donald D. Cowan:

A COTS architectural component specification stencil for selection and reasoning. 1-4 - Annya Réquilé-Romanczuk, Alejandra Cechich, Anne Dourgnon-Hanoune, Jean-Christophe Mielnik:

Towards a knowledge-based framework for COTS component identification. 1-4 - Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse, Umair Khan, Maurizio Morisio, Marco Torchiano

:
Barriers to disseminating off-the-shelf based development theories to IT industry. 1-4 - Brian Henderson-Sellers, Cesar Gonzalez-Perez, M. K. Serour, Donald G. Firesmith:

Method engineering and COTS evaluation. 1-4 - Jiang Zheng, Brian Robinson, Laurie A. Williams, Karen Smiley:

A process for identifying changes when source code is not available. 1-4
- Chadd C. Williams, Jeffrey K. Hollingsworth:

Recovering system specific rules from software repositories. 1-5 - Jaime Spacco, Jaymie Strecker, David Hovemeyer, William W. Pugh:

Software repository mining with Marmoset: an automated programming project snapshot and testing system. 1-5 - Giuliano Antoniol, Vincenzo Fabio Rollo, Gabriele Venturi:

Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories. 1-5 - Gregorio Robles, Jesús M. González-Barahona

:
Developer identification methods for integrated data from various sources. 1-5 - Masao Ohira, Naoki Ohsugi, Tetsuya Ohoka, Ken-ichi Matsumoto:

Accelerating cross-project knowledge collaboration using collaborative filtering and social networks. 1-5 - Megan Conklin, James Howison, Kevin Crowston:

Collaboration using OSSmole: a repository of FLOSS data and analyses. 1-5 - Iulian Neamtiu, Jeffrey S. Foster, Michael Hicks:

Understanding source code evolution using abstract syntax tree matching. 1-5 - Carsten Görg, Peter Weißgerber:

Error detection by refactoring reconstruction. 1-5 - Annie T. T. Ying, James L. Wright, Steven Abrams:

Source code that talks: an exploration of Eclipse task comments and their implication to repository mining. 1-5 - Jacek Ratzinger, Michael Fischer, Harald C. Gall

:
Improving evolvability through refactoring. 1-5 - Michael VanHilst, Pankaj K. Garg, Christopher Lo:

Repository mining and Six Sigma for process improvement. 1-4 - Abram Hindle, Daniel M. Germán:

SCQL: a formal model and a query language for source control repositories. 1-5 - Miryung Kim, David Notkin:

Using a clone genealogy extractor for understanding and supporting evolution of code clones. 1-5 - Keir Mierle, Kevin Laven, Sam T. Roweis, Greg Wilson

:
Mining student CVS repositories for performance indicators. 1-5 - Masaru Ohba, Katsuhiko Gondow:

Toward mining "concept keywords" from identifiers in large software projects. 1-5 - Sunghun Kim, E. James Whitehead Jr., Jennifer Bevan:

Analysis of signature change patterns. 1-5 - Shih-Kun Huang

, Kang-min Liu:
Mining version histories to verify the learning process of Legitimate Peripheral Participants. 1-5 - Huzefa H. Kagdi, Michael L. Collard, Jonathan I. Maletic:

Towards a taxonomy of approaches for mining of source code repositories. 1-5 - Daniel M. Germán, Davor Cubranic, Margaret-Anne D. Storey:

A framework for describing and understanding mining tools in software development. 1-5 - Michael Fischer, Johann Oberleitner, Jacek Ratzinger, Harald C. Gall

:
Mining evolution data of a product family. 1-5 - Jacek Sliwerski, Thomas Zimmermann, Andreas Zeller:

When do changes induce fixes? 1-5 - Jane Huffman Hayes, Alex Dekhtyar, Senthil Karthikeyan Sundaram:

Text mining for software engineering: how analyst feedback impacts final results. 1-5
- Marcus Ciolkowski

, Jürgen Münch:
Accumulation and presentation of empirical evidence: problems and challenges. 1-3 - Rob Weaver, Georgios Despotou, Tim Kelly, John A. McDermid:

Combining software evidence: arguments and assurance. 1-7 - Barbara A. Kitchenham, David Budgen, Pearl Brereton, Stephen G. Linkman:

Realising evidence-based software engineering. 1-3 - Bonnie E. John:

Evidence-based practice in human-computer interaction and evidence maps. 1-5 - Laurie A. Williams, Lucas Layman

, Pekka Abrahamsson:
On establishing the essential components of a technology-dependent framework: a strawman framework for industrial case study-based research. 1-5 - WenQian Liu, Charles L. Chen, Vidya Lakshminarayanan, Dewayne E. Perry:

A design for evidence - based soft research. 1-7 - Judith Segal, Antony Grinyer, Helen Sharp:

The type of evidence produced by empirical software engineers. 1-4 - Austen Rainer, Dorota Jagielska, Tracy Hall:

Software engineering practice versus evidence-based software engineering research. 1-5
- Ulrik Eklund, Örjan Askerdal, Johan Granholm, Anders Alminger, Jakob Axelsson:

Experience of introducing reference architectures in the development of automotive electronic systems. 1-6 - Ingo Stürmer, Daniela Weinberg, Mirko Conrad:

Overview of existing safeguarding techniques for automatically generated code. 1-6 - Fredrik Pettersson, Martin Ivarsson, Peter Öhman:

Automotive use case standard for embedded systems. 1-6 - Thomas Bauer, Jens Herrmann, Peter Liggesmeyer, Christopher Robinson-Mallett:

A flexible integration strategy for in-car telematics systems. 1-7 - Joakim Fröberg, Kristian Sandström, Christer Norström:

Business situation reflected in automotive electronic architectures: analysis of four commercial cases. 1-6 - Michael Dinkel, Uwe Baumgarten:

Modeling nonfunctional requirements: a basis for dynamic systems management. 1-8 - Emilia Farcas, Claudiu Farcas, Wolfgang Pree, Josef Templ:

Real-time component integration based on transparent distribution. 1-7 - Jewgenij Botaschanjan, Leonid Kof, C. Kühnel, Maria Spichkova:

Towards verified automotive software. 1-6 - Bruce W. Weide, Paolo Bucci, Wayne D. Heym, Murali Sitaraman, Giorgio Rizzoni:

Issues in performance certification for high-level automotive control software. 1-6
- Brian Henderson-Sellers:

Agent-oriented methodologies: method engineering and metamodelling. 1 - Josh Dehlinger, Robyn R. Lutz:

A product-line requirements approach to safe reuse in multi-agent systems. 1-7 - Toacy Cavalcante de Oliveira, Paulo S. C. Alencar, Donald D. Cowan, Carlos José Pereira de Lucena:

xTAO: enabling a declarative approach to the specification of multi-agent systems. 1-7 - Kurt Schelfthout, Tom Holvoet, Yolande Berbers:

Views: customizable abstractions for contextaware applications in MANETs. 1-8 - Scott A. DeLoach:

Multiagent systems engineering of organization-based multiagent systems. 1-7 - Koenraad Mertens, Tom Holvoet, Yolande Berbers:

A case for adaptation of the distributed environment layout in multiagent applications. 1-8 - Zahia Guessoum, Nora Faci, Jean-Pierre Briot

:
Adaptive replication of large-scale multi-agent systems: towards a fault-tolerant multi-agent platform. 1-6 - Nadeem Jamali, Shangping Ren:

A layered architecture for real-time distributed multi-agent systems. 1-8 - Lúcia R. D. Bastos, Jaelson Castro:

From requirements to multi-agent architecture using organisational concepts. 1-7 - Florian Klein, Holger Giese:

Analysis and design of physical and social contexts in multi-agent systems using UML. 1-8 - Alessandro Garcia, Ricardo Choren, Carlos José Pereira de Lucena, Alexander B. Romanovsky, Tom Holvoet, Paolo Giorgini:

Software engineering for large-scale multi-agent systems - SELMAS'05. 1-2 - Ghassan Beydoun

, Cesar Gonzalez-Perez, Graham Low, Brian Henderson-Sellers:
Synthesis of a generic MAS metamodel. 1-5 - Rohan Sen, Gregory Hackmann, Gruia-Catalin Roman, Christopher D. Gill:

Opportunistic exploitation of knowledge to increase predictability of agent interactions in MANETs. 1-7 - Anand Tripathi, Devdatta Kulkarni, Tanvir Ahmed:

Policy-driven configuration and management of agent based distributed systems. 1-7 - Naftaly H. Minsky:

Law-governed multi-agent systems: from anarchy to order. 1
- John C. Georgas

, Michael M. Gorlick, Richard N. Taylor:
Raging incrementalism: harnessing change with open-source software. 1-6 - Maha Shaikh, Tony Cornford:

Learning/organizing in Linux: a study of the 'spaces in between'. 1-5 - Cristina Rossi, Andrea Bonaccorsi:

Why profit-oriented companies enter the OS field?: intrinsic vs. extrinsic incentives. 1-5 - Ying Zhou, Joseph G. Davis:

Open source software reliability model: an empirical approach. 1-6 - Uzma Raja, Evelyn J. Barry:

Investigating quality in large-scale Open Source Software. 1-4 - Katherine J. Stewart, David P. Darcy, Sherae L. Daniel:

Observations on patterns of development in open source software projects. 1-5 - Paul J. Adams, Cornelia Boldyreff, David Nutter, Stephen Rank:

Adaptive reuse of libre software systems for supporting on-line collaboration. 1-4 - Pablo Barrera, Gregorio Robles, José María Cañas, Francisco Martín, Vicente Matellán:

Impact of libre software tools and methods in the robotics field. 1-6 - Brenda Chawner:

F/OSS in the library world: an exploration. 1-4 - Timo Koponen, Virpi Hotti

:
Open source software maintenance process framework. 1-5 - Anna Persson, Henrik Gustavsson, Brian Lings, Björn Lundell, Anders Mattsson, Ulf Ärlig:

OSS tools in a heterogeneous environment for embedded systems modelling: an analysis of adoptions of XMI. 1-4 - Jai Asundi:

The need for effort estimation models for open source software projects. 1-3 - Herwig Mannaert, Kris Ven:

The use of open source software platforms by Independent Software Vendors: issues and opportunities. 1-4 - Walt Scacchi:

OpenEC/B: electronic commerce and free/open source software development. 1-5 - Vijay K. Gurbani, Anita Garvert, James D. Herbsleb

:
A case study of open source tools and practices in a commercial setting. 1-6
- Francisco Hernández, Purushotham V. Bangalore, Kevin D. Reilly:

End-user tools for grid computing. 1-5 - Tsong Yueh Chen, Fei-Ching Kuo, Zhi Quan Zhou:

An effective testing method for end-user programmers. 1-5 - Lutz Prechelt

, Daniel J. Hutzel:
Market forces and end-user programming for mission-critical systems. 1-4 - Michael M. Pickard:

Old issues, new eyes. 1-3 - Alistair G. Sutcliffe:

Evaluating the costs and benefits of end-user development. 1-4 - Robin Abraham, Martin Erwig:

How to communicate unit error messages in spreadsheets. 1-5 - Joseph R. Ruthruff, Margaret M. Burnett:

Six challenges in supporting end-user debugging. 1-6 - Markus Clermont:

Heuristics for the automatic identification of irregularities in spreadsheets. 1-6 - Fidel Nkwocha, Sebastian G. Elbaum:

Fault patterns in Matlab. 1-4 - Judith Segal:

Two principles of end-user software engineering research. 1-5 - Marc Fisher II, Gregg Rothermel:

The EUSES spreadsheet corpus: a shared resource for supporting experimentation with spreadsheet dependability mechanisms. 1-5 - Amy J. Ko, Brad A. Myers:

Human factors affecting dependability in end-user programming. 1-4 - Michael Bolin, Robert C. Miller:

Naming page elements in end-user web automation. 1-5 - Christopher Scaffidi, Mary Shaw

, Brad A. Myers:
An approach for categorizing end user programmers to guide software engineering research. 1-5
- Israel Herraiz

, Gregorio Robles, Jesús M. González-Barahona:
Towards predictor models for large libre software projects. 1-6 - Bart Massey:

Longitudinal analysis of long-timescale open source repository data. 1-5 - Senthil Karthikeyan Sundaram, Jane Huffman Hayes, Alex Dekhtyar:

Baselines in requirements tracing. 1-6 - Gary D. Boetticher:

Nearest neighbor sampling for better defect prediction. 1-6 - Carolyn Mair, Martin J. Shepperd, Magne Jørgensen:

An analysis of data sets used to train and validate cost prediction systems. 1-6 - Tim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn:

Simple software cost analysis: safe or unsafe? 1-6 - Akif Günes Koru, Hongfang Liu:

An investigation of the effect of module size on defect prediction using static measures. 1-5 - Zhihao Chen, Tim Menzies, Daniel Port, Barry W. Boehm:

Feature subset selection can improve software cost estimation accuracy. 1-6
- Thomas A. Alspaugh, Debra J. Richardson, Thomas A. Standish:

Scenarios, state machines and purpose-driven testing. 1-5 - Leif Geiger, Albert Zündorf:

Story driven testing - SDT. 1-6 - José Juan Pazos-Arias, Jorge García Duque, Martín López Nores:

Eliciting requirements and scenarios using the SCTL-MUS methodology: the shuttle system case study. 1-5 - Ingolf H. Krüger, Reena Mathew, Michael Meisinger:

From scenarios to aspects: exploring product lines. 1-6 - Hans-Dieter Ehrich:

Harmonizing intra- and inter-object specification and verification: a multi-object logics approach. 1 - Holger Giese, Ekkart Kindler

, Florian Klein, Robert Wagner:
Reconciling scenario-centered controller design with state-based system models. 1-5
- Maarten Rits, Benjamin De Boe, Andreas Schaad:

XacT: a bridge between resource management and access control in multi-layered applications. 1-7 - Somo Banerjee, Chris Mattmann, Nenad Medvidovic, Leana Golubchik:

Leveraging architectural models to inject trust into software systems. 1-7 - Zaid Dwaikat, Francesco Parisi-Presicce:

Risky trust: risk-based analysis of software systems. 1-7 - Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel:

Enabling control over adaptive program transformation for dynamically evolving mobile software validation. 1-7 - Karsten Sohr, Gail-Joon Ahn, Lars Migge:

Articulating and enforcing authorisation policies with UML and OCL. 1-7 - Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn:

Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. 1-7 - Ben Breech, Lori L. Pollock:

A framework for testing security mechanisms for program-based attacks. 1-7 - Sam Weber, Paul A. Karger, Amit M. Paradkar:

A software flaw taxonomy: aiming tools at security. 1-7 - Michael Gegick

, Laurie A. Williams:
Matching attack patterns to security vulnerabilities in software-intensive system designs. 1-7 - Nancy R. Mead, Ted Stehney:

Security quality requirements engineering (SQUARE) methodology. 1-7 - Jie Ren, Richard N. Taylor, Paul Dourish, David F. Redmiles:

Towards an architectural treatment of software security: a connector-centric approach. 1-7 - Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:

Requirements traceability to support evolution of access control. 1-7 - Wes Masri, Andy Podgurski:

Using dynamic information flow analysis to detect attacks against applications. 1-7 - Ömer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter:

DISCOA: architectural adaptations for security and QoS. 1-7 - John Viega:

Building security requirements with CLASP. 1-7 - Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:

Towards a unifying view on security contracts. 1-7
- Henry Muccini, Marcio S. Dias, Debra J. Richardson:

Towards software architecture-based regression testing. 1-7 - Genaína Nunes Rodrigues

, David S. Rosenblum, Sebastián Uchitel
:
Sensitivity analysis for a scenario-based reliability prediction model. 1-5 - Marwan Abi-Antoun, Jonathan Aldrich, David Garlan, Bradley R. Schmerl, Nagi H. Nahas, Tony Tseng:

Improving system dependability by enforcing architectural intent. 1-7 - Fernando Castor Filho, Patrick H. S. Brito, Cecília M. F. Rubira:

A framework for analyzing exception flow in software architectures. 1-7 - Deepti Srivastava, Priya Narasimhan:

Architectural support for mode-driven fault tolerance in distributed applications. 1-7 - Lihua Xu, Hadar Ziv, Debra J. Richardson, Thomas A. Alspaugh:

An architectural pattern for non-functional dependability requirements. 1-6 - Osamah A. Rawashdeh, Garrett D. Chandler, James E. Lumpp Jr.:

A UAU test and development environment based on dynamic system reconfiguration. 1-7 - Weihang Wu, Tim Kelly:

Failure modelling in software architecture design for safety. 1-7 - Jennifer Morris, Philip Koopman:

Representing design tradeoffs in safety-critical systems. 1-5 - Simon Giesecke, Timo Warns, Wilhelm Hasselbring:

Availability simulation of peer-to-peer architectural styles. 1-6 - Ji Zhang, Betty H. C. Cheng:

Specifying adaptation semantics. 1-7 - John C. Georgas

, André van der Hoek, Richard N. Taylor:
Architectural runtime configuration management in support of dependable self-adaptive software. 1-6 - Matthias Tichy, Holger Giese, Daniela Schilling, Wladimir Pauls:

Computing optimal self-repair actions: damage minimization versus repair time. 7-6
- LiGuo Huang

, Barry W. Boehm:
Using iDAVE to determine availability requirements. 1-4 - Joost Noppen, Pim van den Broek, Mehmet Aksit:

Dealing with imprecise quality factors in software design. 1-6 - Sebastian Kiebusch, Bogdan Franczyk, Andreas Speck:

A real time measure of software system families. 1-6 - Stefan Wagner

, Tilman Seifert:
Software quality economics for defect-detection techniques using failure prediction. 1-6 - Monvorath Phongpaibul, Barry W. Boehm:

Improving quality through software process improvement in Thailand: initial analysis. 1-6 - Miroslaw Staron, Ludwik Kuzniarz, Christian Thurn:

An empirical assessment of using stereotypes to improve reading techniques in software inspections. 1-7 - Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue:

ARIES: refactoring support tool for code clone. 1-4 - Zarrin Langari, Anne Banks Pidduck:

Quality, cleanroom and formal methods. 1-5 - Barry W. Boehm:

Value-based quality processes and results. 1-6 - Xiaoqing Frank Liu, Yan Sun, Gautam Kane, Yuji Kyoya, Kunio Noguchi:

QFD application in software process management and improvement based on CMM. 1-6 - Nachiappan Nagappan, Laurie A. Williams, Mladen A. Vouk, Jason A. Osborne:

Early estimation of software quality using in-process testing metrics: a controlled case study. 1-7 - Wolfgang Zuser, Stefan Heil, Thomas Grechenig:

Software quality development and assurance in RUP, MSF and XP: a comparative study. 1-6
- Uri Dekel:

Supporting distributed software design meetings: what can we learn from co-located meetings? 1-7 - S. Michelle Young, Helen M. Edwards, Sharon McDonald, J. Barrie Thompson:

Personality characteristics in an XP team: a repertory grid study. 1-7 - Ashraf Gaffar, Ahmed Seffah, John A. van der Poll:

HCI pattern semantics in XML: a pragmatic approach. 1-7 - Susan L. Spraragen:

The challenges in creating tools for improving the software development lifecycle. 1-3 - Georgine Beranek, Wolfgang Zuser, Thomas Grechenig:

Functional group roles in software engineering teams. 1-7 - Yvonne Dittrich, Kari Rönkkö, Olle Lindeberg, Jeanette Erickson, Christina Hansson:

Co-Operative Method Development revisited. 1-3 - Paul Grisham, Dewayne E. Perry:

Customer relationships and Extreme Programming. 1-6 - Helen Sharp, Hugh Robinson:

Some social factors of software engineering: the maverick, community and technical practices. 1-6 - Chintan Amrit

:
Coordination in software development: the problem of task allocation. 1-7 - Amy Law, Raylene Charron:

Effects of agile practices on social factors. 1-5 - Grace Tai:

A communication architecture from rapid prototyping. 1-3 - Carmen Zannier, Frank Maurer:

A qualitative empirical evaluation of design decisions. 1-7 - Akif Günes Koru, A. Ant Ozok, Anthony F. Norcio:

The effect of human memory organization on code reviews under different single and pair code reviewing scenarios. 1-3 - Eve MacGregor, Yvonne Hsieh, Philippe Kruchten

:
Cultural patterns in software process mishaps: incidents in global projects. 1-5 - Alistair G. Sutcliffe:

Applying small group theory to analysis and design of CSCW systems. 1-6 - Medha Umarji, Carolyn B. Seaman:

Predicting acceptance of Software Process Improvement. 1-6 - Carol A. Wellington, Thomas Briggs, C. Dudley Girard:

Examining team cohesion as an effect of software engineering methodology. 1-5 - Kevin C. Desouza, Yukika Awazu:

Managing radical software engineers: between order and chaos. 1-5
- Marcelo d'Amorim

, Klaus Havelund:
Event-based runtime verification of java programs. 1-7 - Niklas Pettersson:

Measuring precision for static and dynamic design pattern recognition as a function of coverage. 1-7 - Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock, Amie L. Souter:

Analyzing clusters of web application user sessions. 1-7 - Sergiy Boroday, Alexandre Petrenko, J. Singh, Hesham Hallal:

Dynamic analysis of java applications for multithreaded antipatterns. 1-7 - William G. J. Halfond, Alessandro Orso:

Combining static analysis and runtime monitoring to counter SQL-injection attacks. 1-7 - V. Vipindeep, Pankaj Jalote:

Efficient static analysis with path pruning using coverage data. 1-6 - Mayur Palankar, Jonathan E. Cook:

Merging traces of hardware-assisted data breakpoints. 1-7 - Robert W. Bowdidge:

Refactoring gcc using structure field access traces and concept analysis. 1-7 - Steven P. Reiss:

Dynamic detection and visualization of software phases. 1-6 - Jessica Sant, Amie L. Souter, Lloyd G. Greenwald:

An exploration of statistical models for automated test case generation. 1-7 - Alessandro Orso, Bryan Kennedy:

Selective capture and replay of program executions. 1-7
- Mordechai Ben-Menachem:

Review of "Software Endgames: Eliminating Defects, Controlling Change, and the Countdown to On-Time Delivery by Robert Galen", Dorset House, ISBN: 0-932633-62-5, 2005. 82-83 - Garry S. Marliss:

Review of "Systems Modeling & Requirements Specification Using ECSAM: An Analysis Method for Embedded and Computer-Based Systems by Jonah Z. Lavi and Joseph Kudish", Dorset House Publishing Co. Inc., 2005, ISBN 0-932633-45-5. 83-84 - Haoyang Che:

Review of "Agile Modeling: Effective Practice for eXtreme Programming and the Unified Process by Scott W. Ambler", John Wiley & Sons, Inc, 2002, 0-471-20282-7. 83
Volume 30, Number 5, September 2005
- Manuj Darbari

, Vipin Saxena:
Modeling biological systems: a unified approach. 1-4 - Leona F. Fass:

Some agent theory for the semantic web. 1-6 - Robert Schaefer:

The risks of large organizations in developing complex systems. 1-3 - Praful V. Bhansali:

Universal software safety standard. 1-4 - Richard Riehle:

Engineering on the surprise continuum: as applied to software practice. 1-6 - K. K. Aggarwal, Yogesh Singh, Pravin Chandra, Manimala Puri:

An expert committee model to estimate lines of code. 1-4 - G. Zayaraz, P. Thambidurai, Madhu Srinivasan, Paul Rodrigues:

Software quality assurance through COSMIC FFP. 1-5
- Stephan Diehl

, Ahmed E. Hassan, Richard C. Holt:
Report on MSR 2005: international workshop on mining software repositories. 1-3 - Lawrence Chung, Xavier Franch

, Neil A. M. Maiden:
Second international workshop on models and processes for the evaluation of off-the-shelf components (MPEC'05). 1-3 - Siddhartha R. Dalal, Ashish Jain, Jesse H. Poore:

Advances in model-based software testing (A-MOST). 1-3 - David Budgen, Barbara A. Kitchenham:

Realising evidence-based software engineering a report from the workshop held at ICSE 2005. 1-5 - Yves Bontemps, Alexander Egyed:

Scenarios and state machines: models, algorithms, and tools: a summary of the 4th workshop. 1-4
- Mark Doernhoefer:

Surfing the net for software engineering notes. 8-15 - Michel Wermelinger, Harald C. Gall:

Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, Lisbon, Portugal, September 5-9, 2005. ACM 2005, ISBN 1-59593-014-0 [contents]
Volume 30, Number 6, November 2005
- Joseph Feller, Brian Fitzgerald, Scott A. Hissam, Karim R. Lakhani, Walt Scacchi:

Open source application spaces: 5th workshop on open source software engineering. 1-2
- Nitin Kanaskar, Umit Topaloglu, Coskun Bayrak:

Globus security model for grid environment. 1-9
- Peter B. Henderson:

Software engineering education (SEEd). 3-4
- Mark Doernhoefer:

Surfing the net for software engineering notes. 5-13
- Peter G. Neumann:

Risks to the public. 14-25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














