- Ulrich Freund:
Mulit-level system integration based on AUTOSAR. ICSE 2008: 581-582 - Serena Fritsch, Aline Senart, Douglas C. Schmidt, Siobhán Clarke:
Time-bounded adaptation for automotive system software. ICSE 2008: 571-580 - Mark Gabel, Lingxiao Jiang, Zhendong Su:
Scalable detection of semantic clones. ICSE 2008: 321-330 - Mark Gabel, Zhendong Su:
Symbolic mining of temporal specifications. ICSE 2008: 51-60 - Gerald C. Gannod, Janet E. Burge, Michael T. Helmick:
Using the inverted classroom to teach software engineering. ICSE 2008: 777-786 - Thomas Goldschmidt, Ralf H. Reussner, Jochen Winzen:
A case study evaluation of maintainability and performance of persistency techniques. ICSE 2008: 401-410 - John C. Grundy, John G. Hosking, Jun Huh, Karen Na-Liu Li:
Marama: an eclipse meta-toolset for generating multi-view environments. ICSE 2008: 819-822 - Lars Grunske:
Specification patterns for probabilistic quality properties. ICSE 2008: 31-40 - Jin Guo, King Chun Foo, Liliane Barbour, Ying Zou:
A business process explorer: recovering and visualizing e-commerce business processes. ICSE 2008: 871-874 - Tihomir Gvero, Milos Gligoric, Steven Lauterburg, Marcelo d'Amorim, Darko Marinov, Sarfraz Khurshid:
State extensions for java pathfinder. ICSE 2008: 863-866 - Christian Hammer, Julian Dolby, Mandana Vaziri, Frank Tip:
Dynamic detection of atomic-set-serializability violations. ICSE 2008: 231-240 - Kevin J. Hoffman, Patrick Eugster:
Towards reusable components with aspects: an empirical study on modularity and obliviousness. ICSE 2008: 91-100 - Sebastian Höhn, Jan Jürjens:
Rubacon: automated support for model-based compliance engineering. ICSE 2008: 875-878 - Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J. Sullivan:
Automatic modularity conformance checking. ICSE 2008: 411-420 - Jan Jürjens, Jörg Schreck, Peter Bartmann:
Model-based security analysis for mobile communications. ICSE 2008: 683-692 - Christian Kästner, Sven Apel, Martin Kuhlemann:
Granularity in software product lines. ICSE 2008: 311-320 - Hannes Kegel, Friedrich Steimann:
Systematically refactoring inheritance to delegation in java. ICSE 2008: 431-440 - Amy J. Ko, Brad A. Myers:
Debugging reinvented: asking and answering why and why not questions about program behavior. ICSE 2008: 301-310 - Birgit R. Krogstie:
Power through brokering: open source community participation in software engineering student projects. ICSE 2008: 791-800 - Michele Lanza, Amy L. Murphy, Romain Robbes, Mircea Lungu, Paolo Bonzini:
A teamwork-based approach to programming fundamentals with scheme, smalltalk & java. ICSE 2008: 787-790 - Steven Lauterburg, Ahmed Sobeih, Darko Marinov, Mahesh Viswanathan:
Incremental state-space exploration for programs with dynamically allocated data. ICSE 2008: 291-300 - Peng Li, Eric Wohlstadter:
Dynamic round-trip GUI maintenance. ICSE 2008: 851-854 - Barry Long, Jürgen Dingel, T. C. Nicholas Graham:
Experience applying the SPIN model checker to an industrial telecommunications system. ICSE 2008: 693-702 - Davide Lorenzoli, Leonardo Mariani, Mauro Pezzè:
Automatic generation of software behavioral models. ICSE 2008: 501-510 - Heng Lu, W. K. Chan, T. H. Tse:
Testing pervasive software in the presence of context inconsistency resolution services. ICSE 2008: 61-70 - Andrea De Lucia, Rocco Oliveto, Genoveffa Tortora:
Adams re-trace: traceability link recovery via latent semantic indexing. ICSE 2008: 839-842 - Jonathan Lung, Jorge Aranda, Steve M. Easterbrook, Gregory V. Wilson:
On the difficulty of replicating human subjects studies in software engineering. ICSE 2008: 191-200 - Muhammad Zubair Malik, Aman Pervaiz, Engin Uzuncaova, Sarfraz Khurshid:
Deryaft: a tool for generating representation invariants of structurally complex data. ICSE 2008: 859-862 - Andy Maule, Wolfgang Emmerich, David S. Rosenblum:
Impact analysis of database schema changes. ICSE 2008: 451-460 - Fergal McCaffery, Minna Pikkarainen, Ita Richardson:
Ahaa --agile, hybrid assessment method for automotive, safety critical smes. ICSE 2008: 551-560