Abstract is missing.
- Practical language-independent detection of near-miss clonesJames R. Cordy, Thomas R. Dean, Nikita Synytskyy. 1-12 [doi]
- Structure choices for two-dimensional histogram constructionHang T. A. Pham, Kenneth C. Sevcik. 13-27 [doi]
- A reverse engineering tool for precise class diagramsYann-Gaël Guéhéneuc. 28-41 [doi]
- A survey of trace exploration tools and techniquesAbdelwahab Hamou-Lhadj, Timothy C. Lethbridge. 42-55 [doi]
- Program comprehension with dynamic recovery of code collaboration patterns and rolesLei Wu, Houari A. Sahraoui, Petko Valtchev. 56-67 [doi]
- Using trace analysis for improving performance in COTS systemsErik Putrycz. 68-80 [doi]
- Specifying and locating hierarchical patterns in event dataPing Xie, David Taylor. 81-95 [doi]
- Specifying framework constraints with FCLDaqing Hou, H. James Hoover, Piotr Rudnicki. 96-110 [doi]
- Effective test metrics for test strategy evolutionYanping Chen, Robert L. Probert, Kyle Robeson. 111-123 [doi]
- Identifying opportunities for automatic remote field cloningChristopher Barton, Peng Zhao, Robert Niewiadomski, José Nelson Amaral. 124-134 [doi]
- Sizing DB2 UDB:::®::: servers for business intelligence workloadsTed J. Wasserman, Patrick Martin, Haider Rizvi. 135-149 [doi]
- Building predictors from vertically distributed dataSabine M. McConnell, David B. Skillicorn. 150-162 [doi]
- Mobile services discovery and selection in the publish/subscribe paradigmAli M. Roumani, David B. Skillicorn. 163-173 [doi]
- Verifying protocols by model checking: a case study of the wireless application protocol and the model checker SPINYu-Tong He, Ryszard Janicki. 174-188 [doi]
- Evaluating the performance of user-space and kernel-space web serversAmol Shukla, Lily Li, Anand Subramanian, Paul A. S. Ward, Tim Brecht. 189-201 [doi]
- Consistent query answering under inclusion dependenciesLoreto Bravo, Leopoldo E. Bertossi. 202-216 [doi]
- Investigations in tree locking for compiled database applicationsHeng Yu, Grant E. Weddell. 217-231 [doi]
- An introduction to multilevel secure relational database management systemsWalid Rjaibi. 232-241 [doi]
- One XP experience: introducing agile (XP) software development into a culture that is willing but not readyFred Grossman, Joe Bergin, David Leip, Susan M. Merritt, Olly Gotel. 242-254 [doi]
- An experimental simulation of multi-site software developmentN. Sadat Shami, Nathan Bos, Zach Wright, Susannah Hoch, Kam Yung Kuan, Judith S. Olson, Gary M. Olson. 255-266 [doi]
- A quantitative analysis of the performance impact of specialized bytecodes in javaBen Stephenson, Wade Holst. 267-281 [doi]
- Information discovery within organizations using the Athens systemNikhil Vats, David B. Skillicorn. 282-292 [doi]
- Selecting the best web serviceJulian Day, Ralph Deters. 293-307 [doi]
- Effect of different network analysis strategies on search engine re-rankingBehnak Yaltaghian, Mark H. Chignell. 308-317 [doi]