Abstract is missing.
- Taming architectural evolutionAndré van der Hoek, Marija Mikic-Rakic, Roshanak Roshandel, Nenad Medvidovic. 1-10 [doi]
- An architectural style of product lines for distributed processing systems, and practical selection methodYoshitomi Morisawa, Koji Torii. 11-20 [doi]
- A graph based architectural (Re)configuration languageMichel Wermelinger, Antónia Lopes, José Luiz Fiadeiro. 21-32 [doi]
- An architecture for flexible, evolvable process-driven user-guidance environmentsTimothy J. Sliski, Matthew P. Billmers, Lori A. Clarke, Leon J. Osterweil. 33-43 [doi]
- Deadlock detection in distribution object systemsNima Kaveh, Wolfgang Emmerich. 44-51 [doi]
- Increasing client-side confidence in remote component implementationsRamesh Jagannathan, Paolo A. G. Sivilotti. 52-61 [doi]
- A micromodularity mechanismDaniel Jackson, Ilya Shlyakhter, Manu Sridharan. 62-73 [doi]
- Detecting implied scenarios in message sequence chart specificationsSebastián Uchitel, Jeff Kramer, Jeff Magee. 74-82 [doi]
- A formal approach to the assessment and improvement of terminological models used in information systems engineeringPeter Wendorff. 83-87 [doi]
- Using aspectC to improve the modularity of path-specific customization in operating system codeYvonne Coady, Gregor Kiczales, Michael J. Feeley, Greg Smolyn. 88-98 [doi]
- The structure and value of modularity in software designKevin J. Sullivan, William G. Griswold, Yuanfang Cai, Ben Hallen. 99-108 [doi]
- Interface automataLuca de Alfaro, Thomas A. Henzinger. 109-120 [doi]
- Automatic synthesis of deadlock free connectors for COM/DCOM applicationsPaola Inverardi, Massimo Tivoli. 121-131 [doi]
- A notation for problematic architecture interactionsLeigh A. Davis, Rose F. Gamble, Jamie Payton, Gerður Jónsdóttir, Dennis J. Underwood. 132-141 [doi]
- Using symbolic execution for verifying safety-critical systemsAlberto Coen-Porisini, Giovanni Denaro, Carlo Ghezzi, Mauro Pezzè. 142-151 [doi]
- Modular verification of collaboration-based software designsKathi Fisler, Shriram Krishnamurthi. 152-163 [doi]
- Automatic abstraction for model checking software systems with interrelated numeric constraintsYunja Choi, Sanjai Rayadurgam, Mats Per Erik Heimdahl. 164-174 [doi]
- An algebraic approach to file synchronizationNorman Ramsey, Elöd Csirmaz. 175-185 [doi]
- A methodology for specifying and analyzing consistency of object-oriented behavioral modelsGregor Engels, Jochen Malte Küster, Reiko Heckel, Luuk Groenewegen. 186-195 [doi]
- Combining UML and formal notations for modelling real-time systemsLuigi Lavazza, Gabriele Quaroni, Matteo Venturelli. 196-206 [doi]
- WREN---an environment for component-based developmentChris Lüer, David S. Rosenblum. 207-217 [doi]
- Engineering component-based net-centric systems for embedded applicationsJens H. Jahnke. 218-228 [doi]
- Behavioral contracts and behavioral subtypingRobby Findler, Mario Latendresse, Matthias Felleisen. 229-236 [doi]
- Analysis of the constraint solver in UNA based test data generationJon Edvardsson, Mariam Kamkar. 237-245 [doi]
- Pursuing failure: the distribution of program failures in a profile spaceWilliam Dickinson, David Leon, Andy Podgurski. 246-255 [doi]
- Coverage criteria for GUI testingAtif M. Memon, Mary Lou Soffa, Martha E. Pollack. 256-267 [doi]
- An empirical study on the utility of formal routines to transfer knowledge and experienceReidar Conradi, Tore Dybå. 268-276 [doi]
- An industrial case study of implementing software risk managementBernd G. Freimut, Susanne Hartkopf, Peter Kaiser, Jyrki Kontio, Werner Kobitzsch. 277-287 [doi]
- An empirical methodology for introducing software processesForrest Shull, Jeffrey Carver, Guilherme Travassos. 288-296 [doi]
- Component revision identification based on IDL/ADL component specificationPremek Brada. 297-298 [doi]
- Modelling and managing software federationsJacky Estublier, Hervé Verjus, Pierre-Yves Cunin. 299-300 [doi]
- STG: a tool for generating symbolic test programs and oracles from operational specificationsDuncan Clarke, Thierry Jéron, Vlad Rusu, Elena Zinovieva. 301-302 [doi]
- A formal data-model of the CORBA security serviceDavid A. Basin, Frank Rittinger, Luca Viganò. 303-304 [doi]
- York: programming software componentsVugranam C. Sreedhar. 305-306 [doi]
- 8th European workshop on software process technology: report and future directionsVincenzo Ambriola, R. Mark Greenwood. 307-308 [doi]
- Software architecture in a changing world: developing design strategies that anticipate changeRobert L. Nord, Daniel J. Paulish, Robert W. Schwanke, Dilip Soni. 309-310 [doi]
- Component technologies: Java Beans, COM, CORBA, RMI, EJB and the CORBA Component ModelWolfgang Emmerich, Nima Kaveh. 311-312 [doi]
- Aspect-oriented programmingGregor Kiczales, Erik Hilsdale. 313 [doi]
- Half day tutorial in methods of component-based software engineering essential concepts and classroom experienceKurt C. Wallnau, Scott A. Hissam, Robert C. Seacord. 314-315 [doi]
- Adapting XP to complex application domainsMartin Lippert, Stefan Roock. 316-317 [doi]
- Engineering of Web services with XML and XSLEngin Kirda. 318-319 [doi]
- EasyWinWin: a groupware-supported methodology for requirements negotiationPaul Grünbacher, Barry W. Boehm. 320-321 [doi]
- Requirements-based product line engineeringMike Mannion, Hermann Kaindl. 322-323 [doi]
- From use cases to code---rigorous software development with UMLAlbert Zündorf. 324-325 [doi]
- Peer-to-peer information systems: concepts and models, state-of-the-art, and future systemsKarl Aberer, Manfred Hauswirth. 326-327 [doi]
- Fundamental concepts for practical software architectureAlexander Ran. 328-329 [doi]