Abstract is missing.
- Computer modelling and natural phenomenaGiuseppe Longo. 1-5 [doi]
- Understanding process and the quest for deeper questions in software engineering researchLeon J. Osterweil. 6-14 [doi]
- Assessing software projects: tools for business ownersAri Jaaksi. 15-18 [doi]
- Behaviour model elaboration using partial labelled transition systemsSebastián Uchitel, Jeff Kramer, Jeff Magee. 19-27 [doi]
- A strategy for efficiently verifying requirementsRalph D. Jeffords, Constance L. Heitmeyer. 28-37 [doi]
- Towards the compositional verification of real-time UML designsHolger Giese, Matthias Tichy, Sven Burmester, Stephan Flake. 38-47 [doi]
- Refinements and multi-dimensional separation of concernsDon S. Batory, Jia Liu, Jacob Neal Sarvela. 48-57 [doi]
- Validating UML models against architectural profilesPetri Selonen, Jianli Xu. 58-67 [doi]
- Modeling and validation of service-oriented architectures: application vs. styleLuciano Baresi, Reiko Heckel, Sebastian Thöne, Dániel Varró. 68-77 [doi]
- Evaluating and improving the automatic analysis of implicit invocation systemsJeremy S. Bradbury, Jürgen Dingel. 78-87 [doi]
- Designing and implementing a family of intrusion detection systemsGiovanni Vigna, Fredrik Valeur, Richard A. Kemmerer. 88-97 [doi]
- A family of test adequacy criteria for database-driven applicationsGregory M. Kapfhammer, Mary Lou Soffa. 98-107 [doi]
- Consistency techniques for interprocedural test data generationNguyen Tran Sy, Yves Deville. 108-117 [doi]
- Regression testing of GUIsAtif M. Memon, Mary Lou Soffa. 118-127 [doi]
- Leveraging field data for impact analysis and regression testingAlessandro Orso, Taweesup Apiwattanapong, Mary Jean Harrold. 128-137 [doi]
- Formulation and preliminary test of an empirical theory of coordination in software engineeringJames D. Herbsleb, Audris Mockus. 138-137 [doi]
- Factors of software process improvement success in small and large organizations: an empirical study in the scandinavian contextTore Dybå. 148-157 [doi]
- Monitoring the software test process using statistical process control: a logarithmic approachJoão W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur. 158-167 [doi]
- On the economic evaluation of XP projectsMatthias M. Müller, Frank Padberg. 168-177 [doi]
- Context-sensitive slicing of concurrent programsJens Krinke. 178-187 [doi]
- Adapting side effects analysis for modular program model checkingOksana Tkachuk, Matthew B. Dwyer. 188-197 [doi]
- Deadline analysis of interrupt-driven softwareDennis Brylow, Jens Palsberg. 198-207 [doi]
- Ontology support for web service processesClaus Pahl, Michael Casey. 208-216 [doi]
- Reverse engineering framework reuse interfacesJukka Viljamaa. 217-226 [doi]
- Differences between versions of UML diagramsDirk Ohst, Michael Welle, Udo Kelter. 227-236 [doi]
- Eliminating redundancies with a composition with adaptation meta-programming techniqueStan Jarzabek, Shubiao Li. 237-246 [doi]
- Towards scalable compositional analysis by refactoring design modelsYung-Pin Cheng, Michal Young, Che-Ling Huang, Chia-Yi Pan. 247-256 [doi]
- Fluent model checking for event-based systemsDimitra Giannakopoulou, Jeff Magee. 257-266 [doi]
- Bogor: an extensible and highly-modular software model checking frameworkRobby, Matthew B. Dwyer, John Hatcliff. 267-276 [doi]
- Verified systems by composition from verified componentsFei Xie, James C. Browne. 277-286 [doi]
- Predicting problems caused by component upgradesStephen McCamant, Michael D. Ernst. 287-296 [doi]
- ::::Eos::::: instance-level aspects for integrated system designHridesh Rajan, Kevin J. Sullivan. 291-306 [doi]
- Protecting C programs from attacks via invalid pointer dereferencesSuan Hsi Yong, Susan Horwitz. 307-316 [doi]
- Tracking pointers with path and context sensitivity for bug detection in C programsV. Benjamin Livshits, Monica S. Lam. 317-326 [doi]
- ARCHER: using symbolic, path-sensitive analysis to detect memory access errorsYichen Xie, Andy Chou, Dawson R. Engler. 327-336 [doi]
- Runtime safety analysis of multithreaded programsKoushik Sen, Grigore Rosu, Gul Agha. 337-346 [doi]
- Composing architectural styles from architectural primitivesNikunj R. Mehta, Nenad Medvidovic. 347-350 [doi]
- Towards an engineering tool for implementing reusable distributed control systemsKleanthis Thramboulidis. 351-354 [doi]
- Use case-based testing of product linesAntonia Bertolino, Stefania Gnesi. 355-358 [doi]
- EFFICIENT: a tool set for supporting the modelling and validation of ebXMLRik Eshuis, Pierre Brimont, Eric Dubois, Bertrand Grégoire, Sophie Ramel. 359-362 [doi]
- A simulation-based approach to software performance modelingSimonetta Balsamo, Moreno Marzolla. 363-366 [doi]
- Making sense of runtime architecture for mobile phone softwareAlexander Ran, Raimondas Lencevicius. 367-370 [doi]
- Policy-enforced linking of untrusted componentsEunyoung Lee, Andrew W. Appel. 371-374 [doi]
- A fault-tolerant software architecture for COTS-based software systemsPaulo Asterio de Castro Guerra, Cecília M. F. Rubira, Alexander B. Romanovsky, Rogério de Lemos. 375-378 [doi]
- Gravity: supporting dynamically available services in client-side applicationsRichard S. Hall, Humberto Cervantes. 379-382 [doi]