Abstract is missing.
- The story of moose: an agile reengineering environmentOscar Nierstrasz, Stéphane Ducasse, Tudor Gîrba. 1-10 [doi]
- Automatic generation of suggestions for program investigationMartin P. Robillard. 11-20 [doi]
- ASTEC: a new approach to refactoring CBill McCloskey, Eric A. Brewer. 21-30 [doi]
- Permissive interfacesThomas A. Henzinger, Ranjit Jhala, Rupak Majumdar. 31-40 [doi]
- Reasoning about confidentiality at requirements engineering timeRenaud De Landtsheer, Axel van Lamsweerde. 41-49 [doi]
- Detecting and resolving semantic pathologies in UML sequence diagramsPaul Baker, Paul Bristow, Clive Jervis, David J. King, Robert Thomson, Bill Mitchell, Simon Burton. 50-59 [doi]
- A case study on value-based requirements tracingMatthias Heindl, Stefan Biffl. 60-69 [doi]
- Fluent temporal logic for discrete-time event-based modelsEmmanuel Letier, Jeff Kramer, Jeff Magee, Sebastián Uchitel. 70-79 [doi]
- Towards a unified formal model for supporting mechanisms of dynamic component updateJunrong Shen, Xi Sun, Gang Huang, Wenpin Jiao, Yanchun Sun, Hong Mei. 80-89 [doi]
- Arithmetic program pathsManos Renieris, Shashank Ramaprasad, Steven P. Reiss. 90-98 [doi]
- Moose: an agile reengineering environmentStéphane Ducasse, Tudor Gîrba, Oscar Nierstrasz. 99-102 [doi]
- Dynamically discovering architectures with DiscoTectBradley R. Schmerl, David Garlan, Hong Yan. 103-106 [doi]
- HATARI: raising risk awarenessJacek Sliwerski, Thomas Zimmermann, Andreas Zeller. 107-110 [doi]
- CHARMY: an extensible tool for architectural analysisPaola Inverardi, Henry Muccini, Patrizio Pelliccione. 111-114 [doi]
- Context- and path-sensitive memory leak detectionYichen Xie, Alexander Aiken. 115-125 [doi]
- Performance data collection using a hybrid approachEdu Metz, Raimondas Lencevicius, Teofilo F. Gonzalez. 126-135 [doi]
- Summarizing application performance from a components perspectiveKavitha Srinivas, Harini Srinivasan. 136-145 [doi]
- Applying classification techniques to remotely-collected program execution dataMurali Haran, Alan F. Karr, Alessandro Orso, Adam A. Porter, Ashish P. Sanil. 146-155 [doi]
- Detecting higher-level similarity patterns in programsHamid Abdul Basit, Stan Jarzabek. 156-165 [doi]
- Information hiding interfaces for aspect-oriented designKevin J. Sullivan, William G. Griswold, Yuanyuan Song, Yuanfang Cai, Macneil Shonle, Nishit Tewari, Hridesh Rajan. 166-175 [doi]
- Innovations in pervasive computingAntónio S. Câmara. 176 [doi]
- Facilitating software evolution research with kenyonJennifer Bevan, Jim Whitehead, Sunghun Kim, Michael W. Godfrey. 177-186 [doi]
- An empirical study of code clone genealogiesMiryung Kim, Vibha Sazawal, David Notkin, Gail C. Murphy. 187-196 [doi]
- Matching execution histories of program versionsXiangyu Zhang, Rajiv Gupta. 197-206 [doi]
- Relational analysis of algebraic datatypesViktor Kuncak, Daniel Jackson. 207-216 [doi]
- Lightweight object specification with typestatesKevin Bierhoff, Jonathan Aldrich. 217-226 [doi]
- Joining dataflow with predicatesJeffrey Fischer, Ranjit Jhala, Rupak Majumdar. 227-236 [doi]
- Strathcona example recommendation toolReid Holmes, Robert J. Walker, Gail C. Murphy. 237-240 [doi]
- Parameterized unit tests with unit meisterNikolai Tillmann, Wolfram Schulte. 241-244 [doi]
- KenyaEclipse: learning to program in eclipseRobert Chatley, Thomas Timbul. 245-248 [doi]
- Visual tool for generative programmingPavel Grigorenko, Ando Saabas, Enn Tyugu. 249-252 [doi]
- Parameterized unit testsNikolai Tillmann, Wolfram Schulte. 253-262 [doi]
- CUTE: a concolic unit testing engine for CKoushik Sen, Darko Marinov, Gul Agha. 263-272 [doi]
- Online testing with model programsMargus Veanes, Colin Campbell, Wolfram Schulte, Nikolai Tillmann. 273-282 [doi]
- Engineering distributed software: a structural disciplineJeff Kramer, Jeff Magee. 283-285 [doi]
- SOBER: statistical model-based bug localizationChao Liu, Xifeng Yan, Long Fei, Jiawei Han, Samuel P. Midkiff. 286-295 [doi]
- DynaMine: finding common error patterns by mining software revision historiesV. Benjamin Livshits, Thomas Zimmermann. 296-305 [doi]
- PR-Miner: automatically extracting implicit programming rules and detecting violations in large software codeZhenmin Li, Yuanyuan Zhou. 306-315 [doi]
- Reuse and variability in large software applicationsJacky Estublier, Germán Vega. 316-325 [doi]
- Industrial experience with building a web portal product line using a lightweight, reactive approachUlf Pettersson, Stan Jarzabek. 326-335 [doi]
- Inconsistency detection and resolution for context-aware middleware supportChang Xu, Shing-Chi Cheung. 336-345 [doi]
- Anchoring and adjustment in software estimationJorge Aranda, Steve M. Easterbrook. 346-355 [doi]
- Combining self-reported and automatic data to improve programming effort measurementLorin Hochstein, Victor R. Basili, Marvin V. Zelkowitz, Jeffrey K. Hollingsworth, Jeffrey Carver. 356-365 [doi]
- Quantitative assessment of UML dynamic modelsAline Lúcia Baroni. 366-369 [doi]
- Reengineering towards components using Reconn-exion Andrew Le Gear, Jim Buckley. 370-373 [doi]
- UPEX: user participation by exampleIvonne Erfurth, Wilhelm Rossak. 374-376 [doi]
- A refinement calculus for software components and architecturesMarco Antonio Barbosa. 377-380 [doi]
- Utilizing verification and validation certificates to estimate software defect densityMark Sherriff. 381-384 [doi]
- Surveying the factors that influence maintainability: research designWiebe Hordijk, Roel Wieringa. 385-388 [doi]