Abstract is missing.
- Component Interface Documentation: What do we Need and Why do we Need it?David Lorge Parnas. 3-21
- Visualization Techniques for Program Comprehension - A Literature ReviewFrançois Lemieux, Martin Salois. 22-47
- Supporting Program Comprehension for Refactoring Operations with AnnotationsKlaus Meffert, Ilka Philippow. 48-67
- On specifying systems that connect to the physical worldTom Maibaum. 71-83
- A Framework to Support Non-fragile Agile Agent-Oriented Software DevelopmentAsif Qumer, Brian Henderson-Sellers. 84-100
- Information Processing and the Recovery of Argument Structure AsymmetriesAnna-Maria Di Sciullo. 101-115
- System Development Life-Cycle Support for Service-Oriented ApplicationsGeorge Feuerlicht. 116-126
- How to Create the Magic Wand? - Currently Implementable Formulation of the ProblemVictor Malyshkin. 127-132
- Transforming a Non-Software Company to a Software Company by Exploiting the LYEE MethodologyRikio Maruta, Noriko Taniguchi. 133-145
- Comparing Approaches in AORE through ISO/IEC 9126Luciana de Paiva Silva, Elisa Hatsue Moriya Huzita, Tania Fatima Calvi Tait. 146-156
- A Formal Approach for the Forensic Analysis of LogsAli Reza Arasteh, Mourad Debbabi, Assaad Sakha. 159-176
- Common Criteria Approach to J2ME CLDC Security RequirementsMourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua. 177-194
- Enforcing Security Policies on ProgramsHakima Ould-Slimane, Mohamed Mejri, Kamel Adi. 195-207
- Software Profiling for Deterministic Replay Debugging of User CodeSatish Narayanasamy, Cristiano Pereira, Brad Calder. 211-230
- Source Code Verification Tools for Software Security BugsFrédéric Michaud, Frédéric Painchaud. 231-241
- Theory on Software Diagnosis for Program Code ValidationFumio Negoro, Hamido Fujita. 245-271
- A Decision Procedure for Structured Cryptographic ProtocolsFrançois Gagnon, Mohamed Mejri. 272-286
- Unified OTP Cryptosystem with Authentication and SecrecyOsamu Atsumi, Shogo Hayashida, Rikio Maruta. 287-300
- A Calculus for Distributed Firewall Specification and VerificationLiviu Pene, Kamel Adi. 301-315
- A Formal Translation From an Imperative Language With Array to a Declarative LanguageDaniel Godbout, Béchir Ktari, Mohamed Mejri. 319-339
- Verification of the Lyee requirementOsamu Arai, Hamido Fujita. 340-361
- Enhancing and Parallelizing Legacy Software for Medical Imaging - A Case StudyJürgen Vörding, Maraike Schellmann, Sergei Gorlatch. 365-383
- Towards Autonomic Computing: Injecting Self-Organizing and Self-Healing Properties into Java ProgramsMichael J. Oudshoorn, M. Muztaba Fuad, Debzani Deb. 384-406
- A New Way of Automatic Design of Software (Simulating Human Intentional Activity)Zenya Koono, Hassan Abolhassani, Hui Chen. 407-420
- Towards Developing Adjustable Software: A Case Study with the Lyee ApproachSergei Gorlatch, Tae Kameda, Hamido Fujita, Michiru Tanaka, Yutaka Funyu, Osamu Arai. 423-438
- A Framework for Predicting Person-Effort on Requirements ChangesBee Bee Chua, June M. Verner, Darren Dalcher. 439-451
- FOOD: An Intermediate Model for Automated RefactoringNicolas Juillerat, Béat Hirsbrunner. 452-461
- Improving Software Test ProcessesTanja Toroi. 462-473