Journal: IEE Proceedings - Software

Volume 153, Issue 6

211 -- 218Andrew Stone, Peter Sawyer. Identifying tacit knowledge-based requirements
219 -- 229Hesham El-Sayed, M. Ahmed, Muhammad Jaseemuddin, Dorina C. Petriu. Framework for performance engineering of OSPF software
231 -- 240Joon-Sang Lee, Heung Seok Chae. Domain-specific language approach to modelling UI architecture of mobile telephony systems

Volume 153, Issue 5

183 -- 198Lucia Rapanotti, Jon G. Hall, Zhi Li 0017. Deriving specifications from requirements through problem reduction
199 -- 210Yajuan Li, Chuang Lin, Quan-Lin Li, Zhiguang Shan. Block-structured stochastic process algebra and its applications to queueing systems

Volume 153, Issue 4

137 -- 148Stephen Cook 0002, Rachel Harrison, Paul Wernick. Information system evolvability, feedback and pattern languages
149 -- 161Trevor Parsons, Adrian Mos, John Murphy. Non-intrusive end-to-end runtime path tracing for J2EE systems
163 -- 182Amnon H. Eden, Yoram Hirshfeld, Rick Kazman. Abstraction classes in software design

Volume 153, Issue 3

87 -- 101Oddur Benediktsson, Darren Dalcher, Helgi Thorbergsson. Comparison of software development life cycles: a multiproject experiment
102 -- 112Jing Sun 0002, Jin Song Dong, Stan Jarzabek, Hai H. Wang. Computer-aided dispatch system family architecture and verification: an integrated formal approach
113 -- 125Amnon H. Eden, Tom Mens. Measuring software flexibility
127 -- 136Toufik Taibi. Formalising design patterns composition

Volume 153, Issue 2

51 -- 60Alda Lopes Gançarski, Anne Doucet, Pedro Rangel Henriques. Attribute grammar-based interactive system to retrieve information from XML documents
61 -- 73Stan Jarzabek, Bo Yang 0011, S. Yoeun. Addressing quality attributes in domain analysis for product lines
75 -- 79Arijit Mukhopadhyay, Sunandan Chakraborty, Monojit Choudhury, Anirban Lahiri, Soumyajit Dey, Anupam Basu. Shruti: an embedded text-to-speech system for Indian languages
80 -- 86Ting-Wei Hou, Hsiang-Yang Chen, Ming-Hsiu Tsai. Three control flow obfuscation methods for Java software

Volume 153, Issue 1

1 -- 3Keith H. Bennett, Michael Rigby, David Budgen. Editorial: Role based access control - a solution with its own challenges
4 -- 6Lindsay F. Marshall. Role-based access control in TOBIAS and NESS
7 -- 15Jim J. Longstaff, Mike A. Lockyer, A. Howitt. Functionality and implementation issues for complex authorisation models
16 -- 23David M. Eyers, Jean Bacon, Ken Moody. OASIS role-based access control for electronic health records
24 -- 30Mark Turner, Pearl Brereton, David Budgen. Service-enabled access control for distributed data
31 -- 37Vladimir Stantchev 0001, Miroslaw Malek. Architectural translucency in service-oriented architectures
38 -- 48Sunilkumar S. Manvi, Pallapa Venkataram. Agent-based subsystem for multimedia communications