| 81 | -- | 98 | Yoohoon Kang, Chanjin Park, Chisu Wu. Reverse-engineering 1-n associations from Java bytecode using alias analysis |
| 99 | -- | 107 | Tiantian Wang, Xiaohong Su, Yuying Wang, Peijun Ma. Semantic similarity-based grading of student programs |
| 108 | -- | 121 | Alejandra Cechich, Mario Piattini. Early detection of COTS component functional suitability |
| 122 | -- | 141 | Andreas S. Andreou, Marios Tziakouris. A quality framework for developing and evaluating original software components |
| 142 | -- | 157 | Khaled Alghathbar. Validating the enforcement of access control policies and separation of duty principle in requirement engineering |
| 158 | -- | 171 | Philip Samuel, Rajib Mall, Pratyush Kanth. Automatic test case generation from UML communication diagrams |
| 172 | -- | 180 | Z. M. Ma, Li Yan. Generalization of strategies for fuzzy query translation in classical relational databases |
| 181 | -- | 193 | June M. Verner, William M. Evanco, Narciso Cerpa. State of the practice: An exploratory analysis of schedule estimation and software project success prediction |
| 194 | -- | 208 | Faheem Ahmed, Luiz Fernando Capretz. Managing the business of software product line: An empirical investigation of key business factors |