Journal: Information \& Software Technology

Volume 44, Issue 9

507 -- 512Gerald P. Marquis. Application of traditional system design techniques to web site design
513 -- 539Sourav S. Bhowmick, Wee Keong Ng, Sanjay Kumar Madria, Ee-Peng Lim. Anatomy of the coupling query in a web warehouse
541 -- 549Lanfranco Lopriore. Access privilege management in protection systems
551 -- 563Wonjun Lee, Jaideep Srivastava, Hojung Cha. QoS-adaptive bandwidth scheduling in continuous media streaming

Volume 44, Issue 8

445 -- 450Hai Zhuge. A process matching approach for flexible workflow process reuse
451 -- 457Nabil M. Hewahi. A general rule structure
459 -- 472Yoshitomi Morisawa, Katsuro Inoue, Koji Torii. Architectural styles for distributed processing systems and practical selection method
473 -- 489Hong Zhu, Xudong He. A methodology of testing high-level Petri nets
491 -- 506Robert L. Glass, Iris Vessey, Venkataraman Ramesh. Research in software engineering: an analysis of the literature

Volume 44, Issue 7

395 -- 404Prabhaharan Kumarakulasingam, Hossein Saiedian. A framework for evaluating the effectiveness of real-time object-oriented models
405 -- 417Duk-Ho Chang, Jin Hyun Son, Myoung-Ho Kim. Critical path identification in the context of a workflow
419 -- 429Ju-Won Song, Kyu-Young Whang, Young-Koo Lee, Min-Jae Lee, Wook-Shin Han, Byung-Kwon Park. The clustering property of corner transformation for spatial database applications
431 -- 443Nashat Mansour, Rami Bahsoon. Reduction-based methods and metrics for selective regression testing

Volume 44, Issue 6

331 -- 341Kjetil Nørvåg. Signature caching in parallel object database systems
343 -- 350C. D. Lai, Min Xie, Kim-Leng Poh, Yuan-Shun Dai, P. Yang. A model for availability analysis of distributed software/hardware systems
351 -- 359Kevin McArthur, Hossein Saiedian, Mansour Zand. An evaluation of the impact of component-based architectures on software reusability
361 -- 380Jonathan Lee, Kuo-Hsun Hsu. Modeling software architectures with goals in virtual university environment
381 -- 391Mark J. Taylor, J. McWilliam, H. Forsyth, S. Wade. Methodologies and website development: a survey of practice
393 -- 0Jesús Manuel Almendros-Jiménez, Luis González-Jiménez. Erratum to Bases for the development of LAST: a formal method for business software requirements specification [Information and Software Technology, 44 (2002) 65-75]

Volume 44, Issue 5

277 -- 278Rachida Dssouli. Preface
279 -- 289Theodore Chiasson, Kirstie Hawkey, Michael McAllister, Jacob Slonim. An architecture in support of universal access to electronic commerce
291 -- 301Houssein Benameur, Brahim Chaib-draa, Peter G. Kropf. Multi-item auctions for automatic negotiation
303 -- 311Kassem Saleh. Documenting electronic commerce systems and software using the unified modeling language
313 -- 330Charles Helou, Rachida Dssouli, Teodor Gabriel Crainic. Performance testing of a negotiation platform

Volume 44, Issue 4

195 -- 196Akmal B. Chaudhri. Objects, XML and databases - Preface
197 -- 206Vassilis Papadimos, David Maier. Mutant Query Plans
207 -- 216Suad Alagic. Institutions: Integrating Objects, XML and Databases
217 -- 228Fabio Simeoni, Paolo Manghi, David Lievens, Richard C. H. Connor, Steve Neely. An Approach to High-Level Language Bindings to XML
229 -- 236Martin Kempa, Volker Linnemann. V-DOM and P-XML - Towards a Valid Programming of XML-Based Applications
237 -- 239David Buttler, Terence Critchlow. Using Meta-Data to Automatically Wrap BioInformatics Sources
241 -- 249Ronaldo dos Santos Mello, Silvana Castano, Carlos A. Heuser. A Method for the Unification of XML Schemata
251 -- 257Samuel Robert Collins, Shamkant B. Navathe, Leo Mark. XML Schema Mappings for Heterogeneous Database Access
259 -- 268Matt Holgate, Will Partain. ARK: An Object(ive) view of eXtensible Minimal Languages for System Configuration
269 -- 275Thomas Kudrass. Management of XML Documents Without Schema in Relational Database Systems

Volume 44, Issue 3

137 -- 150Girish Keshav Palshikar. Temporal fault trees
151 -- 159Craig Standing. Methodologies for developing Web applications
161 -- 173Jesús García Molina, María-José Ortín-Ibáñez, Ginés García-Mateos. Extending the ODMG standard with views
175 -- 184Janche Sang, Gregory J. Follen, Chan M. Kim, Isaac Lopez. Development of CORBA-based engineering applications from legacy Fortran programs
185 -- 194Colette Rolland. L E-Lyee: coupling L Ecritoire and LyeeALL

Volume 44, Issue 2

63 -- 0Michael Dyer, Martin J. Shepperd, Claes Wohlin. Editorial
65 -- 75Jesús Manuel Almendros-Jiménez, Luis González-Jiménez. Bases for the development of LAST: a formal method for business software requirements specification
77 -- 90Steven M. Schorling, David C. Rine. A methodology for designing toolkits for specification level verification of interval-constrained information systems requirements
91 -- 100Minghu Jiang, Xiaoyan Zhu, Georges G. E. Gielen, Elliott Drábek, Ying Xia, Gang Tan, Ta Bao. Braille to print translations for Chinese
101 -- 112Mark d Inverno, Paul Howells, Michael J. Hu, Michael Luck. Soft-link hypertext for information retrieval
113 -- 121Noritaka Kobayashi, Tatsuhiro Tsuchiya, Tohru Kikuno. Non-specification-based approaches to logic testing for software
123 -- 132G. B. Mund, Rajib Mall, S. Sarkar. An efficient dynamic program slicing technique

Volume 44, Issue 15

903 -- 910Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue. An information-leak analysis system based on program slicing
911 -- 922Abbas Heiat. Comparison of artificial neural network and regression models for estimating software development effort
923 -- 941Macario Polo, Juan Ángel Gómez, Mario Piattini, Francisco Ruiz. Generating three-tier applications from relational databases: a formal and practical approach

Volume 44, Issue 14

839 -- 840Tsong Yueh Chen, T. H. Tse, Yuen-Tak Yu. Special Issue for the Second Asia-Pacific Conference on Quality Software
841 -- 855Kai-Yuan Cai. Optimal software testing and adaptive software testing in the context of software cybernetics
857 -- 873Carsten Sinz, Thomas Lumpp, Jürgen M. Schneider, Wolfgang Küchlin. Detection of dynamic execution errors in IBM system automation s rule-based expert system
875 -- 889Xu Wang, Shing-Chi Cheung, Jun Wei. A CSP and Z combined modeling of document exchange processes in e-commerce protocols
891 -- 901Volker Gruhn, Lothar Schöpe. Software processes for the development of electronic commerce systems

Volume 44, Issue 13

717 -- 720Mark Harman, Malcolm Munro, Lin Hu, Xingyuan Zhang. Source code analysis and manipulation
721 -- 732Amie L. Souter, Lori L. Pollock. Characterization and automatic identification of type infeasible call chains
733 -- 741Zhenqiang Chen, Baowen Xu, Hongji Yang, Jianjun Zhao. Concurrent Ada dead statements detection
743 -- 754Paul Anderson, David Binkley, Genevieve Rosay, Tim Teitelbaum. Flow insensitive points-to sets
755 -- 765Giuliano Antoniol, Umberto Villano, Ettore Merlo, Massimiliano Di Penta. Analyzing cloning evolution in the Linux kernel
767 -- 782Michael L. van de Vanter. The documentary structure of source code
783 -- 795Sandro Bartolini, Cosimo Antonio Prete. A cache-aware program transformation technique suitable for embedded systems
797 -- 810Sibylle Schupp, Douglas Gregor, David R. Musser, Shin-Ming Liu. Semantic and behavioral library transformations
811 -- 825Filippo Ricca, Paolo Tonella, Ira D. Baxter. Web application transformations based on rewrite rules
827 -- 837James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider. Source transformation in software engineering using the TXL transformation system

Volume 44, Issue 12

671 -- 682Loe M. G. Feijs, Frans A. C. Meijs, Jean R. Moonen, Jos van Wamel. Automatic generation of MPEG test streams from high-level grammars
683 -- 702Thomas Thelin, Per Runeson. Confidence intervals for capture-recapture estimations in software inspections
703 -- 715Karl R. P. H. Leung, Hareton K. N. Leung. On the efficiency of domain-based COTS product selection method

Volume 44, Issue 11

617 -- 638Jan A. Bergstra. Molecule-oriented programming in Java
639 -- 648Patrick d Astous, Pierre N. Robillard. Empirical study of exchange patterns during software peer review meetings
649 -- 657Gail-Joon Ahn, Seng-Phil Hong, Michael E. Shin. Reconstructing a formal security model
659 -- 669Emilio Insfrán, Vicente Pelechano, Oscar Pastor. Conceptual Modeling in the eXtreme

Volume 44, Issue 10

565 -- 578Tarja Systä, Kai Koskimies, Erkki Mäkinen. Automated compression of state machines using UML statechart diagram notation
579 -- 592Paul Beynon-Davies, Steve Holmes. Design breakdowns, scenarios and rapid application development
593 -- 600Gabriele Manduchi, C. Taliercio. Measuring software evolution at a nuclear fusion experiment site: a test case for the applicability of OO and reuse metrics in software characterization
601 -- 616Louise Scott, Lucila Carvalho, D. Ross Jeffery, John D Ambra, Ulrike Becker-Kornstaedt. Understanding the use of an electronic process guide

Volume 44, Issue 1

1 -- 12M. Elizabeth C. Hull, P. S. Taylor, J. R. Paul Hanna, Richard J. Millar. Software development processes - an assessment
13 -- 24Barbara A. Kitchenham. The question of scale economies in software - why cannot researchers agree?
25 -- 40Ioannis Vakalis, F. Andritsos. The architecture of an information tool for de-mining: mine identification core module (MICM)
41 -- 51Joseph Fong. Translating object-oriented database transactions into relational transactions
53 -- 62J. Drew Procaccino, June M. Verner, Scott P. Overmyer. Case study: factors for early prediction of software development success