Journal: Information \& Software Technology

Volume 45, Issue 9

547 -- 558Sungchae Lim, Myoung-Ho Kim. Real-time disk scanning for timely retrieval of continuous media objects
559 -- 570Jameson Mbale, Xiaofei Xu, Shengchun Deng. Global intelligence benevolent builder (GIBB): a system automating integration of heterogeneous classical databases and web
571 -- 585Giedre Sabaliauskaite, Fumikazu Matsukawa, Shinji Kusumoto, Katsuro Inoue. Further investigations of reading techniques for object-oriented design inspection
587 -- 596Subhash Bhalla. Evolving a model of transaction management with embedded concurrency control for mobile database systems
597 -- 609Jiang Guo. Software reuse through re-engineering the legacy systems
611 -- 618Baomin Xu, Weimin Lian, Qiang Gao. Migration of active objects in proactive
619 -- 631Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo. An architecture for security-oriented perfective maintenance of legacy software

Volume 45, Issue 8

461 -- 467Gerald Post, Albert Kagan. Computer security and operating system updates
469 -- 477John Lim. A conceptual framework on the adoption of negotiation support systems
479 -- 497Incheon Paik, Tongwon Han, Dongik Oh, Sangho Ha, Donggue Park. An affiliated search system for an electronic commerce and software component architecture
499 -- 512G. B. Mund, Rajib Mall, S. Sarkar. Computation of intraprocedural dynamic program slices
513 -- 524Wesley S. Shu, C. Sophie Lee. Beyond productivity--productivity and the three types of efficiencies of information technology industries
525 -- 537Jane Coughlan, Mark Lycett, Robert D. Macredie. Communication issues in requirements elicitation: a content analysis of stakeholder experiences
539 -- 546Jitender Kumar Chhabra, K. K. Aggarwal, Yogesh Singh. Code and data spatial complexity: two important software understandability measures

Volume 45, Issue 7

371 -- 372Jonathan Lee. Introduction to software engineering with computational intelligence
373 -- 388Zhiwei Xu, Taghi M. Khoshgoftaar, Edward B. Allen. Application of fuzzy expert systems in assessing operational risk of software
389 -- 404Stephen G. MacDonell. Software source code sizing using fuzzy logic modeling
405 -- 417Marek Reformat, Witold Pedrycz, Nicolino J. Pizzi. Software quality analysis with the use of computational intelligence
419 -- 429Chris Matthews. A formal specification for a fuzzy expert system
431 -- 444Nicolás Marín, Juan Miguel Medina, Olga Pons, Daniel Sánchez, María Amparo Vila Miranda. Complex object comparison in a fuzzy context
445 -- 460Jonathan Lee, Yong-Yi Fanjiang. Modeling imprecise requirements with XML

Volume 45, Issue 6

293 -- 304David Ngo Chek Ling. An expert screen design and evaluation assistant that uses knowledge-based backtracking
305 -- 314Bixin Li. A technique to analyze information-flow in object-oriented programs
315 -- 334Yinyan Cao, Ee-Peng Lim, Wee Keong Ng. Data model for warehousing historical Web information
335 -- 355Joseph Fong, Hing Kwok Wong, Z. Cheng. Converting relational database into XML documents with DOM
357 -- 369Miguel A. Laguna, José M. Marqués, Francisco J. García. DocFlow: workflow based requirements elicitation

Volume 45, Issue 5

229 -- 239Ignacio Aedo, Paloma Díaz, Susana Montero. A methodological approach for hypermedia security modeling
241 -- 251Jongik Kim, Hyoung-Joo Kim. Efficient processing of regular path joins using PID
253 -- 267Qingping Lin, Chor Ping Low, Jim Mee Ng, Juan Bu, Xiaohua Liu. Multiuser collaborative work in virtual environment based CASE tool
269 -- 280Petros Kefalas, George Eleftherakis, Evangelos Kehris. Communicating X-machines: a practical approach for formal and modular specification of large systems
281 -- 287Neil McBride. A viewpoint on software engineering and information systems: integrating the disciplines
289 -- 291Christopher J. Atkinson, David E. Avison, David Wilson. Architectural images of computer-based information systems development: A response to A viewpoint of software engineering and information systems: integrating the disciplines

Volume 45, Issue 4

171 -- 194André Postma. A method for module architecture verification and its application on a large component-based system
195 -- 201Alexander Chatzigeorgiou. Performance and power evaluation of C++ object-oriented programming in embedded processors
203 -- 215Chang-Ryong Kim, Chin-Wan Chung. A multi-step approach for partial similarity search in large image data using histogram intersection
217 -- 227Chris Barry, Michael Lang. A comparison of traditional and multimedia information systems development practices

Volume 45, Issue 3

113 -- 122Scott Sigman, Xiaoqing Frank Liu. A computational argumentation methodology for capturing and analyzing design rationale arising from multiple perspectives
123 -- 136Magne Jørgensen, Dag I. K. Sjøberg. An effort prediction interval approach based on the empirical distribution of previous estimation accuracy
137 -- 148Zakaria Maamar. Design of a simulation environment based on software agents and the high level architecture
149 -- 156C. C. Chiang. The use of adapters to support interoperability of components for reusability
157 -- 170Toufik Taibi, David Ngo Chek Ling. Formal specification of design pattern combination using BPSL

Volume 45, Issue 2

61 -- 82Selmin Nurcan, Colette Rolland. A multi-method for defining the organizational change
83 -- 93Ying Liang. From use cases to classes: a way of building object model with UML
95 -- 108J. Lu, M. Scaramuzza. Building XML application in rich detailed genealogical information
109 -- 112Olumide Owolabi. Empirical studies of some hashing functions

Volume 45, Issue 15

1011 -- 1013Stewart Green, Ian Beeson, Jin Sa. Special issue on modelling organisational processes
1015 -- 1019Ann Lindsay, Denise Downs, Ken Lunn. Business processes--attempts to find a definition
1021 -- 1029Bob Snowdon, Peter Kawalek. Active meta-process models: a conceptual exposition
1031 -- 1043Chris Wallace. Using Alloy in process modelling
1045 -- 1052Ken Lunn, Andrew Sixsmith, Ann Lindsay, Marja Vaarama. Traceability in requirements through process modelling, applied to social care applications
1053 -- 1060Mohammed Odeh, Richard Kamm. Bridging the gap between business models and system models
1061 -- 1063Giacomo Piccinelli, Anthony Finkelstein, Tommaso Costa. Flexible B2B processes: the answer is in the nodes
1065 -- 1069Howard Smith. Business process management--the third wave: business process modelling language (bpml) and its pi-calculus foundations
1071 -- 1074Martyn A. Ould. Preconditions for putting processes back in the hands of their actors

Volume 45, Issue 14

941 -- 943Camille Salinesi, Björn Regnell. Eighth International Workshop on Requirements Engineering--Foundation for Software Quality (REFSQ 02)
945 -- 954Aybüke Aurum, Claes Wohlin. The fundamental nature of requirements engineering activities as a decision-making process
955 -- 965Erik Kamsties, Antje von Knethen, Ralf Reussner. A controlled experiment to evaluate how styles affect the understandability of requirements specifications
967 -- 977Annie I. Antón, Julia Brande Earp, Ryan A. Carter. Precluding incongruous behavior by aligning software requirements with security and privacy policies
979 -- 991Robert Crook, Darrel C. Ince, Bashar Nuseibeh. Modelling access policies using roles in requirements engineering
993 -- 1009Didar Zowghi, Vincenzo Gervasi. On the interplay between consistency, completeness, and correctness in requirements evolution

Volume 45, Issue 13

889 -- 898S. K. Lee, C. S. Hwang. Architecture layers and engineering approach for agent-based system
899 -- 909Dawn G. Gregg. XDependency: maintaining relationships between XML data resources
911 -- 928Paulo Barthelmess. Collaboration and coordination in process-centered software development environments: a review of the literature
929 -- 939Jinmin Hu, Paul W. P. J. Grefen. Conceptual framework and architecture for service mediating workflow management

Volume 45, Issue 12

791 -- 792Rachida Dssouli, Ferhat Khendek. Preface
793 -- 803Robert M. Hierons, Hasan Ural. UIO sequence based checking sequences for distributed test architectures
805 -- 814Claude Jard. Synthesis of distributed testers from true-concurrency models of reactive systems
815 -- 835M. Ümit Uyar, Mariusz A. Fecko, Ali Y. Duale, Paul D. Amer, Adarshpal S. Sethi. Experience in developing and testing network protocol software using FDTs
837 -- 852Ana R. Cavalli, Caroline Gervy, Svetlana Prokopenko. New approaches for passive testing using an Extended Finite State Machine specification
853 -- 864Ahmed Khoumsi. Testing distributed real-time systems in the presence of inaccurate clock synchronizations
865 -- 871Dong Wang, Ruibing Hao, David Lee. Fault detection in Rule-based Software systems
873 -- 888Purnendu Sinha, Da Qi Ren. Formal verification of dependable distributed protocols

Volume 45, Issue 11

699 -- 0Rachida Dssouli, Ferhat Khendek. Preface
701 -- 714Loïc Hélouët. Distributed system requirement modeling with message sequence charts: the case of the RMTP2 protocol
715 -- 725Aziz Salah, Rachida Dssouli, Guy Lapalme. Implicit integration of scenarios into a reduced timed automaton
727 -- 741Reinhard Gotzhein. Consolidating and applying the SDL-pattern approach: a detailed case study
743 -- 761Vangalur S. Alagar, Ramesh Achuthan, M. Haydar, D. Muthiayen, Olga Ormandjieva, Mao Zheng. A rigorous approach for constructing self-evolving real-time reactive systems
763 -- 777Robert L. Probert, Yanping Chen, Behrad Ghazizadeh, D. Paul Sims, Maurus Cappa. Formal verification and validation for e-commerce: theory and best practices
779 -- 790John Mullins, Stéphane Lafrance. Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols

Volume 45, Issue 10

633 -- 649Hafedh Mili, Estelle Ah-Ki, Robert Godin, Hamid Mcheick. An experiment in software component retrieval
651 -- 662Nasir Al-Darwish. PageGen: an effective scheme for dynamic generation of web pages
663 -- 669Xudong He, William C. Chu, Hongji Yang. A new approach to verify rule-based systems using petri net
671 -- 680Alexander Chatzigeorgiou, G. Antoniadis. Efficient management of inspections in software development projects
681 -- 689Jan A. Bergstra, Pum Walters. Operator programs and operator processes
691 -- 698Maozhen Li, Man Qi. MAPBOT: a Web based map information retrieval system

Volume 45, Issue 1

1 -- 9Tsong Yueh Chen, T. H. Tse, Zhiquan Zhou. Fault-based testing without the need of oracles
11 -- 22Chiyoung Seo, Sang-Won Lee, Hyoung-Joo Kim. An efficient inverted index technique for XML documents using RDBMS
23 -- 34Alexandros Nanopoulos, Maciej Zakrzewicz, Tadeusz Morzy, Yannis Manolopoulos. Efficient storage and querying of sequential patterns in database systems
35 -- 41Huan Zhou, Yulin Feng, Jing Li. Probability graph based data hoarding for mobile environment
43 -- 49Hikaru Fujiwara, Shinji Kusumoto, Katsuro Inoue, Ayane Suzuki, Toshifusa Ootsubo, Katsuhiko Yuura. Case studies to evaluate a domain specific application framework based on complexity and functionality metrics
51 -- 60Ioannis Stamelos, Lefteris Angelis, P. Dimou, E. Sakellaris. On the use of Bayesian belief networks for the prediction of software productivity