Journal: Information \& Software Technology

Volume 51, Issue 9

1291 -- 1307Joaquín Nicolás, José Ambrosio Toval Álvarez. On the generation of requirements specifications from software engineering models: A systematic literature review
1308 -- 1318Ing-Long Wu, Ching-Yi Hung. A strategy-based process for effectively determining system requirements in eCRM development
1319 -- 1326Mohammad Alshayeb. Empirical investigation of refactoring effect on software quality
1327 -- 1337Eduardo Miranda, Pierre Bourque, Alain Abran. Sizing user stories using paired comparisons
1338 -- 1350Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Han. A method for detecting the theft of Java programs through analysis of the control flow information
1351 -- 1364Tihana Galinac. Empirical evaluation of selected best practices in implementation of software process improvement
1365 -- 1376Danielle Azar, Haidar M. Harmanani, Rita Korkmaz. A hybrid heuristic approach to optimize rule-based software quality estimation models

Volume 51, Issue 8

1187 -- 1216Petia Wohed, Nick Russell, Arthur H. M. ter Hofstede, Birger Andersson, Wil M. P. van der Aalst. Patterns-based evaluation of open source BPM systems: The cases of jBPM, OpenWFE, and Enhydra Shark
1217 -- 1230Iván García-Magariño, Rubén Fuentes-Fernández, Jorge J. Gómez-Sanz. Guideline for the definition of EMF metamodels using an Entity-Relationship approach
1231 -- 1243Mahmood Niazi, Muhammad Ali Babar. Identifying high perceived value practices of CMMI level 2: An empirical study
1244 -- 1260Georgia M. Kapitsaki, Dimitrios A. Kateros, George N. Prezerakos, Iakovos S. Venieris. Model-driven development of composite context-aware web applications
1261 -- 1274Matjaz B. Juric, Ana Sasa, Ivan Rozman. WS-BPEL Extensions for Versioning
1275 -- 1289Iris Reinhartz-Berger, Arnon Sturm. Utilizing domain models for application design and validation

Volume 51, Issue 7

1087 -- 1109Gursimran Singh Walia, Jeffrey C. Carver. A systematic literature review to identify and classify software requirement errors
1110 -- 1122Jo Erskine Hannay, Tore Dybå, Erik Arisholm, Dag I. K. Sjøberg. The effectiveness of pair programming: A meta-analysis
1123 -- 1130Robert M. Hierons. Using status messages in the distributed test architecture
1131 -- 1139Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha, Doo-Hwan Bae. A data flow-based structural testing technique for FBD programs
1140 -- 1149You-min Ha, Sanghyun Park, Sang-Wook Kim, Jung-Im Won, Jeehee Yoon. A stock recommendation system exploiting rule discovery in stock databases
1150 -- 1151Seok-Won Lee, Mattia Monga. Special section on Software Engineering for Secure Systems (SESS 07)
1152 -- 1171Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen. On the secure software development process: CLASP, SDL and Touchpoints compared
1172 -- 1185Dries Vanoverberghe, Frank Piessens. Security enforcement aware software development

Volume 51, Issue 6

957 -- 976Wasif Afzal, Richard Torkar, Robert Feldt. A systematic review of search-based testing for non-functional system properties
977 -- 992José Jacobo Zubcoff, Jesús Pardillo, Juan Trujillo. A UML profile for the conceptual modelling of data-mining with time-series in data warehouses
993 -- 1009Qingfeng He, Annie I. Antón. Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
1010 -- 1020Moe Thandar Wynn, H. M. W. (Eric) Verbeek, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, David Edmond. Reduction rules for YAWL workflows with cancellation regions and OR-joins
1021 -- 1032Anna Perini, Filippo Ricca, Angelo Susi. Tool-supported requirements prioritization: Comparing the AHP and CBRank methods
1033 -- 1051Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini. An engineering process for developing Secure Data Warehouses
1052 -- 1065Mercedes Amor, Lidia Fuentes. Malaca: A component and aspect-oriented agent architecture
1066 -- 1080Stig Larsson, Petri Myllyperkiö, Fredrik Ekdahl, Ivica Crnkovic. Software product integration: A case study-based synthesis of reference models
1081 -- 1085Jacques Wainer, Claudia Galindo Novoa Barsottini, Danilo Lacerda, Leandro Rodrigues Magalhães de Marco. Empirical evaluation in Computer Science research published by ACM

Volume 51, Issue 5

809 -- 814Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia. Model-Driven Development for secure information systems
815 -- 831David A. Basin, Manuel Clavel, Jürgen Doser, Marina Egea. Automated analysis of security-design models
832 -- 845Ghassan Beydoun, Graham Low, Haralambos Mouratidis, Brian Henderson-Sellers. A security-aware metamodel for multi-agent systems (MAS)
846 -- 864Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee, Siv Hilde Houmb. An aspect-oriented methodology for designing secure applications
865 -- 875Zhi Jian Zhu, Mohammad Zulkernine. A model-based aspect-oriented framework for building intrusion-aware software systems
876 -- 893Howard Chivers, Richard F. Paige. XRound: A reversible template language and its application in model-based security analysis
894 -- 915Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca. Model-Based Development of firewall rule sets: Diagnosing model inconsistencies
916 -- 932Andreas L. Opdahl, Guttorm Sindre. Experimental comparison of attack trees and misuse cases for security threat identification
933 -- 955Liang Xiao 0002. An adaptive security model using agent-oriented MDA

Volume 51, Issue 4

679 -- 690Jun-Wei Lin, Chin-Yu Huang. Analysis of test suite reduction with enhanced tie-breaking techniques
691 -- 707Hyun-Goo Kang, Taisook Han. A bottom-up pointer analysis using the update history
708 -- 720Raquel Blanco, Javier Tuya, Belarmino Adenso-Díaz. Automated test data generation using a scatter search approach
721 -- 737Miroslaw Staron, Wilhelm Meding, Christer Nilsson. A framework for developing measurement systems and its industrial evaluation
738 -- 748Stanislav Berlin, Tzvi Raz, Chanan Glezer, Moshe Zviran. Comparison of estimation methods of cost and duration in IT projects
749 -- 768Pedro Valderas, Vicente Pelechano. Introducing requirements traceability support in model-driven development of web applications
769 -- 784Esther Guerra, Juan de Lara, Alessio Malizia, Paloma Díaz. Supporting user-oriented analysis for multi-view domain-specific visual languages
785 -- 798Helen M. Edwards, Sharon McDonald, S. Michelle Young. The repertory grid technique: Its place in empirical software engineering research
799 -- 808R. Krishnamoorthi, S. A. Sahaaya Arul Mary. Factor oriented requirement coverage based system test case prioritization of new and regression test cases

Volume 51, Issue 3

555 -- 563Anil S. Jadhav, Rajendra M. Sonar. Evaluating and selecting software packages: A review
564 -- 580Pablo Moreno-Ger, Rubén Fuentes-Fernández, José Luis Sierra-Rodríguez, Baltasar Fernández-Manjón. Model-checking for adventure videogames
581 -- 588Douwe Postmus, Jacob Wijngaard, Hans Wortmann. An economic model to compare the profitability of pay-per-use and fixed-fee licensing
589 -- 598Stephen Thomas, Laurie Williams, Tao Xie. On automated prepared statement generation to remove SQL injection vulnerabilities
599 -- 609Behshid Behkamal, Mohsen Kahani, Mohammad Kazem Akbari. Customizing ISO 9126 quality model for evaluation of B2B applications
610 -- 626Kristian Bisgaard Lassen, Wil M. P. van der Aalst. Complexity metrics for Workflow nets
627 -- 639Silvia Teresita Acuña, Marta Gómez, Natalia Juristo Juzgado. How do personality, team processes and task characteristics relate to job satisfaction and software quality?
640 -- 654Moataz A. Ahmed, Zeeshan Muzaffar. Handling imprecision and uncertainty in software development effort prediction: A type-2 fuzzy logic based framework
655 -- 662LeMai Nguyen, Graeme G. Shanks. A framework for understanding creativity in requirements engineering
663 -- 677Katja Karhu, Ossi Taipale, Kari Smolander. Investigating the relationship between schedules and knowledge transfer in software testing

Volume 51, Issue 2

235 -- 257Panagiotis Katsaros. A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach
258 -- 269Michiel Koning, Chang-ai Sun, Marco Sinnema, Paris Avgeriou. VxBPEL: Supporting variability for Web services in BPEL
270 -- 283Filippo Ricca, Marco Torchiano, Massimiliano Di Penta, Mariano Ceccato, Paolo Tonella. Using acceptance tests as a support for clarifying requirements: A series of experiments
284 -- 292Ping Sun, Changjun Jiang. Analysis of workflow dynamic changes based on Petri net
293 -- 305Alf Inge Wang, Erik Arisholm. The effect of task order on the maintainability of object-oriented software
306 -- 324Amparo Navasa Martínez, Miguel Ángel Pérez Toledano, Juan Manuel Murillo. An ADL dealing with aspects at software architecture stage
325 -- 336Costas Vassilakis, Giorgos Lepouras, Akrivi Katifori. A heuristics-based approach to reverse engineering of electronic services
337 -- 350Paolo Guarda, Nicola Zannone. Towards the development of privacy-aware systems
351 -- 361Ho-Won Jung, Dennis Goldenson. Evaluating the relationship between process improvement and schedule deviation in software maintenance
362 -- 374Abdelghani Benharref, Rachida Dssouli, Mohamed Adel Serhani, Roch H. Glitho. Efficient traces collection mechanisms for passive testing of Web Services
375 -- 384Ching-Pao Chang, Chih-Ping Chu, Yu-Fang Yeh. Integrating in-process software defect prediction with association mining to discover defect pattern
385 -- 404Wes Masri, Andy Podgurski. Algorithms and tool support for dynamic information flow analysis
405 -- 417Gyun Woo, Heung Seok Chae, Jian Feng Cui, Jeong-Hoon Ji. Revising cohesion measures by considering the impact of write interactions between class members
418 -- 432Monalisa Sarma, Rajib Mall. Automatic generation of test specifications for coverage of system state transitions
433 -- 447Massimo Colosimo, Andrea De Lucia, Giuseppe Scanniello, Genoveffa Tortora. Evaluating legacy system migration technologies through empirical studies
448 -- 459Gisèle Douta, Haydar Talib, Oscar Nierstrasz, Frank Langlotz. CompAS: A new approach to commonality and variability analysis with applications in computer assisted orthopaedic surgery
460 -- 477Lihua Ran, Curtis E. Dyreson, Anneliese Amschler Andrews, Renée C. Bryce, Christopher J. Mallery. Building test cases and oracles to automate the testing of web database applications
478 -- 496Aneesh Krishna, Sergiy A. Vilkomir, Aditya K. Ghose. Consistency preserving co-evolution of formal specifications and agent-oriented conceptual models
497 -- 511Ilir Gashi, Peter T. Popov, Vladimir Stankovic. Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach
512 -- 527Lionel C. Briand, Yvan Labiche, Tao Yue. Automated traceability analysis for UML model refinements
528 -- 545Damjan Vavpotic, Marko Bajec. An approach for concurrent evaluation of technical and social aspects of software development methodologies
546 -- 553Hui Liu, Hee Beng Kuan Tan. Covering code behavior on input validation in functional testing

Volume 51, Issue 12

1629 -- 1630Marcela Genero, Mario Piattini, Michel R. V. Chaudron. Quality of UML models
1631 -- 1645Francisco J. Lucas, Fernando Molina, José Ambrosio Toval Álvarez. A systematic review of UML model consistency management
1646 -- 1669Parastoo Mohagheghi, Vegard Dehlen, Tor Neple. Definitions and approaches to model quality in model-based software development - A review of literature
1670 -- 1685Ariadi Nugroho. Level of detail in UML models and its impact on model comprehension: A controlled experiment
1686 -- 1698Holger Eichelberger, Klaus Schmid. Guidelines on the aesthetic quality of UML class diagrams
1699 -- 1711Bente Anda, Kai Hansen, Gunhild Sand. An investigation of use case quality in a large safety-critical software development project
1712 -- 1738Carlos Gutiérrez, David G. Rosado, Eduardo Fernández-Medina. The practical application of a process for eliciting and designing security in web service systems
1739 -- 1749Claus Pahl, Simon Giesecke, Wilhelm Hasselbring. Ontology-based modelling of architectural styles

Volume 51, Issue 11

1485 -- 1486Hong Zhu, Fevzi Belli. Advancing test automation technology to meet the challenges of model-based software testing - Guest editors introduction to the special section of the Third IEEE International Workshop on Automation of Software Test (AST 2008)
1487 -- 1504Arilo Claudio Dias Neto, Guilherme Horta Travassos. Model-based testing approaches selection for software projects
1505 -- 1519W. Eric Wong, Andy Restrepo, Byoungju Choi. Validation of SDL specifications using EFSM-based test generation
1520 -- 1533Junhua Ding, Peter J. Clarke, Gonzalo Argote-Garcia, Xudong He. A methodology for evaluating test coverage criteria of high levelPetri nets
1534 -- 1548José Carlos Bregieiro Ribeiro, Mário Zenha Rela, Francisco Fernández de Vega. Test Case Evaluation and Input Domain Reduction strategies for the Evolutionary Testing of Object-Oriented software
1549 -- 1550Hong Zhu. Engineering quality software - Guest editor s introduction to the special section of the Eighth International Conference on Quality Software (QSIC 2008)
1551 -- 1564Lionel C. Briand, Yvan Labiche, Zaheer Bawar, Nadia Traldi Spido. Using machine learning to refine Category-Partition test specifications and test suites
1565 -- 1572Shaoying Liu. Integrating top-down and scenario-based methods for constructing software specifications
1573 -- 1585Zhenyu Zhang, W. K. Chan, T. H. Tse, Peifeng Hu, Xinming Wang. Is non-parametric hypothesis testing model robust for statistical fault localization?
1586 -- 1600Dharmalingam Ganesan, Thorsten Keuler, Yutaro Nishimura. Architecture compliance checking at run-time
1601 -- 1617Martin Weiglhofer, Gordon Fraser, Franz Wotawa. Using coverage to automate and improve test purpose based testing
1618 -- 1627Mohamed F. Ahmed, Swapna S. Gokhale. Linux bugs: Life cycle, resolution and architectural analysis

Volume 51, Issue 10

1377 -- 1378James R. Cordy, Lu Zhang. Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008
1379 -- 1393Yue Jia, Mark Harman. Higher Order Mutation Testing
1394 -- 1408Daniel M. Germán, Ahmed E. Hassan, Gregorio Robles. Change impact graphs: Determining the impact of prior codechanges
1409 -- 1427Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla. Decompilation of Java bytecode to Prolog by partial evaluation
1428 -- 1439Jonas Lundberg, Tobias Gutzmann, Marcus Edvinsson, Welf Löwe. Fast and precise points-to analysis
1440 -- 1453Andrew Stone, Michelle Strout, Shweta Behere. May/must analysis and the DFAGen data-flow analysis generator
1454 -- 1468Mariano Ceccato, Thomas Roy Dean, Paolo Tonella. Recovering structured data types from a legacy data model with overlays
1469 -- 1484Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano. The life and death of statically detected vulnerabilities: An empirical study

Volume 51, Issue 1

1 -- 0Claes Wohlin. Introduction to section most cited journal articles in Software Engineering
2 -- 6Claes Wohlin. An analysis of the most cited articles in software engineering journals - 2002
7 -- 15Barbara A. Kitchenham, Pearl Brereton, David Budgen, Mark Turner, John Bailey, Stephen G. Linkman. Systematic literature reviews in software engineering - A systematic literature review
16 -- 30Lionel C. Briand, Yvan Labiche, S. He. Automating regression test selection based on UML designs
31 -- 41Jan Kofron, Frantisek Plasil, Ondrej Sery. Modes in component behavior specification via EBP and their application in product lines
42 -- 55Marcos Dias de Assunção, Rajkumar Buyya. Performance analysis of allocation policies for interGrid resource provisioning
56 -- 67Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend, Michael Stepp. More on graph theoretic software watermarks: Implementation, analysis, and attacks
68 -- 70Robert L. Glass, Iris Vessey, Venkataraman Ramesh. RESRES: The story behind the paper Research in software engineering: An analysis of the literature
71 -- 82Vigdis By Kampenes, Tore Dybå, Jo Erskine Hannay, Dag I. K. Sjøberg. A systematic review of quasi-experiments in software engineering
83 -- 97Li Qin, Vijayalakshmi Atluri. Evaluating the validity of data instances against ontology evolution over the Semantic Web
98 -- 108Jan Chmiel, Tadeusz Morzy, Robert Wrembel. Multiversion join index for multiversion data warehouse
109 -- 137Liang Xiao 0002, Des Greer. Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model-Driven Architecture
138 -- 149Marcelo Nassau Malta, Marco Tulio de Oliveira Valente. Object-oriented transformations for extracting aspects
150 -- 161Finn Olav Bjørnson, Alf Inge Wang, Erik Arisholm. Improving the effectiveness of root cause analysis in post mortem analysis: A controlled experiment
162 -- 172KeungSik Choi, Doo-Hwan Bae. Dynamic project performance estimation by combining static estimation models with system dynamics
173 -- 181Li-Wei Chen, Sun-Jen Huang. Accuracy and efficiency comparisons of single- and multi-cycled software classification models
182 -- 194Liang Huang, Mike Holcombe. Empirical investigation towards the effectiveness of Test First programming
195 -- 218Sybren Deelstra, Marco Sinnema, Jan Bosch. Variability assessment in software product families
219 -- 233Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson. Models of motivation in software engineering