Journal: ISSE

Volume 12, Issue 4

249 -- 261D. Richard Kuhn, Raghu N. Kacker, Yu Lei. Measuring and specifying combinatorial coverage of test input configurations
263 -- 278Shambhu Prasad, Suraj Nayak, Vamshi Vijay, Rajib Mall. SLDG: a metamodel for Simulink/Stateflow models and its applications
279 -- 301Debasish Kundu, Debasis Samanta. Enumerating message paths for interaction testing of object-oriented systems
303 -- 317Imrul Kayes, Mithun Sarker, Jacob Chakareski. Product backlog rating: a case study on measuring test quality in scrum
319 -- 332Sangharatna Godboley, Arpita Dutta, Durga Prasad Mohapatra, Avijit Das, Rajib Mall. Making a concolic tester achieve increased MC/DC

Volume 12, Issue 3

161 -- 162Atulya K. Nagar, Manmath N. Sahoo, Sambit Bakshi, Basabdatta Sen Bhattacharya. Introduction to special issue on 'Recent Computing Paradigms, Network Protocols, and Applications'
163 -- 176Supriya Chakraborty, Agostino Cortesi, Nabedu Chaki. A uniform representation of multi-variant data in intensive-query databases
177 -- 192Angan Mitra, Sohom Ghosh, Partha Basuchowdhuri, Manoj Kumar Shekhawat, Sanjoy Kumar Saha. Recommendation system based on product purchase analysis
193 -- 200Shrutilipi Bhattacharjee, Soumya K. Ghosh. Measuring semantic similarity between land-cover classes for spatial analysis: an ontology hierarchy exploration approach
201 -- 214Rahul Raman, Pankaj Kumar Sa, Banshidhar Majhi. Direction prediction for avoiding occlusion in visual surveillance
215 -- 225Neil Buckley, Atulya K. Nagar, Subramanian Arumugam 0001. On the use of secret sharing as a secure multi-use pad
227 -- 238Dibakar Saha, Nabanita Das. Self-organized area coverage in wireless sensor networks by limited node mobility
239 -- 248Sayan Sen Sarma, S. K. Setua. Uniform load sharing on a hierarchical content delivery network interconnection model

Volume 12, Issue 2

81 -- 94Martin S. Feather, Joel M. Wilf, Joseph Priest. Metrics for V&V of cyber defenses
95 -- 107Emil Vassev, Mike Hinchey. Capturing autonomy features for unmanned spacecraft with ARE, the autonomy requirements engineering approach
109 -- 140Brahim Hamid, Sigrid Gürgens, Andreas Fuchs. Security patterns modeling and formalization for pattern-based development of secure software systems
141 -- 151Doron Drusinsky. Run-time monitoring using bounded constraint instance discovery within big data streams
153 -- 159Chhabi Rani Panigrahi, Rajib Mall. Regression test size reduction using improved precision slices

Volume 12, Issue 1

1 -- 26Huiquan Zhu, Jing Sun 0002, Jin Song Dong, Shang-Wei Lin. From verified model to executable program: the PAT approach
27 -- 40Alessandro Gerlinger Romero, Klaus Schneider 0001, Maurício Gonçalves Vieira Ferreira. Semantics in space systems architectures
41 -- 67Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi. Aspect-oriented modeling framework for security hardening
69 -- 79Ralph L. Wojtowicz. Sketch theory as a framework for knowledge management