Journal: ACM SIGSOFT Software Engineering Notes

Volume 30, Issue 6

1 -- 9Nitin Kanaskar, Umit Topaloglu, Coskun Bayrak. Globus security model for grid environment
1 -- 2Joseph Feller, Brian Fitzgerald, Scott A. Hissam, Karim Lakhani, Walt Scacchi. Open source application spaces: 5th workshop on open source software engineering
3 -- 4Peter B. Henderson. Software engineering education (SEEd)
5 -- 13Mark Doernhoefer. Surfing the net for software engineering notes
14 -- 25Peter G. Neumann. Risks to the public

Volume 30, Issue 5

1 -- 3Robert Schaefer. The risks of large organizations in developing complex systems
1 -- 3Stephan Diehl, Ahmed E. Hassan, Richard C. Holt. Report on MSR 2005: international workshop on mining software repositories
1 -- 5G. Zayaraz, P. Thambidurai, Madhu Srinivasan, Paul Rodrigues. Software quality assurance through COSMIC FFP
1 -- 4Manuj Darbari, Vipin Saxena. Modeling biological systems: a unified approach
1 -- 4Praful V. Bhansali. Universal software safety standard
1 -- 4K. K. Aggarwal, Yogesh Singh, Pravin Chandra, Manimala Puri. An expert committee model to estimate lines of code
1 -- 3Siddhartha R. Dalal, Ashish Jain, Jesse H. Poore. Advances in model-based software testing (A-MOST)
1 -- 6Leona F. Fass. Some agent theory for the semantic web
1 -- 3Lawrence Chung, Xavier Franch, Neil A. M. Maiden. Second international workshop on models and processes for the evaluation of off-the-shelf components (MPEC 05)
1 -- 6Richard Riehle. Engineering on the surprise continuum: as applied to software practice
1 -- 4Yves Bontemps, Alexander Egyed. Scenarios and state machines: models, algorithms, and tools: a summary of the 4:::th::: workshop
1 -- 5David Budgen, Barbara A. Kitchenham. Realising evidence-based software engineering a report from the workshop held at ICSE 2005
8 -- 15Mark Doernhoefer. Surfing the net for software engineering notes

Volume 30, Issue 4

1 -- 3Sushil Krishna Bajracharya, Trung Chi Ngo, Cristina Videira Lopes. On using Net Options Value as a value based design framework
1 -- 5Masao Ohira, Naoki Ohsugi, Tetsuya Ohoka, Ken-ichi Matsumoto. Accelerating cross-project knowledge collaboration using collaborative filtering and social networks
1 -- 7Thomas Bauer, Jens Herrmann, Peter Liggesmeyer, Christopher Robinson-Mallett. A flexible integration strategy for in-car telematics systems
1 -- 6Giovanni Denaro, Mauro Pezzè, Davide Tosi. Adaptive integration of third-party web services
1 -- 5Keir Mierle, Kevin Laven, Sam T. Roweis, Greg Wilson. Mining student CVS repositories for performance indicators
1 -- 6Israel Herraiz, Gregorio Robles, Jesús M. González-Barahona. Towards predictor models for large libre software projects
1 -- 7Deepti Srivastava, Priya Narasimhan. Architectural support for mode-driven fault tolerance in distributed applications
1 -- 6John C. Georgas, André van der Hoek, Richard N. Taylor. Architectural runtime configuration management in support of dependable self-adaptive software
1 -- 7Chintan Amrit. Coordination in software development: the problem of task allocation
1 -- 6Helen Sharp, Hugh Robinson. Some social factors of software engineering: the maverick, community and technical practices
1 -- 5Iulian Neamtiu, Jeffrey S. Foster, Michael Hicks. Understanding source code evolution using abstract syntax tree matching
1 -- 0Brian Henderson-Sellers. Agent-oriented methodologies: method engineering and metamodelling
1 -- 7Henry Muccini, Marcio S. Dias, Debra J. Richardson. Towards software architecture-based regression testing
1 -- 7Marcelo d Amorim, Klaus Havelund. Event-based runtime verification of java programs
1 -- 5Zarrin Langari, Anne Banks Pidduck. Quality, cleanroom and formal methods
1 -- 5Robert R. Painter, David Coppit. A model for software plans
1 -- 7Weihang Wu, Tim Kelly. Failure modelling in software architecture design for safety
1 -- 5LiGuo Huang, Barry W. Boehm. Determining how much software assurance is enough?: a value-based approach
1 -- 5Akif Günes Koru, Hongfang Liu. An investigation of the effect of module size on defect prediction using static measures
1 -- 4Xing Li, Ramesh Nagarajan. Modeling for image processing system validation, verification and testing
1 -- 5Marius Marin, Leon Moonen, Arie van Deursen. An approach to aspect refactoring based on crosscutting concern types
1 -- 4Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue. ARIES: refactoring support tool for code clone
1 -- 4Yuanfang Cai, Kevin J. Sullivan. A value-oriented theory of modularity in design
1 -- 2Alexander Pretschner, Chris Salzmann, Thomas Stauner. 2nd Intl. ICSE Workshop on Software Engineering for Automotive Systems
1 -- 7Renée C. Bryce, Charles J. Colbourn. Test prioritization for pairwise interaction coverage
1 -- 7Anand Tripathi, Devdatta Kulkarni, Tanvir Ahmed. Policy-driven configuration and management of agent based distributed systems
1 -- 7Sam Weber, Paul A. Karger, Amit M. Paradkar. A software flaw taxonomy: aiming tools at security
1 -- 5Megan Conklin, James Howison, Kevin Crowston. Collaboration using OSSmole: a repository of FLOSS data and analyses
1 -- 7Ben Breech, Lori L. Pollock. A framework for testing security mechanisms for program-based attacks
1 -- 5Bonnie E. John. Evidence-based practice in human-computer interaction and evidence maps
1 -- 7Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen. Requirements traceability to support evolution of access control
1 -- 5Michael Fischer, Johann Oberleitner, Jacek Ratzinger, Harald Gall. Mining evolution data of a product family
1 -- 7Dharini Balasubramaniam, Ronald Morrison, Graham N. C. Kirby, Kath Mickan, Brian Warboys, Ian Robertson, Bob Snowdon, R. Mark Greenwood, Wykeen Seet. A software architecture approach for structuring autonomic systems
1 -- 5Haitham S. Hamza. Separation of concerns for evolving systems: a stability-driven approach
1 -- 7Zaid Dwaikat, Francesco Parisi-Presicce. Risky trust: risk-based analysis of software systems
1 -- 5Jing Liu, Robyn R. Lutz, Jeffrey M. Thompson. Mapping concern space to software architecture: a connector-based approach
1 -- 7Emilia Farcas, Claudiu Farcas, Wolfgang Pree, Josef Templ. Real-time component integration based on transparent distribution
1 -- 4LiGuo Huang, Barry W. Boehm. Using iDAVE to determine availability requirements
1 -- 5Timo Koponen, Virpi Hotti. Open source software maintenance process framework
1 -- 5Cristina Rossi, Andrea Bonaccorsi. Why profit-oriented companies enter the OS field?: intrinsic vs. extrinsic incentives
1 -- 4Jarno Vähäniitty. A tentative framework for connecting long-term business and product planning with iterative & incremental software product development
1 -- 3Dennis B. Smith, Edwin J. Morris, David J. Carney. Interoperability issues affecting autonomic computing
1 -- 8Alessandro Garcia, Ricardo Choren, Carlos José Pereira de Lucena, Alexander Romanovsky, Holger Giese, Danny Weyns, Tom Holvoet, Paolo Giorgini. Software Engineering for Large-Scale Multi-Agent Systems - SELMAS 2005: workshop report
1 -- 5Maha Shaikh, Tony Cornford. Learning/organizing in Linux: a study of the ::::spaces in between::::
1 -- 8Michael Dinkel, Uwe Baumgarten. Modeling nonfunctional requirements: a basis for dynamic systems management
1 -- 5Ahilton Barreto, Márcio de Oliveira Barros, Cláudia Werner. Staffing a software project: a constraint satisfaction approach
1 -- 6Wolfgang Zuser, Stefan Heil, Thomas Grechenig. Software quality development and assurance in RUP, MSF and XP: a comparative study
1 -- 7Wes Masri, Andy Podgurski. Using dynamic information flow analysis to detect attacks against applications
1 -- 5Masaru Ohba, Katsuhiko Gondow. Toward mining concept keywords from identifiers in large software projects
1 -- 5José J. Pazos Arias, Jorge García Duque, Martín López Nores. Eliciting requirements and scenarios using the SCTL-MUS methodology: the shuttle system case study
1 -- 4Jing Dong, Sheng Yang, Lawrence Chung, Paulo S. C. Alencar, Donald D. Cowan. A COTS architectural component specification stencil for selection and reasoning
1 -- 6Paul Grisham, Dewayne E. Perry. Customer relationships and Extreme Programming
1 -- 7Minseong Kim, Jaemin Jeong, Sooyong Park. From product lines to self-managed systems: an architecture-based runtime reconfiguration framework
1 -- 5Naoyasu Ubayashi, Tetsuo Tamai. Concern management for constructing model compilers
1 -- 5Francisco Hernández, Purushotham Bangalore, Kevin D. Reilly. End-user tools for grid computing
1 -- 6Markus Clermont. Heuristics for the automatic identification of irregularities in spreadsheets
1 -- 7Fernando Castor Filho, Patrick H. S. Brito, Cecília M. F. Rubira. A framework for analyzing exception flow in software architectures
1 -- 6Joseph R. Ruthruff, Margaret M. Burnett. Six challenges in supporting end-user debugging
1 -- 7Maarten Rits, Benjamin De Boe, Andreas Schaad. XacT: a bridge between resource management and access control in multi-layered applications
1 -- 7Rean Griffith, Gail E. Kaiser. Manipulating managed execution runtimes to support self-healing systems
1 -- 5Jing Zhang, Jeffrey G. Gray, Yuehua Lin. A model-driven approach to enforce crosscutting assertion checking
1 -- 4Andrew J. Ko, Brad A. Myers. Human factors affecting dependability in end-user programming
1 -- 5Abram Hindle, Daniel M. Germán. SCQL: a formal model and a query language for source control repositories
1 -- 3Michael M. Pickard. Old issues, new eyes
1 -- 6Joakim Fröberg, Kristian Sandström, Christer Norström. Business situation reflected in automotive electronic architectures: analysis of four commercial cases
1 -- 6Alistair G. Sutcliffe. Applying small group theory to analysis and design of CSCW systems
1 -- 3Martin P. Robillard, Gail C. Murphy. Just-in-time concern modeling
1 -- 5Kevin C. Desouza, Yukika Awazu. Managing radical software engineers: between order and chaos
1 -- 5Bart Massey. Longitudinal analysis of long-timescale open source repository data
1 -- 5Ghassan Beydoun, Cesar Gonzalez-Perez, Graham Low, Brian Henderson-Sellers. Synthesis of a generic MAS metamodel
1 -- 5Xiaoqing Wu, Barrett R. Bryant, Jeffrey G. Gray, Marjan Mernik. Pattern transformation for two-dimensional separation of concerns
1 -- 4Mohammad Ahmad Munawar, Paul A. S. Ward. Better performance or better manageability?
1 -- 7Scott D. Fleming, Betty H. C. Cheng, R. E. Kurt Stirewalt, Philip K. McKinley. An approach to implementing dynamic adaptation in C++
1 -- 4Brian Henderson-Sellers, Cesar Gonzalez-Perez, M. K. Serour, Donald G. Firesmith. Method engineering and COTS evaluation
1 -- 6Naveed Arshad, Dennis Heimbigner, Alexander L. Wolf. Dealing with failures during failure recovery of distributed systems
1 -- 7Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel. Enabling control over adaptive program transformation for dynamically evolving mobile software validation
1 -- 6Ying Zhou, Joseph Davis. Open source software reliability model: an empirical approach
1 -- 3Yvonne Dittrich, Kari Rönkkö, Olle Lindeberg, Jeanette Erickson, Christina Hansson. Co-Operative Method Development revisited
1 -- 6V. Vipindeep, Pankaj Jalote. Efficient static analysis with path pruning using coverage data
1 -- 6Medha Umarji, Carolyn B. Seaman. Predicting acceptance of Software Process Improvement
1 -- 6Michael John, Frank Maurer, Bjørnar Tessem. Human and social factors of software engineering: workshop summary
1 -- 3Akif Günes Koru, A. Ant Ozok, Anthony F. Norcio. The effect of human memory organization on code reviews under different single and pair code reviewing scenarios
1 -- 7Esperanza Marcos. Software engineering research versus software development
1 -- 4Annya Réquilé-Romanczuk, Alejandra Cechich, Anne Dourgnon-Hanoune, Jean-Christophe Mielnik. Towards a knowledge-based framework for COTS component identification
1 -- 0David Garlan, Marin Litoiu, Hausi A. Müller, John Mylopoulos, Dennis B. Smith, Kenny Wong. DEAS 2005: workshop on the design and evolution of autonomic application software
1 -- 4Judith Segal, Antony Grinyer, Helen Sharp. The type of evidence produced by empirical software engineers
1 -- 5Jaime Spacco, Jaymie Strecker, David Hovemeyer, William Pugh. Software repository mining with Marmoset: an automated programming project snapshot and testing system
1 -- 6Fredrik Pettersson, Martin Ivarsson, Peter Öhman. Automotive use case standard for embedded systems
1 -- 6Pablo Barrera, Gregorio Robles, José María Cañas, Francisco Martín, Vicente Matellán. Impact of libre software tools and methods in the robotics field
1 -- 7Rohan Sen, Gregory Hackmann, Gruia-Catalin Roman, Christopher D. Gill. Opportunistic exploitation of knowledge to increase predictability of agent interactions in MANETs
1 -- 5Shih-Kun Huang, Kang-min Liu. Mining version histories to verify the learning process of Legitimate Peripheral Participants
1 -- 5Hélio R. Costa, Márcio de Oliveira Barros, Guilherme Horta Travassos. A risk based economical approach for evaluating software project portfolios
1 -- 7Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen. Towards a unifying view on security contracts
1 -- 4K. K. Aggarwal, Yogesh Singh, Pravin Chandra, Manimala Puri. Sensitivity analysis of fuzzy and neural network models
1 -- 7WenQian Liu, Charles L. Chen, Vidya Lakshminarayanan, Dewayne E. Perry. A design for evidence - based soft research
1 -- 5Albert Schilling, Kelma Madeira, Paula Donegan, Kênia Soares Sousa, Elizabeth Furtado, Vasco Furtado. An integrated method for designing user interfaces based on tests
1 -- 7David McGuinness, Liam Murphy. A simulation model of a multi-server EJB system
1 -- 5Chadd C. Williams, Jeffrey K. Hollingsworth. Recovering system specific rules from software repositories
1 -- 7Mayur Palankar, Jonathan E. Cook. Merging traces of hardware-assisted data breakpoints
1 -- 7Marwan Abi-Antoun, Jonathan Aldrich, David Garlan, Bradley R. Schmerl, Nagi H. Nahas, Tony Tseng. Improving system dependability by enforcing architectural intent
1 -- 2Alessandro Garcia, Ricardo Choren, Carlos José Pereira de Lucena, Alexander Romanovsky, Tom Holvoet, Paolo Giorgini. Software engineering for large-scale multi-agent systems - SELMAS 05
1 -- 6Carolyn Mair, Martin J. Shepperd, Magne Jørgensen. An analysis of data sets used to train and validate cost prediction systems
1 -- 5Walt Scacchi. OpenEC/B: electronic commerce and free/open source software development
1 -- 4Uzma Raja, Evelyn J. Barry. Investigating quality in large-scale Open Source Software
1 -- 4Abdallah Mohamed, Günther Ruhe, Armin Eberlein. Decision support for customization of the COTS selection process
1 -- 6Steven P. Reiss. Dynamic detection and visualization of software phases
1 -- 7Erika Mir Olimpiew, Hassan Gomaa. Model-based testing for applications derived from software product lines
1 -- 4Jiang Zheng, Brian Robinson, Laurie Williams, Karen Smiley. A process for identifying changes when source code is not available
1 -- 7Alexei Lapouchnian, Sotirios Liaskos, John Mylopoulos, Yijun Yu. Towards requirements-driven autonomic systems design
1 -- 7Nancy R. Mead, Ted Stehney. Security quality requirements engineering (SQUARE) methodology
1 -- 6Zhihao Chen, Tim Menzies, Daniel Port, Barry W. Boehm. Feature subset selection can improve software cost estimation accuracy
1 -- 5Gregorio Robles, Jesús M. González-Barahona. Developer identification methods for integrated data from various sources
1 -- 7Michael E. Shin, Daniel Cooke. Connector-based self-healing mechanism for components of a reliable system
1 -- 7Sergiy Boroday, Alexandre Petrenko, J. Singh, Hesham Hallal. Dynamic analysis of java applications for multithreaded antipatterns
1 -- 6Lihua Xu, Hadar Ziv, Debra J. Richardson, Thomas A. Alspaugh. An architectural pattern for non-functional dependability requirements
1 -- 5Mazen Saleh, Hassan Gomaa. Separation of concerns in software product line engineering
1 -- 7Marin Litoiu, C. Murray Woodside, Tao Zheng. Hierarchical model-based autonomic control of software systems
1 -- 5Michael Bolin, Robert C. Miller. Naming page elements in end-user web automation
1 -- 6Tim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn. Simple software cost analysis: safe or unsafe?
1 -- 5Thomas A. Alspaugh, Debra J. Richardson, Thomas A. Standish. Scenarios, state machines and purpose-driven testing
1 -- 7William G. J. Halfond, Alessandro Orso. Combining static analysis and runtime monitoring to counter SQL-injection attacks
1 -- 6Ulrik Eklund, Örjan Askerdal, Johan Granholm, Anders Alminger, Jakob Axelsson. Experience of introducing reference architectures in the development of automotive electronic systems
1 -- 7Michael Gegick, Laurie Williams. Matching attack patterns to security vulnerabilities in software-intensive system designs
1 -- 7Danny Weyns, Kurt Schelfthout, Tom Holvoet. Architectural design of a distributed application with autonomic quality requirements
1 -- 6Jewgenij Botaschanjan, Leonid Kof, C. Kühnel, Maria Spichkova. Towards verified automotive software
1 -- 5Daniel M. Germán, Davor Cubranic, Margaret-Anne D. Storey. A framework for describing and understanding mining tools in software development
1 -- 5Annie T. T. Ying, James L. Wright, Steven Abrams. Source code that talks: an exploration of Eclipse task comments and their implication to repository mining
1 -- 6Stefan Wagner, Tilman Seifert. Software quality economics for defect-detection techniques using failure prediction
1 -- 6Xiaoqing Frank Liu, Yan Sun, Gautam Kane, Yuji Kyoya, Kunio Noguchi. QFD application in software process management and improvement based on CMM
1 -- 3Hema Srikanth, Laurie Williams. On the economics of requirements-based test case prioritization
1 -- 4Jyrki Kontio, Jani-Pekka Jokinen, Markus M. Mäkelä, Virve Leino. Current practices and research opportunities in software business models
1 -- 7Karun N. Biyani, Sandeep S. Kulkarni. Building component families to support adaptation
1 -- 7Seyed Masoud Sadjadi, Philip K. McKinley, Betty H. C. Cheng. Transparent shaping of existing software to support pervasive and autonomic computing
1 -- 5José J. Pazos Arias, Jorge García Duque, Martín López Nores. Locating crosscutting concerns in the formal specification of distributed reactive systems
1 -- 5Thomas Neubauer, Markus D. Klemen, Stefan Biffl. Business process-based valuation of IT-security
1 -- 7Ashraf Gaffar, Ahmed Seffah, John A. van der Poll. HCI pattern semantics in XML: a pragmatic approach
1 -- 6Monvorath Phongpaibul, Barry W. Boehm. Improving quality through software process improvement in Thailand: initial analysis
1 -- 6Ingo Stürmer, Daniela Weinberg, Mirko Conrad. Overview of existing safeguarding techniques for automatically generated code
1 -- 5Marc Fisher II, Gregg Rothermel. The EUSES spreadsheet corpus: a shared resource for supporting experimentation with spreadsheet dependability mechanisms
1 -- 8Kurt Schelfthout, Tom Holvoet, Yolande Berbers. Views: customizable abstractions for contextaware applications in MANETs
1 -- 0Hans-Dieter Ehrich. Harmonizing intra- and inter-object specification and verification: a multi-object logics approach
1 -- 5Katherine J. Stewart, David P. Darcy, Sherae L. Daniel. Observations on patterns of development in open source software projects
1 -- 4Kendra Cooper, Lawrence Chung. Managing change in an OTS-aware requirements engineering approach
1 -- 7Fabrice Bouquet, Eddie Jaffuel, Bruno Legeard, Fabien Peureux, Mark Utting. Requirements traceability in automated test generation: application to smart card software validation
1 -- 4Anna Persson, Henrik Gustavsson, Brian Lings, Björn Lundell, Anders Mattsson, Ulf Ärlig. OSS tools in a heterogeneous environment for embedded systems modelling: an analysis of adoptions of XMI
1 -- 5Judith Segal. Two principles of end-user software engineering research
1 -- 4Alistair G. Sutcliffe. Evaluating the costs and benefits of end-user development
1 -- 4Piotr Kaminski, Priyanka Agrawal, Holger M. Kienle, Hausi A. Müller. <username>, i need you!: initiative and interaction in autonomic systems
1 -- 5Christopher Scaffidi, Ashish Arora, Shawn Butler, Mary Shaw. A value-based approach to predicting system properties from design
1 -- 7Peter B. Lakey. Model-based specification and testing applied to the Ground-Based Midcourse Defense (GMD) system: an industry report
1 -- 5Giuliano Antoniol, Vincenzo Fabio Rollo, Gabriele Venturi. Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories
1 -- 3Barbara A. Kitchenham, David Budgen, Pearl Brereton, Stephen G. Linkman. Realising evidence-based software engineering
1 -- 6Simon Giesecke, Timo Warns, Wilhelm Hasselbring. Availability simulation of peer-to-peer architectural styles
1 -- 7Ömer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter. DISCOA: architectural adaptations for security and QoS
1 -- 2Lori L. Pollock, James Andrews. ICSE 2005 workshop summary third international workshop on dynamic analysis (WODA 2005)
1 -- 7Jessica Sant, Amie Souter, Lloyd Greenwald. An exploration of statistical models for automated test case generation
1 -- 3Susan L. Spraragen. The challenges in creating tools for improving the software development lifecycle
1 -- 5Jacek Sliwerski, Thomas Zimmermann, Andreas Zeller. When do changes induce fixes?
1 -- 7Alessandro Orso, Bryan Kennedy. Selective capture and replay of program executions
1 -- 5Bradley Simmons, Hanan Lutfiyya. Policies, grids and autonomic computing
1 -- 5Sunghun Kim, Jim Whitehead, Jennifer Bevan. Analysis of signature change patterns
1 -- 6Zahia Guessoum, Nora Faci, Jean-Pierre Briot. Adaptive replication of large-scale multi-agent systems: towards a fault-tolerant multi-agent platform
1 -- 6Vijay K. Gurbani, Anita Garvert, James D. Herbsleb. A case study of open source tools and practices in a commercial setting
1 -- 7Christopher Robinson-Mallett, Peter Liggesmeyer, Tilo Mücke, Ursula Goltz. Generating optimal distinguishing sequences with a model checker
1 -- 4Rogério de Lemos, Alexander Romanovsky. ICSE 2005 Workshop on Architecting Dependable Systems (WADS 2005)
1 -- 4Herwig Mannaert, Kris Ven. The use of open source software platforms by Independent Software Vendors: issues and opportunities
1 -- 5Juri Memmert. Concern patterns and analysis
1 -- 7S. Michelle Young, Helen M. Edwards, Sharon McDonald, J. Barrie Thompson. Personality characteristics in an XP team: a repertory grid study
1 -- 5Genaína Nunes Rodrigues, David S. Rosenblum, Sebastián Uchitel. Sensitivity analysis for a scenario-based reliability prediction model
1 -- 5Patrick Keil. Principal agent theory and its application to analyze outsourcing of software development
1 -- 5Sebastian Kiebusch, Bogdan Franczyk, Andreas Speck. Metrics for software system families
1 -- 5Kirk Sayre. Usage model-based automated testing of C++ templates
1 -- 8Florian Klein, Holger Giese. Analysis and design of physical and social contexts in multi-agent systems using UML
1 -- 7Uri Dekel. Supporting distributed software design meetings: what can we learn from co-located meetings?
1 -- 6Joost Noppen, Pim van den Broek, Mehmet Aksit. Dealing with imprecise quality factors in software design
1 -- 3Martin P. Robillard. Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005)
1 -- 7Miroslaw Staron, Ludwik Kuzniarz, Christian Thurn. An empirical assessment of using stereotypes to improve reading techniques in software inspections
1 -- 5Miryung Kim, David Notkin. Using a clone genealogy extractor for understanding and supporting evolution of code clones
1 -- 4Xavier Franch, Marco Torchiano. Towards a reference framework for COTS-based development: a proposal
1 -- 7Somo Banerjee, Chris Mattmann, Nenad Medvidovic, Leana Golubchik. Leveraging architectural models to inject trust into software systems
1 -- 4Tariq Al-Naeem, Ian Gorton, Fethi A. Rabhi, Boualem Benatallah. Tool support for optimization-based architectural evaluation
1 -- 7Alan F. Karr, Adam A. Porter. Distributed performance testing using statistical modeling
1 -- 5Laurie Williams, Lucas Layman, Pekka Abrahamsson. On establishing the essential components of a technology-dependent framework: a strawman framework for industrial case study-based research
1 -- 5Christopher Scaffidi, Mary Shaw, Brad A. Myers. An approach for categorizing end user programmers to guide software engineering research
1 -- 7Toacy Cavalcante de Oliveira, Paulo S. C. Alencar, Donald D. Cowan, Carlos José Pereira de Lucena. xTAO: enabling a declarative approach to the specification of multi-agent systems
1 -- 5Austen Rainer, Dorota Jagielska, Tracy Hall. Software engineering practice versus evidence-based software engineering research
1 -- 0Robert V. Binder, James E. Hanlon. The advanced mobile application testing environment
1 -- 6Gerardo Canfora, Piero Corte, Antonio De Nigro, Debora Desideri, Massimiliano Di Penta, Raffaele Esposito, Amedeo Falanga, Gloria Renna, Rita Scognamiglio, Francesco Torelli, Maria Luisa Villani, Paolo Zampognaro. The C-Cube framework: developing autonomic applications through web services
1 -- 7Osamah A. Rawashdeh, Garrett D. Chandler, James E. Lumpp Jr.. A UAU test and development environment based on dynamic system reconfiguration
1 -- 7Lúcia R. D. Bastos, Jaelson Castro. From requirements to multi-agent architecture using organisational concepts
1 -- 3Grace Tai. A communication architecture from rapid prototyping
1 -- 7Markus Clermont, David Lorge Parnas. Using information about functions in selecting test cases
1 -- 7Nachiappan Nagappan, Laurie Williams, Mladen A. Vouk, Jason Osborne. Early estimation of software quality using in-process testing metrics: a controlled case study
1 -- 6David Shepherd, Lori L. Pollock, Tom Tourwé. Using language clues to discover crosscutting concerns
1 -- 4Wesley Coelho, Gail C. Murphy. ActiveAspect: presenting crosscutting structure
1 -- 4Annie T. T. Ying, James L. Wright, Steven Abrams. An exploration of how comments are used for marking related code fragments
1 -- 3Jai Asundi. The need for effort estimation models for open source software projects
1 -- 2Danilo Bruschi, Bart De Win, Mattia Monga. Software engineering for secure systems
1 -- 7Christian Bartelt, Thomas Fischer, Dirk Niebuhr, Andreas Rausch, Franz Seidl, Marcus Trapp. Dynamic integration of heterogeneous mobile devices
1 -- 7Ji Zhang, Betty H. C. Cheng. Specifying adaptation semantics
1 -- 4K. K. Aggarwal, Yogesh Singh, Pravin Chandra, Manimala Puri. Evaluation of various training algorithms in a neural network model for software engineering applications
1 -- 3Russell Ovans. All we really need to know about software engineering is in the film ::::office space::::
1 -- 5Carol A. Wellington, Thomas H. Briggs, C. Dudley Girard. Examining team cohesion as an effect of software engineering methodology
1 -- 6Barry W. Boehm. Value-based quality processes and results
1 -- 7Scott A. DeLoach. Multiagent systems engineering of organization-based multiagent systems
1 -- 6Gary D. Boetticher. Nearest neighbor sampling for better defect prediction
1 -- 5Holger Giese, Ekkart Kindler, Florian Klein, Robert Wagner. Reconciling scenario-centered controller design with state-based system models
1 -- 4Brenda Chawner. F/OSS in the library world: an exploration
1 -- 6Bruce W. Weide, Paolo Bucci, Wayne D. Heym, Murali Sitaraman, Giorgio Rizzoni. Issues in performance certification for high-level automotive control software
1 -- 7Rob Weaver, Georgios Despotou, Tim Kelly, John A. McDermid. Combining software evidence: arguments and assurance
1 -- 4Fidel Nkwocha, Sebastian G. Elbaum. Fault patterns in Matlab
1 -- 4Qun Yang, Xian-Chun Yang, Man-Wu Xu. A framework for dynamic software architecture-based self-healing
1 -- 4Paul Adams, Cornelia Boldyreff, David Nutter, Stephen Rank. Adaptive reuse of libre software systems for supporting on-line collaboration
1 -- 5Amy Law, Raylene Charron. Effects of agile practices on social factors
1 -- 6Ingolf H. Krüger, Reena Mathew, Michael Meisinger. From scenarios to aspects: exploring product lines
1 -- 5Jennifer Morris, Philip Koopman. Representing design tradeoffs in safety-critical systems
1 -- 7Xia Cai, Michael R. Lyu. The effect of code coverage on fault detection under different testing profiles
1 -- 7Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock, Amie L. Souter. Analyzing clusters of web application user sessions
1 -- 5Jacek Ratzinger, Michael Fischer, Harald Gall. Improving evolvability through refactoring
1 -- 7Christopher M. Lott, Ashish Jain, Siddhartha R. Dalal. Modeling requirements for combinatorial software testing
1 -- 8Koenraad Mertens, Tom Holvoet, Yolande Berbers. A case for adaptation of the distributed environment layout in multiagent applications
1 -- 5Vladimir Jakobac, Nenad Medvidovic, Alexander Egyed. Separating architectural concerns to ease program understanding
1 -- 4Vahe Poladian, João Pedro Sousa, Frank Padberg, Mary Shaw. Anticipatory configuration of resource-aware applications
1 -- 6John C. Georgas, Michael M. Gorlick, Richard N. Taylor. Raging incrementalism: harnessing change with open-source software
1 -- 7Karsten Sohr, Gail-Joon Ahn, Lars Migge. Articulating and enforcing authorisation policies with UML and OCL
1 -- 7Josh Dehlinger, Robyn R. Lutz. A product-line requirements approach to safe reuse in multi-agent systems
1 -- 0Naftaly H. Minsky. Law-governed multi-agent systems: from anarchy to order
1 -- 4M. Todd Gamble, Rose F. Gamble, Michelle Hepner. Understanding solution architecture concerns
1 -- 5Sherif A. Gurguis, Amir Zeid. Towards autonomic web services: achieving self-healing using web services
1 -- 7Jie Ren, Richard N. Taylor, Paul Dourish, David F. Redmiles. Towards an architectural treatment of software security: a connector-centric approach
1 -- 6Robert Schaefer. Deeper questions: the metaproblem of large organizations developing complex systems and the limits of process
1 -- 5Robin Abraham, Martin Erwig. How to communicate unit error messages in spreadsheets
1 -- 5Carsten Görg, Peter Weißgerber. Error detection by refactoring reconstruction
1 -- 6Mark Sherriff, Nachiappan Nagappan, Laurie Williams, Mladen A. Vouk. Early estimation of defect density using an in-process Haskell metrics model
1 -- 6Mikhail Auguston, James Bret Michael, Man-tak Shing. Environment behavior models for scenario generation and testing automation
1 -- 6Sebastian Kiebusch, Bogdan Franczyk, Andreas Speck. A real time measure of software system families
1 -- 7Amit M. Paradkar. Case studies on fault detection effectiveness of model based test generation techniques
1 -- 4Muhammad Raza Ali. Why teach reverse engineering?
1 -- 7Mazeiar Salehie, Ladan Tahvildari. Autonomic computing: emerging trends and open problems
1 -- 5Jane Huffman Hayes, Alex Dekhtyar, Senthil Karthikeyan Sundaram. Text mining for software engineering: how analyst feedback impacts final results
1 -- 6Leif Geiger, Albert Zündorf. Story driven testing - SDT
1 -- 5Eve MacGregor, Yvonne Hsieh, Philippe Kruchten. Cultural patterns in software process mishaps: incidents in global projects
1 -- 3Marcus Ciolkowski, Jürgen Münch. Accumulation and presentation of empirical evidence: problems and challenges
1 -- 7Niklas Pettersson. Measuring precision for static and dynamic design pattern recognition as a function of coverage
1 -- 4Michael VanHilst, Pankaj K. Garg, Christopher Lo. Repository mining and Six Sigma for process improvement
1 -- 4Lutz Prechelt, Daniel J. Hutzel. Market forces and end-user programming for mission-critical systems
1 -- 5Apurva Jain, Barry W. Boehm. Developing a theory of value-based software engineering
1 -- 8Nadeem Jamali, Shangping Ren. A layered architecture for real-time distributed multi-agent systems
1 -- 7Seok-Won Lee, Robin A. Gandhi, Gail-Joon Ahn. Establishing trustworthiness in services of the critical infrastructure through certification and accreditation
1 -- 5Huzefa H. Kagdi, Michael L. Collard, Jonathan I. Maletic. Towards a taxonomy of approaches for mining of source code repositories
1 -- 7John Viega. Building security requirements with CLASP
1 -- 7Georgine Beranek, Wolfgang Zuser, Thomas Grechenig. Functional group roles in software engineering teams
1 -- 6Senthil Karthikeyan Sundaram, Jane Huffman Hayes, Alex Dekhtyar. Baselines in requirements tracing
1 -- 5William H. Harrison, Harold Ossher, Stanley M. Sutton Jr., Peri L. Tarr. Concern modeling in the concern manipulation environment
1 -- 7Robert W. Bowdidge. Refactoring gcc using structure field access traces and concept analysis
1 -- 7Carmen Zannier, Frank Maurer. A qualitative empirical evaluation of design decisions
1 -- 4Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse, Umair Khan, Maurizio Morisio, Marco Torchiano. Barriers to disseminating off-the-shelf based development theories to IT industry
1 -- 5Tsong Yueh Chen, Fei-Ching Kuo, Zhiquan Zhou. An effective testing method for end-user programmers
1 -- 7Michael G. Merideth, Priya Narasimhan. Retrofitting networked applications to add autonomic reconfiguration
6 -- 0Peter B. Henderson. Software Engineering Education (SEEd)
6 -- 8David Lorge Parnas, Lillian Chik-Parnas. Goals for software engineering student education
7 -- 6Matthias Tichy, Holger Giese, Daniela Schilling, Wladimir Pauls. Computing optimal self-repair actions: damage minimization versus repair time
8 -- 0Joe Saur. Project management: here we go again!
8 -- 9Michael Wing. In praise of SE Geeks
10 -- 18Mark Doernhoefer. Surfing the net for software engineering notes
19 -- 35Peter G. Neumann. Risks to the public
82 -- 83Mordechai Ben-anachem. Review of Software Endgames: Eliminating Defects, Controlling Change, and the Countdown to On-Time Delivery by Robert Galen , Dorset House, ISBN: 0-932633-62-5, 2005
83 -- 84Garry S. Marliss. Review of Systems Modeling & Requirements Specification Using ECSAM: An Analysis Method for Embedded and Computer-Based Systems by Jonah Z. Lavi and Joseph Kudish , Dorset House Publishing Co. Inc., 2005, ISBN 0-932633-45-5
83 -- 0Haoyang Che. Review of Agile Modeling: Effective Practice for eXtreme Programming and the Unified Process by Scott W. Ambler , John Wiley & Sons, Inc, 2002, 0-471-20282-7

Volume 30, Issue 3

1 -- 6Chia-Chu Chiang. Implicit heterogeneous and parallel programming
1 -- 5Ananth Kendapadi, Matt Gandolfo, Amitosh Shukla. BatchFlow: a method and notation to visualize RDBMS batch jobs
1 -- 8Muthu Ramachandran. Software reuse guidelines
1 -- 2Joseph Feller, Brian Fitzgerald, Scott A. Hissam, Karim Lakhani. Collaboration, conflict and control: report on the 4th workshop on open source software engineering
1 -- 9Ivica Crnkovic, Ralf Reussner, Heinz W. Schmidt, Kevin Simons, Judith A. Stafford, Kurt C. Wallnau. Report of the International Symposium on Component-Based Software Engineering
8 -- 9Donald J. Reifer. Educating software engineers: an industry viewpoint
9 -- 11Michael Wing. Toward a great and enduring profession
12 -- 21Mark Doernhoefer. Surfing the net for software engineering notes
22 -- 37Peter G. Neumann. Risks to the public
39 -- 40Mordechai Ben-Menachem. Review of Return on Software by Steve Tockey ; Addison Wesley, 2005
40 -- 0Debora Weber-Wulff. Review of Official eclipse 3.0 FAQs by John Arthorne and Chris Laffra ; Addison-Wesley, 2004, ISBN 0-321-26838-5
40 -- 41Debora Weber-Wulff. Reveiw of Contributing to eclipse: Principles, Patterns, and Plug-Ins by Erich Gamma and Kent Beck , Addison-Wesley, 2004, ISBN 0-321-20575-8

Volume 30, Issue 2

1 -- 4Nasib S. Gill. Factors affecting effective software quality management revisited
1 -- 5Mehdi Sagheb-Tehrani. Expert systems development: some issues of design process
1 -- 5Shahid Nazir Bhatti. Why quality?: ISO 9126 software quality metrics (Functionality) support by UML suite
1 -- 5Keith A. Roberts. Generic methodology for open source software development
1 -- 6Michael Breen. Combinatorial completion by rule definition with interactive value colouring
1 -- 36Baowen Xu, Ju Qian, Xiaofang Zhang, Zhongqiang Wu, Lin Chen. A brief survey of program slicing
3 -- 5John C. Knight. Focusing software education on engineering
3 -- 0Peter B. Henderson. Software engineering education (SEEd)
6 -- 8Michael Wing. It s our job to care for SE
9 -- 16Mark Doernhoefer. Surfing the net for software engineering notes
17 -- 25Peter G. Neumann. Risks to the Public
28 -- 29Haoyang Che. Review of Object Thinking by David West ; Microsoft Press: Microsoft, 2004, 0-7356-1965-4
29 -- 0Haoyang Che. Review of The Elements of C++ Style by Trevor Misfeldt, Gregory Bumgardner, and Andrew Gray ; Cambridge University Press: Cambridge, 2004, 0-521-89308-9
29 -- 30Haoyang Che. Review of Object-Oriented Programming with Visual Basic.NET by Michael McMillan ; Cambridge University Press: Cambridge, 2004, 0-521-53983-8
30 -- 31Joe Saur. Review of Find the Bug: A Book of Incorrect Programs by Adam Barr ; Pearson Education, 2004, ISBN 0321223918
30 -- 0Mordechai Ben-Menachem. Review of Testing Embedded Software by Bart Broekman and Edwin Notenboom ; Addison Wesley.; 2003

Volume 30, Issue 1

1 -- 0Shang-Wen Cheng, Robert L. Nord, Judith A. Stafford. WICSA Wiki WAN Party: capturing experience in software architecture best practices
1 -- 0Praful V. Bhansali. Complexity measurement of data and control flow
2 -- 0Praful V. Bhansali. Software dissimilarity debate revisited
2 -- 0Holger Giese, Ingolf Krüger. A summary of the ICSE 2004 workshop on scenarios and state machines: models, algorithms, and tools
3 -- 0Praful V. Bhansali. Software safety: current status and future direction
3 -- 0Rogério de Lemos, Cristina Gacek, Alexander Romanovsky. ICSE 2004 workshop on architecting dependable systems
4 -- 0Ahmed E. Hassan, Richard C. Holt, Audris Mockus. Report on MSR 2004: International workshop on mining software repositories
4 -- 0D. Janakiram, M. S. Rajasree. ReQuEst: Requirements-driven quality estimator
4 -- 5Larry Bernstein. Trustworthy software systems
5 -- 0Shriram Krishnamurthi, Tevfik Bultan. Discussion summary: characteristics of web services and their impact on testing, analysis and verification
5 -- 0Ralph Kuehne, Cornelius Wille, Reiner R. Dumke. Software agents using simulation for decision-making
6 -- 7Michael Wing. Towards a national academy of software engineering
6 -- 0Robert Schaefer. Systems of systems and coordinated atomic actions
7 -- 0Alexander Stuckenholz. Component evolution and versioning state of the art
8 -- 0Qianxiang Wang. Towards a rule model for self-adaptive software
8 -- 9Peter B. Henderson. Software Engineering Education (SEEd)
9 -- 0Peter G. Neumann. Risks to the public in computers and related systems
9 -- 18Peter G. Neumann. Risks to the public in computers and related systems
10 -- 0Lei Xu, Baowen Xu, Jixiang Jiang. Testing web applications focusing on their specialties
19 -- 27Mark Doernhoefer. Surfing the net for software engineering notes
33 -- 34Mordechai Ben-Menachem. Review of Interpreting the CMMI: A Process Improvement Approach by Margaret K. Kulpa and Kent A. Johnson . Auerbach Publications 2003
34 -- 0Mordechai Ben-Menachem. Review of Six Sigma Software Development by Christine B. Tayntor . Auerbach Publications, 2003
35 -- 36Haoyang Che. Review of The Object Primer, 3rd Edition by Scott W. Ambler . Cambridge University Press: Cambridge, 2004, 0-521-54018-6 (paperback)
35 -- 0Haoyang Che. Review of The Object Primer, 2nd Edition by Scott W. Ambler . Cambridge University Press: Cambridge, 2001, 0-521-785197 (paperback)
36 -- 0Haoyang Che. Review of Eclipse: Building Commercial Quality Plug-ins by Eric Clayberg and Dan Rubel . Addison Wesley, 2004, 0-321-22847-2 (paperback)
36 -- 37Ken Frazer. Review of Memory as a Programming Concept in C and C++ by Frantisek Franek . Cambridge University Press, 2004, (paperback), 0-521-52043-6
37 -- 38Brian Lawler. Review of CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition by Dennis M. Ahern, Aaron Clouse and Richard Turner . Addison Wesley, 2004, paperback, ISBN 0-321-18613-3
38 -- 39Joe Saur. Review of Software Reliability Engineering: More Reliable Software Faster and Cheaper - 2nd Edition by John Musa . AuthorHouse, Inc., 2004, Hardback, ISBN 1-4184-9388-0, Paperback, ISBN 1-4184-9387-2
38 -- 0Joe Saur. Review of Software Development for Small Teams: a RUP-Centric Approach by Gary Pollice, Liz Augustine, Chris Lowe, and Jas Madhur . Addison-Wesley, 2004, paperback, ISBN 0-321-19950-2