1 | -- | 3 | Sushil Krishna Bajracharya, Trung Chi Ngo, Cristina Videira Lopes. On using Net Options Value as a value based design framework |
1 | -- | 5 | Masao Ohira, Naoki Ohsugi, Tetsuya Ohoka, Ken-ichi Matsumoto. Accelerating cross-project knowledge collaboration using collaborative filtering and social networks |
1 | -- | 7 | Thomas Bauer, Jens Herrmann, Peter Liggesmeyer, Christopher Robinson-Mallett. A flexible integration strategy for in-car telematics systems |
1 | -- | 6 | Giovanni Denaro, Mauro Pezzè, Davide Tosi. Adaptive integration of third-party web services |
1 | -- | 5 | Keir Mierle, Kevin Laven, Sam T. Roweis, Greg Wilson. Mining student CVS repositories for performance indicators |
1 | -- | 6 | Israel Herraiz, Gregorio Robles, Jesús M. González-Barahona. Towards predictor models for large libre software projects |
1 | -- | 7 | Deepti Srivastava, Priya Narasimhan. Architectural support for mode-driven fault tolerance in distributed applications |
1 | -- | 6 | John C. Georgas, André van der Hoek, Richard N. Taylor. Architectural runtime configuration management in support of dependable self-adaptive software |
1 | -- | 7 | Chintan Amrit. Coordination in software development: the problem of task allocation |
1 | -- | 6 | Helen Sharp, Hugh Robinson. Some social factors of software engineering: the maverick, community and technical practices |
1 | -- | 5 | Iulian Neamtiu, Jeffrey S. Foster, Michael Hicks. Understanding source code evolution using abstract syntax tree matching |
1 | -- | 0 | Brian Henderson-Sellers. Agent-oriented methodologies: method engineering and metamodelling |
1 | -- | 7 | Henry Muccini, Marcio S. Dias, Debra J. Richardson. Towards software architecture-based regression testing |
1 | -- | 7 | Marcelo d Amorim, Klaus Havelund. Event-based runtime verification of java programs |
1 | -- | 5 | Zarrin Langari, Anne Banks Pidduck. Quality, cleanroom and formal methods |
1 | -- | 5 | Robert R. Painter, David Coppit. A model for software plans |
1 | -- | 7 | Weihang Wu, Tim Kelly. Failure modelling in software architecture design for safety |
1 | -- | 5 | LiGuo Huang, Barry W. Boehm. Determining how much software assurance is enough?: a value-based approach |
1 | -- | 5 | Akif Günes Koru, Hongfang Liu. An investigation of the effect of module size on defect prediction using static measures |
1 | -- | 4 | Xing Li, Ramesh Nagarajan. Modeling for image processing system validation, verification and testing |
1 | -- | 5 | Marius Marin, Leon Moonen, Arie van Deursen. An approach to aspect refactoring based on crosscutting concern types |
1 | -- | 4 | Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, Katsuro Inoue. ARIES: refactoring support tool for code clone |
1 | -- | 4 | Yuanfang Cai, Kevin J. Sullivan. A value-oriented theory of modularity in design |
1 | -- | 2 | Alexander Pretschner, Chris Salzmann, Thomas Stauner. 2nd Intl. ICSE Workshop on Software Engineering for Automotive Systems |
1 | -- | 7 | Renée C. Bryce, Charles J. Colbourn. Test prioritization for pairwise interaction coverage |
1 | -- | 7 | Anand Tripathi, Devdatta Kulkarni, Tanvir Ahmed. Policy-driven configuration and management of agent based distributed systems |
1 | -- | 7 | Sam Weber, Paul A. Karger, Amit M. Paradkar. A software flaw taxonomy: aiming tools at security |
1 | -- | 5 | Megan Conklin, James Howison, Kevin Crowston. Collaboration using OSSmole: a repository of FLOSS data and analyses |
1 | -- | 7 | Ben Breech, Lori L. Pollock. A framework for testing security mechanisms for program-based attacks |
1 | -- | 5 | Bonnie E. John. Evidence-based practice in human-computer interaction and evidence maps |
1 | -- | 7 | Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen. Requirements traceability to support evolution of access control |
1 | -- | 5 | Michael Fischer, Johann Oberleitner, Jacek Ratzinger, Harald Gall. Mining evolution data of a product family |
1 | -- | 7 | Dharini Balasubramaniam, Ronald Morrison, Graham N. C. Kirby, Kath Mickan, Brian Warboys, Ian Robertson, Bob Snowdon, R. Mark Greenwood, Wykeen Seet. A software architecture approach for structuring autonomic systems |
1 | -- | 5 | Haitham S. Hamza. Separation of concerns for evolving systems: a stability-driven approach |
1 | -- | 7 | Zaid Dwaikat, Francesco Parisi-Presicce. Risky trust: risk-based analysis of software systems |
1 | -- | 5 | Jing Liu, Robyn R. Lutz, Jeffrey M. Thompson. Mapping concern space to software architecture: a connector-based approach |
1 | -- | 7 | Emilia Farcas, Claudiu Farcas, Wolfgang Pree, Josef Templ. Real-time component integration based on transparent distribution |
1 | -- | 4 | LiGuo Huang, Barry W. Boehm. Using iDAVE to determine availability requirements |
1 | -- | 5 | Timo Koponen, Virpi Hotti. Open source software maintenance process framework |
1 | -- | 5 | Cristina Rossi, Andrea Bonaccorsi. Why profit-oriented companies enter the OS field?: intrinsic vs. extrinsic incentives |
1 | -- | 4 | Jarno Vähäniitty. A tentative framework for connecting long-term business and product planning with iterative & incremental software product development |
1 | -- | 3 | Dennis B. Smith, Edwin J. Morris, David J. Carney. Interoperability issues affecting autonomic computing |
1 | -- | 8 | Alessandro Garcia, Ricardo Choren, Carlos José Pereira de Lucena, Alexander Romanovsky, Holger Giese, Danny Weyns, Tom Holvoet, Paolo Giorgini. Software Engineering for Large-Scale Multi-Agent Systems - SELMAS 2005: workshop report |
1 | -- | 5 | Maha Shaikh, Tony Cornford. Learning/organizing in Linux: a study of the ::::spaces in between:::: |
1 | -- | 8 | Michael Dinkel, Uwe Baumgarten. Modeling nonfunctional requirements: a basis for dynamic systems management |
1 | -- | 5 | Ahilton Barreto, Márcio de Oliveira Barros, Cláudia Werner. Staffing a software project: a constraint satisfaction approach |
1 | -- | 6 | Wolfgang Zuser, Stefan Heil, Thomas Grechenig. Software quality development and assurance in RUP, MSF and XP: a comparative study |
1 | -- | 7 | Wes Masri, Andy Podgurski. Using dynamic information flow analysis to detect attacks against applications |
1 | -- | 5 | Masaru Ohba, Katsuhiko Gondow. Toward mining concept keywords from identifiers in large software projects |
1 | -- | 5 | José J. Pazos Arias, Jorge García Duque, Martín López Nores. Eliciting requirements and scenarios using the SCTL-MUS methodology: the shuttle system case study |
1 | -- | 4 | Jing Dong, Sheng Yang, Lawrence Chung, Paulo S. C. Alencar, Donald D. Cowan. A COTS architectural component specification stencil for selection and reasoning |
1 | -- | 6 | Paul Grisham, Dewayne E. Perry. Customer relationships and Extreme Programming |
1 | -- | 7 | Minseong Kim, Jaemin Jeong, Sooyong Park. From product lines to self-managed systems: an architecture-based runtime reconfiguration framework |
1 | -- | 5 | Naoyasu Ubayashi, Tetsuo Tamai. Concern management for constructing model compilers |
1 | -- | 5 | Francisco Hernández, Purushotham Bangalore, Kevin D. Reilly. End-user tools for grid computing |
1 | -- | 6 | Markus Clermont. Heuristics for the automatic identification of irregularities in spreadsheets |
1 | -- | 7 | Fernando Castor Filho, Patrick H. S. Brito, Cecília M. F. Rubira. A framework for analyzing exception flow in software architectures |
1 | -- | 6 | Joseph R. Ruthruff, Margaret M. Burnett. Six challenges in supporting end-user debugging |
1 | -- | 7 | Maarten Rits, Benjamin De Boe, Andreas Schaad. XacT: a bridge between resource management and access control in multi-layered applications |
1 | -- | 7 | Rean Griffith, Gail E. Kaiser. Manipulating managed execution runtimes to support self-healing systems |
1 | -- | 5 | Jing Zhang, Jeffrey G. Gray, Yuehua Lin. A model-driven approach to enforce crosscutting assertion checking |
1 | -- | 4 | Andrew J. Ko, Brad A. Myers. Human factors affecting dependability in end-user programming |
1 | -- | 5 | Abram Hindle, Daniel M. Germán. SCQL: a formal model and a query language for source control repositories |
1 | -- | 3 | Michael M. Pickard. Old issues, new eyes |
1 | -- | 6 | Joakim Fröberg, Kristian Sandström, Christer Norström. Business situation reflected in automotive electronic architectures: analysis of four commercial cases |
1 | -- | 6 | Alistair G. Sutcliffe. Applying small group theory to analysis and design of CSCW systems |
1 | -- | 3 | Martin P. Robillard, Gail C. Murphy. Just-in-time concern modeling |
1 | -- | 5 | Kevin C. Desouza, Yukika Awazu. Managing radical software engineers: between order and chaos |
1 | -- | 5 | Bart Massey. Longitudinal analysis of long-timescale open source repository data |
1 | -- | 5 | Ghassan Beydoun, Cesar Gonzalez-Perez, Graham Low, Brian Henderson-Sellers. Synthesis of a generic MAS metamodel |
1 | -- | 5 | Xiaoqing Wu, Barrett R. Bryant, Jeffrey G. Gray, Marjan Mernik. Pattern transformation for two-dimensional separation of concerns |
1 | -- | 4 | Mohammad Ahmad Munawar, Paul A. S. Ward. Better performance or better manageability? |
1 | -- | 7 | Scott D. Fleming, Betty H. C. Cheng, R. E. Kurt Stirewalt, Philip K. McKinley. An approach to implementing dynamic adaptation in C++ |
1 | -- | 4 | Brian Henderson-Sellers, Cesar Gonzalez-Perez, M. K. Serour, Donald G. Firesmith. Method engineering and COTS evaluation |
1 | -- | 6 | Naveed Arshad, Dennis Heimbigner, Alexander L. Wolf. Dealing with failures during failure recovery of distributed systems |
1 | -- | 7 | Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel. Enabling control over adaptive program transformation for dynamically evolving mobile software validation |
1 | -- | 6 | Ying Zhou, Joseph Davis. Open source software reliability model: an empirical approach |
1 | -- | 3 | Yvonne Dittrich, Kari Rönkkö, Olle Lindeberg, Jeanette Erickson, Christina Hansson. Co-Operative Method Development revisited |
1 | -- | 6 | V. Vipindeep, Pankaj Jalote. Efficient static analysis with path pruning using coverage data |
1 | -- | 6 | Medha Umarji, Carolyn B. Seaman. Predicting acceptance of Software Process Improvement |
1 | -- | 6 | Michael John, Frank Maurer, Bjørnar Tessem. Human and social factors of software engineering: workshop summary |
1 | -- | 3 | Akif Günes Koru, A. Ant Ozok, Anthony F. Norcio. The effect of human memory organization on code reviews under different single and pair code reviewing scenarios |
1 | -- | 7 | Esperanza Marcos. Software engineering research versus software development |
1 | -- | 4 | Annya Réquilé-Romanczuk, Alejandra Cechich, Anne Dourgnon-Hanoune, Jean-Christophe Mielnik. Towards a knowledge-based framework for COTS component identification |
1 | -- | 0 | David Garlan, Marin Litoiu, Hausi A. Müller, John Mylopoulos, Dennis B. Smith, Kenny Wong. DEAS 2005: workshop on the design and evolution of autonomic application software |
1 | -- | 4 | Judith Segal, Antony Grinyer, Helen Sharp. The type of evidence produced by empirical software engineers |
1 | -- | 5 | Jaime Spacco, Jaymie Strecker, David Hovemeyer, William Pugh. Software repository mining with Marmoset: an automated programming project snapshot and testing system |
1 | -- | 6 | Fredrik Pettersson, Martin Ivarsson, Peter Öhman. Automotive use case standard for embedded systems |
1 | -- | 6 | Pablo Barrera, Gregorio Robles, José María Cañas, Francisco Martín, Vicente Matellán. Impact of libre software tools and methods in the robotics field |
1 | -- | 7 | Rohan Sen, Gregory Hackmann, Gruia-Catalin Roman, Christopher D. Gill. Opportunistic exploitation of knowledge to increase predictability of agent interactions in MANETs |
1 | -- | 5 | Shih-Kun Huang, Kang-min Liu. Mining version histories to verify the learning process of Legitimate Peripheral Participants |
1 | -- | 5 | Hélio R. Costa, Márcio de Oliveira Barros, Guilherme Horta Travassos. A risk based economical approach for evaluating software project portfolios |
1 | -- | 7 | Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen. Towards a unifying view on security contracts |
1 | -- | 4 | K. K. Aggarwal, Yogesh Singh, Pravin Chandra, Manimala Puri. Sensitivity analysis of fuzzy and neural network models |
1 | -- | 7 | WenQian Liu, Charles L. Chen, Vidya Lakshminarayanan, Dewayne E. Perry. A design for evidence - based soft research |
1 | -- | 5 | Albert Schilling, Kelma Madeira, Paula Donegan, Kênia Soares Sousa, Elizabeth Furtado, Vasco Furtado. An integrated method for designing user interfaces based on tests |
1 | -- | 7 | David McGuinness, Liam Murphy. A simulation model of a multi-server EJB system |
1 | -- | 5 | Chadd C. Williams, Jeffrey K. Hollingsworth. Recovering system specific rules from software repositories |
1 | -- | 7 | Mayur Palankar, Jonathan E. Cook. Merging traces of hardware-assisted data breakpoints |
1 | -- | 7 | Marwan Abi-Antoun, Jonathan Aldrich, David Garlan, Bradley R. Schmerl, Nagi H. Nahas, Tony Tseng. Improving system dependability by enforcing architectural intent |
1 | -- | 2 | Alessandro Garcia, Ricardo Choren, Carlos José Pereira de Lucena, Alexander Romanovsky, Tom Holvoet, Paolo Giorgini. Software engineering for large-scale multi-agent systems - SELMAS 05 |
1 | -- | 6 | Carolyn Mair, Martin J. Shepperd, Magne Jørgensen. An analysis of data sets used to train and validate cost prediction systems |
1 | -- | 5 | Walt Scacchi. OpenEC/B: electronic commerce and free/open source software development |
1 | -- | 4 | Uzma Raja, Evelyn J. Barry. Investigating quality in large-scale Open Source Software |
1 | -- | 4 | Abdallah Mohamed, Günther Ruhe, Armin Eberlein. Decision support for customization of the COTS selection process |
1 | -- | 6 | Steven P. Reiss. Dynamic detection and visualization of software phases |
1 | -- | 7 | Erika Mir Olimpiew, Hassan Gomaa. Model-based testing for applications derived from software product lines |
1 | -- | 4 | Jiang Zheng, Brian Robinson, Laurie Williams, Karen Smiley. A process for identifying changes when source code is not available |
1 | -- | 7 | Alexei Lapouchnian, Sotirios Liaskos, John Mylopoulos, Yijun Yu. Towards requirements-driven autonomic systems design |
1 | -- | 7 | Nancy R. Mead, Ted Stehney. Security quality requirements engineering (SQUARE) methodology |
1 | -- | 6 | Zhihao Chen, Tim Menzies, Daniel Port, Barry W. Boehm. Feature subset selection can improve software cost estimation accuracy |
1 | -- | 5 | Gregorio Robles, Jesús M. González-Barahona. Developer identification methods for integrated data from various sources |
1 | -- | 7 | Michael E. Shin, Daniel Cooke. Connector-based self-healing mechanism for components of a reliable system |
1 | -- | 7 | Sergiy Boroday, Alexandre Petrenko, J. Singh, Hesham Hallal. Dynamic analysis of java applications for multithreaded antipatterns |
1 | -- | 6 | Lihua Xu, Hadar Ziv, Debra J. Richardson, Thomas A. Alspaugh. An architectural pattern for non-functional dependability requirements |
1 | -- | 5 | Mazen Saleh, Hassan Gomaa. Separation of concerns in software product line engineering |
1 | -- | 7 | Marin Litoiu, C. Murray Woodside, Tao Zheng. Hierarchical model-based autonomic control of software systems |
1 | -- | 5 | Michael Bolin, Robert C. Miller. Naming page elements in end-user web automation |
1 | -- | 6 | Tim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn. Simple software cost analysis: safe or unsafe? |
1 | -- | 5 | Thomas A. Alspaugh, Debra J. Richardson, Thomas A. Standish. Scenarios, state machines and purpose-driven testing |
1 | -- | 7 | William G. J. Halfond, Alessandro Orso. Combining static analysis and runtime monitoring to counter SQL-injection attacks |
1 | -- | 6 | Ulrik Eklund, Örjan Askerdal, Johan Granholm, Anders Alminger, Jakob Axelsson. Experience of introducing reference architectures in the development of automotive electronic systems |
1 | -- | 7 | Michael Gegick, Laurie Williams. Matching attack patterns to security vulnerabilities in software-intensive system designs |
1 | -- | 7 | Danny Weyns, Kurt Schelfthout, Tom Holvoet. Architectural design of a distributed application with autonomic quality requirements |
1 | -- | 6 | Jewgenij Botaschanjan, Leonid Kof, C. Kühnel, Maria Spichkova. Towards verified automotive software |
1 | -- | 5 | Daniel M. Germán, Davor Cubranic, Margaret-Anne D. Storey. A framework for describing and understanding mining tools in software development |
1 | -- | 5 | Annie T. T. Ying, James L. Wright, Steven Abrams. Source code that talks: an exploration of Eclipse task comments and their implication to repository mining |
1 | -- | 6 | Stefan Wagner, Tilman Seifert. Software quality economics for defect-detection techniques using failure prediction |
1 | -- | 6 | Xiaoqing Frank Liu, Yan Sun, Gautam Kane, Yuji Kyoya, Kunio Noguchi. QFD application in software process management and improvement based on CMM |
1 | -- | 3 | Hema Srikanth, Laurie Williams. On the economics of requirements-based test case prioritization |
1 | -- | 4 | Jyrki Kontio, Jani-Pekka Jokinen, Markus M. Mäkelä, Virve Leino. Current practices and research opportunities in software business models |
1 | -- | 7 | Karun N. Biyani, Sandeep S. Kulkarni. Building component families to support adaptation |
1 | -- | 7 | Seyed Masoud Sadjadi, Philip K. McKinley, Betty H. C. Cheng. Transparent shaping of existing software to support pervasive and autonomic computing |
1 | -- | 5 | José J. Pazos Arias, Jorge García Duque, Martín López Nores. Locating crosscutting concerns in the formal specification of distributed reactive systems |
1 | -- | 5 | Thomas Neubauer, Markus D. Klemen, Stefan Biffl. Business process-based valuation of IT-security |
1 | -- | 7 | Ashraf Gaffar, Ahmed Seffah, John A. van der Poll. HCI pattern semantics in XML: a pragmatic approach |
1 | -- | 6 | Monvorath Phongpaibul, Barry W. Boehm. Improving quality through software process improvement in Thailand: initial analysis |
1 | -- | 6 | Ingo Stürmer, Daniela Weinberg, Mirko Conrad. Overview of existing safeguarding techniques for automatically generated code |
1 | -- | 5 | Marc Fisher II, Gregg Rothermel. The EUSES spreadsheet corpus: a shared resource for supporting experimentation with spreadsheet dependability mechanisms |
1 | -- | 8 | Kurt Schelfthout, Tom Holvoet, Yolande Berbers. Views: customizable abstractions for contextaware applications in MANETs |
1 | -- | 0 | Hans-Dieter Ehrich. Harmonizing intra- and inter-object specification and verification: a multi-object logics approach |
1 | -- | 5 | Katherine J. Stewart, David P. Darcy, Sherae L. Daniel. Observations on patterns of development in open source software projects |
1 | -- | 4 | Kendra Cooper, Lawrence Chung. Managing change in an OTS-aware requirements engineering approach |
1 | -- | 7 | Fabrice Bouquet, Eddie Jaffuel, Bruno Legeard, Fabien Peureux, Mark Utting. Requirements traceability in automated test generation: application to smart card software validation |
1 | -- | 4 | Anna Persson, Henrik Gustavsson, Brian Lings, Björn Lundell, Anders Mattsson, Ulf Ärlig. OSS tools in a heterogeneous environment for embedded systems modelling: an analysis of adoptions of XMI |
1 | -- | 5 | Judith Segal. Two principles of end-user software engineering research |
1 | -- | 4 | Alistair G. Sutcliffe. Evaluating the costs and benefits of end-user development |
1 | -- | 4 | Piotr Kaminski, Priyanka Agrawal, Holger M. Kienle, Hausi A. Müller. <username>, i need you!: initiative and interaction in autonomic systems |
1 | -- | 5 | Christopher Scaffidi, Ashish Arora, Shawn Butler, Mary Shaw. A value-based approach to predicting system properties from design |
1 | -- | 7 | Peter B. Lakey. Model-based specification and testing applied to the Ground-Based Midcourse Defense (GMD) system: an industry report |
1 | -- | 5 | Giuliano Antoniol, Vincenzo Fabio Rollo, Gabriele Venturi. Linear predictive coding and cepstrum coefficients for mining time variant information from software repositories |
1 | -- | 3 | Barbara A. Kitchenham, David Budgen, Pearl Brereton, Stephen G. Linkman. Realising evidence-based software engineering |
1 | -- | 6 | Simon Giesecke, Timo Warns, Wilhelm Hasselbring. Availability simulation of peer-to-peer architectural styles |
1 | -- | 7 | Ömer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter. DISCOA: architectural adaptations for security and QoS |
1 | -- | 2 | Lori L. Pollock, James Andrews. ICSE 2005 workshop summary third international workshop on dynamic analysis (WODA 2005) |
1 | -- | 7 | Jessica Sant, Amie Souter, Lloyd Greenwald. An exploration of statistical models for automated test case generation |
1 | -- | 3 | Susan L. Spraragen. The challenges in creating tools for improving the software development lifecycle |
1 | -- | 5 | Jacek Sliwerski, Thomas Zimmermann, Andreas Zeller. When do changes induce fixes? |
1 | -- | 7 | Alessandro Orso, Bryan Kennedy. Selective capture and replay of program executions |
1 | -- | 5 | Bradley Simmons, Hanan Lutfiyya. Policies, grids and autonomic computing |
1 | -- | 5 | Sunghun Kim, Jim Whitehead, Jennifer Bevan. Analysis of signature change patterns |
1 | -- | 6 | Zahia Guessoum, Nora Faci, Jean-Pierre Briot. Adaptive replication of large-scale multi-agent systems: towards a fault-tolerant multi-agent platform |
1 | -- | 6 | Vijay K. Gurbani, Anita Garvert, James D. Herbsleb. A case study of open source tools and practices in a commercial setting |
1 | -- | 7 | Christopher Robinson-Mallett, Peter Liggesmeyer, Tilo Mücke, Ursula Goltz. Generating optimal distinguishing sequences with a model checker |
1 | -- | 4 | Rogério de Lemos, Alexander Romanovsky. ICSE 2005 Workshop on Architecting Dependable Systems (WADS 2005) |
1 | -- | 4 | Herwig Mannaert, Kris Ven. The use of open source software platforms by Independent Software Vendors: issues and opportunities |
1 | -- | 5 | Juri Memmert. Concern patterns and analysis |
1 | -- | 7 | S. Michelle Young, Helen M. Edwards, Sharon McDonald, J. Barrie Thompson. Personality characteristics in an XP team: a repertory grid study |
1 | -- | 5 | Genaína Nunes Rodrigues, David S. Rosenblum, Sebastián Uchitel. Sensitivity analysis for a scenario-based reliability prediction model |
1 | -- | 5 | Patrick Keil. Principal agent theory and its application to analyze outsourcing of software development |
1 | -- | 5 | Sebastian Kiebusch, Bogdan Franczyk, Andreas Speck. Metrics for software system families |
1 | -- | 5 | Kirk Sayre. Usage model-based automated testing of C++ templates |
1 | -- | 8 | Florian Klein, Holger Giese. Analysis and design of physical and social contexts in multi-agent systems using UML |
1 | -- | 7 | Uri Dekel. Supporting distributed software design meetings: what can we learn from co-located meetings? |
1 | -- | 6 | Joost Noppen, Pim van den Broek, Mehmet Aksit. Dealing with imprecise quality factors in software design |
1 | -- | 3 | Martin P. Robillard. Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005) |
1 | -- | 7 | Miroslaw Staron, Ludwik Kuzniarz, Christian Thurn. An empirical assessment of using stereotypes to improve reading techniques in software inspections |
1 | -- | 5 | Miryung Kim, David Notkin. Using a clone genealogy extractor for understanding and supporting evolution of code clones |
1 | -- | 4 | Xavier Franch, Marco Torchiano. Towards a reference framework for COTS-based development: a proposal |
1 | -- | 7 | Somo Banerjee, Chris Mattmann, Nenad Medvidovic, Leana Golubchik. Leveraging architectural models to inject trust into software systems |
1 | -- | 4 | Tariq Al-Naeem, Ian Gorton, Fethi A. Rabhi, Boualem Benatallah. Tool support for optimization-based architectural evaluation |
1 | -- | 7 | Alan F. Karr, Adam A. Porter. Distributed performance testing using statistical modeling |
1 | -- | 5 | Laurie Williams, Lucas Layman, Pekka Abrahamsson. On establishing the essential components of a technology-dependent framework: a strawman framework for industrial case study-based research |
1 | -- | 5 | Christopher Scaffidi, Mary Shaw, Brad A. Myers. An approach for categorizing end user programmers to guide software engineering research |
1 | -- | 7 | Toacy Cavalcante de Oliveira, Paulo S. C. Alencar, Donald D. Cowan, Carlos José Pereira de Lucena. xTAO: enabling a declarative approach to the specification of multi-agent systems |
1 | -- | 5 | Austen Rainer, Dorota Jagielska, Tracy Hall. Software engineering practice versus evidence-based software engineering research |
1 | -- | 0 | Robert V. Binder, James E. Hanlon. The advanced mobile application testing environment |
1 | -- | 6 | Gerardo Canfora, Piero Corte, Antonio De Nigro, Debora Desideri, Massimiliano Di Penta, Raffaele Esposito, Amedeo Falanga, Gloria Renna, Rita Scognamiglio, Francesco Torelli, Maria Luisa Villani, Paolo Zampognaro. The C-Cube framework: developing autonomic applications through web services |
1 | -- | 7 | Osamah A. Rawashdeh, Garrett D. Chandler, James E. Lumpp Jr.. A UAU test and development environment based on dynamic system reconfiguration |
1 | -- | 7 | Lúcia R. D. Bastos, Jaelson Castro. From requirements to multi-agent architecture using organisational concepts |
1 | -- | 3 | Grace Tai. A communication architecture from rapid prototyping |
1 | -- | 7 | Markus Clermont, David Lorge Parnas. Using information about functions in selecting test cases |
1 | -- | 7 | Nachiappan Nagappan, Laurie Williams, Mladen A. Vouk, Jason Osborne. Early estimation of software quality using in-process testing metrics: a controlled case study |
1 | -- | 6 | David Shepherd, Lori L. Pollock, Tom Tourwé. Using language clues to discover crosscutting concerns |
1 | -- | 4 | Wesley Coelho, Gail C. Murphy. ActiveAspect: presenting crosscutting structure |
1 | -- | 4 | Annie T. T. Ying, James L. Wright, Steven Abrams. An exploration of how comments are used for marking related code fragments |
1 | -- | 3 | Jai Asundi. The need for effort estimation models for open source software projects |
1 | -- | 2 | Danilo Bruschi, Bart De Win, Mattia Monga. Software engineering for secure systems |
1 | -- | 7 | Christian Bartelt, Thomas Fischer, Dirk Niebuhr, Andreas Rausch, Franz Seidl, Marcus Trapp. Dynamic integration of heterogeneous mobile devices |
1 | -- | 7 | Ji Zhang, Betty H. C. Cheng. Specifying adaptation semantics |
1 | -- | 4 | K. K. Aggarwal, Yogesh Singh, Pravin Chandra, Manimala Puri. Evaluation of various training algorithms in a neural network model for software engineering applications |
1 | -- | 3 | Russell Ovans. All we really need to know about software engineering is in the film ::::office space:::: |
1 | -- | 5 | Carol A. Wellington, Thomas H. Briggs, C. Dudley Girard. Examining team cohesion as an effect of software engineering methodology |
1 | -- | 6 | Barry W. Boehm. Value-based quality processes and results |
1 | -- | 7 | Scott A. DeLoach. Multiagent systems engineering of organization-based multiagent systems |
1 | -- | 6 | Gary D. Boetticher. Nearest neighbor sampling for better defect prediction |
1 | -- | 5 | Holger Giese, Ekkart Kindler, Florian Klein, Robert Wagner. Reconciling scenario-centered controller design with state-based system models |
1 | -- | 4 | Brenda Chawner. F/OSS in the library world: an exploration |
1 | -- | 6 | Bruce W. Weide, Paolo Bucci, Wayne D. Heym, Murali Sitaraman, Giorgio Rizzoni. Issues in performance certification for high-level automotive control software |
1 | -- | 7 | Rob Weaver, Georgios Despotou, Tim Kelly, John A. McDermid. Combining software evidence: arguments and assurance |
1 | -- | 4 | Fidel Nkwocha, Sebastian G. Elbaum. Fault patterns in Matlab |
1 | -- | 4 | Qun Yang, Xian-Chun Yang, Man-Wu Xu. A framework for dynamic software architecture-based self-healing |
1 | -- | 4 | Paul Adams, Cornelia Boldyreff, David Nutter, Stephen Rank. Adaptive reuse of libre software systems for supporting on-line collaboration |
1 | -- | 5 | Amy Law, Raylene Charron. Effects of agile practices on social factors |
1 | -- | 6 | Ingolf H. Krüger, Reena Mathew, Michael Meisinger. From scenarios to aspects: exploring product lines |
1 | -- | 5 | Jennifer Morris, Philip Koopman. Representing design tradeoffs in safety-critical systems |
1 | -- | 7 | Xia Cai, Michael R. Lyu. The effect of code coverage on fault detection under different testing profiles |
1 | -- | 7 | Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock, Amie L. Souter. Analyzing clusters of web application user sessions |
1 | -- | 5 | Jacek Ratzinger, Michael Fischer, Harald Gall. Improving evolvability through refactoring |
1 | -- | 7 | Christopher M. Lott, Ashish Jain, Siddhartha R. Dalal. Modeling requirements for combinatorial software testing |
1 | -- | 8 | Koenraad Mertens, Tom Holvoet, Yolande Berbers. A case for adaptation of the distributed environment layout in multiagent applications |
1 | -- | 5 | Vladimir Jakobac, Nenad Medvidovic, Alexander Egyed. Separating architectural concerns to ease program understanding |
1 | -- | 4 | Vahe Poladian, João Pedro Sousa, Frank Padberg, Mary Shaw. Anticipatory configuration of resource-aware applications |
1 | -- | 6 | John C. Georgas, Michael M. Gorlick, Richard N. Taylor. Raging incrementalism: harnessing change with open-source software |
1 | -- | 7 | Karsten Sohr, Gail-Joon Ahn, Lars Migge. Articulating and enforcing authorisation policies with UML and OCL |
1 | -- | 7 | Josh Dehlinger, Robyn R. Lutz. A product-line requirements approach to safe reuse in multi-agent systems |
1 | -- | 0 | Naftaly H. Minsky. Law-governed multi-agent systems: from anarchy to order |
1 | -- | 4 | M. Todd Gamble, Rose F. Gamble, Michelle Hepner. Understanding solution architecture concerns |
1 | -- | 5 | Sherif A. Gurguis, Amir Zeid. Towards autonomic web services: achieving self-healing using web services |
1 | -- | 7 | Jie Ren, Richard N. Taylor, Paul Dourish, David F. Redmiles. Towards an architectural treatment of software security: a connector-centric approach |
1 | -- | 6 | Robert Schaefer. Deeper questions: the metaproblem of large organizations developing complex systems and the limits of process |
1 | -- | 5 | Robin Abraham, Martin Erwig. How to communicate unit error messages in spreadsheets |
1 | -- | 5 | Carsten Görg, Peter Weißgerber. Error detection by refactoring reconstruction |
1 | -- | 6 | Mark Sherriff, Nachiappan Nagappan, Laurie Williams, Mladen A. Vouk. Early estimation of defect density using an in-process Haskell metrics model |
1 | -- | 6 | Mikhail Auguston, James Bret Michael, Man-tak Shing. Environment behavior models for scenario generation and testing automation |
1 | -- | 6 | Sebastian Kiebusch, Bogdan Franczyk, Andreas Speck. A real time measure of software system families |
1 | -- | 7 | Amit M. Paradkar. Case studies on fault detection effectiveness of model based test generation techniques |
1 | -- | 4 | Muhammad Raza Ali. Why teach reverse engineering? |
1 | -- | 7 | Mazeiar Salehie, Ladan Tahvildari. Autonomic computing: emerging trends and open problems |
1 | -- | 5 | Jane Huffman Hayes, Alex Dekhtyar, Senthil Karthikeyan Sundaram. Text mining for software engineering: how analyst feedback impacts final results |
1 | -- | 6 | Leif Geiger, Albert Zündorf. Story driven testing - SDT |
1 | -- | 5 | Eve MacGregor, Yvonne Hsieh, Philippe Kruchten. Cultural patterns in software process mishaps: incidents in global projects |
1 | -- | 3 | Marcus Ciolkowski, Jürgen Münch. Accumulation and presentation of empirical evidence: problems and challenges |
1 | -- | 7 | Niklas Pettersson. Measuring precision for static and dynamic design pattern recognition as a function of coverage |
1 | -- | 4 | Michael VanHilst, Pankaj K. Garg, Christopher Lo. Repository mining and Six Sigma for process improvement |
1 | -- | 4 | Lutz Prechelt, Daniel J. Hutzel. Market forces and end-user programming for mission-critical systems |
1 | -- | 5 | Apurva Jain, Barry W. Boehm. Developing a theory of value-based software engineering |
1 | -- | 8 | Nadeem Jamali, Shangping Ren. A layered architecture for real-time distributed multi-agent systems |
1 | -- | 7 | Seok-Won Lee, Robin A. Gandhi, Gail-Joon Ahn. Establishing trustworthiness in services of the critical infrastructure through certification and accreditation |
1 | -- | 5 | Huzefa H. Kagdi, Michael L. Collard, Jonathan I. Maletic. Towards a taxonomy of approaches for mining of source code repositories |
1 | -- | 7 | John Viega. Building security requirements with CLASP |
1 | -- | 7 | Georgine Beranek, Wolfgang Zuser, Thomas Grechenig. Functional group roles in software engineering teams |
1 | -- | 6 | Senthil Karthikeyan Sundaram, Jane Huffman Hayes, Alex Dekhtyar. Baselines in requirements tracing |
1 | -- | 5 | William H. Harrison, Harold Ossher, Stanley M. Sutton Jr., Peri L. Tarr. Concern modeling in the concern manipulation environment |
1 | -- | 7 | Robert W. Bowdidge. Refactoring gcc using structure field access traces and concept analysis |
1 | -- | 7 | Carmen Zannier, Frank Maurer. A qualitative empirical evaluation of design decisions |
1 | -- | 4 | Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Christian Bunse, Umair Khan, Maurizio Morisio, Marco Torchiano. Barriers to disseminating off-the-shelf based development theories to IT industry |
1 | -- | 5 | Tsong Yueh Chen, Fei-Ching Kuo, Zhiquan Zhou. An effective testing method for end-user programmers |
1 | -- | 7 | Michael G. Merideth, Priya Narasimhan. Retrofitting networked applications to add autonomic reconfiguration |
6 | -- | 0 | Peter B. Henderson. Software Engineering Education (SEEd) |
6 | -- | 8 | David Lorge Parnas, Lillian Chik-Parnas. Goals for software engineering student education |
7 | -- | 6 | Matthias Tichy, Holger Giese, Daniela Schilling, Wladimir Pauls. Computing optimal self-repair actions: damage minimization versus repair time |
8 | -- | 0 | Joe Saur. Project management: here we go again! |
8 | -- | 9 | Michael Wing. In praise of SE Geeks |
10 | -- | 18 | Mark Doernhoefer. Surfing the net for software engineering notes |
19 | -- | 35 | Peter G. Neumann. Risks to the public |
82 | -- | 83 | Mordechai Ben-anachem. Review of Software Endgames: Eliminating Defects, Controlling Change, and the Countdown to On-Time Delivery by Robert Galen , Dorset House, ISBN: 0-932633-62-5, 2005 |
83 | -- | 84 | Garry S. Marliss. Review of Systems Modeling & Requirements Specification Using ECSAM: An Analysis Method for Embedded and Computer-Based Systems by Jonah Z. Lavi and Joseph Kudish , Dorset House Publishing Co. Inc., 2005, ISBN 0-932633-45-5 |
83 | -- | 0 | Haoyang Che. Review of Agile Modeling: Effective Practice for eXtreme Programming and the Unified Process by Scott W. Ambler , John Wiley & Sons, Inc, 2002, 0-471-20282-7 |