1 | -- | 8 | Yu Qu, Xiaohong Guan, Qinghua Zheng, Ting Liu, Jianliang Zhou, Jian Li. Calling Network: A New Method for Modeling Software Runtime Behaviors |
1 | -- | 5 | Peter Anderson, Nick Vrvilo, Eric Mercer, Vivek Sarkar. JPF Verification of Habanero Java Programs using Gradual Type Permission Regions |
1 | -- | 6 | Gurpreet Singh Matharu, Anju Mishra, Harmeet Singh, Priyanka Upadhyay. Empirical Study of Agile Software Development Methodologies: A Comparative Analysis |
1 | -- | 5 | Jaideep Ramachandran, Corina S. Pasareanu, Thomas Wahl. Symbolic Execution for Checking the Accuracy of Floating-Point Programs |
1 | -- | 6 | Ashish Kumar Dwivedi, Santanu Kumar Rath. Incorporating Security Features in Service-Oriented Architecture using Security Patterns |
1 | -- | 8 | Neha Singh, Kirti Tyagi. A Literature Review of the Reliability of Composite Web Service in Service-Oriented Architecture |
1 | -- | 8 | Shivani Rao, Henry Medeiros, Avinash C. Kak. Comparing Incremental Latent Semantic Analysis Algorithms for Efficient Retrieval from Software Libraries for Bug Localization |
1 | -- | 13 | Souvik Sengupta, Ranjan Dasgupta. Use of Semi-Formal and Formal Methods in Requirement Engineering of ILMS |
1 | -- | 4 | Stuart Siroky, Rodion M. Podorozhny, Guowei Yang. Verification of Architectural Constraints on Sequences of Method Invocations |
1 | -- | 5 | Justin Lloyd, Elena Sherman. Minimizing the Size of Path Conditions Using Convex Polyhedra Abstract Domain |
1 | -- | 4 | Giacinto Giacinto Caldarola, Antonio Picariello, Daniela Castelluccia. Modern Enterprises in the Bubble: Why Big Data Matters |
1 | -- | 5 | Simone Hanazumi, Ana Cristina Vieira de Melo, Corina S. Pasareanu. From Test Purposes to Formal JPF Properties |
1 | -- | 5 | Murat Yilmaz, Rory V. O'Connor, Paul Clarke. Software Development Roles: A Multi-Project Empirical Investigation |
1 | -- | 8 | Prasad Bokil, Padmanabhan Krishnan, R. Venkatesh. Achieving Effective Test Suites for Reactive Systems using Specification Mining and Test Suite Reduction Techniques |
1 | -- | 5 | Quoc-Sang Phan, Pasquale Malacaria, Corina S. Pasareanu. Concurrent Bounded Model Checking |
1 | -- | 8 | Giles Reger, Howard Barringer, David E. Rydeheard. Automata-based Pattern Mining from Imperfect Traces |
1 | -- | 4 | Dino Mandrioli, Matteo Pradella. Programming Languages shouldn't be "too Natural" |
1 | -- | 5 | Marko Dimjasevic, Dimitra Giannakopoulou, Falk Howar, Malte Isberner, Zvonimir Rakamaric, Vishwanath Raman. The Dart, the Psyco, and the Doop: Concolic Execution in Java PathFinder and its Applications |
1 | -- | 12 | Jawwad Wasat Shareef, R. K. Pandey. Design of a Component Interface Complexity Measurement Tool for Component-Based Systems |
1 | -- | 8 | P. V. Srinivas Acharyulu, P. Seetharamaiah. A Measures and Metrics Framework for Software Safety |
1 | -- | 8 | Philip Makedonski, Fabian Sudau, Jens Grabowski. Towards a Model-based Software Mining Infrastructure |
1 | -- | 8 | Sabih Agbaria, Joseph Gil. On Incomplete Bug Fixes in Eclipse and Programmers' Intuition on These |
1 | -- | 10 | Muhammed Maruf Öztürk, Ibrahim Cil, Ahmet Zengin. Development of a Multi-Agent Framework for Software Quality |
1 | -- | 8 | Miao Du, Steven Versteeg, Jean-Guy Schneider, Jun Han, John C. Grundy. Interaction Traces Mining for Efficient System Responses Generation |
1 | -- | 5 | Rody Kersten, Suzette Person, Neha Rungta, Oksana Tkachuk. Improving Coverage of Test Cases Generated by Symbolic PathFinder for Programs with Loops |
1 | -- | 2 | Ming Li 0005, Hongyu Zhang, David Lo, Lucia. Improving Software Quality and Productivity Leveraging Mining Techniques: [Summary of the Second Workshop on Software Mining, at ASE 2013] |
1 | -- | 5 | Heila van der Merwe, Oksana Tkachuk, Brink van der Merwe, Willem Visser. Generation of Library Models for Verification of Android Applications |
1 | -- | 4 | Rakesh Kumar, Hardeep Singh. A Proactive Procedure to Mitigate the BYOD Risks on the Security of an Information System |
1 | -- | 7 | B. Esther Sunanda, P. Seetharamaiah. Modeling of Safety-Critical Systems Using Petri Nets |
1 | -- | 5 | Kawal Jeet, Renu Dhir. Software Architecture Recovery using Genetic Black Hole Algorithm |
5 | -- | 7 | Robert Schaefer. Pathologies of Compliance: Industrial Disease |
7 | -- | 8 | Tao Xie. Learning and Celebration of Software Engineering History and Impact |
8 | -- | 9 | Alex Groce. Passages |
10 | -- | 18 | Mark Doernhoefer. Surfing the Net for Software Engineering Notes |
19 | -- | 26 | Peter G. Neumann. Risks to the Public |
26 | -- | 29 | Sebastian Götz, Nelly Bencomo, Robert B. France. Devising the Future of the Models@run.time Workshop |
30 | -- | 34 | Neil B. Harrison, Uwe van Heesch, Stefan Sobernig, Peter Sommerlad, Martin Filipczyk, Alexander Fülleborn, Angelika Musil, Juergen Musil. Software Architecture Patterns: Reflection and Advances: [Summary of the MiniPLoP Writers' Workshop at ECSA'14] |
35 | -- | 37 | Thomas J. Misa. ACM History Committee Archiving Workshop |
38 | -- | 39 | Chang Xu, Laura K. Dillon. SEES Summary: Software Engineering Educators Symposium 2014 |
40 | -- | 43 | Ashish Sureka, Y. Raghu Reddy, Pornsiri Muenchaisri, Masateru Tsunoda. A Report on Software Engineering Education Workshop (SEEW) 2014 Co-Located with Asia-Pacific Software Engineering Conference 2014 |
51 | -- | 52 | Jared Herzog. Software Architecture in Practice Third Edition Written by Len Bass, Paul Clements, Rick Kazman |