Journal: IEEE Trans. Software Eng.

Volume 34, Issue 6

723 -- 737Emilia Mendes, Nile Mosley. Bayesian Network Models for Web Effort Prediction: A Comparative Study
738 -- 752Siu Nam Chuang, Alvin T. S. Chan. Dynamic QoS Adaptation for Mobile Middleware
753 -- 764Meine van der Meulen, Miguel A. Revilla. The Effectiveness of Software Diversity in a Large Population of Programs
765 -- 782Eugenio Capra, Chiara Francalanci, Francesco Merlo. An Empirical Study on the Relationship Between Software Design Quality, Development Effort and Governance in Open Source Projects
783 -- 799Trevor Parsons, Adrian Mos, Mircea Trofin, Thomas Gschwind, John Murphy. Extracting Interactions in Component-Based Systems
800 -- 812Jeffrey C. Carver, Nachiappan Nagappan, Alan Page. The Impact of Educational Background on the Effectiveness of Requirements Inspections: An Empirical Study
813 -- 825Bo Yang, Huajun Hu, Lixin Jia. A Study of Uncertainty in Software Cost and Its Impact on Optimal Software Release Time
826 -- 843Chao Liu, Xiangyu Zhang, Jiawei Han. A Systematic Study of Failure Proximity
844 -- 859Jin Song Dong, Ping Hao, Shengchao Qin, Jun Sun 0001, Wang Yi. Timed Automata Patterns

Volume 34, Issue 5

579 -- 596Ray-Yaung Chang, Andy Podgurski, Jiong Yang. Discovering Neglected Conditions in Software by Mining Dependence Graphs
597 -- 613Marcelo d Amorim, Steven Lauterburg, Darko Marinov. Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs
614 -- 632Graham Hughes, Tevfik Bultan. Interface Grammars for Modular Software Model Checking
633 -- 650Myra B. Cohen, Matthew B. Dwyer, Jiangfan Shi. Constructing Interaction Test Suites for Highly-Configurable Systems in the Presence of Constraints: A Greedy Approach
651 -- 666Sharon Shoham, Eran Yahav, Stephen J. Fink, Marco Pistoia. Static Specification Mining Using Automata-Based Abstractions
667 -- 684Yann-Gaël Guéhéneuc, Giuliano Antoniol. DeMIMA: A Multilayered Approach for Design Pattern Identification
685 -- 699Jane Cleland-Huang, Will Marrero, Brian Berenbach. Goal-Centric Traceability: Using Virtual Plumblines to Maintain Critical Systemic Qualities
700 -- 720Santonu Sarkar, Avinash C. Kak, Girish Maskeri Rama. Metrics for Measuring the Quality of Modularization of Large-Scale Object-Oriented Software

Volume 34, Issue 4

434 -- 451Jonathan Sillito, Gail C. Murphy, Kris De Volder. Asking and Answering Questions during a Programming Change Task
452 -- 470Matthew J. Rutherford, Antonio Carzaniga, Alexander L. Wolf. Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
471 -- 484Jacky Keung, Barbara A. Kitchenham, D. Ross Jeffery. Analogy-X: Providing Statistical Inference to Analogy-Based Software Cost Estimation
485 -- 496Stefan Lessmann, Bart Baesens, Christophe Mues, Swantje Pietsch. Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings
497 -- 515Marc Eaddy, Thomas Zimmermann, Kaitin D. Sherwood, Vibhav Garg, Gail C. Murphy, Nachiappan Nagappan, Alfred V. Aho. Do Crosscutting Concerns Cause Defects?
516 -- 530Per Rovegard, Lefteris Angelis, Claes Wohlin. An Empirical Study on Views of Importance of Change Impact Analysis Issues
531 -- 545Achmad I. Kistijantoro, Graham Morgan, Santosh K. Shrivastava, Mark C. Little. Enhancing an Application Server to Support Available Components
546 -- 563Carlos Canal, Pascal Poizat, Gwen Salaün. Model-Based Adaptation of Behavioral Mismatching Components
564 -- 576Shlomi Dolev, Reuven Yagel. Towards Self-Stabilizing Operating Systems

Volume 34, Issue 3

305 -- 320Bill Mitchell. Characterizing Communication Channel Deadlocks in Sequence Diagrams
321 -- 335Danny Dig, Kashif Manzoor, Ralph E. Johnson, Tien N. Nguyen. Effective Software Merging in the Presence of Object-Oriented Refactorings
336 -- 356Syed Waseem Haider, João W. Cangussu, Kendra Cooper, Ram Dantu, Syed Haider. Estimation of Defects Based on Defect Decay Model: ED^{3}M
357 -- 376Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster, Patrick Jenkins. Modular Information Hiding and Type-Safe Linking for C
377 -- 390María José Escalona Cuaresma, Gustavo Aragón. NDT. A Model-Driven Approach for Web Requirements
391 -- 406Tao Zheng, C. Murray Woodside, Marin Litoiu. Performance Model Estimation and Tracking Using Optimal Filters
407 -- 432Wojciech J. Dzidek, Erik Arisholm, Lionel C. Briand. A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance

Volume 34, Issue 2

161 -- 0Jeff Kramer. Editorial: New Associate Editor Introduction
162 -- 180Sven Apel, Thomas Leich, Gunter Saake. Aspectual Feature Modules
181 -- 196Sunghun Kim, Jim Whitehead, Yi Zhang. Classifying Software Changes: Clean or Buggy?
197 -- 211Kim Man Lui, Keith C. C. Chan, John T. Nosek. The Effect of Pairs in Program Design Tasks
212 -- 225Torgeir Dingsøyr, Nils Brede Moe. The Impact of Employee Participation on the Use of an Electronic Process Guide: A Longitudinal Case Study
226 -- 241Jon G. Hall, Lucia Rapanotti, Michael Jackson. Problem Oriented Software Engineering: Solving the Package Router Control Problem
242 -- 259Jo Hannay, Magne Jørgensen. The Role of Deliberate Artificial Design Elements in Software Engineering Experiments
260 -- 270Keith Gallagher, Andrew Hatch, Malcolm Munro. Software Architecture Visualization: An Evaluation Framework and Its Application
271 -- 286Jingyue Li, Reidar Conradi, Odd Petter N. Slyngstad, Marco Torchiano, Maurizio Morisio, Christian Bunse. A State-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Components
287 -- 300Andrian Marcus, Denys Poshyvanyk, Rudolf Ferenc. Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems
301 -- 302Hongyu Zhang. On the Distribution of Software Faults
303 -- 0Johannes Henkel, Christoph Reichenbach, Amer Diwan. Errata for Discovering Documentation for Java Container Classes

Volume 34, Issue 1

1 -- 2Jeff Kramer. State of the Journal Address
3 -- 4Patrick McDaniel, Bashar Nuseibeh. Guest Editors Introduction: Special Section on Software Engineering for Secure Systems
5 -- 20Travis D. Breaux, Annie I. Antón. Analyzing Regulatory Rules for Privacy and Security Requirements
21 -- 32Westley Weimer, Nina Mishra. Privately Finding Specifications
33 -- 49Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino. Semantics-Based Design for Secure Web Services
50 -- 64Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Frank Piessens. Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
65 -- 81William G. J. Halfond, Alessandro Orso, Pete Manolios. WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
82 -- 98Constance L. Heitmeyer, Myla Archer, Elizabeth I. Leonard, John McLean. Applying Formal Methods to a Certifiably Secure Software System
99 -- 115Scott McMaster, Atif M. Memon. Call-Stack Coverage for GUI Test Suite Reduction
116 -- 132Daniela Damian, Filippo Lanubile, Teresa Mallardo. On the Need for Mixed Media in Distributed Requirements Negotiations
133 -- 153Charles B. Haley, Robin C. Laney, Jonathan D. Moffett, Bashar Nuseibeh. Security Requirements Engineering: A Framework for Representation and Analysis