Abstract is missing.
- Improving the Accuracy of Software Effort Estimation Based on Multiple Least Square Regression Models by Estimation Error-Based Data PartitioningYeong-Seok Seo, Kyung-A Yoon, Doo-Hwan Bae. 3-10 [doi]
- Hierarchical Understandability Assessment Model for Large-Scale OO SystemJimin Hwa, Sukhee Lee, Yong Rae Kwon. 11-18 [doi]
- On the Relationship between Different Size Measures in the Software Life CycleÇigdem Gencel, Rogardt Heldal, Kenneth Lind. 19-26 [doi]
- Investigating the Effect of Refactoring on Software Testing EffortKarim O. Elish, Mohammad Alshayeb. 29-34 [doi]
- Extracting High-Level Functional Design from Software RequirementsVibhu Saujanya Sharma, Santonu Sarkar, Kunal Verma, Arun Panayappan, Alex Kass. 35-42 [doi]
- Identifying Fragments to be Extracted from Long MethodsLimei Yang, Hui Liu, Zhendong Niu. 43-49 [doi]
- A Graph Based Approach to Detecting Causes of Implied Scenarios under the Asynchronous and Synchronous Communication StylesIn-Gwon Song, Sang-Uk Jeon, Doo-Hwan Bae. 53-60 [doi]
- Extracting Environmental Constraints to Make Reactive System Specifications RealizableShigeki Hagihara, Yusuke Kitamura, Masaya Shimakawa, Naoki Yonezaki. 61-68 [doi]
- Monitoring Composite Services with Universal Modal Sequence DiagramsWenrui Li, Zhijian Wang. 69-76 [doi]
- Critical Barriers for Offshore Software Development Outsourcing Vendors: A Systematic Literature ReviewSiffat Ullah Khan, Mahmood Niazi, Rashid Ahmad. 79-86 [doi]
- Re-defining the Requirements Engineering Process Improvement ModelBadariah Solemon, Shamsul Sahibuddin, Abdul Azim Abd Ghani. 87-92 [doi]
- Insights into Domain Knowledge Sharing in Software Development Practice in SMEsJim Buchan, Christian Harsana Ekadharmawan, Stephen G. MacDonell. 93-100 [doi]
- The Context Dynamics Matrix (CDM): An Approach to Modeling ContextZiyad Alshaikh, Clive Boughton. 101-108 [doi]
- An Empirical Study of Software Architects ConcernsHenrik Bærbak Christensen, Klaus Marius Hansen, Kari R. Schougaard. 111-118 [doi]
- Attribute-Based Architecture Patterns for Lightweight Service-Oriented ArchitecturesMikio Aoyama, Takashi Ikezaki, Noboru Nakamichi. 119-126 [doi]
- Tool Support for Component-Based Software ArchitecturesGeorg Buchgeher, Rainer Weinreich. 127-134 [doi]
- Web Services Composition by I/O Data Structure CorrespondencesQiushi Wang, Osamu Shigo. 135-142 [doi]
- Search-Based Testing Guidance Using Dominances vs. Control DependenciesAhmed S. Ghiduk. 145-151 [doi]
- Analysis of the OLSR Protocol by Using Formal Passive TestingCésar Andrés, Stéphane Maag, Ana R. Cavalli, Mercedes G. Merayo, Manuel Núñez. 152-159 [doi]
- Variable Strength Interaction Testing with an Ant Colony System ApproachXiang Chen, Qing Gu, Ang Li, Daoxu Chen. 160-167 [doi]
- Spectral Debugging with Weights and Incremental RankingLee Naish, Hua Jie Lee, Kotagiri Ramamohanarao. 168-175 [doi]
- Improve Analogy-Based Software Effort Estimation Using Principal Components Analysis and Correlation WeightingJianfeng Wen, Shixian Li, Linyan Tang. 179-186 [doi]
- Investigating the Effect of Pair Programming and Software Size on Software Quality and Programmer ProductivityRaymund Sison. 187-193 [doi]
- Describing Pattern Languages for Checking Design ModelsBahman Zamani, Greg Butler. 197-204 [doi]
- An Efficient Context-Based User Interface by Exploiting Temporality of AttributesMittapally Kumara Swamy, Polepalli Krishna Reddy. 205-212 [doi]
- Aspect Oriented Programming Made Easy: An Embedded Pointcut LanguageAntonio Cisternino, Sebastien Vaucouleur. 215-222 [doi]
- Composition Analysis of Multiple Aspects in Aspect-Oriented ProgramsNafees Qamar. 223-230 [doi]
- Elicit the Requirements on Software Dependability: A Knowledge-Based ApproachChun Liu, Yue Wang, Zhi Jin. 233-240 [doi]
- Modeling Access Control Requirements in Feature ModelLianshan Sun, Gang Huang. 241-248 [doi]
- Performing Projection in Problem Frames Using ScenariosZhi Jin, Xiaohong Chen, Didar Zowghi. 249-256 [doi]
- A Light-Weight Formal Approach for Modeling, Verifying and Integrating Role-Based Access Control RequirementsSaad Zafar. 257-264 [doi]
- Contribution-Based Call Stack Abstraction and Its Application in Pointer Analysis of AspectJ ProgramsJu Qian, Zifeng Cui, Baowen Xu, Xiaofang Zhang. 267-274 [doi]
- Program Sifting: Select Property-Related Functions for Language-Based Static AnalysisKai Yu, Cong Wang, Yin-li Chen, Meng-xiang Lin. 275-282 [doi]
- Avoiding Some Common Preprocessing Pitfalls with Feature QueriesStan Jarzabek, Yinxing Xue, Hongyu Zhang, Youpeng Lee. 283-290 [doi]
- Sequence Diagram SlicingKunihiro Noda, Takashi Kobayashi, Kiyoshi Agusa, Shinichiro Yamamoto. 291-298 [doi]
- Test Coverage Metric for Two-Staged Language with Abstract InterpretationTaeksu Kim, Chunwoo Lee, Kiljoo Lee, Soohyun Baik, Chisu Wu, Kwangkeun Yi. 301-308 [doi]
- Analysis of Problems in Testing PracticesJussi Kasurinen, Ossi Taipale, Kari Smolander. 309-315 [doi]
- Unit Testing Approaches for BPEL: A Systematic ReviewZulfa Zakaria, Rodziah Binti Atan, Abdul Azim Abdul Ghani, Nor Fazlida Mohd. Sani. 316-322 [doi]
- Scheduling Test Execution of WBEM ApplicationsLian Yu, Yu Su, Qianxing Wang. 323-330 [doi]
- Incomplete Software Requirements and Assumptions Made by Software EngineersÖzlem Albayrak, Hülya Kurtoglu, Mert Biçakçi. 333-339 [doi]
- Requirements Identification and Representation in Software Product LineShahliza Abd Halim, Dayang Norhayati A. Jawawi, Safaai Deris. 340-346 [doi]
- Propagating Requirement Change into Software High Level Designs towards Resilient Software EvolutionNoraini Ibrahim, Wan M. N. Wan-Kadir, Safaai Deris. 347-354 [doi]
- Model-Driven Automatic Generation of Verified BPEL Code for Web Service CompositionBixin Li, Yu Zhou, Jun Pang. 355-362 [doi]
- Problematic Code Clones Identification Using Multiple Detection ResultsYoshiki Higo, Ken-ichi Sawa, Shinji Kusumoto. 365-372 [doi]
- Code Clone Graph Metrics for Detecting Diffused Code ClonesYoshihiko Fukushima, Raula Kula, Shinji Kawaguchi, Kyohei Fushida, Masataka Nagura, Hajimu Iida. 373-380 [doi]
- Assessing and Estimating Corrective, Enhancive, and Reductive Maintenance Tasks: A Controlled ExperimentVu Nguyen, Barry W. Boehm, Phongphan Danphitsanuphan. 381-388 [doi]
- Identifying Stagnation Periods in Software Evolution by Replaying Editing OperationsTakayuki Omori, Katsuhisa Maruyama. 389-396 [doi]
- Fault Localization Based on Multi-level Similarity of Execution TracesXinping Wang, Qing Gu, Xin Zhang, Xiang Chen, Daoxu Chen. 399-405 [doi]
- Directed Test Suite AugmentationZhihong Xu, Gregg Rothermel. 406-413 [doi]
- Checking Model Consistency Using Data-Flow TestingChen-Wei Wang, Alessandra Cavarra. 414-421 [doi]
- An Effective Path Selection Strategy for Mutation TestingMike Papadakis, Nicos Malevris. 422-429 [doi]
- Investigating the State of User Involvement in PracticeJuho Heiskari, Laura Lehtola. 433-440 [doi]
- Extracting Development Organization from Open Source SoftwareJongdae Han, Chisu Wu, Byungjeong Lee. 441-448 [doi]
- Project Management Using Risk Identification Architecture Pattern (RIAP) Model: A Case Study on a Web-Based ApplicationThamer Al-Rousan, Shahida Sulaiman, Rosalina Abdul Salam. 449-456 [doi]
- Risk Identification and Mitigation Processes for Using Scrum in Global Software Development: A Conceptual FrameworkEmam Hossain, Muhammad Ali Babar, Hye-Young Paik, June M. Verner. 457-464 [doi]
- An Automatic Compliance Checking Approach for Software ProcessesXiaoyang He, Jingang Guo, Yasha Wang, Ying Guo. 467-474 [doi]
- A Push for Software Process Improvement in ThailandPornchai Mongkolnam, Udom Silparcha, Narongrit Waraporn, Vajirasak Vanijja. 475-481 [doi]
- Applying a Systematic Approach to Link Requirements and Testing: A Case StudyJohanna Kukkanen, Kyosti Vakevainen, Marjo Kauppinen, Eero J. Uusitalo. 482-488 [doi]
- A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System SpecificationWissam Mallouli, Amel Mammar, Ana R. Cavalli. 489-496 [doi]
- Towards Automated Verification of Distributed Consensus ProtocolsTakahiro Minamikawa, Tatsuhiro Tsuchiya, Tohru Kikuno. 499-506 [doi]
- A Method for Modeling and Analyzing Fault-Tolerant Service CompositionGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 507-514 [doi]
- Modular Checking of C Programs Using SAT-Based Bounded Model CheckerYuusuke Hashimoto, Shin Nakajima. 515-522 [doi]
- Selecting Usability Evaluation Methods for Software Process DescriptionsMohd Naz ri Mahrin, Paul A. Strooper, David A. Carrington. 523-529 [doi]