Abstract is missing.
- On the Use of Software Quality Standard ISO/IEC9126 in Mobile EnvironmentsAli Idri, Karima Moumane, Alain Abran. 1-8 [doi]
- System Quality Improvement Including Software and Infrastructure Based on Software Metrics ApproachNoriko Hanakawa, Masaki Obana. 9-16 [doi]
- Refining the Pointer Analysis by Exploiting Constraints on the CFL-PathsXiaoshan Sun, Liang Cheng, Yang Zhang, Yi Deng, Jingbiao Hou. 17-24 [doi]
- Samekana: A Browser Extension for Including Relevant Web Links in Issue Tracking System Discussion ForumDenzil Correa, Sangeeta Lal, Apoorv Saini, Ashish Sureka. 25-33 [doi]
- Factors Influencing Research Contributions and Researcher Interactions in Software Engineering: An Empirical StudySubhajit Datta, A. S. M. Sajeev, Santonu Sarkar, Nishant Kumar. 34-41 [doi]
- Can Control-Component Libraries Reduce the Costs of Developing Control Engineering-Based Self-Adaptive Systems?Tharindu Patikirikorala, Alan Colman, Jun Han. 42-49 [doi]
- Packaged Software Implementation Requirements Engineering by Small Software EnterprisesIssam Jebreen, Robert Wellington, Stephen G. MacDonell. 50-57 [doi]
- Modeling Security Threat Patterns to Derive Negative ScenariosTatsuya Abe, Shinpei Hayashi, Motoshi Saeki. 58-66 [doi]
- QoS-Based Service Composition under Various QoS RequirementsGang Wang, Li Zhang, Jing Jiang, Wei Jiang. 67-74 [doi]
- TETRABox - A Generic White-Box Testing Framework for Model TransformationsJohannes Schönböck, Gerti Kappel, Manuel Wimmer, Angelika Kusel, Werner Retschitzegger, Wieland Schwinger. 75-82 [doi]
- Facilitating Verification in Program Loops by Identification of Static Iteration PatternsAditya Desai, Era Jain, Subhajit Roy. 83-90 [doi]
- Selecting Highly Efficient Sets of Subdomains for Mutation AdequacyMatthew Patrick, Robert Alexander, Manuel Oriol, John A. Clark. 91-98 [doi]
- A Value Weighting Method for Pair-wise TestingSatoshi Fujimoto, Hideharu Kojima, Tatsuhiro Tsuchiya. 99-105 [doi]
- Fault-Prone Module Prediction Using a Prediction Model and Manual InspectionNorimitsu Kasai, Shuji Morisaki, Ken-ichi Matsumoto. 106-115 [doi]
- Can We Trust Our Results? A Mapping Study on Data QualityMarshima Mohd Rosli, Ewan D. Tempero, Andrew Luxton-Reilly. 116-123 [doi]
- Evaluating Performance of Network Metrics for Bug Prediction in SoftwareSatya Prateek, Anjaneyulu Pasala, Luis Moreno Aracena. 124-131 [doi]
- Effects of Organizational Changes on Product Metrics and DefectsSeiji Sato, Hironori Washizaki, Yoshiaki Fukazawa, Sakae Inoue, Hiroyuki Ono, Yoshiiku Hanai, Mikihiko Yamamoto. 132-139 [doi]
- Analyzing Early Requirements of Cyber-physical Systems through Structure and Goal ModelingChun Liu, Wei Zhang, Haiyan Zhao, Zhi Jin. 140-147 [doi]
- Towards Requirements Change Decision SupportSanjay Ghosh, Srini Ramaswamy, Raoul Praful Jetley. 148-155 [doi]
- Automating Inference of OCL Business Rules from User ScenariosDuc-Hanh Dang, Jordi Cabot. 156-163 [doi]
- Problem Frames Construction from Feature ModelsXiaohong Chen, Haiying Sun, Ronghua Ye, Jing Liu. 164-171 [doi]
- Diagnosis-Oriented Alarm CorrelationsDalin Zhang, Dahai Jin, Yunzhan Gong, Hailong Zhang. 172-179 [doi]
- Identifying More Equivalent Mutants via Code SimilarityMarinos Kintis, Nicos Malevris. 180-188 [doi]
- An Approach to Generate Safety Validation Test Cases from UML Activity DiagramSaurabh Tiwari, Atul Gupta. 189-198 [doi]
- Executable Program Documentation Based on Debugging Break PointsYung-Pin Cheng, Jhih-Hao Chen, Yu-Ying Yu. 199-206 [doi]
- A Controlled Experiment to Assess the Effectiveness of Eight Use Case TemplatesSaurabh Tiwari, Atul Gupta. 207-214 [doi]
- Connecting Interaction Models and Application Logic for Model-Driven Generation of Web-Based Graphical User InterfacesRoman Popp, Hermann Kaindl, David Raneburger. 215-222 [doi]
- Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database ApplicationsKaiping Liu, Hee Beng Kuan Tan. 223-230 [doi]
- Software Quality Requirements: A Systematic Mapping StudySofia Ouhbi, Ali Idri, José Luis Fernández Alemán, Ambrosio Toval. 231-238 [doi]
- Entity Disambiguation in Natural Language Text RequirementsJanardan Misra, Subhabrata Das. 239-246 [doi]
- Reasoning about Stakeholder Groups for Requirements Negotiation Based on Power RelationshipsHui Yang, Peng Liang. 247-254 [doi]
- Distributed Online Test Generation for Model-Based TestingTeemu Kanstrén, Tuomas Kekkonen. 255-262 [doi]
- On Detecting Concurrency Defects Automatically at the Design LevelFrank Padberg, Luis M. Carril, Oliver Denninger, Martin Blersch. 263-271 [doi]
- Data-Race-Freedom of Concurrent ProgramsGranville Barnett, Shengchao Qin. 272-279 [doi]
- Semantic Document Adaptation with OCL AnnotationsJakub Malý, Martin Necasky. 280-288 [doi]
- Visualization of Defect Inflow and Resolution Cycles: Before, During and After TransferRonald Jabangwe, Kai Petersen, Darja Smite. 289-298 [doi]
- Detecting Program Changes from Edit History of Source CodeEijiro Kitsu, Takayuki Omori, Katsuhisa Maruyama. 299-306 [doi]
- SMT-Based Bounded Model Checking for OSEK/VDX ApplicationsHaitao Zhang, Toshiaki Aoki, Hsin-hung Lin, Min Zhang 0002, Yuki Chiba, Kenro Yatake. 307-314 [doi]
- Preserving Correctness of Requirements Evolution through Refinement in Event-BKriangkrai Traichaiyaporn, Toshiaki Aoki. 315-322 [doi]
- A Formal Coloured Petri Net Model for Hazard Detection in Large Event FlowsPatrice Carle, Christine Choppy, Romain Kervarc, Ariane Piel. 323-330 [doi]
- Handling Database Schema Variability in Software Product LinesNiloofar Khedri, Ramtin Khosravi. 331-338 [doi]
- An Extended Orthogonal Variability Model for Metadata-Driven Multitenant Cloud ServicesMikio Aoyama, Nozomi Kurono. 339-346 [doi]
- Constraint Checking in Distributed Product Configuration of Multi Product LinesGerald Holl, Paul Grünbacher, Christoph Elsner, Thomas Klambauer, Michael Vierhauser. 347-354 [doi]
- Harnessing SMT-Based Bounded Model Checking through Stateless Explicit-State ExplorationWeiqiang Kong, Leyuan Liu, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi, Akira Fukuda. 355-362 [doi]
- Towards a Hybrid Framework for Detecting Input Manipulation VulnerabilitiesSun Ding, Hee Beng Kuan Tan, Lwin Khin Shar, Bindu Madhavi Padmanabhuni. 363-370 [doi]
- A SystemC Semantics in Guarded Assignment Systems and Its Applications with VERDSNaiju Zeng, Wenhui Zhang. 371-379 [doi]
- Integrating Software Process Reuse and AutomationEmmanuelle Rouillé, Benoît Combemale, Olivier Barais, David Touzet, Jean-Marc Jézéquel. 380-387 [doi]
- Safe Substitution of Components in Self-Adaptive Web ApplicationsShin Nakajima. 388-395 [doi]
- Run-Time Monitoring and Real-Time Visualization of Software ArchitecturesAna Dragomir, Horst Lichter. 396-403 [doi]
- Handling Multiple Mode Switch Scenarios in Component-Based Multi-mode SystemsYin Hang, Hans Hansson. 404-413 [doi]
- Schedulability Analysis with CCSL SpecificationsLing Yin, Jing Liu, Zuohua Ding, Frédéric Mallet, Robert de Simone. 414-421 [doi]
- Linking the Semantics of BPEL Using MaudePeng Liu, Huibiao Zhu, Shengchao Qin, Phillip J. Brooke, Xi Wu. 422-431 [doi]
- A Systematic Review of Model-Driven SecurityPhu Hong Nguyen, Jacques Klein, Yves Le Traon, Max E. Kramer. 432-441 [doi]
- Quality Driven Design of Program Frameworks for Intelligent Sensor ApplicationsTingxun Shi, Ruizhi Wang, Daolan Zhang, Wenpin Jiao, Bing Xie. 442-449 [doi]
- Automated Management of Dynamic Component Dependency for Runtime System ReconfigurationPing Su, Chun Cao, Xiaoxing Ma, Jian Lu. 450-458 [doi]
- Service Brick Composition Framework for SmartphonesShang-Pin Ma, Jheng-Shiun Jiang, Wen-Tin Lee. 459-466 [doi]
- An Action-Oriented Programming Model for Pervasive Computing in a Device CloudTimo Aaltonen, Varvana Myllärniemi, Mikko Raatikainen, Niko Mäkitalo, Jari Pääkkö. 467-475 [doi]
- Extracting and Visualizing Implementation Structure of FeaturesHiroshi Kazato, Shinpei Hayashi, Tsuyoshi Oshima, Shunsuke Miyata, Takashi Hoshino, Motoshi Saeki. 476-484 [doi]
- Tool Integration ModelsWeiqing Zhang, Birger Møller-Pedersen. 485-494 [doi]
- Visualizations as a Basis for Agile Software Process ImprovementTimo Lehtonen, Veli-Pekka Eloranta, Marko Leppänen, Essi Isohanni. 495-502 [doi]
- Scrum Anti-Patterns - An Empirical StudyVeli-Pekka Eloranta, Kai Koskimies, Tommi Mikkonen, Jyri Vuorinen. 503-510 [doi]
- Strategies for Aligning Variability Model and ArchitectureIris Groher, Rainer Weinreich. 511-516 [doi]
- A Method for Early Detection of Mismatches between Framework Architecture and Execution ScenariosNaoya Nitta, Izuru Kume, Yasuhiro Takemura. 517-522 [doi]
- Architecture Security Evaluation Method Based on Security of the ComponentsChangxiao Du, Xiaohong Li, Hong Shi, Jing Hu, Ruitao Feng, Zhiyong Feng. 523-528 [doi]
- A New Scheduling Strategy for Risk MitigationPeng Zhou, Hareton K. N. Leung. 529-534 [doi]
- Designing User Experience for Mobile Apps: Long-Term Product Owner PerspectiveKati Kuusinen, Tommi Mikkonen. 535-540 [doi]
- Improving Analogy-Based Software Cost Estimation through Probabilistic-Based Similarity MeasuresPassakorn Phannachitta, Jacky Keung, Akito Monden, Ken-ichi Matsumoto. 541-546 [doi]
- Multi-core Model Checking Algorithms for LTL Verification with Fairness AssumptionsXuan-Linh Ha, Thanh Tho Quan, Yang Liu, Jun Sun 0001. 547-552 [doi]
- Null Dereference Detection via a Backward AnalysisQian Wang, Dahai Jin, Yunzhan Gong. 553-558 [doi]
- Results for Compositional Timed TestingBoutheina Bannour, Christophe Gaston, Marc Aiguier, Arnault Lapitre. 559-564 [doi]
- Model Checking Liveness Properties under Fairness & Anti-fairness AssumptionsKazuhiro Ogata. 565-570 [doi]
- JeB: Safe Simulation of Event-B Models in JavaScriptFaqing Yang, Jean-Pierre Jacquot, Jeanine Souquières. 571-576 [doi]
- Lehman's Laws and the Productivity of Increments: Implications for ProductivityRamin Moazeni, Daniel Link, Barry W. Boehm. 577-582 [doi]
- On Security Issues in Web Applications through Cross Site Scripting (XSS)Vikas K. Malviya, Saket Saurav, Atul Gupta. 583-588 [doi]
- Sky-MCSP-R: An Efficient Graph-Based Web Service Composition ApproachPengjiao Sun, Pengcheng Zhang, Wenrui Li, Xuejun Guo, Jun Feng. 589-594 [doi]