Abstract is missing.
- The power of softwareAlfonso Fuggetta. 1 [doi]
- Virtual humans: lessons learned in integrating a large-scale AI projectWilliam R. Swartout. 2 [doi]
- Designing and implementing a family of intrusion detection systemsRichard A. Kemmerer. 3 [doi]
- Exploiting predicate structure for efficient reachability detectionSujatha Kashyap, Vijay K. Garg. 4-13 [doi]
- Application of design for verification with concurrency controllers to air traffic control softwareAysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp. 14-23 [doi]
- Efficient temporal-logic query checking for presburger systemsDezhuang Zhang, Rance Cleaveland. 24-33 [doi]
- A component model for internet-scale applicationsSteven P. Reiss. 34-43 [doi]
- Automating the performance management of component-based enterprise systems through the use of redundancyAda Diaconescu, John Murphy. 44-53 [doi]
- UMLDiff: an algorithm for object-oriented design differencingZhenchang Xing, Eleni Stroulia. 54-65 [doi]
- Identifying traits with formal concept analysisAdrian Lienhard, Stéphane Ducasse, Gabriela Arévalo. 66-75 [doi]
- Precise identification of composition relationships for UML class diagramsAna Milanova. 76-85 [doi]
- On dynamic feature locationRainer Koschke, Jochen Quante. 86-95 [doi]
- Blowtorch: a framework for firewall test automationDaniel Hoffman, Kevin Yoo. 96-103 [doi]
- An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based softwareMark Hennessy, James F. Power. 104-113 [doi]
- Automatic test factoring for javaDavid Saff, Shay Artzi, Jeff H. Perkins, Michael D. Ernst. 114-123 [doi]
- ClassSheets: automatic generation of spreadsheet applications from object-oriented specificationsGregor Engels, Martin Erwig. 124-133 [doi]
- Generation of visual editors as eclipse plug-insKarsten Ehrig, Claudia Ermel, Stefan Hänsgen, Gabriele Taentzer. 134-143 [doi]
- Clearwater: extensible, flexible, modular code generationGalen S. Swint, Calton Pu, Gueyoung Jung, Wenchang Yan, Younggyun Koh, Qinyi Wu, Charles Consel, Akhil Sahai, Koichi Moriyama. 144-153 [doi]
- Secure sharing between untrusted users in a transparent source/binary deployment modelEelco Dolstra. 154-163 [doi]
- Automating experimentation on distributed testbedsYanyan Wang, Matthew J. Rutherford, Antonio Carzaniga, Alexander L. Wolf. 164-173 [doi]
- AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacksWilliam G. J. Halfond, Alessandro Orso. 174-183 [doi]
- Timna: a framework for automatically combining aspect mining analysesDavid Shepherd, Jeffrey Palm, Lori L. Pollock, Mark Chu-Carroll. 184-193 [doi]
- A parameterized interpreter for modeling different AOP mechanismsNaoyasu Ubayashi, Genki Moriyama, Hidehiko Masuhara, Tetsuo Tamai. 194-203 [doi]
- A generic approach to supporting diagram differencing and merging for collaborative designAkhil Mehra, John C. Grundy, John G. Hosking. 204-213 [doi]
- Visualization-based analysis of quality for large-scale software systemsGuillaume Langelier, Houari A. Sahraoui, Pierre Poulin. 214-223 [doi]
- Automatic verification of design patterns in JavaAlex Blewitt, Alan Bundy, Ian Stark. 224-232 [doi]
- Optimized run-time race detection and atomicity checking using partial discovered typesRahul Agarwal, Amit Sasturkar, Liqiang Wang, Scott D. Stoller. 233-242 [doi]
- Reasoning about real-time statecharts in the presence of semantic variationsSubash Shankar, Sinan Asa, Vladimir Sipos, Xiaowei Xu. 243-252 [doi]
- Automated replay and failure detection for web applicationsSara Sprenkle, Emily Gibson, Sreedevi Sampath, Lori L. Pollock. 253-262 [doi]
- Locating faulty code using failure-inducing chopsNeelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gupta. 263-272 [doi]
- Empirical evaluation of the tarantula automatic fault-localization techniqueJames A. Jones, Mary Jean Harrold. 273-282 [doi]
- Automated test generation for engineering applicationsSongtao Xia, Ben Di Vito, César Muñoz. 283-286 [doi]
- Let s agree to disagreeShiva Nejati, Marsha Chechik. 287-290 [doi]
- A similarity-aware approach to testing based fault localizationDan Hao, Ying Pan, Lu Zhang, Wei Zhao, Hong Mei, Jiasu Sun. 291-294 [doi]
- Process support to help novices design software faster and betterAaron G. Cass, Leon J. Osterweil. 295-299 [doi]
- The PLUSS toolkit - extending telelogic DOORS and IBM-rational rose to support product line use case modelingMagnus Eriksson, Henrik Morast, Jürgen Börstler, Kjell Borg. 300-304 [doi]
- A strategy for efficient verification of relational specifications, based on monotonicity analysisMarcelo F. Frias, Rodolfo Gamarra, Gabriela Steren, Lorena Bourg. 305-308 [doi]
- Quasi-random testingTsong Yueh Chen, Robert G. Merkel. 309-312 [doi]
- Constraint-based test data generation in the presence of stack-directed pointersArnaud Gotlieb, Tristan Denmat, Bernard Botella. 313-316 [doi]
- QoS-aware dynamic service composition in ambient intelligence environmentsSonia Ben Mokhtar, Jinshan Liu, Nikolaos Georgantas, Valérie Issarny. 317-320 [doi]
- A visual language and environment for composing web servicesNa Liu, John C. Grundy, John G. Hosking. 321-324 [doi]
- Learning to verify branching time propertiesAbhay Vardhan, Mahesh Viswanathan. 325-328 [doi]
- Simon: modeling and analysis of design space structuresYuanfang Cai, Kevin J. Sullivan. 329-332 [doi]
- Lattice-based adaptive random testingJohannes Mayer. 333-336 [doi]
- A unified fitness function calculation rule for flag conditions to improve evolutionary testingXiyang Liu, Hehui Liu, Bin Wang, Ping Chen, Xiyao Cai. 337-341 [doi]
- A threat-driven approach to modeling and verifying secure softwareDianxiang Xu, Kendall E. Nygard. 342-346 [doi]
- Automated path generation for software fault localizationTao Wang, Abhik Roychoudhury. 347-351 [doi]
- EA-Miner: a tool for automating aspect-oriented requirements identificationAmérico Sampaio, Ruzanna Chitchyan, Paul Rayson. 352-355 [doi]
- yagg: an easy-to-use generator for structured test inputsDavid Coppit, Jiexin Lian. 356-359 [doi]
- Determining the cost-quality trade-off for automated software traceabilityAlexander Egyed, Stefan Biffl, Matthias Heindl, Paul Grünbacher. 360-363 [doi]
- A uniform deductive approach for parameterized protocol safetyJean-Francois Couchot, Alain Giorgetti, Nikolai Kosmatov. 364-367 [doi]
- A component-based development framework for supporting functional and non-functional analysis in control system designJohan Fredriksson, Massimo Tivoli, Ivica Crnkovic. 368-371 [doi]
- A rigorous approach for proving model refactoringsRohit Gheyi, Tiago Massoni, Paulo Borba. 372-375 [doi]
- Compositional reasoning for port-based distributed systemsAlma L. Juarez Dominguez, Nancy A. Day. 376-379 [doi]
- Model-based self-monitoring embedded programs with temporal logic specificationsLi Tan. 380-383 [doi]
- Specialization and extrapolation of software cost modelsTim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn. 384-387 [doi]
- NFRs-aware architectural evolution of component-based softwareChouki Tibermacine, Régis Fleurquin, Salah Sadou. 388-391 [doi]
- Code security analysis with assertionsJan Jürjens, Mark Yampolskiy. 392-395 [doi]
- Data mining and cross-checking of execution traces: a re-interpretation of Jones, Harrold and Stasko test informationTristan Denmat, Mireille Ducassé, Olivier Ridoux. 396-399 [doi]
- Properties and scopes in web model checkingMay Haydar, Sergiy Boroday, Alexandre Petrenko, Houari A. Sahraoui. 400-404 [doi]
- Synthesis of correct and distributed adaptors for component-based systems: an automatic approachPaola Inverardi, Leonardo Mostarda, Massimo Tivoli, Marco Autili. 405-409 [doi]
- A context-sensitive structural heuristic for guided search model checkingNeha Rungta, Eric G. Mercer. 410-413 [doi]
- Test input generation for red-black trees using abstractionWillem Visser, Corina S. Pasareanu, Radek Pelánek. 414-417 [doi]
- Testing in resource constrained execution environmentsGregory M. Kapfhammer, Mary Lou Soffa, Daniel Mossé. 418-422 [doi]
- Prufrock: a framework for constructing polytypic theorem proversJustin Ward, Garrin Kimmell, Perry Alexander. 423-426 [doi]
- Bamboo: an architecture modeling and code generation framework for configuration management systemsGuozheng Ge, Jim Whitehead. 427-428 [doi]
- Using communicative acts in high-level specifications of user interfaces for their automated synthesisJürgen Falb, Roman Popp, Thomas Röck, Helmut Jelinek, Edin Arnautovic, Hermann Kaindl. 429-430 [doi]
- A tool for automatic UML model consistency checkingJocelyn Simmonds, M. Cecilia Bastarrica. 431-432 [doi]
- Automated population of causal models for improved software risk assessmentPeter Hearty, Norman E. Fenton, Martin Neil, Patrick Cates. 433-434 [doi]
- Introduction to doctoral symposiumSteve M. Easterbrook, Sebastián Uchitel. 435 [doi]
- Automated generation of testing tools for domain-specific languagesHui Wu, Jeffrey G. Gray. 436-439 [doi]
- Constructing interaction test suites with greedy algorithmsRenée C. Bryce, Charles J. Colbourn. 440-443 [doi]
- Verifying the correctness of hume programs: an approach combining deductive and algorithmic reasoningGudmund Grov. 444-447 [doi]
- A model transformation approach to automatic model construction and evolutionYuehua Lin, Jeffrey G. Gray. 448-451 [doi]
- In regression testing selection when source code is not availableJiang Zheng. 452-455 [doi]
- Formal support for merging and negotiationShiva Nejati. 456-460 [doi]
- Specification and automated processing of security requirements (SAPS 05)Carsten Rudolph, Antonio Mana. 460 [doi]
- Software security assurance tools, techniques and metrics (SSATTM)Paul E. Black, Michael Kass. 461 [doi]
- 3rd international workshop on traceability in emerging forms of software engineering (TEFSE 2005)Jonathan I. Maletic, Giuliano Antoniol, Jane Cleland-Huang, Jane Huffman Hayes. 462 [doi]
- Software certificate management (SoftCeMent 05)Ewen Denney, Bernd Fischer, Dieter Hutter, Mark Jones. 463 [doi]
- 2nd Workshop on the state of the art in automated software engineeringAndrea Zisman, Thomas Ellman. 464 [doi]