Abstract is missing.
- Evaluating Technical Debt in Cloud-Based Architectures Using Real OptionsEsra Alzaghoul, Rami Bahsoon. 1-10 [doi]
- Supporting Complex Work in Crowdsourcing Platforms: A View from Service-Oriented ComputingLu Xiao, Hye-Young Paik. 11-14 [doi]
- Design and Implementation of Dynamically Evolving Ensembles with the Helena FrameworkAnnabelle Klarl, Rolf Hennicker. 15-24 [doi]
- Architecture Conformance Analysis Approach within the Context of Multiple Product Line EngineeringBedir Tekinerdogan, Evren Çilden, Özgü Özköse Erdogan, Onur Aktug. 25-28 [doi]
- Using Constraint Satisfaction and Optimization for Pattern-Based Software DesignSriharsha Vathsavayi, Outi Sievi-Korte, Kai Koskimies, Kari Systä. 29-37 [doi]
- Correctness by Construction with Logic-Labeled Finite-State Machines - Comparison with Event-BVladimir Estivill-Castro, René Hexel. 38-47 [doi]
- On the Shape of Circular Dependencies in Java ProgramsHussain A. Al-Mutawa, Jens Dietrich, Stephen Marsland, Catherine McCartin. 48-57 [doi]
- Architectural Design Decisions in Open Software Development: A Transition to Software EcosystemsMeiru Che, Dewayne E. Perry. 58-61 [doi]
- Services for Knowledge Sharing in Dynamic Business NetworksAbdussalam Ali, Igor Hawryszkiewycz, Jinjun Chen. 62-65 [doi]
- Open Architectures and Software Evolution: The Case of Software EcosystemsPatrizio Pelliccione. 66-69 [doi]
- Concentus: Applying Stream Processing to Online Collective InteractionAdam Roughton, Ian Warren, Beryl Plimmer. 70-79 [doi]
- Fill That Blank! An iOS-based Literacy ApplicationEric Gu, Mo-Hong Tzou, Rashina Hoda. 80-83 [doi]
- Analyzing the Learning Process in Online Educational Game Design: A Case StudyNavid Ahmadi, Mehdi Jazayeri. 84-93 [doi]
- From Incident Reports to Improvement Recommendations: Analyzing IT Help Desk DataAnneliese Amschler Andrews, Joseph Lucente. 94-103 [doi]
- Duplicate Bug Report Detection Using ClusteringRaj P. Gopalan, Aneesh Krishna. 104-109 [doi]
- Visualizing Software Structure UnderstandabilityPhilippe Dugerdil, Mihnea Niculescu. 110-119 [doi]
- Requirements Prioritization and Next-Release Problem under Non-additive Value ConditionsAshish Sureka. 120-123 [doi]
- Feature Usage as a Value Indicator for Decision MakingSarunas Marciuska, Çigdem Gencel, Pekka Abrahamsson. 124-131 [doi]
- A New Technique for Counteracting Web Browser ExploitsByungho Min, Vijay Varadharajan. 132-141 [doi]
- A Comprehensive Pattern-Driven Security Methodology for Distributed SystemsAnton V. Uzunov, Eduardo B. Fernández, Katrina Falkner. 142-151 [doi]
- SecDSVL: A Domain-Specific Visual Language to Support Enterprise Security ModellingMohamed Almorsy, John Grundy. 152-161 [doi]
- The Role of Boundary Objects in the Fuzzy Front End of IT DevelopmentTom McBride. 162-169 [doi]
- Impact of Product Complexity on Actual Effort in Software Developments: An Empirical InvestigationZheng Li, Liam O'Brien, Ye Yang. 170-179 [doi]
- A Preliminary Survey of Factors Affecting Software TestersTanjila Kanij, Robert Merkel, John Grundy. 180-189 [doi]
- Fail-Safe Testing of Safety-Critical SystemsAhmed Gario, Anneliese Amschler Andrews. 190-199 [doi]
- Fail-Safe Testing of Web ApplicationsAnneliese Amschler Andrews, Salah Boukhris, Salwa Elakeili. 200-209 [doi]
- Automated Mutation-Based Test Case Evaluation for Semantic Web ServicesM. Shaban Jokhio, Gillian Dobbie, Tianming Hu, Jing Sun 0002. 210-219 [doi]
- A Non-invasive Approach to Trace Architecture Design, Requirements Specification and Agile ArtifactsPablo Oliveira Antonino, Thorsten Keuler, Nicolas Germann, Brian Cronauer. 220-229 [doi]
- Inconsistency Management between Architectural Decisions and Designs Using Constraints and Model FixesIoanna Lytra, Uwe Zdun. 230-239 [doi]