Abstract is missing.
- Architectural Evolution of Legacy SystemsAlok Mehta, George T. Heineman. 4-12 [doi]
- Some Insights into the Maintenance of Legacy Systems within Small Manufacturing and Distribution Organizations in the UKHelen M. Edwards, Gillian M. Mallalieu, J. Barrie Thompson. 13-20 [doi]
- Extracting Ontologies from Legacy Systems for Understanding and Re-EngineeringHongji Yang, Zhan Cui, Paul O Brien. 21 [doi]
- The clustering Property of Corner Transformation for Spatial Database ApplicationsJu-Won Song, Kyu-Young Whang, Young-Koo Lee, Sang-Wook Kim. 28-35 [doi]
- Object-Oriented Database Access via ReflectionRaimund K. Ege. 36-41 [doi]
- ORR: Object-Relational RapprochementJames B. Crigler, Ali Orooji. 42 [doi]
- Protecting Information in the Web - Position PaperElisa Bertino. 50 [doi]
- An Industrial Application of an Integrated UML and SDL Modeling TechniqueMaha Boughdadi, Robert Busser. 54-60 [doi]
- Dynamic Software Architecture SlicingTaeho Kim, Yeong-Tae Song, Lawrence Chung, Dung T. Huynh. 61-66 [doi]
- A Generic Approach of Static Analysis for Detecting Runtime Errors in Java ProgramsXiaoping Jia, Sotiris Skevoulis. 67 [doi]
- A Protocol and Simulation for Distributed Communicating FirewallsRobert N. Smith, Sourav Bhattacharya. 74-79 [doi]
- Mobile Agents Protection in the Internet EnvironmentAntonio Corradi, Rebecca Montanari, Cesare Stefanelli. 80-85 [doi]
- Computer Network Intrusion Detection, Assessment And Prevention Based on Security Dependency RelationStephen S. Yau, Xinyu Zhang. 86 [doi]
- Can Generic Software Be Assured?Jeffrey M. Voas. 94-95 [doi]
- Ensuring the Capability of COTS ProductsJohn C. Dean. 96-97 [doi]
- Establishing Guidelines for Suitability of COTS for a Mission Critical ApplicationRonald J. Kohl. 98-99 [doi]
- Cost Framework for COTS EvaluationNorman F. Schneidewind. 100 [doi]
- Validating Software Specifications against User ClaimsChia-Chu Chiang, Joseph E. Urban. 104-109 [doi]
- Generating Goal-Oriented Test CasesAnneliese Amschler Andrews, Michael Scheetz, Eric Dahlman. 110-115 [doi]
- CORBA Components Testing with Perception-Based State BehaviorHwan Wook Sohn, David Chenho Kung, Pei Hsia. 116-121 [doi]
- An Object-Oriented Architecture Supporting Web Application TestingJi-Tzay Yang, Jiun-Long Huang, Feng-Jian Wang, William C. Chu. 122 [doi]
- Distributed Object-Oriented Real-Time Simulation of Ground Transportation Networks with the TMO Structuring SchemeK. H. Kim, Juqiang Liu, Masaki Ishida, Inho Kim. 130-138 [doi]
- Response Time Behavior of Voting Schemes for Managing Replicated DataIng-Ray Chen, Ding-Chau Wang, Chih-Ping Chu. 139-144 [doi]
- Autonomous Coordination for Atomicity of Transaction in Heterogeneous SystemsYongdong Tan, Isao Kaji, Kinji Mori. 145-150 [doi]
- Toward More Reliable Telecom SystemsAntonio Mendes da Silva Filho. 151 [doi]
- A Pattern-Based Approach to Structural Design CompositionPaulo S. C. Alencar, Donald D. Cowan, Jing Dong, Carlos José Pereira de Lucena. 160-165 [doi]
- Testing Extensible Design Patterns in Object-Oriented Frameworks through Scenario TemplatesWei-Tek Tsai, Yongzhong Tu, Weiguang Shao, Ezra Ebner. 166-171 [doi]
- A Design Pattern for Autonomous Vehicle Software Control ArchitecturesMichael L. Nelson. 172 [doi]
- System Scaling for Large-scale Internet-Based Online ServicesDavid C. Ni, J. Martinez, J. Wang. 180-185 [doi]
- A Method for Controlling Errors in Two-Class ClassificationGiovanni Felici, Fushing Sun, Klaus Truemper. 186-191 [doi]
- Hierarchically Organized Neural Net Agents for Distributed Web Information RetrievalYong S. Choi, Suk I. Yoo, Jaeho Lee. 192 [doi]
- Licensing Software Engineers: The Computer Society Must Continue to LeadDonald J. Bagert. 200-201 [doi]
- It s Different on the Other Side of the Pond. But Should It Be That Way?J. Barrie Thompson. 202 [doi]
- Implementation and Evaluation of an Automatic Personal Workflow Extraction MethodAkira Abeta, Ken ichi Kakizaki. 206-212 [doi]
- Using System Dynamics Modeling to Manage ProjectsDouglas M. Sycamore, James S. Collofello. 213-217 [doi]
- Cooperating Process ComponentsKevin A. Gary, Timothy E. Lindquist. 218 [doi]
- Multimedia Tools and Applications in the Development of a Large Complex Network SystemSourav Bhattacharya, Srihari Palangala, Tolety Siva Perraju. 226-231 [doi]
- Supporting Preemption in Wormhole NetworksKeith Knauber, Biao Chen. 232-238 [doi]
- Performance Analysis of a Graph Model for Channel Assignment in a Cellular NetworkHakki C. Cankaya, David W. Matula, Mihaela Iridon. 239 [doi]
- Here, There and Everywhere: The Future of Software Engineering EducationJ. Barrie Thompson. 242-242 [doi]
- Software Engineering Education from a UK Academic s PerspectiveHelen M. Edwards. 243-244 [doi]
- Here, There and Everywhere: The Future of Software Engineering Education: Corporate ViewBart J. Nigro. 245-245 [doi]
- One System, Two Ideologies: Integrating the Two Worlds of Software Engineering EducationT. H. Tse. 246 [doi]
- Architecture-Centered Enterprise System Development and Integration Based on Distributed Object Technology StandardKent Wreder, Yi Deng. 250-258 [doi]
- Object-Oriented Architectural Support for Developing Complex SystemsRakesh Agarwal, Giorgio Bruno, Marco Torchiano. 259-264 [doi]
- Software Architecture Analysis-A Case StudyWen-Li Wang, Mei-Huei Tang, Mei-Hwa Chen. 265 [doi]
- Merging Interval Caching with Adaptive Viewers Bias Based Caching StrategyB. Sonah, Mabo Robert Ito. 272-277 [doi]
- A Proxy Server Structure and its Cache Consistency Mechanism at the Network BottleneckJoo-Yong Kim, Kyoungwoon Cho, Kern Koh. 278-283 [doi]
- A New Flash Memory Management for Flash Storage SystemHan-joon Kim, Sang-goo Lee. 284 [doi]
- The Design of Agent-Based Tools for Bio-InformaticsChung-Shyan Liu, Wei Kuo, Lan-Yang Ch ang, Wen-Chang Lin. 294-295 [doi]
- Validation of a Patient Headache Care Education System (PHCES) Developed from a Unified Modeling Language (UML) Domain ModelAnil Khatri. 296-298 [doi]
- Steps Toward a Theory of Coordination for Intelligent Agent SocietiesPeter S. Heck. 299 [doi]
- A WWW Based Software Metrics Environment for Software Process Management and Software Product Quality ImprovementXiaoqing Liu, Ravi Viswanathan. 301-304 [doi]
- Distributed Shared Memory with Log Based Consistency for Scalable Data MiningHideaki Hirayama, Hiroki Honda, Toshitsugu Yuba. 305-308 [doi]
- Mining Weak RulesHuan Liu, Hongjun Lu. 309 [doi]
- Looking Beyond Software to Understand Software Design PatternsMichael Duell. 312-313 [doi]
- Patterns in PostmortemsLinda Rising. 314-315 [doi]
- The Unique Reference NCSLOC MetricStephanie D. Crouch, Dick B. Simmons. 316-317 [doi]
- Initial Design of the Plug-n-Analyze Framework for Architecture Tradeoff AnalysisHoh In, Ana Erendira Flores-Mendoza. 318-319 [doi]
- A Useful Approach to Developing Reverse Engineering MetricsShikun Zhou, Hongji Yang, Paul Luker, Xudong He. 320-321 [doi]
- A Framework for Top-Down Cost Estimation of Software DevelopmentTsuneo Yamaura, Tohru Kikuno. 322 [doi]
- Venice - a Toolkit/Framework for Integration and Component-Based ComputingSerge Lubenec. 326-327 [doi]
- CataLogger: A Framework for Building Asset Management SolutionsGarfield Hamilton. 328-329 [doi]
- The MEA Framework: A New Perspective for the Development of Situation-Specific MethodsColin J. Hardy, Helen M. Edwards, J. Barrie Thompson. 330-331 [doi]
- Dynamic Client-Side Scheduling in a Real-Time CORBA SystemW. Feng. 332-333 [doi]
- Failure Planning in STESCAMichael L. Nelson, Guillermo Flores Jr.. 334-335 [doi]
- Effect of Complementary Processing on Navy Command and Control SoftwareMarion G. Ceruti, Ray C. Trout, Tse Lee. 336 [doi]
- Supply and Demands of Information Technology WorkersStephen S. Yau. 342 [doi]
- Software Reuse through a Novel Representation that Supports FactorizationHee Beng Kuan Tan, Hua Koon Tan. 344-349 [doi]
- Processing Queries with Expensive Predicates by FilteringHanxiong Chen, Toshiro Ohno, Nobuo Ohbo. 350-356 [doi]
- Reusing CAD Tools in Object Oriented Based FrameworkHewijin Christine Jiau, Kuo-Feng Ssu, Jim-Min Lin, Yu-Ping Ko. 357 [doi]
- Tracking Personal Processes in Group ProjectsLy Danielle Sauer, Timothy E. Lindquist, Jeremy Cairney. 364-369 [doi]
- Brooks Law Revisited: A System Dynamics ApproachPei Hsia, Chih-Tung Hsu, David Chenho Kung. 370-375 [doi]
- A Decision Support System for Software Reliability Engineering Strategy SelectionIoana Rus, James S. Collofello. 376 [doi]
- Computers as Partners: A Technology Forecast for Decision-Making in the 21st CenturyJoseph P. Cavano. 384-385 [doi]
- Developing Dynamic Decision Support: Opportunities, Issues and ApproachesE. Coupey, Pamplin Hall. 386-387 [doi]
- Talking with Computers about the Future We Shall ShareJohn de Oliveira. 388-389 [doi]
- NLP-Supported Decision-MakingElizabeth D. Liddy. 390-391 [doi]
- Mobile Information Agents for Processing under Information Overload: A Position StatementDaniela Rus. 392 [doi]
- I3: A Petri-Net Based Specification Method for Architectural ComponentsCarl K. Chang, Seongwoon Kim. 396-402 [doi]
- An Active Database Approach to Integrating Black-Box Software ComponentsAmy Sundermier, Suzanne W. Dietrich, Vandana Shah. 403-409 [doi]
- Role-based Decomposition for Improving Concurrency in Distributed Object-Oriented Software Development EnvironmentsTae Hoon Kim, Yeong-Gil Shin. 410-415 [doi]
- Lessons Learned Applying Software Engineering Principles to Visual Programming Language Application DevelopmentTeresa G. Sparkman. 416 [doi]
- Signature Management in Workflow SystemsKarl R. P. H. Leung, Lucas Chi Kwong Hui. 424-429 [doi]
- Digiket: Decentralized Architecture for Worldwide Electronic MarketKimio Kuramitsu, Ken Sakamura. 430-435 [doi]
- Performance Analysis of Traffic Control System Based on Stochastic Timed Petri Net ModelsJiacun Wang, Chun Jin, Yi Deng. 436-441 [doi]
- Building Java Applets by Using DJ - A Java-based Constraint LanguageNeng-Fa Zhou. 442 [doi]
- OBL: A Formal Deduction Method for Object-Oriented SystemsKuangnan Chang, David Chenho Kung, Pei Hsia. 450-455 [doi]
- Detecting Null Pointer Violations in Java ProgramsXiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiris Skevoulis. 456-461 [doi]
- A New Approach to Verify Rule-Based Systems Using Petri NetsXudong He, William C. Chu, Hongji Yang, Stephen J. H. Yang. 462-467 [doi]
- Optimal Software Release Policy Based on Cost and Reliability with Testing EfficiencyChin-Yu Huang, Sy-Yen Kuo, Michael R. Lyu. 468 [doi]