Abstract is missing.
- Effective Statistical Fault Localization Using Program SlicesYan Lei, Xiaoguang Mao, Ziying Dai, Chengsong Wang. 1-10 [doi]
- Recovering Traceability Links between Code and Documentation for Enterprise Project ArtifactsShouichi Nagano, Yusuke Ichikawa, Toru Kobayashi. 11-18 [doi]
- A Source Code Recommender System to Support NewcomersYuri Malheiros, Alan Moraes, Cleyton Trindade, Silvio Meira. 19-24 [doi]
- Workload-Aware Online Anomaly Detection in Enterprise Applications with Local Outlier FactorTao Wang, Wenbo Zhang, Jun Wei, Hua Zhong. 25-34 [doi]
- A Metrics-Based Data Mining Approach for Software Clone DetectionSalwa K. Abd-El-Hafiz. 35-41 [doi]
- A Petri Net-Based Byzantine Fault Diagnosis Method for Service CompositionGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 42-51 [doi]
- Adaptive Random Test Case Generation for Combinatorial TestingRubing Huang, Xiaodong Xie, Tsong Yueh Chen, Yansheng Lu. 52-61 [doi]
- Capacity Evaluation of Multi-modal Network Notification ServiceJ. Jenny Li, Colin L. Mallows, Jim Landwehr. 62-71 [doi]
- Preemptive Regression Test Scheduling Strategies: A New Testing Approach to Thriving on the Volatile Service EnvironmentsLijun Mei, Ke Zhai, Bo Jiang, W. K. Chan, T. H. Tse. 72-81 [doi]
- Trustworthiness of Open Source, Open Data, Open Systems and Open StandardsIna Schieferdecker. 82 [doi]
- (Open) Data QualityIna Schieferdecker. 83-84 [doi]
- Investigating Human Factors through Amassing Large-Scale OSS RepositoriesMinghui Zhou. 85-86 [doi]
- Supporting trust via open information spacesEdzard Höfig. 87-88 [doi]
- Integrating Software Product Lines: A Study of Reuse versus StabilityAlessandro Cavalcante Gurgel, Francisco Dantas, Alessandro Garcia, Cláudio Sant'Anna. 89-98 [doi]
- Experiences of a Product Line Migration ProjectDetlef Streitferdt, Arfan Mansoor. 99-104 [doi]
- Kutulu: A Domain-Specific Language for Feature-Driven Product DerivationOrçun Dayibas, Halit Oguztüzün. 105-110 [doi]
- Automatic Adaptation of Software Applications to Database Evolution by Graph Differencing and AOP-Based Dynamic PatchingYang Song, Xin Peng, Zhenchang Xing, Wenyun Zhao. 111-118 [doi]
- An Effective Defect Detection and Warning Prioritization Approach for Resource LeaksGuangtai Liang, Qian Wu, Qianxiang Wang, Hong Mei. 119-128 [doi]
- Evaluating Reliability-Testing Usage ModelsBo Wan, Gregor von Bochmann, Guy-Vincent Jourdan. 129-137 [doi]
- Towards Online Localization and Recovery for Faulty Components in Component-Based ApplicationsChao You, Minghui Zhou, Hongwu Lin, Zan Xiao, Hong Mei. 138-147 [doi]
- CATest: A Test Automation Framework for Multi-agent SystemsShufeng Wang, Hong Zhu. 148-157 [doi]
- Usefulness Evaluation of Simulation in Server System TestingJian Sun 0001, Tomi Männistö. 158-163 [doi]
- Towards Dynamic Random Testing for Web ServicesChang-ai Sun, Guan Wang, Kai-Yuan Cai, Tsong Yueh Chen. 164-169 [doi]
- How to Recommend Appropriate Developers for Bug Fixing?Tao Zhang, Byungjeong Lee. 170-175 [doi]
- Adaptive Explanation Architecture for Maintaining Human-Computer TrustFlorian Nothdurft, Gregor Bertrand, Helmut Lang, Wolfgang Minker. 176-184 [doi]
- Quality-Driven Self-Adaptation: Bridging the Gap between Requirements and Runtime Architecture by Design DecisionLiwei Shen, Xin Peng, Wenyun Zhao. 185-194 [doi]
- A Rapid Development Framework for Multilingual Spoken Dialogue SystemsMasahiro Araki, Daisuke Takegoshi. 195-202 [doi]
- ALTA: Automatic Load-Time Adaptation Technique for Refactoring-Based Evolution of Software ComponentKai-Shin Lu, Carl K. Chang. 203-212 [doi]
- An Initial Study on Refactoring TacticsHui Liu, Yuan Gao, Zhendong Niu. 213-218 [doi]
- A Framework for Examining Topical Locality in Object-Oriented SoftwareNan Niu, Juha Savolainen, Tanmay Bhowmik, Anas Mahmoud, Sandeep Reddivari. 219-224 [doi]
- Domain Independent Event Analysis for Log Data ReductionTheodoros Kalamatianos, Kostas Kontogiannis, Peter Matthews. 225-232 [doi]
- Preventing Input Validation Vulnerabilities in Web Applications through Automated Type AnalysisTheodoor Scholte, William K. Robertson, Davide Balzarotti, Engin Kirda. 233-243 [doi]
- Real-Time Fast-Flux Identification via Localized Spatial Geolocation DetectionHorng-Tzer Wang, Ching-Hao Mao, Kuo-Ping Wu, Hahn-Ming Lee. 244-252 [doi]
- Software Testing, Software Quality and Trust in Software-Based SystemsChristof J. Budnik. 253 [doi]
- Position Statement: Software Testing, Software Quality and Trust in Software-Based SystemsRajesh Subramanyan. 254 [doi]
- Position statement: Can testing prove software has no bug?Hong Zhu. 255 [doi]
- Data Mining Technique Effectiveness for Improving Software Productivity and QualityToru Kobayashi. 256 [doi]
- An Approach for Detecting Inconsistencies between Behavioral Models of the Software Architecture and the CodeSelim Ciraci, Hasan Sözer, Bedir Tekinerdogan. 257-266 [doi]
- Fine-Grained Design Pattern DetectionMaurice LeBon, Vassilios Tzerpos. 267-272 [doi]
- On the Proactive Design of Product-Line Architectures with Aspects: An Exploratory StudyWillian N. Oizumi, Antonio C. Contieri Junior, Guilherme G. Correia, Thelma Elita Colanzi, Sandra Ferrari, Itana Maria de Souza Gimenes, Edson Alves de Oliveira Junior, Alessandro Fabricio Garcia, Paulo César Masiero. 273-278 [doi]
- Development of Situational Requirements Engineering Processes: A Process Factory ApproachOmid Jafarinezhad, Raman Ramsin. 279-288 [doi]
- Software Product Line Engineering for Developing Self-Adaptive Systems: Towards the Domain RequirementsLiwei Shen, Xin Peng, Wenyun Zhao. 289-296 [doi]
- Requirements Understanding: A Challenge in Global Software Development, Industrial Surveys in Kingdom of Saudi ArabiaMohammed Abdullah Alnuem, Arshad Ahmad, Hashim Khan. 297-306 [doi]
- Position statement for the panel on creative computing: Reconciling objective precision with subjective ambiguity - Animated computing changes the way and style of computer applicationRuqian Lu. 307-308 [doi]
- Position statement for the panel on creative computing: Reconciling objective precision with subjective ambiguity - Using the semantic web technologies to support automatic animationSongmao Zhang. 309 [doi]
- Position statement: Can software design benefit from creative computing?Hong Zhu. 310-311 [doi]
- XMLSnippet: A Coding Assistant for XML Configuration Snippet RecommendationSheng Huang, Yanghua Xiao, Yiqi Lu, Wei Wang 0009, Yu Wang. 312-321 [doi]
- Model-Based Static Source Code Analysis of Java Programs with Applications to Android SecurityZheng Lu, Supratik Mukhopadhyay. 322-327 [doi]
- A Change Proposal Driven Approach for Changeability Assessment Using FCA-Based Impact AnalysisXiaobing Sun, Bixin Li, Qiandong Zhang. 328-333 [doi]
- A Methodology for Building Effective Test Models with Function NetsDianxiang Xu, William Chu. 334-339 [doi]
- Paxos-Based Memory Data Replication in Stock Trading SystemXiaodong Huang, Yong Zhang, Chunxiao Xing, Yinfei Huang, Jianfeng Wu, Shuo Bai. 340-341 [doi]
- Using Program Dynamic Analysis for Weak Algorithm DetectionZakarya Alzamil. 342-343 [doi]
- Requirement Patterns for Multicore SystemsArfan Mansoor, Detlef Streitferdt. 344-345 [doi]
- Performance Evaluations of Vector-Raster Satellite Image Transfers through Web ServicesSüleyman Eken, Ahmet Sayar. 346-347 [doi]
- User Profiling for Policy Management in Social CommunitiesOkan Bursa, Özgü Can, Murat Osman Ünalir. 348-349 [doi]
- On Capturing Effects of Modifications as Data DependenciesHasan Ural, Hüsnü Yenigün. 350-351 [doi]
- Accelerated Deterministic Multithreading for Multichannel Video DecoderYoungsam Shin, Minyoung Son, SeungWon Lee, Shihwa Lee. 352-353 [doi]
- Image Analysis Using Machine Learning: Anatomical Landmarks Detection in Fetal Ultrasound ImagesBahbibi Rahmatullah, Aris Papageorghiou, J. Alison Noble. 354-355 [doi]
- Test Case Generation by Simulating Requirements Analysis ModelRyo Shikimi, Shinpei Ogata, Saeko Matsuura. 356-357 [doi]
- Customer Churn Prediction for Telecom ServicesUtku Yabas, Hakki C. Cankaya, Turker Ince. 358-359 [doi]
- A Cluster-Based Core Protection Technique for Networks-on-ChipKhalid Latif 0002, Amir-Mohammad Rahmani, Pasi Liljeberg, Hannu Tenhunen, Tiberiu Seceleanu. 360-361 [doi]
- HCI Knowledge in Software Engineering Practices for Designing Interactive Maintenance Assistance SystemsSamir Benbelkacem, Nadia Zenati-Henda, Mahmoud Belhocine, Abdelkader Bellarbi, Mohamed Tadjine. 362-363 [doi]
- An Intermediate Language for Semantic Exceptions in Context-Aware SystemsEun-Sun Cho, Sumi Helal. 364-365 [doi]
- Doppel-Code: A Clone Visualization Tool for Prioritizing Global and Local Clone ImpactsChristopher Forbes, Iman Keivanloo, Juergen Rilling. 366-367 [doi]
- WorldTour: Towards an Adaptive Software to Support Children with Autism in Tour PlanningFelipe Rodrigues Monteiro Sousa, Thais Helena Chaves de Castro. 368 [doi]
- Implementation and Evaluation of Commodity Hardware and Software in an Open World Spoken Dialog FrameworkHareendra Manuru, Rajagopal Vasudevan, Ashok Sasidharan, Thomas Lynch, Seth Darbyshire, Satyajeet Raje, Rajiv Ramnath, Jayashree Ramanathan. 369 [doi]
- Implementing Knowledge Management Systems in Software Engineering: Opportunities and ChallengesMostefai Mohammed Amine, Mohamed Ahmed-Nacer. 370 [doi]
- Conformance Testing of WS-BPEL Compositions under Various Load ConditionsAfef Jmal Maâlej, Moez Krichen, Mohamed Jmaiel. 371 [doi]
- Plenary panel description: Challenges towards the global adoption of cloud computingVladimir Getov. 372 [doi]
- Security as a Service in Smart Clouds - Opportunities and ConcernsVladimir Getov. 373-379 [doi]
- The Development of Cloud Computing and Its Challenges for TaiwanWilliam C. Chu, Chih-Hung Chang, Chih-Wei Lu, Juei-Nan Chen, Feng-Jian Wang. 380-386 [doi]
- Insider Threats to Cloud Computing: Directions for New Research ChallengesWilliam Claycomb, Alex Nicoll. 387-394 [doi]
- PaaS-Oriented Performance Modeling for Cloud ComputingWenbo Zhang, Xiang Huang, Ningjiang Chen, Wei Wang 0049, Hua Zhong. 395-404 [doi]
- Event Indexing and Searching for High Volumes of Event Streams in the CloudMiao Wang, Viliam Holub, John Murphy, Patrick O'Sullivan. 405-415 [doi]
- Demystifying Cloud Benchmarking Paradigm - An in Depth ViewVenu Vedam, Jayanti Vemulapati. 416-421 [doi]
- An Evaluation Model for Dependability of Internet-Scale Software on Basis of Bayesian NetworksGuannan Si, Jufeng Yang, Jing Xu, Shuo Wen, Wei Tian. 422-431 [doi]
- Deriving Specifications for Composite Web ServicesGeorge Baryannis, Manuel Carro, Dimitris Plexousakis. 432-437 [doi]
- Understanding Socio-technical Factors Influencing Testers in Software Development OrganizationsAnca Deak. 438-441 [doi]
- Americans with Disabilities Act - Compliance Assessment Toolkit on SmartphoneMohammad Tanviruzzaman, Rizwana Rizia, Sheikh Iqbal Ahamed, Roger O. Smith. 442-451 [doi]
- Automatic Data Clustering Analysis of Arbitrary Shape with K-Means and Enhanced Ant-Based Template MechanismWei Zhang, Hen-I Yang, Hsinyi Jiang, Carl K. Chang. 452-460 [doi]
- Applying Knowledge Elicitation to Improve Web Effort Estimation: A Case StudyEmilia Mendes, Manar AbuTalib, Steve Counsell. 461-469 [doi]
- Architecturing Business Intelligence for SMEsAyse Eser Baransel, Cesur Baransel. 470-475 [doi]
- Agile Adoption Story from NHNEunha Kim, Seokmoon Ryoo. 476-481 [doi]
- Educational Activity Finder for Children with Pervasive Developmental Disorder through a Semantic Search SystemDuygu Çelik, Eray Elverici, Atilla Elçi, Necati Inan. 482-487 [doi]
- A Scalable Physical Memory Allocation Scheme for L4 MicrokernelChen Tian, Daniel G. Waddington, Jilong Kuang. 488-493 [doi]
- Model Driven Software Development for Military Command and Control SystemsBurak Çiflikli, Onur Özcan, Ahmet Bora Uysal. 494-497 [doi]
- A perspective of software trustworthiness based on finance industryBaris Sarialioglu. 498 [doi]
- CASViD: Application Level Monitoring for SLA Violation Detection in CloudsVincent C. Emeakaroha, Tiago C. Ferreto, Marco Aurélio Stelmar Netto, Ivona Brandic, César A. F. De Rose. 499-508 [doi]
- P-Tracer: Path-Based Performance Profiling in Cloud Computing SystemsHaibo Mi, Huaimin Wang, Hua Cai, Yangfan Zhou, Michael R. Lyu, Zhenbang Chen. 509-514 [doi]
- A Solution for Privacy Protection in MapReduceQuang Tran, Hiroyuki Sato. 515-520 [doi]
- Using Semantic Web Technologies for RBAC in Project-Oriented EnvironmentsSatyajeet Raje, Chowdary Davuluri, Michael Freitas, Rajiv Ramnath, Jay Ramanathan. 521-530 [doi]
- The RDFa Content Editor - From WYSIWYG to WYSIWYMAli Khalili, Sören Auer, Daniel Hladky. 531-540 [doi]
- Semantic Web - The Missing Link in Global Source Code Analysis?Iman Keivanloo, Juergen Rilling, Philippe Charland. 541-550 [doi]
- Enriching the DBpedia Ontology with Shared Conceptualizations from FolksonomiesSana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia. 551-556 [doi]
- Novel Energy Saving Opportunities in Smart Grids Using a Secure Social Networking LayerFlorian Skopik, Christian Wagner. 557-566 [doi]
- Privacy-Preserving Data Publishing for Free Text Chinese Electronic Medical RecordsLei Chen, Ji-Jiang Yang, Qing Wang. 567-572 [doi]
- Disease-Disease Relationships for Rheumatic Diseases: Web-Based Biomedical Textmining an Knowledge Discovery to Assist Medical Decision MakingAndreas Holzinger, Klaus-Martin Simonic, Pinar Yildirim. 573-580 [doi]
- A Privacy-Preserving Cloud Computing System for Creating Participatory Noise MapsGeorge Drosatos, Pavlos S. Efraimidis, Ioannis N. Athanasiadis, Ellie D'Hondt, Matthias Stevens. 581-586 [doi]
- Influence of Anchor Management on Anchored Navigation in Mobile MapsRodrigo de A. Maues, Eduardo Freire Nakamura, Simone Diniz Junqueira Barbosa. 587-595 [doi]
- Study of Fractal Color Image Compression Using YUV ComponentsEman A. Al-Hilo, Loay E. George. 596-601 [doi]
- STREAM-ADD - Supporting the Documentation of Architectural Design Decisions in an Architecture Derivation ProcessDiego Dermeval, João Pimentel, Carla T. L. L. Silva, Jaelson Castro, Emanuel Santos, Gabriela Guedes, Márcia Lucena, Anthony Finkelstein. 602-611 [doi]
- Panel 5: Cloud Computing for Developing Countries PanelistsTugkan Tuglular. 612 [doi]
- Simulating Power Consumption of Location Tracking Algorithms to Improve Energy-Efficiency of SmartphonesUlrich Bareth. 613-622 [doi]
- KnockAround: Location Based Service via Social KnowledgeRizwana Rizia, Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed. 623-631 [doi]
- ConsView: Towards Application-Specific Consistent Context ViewsHaibin Yang, Chang Xu, Xiaoxing Ma, Linghao Zhang, Chun Cao, Jian Lu. 632-637 [doi]
- An Agent-Based Application to Enable Deregulated Energy MarketsNicola Capodieci, Giacomo Cabri, Giuliano Andrea Pagani, Marco Aiello. 638-647 [doi]
- Teaching Software Engineering in Developing Countries: A Position PaperRasha Osman. 648-653 [doi]
- Leveraging 24/7 Availability and Performance for Distributed Real-Time Data WarehousesRicardo Jorge Santos, Jorge Bernardino, Marco Vieira. 654-659 [doi]
- Specification Mutation Analysis for Validating Timed Testing Approaches Based on Timed AutomataMohammad Saeed Abou Trab, Steve Counsell, Robert M. Hierons. 660-669 [doi]
- Automatic RT-Java Code Generation from AADL Models for ARINC653-Based Avionics SoftwareYing Wang, Dianfu Ma, Yongwang Zhao, Lu Zou, Xianqi Zhao. 670-679 [doi]
- Scheduling and Analysis of Real-Time Software FamiliesHamideh Sabouri, Mohammad Mahdi Jaghoori, Frank S. de Boer, Ramtin Khosravi. 680-689 [doi]