Abstract is missing.
- Productivity trends in incremental and iterative software developmentThomas Tan, Qi Li, Barry W. Boehm, Ye Yang, Mei He, Ramin Moazeni. 1-10 [doi]
- Challenges in enterprise software integration: An industrial study using repertory gridsHeidi J. Rognerud, Jo Erskine Hannay. 11-22 [doi]
- Effect of staffing pattern on software project: An empirical analysisFei Dong, Mingshu Li, Juan Li, Ye Yang, Qing Wang. 23-33 [doi]
- A detailed examination of the correlation between imports and failure-proneness of software componentsEkwa Duala-Ekoko, Martin P. Robillard. 34-43 [doi]
- A probability-based approach for measuring external attributes of software artifactsSandro Morasca. 44-55 [doi]
- Does explanation improve the acceptance of decision support for product release planning?Gengshen Du, Günther Ruhe. 56-68 [doi]
- Impact of the visitor pattern on program comprehension and maintenanceSebastien Jeanmart, Yann-Gaël Guéhéneuc, Houari A. Sahraoui, Naji Habra. 69-78 [doi]
- Understanding the use of inheritance with visual patternsSimon Denier, Houari A. Sahraoui. 79-88 [doi]
- Strong dependencies between software componentsPietro Abate, Roberto Di Cosmo, Jaap Boender, Stefano Zacchiroli. 89-99 [doi]
- Using function points to measure and estimate real-time and embedded software: Experiences and guidelinesLuigi Lavazza, Carla Garavaglia. 100-110 [doi]
- Applying moving windows to software effort estimationChris Lokan, Emilia Mendes. 111-122 [doi]
- Scope error detection and handling concerning software estimation modelsSalvatore Alessandro Sarcià , Victor R. Basili, Giovanni Cantone. 123-132 [doi]
- What do we know about perspective-based reading? An approach for quantitative aggregation in software engineeringMarcus Ciolkowski. 133-144 [doi]
- Cognitive factors in perspective-based reading (PBR): A protocol analysis studyBryan Robbins, Jeff Carver. 145-155 [doi]
- Does aspect-oriented programming increase the development speed for crosscutting code? An empirical studyStefan Hanenberg, Sebastian Kleinschmager, Manuel Josupeit-Walter. 156-167 [doi]
- We need more coverage, stat! classroom experience with the software ICUPhilip Johnson, Shaoxuan Zhang. 168-178 [doi]
- Fitting a workflow model to captured development dataMin Zhang, Lorin Hochstein. 179-190 [doi]
- Applying support vector regression for web effort estimation using a cross-company datasetAnna Corazza, Sergio Di Martino, Filomena Ferrucci, Carmine Gravino, Emilia Mendes. 191-202 [doi]
- Personality and the nature of collaboration in pair programmingThorbjorn Walle, Jo Erskine Hannay. 203-213 [doi]
- An empirical study of the effects of personality in pair programming using the five-factor modelNorsaremah Salleh, Emilia Mendes, John C. Grundy, Giles St. J. Burch. 214-225 [doi]
- An interpretation of the results of the analysis of pair programming during novices integration in a teamIlenia Fronza, Alberto Sillitti, Giancarlo Succi. 225-235 [doi]
- Gauging acceptance of software metrics: Comparing perspectives of managers and developersMedha Umarji, Carolyn B. Seaman. 236-247 [doi]
- Empirical results from the transformation of a large commercial technical computing environmentRahul Razdan, Steve Esposito, Jay Lawrence, Peter Conner. 248-256 [doi]
- Balancing software product investmentsSebastian Barney, Claes Wohlin, Aybüke Aurum. 257-268 [doi]
- Evaluation of model-based testing techniques selection approaches: An external replicationArilo Claudio Dias Neto, Guilherme Horta Travassos. 269-278 [doi]
- Test case prioritization based on data reuse an experimental studyLucas Lima, Juliano Iyoda, Augusto Sampaio, Eduardo Aranha. 279-290 [doi]
- Test coverage and post-verification defects: A multiple case studyAudris Mockus, Nachiappan Nagappan, Trung T. Dinh-Trong. 291-301 [doi]
- The role of software process simulation modeling in software risk management: A systematic reviewDapeng Liu, Qing Wang, Junchao Xiao. 302-311 [doi]
- Tool supported detection and judgment of nonconformance in process executionNico Zazworka, Victor R. Basili, Forrest Shull. 312-323 [doi]
- Exploring language in software process elicitation: A grounded theory approachCarlton A. Crabtree, Carolyn B. Seaman, Anthony F. Norcio. 324-335 [doi]
- The impact of limited search procedures for systematic literature reviews A participant-observer case studyBarbara A. Kitchenham, Pearl Brereton, Mark Turner, Mahmood Niazi, Stephen G. Linkman, Rialette Pretorius, David Budgen. 336-345 [doi]
- Systematic literature reviews in software engineering: Preliminary results from interviews with researchersMuhammad Ali Babar, He Zhang. 346-355 [doi]
- Using differences among replications of software engineering experiments to gain knowledgeNatalia Juristo Juzgado, Sira Vegas. 356-366 [doi]
- A systematic review of software maintainability prediction and metricsMehwish Riaz, Emilia Mendes, Ewan D. Tempero. 367-377 [doi]
- Using concept mapping for maintainability assessmentsAiko Fallas Yamashita, Hans Christian Benestad, Bente Cecilie Dahlum Anda, Per Einar Arnstad, Dag I. K. Sjøberg, Leon Moonen. 378-389 [doi]
- The evolution and impact of code smells: A case study of two open source systemsSteffen Olbrich, Daniela Cruzes, Victor R. Basili, Nico Zazworka. 390-400 [doi]
- Context in industrial software engineering researchKai Petersen, Claes Wohlin. 401-404 [doi]
- An empirical study on software engineers motivational factorsA. César C. França, Fabio Q. B. da Silva. 405-409 [doi]
- Building the linkage between project managers personality and success of software projectsYi Wang. 410-413 [doi]
- Action research use in software engineering: An initial surveyPaulo Sérgio Medeiros dos Santos, Guilherme Horta Travassos. 414-417 [doi]
- Software risk management barriers: An empirical studyEdzreena Edza Odzaly, Paul Sage, Des Greer. 418-421 [doi]
- Transactions and paths: Two use case based metrics which improve the early effort estimationGabriela Robiolo, Cristina Badano, Ricardo Orosco. 422-425 [doi]
- Usability testing with total-effort metricsLiam Feldman, Carl J. Mueller, Dan E. Tamir, Oleg V. Komogortsev. 426-429 [doi]
- Modifiability measurement from a task complexity perspective: A feasibility studyLulu He, Jeffrey C. Carver. 430-434 [doi]
- Predicting defects with program dependenciesThomas Zimmermann, Nachiappan Nagappan. 435-438 [doi]
- Optimized assignment of developers for fixing bugs an initial evaluation for eclipse projectsMd. Mainur Rahman, Günther Ruhe, Thomas Zimmermann. 439-442 [doi]
- The curse of copy&paste Cloning in requirements specificationsChristoph Domann, Elmar Juergens, Jonathan Streit. 443-446 [doi]
- An empirical quality model for web service ontologies to support mobile devicesDan Schrimpsher, Letha Etzkorn. 447-450 [doi]
- An empirical study on bug assignment automation using Chinese bug dataZhongpeng Lin, Fengdi Shu, Ye Yang, Chenyong Hu, Qing Wang. 451-455 [doi]
- Analyzing video data: A study of programming behavior under two software engineering paradigmsHuijuan Wu, Yuepu Guo, Carolyn B. Seaman. 456-459 [doi]
- Towards logistic regression models for predicting fault-prone code across software projectsAna Erika Camargo Cruz, Koichiro Ochimizu. 460-463 [doi]
- Quality models in practice: A preliminary analysisStefan Wagner, Klaus Lochmann, Sebastian Winter, Andreas Goeb, Michael Klaes. 464-467 [doi]
- On the effectiveness of dynamic modeling in UML: Results from an external replicationSilvia Mara Abrahão, Emilio Insfrán, Carmine Gravino, Giuseppe Scanniello. 468-472 [doi]
- Simulation of the defect removal process with queuing theoryFan Wang, Xiaohu Yang, Xiaochun Zhu, Lu Chen. 473-476 [doi]
- Reducing false alarms in software defect prediction by decision threshold optimizationAyse Tosun, Ayse Basar Bener. 477-480 [doi]
- An empirical study of security problem reports in Linux distributionsPrasanth Anbalagan, Mladen A. Vouk. 481-484 [doi]
- Progress report on the experimental evaluation of security inspection guidanceFrank Elberzhager, Marek Jawurek, Christian Jung, Alexander Klaus. 485-489 [doi]
- Software testing sizing in incremental development: A case studyXiaochun Zhu, Bo Zhou, Lu Chen. 490-493 [doi]
- How do testers do it? An exploratory study on manual testing practicesJuha Itkonen, Mika Mäntylä, Casper Lassenius. 494-497 [doi]
- The QualOSS open source assessment model measuring the performance of open source communitiesMartÃn Soto, Marcus Ciolkowski. 498-501 [doi]
- A systematic mapping study on empirical evaluation of software requirements specifications techniquesNelly Condori-Fernández, Maya Daneva, Klaas Sikkel, Roel Wieringa, Óscar Dieste TubÃo, Oscar Pastor. 502-505 [doi]
- An experiment to observe the impact of UML diagrams on the effectiveness of software requirements inspectionsÖzlem Albayrak. 506-510 [doi]
- A comparison of software cost, duration, and quality for waterfall vs. iterative and incremental development: A systematic reviewSusan M. Mitchell, Carolyn B. Seaman. 511-515 [doi]
- An analysis of CVSS version 2 vulnerability scoringKaren Scarfone, Peter Mell. 516-525 [doi]
- Improving CVSS-based vulnerability prioritization and response with context informationChristian Frühwirth, Tomi Männistö. 535-544 [doi]
- Security of open source web applicationsJames Walden, Maureen Doyle, Grant A. Welch, Michael Whelan. 545-553 [doi]
- Measuring the interplay of security principles in software architecturesKoen Buyens, Riccardo Scandariato, Wouter Joosen. 554-563 [doi]
- Using security metrics coupled with predictive modeling and simulation to assess security processesYolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu. 564-573 [doi]
- Quantitative analysis of information security interdependency between industrial sectorsHideyuki Tanaka. 574-583 [doi]