Abstract is missing.
- 2BA - Rationalizing R2RML Mapping by AssertionRita Berardi, Vânia Maria Ponte Vidal, Marco A. Casanova. 5-14 [doi]
- Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering MethodsMiguel Morales Trujillo, Hanna Oktaba, Mario Piattini. 15-27 [doi]
- Fostering Reuse in Choreography Modeling Through Choreography FragmentsAndreas Weiß, Vasilios Andrikopoulos, Michael Hahn, Dimka Karastoyanova. 28-36 [doi]
- A User-centered Approach for Modeling Web Interactions Using Colored Petri NetsTaffarel Brant-Ribeiro, Rafael Dias Araujo, Igor Mendonça, Michel S. Soares, Renan G. Cattelan. 37-48 [doi]
- Deriving a Data Model from a Set of Interrelated Business Process ModelsEstrela Ferreira Cruz, Ricardo J. Machado, Maribel Yasmina Santos. 49-59 [doi]
- SOAQM: Quality Model for SOA Applications based on ISO 25010Joyce M. S. França, Michel S. Soares. 60-70 [doi]
- Top-down Feature Mining Framework for Software Product LineYutian Tang, Hareton Leung. 71-81 [doi]
- Scoping Automation in Software Product LinesAndressa Ianzen, Rafaela Mantovani Fontana, Marco Antônio Paludo, Andreia Malucelli, Sheila S. Reinehr. 82-91 [doi]
- A Model-driven Approach to Transform SysML Internal Block Diagrams to UML Activity DiagramsMarcel da Silva Melo, Joyce M. S. França, Edson A. Oliveira Jr., Michel S. Soares. 92-101 [doi]
- An Empirical Study about the Influence of Project Manager Personality in Software Project EffortDaniel Tadeu Martínez C. Branco, Edson Cesar Cunha de Oliveira, Leandro Galvão, Rafael Prikladnicki, Tayana Conte. 102-113 [doi]
- Fixture - A Tool for Automatic Inconsistencies Detection in Context-aware SPLPaulo Alexandre da Silva Costa, Fabiana Gomes Marinho, Rossana Maria de Castro Andrade, Thalisson Oliveira. 114-125 [doi]
- Using EVOWAVE to Analyze Software EvolutionRodrigo Chaves Magnavita, Renato Lima Novais, Manoel G. Mendonça. 126-136 [doi]
- Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain OntologyRim Teyeb Jaouachi, Mouna Torjmen Khemakhem, Nathalie Hernandez, Ollivier Haemmerlé, Maher Ben Jemaa. 137-144 [doi]
- What Are the Main Characteristics of High Performance Teams for Software Development?Alessandra C. S. Dutra, Rafael Prikladnicki, Tayana Conte. 145-152 [doi]
- Applying Knowledge Codification in a Post-mortem Process - A Practical ExperienceErivan Souza da Silva Filho, Davi Viana, Tayana Conte. 153-165 [doi]
- Engineering and Evaluation of Process Alternatives in Tactical Logistics PlanningMichael Glöckner, Stefan Mutke, André Ludwig. 166-176 [doi]
- Testing M2T Transformations - A Systematic Literature ReviewAndré Abade, Fabiano Ferrari, Daniel Lucrédio. 177-187 [doi]
- OnTheme/Doc - An Ontology-based Approach for Crosscutting Concern Identification from Software RequirementsPaulo Afonso Parreira Júnior, Rosângela Aparecida Dellosso Penteado. 188-200 [doi]
- Unveiling the Architecture and Design of Android Applications - An Exploratory StudyEdmilson Campos Neto, Uirá Kulesza, Roberta Coelho, Rodrigo Bonifácio, Lucas Mariano. 201-211 [doi]
- JOPA: Accessing Ontologies in an Object-oriented WayMartin Ledvinka, Petr Kremen. 212-221 [doi]
- Monitoring the Development of University Scientific Schools in University Knowledge ManagementGulnaz Zhomartkyzy, Tatiana Balova. 222-230 [doi]
- Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements ChangeAndré Di Thommazo, Kamilla Camargo, Elis Montoro Hernandes, Gislaine Gonçalves, Jefferson Pedro, Anderson Belgamo, Sandra Fabbri. 231-241 [doi]
- System of Localisation of the Network Activity Source in APCS Data LinesDmitry Mikhaylov, S. D. Fesenko, Y. Y. Shumilov, Alexander Zuykov, A. S. Filimontsev, Anastasia Tolstaya. 245-251 [doi]
- Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path ExplorationTorsten Bandyszak, Mark Rzepka, Thorsten Weyer, Klaus Pohl. 252-259 [doi]
- On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software EcosystemsRafael Z. Frantz, Sandro Sawicki, Fabricia Roos-Frantz, Iryna Yevseyeva, Michael T. M. Emmerich. 260-267 [doi]
- Checklist-based Inspection of SMarty Variability Models - Proposal and Empirical Feasibility StudyRicardo T. Geraldi, Edson Oliveira Jr., Tayana Conte, Igor Steinmacher. 268-276 [doi]
- A Generic Framework for Modifying and Extending Enterprise Modeling LanguagesRichard Braun, Werner Esswein. 277-286 [doi]
- A Spatial Data Infrastructure Review - Sorting the Actors and Policies from Enterprise ViewpointItalo Lopes Oliveira, Jugurta Lisboa Filho. 287-294 [doi]
- Evidence-based SMarty Support for Variability Identification and Representation in Component ModelsMarcio H. G. Bera, Edson Oliveira Jr., Thelma Elita Colanzi. 295-302 [doi]
- Analyzing Distributions of Emails and Commits from OSS Contributors through Mining Software Repositories - An Exploratory StudyMário André De Freitas Farias, Renato Lima Novais, Paulo Ortins, Methanias Colaço Jr., Manoel G. Mendonça. 303-310 [doi]
- Assessing the Quality of User-interface Modeling LanguagesFrancisco Morais, Alberto Rodrigues da Silva. 311-319 [doi]
- Mapping Formal Results Back to UML Semi-formal ModelVinícius Pereira, Luciano Baresi, Márcio Eduardo Delamaro. 320-329 [doi]
- Metrics to Support IT Service Maturity Models - A Systematic Mapping StudyBianca Trinkenreich, Gleison Santos, Monalessa Perini Barcellos. 330-337 [doi]
- Bridging the Gap between a Set of Interrelated Business Process Models and Software ModelsEstrela Ferreira Cruz, Ricardo J. Machado, Maribel Yasmina Santos. 338-345 [doi]
- On the Modelling of the Influence of Access Control Management to the System Security and PerformanceKatarzyna Mazur, Bogdan Ksiezopolski, Adam Wierzbicki. 346-354 [doi]
- A DSL for Configuration Management of Integrated Network Management SystemRosangela Pieroni, Rosângela Aparecida Dellosso Penteado. 355-364 [doi]
- Knowledge Management Practices in GSD - A Systematic Literature Review UpdateRomulo de Aguiar Beninca, Elisa Hatsue Moriya Huzita, Edwin Vladimir Cardoza Galdamez, Gislaine Camila Lapasini Leal, Renato Balancieri, Yoji Massago. 365-373 [doi]
- A UML-based Approach for Multi-scale Software ArchitecturesIlhem Khlif, Mohamed Hadj Kacem, Ahmed Hadj Kacem, Khalil Drira. 374-381 [doi]
- Bug Prediction for an ATM Monitoring Software - Use of Logistic Regression Analysis for Bug PredictionÖzkan Sari, Oya Kalipsiz. 382-387 [doi]
- Improving Software Design Decisions towards Enhanced Return of InvestmentPedro Valente, David Aveiro, Nuno Jardim Nunes. 388-394 [doi]
- Metrics to Support It Service Maturity Models - A Case StudyBianca Trinkenreich, Gleison Santos. 395-403 [doi]
- TCG - A Model-based Testing Tool for Functional and Statistical TestingLaryssa Lima Muniz, Ubiratan S. C. Netto, Paulo Henrique M. Maia. 404-411 [doi]
- The Impact of Lean Techniques on Factors Influencing Defect Injection in Software DevelopmentRob J. Kusters, Fabian M. Munneke, Jos J. M. Trienekens. 412-419 [doi]
- Building a Community Cloud Infrastructure for a Logistics ProjectMaria Teresa Baldassarre, Nicola Boffoli, Danilo Caivano, Gennaro del Campo, Giuseppe Visaggio. 420-427 [doi]
- Integrating User Stories and i* Models - A Systematic ApproachMárcia Lucena, Celso Agra, Fernanda M. R. Alencar, Eduardo Aranha, Aline Jaqueira. 428-438 [doi]
- Dynamic Large Scale Product Lines through Modularization ApproachAsmaa Baya, Bouchra El Asri, Ikram Dehmouch, Zineb Mcharfi. 439-444 [doi]
- Analysis of Data Quality Problem TaxonomiesArturs Zogla, Inga Meirane, Edgars Salna. 445-450 [doi]
- Analysis of Knowledge Management and E-Learning Integration ApproachesJanis Judrups. 451-456 [doi]
- VisMinerTD - An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software VisualizationThiago Souto Mendes, Daniel A. Almeida, Nicolli S. R. Alves, Rodrigo O. Spínola, Renato Lima Novais, Manoel G. Mendonça. 457-462 [doi]
- Return on Investment of Software Product Line Traceability in the Short, Mid and Long TermZineb Mcharfi, Bouchra El Asri, Ikram Dehmouch, Asmaa Baya, Abdelaziz Kriouile. 463-468 [doi]
- A Study on the Usage of Smartphone Apps in Fire Scenarios - Comparison between GDACSmobile and SmartRescue AppsParvaneh Sarshar, Vimala Nunavath, Jaziar Radianti. 469-474 [doi]
- Semantically Enriching the Detrending Step of Time Series AnalysisLucélia de Souza, Maria Salete Marcon Gomes Vaz, Marcos Sfair Sunye. 475-481 [doi]
- A Tool for the Analysis of Change Management Processes in Software Development CyclesMario Pérez, Álvaro Navas, Hugo A. Parada G., Juan C. Dueñas. 482-485 [doi]
- Systematic Mapping - Formalization of UML Semantics using Temporal LogicVinícius Pereira, Márcio Eduardo Delamaro. 486-493 [doi]
- Mapping Textual Scenarios to Analyzable Petri-Net ModelsEdgar Sarmiento, Eduardo Almentero, Julio Cesar Sampaio do Prado Leite, Guina Sotomayor. 494-501 [doi]
- Tracking Project Progress with Earned Value Management Metrics - A Real CaseMaria Teresa Baldassarre, Nicola Boffoli, Danilo Caivano, Giuseppe Visaggio. 502-508 [doi]
- BlueKey - A Bluetooth Secure Solution for Accessing Personal ComputersAziz Barbar, Anis Ismail. 509-515 [doi]
- Conceptual Interoperability Barriers Framework (CIBF) - A Case Study of Multi-organizational Software DevelopmentLlanos Cuenca, Andrés Boza, Ángel Ortiz Bas, Jos J. M. Trienekens. 521-531 [doi]
- Privacy-preserving Hybrid Peer-to-Peer Recommendation System Architecture - Locality-Sensitive Hashing in Structured Overlay NetworkAlexander V. Smirnov, Andrew Ponomarev. 532-542 [doi]
- An Approach to using a Laser Pointer as a MouseJeremiah Aizeboje, Taoxin Peng. 543-552 [doi]
- Towards a Context-Aware Adaptation Approach for Transactional ServicesWidad Ettazi, Hatim Hafiddi, Mahmoud Nassar, Sophie Ebersold. 553-562 [doi]
- Smart Cities - An Architectural ApproachAndre Duarte, Carlos Oliveira, Jorge Bernardino. 563-573 [doi]
- Temporal Constraint in Web Service CompositionBey Fella, Samia Bouyakoub, Abdelkader Belkhir. 577-584 [doi]
- Dynamic Modeling of Twitter UsersAhmed Galal, Abeer El-Korany. 585-593 [doi]
- A Recommendation Engine based on Adaptive AutomataPaulo Roberto Massa Cereda, João José Neto. 594-601 [doi]
- Managing Service Quality of Self-Service Technologies to Enhance e-Satisfaction in Digital Banking Context - The Roles of Technology Readiness and Perceived ValueSakun Boon-itt. 602-609 [doi]
- Proactive Domain Data Querying based on Context Information in Ambient Assisted Living EnvironmentsVinícius Maran, Alencar Machado, Iara Augustin, Leandro Krug Wives, José Palazzo M. de Oliveira. 610-617 [doi]
- Building Coalitions of Competitors in the Negotiation of Multiparty e-Contracts through ConsultationsAnderson P. Avila-Santos, Jhonatan Hulse, Daniel S. Kaster, Evandro Baccarin. 618-625 [doi]
- Efficient Use of Voice as a Channel for Delivering Public ServicesKapil Kant Kamal, Manish Kumar, Bharat Varyani, Kavita Bhatia. 626-631 [doi]
- A Comparative Study of Two Egocentric-based User Profiling Algorithms - Experiment in DeliciousC. Marie-Françoise Canut, Manel Mezghani, Sirinya On-at, André Péninou, Florence Sèdes. 632-639 [doi]
- How Can Semantics and Context Awareness Enhance the Composition of Context-aware Services?Tarik Fissaa, Hatim Guermah, Hatim Hafiddi, Mahmoud Nassar. 640-647 [doi]
- Can You Find All the Data You Expect in a Linked Dataset?Walter Travassos Sarinho, Bernadette Farias Lóscio, Damires Souza. 648-655 [doi]
- Evaluating Potential Improvements of Collaborative Filtering with Opinion MiningManuela Angioni, Maria Laura Clemente, Franco Tuveri. 656-661 [doi]
- Towards a Novel Engine to Underlie the Data Transmission of Social Urban Sensing ApplicationsCarlos Oberdan Rolim, Anubis Graciela de Moraes Rossetto, Valderi R. Q. Leithardt, Guilherme A. Borges, Tatiana F. M. dos Santos, Adriano M. Souza, Cláudio Fernando Resin Geyer. 662-667 [doi]
- Multi-payment Solution for Smartlet ApplicationsGatis Vitols, Nikolajs Bumanis, J. Smirnova, V. Salajevs, Irina Arhipova, Ingus Smits. 668-673 [doi]
- Towards a High Configurable SaaS - To Deploy and Bind Auser-aware Tenancy of the SaaSHouda Kriouile, Zineb Mcharfi, Bouchra El Asri. 674-679 [doi]
- Organisational Aspects and Anatomy of an Attack on NFC/HCE Mobile Payment SystemsMaurizio Cavallari, Luca Adami, Francesco Tornieri. 685-700 [doi]
- Efficient Management of Revoked Pseudonyms in VANETs using ID-Based CryptographyFrancisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil. 701-708 [doi]
- Using Internet Activity Profiling for Insider-threat DetectionBushra A. Alahmadi, Philip A. Legg, Jason R. C. Nurse. 709-720 [doi]