Abstract is missing.
- Topes: reusable abstractions for validating dataChristopher Scaffidi, Brad A. Myers, Mary Shaw. 1-10 [doi]
- Tracking source locationsSteven P. Reiss. 11-20 [doi]
- Answering conceptual queries with FerretBrian de Alwis, Gail C. Murphy. 21-30 [doi]
- Specification patterns for probabilistic quality propertiesLars Grunske. 31-40 [doi]
- Existential live sequence charts revisitedGerman Sibay, Sebastián Uchitel, Víctor A. Braberman. 41-50 [doi]
- Symbolic mining of temporal specificationsMark Gabel, Zhendong Su. 51-60 [doi]
- Testing pervasive software in the presence of context inconsistency resolution servicesHeng Lu, W. K. Chan, T. H. Tse. 61-70 [doi]
- ARTOO: adaptive random testing for object-oriented softwareIlinca Ciupa, Andreas Leitner, Manuel Oriol, Bertrand Meyer. 71-80 [doi]
- Time will tell: fault localization using time spectraCemal Yilmaz, Amit M. Paradkar, Clay Williams. 81-90 [doi]
- Towards reusable components with aspects: an empirical study on modularity and obliviousnessKevin J. Hoffman, Patrick Eugster. 91-100 [doi]
- Using components for architecture-based management: the self-repair caseSylvain Sicard, Fabienne Boyer, Noel De Palma. 101-110 [doi]
- Early prediction of software component reliabilityLeslie Cheung, Roshanak Roshandel, Nenad Medvidovic, Leana Golubchik. 111-120 [doi]
- Executable misuse cases for modeling security concernsJon Whittle, Duminda Wijesekera, Mark Hartong. 121-130 [doi]
- Mining library specifications using inductive logic programmingSriram Sankaranarayanan, Franjo Ivancic, Aarti Gupta. 131-140 [doi]
- Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systemsJinjun Chen, Yun Yang. 141-150 [doi]
- Precise memory leak detection for java software using container profilingGuoqing Xu, Atanas Rountev. 151-160 [doi]
- The effect of program and model structure on mc/dc test adequacy coverageAjitha Rajan, Michael W. Whalen, Mats Per Erik Heimdahl. 161-170 [doi]
- Static detection of cross-site scripting vulnerabilitiesGary Wassermann, Zhendong Su. 171-180 [doi]
- A comparative analysis of the efficiency of change metrics and static code attributes for defect predictionRaimund Moser, Witold Pedrycz, Giancarlo Succi. 181-190 [doi]
- On the difficulty of replicating human subjects studies in software engineeringJonathan Lung, Jorge Aranda, Steve M. Easterbrook, Gregory V. Wilson. 191-200 [doi]
- An empirical study of the effects of test-suite reduction on fault localizationYanbing Yu, James A. Jones, Mary Jean Harrold. 201-210 [doi]
- Calysto: scalable and precise extended static checkingDomagoj Babic, Alan J. Hu. 211-220 [doi]
- jPredictor: a predictive runtime analysis tool for javaFeng Chen, Traian-Florin Serbanuta, Grigore Rosu. 221-230 [doi]
- Dynamic detection of atomic-set-serializability violationsChristian Hammer, Julian Dolby, Mandana Vaziri, Frank Tip. 231-240 [doi]
- An empirical study of software developers management of dependencies and changesCleidson R. B. de Souza, David F. Redmiles. 241-250 [doi]
- TODO or to bug: exploring how task annotations play a role in the work practices of software developersMargaret-Anne D. Storey, Jody Ryall, R. Ian Bull, Del Myers, Janice Singer. 251-260 [doi]
- Evolving software product lines with aspects: an empirical study on design stabilityEduardo Figueiredo, Nélio Cacho, Cláudio Sant Anna, Mario Monteiro, Uirá Kulesza, Alessandro Garcia, Sérgio Soares, Fabiano Cutigi Ferrari, Safoora Shakil Khan, Fernando Castor Filho, Francisco Dantas. 261-270 [doi]
- A verification system for timed interval calculusChunqing Chen, Jin Song Dong, Jun Sun 0001. 271-280 [doi]
- DySy: dynamic symbolic execution for invariant inferenceChristoph Csallner, Nikolai Tillmann, Yannis Smaragdakis. 281-290 [doi]
- Incremental state-space exploration for programs with dynamically allocated dataSteven Lauterburg, Ahmed Sobeih, Darko Marinov, Mahesh Viswanathan. 291-300 [doi]
- Debugging reinvented: asking and answering why and why not questions about program behaviorAndrew Jensen Ko, Brad A. Myers. 301-310 [doi]
- Granularity in software product linesChristian Kästner, Sven Apel, Martin Kuhlemann. 311-320 [doi]
- Scalable detection of semantic clonesMark Gabel, Lingxiao Jiang, Zhendong Su. 321-330 [doi]
- The effect of the number of inspectors on the defect estimates produced by capture-recapture modelsGursimran Singh Walia, Jeffrey C. Carver, Nachiappan Nagappan. 331-340 [doi]
- Predicting accurate and actionable static analysis warnings: an experimental approachJoseph R. Ruthruff, John Penix, J. David Morgenthaler, Sebastian G. Elbaum, Gregg Rothermel. 341-350 [doi]
- Sufficient mutation operators for measuring test effectivenessAkbar Siami Namin, James H. Andrews, Duncan J. Murdoch. 351-360 [doi]
- Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasksFilippo Ricca, Massimiliano Di Penta, Marco Torchiano, Paolo Tonella, Mariano Ceccato, Corrado Aaron Visaggio. 361-370 [doi]
- Data flow testing of service-oriented workflow applicationsLijun Mei, W. K. Chan, T. H. Tse. 371-380 [doi]
- A tale of four kernelsDiomidis Spinellis. 381-390 [doi]
- Defining and continuous checking of structural program dependenciesMichael Eichberg, Sven Kloppenburg, Karl Klose, Mira Mezini. 391-400 [doi]
- A case study evaluation of maintainability and performance of persistency techniquesThomas Goldschmidt, Ralf Reussner, Jochen Winzen. 401-410 [doi]
- Automatic modularity conformance checkingSunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J. Sullivan. 411-420 [doi]
- Breaking the barriers to successful refactoring: observations and tools for extract methodEmerson R. Murphy-Hill, Andrew P. Black. 421-430 [doi]
- Systematically refactoring inheritance to delegation in javaHannes Kegel, Friedrich Steimann. 431-440 [doi]
- ::::ReBA::::: ::::re::::factoring-aware ::::b::::inary ::::a::::daptation of evolving librariesDanny Dig, Stas Negara, Vibhu Mohindra, Ralph E. Johnson. 441-450 [doi]
- Impact analysis of database schema changesAndy Maule, Wolfgang Emmerich, David S. Rosenblum. 451-460 [doi]
- An approach to detecting duplicate bug reports using natural language and execution informationXiaoyin Wang, Lu Zhang, Tao Xie, John Anvik, Jiasu Sun. 461-470 [doi]
- Mining framework usage changes from instantiation codeThorsten Schäfer, Jan Jonas, Mira Mezini. 471-480 [doi]
- Recommending adaptive changes for framework evolutionBarthélémy Dagenais, Martin P. Robillard. 481-490 [doi]
- Four enhancements to automateddistributed system experimentation methodsYanyan Wang, Antonio Carzaniga, Alexander L. Wolf. 491-500 [doi]
- Automatic generation of software behavioral modelsDavide Lorenzoli, Leonardo Mariani, Mauro Pezzè. 501-510 [doi]
- Detecting model inconsistency through operation-based model constructionXavier Blanc, Isabelle Mounier, Alix Mougenot, Tom Mens. 511-520 [doi]
- The influence of organizational structure on software quality: an empirical case studyNachiappan Nagappan, Brendan Murphy, Victor R. Basili. 521-530 [doi]
- Predicting defects using network analysis on dependency graphsThomas Zimmermann, Nachiappan Nagappan. 531-540 [doi]
- Open source software peer review practices: a case study of the apache serverPeter C. Rigby, Daniel M. Germán, Margaret-Anne D. Storey. 541-550 [doi]
- Ahaa --agile, hybrid assessment method for automotive, safety critical smesFergal McCaffery, Minna Pikkarainen, Ita Richardson. 551-560 [doi]
- Models for model s sake: why explicit system models are also an end to themselvesOliver Niggemann, Joachim Stroop. 561-570 [doi]
- Time-bounded adaptation for automotive system softwareSerena Fritsch, Aline Senart, Douglas C. Schmidt, Siobhán Clarke. 571-580 [doi]
- Mulit-level system integration based on AUTOSARUlrich Freund. 581-582 [doi]
- Asam odx: syntax as semanticsStefan Bienk. 583-592 [doi]
- A language for advanced protocol analysis in automotive networksTim Reichert, Edmund Klaus, Wolfgang Schoch, Ansgar Meroth, Dominikus Herzberg. 593-602 [doi]
- Clone detection in automotive model-based developmentFlorian Deissenboeck, Benjamin Hummel, Elmar Jürgens, Bernhard Schätz, Stefan Wagner, Jean-Francois Girard, Stefan Teuchert. 603-612 [doi]
- Formal verification of an automotive scenario in service-oriented computingMaurice H. ter Beek, Stefania Gnesi, Nora Koch, Franco Mazzanti. 613-622 [doi]
- Analyzing medical processesBin Chen, George S. Avrunin, Elizabeth A. Henneman, Lori A. Clarke, Leon J. Osterweil, Philip L. Henneman. 623-632 [doi]
- Rational quality requirements for medical softwareBarbara Paech, Thomas Wetter. 633-638 [doi]
- Supporting requirements engineering for medical products: early consideration of user-perceived qualityJörg Dörr, Daniel Kerkow, Dennis Landmann, Christian Graf, Christian Denger, Anne Hoffmann. 639-648 [doi]
- Experiences with Mirth: an open source health care integration engineGerald Bortis. 649-652 [doi]
- Developing an architecture of a knowledge-based electronic patient recordDanny Ammon, Dirk Hoffmann, Tobias Jakob, Ekkehard Finkeissen. 653-660 [doi]
- Design and implementation of the software architecture for a 3-D reconstruction system in medical imagingHolger Scherl, Stefan Hoppe, Markus Kowarschik, Joachim Hornegger. 661-668 [doi]
- Applying model-based testing to healthcare products: preliminary experiencesMarlon Vieira, Xiping Song, Gilberto Matos, Stephan Storck, Rajanikanth Tanikella, William M. Hasling. 669-672 [doi]
- Developing a security protocol for a distributed decision support system in a healthcare environmentLiang Xiao 0002, Paul H. Lewis, Alex Gibb. 673-682 [doi]
- Model-based security analysis for mobile communicationsJan Jürjens, Jörg Schreck, Peter Bartmann. 683-692 [doi]
- Experience applying the SPIN model checker to an industrial telecommunications systemBarry Long, Jürgen Dingel, T. C. Nicholas Graham. 693-702 [doi]
- WS-AMUSE - web service architecture for multimedia servicesAndreas Scholz, Christian Buckl, Alfons Kemper, Alois Knoll, Jörg Heuer, Martin Winter. 703-712 [doi]
- Interval quality: relating customer-perceived quality to process qualityAudris Mockus, David M. Weiss. 723-732 [doi]
- Improving the handsets network test process via DMAIC conceptsClauirton de Siebra, Paulo H. R. Costa, André Luis M. Santos, Fabio Q. B. da Silva. 733-740 [doi]
- 3-step knowledge transition: a case study on architecture evaluationBartosz Michalik, Jerzy R. Nawrocki, Miroslaw Ochodek. 741-748 [doi]
- From programming to modeling: our experience with a distributed software engineering courseJordi Cabot, Francisco Durán, Nathalie Moreno, Antonio Vallecillo, José Raúl Romero. 749-758 [doi]
- A study of student strategies for the corrective maintenance of concurrent softwareScott D. Fleming, Eileen Kraemer, R. E. Kurt Stirewalt, Shaohua Xie, Laura K. Dillon. 759-768 [doi]
- Best practices in extreme programming course designKai Stapel, Daniel Lübke, Eric Knauss. 769-776 [doi]
- Using the inverted classroom to teach software engineeringGerald C. Gannod, Janet E. Burge, Michael T. Helmick. 777-786 [doi]
- A teamwork-based approach to programming fundamentals with scheme, smalltalk & javaMichele Lanza, Amy L. Murphy, Romain Robbes, Mircea Lungu, Paolo Bonzini. 787-790 [doi]
- Power through brokering: open source community participation in software engineering student projectsBirgit R. Krogstie. 791-800 [doi]
- Design patterns: between programming and software designChristoph Denzler, Dominik Gruntz. 801-804 [doi]
- Change management: from knowledge about innovative SE to capabilities for industrial SE projectsUwe Dumslaff. 805-806 [doi]
- Metamodel-based tool integration with moflonCarsten Amelunxen, Felix Klar, Alexander Königs, Tobias Rötschke, Andy Schürr. 807-810 [doi]
- Genie: supporting the model driven development of reflective, component-based adaptive systemsNelly Bencomo, Paul Grace, Carlos A. Flores-Cortés, Danny Hughes, Gordon S. Blair. 811-814 [doi]
- Global consistency checking of distributed models with TReMer+Mehrdad Sabetzadeh, Shiva Nejati, Steve M. Easterbrook, Marsha Chechik. 815-818 [doi]
- Marama: an eclipse meta-toolset for generating multi-view environmentsJohn C. Grundy, John G. Hosking, Jun Huh, Karen Na-Liu Li. 819-822 [doi]
- Tool support for the navigation in graphical modelsTobias Reinhard, Silvio Meier, Reinhard Stoiber, Christina Cramer, Martin Glinz. 823-826 [doi]
- Using JULE to generate a compliance test suite for the UML standardPanuchart Bunyakiati, Anthony Finkelstein, James Skene, Clovis Chapman. 827-830 [doi]
- Analyzing model evolutionSven Wenzel, Udo Kelter. 831-834 [doi]
- SEURAT: integrated rationale managementJanet E. Burge, David C. Brown. 835-838 [doi]
- Adams re-trace: traceability link recovery via latent semantic indexingAndrea De Lucia, Rocco Oliveto, Genoveffa Tortora. 839-842 [doi]
- Clonetracker: tool support for code clone managementEkwa Duala-Ekoko, Martin P. Robillard. 843-846 [doi]
- SpyWare: a change-aware development toolsetRomain Robbes, Michele Lanza. 847-850 [doi]
- Dynamic round-trip GUI maintenancePeng Li, Eric Wohlstadter. 851-854 [doi]
- Juzi: a tool for repairing complex data structuresBassem Elkarablieh, Sarfraz Khurshid. 855-858 [doi]
- Deryaft: a tool for generating representation invariants of structurally complex dataMuhammad Zubair Malik, Aman Pervaiz, Engin Uzuncaova, Sarfraz Khurshid. 859-862 [doi]
- State extensions for java pathfinderTihomir Gvero, Milos Gligoric, Steven Lauterburg, Marcelo d Amorim, Darko Marinov, Sarfraz Khurshid. 863-866 [doi]
- Tool support for data validation by end-user programmersChristopher Scaffidi, Brad A. Myers, Mary Shaw. 867-870 [doi]
- A business process explorer: recovering and visualizing e-commerce business processesJin Guo, King Chun Foo, Liliane Barbour, Ying Zou. 871-874 [doi]
- Rubacon: automated support for model-based compliance engineeringSebastian Höhn, Jan Jürjens. 875-878 [doi]