Abstract is missing.
- Beyond hacking: an SOS!Fred B. Schneider. 2 [doi]
- Planning for climate change in the 21st centuryDavid King. 3 [doi]
- Efficient hybrid typestate analysis by determining continuation-equivalent statesEric Bodden. 5-14 [doi]
- Online inference and enforcement of temporal propertiesMark Gabel, Zhendong Su. 15-24 [doi]
- Quality of service profilingSasa Misailovic, Stelios Sidiroglou, Henry Hoffmann, Martin C. Rinard. 25-34 [doi]
- Collaborative reliability prediction of service-oriented systemsZibin Zheng, Michael R. Lyu. 35-44 [doi]
- A discriminative model approach for accurate duplicate bug report retrievalChengnian Sun, David Lo, Xiaoyin Wang, Jing Jiang, Siau-Cheng Khoo. 45-54 [doi]
- Has the bug really been fixed?Zhongxian Gu, Earl T. Barr, David J. Hamilton, Zhendong Su. 55-64 [doi]
- An exploratory study of fault-proneness in evolving aspect-oriented programsFabiano Cutigi Ferrari, Rachel Burrows, Otávio Augusto Lazzarini Lemos, Alessandro Garcia, Eduardo Figueiredo, Nélio Cacho, Frederico Lopes, Nathalia Temudo, Liana Silva, Sérgio Soares, Awais Rashid, Paulo Cesar Masiero, Thaís Vasconcelos Batista, José Carlos Maldonado. 65-74 [doi]
- Archface: a contract place where architectural design and code meet togetherNaoyasu Ubayashi, Jun Nomura, Tetsuo Tamai. 75-84 [doi]
- Developing next generation ADLs through MDE techniquesDavide Di Ruscio, Ivano Malavolta, Henry Muccini, Patrizio Pelliccione, Alfonso Pierantonio. 85-94 [doi]
- Software traceability with topic modelingHazeline U. Asuncion, Arthur Asuncion, Richard N. Taylor. 95-104 [doi]
- An analysis of the variability in forty preprocessor-based software product linesJörg Liebig, Sven Apel, Christian Lengauer, Christian Kästner, Michael Schulze. 105-114 [doi]
- A large-scale empirical study of practitioners use of object-oriented conceptsTony Gorschek, Ewan D. Tempero, Lefteris Angelis. 115-124 [doi]
- Codebook: discovering and exploiting relationships in software repositoriesAndrew Begel, Yit Phang Khoo, Thomas Zimmermann. 125-134 [doi]
- Liability in software engineering: overview of the LISE approach and illustration on a case studyDaniel Le Métayer, Manuel Maarek, Valérie Viet Triem Tong, Eduardo Mazza, Marie-Laure Potet, Nicolas Craipeau, Stéphane Frénot, Ronan Hardouin. 135-144 [doi]
- An exploratory study of the evolution of software licensingMassimiliano Di Penta, Daniel M. Germán, Yann-Gaël Guéhéneuc, Giuliano Antoniol. 145-154 [doi]
- A machine learning approach for tracing regulatory codes to product specific requirementsJane Cleland-Huang, Adam Czauderna, Marek Gibiec, John Emenecker. 155-164 [doi]
- Supporting developers with natural language queriesMichael Würsch, Giacomo Ghezzi, Gerald Reif, Harald Gall. 165-174 [doi]
- Using information fragments to answer the questions developers askThomas Fritz, Gail C. Murphy. 175-184 [doi]
- Developers ask reachability questionsThomas D. LaToza, Brad A. Myers. 185-194 [doi]
- Mining API mapping for language migrationHao Zhong, Suresh Thummalapenta, Tao Xie, Lu Zhang, Qing Wang. 195-204 [doi]
- Using twinning to adapt programs to alternative APIsMarius Nita, David Notkin. 205-214 [doi]
- Oracle-guided component-based program synthesisSusmit Jha, Sumit Gulwani, Sanjit A. Seshia, Ashish Tiwari. 215-224 [doi]
- Test generation through programming in UDITAMilos Gligoric, Tihomir Gvero, Vilas Jagannath, Sarfraz Khurshid, Viktor Kuncak, Darko Marinov. 225-234 [doi]
- Detecting atomic-set serializability violations in multithreaded programs through active randomized testingZhifeng Lai, Shing-Chi Cheung, Wing Kwong Chan. 235-244 [doi]
- Falcon: fault localization in concurrent programsSangmin Park, Richard W. Vuduc, Mary Jean Harrold. 245-254 [doi]
- Adaptive bug isolationPiramanayagam Arumuga Nainar, Ben Liblit. 255-264 [doi]
- Practical fault localization for dynamic web applicationsShay Artzi, Julian Dolby, Frank Tip, Marco Pistoia. 265-274 [doi]
- Moving into a new software project landscapeBarthélémy Dagenais, Harold Ossher, Rachel K. E. Bellamy, Martin P. Robillard, Jacqueline de Vries. 275-284 [doi]
- Organizing ::::self-organizing:::: teamsRashina Hoda, James Noble, Stuart Marshall. 285-294 [doi]
- StakeNet: using social networks to analyse the stakeholders of large-scale software projectsSoo Ling Lim, Daniele Quercia, Anthony Finkelstein. 295-304 [doi]
- Identifying crosscutting concerns using historical code changesBram Adams, Zhen Ming Jiang, Ahmed E. Hassan. 305-314 [doi]
- Recurring bug fixes in object-oriented programsTung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, Jafar M. Al-Kofahi, Tien N. Nguyen. 315-324 [doi]
- AURA: a hybrid approach to identify framework evolutionWei Wu, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Miryung Kim. 325-334 [doi]
- Model checking lots of systems: efficient verification of temporal properties in software product linesAndreas Classen, Patrick Heymans, Pierre Yves Schobbens, Axel Legay, Jean-François Raskin. 335-344 [doi]
- A cut-off approach for bounded verification of parameterized systemsQiusong Yang, Mingshu Li. 345-354 [doi]
- An empirical study of optimizations in YOGIAditya V. Nori, Sriram K. Rajamani. 355-364 [doi]
- Awareness 2.0: staying aware of projects, developers and tasks using dashboards and feedsChristoph Treude, Margaret-Anne D. Storey. 365-374 [doi]
- Linking e-mails and source code artifactsAlberto Bacchelli, Michele Lanza, Romain Robbes. 375-384 [doi]
- A degree-of-knowledge model to capture source code familiarityThomas Fritz, Jingwen Ou, Gail C. Murphy, Emerson R. Murphy-Hill. 385-394 [doi]
- Views: object-inspired concurrency controlBrian Demsky, Patrick Lam. 395-404 [doi]
- Engineering parallel applications with tunable architecturesChristoph A. Schaefer, Victor Pankratius, Walter F. Tichy. 405-414 [doi]
- DETERMIN: inferring likely deterministic specifications of multithreaded programsJacob Burnim, Koushik Sen. 415-424 [doi]
- From behaviour preservation to behaviour modification: constraint-based mutant generationFriedrich Steimann, Andreas Thies. 425-434 [doi]
- Is operator-based mutant selection superior to random mutant selection?Lu Zhang, Shan-Shan Hou, Jun-Jue Hu, Tao Xie, Hong Mei. 435-444 [doi]
- Using symbolic evaluation to understand behavior in configurable software systemsElnatan Reisner, Charles Song, Kin-Keung Ma, Jeffrey S. Foster, Adam Porter. 445-454 [doi]
- Code bubbles: rethinking the user interface paradigm of integrated development environmentsAndrew Bragdon, Steven P. Reiss, Robert C. Zeleznik, Suman Karumuri, William Cheung, Joshua Kaplan, Christopher Coleman, Ferdi Adeputra, Joseph J. LaViola Jr.. 455-464 [doi]
- Customized awareness: recommending relevant external change eventsReid Holmes, Robert J. Walker. 465-474 [doi]
- A search engine for finding highly relevant applicationsMark Grechanik, Chen Fu, Qing Xie, Collin McMillan, Denys Poshyvanyk, Chad M. Cumby. 475-484 [doi]
- An empirical study of reported bugs in server software with implications for automated bug diagnosisSwarup Kumar Sahoo, John Criswell, Vikram S. Adve. 485-494 [doi]
- Characterizing and predicting which bugs get fixed: an empirical study of Microsoft WindowsPhilip J. Guo, Thomas Zimmermann, Nachiappan Nagappan, Brendan Murphy. 495-504 [doi]
- Summarizing software artifacts: a case study of bug reportsSarah Rastkar, Gail C. Murphy, Gabriel Murray. 505-514 [doi]
- LEAKPOINT: pinpointing the causes of memory leaksJames A. Clause, Alessandro Orso. 515-524 [doi]
- Precise calling context encodingWilliam N. Sumner, Yunhui Zheng, Dasarath Weeratunge, Xiangyu Zhang. 525-534 [doi]
- Effective interprocedural resource leak detectionEmina Torlak, Satish Chandra. 535-544 [doi]
- Measuring complexity, effectiveness and efficiency in software course projectsWilson Padua. 545-554 [doi]
- Advanced hands-on training for distributed and outsourced software engineeringMartin Nordio, Roman Mitin, Bertrand Meyer. 555-558 [doi]
- A HOT --- Human, Organizational and Technological --- framework for a software engineering courseOrit Hazzan, Yael Dubinsky. 559-566 [doi]
- An empirical analysis of team review approaches for teaching quality software developmentAmna Humayun, Wafa Basit, Ghulam A. Farrukh, Fakhar Lodhi, Rabea Aden. 567-575 [doi]
- An empirical study of the effects of conscientiousness in pair programming using the five-factor personality modelNorsaremah Salleh, Emilia Mendes, John C. Grundy, Giles St. J. Burch. 577-586 [doi]
- Panel on master s degree programs in software engineeringMehdi Jazayeri. 587 [doi]
- The educational value of mapping studies of software engineering literatureBarbara A. Kitchenham, Pearl Brereton, David Budgen. 589-598 [doi]
- Towards contextualised software engineering education: an African perspectiveJens Fendler, Heike Winschiers-Theophilus. 599-607 [doi]