Abstract is missing.
- A practical guide for using statistical tests to assess randomized algorithms in software engineeringAndrea Arcuri, Lionel C. Briand. 1-10 [doi]
- aComment: mining annotations from comments and code to detect interrupt related concurrency bugsLin Tan, Yuanyuan Zhou, Yoann Padioleau. 11-20 [doi]
- Camouflage: automated anonymization of field dataJames A. Clause, Alessandro Orso. 21-30 [doi]
- A lightweight code analysis and its role in evaluation of a dependability caseJoseph P. Near, Aleksandar Milicevic, Eunsuk Kang, Daniel Jackson. 31-40 [doi]
- Towards quantitative software reliability assessment in incremental development processesToshiya Fujii, Tadashi Dohi, Takaji Fujiwara. 41-50 [doi]
- The impact of fault models on software robustness evaluationsStefan Winter, Constantin Sårbu, Neeraj Suri, Brendan Murphy. 51-60 [doi]
- Transformation for class immutabilityFredrik Kjolstad, Danny Dig, Gabriel Acevedo, Marc Snir. 61-70 [doi]
- Refactoring Java programs for flexible lockingMax Schäfer, Manu Sridharan, Julian Dolby, Frank Tip. 71-80 [doi]
- Refactoring pipe-like mashups for end-user programmersKathryn T. Stolee, Sebastian G. Elbaum. 81-90 [doi]
- Mining message sequence graphsSandeep Kumar, Siau-Cheng Khoo, Abhik Roychoudhury, David Lo. 91-100 [doi]
- Automatically detecting and describing high level actions within methodsGiriprasad Sridhara, Lori L. Pollock, K. Vijay-Shanker. 101-110 [doi]
- Portfolio: finding relevant functions and their usageCollin McMillan, Mark Grechanik, Denys Poshyvanyk, Qing Xie, Chen Fu. 111-120 [doi]
- Angelic debuggingSatish Chandra, Emina Torlak, Shaon Barman, Rastislav Bodík. 121-130 [doi]
- Static extraction of program configuration optionsAriel Rabkin, Randy H. Katz. 131-140 [doi]
- An empirical study of build maintenance effortShane McIntosh, Bram Adams, Thanh H. D. Nguyen, Yasutaka Kamei, Ahmed E. Hassan. 141-150 [doi]
- An empirical investigation into the role of API-level refactorings during software evolutionMiryung Kim, Dongxiang Cai, Sunghun Kim. 151-160 [doi]
- Factors leading to integration failures in global feature-oriented development: an empirical analysisMarcelo Cataldo, James D. Herbsleb. 161-170 [doi]
- Assessing programming language impact on development and maintenance: a study on c and c++Pamela Bhattacharya, Iulian Neamtiu. 171-180 [doi]
- On-demand feature recommendations derived from mining public product descriptionsHoratiu Dumitru, Marek Gibiec, Negar Hariri, Jane Cleland-Huang, Bamshad Mobasher, Carlos Castro-Herrera, Mehdi Mirakhorli. 181-190 [doi]
- Inferring better contractsYi Wei, Carlo A. Furia, Nikolay Kazmin, Bertrand Meyer. 191-200 [doi]
- LIME: a framework for debugging load imbalance in multi-threaded executionJungju Oh, Christopher J. Hughes, Guru Venkataramani, Milos Prvulovic. 201-210 [doi]
- Synthesis of live behaviour models for fallible domainsNicolás D Ippolito, Víctor A. Braberman, Nir Piterman, Sebastián Uchitel. 211-220 [doi]
- Coverage guided systematic concurrency testingChao Wang, Mahmoud Said, Aarti Gupta. 221-230 [doi]
- Inference of field initializationFausto Spoto, Michael D. Ernst. 231-240 [doi]
- Taming reflection: Aiding static analysis in the presence of reflection and custom class loadersEric Bodden, Andreas Sewe, Jan Sinschek, Hela Oueslati, Mira Mezini. 241-250 [doi]
- Patching vulnerabilities with sanitization synthesisFang Yu, Muath Alkhalaf, Tevfik Bultan. 251-260 [doi]
- Configuring global software teams: a multi-company analysis of project productivity, quality, and profitsNarayan Ramasubbu, Marcelo Cataldo, Rajesh Krishna Balan, James D. Herbsleb. 261-270 [doi]
- Does the initial environment impact the future of developersMinghui Zhou, Audris Mockus. 271-280 [doi]
- Socio-technical developer networks: should we trust our measurements?Andrew Meneely, Laurie Williams. 281-290 [doi]
- Model projection: simplifying models in response to restricting the environmentKelly Androutsopoulos, David Binkley, David Clark, Nicolas Gold, Mark Harman, Kevin Lano, Zheng Li. 291-300 [doi]
- MeCC: memory comparison-based clone detectorHeejung Kim, Yungbum Jung, Sunghun Kim, Kwangkeun Yi. 301-310 [doi]
- Frequency and risks of changes to clonesNils Göde, Rainer Koschke. 311-320 [doi]
- Symbolic model checking of software product linesAndreas Classen, Patrick Heymans, Pierre Yves Schobbens, Axel Legay. 321-330 [doi]
- Verifying multi-threaded software using smt-based context-bounded model checkingLucas Cordeiro, Bernd Fischer. 331-340 [doi]
- Run-time efficient probabilistic model checkingAntonio Filieri, Carlo Ghezzi, Giordano Tamburrelli. 341-350 [doi]
- Non-essential changes in version historiesDavid Kawrykow, Martin P. Robillard. 351-360 [doi]
- Aspect recommendation for evolving softwareTung Thanh Nguyen, Hung Viet Nguyen, Hoan Anh Nguyen, Tien N. Nguyen. 361-370 [doi]
- Identifying program, test, and environmental changes that affect behaviourReid Holmes, David Notkin. 371-380 [doi]
- Program abstractions for behaviour validationGuido de Caso, Víctor A. Braberman, Diego Garbervetsky, Sebastián Uchitel. 381-390 [doi]
- Programs, tests, and oracles: the foundations of testing revisitedMatt Staats, Michael W. Whalen, Mats Per Erik Heimdahl. 391-400 [doi]
- RACEZ: a lightweight and non-invasive race detection tool for production applicationsTianwei Sheng, Neil Vachharajani, Stéphane Eranian, Robert Hundt, Wenguang Chen, Weimin Zheng. 401-410 [doi]
- Detecting software modularity violationsSunny Wong, Yuanfang Cai, Miryung Kim, Michael Dalton. 411-420 [doi]
- Feature cohesion in software product lines: an exploratory studySven Apel, Dirk Beyer. 421-430 [doi]
- Leveraging software architectures to guide and verify the development of sense/compute/control applicationsDamien Cassou, Emilie Balland, Charles Consel, Julia L. Lawall. 431-440 [doi]
- Refactoring to role objectsFriedrich Steimann, Fabian Urs Stolz. 441-450 [doi]
- Supporting professional spreadsheet users by generating leveled dataflow diagramsFelienne Hermans, Martin Pinzger, Arie van Deursen. 451-460 [doi]
- Reverse engineering feature modelsSteven She, Rafael Lotufo, Thorsten Berger, Andrzej Wasowski, Krzysztof Czarnecki. 461-470 [doi]
- Empirical assessment of MDE in industryJohn Hutchinson, Jon Whittle, Mark Rouncefield, Steinar Kristoffersen. 471-480 [doi]
- Dealing with noise in defect predictionSunghun Kim, Hongyu Zhang, Rongxin Wu, Liang Gong. 481-490 [doi]
- Ownership, experience and defects: a fine-grained study of authorshipFoyzur Rahman, Premkumar T. Devanbu. 491-500 [doi]
- Interface decomposition for service compositionsDomenico Bianculli, Dimitra Giannakopoulou, Corina S. Pasareanu. 501-510 [doi]
- Unifying execution of imperative and declarative codeAleksandar Milicevic, Derek Rayside, Kuat Yessenov, Daniel Jackson. 511-520 [doi]
- Always-available static and dynamic feedbackMichael Bayne, Richard Cook, Michael D. Ernst. 521-530 [doi]
- Improving requirements quality using essential use case interaction patternsMassila Kamalrudin, John G. Hosking, John C. Grundy. 531-540 [doi]
- Understanding broadcast based peer review on open source software projectsPeter C. Rigby, Margaret-Anne D. Storey. 541-550 [doi]
- Software systems as cities: a controlled experimentRichard Wettel, Michele Lanza, Romain Robbes. 551-560 [doi]
- Automated cross-browser compatibility testingAli Mesbah, Mukul R. Prasad. 561-570 [doi]
- A framework for automated testing of javascript web applicationsShay Artzi, Julian Dolby, Simon Holm Jensen, Anders Møller, Frank Tip. 571-580 [doi]
- Coalescing executions for fast uncertainty analysisWilliam N. Sumner, Tao Bao, Xiangyu Zhang, Sunil Prabhakar. 581-590 [doi]
- Mining parametric specificationsChoonghwan Lee, Feng Chen, Grigore Rosu. 591-600 [doi]
- Estimating footprints of model operationsCédric Jeanneret, Martin Glinz, Benoit Baudry. 601-610 [doi]
- Precise identification of problems for structural test generationXusheng Xiao, Tao Xie, Nikolai Tillmann, Jonathan de Halleux. 611-620 [doi]
- Interactivity, continuity, sketching, and experience: (keynote abstract)Kumiyo Nakakoji. 621 [doi]
- A case study of measuring process risk for early insights into software safetyLucas Layman, Victor R. Basili, Marvin V. Zelkowitz, Karen L. Fisher. 623-632 [doi]
- Model-driven engineering practices in industryJohn Hutchinson, Mark Rouncefield, Jon Whittle. 633-642 [doi]
- SORASCS: a case study in soa-based platform design for socio-cultural analysisBradley R. Schmerl, David Garlan, Vishal Dwivedi, Michael W. Bigrigg, Kathleen M. Carley. 643-652 [doi]
- A method for selecting SOA pilot projects including a pilot metrics frameworkLiam O Brien, James Gibson, Jon Gray. 653-662 [doi]
- Architecture evaluation without an architecture: experience with the smart gridRick Kazman, Len Bass, James Ivers, Gabriel A. Moreno. 663-670 [doi]
- Bringing domain-specific languages to digital forensicsJeroen van den Bos, Tijs van der Storm. 671-680 [doi]
- Building and using pluggable type-checkersWerner Dietl, Stephanie Dietzel, Michael D. Ernst, Kivanç Muslu, Todd W. Schiller. 681-690 [doi]
- Deploying CogTool: integrating quantitative usability assessment into real-world software developmentRachel K. E. Bellamy, Bonnie E. John, Sandra Kogan. 691-700 [doi]
- Experiences with text mining large collections of unstructured systems development artifacts at jplDaniel Port, Allen P. Nikora, Jairus Hihn, LiGuo Huang. 701-710 [doi]
- An evaluation of the internal quality of business applications: does size matter?Bill Curtis, Jay Sappidi, Jitendra Subramanyam. 711-715 [doi]
- Characterizing the differences between pre- and post- release versions of softwarePaul Luo Li, Ryan Kivett, Zhiyuan Zhan, Sung-eok Jeon, Nachiappan Nagappan, Brendan Murphy, Andrew J. Ko. 716-725 [doi]
- Why software quality improvement fails: (and how to succeed nevertheless)Jonathan Streit, Markus Pizka. 726-735 [doi]
- Code coverage analysis in practice for large systemsYoram Adler, Noam Behar, Orna Raz, Onn Shehory, Nadav Steindler, Shmuel Ur, Aviad Zlotnick. 736-745 [doi]
- Practical change impact analysis based on static program slicing for industrial software systemsMithun Acharya, Brian Robinson. 746-755 [doi]
- Value-based program characterization and its application to software plagiarism detectionYoon-chan Jhi, Xinran Wang, Xiaoqi Jia, Sencun Zhu, Peng Liu, Dinghao Wu. 756-765 [doi]
- A comparison of model-based and judgment-based release planning in incremental software projectsHans Christian Benestad, Jo Erskine Hannay. 766-775 [doi]
- An industrial case study on quality impact prediction for evolving service-oriented softwareHeiko Koziolek, Bastian Schlich, Carlos G. Bilich, Roland Weiss, Steffen Becker, Klaus Krogmann, Mircea Trifu, Raffaela Mirandola, Anne Koziolek. 776-785 [doi]
- Enabling the runtime assertion checking of concurrent contracts for the Java modeling languageWladimir Araujo, Lionel C. Briand, Yvan Labiche. 786-795 [doi]
- Perspectives of delegation in team-based distributed software development over the GENI infrastructure: NIER trackPierre F. Tiako. 796-799 [doi]
- The hidden experts in software-engineering communication: NIER trackIrwin Kwan, Daniela Damian. 800-803 [doi]
- How do programmers ask and answer questions on the web?: NIER trackChristoph Treude, Ohad Barzilay, Margaret-Anne D. Storey. 804-807 [doi]
- Sketching tools for ideation: NIER trackRachel K. E. Bellamy, Michael Desmond, Jacquelyn Martino, Paul Matchen, Harold Ossher, John T. Richards, Calvin Swart. 808-811 [doi]
- Digitally annexing desk space for software development: NIER trackJohn Hardy, Christopher Bull 0001, Gerald Kotonya, Jon Whittle. 812-815 [doi]
- Information foraging as a foundation for code navigation: NIER trackNan Niu, Anas Mahmoud, Gary Bradshaw. 816-819 [doi]
- Identifying method friendships to remove the feature envy bad smell: NIER trackRocco Oliveto, Malcom Gethers, Gabriele Bavota, Denys Poshyvanyk, Andrea De Lucia. 820-823 [doi]
- The code orb: supporting contextualized coding via at-a-glance views (NIER track)Nicolás López, André van der Hoek. 824-827 [doi]
- Permission-based programming languages: NIER trackJonathan Aldrich, Ronald Garcia, Mark Hahnenberg, Manuel Mohr, Karl Naden, Darpan Saini, Sven Stork, Joshua Sunshine, Éric Tanter, Roger Wolff. 828-831 [doi]
- Toward a better understanding of tool usage: NIER trackAlberto Sillitti, Giancarlo Succi, Jelena Vlasenko. 832-835 [doi]
- Characterizing process variation: NIER trackBorislava I. Simidchieva, Leon J. Osterweil. 836-839 [doi]
- Blending freeform and managed information in tables: NIER trackNicolas Mangano, Harold Ossher, Ian Simmonds, Matthew Callery, Michael Desmond, Sophia Krasikov. 840-843 [doi]
- Design and implementation of a data analytics infrastructure in support of crisis informatics research: NIER trackKenneth M. Anderson, Aaron Schram. 844-847 [doi]
- A domain specific requirements model for scientific computing: NIER trackYang Li, Nitesh Narayan, Jonas Helming, Maximilian Koegel. 848-851 [doi]
- CREWW: collaborative requirements engineering with wii-remotes (NIER track)Felix Bott, Stephan Diehl, Rainer Lutz. 852-855 [doi]
- Learning to adapt requirements specifications of evolving systems: (NIER track)Rafael V. Borges, Artur S. d Avila Garcez, Luís C. Lamb, Bashar Nuseibeh. 856-859 [doi]
- Towards overcoming human analyst fallibility in the requirements tracing process: NIER trackDavid Cuddeback, Alex Dekhtyar, Jane Huffman Hayes, Jeff Holden, Wei-Keat Kong. 860-863 [doi]
- Positive effects of utilizing relationships between inconsistencies for more effective inconsistency resolution: NIER trackAlexander Nöhrer, Alexander Reder, Alexander Egyed. 864-867 [doi]
- Matching logic: a new program verification approach (NIER track)Grigore Rosu, Andrei Stefanescu. 868-871 [doi]
- Model-based performance testing: NIER trackCornel Barna, Marin Litoiu, Hamoun Ghanbari. 872-875 [doi]
- Tuple density: a new metric for combinatorial test suites (NIER track)Baiqiang Chen, Jian Zhang. 876-879 [doi]
- Search-enhanced testing: NIER trackColin Atkinson, Oliver Hummel, Werner Janjic. 880-883 [doi]
- Fuzzy set-based automatic bug triaging: NIER trackAhmed Tamrawi, Tung Thanh Nguyen, Jafar M. Al-Kofahi, Tien N. Nguyen. 884-887 [doi]
- Exploiting hardware advances for software testing and debugging: NIER trackMary Lou Soffa, Kristen R. Walcott, Jason Mars. 888-891 [doi]
- Better testing through oracle selection: (NIER track)Matt Staats, Michael W. Whalen, Mats Per Erik Heimdahl. 892-895 [doi]
- Tracking data structures for postmortem analysis: (NIER track)Xiao Xiao, Jinguo Zhou, Charles Zhang. 896-899 [doi]
- Iterative context-aware feature location: (NIER track)Xin Peng, Zhenchang Xing, Xi Tan, Yijun Yu, Wenyun Zhao. 900-903 [doi]
- A study of ripple effects in software ecosystems: (NIER track)Romain Robbes, Mircea Lungu. 904-907 [doi]
- Tracing architectural concerns in high assurance systems: (NIER track)Mehdi Mirakhorli, Jane Cleland-Huang. 908-911 [doi]
- A combination approach for enhancing automated traceability: (NIER track)Xiaofan Chen, John G. Hosking, John C. Grundy. 912-915 [doi]
- Capturing tacit architectural knowledge using the repertory grid technique (NIER track): (nier track)Dan Tofan, Matthias Galster, Paris Avgeriou. 916-919 [doi]
- Flexible generators for software reuse and evolution: NIER TrackStan Jarzabek, Ha Duy Trung. 920-923 [doi]
- The lazy initialization multilayered modeling framework: NIER trackFahad R. Golra, Fabien Dagnat. 924-927 [doi]
- Towards architectural information in implementation: NIER trackHenrik Bærbak Christensen, Klaus Marius Hansen. 928-931 [doi]
- Topic-based defect prediction: NIER trackTung Thanh Nguyen, Tien N. Nguyen, Tu Minh Phuong. 932-935 [doi]
- Automated usability evaluation of parallel programming constructs: nier trackVictor Pankratius. 936-939 [doi]
- Data analytics for game development: NIER trackKenneth Hullett, Nachiappan Nagappan, Eric Schuh, John Hopson. 940-943 [doi]
- Mining service abstractions: NIER trackDionysis Athanasopoulos, Apostolos Zarras, Panos Vassiliadis, Valérie Issarny. 944-947 [doi]
- A software behaviour analysis framework based on the human perception systems: NIER trackHeidar Pirzadeh, Abdelwahab Hamou-Lhadj. 948-951 [doi]
- Dynamic shape analysis of program heap using graph spectra: nier trackMuhammad Zubair Malik. 952-955 [doi]
- Program analysis: from qualitative analysis to quantitative analysis (NIER track)Sheng Liu, Jian Zhang. 956-959 [doi]
- Diagnosing new faults using mutants and prior faults (NIER track)Syed Shariyar Murtaza, Nazim H. Madhavji, Mechelle Gittens, Zude Li. 960-963 [doi]
- Empirical results on the study of software vulnerabilities: NIER trackYan Wu, Harvey P. Siy, Robin Gandhi. 964-967 [doi]
- Multifractal aspects of software development: NIER trackAbram Hindle, Michael W. Godfrey, Richard C. Holt. 968-971 [doi]
- The American law institute s principles on software contracts and their ramifications for software engineering research: NIER trackJames Williams, Jens H. Weber-Jahnke. 972-975 [doi]
- Toward sustainable software engineering: NIER trackNadine Amsel, Zaid Ibrahim, Amir Malik, Bill Tomlinson. 976-979 [doi]
- MT-Scribe: an end-user approach to automate software model evolutionYu Sun, Jeffrey G. Gray, Jules White. 980-982 [doi]
- Inconsistent path detection for XML IDEsPierre Genevès, Nabil Layaïda. 983-985 [doi]
- Automated security hardening for evolving UML modelsJan Jürjens. 986-988 [doi]
- JavAdaptor: unrestricted dynamic software updates for JavaMario Pukall, Alexander Grebhahn, Reimar Schröter, Christian Kästner, Walter Cazzola, Sebastian Götz. 989-991 [doi]
- DyTa: dynamic symbolic execution guided with static verification resultsXi Ge, Kunal Taneja, Tao Xie, Nikolai Tillmann. 992-994 [doi]
- Identifying opaque behavioural changesReid Holmes, David Notkin. 995-997 [doi]
- FireDetective: understanding ajax client/server interactionsNick Matthijssen, Andy Zaidman. 998-1000 [doi]
- BQL: capturing and reusing debugging knowledgeZhongxian Gu, Earl T. Barr, Zhendong Su. 1001-1003 [doi]
- Covana: precise identification of problems in pexXusheng Xiao, Tao Xie, Nikolai Tillmann, Jonathan de Halleux. 1004-1006 [doi]
- The quamoco tool chain for quality modeling and assessmentFlorian Deissenboeck, Lars Heinemann, Markus Herrmannsdörfer, Klaus Lochmann, Stefan Wagner. 1007-1009 [doi]
- ReAssert: a tool for repairing broken unit testsBrett Daniel, Danny Dig, Tihomir Gvero, Vilas Jagannath, Johnston Jiaa, Damion Mitchell, Jurand Nogiec, Shin Hwei Tan, Darko Marinov. 1010-1012 [doi]
- AutoBlackTest: a tool for automatic black-box testingLeonardo Mariani, Mauro Pezzè, Oliviero Riganelli, Mauro Santoro. 1013-1015 [doi]
- Using MATCON to generate CASE tools that guide deployment of pre-packaged applicationsElad Fein, Natalia Razinkov, Shlomit Shachor, Pietro Mazzoleni, SweeFen Goh, Richard Goodwin, Manisha Bhandar, Shyh-Kwei Chen, Juhnyoung Lee, Vibha Singhal Sinha, Senthil Mani, Debdoot Mukherjee, Biplav Srivastava, Pankaj Dhoolia. 1016-1018 [doi]
- SEREBRO: facilitating student project team collaborationNoah Jorgenson, Matthew L. Hale, Rose F. Gamble. 1019-1021 [doi]
- StakeSource2.0: using social networks of stakeholders to identify and prioritise requirementsSoo Ling Lim, Daniela Damian, Anthony Finkelstein. 1022-1024 [doi]
- Miler: a toolset for exploring email dataAlberto Bacchelli, Michele Lanza, Marco D Ambros. 1025-1027 [doi]
- A demonstration of a distributed software design sketching toolNicolas Mangano, Mitch Dempsey, Nicolás López, André van der Hoek. 1028-1030 [doi]
- View infinity: a zoomable interface for feature-oriented software developmentMichael Stengel, Mathias Frisch, Sven Apel, Janet Feigenspan, Christian Kästner, Raimund Dachselt. 1031-1033 [doi]
- CodeTopics: which topic am I coding now?Malcom Gethers, Trevor Savage, Massimiliano Di Penta, Rocco Oliveto, Denys Poshyvanyk, Andrea De Lucia. 1034-1036 [doi]
- JDeodorant: identification and application of extract class refactoringsMarios Fokaefs, Nikolaos Tsantalis, Eleni Stroulia, Alexander Chatzigeorgiou. 1037-1039 [doi]
- Evolve: tool support for architecture evolutionAndrew McVeigh, Jeff Kramer, Jeff Magee. 1040-1042 [doi]
- Portfolio: a search engine for finding functions and their usagesCollin McMillan, Mark Grechanik, Denys Poshyvanyk, Qing Xie, Chen Fu. 1043-1045 [doi]
- Impact of process simulation on software practice: an initial reportHe Zhang, D. Ross Jeffery, Dan Houston, LiGuo Huang, Liming Zhu. 1046-1056 [doi]
- Impact of software resource estimation research on practice: a preliminary report on achievements, synergies, and challengesBarry W. Boehm, Ricardo Valerdi. 1057-1065 [doi]
- Symbolic execution for software testing in practice: preliminary assessmentCristian Cadar, Patrice Godefroid, Sarfraz Khurshid, Corina S. Pasareanu, Koushik Sen, Nikolai Tillmann, Willem Visser. 1066-1071 [doi]
- ICSE 2011 technical briefingsGail Murphy, Andreas Zeller. 1072-1073 [doi]
- Exploring, exposing, and exploiting emails to include human factors in software engineeringAlberto Bacchelli. 1074-1077 [doi]
- GATE: game-based testing environmentNing Chen. 1078-1081 [doi]
- Reuse vs. maintainability: revealing the impact of composition code propertiesFrancisco Dantas. 1082-1085 [doi]
- Specification mining in concurrent and distributed systemsSandeep Kumar. 1086-1089 [doi]
- Detecting architecturally-relevant code smells in evolving software systemsIsela Macia Bertran. 1090-1093 [doi]
- Pragmatic reuse in web application developmentJosip Maras. 1094-1097 [doi]
- Inconsistency management framework for model-based developmentAlexander Reder. 1098-1101 [doi]
- Mental models and parallel program maintenanceCaitlin Sadowski. 1102-1105 [doi]
- Pragmatic prioritization of software quality assurance effortsEmad Shihab. 1106-1109 [doi]
- Directed test suite augmentationZhihong Xu. 1110-1113 [doi]
- Reengineering legacy software products into software product line based on automatic variability analysisYinxing Xue. 1114-1117 [doi]
- 1.x-Way architecture-implementation mappingYongjie Zheng. 1118-1121 [doi]
- Using software evolution history to facilitate development and maintenancePamela Bhattacharya. 1122-1123 [doi]
- Searching, selecting, and synthesizing source codeCollin McMillan. 1124-1125 [doi]
- Tracing architecturally significant requirements: a decision-centric approachMehdi Mirakhorli. 1126-1127 [doi]
- Predictable dynamic deployment of components in embedded systemsAna Petricic. 1128-1129 [doi]
- A declarative approach to enable flexible and dynamic service compositionsLeandro Sales Pinto. 1130-1131 [doi]
- A framework for the integration of user centered design and agile software development processesDina Salah. 1132-1133 [doi]
- Improving open source software patch contribution process: methods and toolsBhuricha Deen Sethanandha. 1134-1135 [doi]
- Systematizing security test case planning using functional requirements phrasesBen Smith. 1136-1137 [doi]
- Mining software repositories using topic modelsStephen W. Thomas. 1138-1139 [doi]
- Test blueprint: an effective visual support for test coverageVanessa Peña Araya. 1140-1142 [doi]
- A formal approach to software synthesis for architectural platformsHamid Bagheri. 1143-1145 [doi]
- Detecting cross-browser issues in web applicationsShauvik Roy Choudhary. 1146-1148 [doi]
- Measuring subversions: security and legal risk in reused software artifactsJulius Davies. 1149-1151 [doi]
- Building domain specific software architectures from software architectural design patternsJulie S. Fant. 1152-1154 [doi]
- A decision support system for the classification of software coding faults: a research abstractBilly Kidwell. 1158-1160 [doi]
- Specification mining in concurrent and distributed systemsSandeep Kumar. 1161-1163 [doi]
- A case study on refactoring in Haskell programsDa Young Lee. 1164-1166 [doi]
- Build system maintenanceShane McIntosh. 1167-1169 [doi]
- Finding relevant functions in millions of lines of codeCollin McMillan. 1170-1172 [doi]
- Requirements tracing: discovering related documents through artificial pheromones and term proximityHakim Sultanov. 1173-1175 [doi]
- An end-user demonstration approach to support aspect-oriented modelingYu Sun. 1176-1178 [doi]
- Problem identification for structural test generation: first step towards cooperative developer testingXusheng Xiao. 1179-1181 [doi]
- Palus: a hybrid automated test generation tool for javaSai Zhang. 1182-1184 [doi]
- Scalable automatic linearizability checkingShao Jie Zhang. 1185-1187 [doi]
- Workshop on cooperative and human aspects of software engineering: (CHASE 2011)Marcelo Cataldo, Cleidson R. B. de Souza, Yvonne Dittrich, Rashina Hoda, Helen Sharp. 1188-1189 [doi]
- Fourth international workshop on multicore software engineering: (IWMSE 2011)Victor Pankratius, Michael Philippsen. 1190-1191 [doi]
- Workshop on flexible modeling tools: (FlexiTools 2011)Harold Ossher, André van der Hoek, Margaret-Anne D. Storey, John Grundy, Rachel K. E. Bellamy, Marian Petre. 1192-1193 [doi]
- Workshop on games and software engineering: (GAS 2011)Jim Whitehead, Chris Lewis 0002. 1194-1195 [doi]
- Workshop on software engineering for cloud computing: (SECLOUD 2011)Chris A. Mattmann, Nenad Medvidovic, T. S. Mohan, T. Owen O Malley. 1196-1197 [doi]
- Second international workshop on software engineering for sensor network applications: (SESENA 2011)Kurt Geihs, Luca Mottola, Gian Pietro Picco, Kay Römer. 1198-1199 [doi]
- Seventh international workshop on software engineering for secure systems: (SESS 2011)Seok-Won Lee, Mattia Monga, Jan Jürjens. 1200-1201 [doi]
- Fourth workshop on refactoring tools: (WRT 2011)Danny Dig, Don S. Batory. 1202-1203 [doi]
- Second international workshop on product line approaches in software engineering: (PLEASE 2011)Julia Rubin, Goetz Botterweck, Andreas Pleuss, David M. Weiss. 1204-1205 [doi]
- Third international workshop on software engineering in healthcare: (SEHC 2011)Eleni Stroulia, Kevin Sullivan. 1206-1207 [doi]
- Collaborative teaching of globally distributed software development: community building workshop (CTGDSD 2011)Stuart R. Faulk, Michal Young, David Weiss, Lian Yu. 1208-1209 [doi]
- Fifth international workshop on software clones: (IWSC 2011)James R. Cordy, Katsuro Inoue, Stanislaw Jarzabek, Rainer Koschke. 1210-1211 [doi]
- Second international workshop on managing technical debt: (MTD 2011)Ipek Ozkaya, Philippe Kruchten, Robert L. Nord, Nanette Brown. 1212-1213 [doi]
- Sixth international workshop on traceability in emerging forms of software engineering: (TEFSE 2011)Denys Poshyvanyk, Massimiliano Di Penta, Huzefa H. Kagdi. 1214-1215 [doi]
- Sixth international workshop on automation of software test: (AST 2011)Howard Foster, Antonia Bertolino, J. Jenny Li. 1216-1217 [doi]
- Third international workshop on principles of engineering service-oriented systems: (PESOS 2011)Manuel Carro, Dimka Karastoyanova, Grace A. Lewis, Anna Liu. 1218-1219 [doi]
- Workshop on SHAring and Reusing architectural Knowledge: (SHARK 2011)Paris Avgeriou, Patricia Lago, Philippe Kruchten. 1220-1221 [doi]
- Second international workshop on web 2.0 for software engineering: (Web2SE 2011)Christoph Treude, Margaret-Anne D. Storey, Arie van Deursen, Andrew Begel, Sue Black. 1222-1223 [doi]
- Workshop on emerging trends in software metrics: (WETSoM 2011)Giulio Concas, Massimiliano Di Penta, Ewan D. Tempero, Hongyu Zhang. 1224-1225 [doi]
- Fourth international workshop on software engineering for computational science and engineering: (SE-CSE2011)Jeffrey C. Carver, Roscoe Bartlett, Ian Gorton, Lorin Hochstein, Diane Kelly, Judith Segal. 1226-1227 [doi]
- Third international workshop on search-driven development: users, infrastructure, tools, and evaluation (SUITE 2011)Sushil Krishna Bajracharya, Adrian Kuhn, Yunwen Ye. 1228-1229 [doi]
- First workshop on developing tools as plug-ins: (TOPI 2011)Judith Bishop, David Notkin, Karin Breitman. 1230-1231 [doi]
- SCORE 2011: the second student contest on software engineeringMatteo Rossi, Michal Young. 1232-1233 [doi]