Abstract is missing.
- Can Model Checking Scale to Software? (Panel)David F. Redmiles. 2 [doi]
- Evaluation of Automated Software Engineering Systems? (Panel)John Penix. 3 [doi]
- Exploration Harnesses: Tool-Supported Interactive Discovery of Commercial Component PropertiesMichael A. Copenhafer, Kevin J. Sullivan. 7-14 [doi]
- Data Mining Library Reuse Patterns in User-Selected ApplicationsAmir Michail. 24 [doi]
- Industrial Applications of Software Synthesis via Category TheoryKeith E. Williamson, Michael Healy. 35-43 [doi]
- Towards Automatic Imperative Program Synthesis Through Proof PlanningJamie Stark, Andrew Ireland. 44-51 [doi]
- An Integration of Deductive Retrieval into Deductive SynthesisBernd Fischer, Jon Whittle. 52 [doi]
- Automatic Generation of Test Oracles-From Pilot Studies to ApplicationMartin S. Feather, Benjamin D. Smith. 63-72 [doi]
- An Automatic and Optimized Test Generation Technique Applying to TCP/IP ProtocolCédric Besse, Ana R. Cavalli, David Lee. 73-80 [doi]
- Siddhartha: A Method for Developing Domain-Specific Test Driver GeneratorsArthur Alexander Reyes, Debra J. Richardson. 81 [doi]
- Modular and Incremental Analysis of Concurrent Software SystemsHassen Saïdi. 92-101 [doi]
- Automated Translation of UML Models of Architectures for Verification and Simulation Using SPINPrasanta K. Bose. 102-109 [doi]
- A Visualization Tool for Constraint Program DebuggingFrédéric Goualard, Frédéric Benhamou. 110 [doi]
- Advanced Modelling and Verification Techniques Applied to a Cluster File SystemCharles Pecheur. 119-126 [doi]
- Verification of Picture Generated CodeColin O'Halloran, Alf Smith. 127-136 [doi]
- Combining Fault Avoidance, Fault Removal and Fault Tolerance: An Integrated ModelAli Mili, Bojan Cukic, T. Xia, Rahma Ben Ayed. 137 [doi]
- Fixing Some Transformation ProblemsTed J. Biggerstaff. 148-157 [doi]
- Retrenchment: Extending the Reach of RefinementMichael Poppleton, Richard Banach. 158-165 [doi]
- An ML Editor Based on Proofs-As-ProgramsJon Whittle, Alan Bundy, Richard J. Boulton, Helen Lowe. 166-173 [doi]
- Evolving Object-Oriented Designs with RefactoringsLance Tokuda, Don S. Batory. 174 [doi]
- AML: An Architecture Meta-LanguageDavid S. Wile. 183-190 [doi]
- Automatically Detecting Mismatches During Component-based and Model-based DevelopmentAlexander Egyed, Cristina Gacek. 191-198 [doi]
- Separating Concerns in Direct Manipulation User InterfacesKurt Stirewalt. 199 [doi]
- An Overview of Lutess: A Specification-based Tool for Testing Synchronous SoftwareLydie du Bousquet, Nicolas Zuanon. 208-215 [doi]
- UNA Based Iterative Test Data Generation and Its EvaluationNeelam Gupta, Aditya P. Mathur, Mary Lou Soffa. 224 [doi]
- Beyond Components-Connections-Constraints: Dealing with Software Architecture DifficultiesJohn K. Kyaruzi, Jan van Katwijk. 235-242 [doi]
- Enhancing Annotation Visibility for Software InspectionMichael Stein, Mats Per Erik Heimdahl, John Riedl. 243-246 [doi]
- Automatic Synthesis of Control Software for an Industrial Automation Control SystemEnrico Tronci. 247-250 [doi]
- Automatic Software Clustering via Latent Semantic AnalysisJonathan I. Maletic, Naveen Valluri. 251-254 [doi]
- vUML: A Tool for Verifying UML ModelsJohan Lilius, Ivan Paltor. 255-258 [doi]
- A Formal Ontology for Re-Use of Software Architecture DocumentsChristopher A. Welty, David A. Ferrucci. 259-262 [doi]
- Rule-Based Strategic Reflection: Observing and Modifying Behavior at the Architectural LevelWalter Cazzola, Andrea Savigni, Andrea Sosio, Francesco Tisato. 263-266 [doi]
- Development of a Constraint-Based Airlift Scheduler by Program Synthesis from Formal SpecificationsThomas Emerson, Mark H. Burstein. 267-270 [doi]
- Automatically Structuring Textual Requirement ScenariosAndreas Becks, Jörg Köller. 271-274 [doi]
- UMLAUT: An Extendible UML Transformation FrameworkWai-Ming Ho, Jean-Marc Jézéquel, Alain Le Guennec, François Pennaneac h. 275-278 [doi]
- Automatic Proofs of Properties of Simple C:::--::: ModulesCarine Fédèle, Emmanuel Kounalis. 283-286 [doi]
- Dynamic Accommodation of Change: Automated Architecture Configuration of Distributed SystemsGabriele Taentzer, Michael Goedicke, Torsten Meyer. 287-290 [doi]
- Architectural Element Matching Using Concept AnalysisRobert Waters, Spencer Rugaber, Gregory D. Abowd. 291-294 [doi]
- Controlled Natural Language Can Replace First-Order LogicNorbert E. Fuchs, Uta Schwertel, Sunna Torge. 295-298 [doi]
- A Comparative Study between Linear Programming Validation (LPV) and other Verification MethodsSamuel Devulder, Jean-Luc Lambert. 299-302 [doi]
- Component-based Systems as an Aid to Design ValidationPeter Henderson, Robert John Walters. 303-306 [doi]
- A Metric Based Technique for Design Flaws Detection and CorrectionThierry Miceli, Houari A. Sahraoui, Robert Godin. 307-310 [doi]
- Deductive Synthesis of Event-Based Software ArchitecturesJohn Penix. 311-314 [doi]
- An Approach to Automatic Code Generation for Safety-Critical SystemsMichael W. Whalen, Mats Per Erik Heimdahl. 315-318 [doi]
- Implementing Effective Automatic Cryptographic Protocol AnalysisStephen H. Brackin. 319-322 [doi]
- NAVCo: Negotiation-based Adaptive View CoordinationPrasanta K. Bose, Mark G. Matthews. 327-330 [doi]
- Towards Discovery, Specification, and Verification of Component UsageChang Liu, Debra J. Richardson. 331-334 [doi]
- Towards Adaptive Web AgentsJ. William Murdock, Ashok K. Goel. 335-338 [doi]