Abstract is missing.
- Keynote address: toward compositional software engineeringJan Bosch. 1-2 [doi]
- Analyzing security architecturesMarwan Abi-Antoun, Jeffrey M. Barnes. 3-12 [doi]
- VikiBuilder: end-user specification and generation of visual wikisChristian Hirsch, John G. Hosking, John C. Grundy. 13-22 [doi]
- Software design sketching with calicoNicolas Mangano, Alex Baker, Mitch Dempsey, Emily Oh Navarro, André van der Hoek. 23-32 [doi]
- Automatically documenting program changesRaymond P. L. Buse, Westley Weimer. 33-42 [doi]
- Towards automatically generating summary comments for Java methodsGiriprasad Sridhara, Emily Hill, Divya Muppaneni, Lori L. Pollock, K. Vijay-Shanker. 43-52 [doi]
- Automatic detection of nocuous coordination ambiguities in natural language requirementsHui Yang, Alistair Willis, Anne N. De Roeck, Bashar Nuseibeh. 53-62 [doi]
- Flexible and scalable consistency checking on product line variability modelsMichael Vierhauser, Paul Grünbacher, Alexander Egyed, Rick Rabiser, Wolfgang Heider. 63-72 [doi]
- Variability modeling in the real: a perspective from the operating systems domainThorsten Berger, Steven She, Rafael Lotufo, Andrzej Wasowski, Krzysztof Czarnecki. 73-82 [doi]
- RESISTing reliability degradation through proactive reconfigurationDeshan Cooray, Sam Malek, Roshanak Roshandel, David Kilgore. 83-92 [doi]
- Automatic construction of an effective training set for prioritizing static analysis warningsGuangtai Liang, Ling Wu, Qian Wu, Qianxiang Wang, Tao Xie, Hong Mei. 93-102 [doi]
- An automated approach for finding variable-constant pairing bugsJulia L. Lawall, David Lo. 103-112 [doi]
- Deviance from perfection is a better criterion than closeness to evil when identifying risky codeMarouane Kessentini, Stéphane Vaucher, Houari A. Sahraoui. 113-122 [doi]
- Seamlessly integrated, but loosely coupled: building user interfaces from heterogeneous componentsHeiko Paulheim. 123-126 [doi]
- Tool support for quality-driven development of software architecturesSuntae Kim, Dae-Kyoo Kim, Sooyong Park. 127-130 [doi]
- MiTV: multiple-implementation testing of user-input validators for web applicationsKunal Taneja, Nuo Li, Madhuri R. Marri, Tao Xie, Nikolai Tillmann. 131-134 [doi]
- Model comparison with GenericDiffZhenchang Xing. 135-138 [doi]
- Eliminating products to test in a software product lineChang Hwan Peter Kim, Don S. Batory, Sarfraz Khurshid. 139-142 [doi]
- A visual interactive debugger based on symbolic executionReiner Hähnle, Marcus Baum, Richard Bubel, Marcel Rothe. 143-146 [doi]
- Model-driven reverse engineering of legacy graphical user interfacesÓscar Sánchez Ramón, Jesús Sánchez Cuadrado, Jesús García Molina. 147-150 [doi]
- A two-step technique for extract class refactoringGabriele Bavota, Andrea De Lucia, Andrian Marcus, Rocco Oliveto. 151-154 [doi]
- Detecting user-visible failures in AJAX web applications by analyzing users interaction behaviorsWanchun Li, Mary Jean Harrold, Carsten Görg. 155-158 [doi]
- Architectural style as an independent variableHamid Bagheri, Yuanyuan Song, Kevin J. Sullivan. 159-162 [doi]
- Text mining in supporting software systems risk assuranceLiGuo Huang, Daniel Port, Liang Wang, Tao Xie, Tim Menzies. 163-166 [doi]
- JCCD: a flexible and extensible API for implementing custom code clone detectorsBenjamin Biegel, Stephan Diehl. 167-168 [doi]
- PeerUnit: a framework for testing peer-to-peer systemsEduardo Cunha de Almeida, João Eugenio Marynowski, Gerson Sunyé, Patrick Valduriez. 169-170 [doi]
- Reconfigurable run-time support for distributed service component architecturesRémi Mélisson, Philippe Merle, Daniel Romero 0002, Romain Rouvoy, Lionel Seinturier. 171-172 [doi]
- MoDisco: a generic and extensible framework for model driven reverse engineeringHugo Bruneliere, Jordi Cabot, Frédéric Jouault, Frédéric Madiot. 173-174 [doi]
- Tool support for continuous maintenance of state machine models in program codeMoritz Balz, Michael Striewe, Michael Goedicke. 175-176 [doi]
- Reac2o: a runtime for enterprise system modelsCameron M. Hine, Jean-Guy Schneider, Steven Versteeg. 177-178 [doi]
- Symbolic PathFinder: symbolic execution of Java bytecodeCorina S. Pasareanu, Neha Rungta. 179-180 [doi]
- Enumeration refactoring: a tool for automatically converting Java constants to enumerated typesRaffi Khatchadourian, Benjamin Muskalla. 181-182 [doi]
- Keynote address: the actual implementation will be derived from the formal specification -- KBSA, 1983Cordell Green. 183-184 [doi]
- Verification-driven slicing of UML/OCL modelsAsadullah Shaikh, Robert Clarisó, Uffe Kock Wiil, Nasrullah Memon. 185-194 [doi]
- Automated support for repairing input-model faultsSenthil Mani, Vibha Singhal Sinha, Pankaj Dhoolia, Saurabh Sinha. 195-204 [doi]
- Security-driven model-based dynamic adaptationBrice Morin, Tejeddine Mouelhi, Franck Fleurey, Yves Le Traon, Olivier Barais, Jean-Marc Jézéquel. 205-214 [doi]
- JRF-E: using model checking to give advice on eliminating memory model-related bugsKyunghee Kim, Tuba Yavuz-Kahveci, Beverly A. Sanders. 215-224 [doi]
- A bounded statistical approach for model checking of unbounded until propertiesRu He, Paul Jennings, Samik Basu, Arka P. Ghosh, Huaiqing Wu. 225-234 [doi]
- Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machinesSylvain Hallé, Taylor Ettema, Chris Bunch, Tevfik Bultan. 235-244 [doi]
- Towards mining replacement queries for hard-to-retrieve tracesMarek Gibiec, Adam Czauderna, Jane Cleland-Huang. 245-254 [doi]
- Tool support for essential use cases to better capture software requirementsMassila Kamalrudin, John C. Grundy, John G. Hosking. 255-264 [doi]
- Timesheet assistant: mining and reporting developer effortRenuka Sindhgatta, Nanjangud C. Narendra, Bikram Sengupta, Karthik Visweswariah, Arthur G. Ryman. 265-274 [doi]
- An experience report on scaling tools for mining software repositories using MapReduceWeiyi Shang, Bram Adams, Ahmed E. Hassan. 275-284 [doi]
- iMashup: assisting end-user programming for the service-oriented webXuanzhe Liu, Qi Zhao, Gang Huang, Zhi Jin, Hong Mei. 285-288 [doi]
- MODA: automated test generation for database applications via mock objectsKunal Taneja, Yi Zhang, Tao Xie. 289-292 [doi]
- Random unit-test generation with MUT-aware sequence recommendationWujie Zheng, Qirun Zhang, Michael R. Lyu, Tao Xie. 293-296 [doi]
- End-user oriented critic specification for domain-specific visual language toolsNorhayati Mohd. Ali, John G. Hosking, John C. Grundy, Jun Huh. 297-300 [doi]
- Checking roundoff errors using counterexample-guided narrowingDo Thi Bich Ngoc, Mizuhito Ogawa. 301-304 [doi]
- Realizing architecture frameworks through megamodelling techniquesRich Hilliard, Ivano Malavolta, Henry Muccini, Patrizio Pelliccione. 305-308 [doi]
- Recovering inter-project dependencies in software ecosystemsMircea Lungu, Romain Robbes, Michele Lanza. 309-312 [doi]
- Automated program repair through the evolution of assembly codeEric Schulte, Stephanie Forrest, Westley Weimer. 313-316 [doi]
- Integrating model verification and self-adaptationRafael V. Borges, Artur S. d Avila Garcez, Luís C. Lamb. 317-320 [doi]
- When to use data from other projects for effort estimationEkrem Kocaguneli, Gregory Gay, Tim Menzies, Ye Yang, Jacky W. Keung. 321-324 [doi]
- Kadre: domain-specific architectural recovery for scientific software systemsDavid Woollard, Chris Mattmann, Daniel Popescu, Nenad Medvidovic. 325-328 [doi]
- Automated SQL query generation for systematic testing of database enginesShadi Abdul Khalek, Sarfraz Khurshid. 329-332 [doi]
- Tag and prune: a pragmatic approach to software product line implementationQuentin Boucher, Andreas Classen, Patrick Heymans, Arnaud Bourdoux, Laurent Demonceau. 333-336 [doi]
- Reducing estimation uncertainty with continuous assessment: tracking the cone of uncertainty Pongtip Aroonvatanaporn, Chatchai Sinthop, Barry W. Boehm. 337-340 [doi]
- Using transitive changesets to support feature locationSukanya Ratanotayanon, Hye Jung Choi, Susan Elliott Sim. 341-344 [doi]
- RuMoR: monitoring and recovery for BPEL applicationsJocelyn Simmonds, Marsha Chechik. 345-346 [doi]
- Model/analyzer: a tool for detecting, visualizing and fixing design errors in UMLAlexander Reder, Alexander Egyed. 347-348 [doi]
- CoGenTe: a tool for code generator testingA. C. Rajeev, Prahladavaradan Sampath, K. C. Shashidhar, S. Ramesh. 349-350 [doi]
- Impendulo: debugging the programmerWillem Visser, Jaco Geldenhuys. 351-352 [doi]
- SpecDiff: debugging formal specificationsZhenchang Xing, Jun Sun 0001, Yang Liu 0003, Jin Song Dong. 353-354 [doi]
- Deriving behavior of multi-user processes from interactive requirements validationGregor Gabrysiak, Holger Giese, Andreas Seibel. 355-356 [doi]
- Tool support for code generation from a UMLsec propertyLionel Montrieux, Jan Jürjens, Charles B. Haley, Yijun Yu, Pierre Yves Schobbens, Hubert Toussaint. 357-358 [doi]
- PlayGo: towards a comprehensive tool for scenario based programmingDavid Harel, Shahar Maoz, Smadar Szekely, Daniel Barkan. 359-360 [doi]
- REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systemsDinko Ivanov, Marin Orlic, Cristina Cerschi Seceleanu, Aneta Vulgarakis. 361-362 [doi]
- C2O: a tool for guided decision-makingAlexander Nöhrer, Alexander Egyed. 363-364 [doi]
- Keynote address: model engineering for model-driven engineeringAxel van Lamsweerde. 365-366 [doi]
- Search-carrying codeAli Taleghani, Joanne M. Atlee. 367-376 [doi]
- Solving string constraints lazilyPieter Hooimeijer, Westley Weimer. 377-386 [doi]
- Scenario-based and value-based specification mining: better togetherDavid Lo, Shahar Maoz. 387-396 [doi]
- Test generation to expose changes in evolving programsDawei Qi, Abhik Roychoudhury, Zhenkai Liang. 397-406 [doi]
- How did you specify your test suiteAndreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith. 407-416 [doi]
- Dynamic and transparent analysis of commodity production systemsAristide Fattori, Roberto Paleari, Lorenzo Martignoni, Mattia Monga. 417-426 [doi]
- Apt-pbo: solving the software dependency problem using pseudo-boolean optimizationPaulo Trezentos, Inês Lynce, Arlindo L. Oliveira. 427-436 [doi]
- A sentence-matching method for automatic license identification of source code filesDaniel M. Germán, Yuki Manabe, Katsuro Inoue. 437-446 [doi]
- Detection of recurring software vulnerabilitiesNam H. Pham, Tung Thanh Nguyen, Hoan Anh Nguyen, Tien N. Nguyen. 447-456 [doi]
- Matching dependence-related queries in the system dependence graphXiaoyin Wang, David Lo, Jiefeng Cheng, Lu Zhang, Hong Mei, Jeffrey Xu Yu. 457-466 [doi]
- PLASMA: a plan-based layered architecture for software model-driven adaptationHossein Tajalli, Joshua Garcia, George Edwards, Nenad Medvidovic. 467-476 [doi]
- A program differencing algorithm for verilog HDLAdam Duley, Chris Spandikow, Miryung Kim. 477-486 [doi]
- Error-avoiding adaptors for black-box software componentsCasandra Holotescu. 487-492 [doi]
- Automated model groupingMichael Becker, Volker Gruhn. 493-498 [doi]
- Automatic inference of abstract type behaviorMihai Balint. 499-504 [doi]
- Extraction and visualization of traceability relationships between documents and source codeXiaofan Chen. 505-510 [doi]
- Model checking graph representation of precise boolean inter-procedural flow analysisDominic Letarte. 511-516 [doi]
- The influence of multiple artifacts on the effectiveness of software testingMatt Staats. 517-522 [doi]