Abstract is missing.
- Agile architecture methodology: long term strategy interleaved with short term tacticsEthan Hadar, Gabriel M. Silberman. 641-652 [doi]
- Retaining comments when refactoring codePeter Sommerlad, Guido Zgraggen, Thomas Corbat, Lukas Felber. 653-662 [doi]
- Decentralized control of automatic guided vehicles: applying multi-agent systems in practiceDanny Weyns, Tom Holvoet, Kurt Schelfthout, Jan Wielemans. 663-674 [doi]
- NOAO imaging meta data quality improvement: a case study of the evolution of a service oriented systemSonya J. Lowry, Phillip B. Warner, Evan Deaubl. 675-684 [doi]
- Performance pitfalls in large-scale java applications translated from COBOLToshio Suganuma, Toshiaki Yasue, Tamiya Onodera, Toshio Nakatani. 685-696 [doi]
- Processing heterogeneous abstract syntax trees with the mutable class patternNikolay Malitsky. 697-702 [doi]
- A workload model for topic-based publish/subscribe systemsZafar U. Singhera. 703-712 [doi]
- SyQL: an object oriented, fuzzy, temporal query language for repositories of software artifactsMirco Bianco, Alberto Sillitti, Giancarlo Succi. 715-716 [doi]
- Aspect weaving for OSGiMartin Lippert. 717-718 [doi]
- Automated testing of non-functional requirementsKristoffer Dyrkorn, Frank Wathne. 719-720 [doi]
- Axiom-based testing for C++Anya Helene Bagge, Valentin David, Magne Haveraaen. 721-722 [doi]
- Compile-time type-checking for custom type qualifiers in JavaMatthew M. Papi, Mahmood Ali, Michael D. Ernst. 723-724 [doi]
- Enforcing reference and object immutability in JavaMahmood Ali, Yoav Zibin, Matthew M. Papi, Michael D. Ernst. 725-726 [doi]
- Refactoring support for the groovy-eclipse plug-inMichael Klenk, Reto Kleeb, Martin Kempf, Peter Sommerlad. 727-728 [doi]
- Interactive exploration of compacted visualizations for understanding behavior in complex softwareElizabeth L. Murnane, Vineet Sinha. 729-730 [doi]
- JAxT and JDI: the simplicity of junit applied to axioms and data invariantsMagne Haveraaen, Karl Trygve Kalleberg. 731-732 [doi]
- PEM: experience management tool for software companiesEmanuele Danovaro, Tadas Remencius, Alberto Sillitti, Giancarlo Succi. 733-734 [doi]
- Quota queue: a new queue data structure that provides prioritized, predictable, guaranteed and fair dequeue mechanismAdityanand Pasumarthi. 735-736 [doi]
- Supporting software product lines development: FLiP - product line derivation toolSérgio Soares, Fernando Calheiros, Vilmar Nepomuceno, Andrea Menezes, Paulo Borba, Vander Alves. 737-738 [doi]
- The maxine virtual machine and inspectorBernd Mathiske. 739-740 [doi]
- Tool support for statically checking the structural conformance of an object-oriented system to its runtime architectureMarwan Abi-Antoun, Jonathan Aldrich. 741-742 [doi]
- Tool support for the static extraction of sound hierarchical representations of runtime object graphsMarwan Abi-Antoun, Jonathan Aldrich. 743-744 [doi]
- Understanding code architectures via interactive exploration and layout of layered diagramsVineet Sinha, Elizabeth L. Murnane, Scott W. Kurth, Edy S. Liongosari, Rob Miller, David R. Karger. 745-746 [doi]
- Testability explorer: using byte-code analysis to engineer lasting social changes in an organization s software development processMisko Hevery. 747-748 [doi]
- Visualizing software evolution with lagreinAndrejs Jermakovics, Raimund Moser, Alberto Sillitti, Giancarlo Succi. 749-750 [doi]
- eMoose: a memory aid for software developersUri Dekel. 751-752 [doi]
- Alias count facilitate ownership transferDuraisamy S. Pradeep Kumar. 755-756 [doi]
- Arbitrary non-contiguous pieces of computation: a new join point model for aspect-oriented programmingS. Hossein Sadat-Mohtasham. 757-758 [doi]
- Compile-time type-checking for custom type qualifiers in javaMatthew M. Papi, Mahmood Ali, Michael D. Ernst. 759-760 [doi]
- Hierarchical inter-object traces for specification miningDavid Lo, Shahar Maoz. 761-762 [doi]
- Interactive exploration of compacted visualizations for understanding behavior in complex softwareElizabeth L. Murnane, Vineet Sinha. 763-764 [doi]
- Mining for computing skillsAndrew J. Aken. 765-766 [doi]
- Novel language syntax to enhance readability: white space, parameter sets, & control structuresClifton Kussmaul. 767-768 [doi]
- Preparing for C++0xValentin David. 769-770 [doi]
- Scalable, expressive, and context-sensitive code smell displayEmerson R. Murphy-Hill. 771-772 [doi]
- Testing with concepts and axioms in C++Anya Helene Bagge, Valentin David, Magne Haveraaen. 773-774 [doi]
- Understanding code architectures via interactive exploration and layout of layered diagramsVineet Sinha, Elizabeth L. Murnane, Scott W. Kurth, Edy S. Liongosari, Rob Miller, David R. Karger. 775-776 [doi]
- Visualizing the word structure of Java class namesCraig Anslow, James Noble, Stuart Marshall, Ewan D. Tempero. 777-778 [doi]
- WebDSL: a domain-specific language for dynamic web applicationsDanny M. Groenewegen, Zef Hemel, Lennart C. L. Kats, Eelco Visser. 779-780 [doi]
- Worked examples for sound OO pedagogy: the seventh killer examples workshopMichael E. Caspersen, Jürgen Börstler, Adrienne Decker, Carl Alphonce. 781-782 [doi]
- eMoose: a memory aid for software developersUri Dekel. 783-784 [doi]
- Escaped from the lab: innovation practices in large organizationsSteven Fraser, Ethan Hadar, Dennis Mancl, Bill Opdyke, David A. Owens, Dirk Riehle, Linda Rising. 787-790 [doi]
- DSLs: the good, the bad, and the uglyJeffrey G. Gray, Kathleen Fisher, Charles Consel, Gabor Karsai, Marjan Mernik, Juha-Pekka Tolvanen. 791-794 [doi]
- From sorceress to scientist: women in computingAki Namioka, Julie A. Adams, JuanitaJ. Ewing, Nadyne Mielke, J. Eliot B. Moss, Lucy A. Suchman. 795-796 [doi]
- Collaboration and communication: growing and sustaining ultra large scale (ULS) systemsSteven Fraser, Ricardo Lopez, Pradeep Kathail, Douglas C. Schmidt, Mary Shaw, Kevin J. Sullivan, Dave A. Thomas. 797-800 [doi]
- Privacy and security: what are you doing to keep the community safe?Steven Fraser, Djenana Campara, Robert Gleichauf, Harriet Pearson, Peter Swire, Laurie Williams. 801-804 [doi]
- An experiment in teaching innovation in software engineering: video presentationBernd Bruegge, Harald Stangl, Maximilian Reiss. 807-810 [doi]
- xDIVA: a debugging visualization system with composable visualization metaphorsYung-Pin Cheng, Jih-Feng Chen, Ming-Chieh Chiu, Nien-Wei Lai, Chien-Chih Tseng. 807-810 [doi]
- Accessing the deep web: when good ideas go badAlfredo Alba, Varun Bhagwan, Tyrone Grandison. 815-818 [doi]
- Towards harmony-oriented programmingSebastian Fleissner, Elisa L. A. Baniassad. 819-822 [doi]
- Essential programming paradigmClaude Y. Knaus. 823-826 [doi]
- Jidoka in software developmentEmanuele Danovaro, Andrea Janes, Giancarlo Succi. 827-830 [doi]
- A framework for complex time structures based on coupled listsWijnand Schepens. 831-834 [doi]
- 1st ACM workshop on hot topics in software upgrades (HotSWUp 2008)Tudor Dumitras, Danny Dig, Iulian Neamtiu. 837-838 [doi]
- 2nd workshop on assessment of contemporary modularization techniques (ACoM 2008)Phil Greenwood, Alessandro Garcia, Elisa L. A. Baniassad, Kevin J. Sullivan, Yuanfang Cai, Alan MacCormack. 839-842 [doi]
- Challenges: agile values meet different value systemsJörg Pechau, Petra Becker-Pechau. 843-846 [doi]
- Escaped from the lab: crossing the gap from invention to practiceDennis Mancl, Steven Fraser, William F. Opdyke. 847-848 [doi]
- Extravagaria IV: photographing conferencesRichard P. Gabriel, Kevin J. Sullivan. 849-852 [doi]
- Lisp50: The 50th birthday of lisp at OOPSLA 2008Pascal Costanza, Richard P. Gabriel, Robert Hirschfeld, Guy L. Steele Jr.. 853-854 [doi]
- Relationships and associations in object-oriented languagesStephen Nelson, Stephanie Balzer, Gavin M. Bierman, Erik Meijer, James Noble, David J. Pearce, Jiri Soukup, Frank Tip. 855-856 [doi]
- Sixth international workshop on SOA & web services: best practicesAnders Aas Bjerkestrand, Lars Arne Skår, Ruth G. Lennon, Amir Zeid. 857-858 [doi]
- The 2nd workshop on refactoring tools (WRT 08)Danny Dig, Robert M. Fuhrer, Ralph E. Johnson. 859-860 [doi]
- The 8th OOPSLA workshop on domain-specific modelingJuha-Pekka Tolvanen, Jeffrey G. Gray, Matti Rossi, Jonathan Sprinkle. 861-864 [doi]
- Virtual machines and intermediate languages for emerging modularization mechanismsHridesh Rajan, Michael Haupt, Christoph Bockisch, Robert Dyer. 865-868 [doi]
- Worked examples for sound object-oriented pedagogy: a killer workshopMichael E. Caspersen, Jürgen Börstler, Adrienne Decker, Carl Alphonce. 869-870 [doi]
- Scaffolding for multiple assignment projects in CS1 and CS2Clifton Kussmaul. 873-876 [doi]
- Re-engineering the algorithma project for long-term maintenanceWillie James, Phil Lucas, John O Connor, Arturo I. Concepcion. 877-886 [doi]
- A snapshot of studio based learning: code reviews as a means of community buildingJoseph Bergin, Rick Mercer, David West 0002, Robert C. Duvall, Eugene Wallingford, Pamela M. Rostal, Richard P. Gabriel. 887-888 [doi]
- Designing a memory aid to support software developersUri Dekel. 891-892 [doi]
- Plug-in architecture and design guidelines for customizable enterprise applicationsReinhard Wolfinger. 893-894 [doi]
- Prototyping domain-specific language semanticsDaniel A. Sadilek. 895-896 [doi]
- Arbitrary non-contiguous pieces of computation: a new join point model for aspect-oriented programmingS. Hossein Sadat-Mohtasham. 897-898 [doi]
- Improving developers confidence in test results of multi-threaded systems: avoiding early and late assertionsAyla Dantas. 899-900 [doi]
- Checking framework interactions with relationshipsCiera Jaspan. 901-902 [doi]
- Validating temporal properties of interacting objectsNomair A. Naeem, Ondřej Lhoták. 903-904 [doi]
- Verifying correct usage of atomic blocks using access permissionsNels Beckman. 905-906 [doi]
- Automatic code generation and solution estimate for object-oriented embedded softwareRonaldo Rodrigues Ferreira. 909-910 [doi]
- Static extraction and conformance checking of the runtime architecture of object-oriented systemsMarwan Abi-Antoun. 911-912 [doi]
- Grey-box specifications for object-oriented program componentsYannick Welsch. 913-914 [doi]
- Checking API protocol compliance in javaKevin Bierhoff. 915-916 [doi]
- Failure-prone components are also attack-prone componentsMichael Gegick. 917-918 [doi]
- Raising the level of abstraction of application-level checkpointingRitu Arora. 919-920 [doi]
- Answering control flow questions about codeThomas D. LaToza. 921-922 [doi]
- CZ: multiple inheritance without diamondsDonna Malayeri. 923-924 [doi]
- Automatic detection of memory anti-patternsAdriana E. Chis. 925-926 [doi]
- Security oriented program transformations (or how to add security on demand)Munawar Hafiz. 927-928 [doi]