Abstract is missing.
- How to make an information elephant danceCecilia Claudio. 1
- Impact! The Challenge of Industrial Research in Computer Science in a web 2.0 worldLaura M. Haas. 2
- Building Global Ecosystem for Collaborative Computing Research and EducationYi Deng. 3
- Transformations for Rapid Prototyping of Time-critical ApplicationsShi-Kuo Chang, Zhoulan Zhang, Colin J. Ihrig, Paolo Maresca, Valentina Ternelli. 4-15
- Case Study: Applying Business Process Management SystemsGregor Scheithauer, Guido Wirtz. 12-15
- Verification of Optimization Algorithms: a Case Study of a Quadratic Assignment Problem SolverTsong Yueh Chen, Huimin Lin, Robert G. Merkel, Daoming Wang. 16-21
- Towards a Theoretical Model for Evaluating the Acceptance of Model-driven Measurement ProceduresNelly Condori-Fernández, Oscar Pastor. 22-25
- Knowledge Transformation from Task Scenarios to View-based Design DiagramsNima Dezhkam, Kamran Sartipi. 26-32
- PSPCAT: A PSP Data Collection and Analysis ToolChien-Hung Liu, Shu-Ling Chen, Yu-Chun Huang. 33-37
- A Systematic Method for Process Tailoring Based on Knowledge ReuseXiao Yang He, Ya-Sha Wang, Yu-xin Teng, Jin-gang Guo. 38-41
- Linking Return on Training Investment with Defects Causal AnalysisSantiago Matalonga, Tomás San Feliu Gilabert. 42-47
- Autonomous Reconfiguration Procedures for EJB-based Enterprise ApplicationsThomas Vogel, Jens Bruhn, Guido Wirtz. 48-53
- Cross-language Clone DetectionNicholas A. Kraft, Brandon W. Bonds, Randy K. Smith. 54-59
- Software Maintenance Maturity Model (S3mDSS) A Decision Support SystemAlain April, Naji Habra, Arnaud Counet. 60-66
- Odyssey-MEC: Model Evolution Control in the Context of Model-Driven ArchitectureChessman Correa, Leonardo Gresta Paulino Murta, Cláudia Werner. 67-72
- Analyzing the Impact of Attribute Noise on Software Quality ClassificationAndres Folleco, Taghi M. Khoshgoftaar, Lofton A. Bullard. 73-78
- An Adaptive Neural Network with Dynamic Structure for Software Defect PredictionZhiwei Xu, Naeem Seliya, Weibiao Wu. 79-84
- Evaluating the Accuracy of Call Graphs Extracted with the Eclipse CDTNicholas A. Kraft, Kevin S. Webb. 85-90
- A Comparison of Time Tracking Tools for Software DevelopersJouni Lappalainen, Lasse Harjumaa, Jukka Sirviö, Tytti Pokka, Heidi Moisanen, Hanna Leskinen. 91-96
- RealSpec: an Executable Specification Language for Modeling ResourcesAmir A. Khwaja, Joseph E. Urban. 97-102
- Predicting Change Propagation in Object-oriented Systems: a Control-call Path Based Approach and Associated ToolLinda Badri, Mourad Badri, Daniel St-Yves. 103-110
- A Qualitative Assessment of the Reverse Engineering Capabilities of Unit Testing Tools for Understanding Java ProgramsAndy Tinkham, Scott R. Tilley, Tauhida Parveen. 111-116
- Estimating Event Lifetimes for Distributed Runtime VerificationChristos Kloukinas, George Spanoudakis, Khaled Mahbub. 117-122
- Ontology-learning Supported Sematic Search Using Cooperative AgentsCheng Zhong, Zilan (Nancy) Yang, Mohsen Afsharchi, Behrouz H. Far. 123-128
- Automating a Domain Model Aware Reengineering MethodologyJavier Belmonte, Philippe Dugerdil. 129-136
- Explaining Product Release Planning Results Using Concept AnalysisGengshen Du, Thomas Zimmermann, Günther Ruhe. 137-142
- Weighted Static Code Attributes for Software Defect PredictionBurak Turhan, Ayse Basar Bener. 143-148
- Predicting Software Project Size Using Project Generated InformationMárcio de Oliveira Barros. 149-154
- Supporting Reusable Component Selection with Use Case Gap-based Development Effort EstimationXin Zhou, Bonnie Ray, Chenhua Feng. 155-166
- A Project Scheduling Method Based on Human Resource AvailabilityLizi Xie, Junchao Xiao, Dapeng Liu, Qing Wang. 161-166
- Estimating the Effort of Independent Verification and Validation in the Context of Mission-critical Software Systems - A Case StudyHaruka Nakao, Adam Trendowicz, Jürgen Münch. 167-172
- Unified Basic Concepts for Process Capability ModelsClenio F. Salviano, Adriana Maria C. M. Figueiredo. 173-178
- Systematic Approach to Risk Management in Software Projects through Process TailoringLisandra M. Fontoura, Roberto Tom Price. 179-184
- Process tailoring based on well-formedness rulesEliana Beatriz Pereira, Ricardo Melo Bastos, Toacy Cavalcante de Oliveira. 185-190
- Non-invasive Software Process Data Collection for Expert IdentificationAndrea Janes, Alberto Sillitti, Giancarlo Succi. 191-196
- Using XML Patterns to Guide Perturbation Based Testing of Web ServicesPaulo N. Cruz Filho, Silvia Regina Vergilio. 197-202
- Translating OWL Specified Domain Knowledge to Aspect Oriented ModelJuanzi Li, Xinyu You, Xiaoying Bai. 203-208
- MAPLE: a Maintenance Approach for Pattern-enabLed rEconfiguration of SOA-based Enterprise ApplicationSonglin Hu, Ying Liang, Jiuming Tian, Yicheng Song. 209-214
- Reliability Oriented QoS Driven Composite Service Selection Based on Performance PredictionLei Yang, Yu Dai, Bin Zhang. 215-218
- Design of an RSS Crawler with Adaptive Revisit ManagerBum-Suk Lee, Jin Woo Im, Byung-Yeon Hwang, Du Zhang. 219-222
- QuickPay Online Payment ProtocolJian Dai, Mark Stamp. 223-226
- Sharing Application Logic Across Programming Language BoundariesDennis S. Patrone, Bina Ramamurthy. 227-231
- Synergizing Collaboration and Reuse in Software EngineeringStefan Seedorf, Oliver Hummel. 232-233
- Improving Component Container Development Process through Product Line EngineeringGuoliang Liu, Yang Li, Jun Wei. 238-243
- .NET Extensions to the p-architecture Description LanguagesZawar Qayyum, Flávio Oquendo. 244-249
- Towards Collaborative Development Based on Software ArchitectureYanchun Sun, Hui Song, Xinghua Wang, Wenpin Jiao. 250-254
- Choosing a Software Architecture: An Approach and a Case StudyCarlo Ghezzi, Giordano Tamburrelli. 255-260
- PROTEF: Automatic Verification of Pattern-Based LTL TemplatesLuis García, Steve Roach, Salamah Salamah. 261-266
- Formal Specification of Object-oriented Systems with Collaborative Objects and Petri Nets - a Case StudyBoleslaw Mikolajczak. 267-272
- A Property Specification Tool for Generating Formal Specifications: Prospec 2.0Irbis Gallegos, Omar Ochoa, Ann Q. Gates, Steve Roach, Salamah Salamah, Corina Vela. 273-278
- Subjective Assessment of the Mutual Influence of ISO 9126 Software Qualities: an Empirical StudySandro Morasca. 297-302
- Reverse Engineering Interface Protocols for Comprehension of Large C++ Libraries during Code Evolution TasksEdward B. Duffy, Jason O. Hallstrom, Brian A. Malloy. 303-308
- Knowledge Management to Support the Deployment of a CMMI Level 3 ProcessAna Paula Carvalho Cavalcanti, Felipe Furtado, V. Moura, R. Costa, Silvio Romero de Lemos Meira. 309-314
- Code Transformation Techniques and Management Architecture for Self-manageable Distributed ApplicationsM. Muztaba Fuad. 315-320
- A Decision-centric Architecture Design Method Facilitating the Contextually Capture and Reuse of Design KnowledgeXiaofeng Cui, Yanchun Sun, Sai Xiao, Hong Mei. 321-326
- System Architecture Induces Document ArchitecturePeter Henderson, Nishadi De Silva. 327-332
- A Software Framework for Integrative Physiological Model SimulationE. Zeynep Erson, Murat Cenk Cavusoglu. 333-338
- Combining SOA and BPM Technologies for Cross-System Process AutomationS. Herr, Konstantin Läufer, J. Shafaee, George K. Thiruvathukal, Guido Wirtz. 339-344
- Ontology-Enabled Generation of Embedded Web ServicesKlaus Marius Hansen, Weishan Zhang, Goncalo Soares. 345-350
- Modeling Services to Construct Service-oriented Healthcare Architecture for Digital Home-care BusinessChi-Lu Yang, Yeim-Kuan Chang, Chih-Ping Chu. 351-356
- Testing Relational Database Schemas with Alternative Instance AnalysisMaria Cláudia Figueiredo Pereira Emer, Silvia Regina Vergilio, Mario Jino. 357-362
- Analyzing Termination and Confluence in Active Rule Base via a Petri Net ApproachLorena Chavarría-Báez, Xiaoou Li. 363-366
- A Fuzzy Trigger Language for Relational Database SystemsYing Jin, Tejaswitha Bhavsar. 367-370
- A Comparative Study on Data Representation to Categorize Text DocumentsD. A. Meedeniya, Amal Shehan Perera. 371-374
- An Example on Economics-driven Software MiningRami Bahsoon, Wolfgang Emmerich. 375-380
- VP: an Efficient Algorithm for Frequent Itemset MiningQin Ding, Wen Shen Huang. 381-386
- Evolution Shelf: Exploiting Evolution Styles within Software ArchitecturesOlivier Le Goaer, Mourad Chabane Oussalah, Dalila Tamzalit, Abdelhak Seriai. 387-392
- Coverage-based Testing Using Qualitative Reasoning ModelsHarald Brandl, Gordon Fraser, Franz Wotawa. 393-398
- Traceability Models to Control an Aspectual Model-driven DevelopmentMarta S. Tabares, Raquel Anaya, Ana Moreira, João Araújo, Fernando Arango. 399-404
- Knowledge-based System Development with Scripting Technology: A Recommender System ExampleDietmar Jannach. 405-416
- Integrating Trust Management into Usage Control in P2P Multimedia DeliveryLi Yang, Raimund K. Ege. 411-416
- Flow Balancing Model for Air Traffc Flow ManagementBueno Borges de Souza, Li Weigang, Antonio Marcio Ferreira Crespo, Victor Rafael Rezende Celestino. 417-421
- VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID TechnologyBeomjin Kim, Keith Bock, Michael Burton, Rod Strong, Benjamin Aeschliman. 422-427
- Analyzing Manufacturing Process Knowledge Flows with KoFIOscar M. Rodríguez-Elias, Alberto L. Morán, Jaqueline I. Lavandera, Aurora Vizcaíno. 428-433
- Performance: a Longitudinal StudyNenad Stankovic. 434-439
- A Formal Approach for Translating a SAM Architecture to PROMELAGonzalo Argote-Garcia, Peter J. Clarke, Xudong He, Yujian Fu, Leyuan Shi. 440-447
- An Algorithm for Computing Loop FunctionsAli Mili, Shir Aharon, Chaitanya Nadkarni. 448-453
- Verifying Behavioral Correctness of Design Pattern ImplementationTu Peng, Jing Dong, Yajing Zhao. 454-459
- Automated Multiperspective Requirements Traceability Using Ontology Matching TechniqueNamfon Assawamekin, Thanwadee Sunetnanta, Charnyote Pluempitiwiriyawej. 460-465
- Eliciting Scenarios from ScenariosAbdolmajid Mousavi, Behrouz H. Far. 466-471
- Tailoring an Aspectual Goal-oriented Approach to Model FeaturesCarla T. L. L. Silva, Fernanda M. R. Alencar, João Araújo, Ana Moreira, Jaelson Brelaz de Castro. 472-477
- Representing Textual Requirements as Graphical Natural Language for UML Diagram GenerationMagda Ilieva, Harold Boley. 478-483
- A Dynamic Adjusting Method for Test Case PrioritizationBo Qu, Changhai Nie, Baowen Xu, Xiaofang Zhang. 484-487
- A Systematic Mapping Study on Non-Functional Search-based Software TestingWasif Afzal, Richard Torkar, Robert Feldt. 488-493
- A Degraded ILP Approach for Test Suite ReductionZhenyu Chen, Xiaofang Zhang, Baowen Xu. 494-499
- A Meta-model to Support Regression Testing of Web ApplicationsYanelis Hernandez, Tariq M. King, Jairo Pava, Peter J. Clarke. 500-505
- Minimal Observability for Transactional Hierarchical ServicesDebmalya Biswas, Blaise Genest. 531-536
- Using Boolean Cardinality Constraint for LTS Bounded Model CheckingSachoun Park, Gihwon Kwon. 537-542
- Japanese Puzzle as a SAT ProblemSachoun Park, Gihwon Kwon. 543-548
- Bridging the Semantic Gap Between Process Documentation and Process ExecutionGregor Scheithauer, Guido Wirtz, Candemir Toklu. 549-554
- Performance Challenges in Migrating to SOA Based Healthcare SystemsSuyog Gaidhani, Vijayananda Jagannatha. 555-560
- Dynamically Optimize Process Execution Based on Process-agentJian Dai, Junchao Xiao, Qing Wang, Mingshu Li, Huaizhang Li. 561-564
- Mobile-FIRST: a Mobile Agent Based First Responder SystemJason Honda, Harry H. Cheng, Donna Djordjevich. 565-568
- Ontology-based and Evolutionary Search for Computational Agents SchemesRoman Neruda. 569-572
- A Goal-oriented Mixed-granularity Component Selection Method for Huge Component RepositoriesXiaolin Xi, Jiyong Park, Jiakun Liu, Seongsoo Hong. 573-576
- A Case Study: Self-managed COTS Component-based Elevator SystemMichael Eonsuk Shin, Fernando Paniagua. 577-580
- Using Scenario Monitoring to Address State Based Crosscutting ConcernsMark Mahoney, Tzilla Elrad. 581-586
- Negotiating Service Levels - A Generic Negotiation Framework for WS AgreementSebastian Hudert, Heiko Ludwig, Guido Wirtz. 587-592
- Taxonomy on Consistency Requirements in the Business Process Integration ContextAndreas Schönberger, Guido Wirtz. 593-598
- Developing Enterprise Applications with Support to Dynamic Unanticipated EvolutionHyggo Oliveira de Almeida, Marcos F. Pereira, Márcio de Medeiros Ribeiro, Angelo Perkusich, Emerson Loureiro, Evandro Costa. 599-602
- Privacy-preserving Classification of Data StreamsChing-Ming Chao. 603-606
- Comparing the Use of Traditional and Associative Classifiers towards Personalized RecommendationsJoel Pinho Lucas, Saddys Segrera, María N. Moreno García. 607-612
- Discovering Meaningful Clusters from Mining the Software Engineering LiteratureYan Wu, Harvey P. Siy, Li Fan. 613-618
- A Model-Driven Approach for the Semi-automated Generation of Web-based Applications from RequirementsAli Fatolahi, Stéphane S. Somé, Timothy C. Lethbridge. 619-624
- A Model-driven Toolset to Support an Approach for Analyzing Integration of Business Process Aspect of Enterprise Application IntegrationSouvik Barat, Vinay Kulkarni. 625-630
- Model-based Test Complexity Analysis for Software Installation TestingJerry Gao, Karen Kwok, Todd Fitch. 631-637
- A Similarity Analysis Model for Semantic Web Information Filtering ApplicationsLucas Drumond, Rosario Girardi, Fabio Silva. 638-642
- Fuzziness in the Semantic Web: Survey and Future DirectionsSeyed Koosha Golmohammadi, Marek Reformat, Witold Pedrycz. 643-648
- A Language-based Approach to Addressing Reliability in Composite Web ServicesOnyeka Ezenwoye, Seyed Masoud Sadjadi. 649-654
- A Systematic Process for Domain EngineeringEduardo Santana de Almeida, Alexandre Alvaro, Vinicius Cardoso Garcia, Daniel Lucrédio, Renata Pontin de Mattos Fortes, Silvio Romero de Lemos Meira. 655-660
- Diagnosing Runtime Violations of Security & Dependability PropertiesTheocharis Tsigkritis, George Spanoudakis. 661-666
- Translating Workflow Diagrams into Web DesignsAntonio Navarro, Jorge Merino, Alfredo Fernández-Valmayor, Jesus Cristobal. 667-672
- A Security Domain Model for Static Analysis and Verification of Software ProgramsAlan B. Shaffer. 673-678
- Component Based Architectures for eXtreme Transacion ProcessingLuca Vetti Tagliati. 679-684
- An Ontology for Controlled Experiments on Software EngineeringRogério Eduardo Garcia, Erika Nina Hohn, Ellen Francine Barbosa, José Carlos Maldonado. 685-690
- Improving Automatic Model Creation Using OntologiesSven J. Körner, Tom Gelhausen. 691-696
- Ontology-based Development of Testing Related ToolsEllen Francine Barbosa, Elisa Yumi Nakagawa, Ana C. Riekstin, José Carlos Maldonado. 697-702
- Test Order Generation for Efficient Object-oriented Class Integration TestingRattikorn Hewett, Phongphun Kijsanayothin, Darunee Smavatkul. 703-708
- Using Observer Automata to Select Test Cases for Test PurposesGordon Fraser, Martin Weiglhofer, Franz Wotawa. 709-714
- Building Testable Components - a Systematic Approach and Its Experimental StudyJerry Gao, Wrihang Roberto Liang, Radhika Chhabra, Ramyashree Swamyo, Ma Xiang. 715-722
- SyncTest: a Tool to Synchronize Source Code, Model and TestingXiaoying Bai, Tao Liu. 723-728
- A Virtual Machine for Distributed Agent-oriented ProgrammingBin Zhou, Hong Zhu. 729-734
- MAAEM: a Multi-agent Application Engineering MethodologyAdriana Leite, Rosario Girardi, Uiratan Cavalcante. 735-740
- A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENTFatih Tekbacak, Tugkan Tuglular, Oguz Dikenelli. 741-744
- Documenting and Modeling Multi-agent Systems Product LinesIngrid Nunes, Uirá Kulesza, Camila Nunes, Carlos José Pereira de Lucena. 745-751
- A Study of the Model Explosion Problem in CTL Model UpdateYulin Ding, Yan Zhang. 752-757
- Feature Modeling for Context-Aware Software Product LinesPaula Fernandes, Cláudia Werner, Leonardo Gresta Paulino Murta. 758-763
- MEtaGile: A Pragmatic Domain-specific Modeling EnvironmentOlivier Buchwalder, Claude Petitpierre. 764-768
- Obtaining Well-Founded Practices about Elicitation Techniques by Means of an Update of a Previous Systematic ReviewÓscar Dieste Tubío, Marta López, Felicidad Ramos. 769-772
- Automatic Discovery of Interactions Between Software RequirementsEdgar S. Calisaya, Marcos R. S. Borges, Maria Luiza Machado Campos. 773-778
- A Model-driven Approach for Software Product Lines Requirements EngineeringMauricio Alférez, Uirá Kulesza, Andre Sousa, Joao Santos, Ana Moreira, João Araújo, Vasco Amaral. 779-784
- Model Interpretation for Executable Observation SpecificationsMathias Funk, Piet van der Putten, Henk Corporaal. 785-790
- Network Intrusion Detection Based on Bayesian NetworksAlma Cemerlic, Li Yang, Joseph M. Kizza. 791-794
- Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn LogicFeng Liu, Zhoujun Li, Ti Zhou, Mengjun Li. 795-801
- Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System CallsTauhida Parveen, William H. Allen, Scott R. Tilley, Gerald Marin, Richard Ford. 802-807
- Self-managed Deployment in a Distributed Environment via Utility FunctionsDebzani Deb, Michael J. Oudshoorn, John Paxton. 808-813
- Design of a Fault-tolerant Job-flow Manager for Grid Environments Using Standard Technologies, Job-flow Patterns, and a Transparent ProxyGargi Dasgupta, Onyeka Ezenwoye, Liana Fong, Selim Kalayci, Seyed Masoud Sadjadi, Balaji Viswanathan. 814-819
- Supporting Context-awareness in Web-based Groupware DevelopmentJosé Maria N. David, Marcos R. S. Borges, José A. Pino. 820-823
- Object-Z to Java/OO-Perl: A Conversion from Object-Z to Executable Skeletal Code with Dynamically Checkable Design ContractsSherri M. Sanders, Cui Zhang. 824-829
- An Empirical Study on Modularization of Object Oriented SoftwareJing Liu, Bin Liu, Chi Kong Tse, Keqing He. 830-835
- Bridging the Gap Between Slicing and Model-based DiagnosisFranz Wotawa. 836-841
- Dynamic Analysis and Design Pattern Detection in Java ProgramsLei Hu, Kamran Sartipi. 842-846
- Active Ontologies - an Approach for Using Ontologies as Semantic Web Services InterfacesTiago Cordeiro Marques, Marcio Gurjao Mesquita, Julio Cesar Campos Neto, Pedro Porfirio Muniz Farias. 847-852
- Failure Prediction Based Self-healing Approach for Web Service CompositionYu Dai, Lei Yang, Bin Zhang, Kening Gao. 853-856
- A Wed-based data Management and Analysis System for CO2 CaptureYuxiang Wu, Christine W. Chan. 857-860
- Integrating Random Testing with Constraints for Improved Efficiency and DiversityYoonsik Cheon, Antonio Cortes, Gary T. Leavens, Martine Ceberio. 861-866
- Properties of Machine Learning Applications for Use in Metamorphic TestingChristian Murphy, Gail E. Kaiser, Lifeng Hu, Leon Wu. 867-872
- Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based TechniquesJonathan Hittle, Sudipto Ghosh. 873-876
- Evaluation of Personalized Information Systems: Application in Intelligent Transport SystemM. Soui, Christophe Kolski, Mourad Abed, G. Uster. 877-880
- A Constraint Model for Automated Deployment of Automotive Control SoftwareMihai Nica, Bernhard Peischl, Franz Wotawa. 899-904
- Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State DiagramsZaid Altahat, Tzilla Elrad, Luay Tahat. 905-911
- Model Comparison: a Strategy-Based ApproachKleinner S. F. Oliveira, Toacy Cavalcante de Oliveira. 912-917
- Towards Metrics for Ontology BalanceSteffen Mencke, Martin Kunz, Reiner R. Dumke. 918-922
- Techniques for De-fragmenting Mobile Applications: A TaxonomyDamith C. Rajapakse. 923-928
- Identifying NFRs Conflicts Using Quality OntologyTaiseera Hazeem Al Balushi, Pedro R. Falcone Sampaio, Mitul Patel, Óscar Corcho, Pericles Loucopoulos. 929-934
- Ontology-based Process Modeling and Execution Using STEP/EXPRESSArndt Mühlenfeld, Wolfgang Mayer, Franz Maier, Markus Stumptner. 935-940