Abstract is missing.
- A proposal for the improvement of the technique of EVM utilizing the history of performance dataAdler Diniz de Souza, Ana Regina Cavalcanti da Rocha.
- The COIN Platform: Supporting the Marine Shipping Industrial SectorAchilleas Achilleos, Georgia M. Kapitsaki, George A. Sielis, George A. Papadopoulos.
- Checking Contracts for AOP using XPIDRsHenrique Rebêlo, Ricardo Massa Ferreira Lima, Alexandre Mota, César A. L. Oliveira, Márcio Ribeiro.
- On the Naturalness of SoftwarePrem Devanbu.
- Sparse Linear Influence Model for Hot User Selection on Mining a Social NetworkYingze Wang, Guang Xiang, Shi-Kuo Chang. 1-6
- Mining Call Graph for Change Impact AnalysisQiandong Zhang, Bixin Li, Xiaobing Sun. 7-12
- A Mobile Application for Stock Market Prediction Using Sentiment AnalysisKushal Jangid, Pratik Paul, Magdalini Eirinaki. 13-18
- Using Semantic Relatedness and Locality for Requirements Elicitation GuidanceStefan Farfeleder, Thomas Moser, Andreas Krall. 19-24
- Phases, Activities, and Techniques for a Requirements Conceptualization ProcessAlejandro Hossian, Ramón García-Martínez. 25-32
- Using Empirical Studies to Evaluate the REMO Requirement Elicitation TechniqueSérgio Roberto Costa Vieira, Davi Viana, Rogério do Nascimento, Tayana Conte. 33-38
- Consistency Checks of System Properties Using LTL and Büchi AutomataSalamah Salamah, Matthew Engskow, Omar Ochoa. 39-44
- Evaluating the Cost-Effectiveness of Inspecting the Requirement Documents: An Empirical StudyNarendar Mandala, Gursimran Singh Walia. 45-50
- Requirement Analysis and Automated Verification: A Semantic ApproachAnimesh Dutta, Prajna Devi Upadhyay, Sudipta Acharya. 51-54
- Risk-driven Non-functional Requirement Analysis and SpecificationYi Liu, Zhiyi Ma, Hui Liu, Weizhong Shao. 55-60
- Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based ApproachXiaohong Chen, Jing Liu. 61-65
- An Overview of the RSLingo ApproachDavid de Almeida Ferreira, Alberto Rodrigues da Silva. 66-69
- Detecting Emergent Behavior in Distributed Systems Caused by OvergeneralizationSeyedehmehrnaz Mireslami, Mohammad Moshirpour, Behrouz H. Far. 70-73
- Stability of Filter-Based Feature Selection Methods for Imbalanced Software Measurement DataKehan Gao, Taghi M. Khoshgoftaar, Amri Napolitano. 74-79
- Semantic Interfaces Discovery Serverlaura maria chaves, José Renato Villela Dantas, Bruno de Azevedo Muniz, Julio Cesar Campos Neto, Pedro Porfírio Muniz Farias. 80-87
- Cloud Application Resource Mapping and Scaling Based on Monitoring of QoS ConstraintsXabriel J. Collazo-Mojica, Seyed Masoud Sadjadi, Jorge Ejarque, Rosa M. Badia. 88-93
- An Empirical Study of Software Metric Selection Techniques for Defect PredictionHuanjing Wang, Taghi M. Khoshgoftaar, Randall Wald, Amri Napolitano. 94-99
- Progressive Clustering with Learned Seeds: An Event Categorization System for Power GridBoyi Xie, Rebecca J. Passonneau, Haimonti Dutta, Jing-Yeu Miaw, Axinia Radeva, Ashish Tomar, Cynthia Rudin. 100-105
- Multi-Objective Optimization of Fuzzy Neural Networks for Software ModelingKuwen Li, Marek Reformat, Witold Pedrycz, Jinfeng Yu. 106-111
- Generating Performance Test Scripts and Scenarios Based on Abstract Intermediate ModelsLeandro T. Costa, Ricardo M. Czekster, Flávio M. de Oliveira, Elder de M. Rodrigues, Maicon B. da Silveira, Avelino F. Zorzo. 112-117
- A Catalog of Patterns for Concept Lattice Interpretation in Software ReengineeringMuhammad Usman Bhatti, Nicolas Anquetil, Marianne Huchard, Stéphane Ducasse. 118-123
- Client-Side Rendering Mechanism: A Double-Edged Sword for Browser-Based Web ApplicationsHao Han, Yinxing Xue, Keizo Oyama. 124-130
- An Empirical Study on Improving Trust among GSD Teams Using KMRMamoona Humayun, Gang Cui. 131-134
- Modeling and Analysis of Switched Fuzzy SystemsZuohua Ding, Jiaying Ma. 135-138
- An Empirical Study on Recommendation Methods for Vertical B2C E-commerceChengfeng Hui, Jia Liu, Zhenyu Chen, Xingzhong Du, Weiyun Ma. 139-142
- Automated Approaches to Support Secondary Study Processes: a Systematic ReviewJefferson Seide Molléri, Fabiane Barreto Vavassori Benitti. 143-147
- Enforcing Contracts for Aspect-oriented programs with Annotations, Pointcuts and AdviceHenrique Rebêlo, Ricardo Massa Ferreira Lima, Alexandre Mota, Cesar A. L. Oliveira, Márcio Ribeiro. 148-153
- Towards More Generic Aspect-Oriented Programming: Rethinking the AOP Joinpoint ConceptJonathan Cook, Amjad Nusayr. 154-157
- Aspect-Orientation in the Development of Embedded Systems: A Systematic ReviewLeonardo Simas Duarte, Elisa Yumi Nakagawa. 158-161
- Evaluating Open Source Reverse Engineering Tools for Teaching Software EngineeringSwapna S. Gokhale, Thérèse Smith, Robert McCartney. 162-167
- Coordination Model to Support Visualization of Aspect-Oriented ProgramsÁlvaro F. d'Arce, Rogério Eduardo Garcia, Ronaldo Celso Messias Correia, Danilo Medeiros Eler. 168-173
- Improving Program Comprehension in Operating System Kernels with Execution Trace InformationElder Vicente, Geycy Dyany, Rivalino Matias, Marcelo de Almeida Maia. 174-179
- An Approach for Software Component Reusing Based on Ontological MappingShi-Kuo Chang, Francesco Colace, Massimo De Santo, Emilio Zegarra, YongJun Qie. 180-187
- Online Anomaly Detection for Components in OSGi-based Software Tao Wang, Wenbo Zhang, Jun Wei, Jianhua Zhang, Hua Zhong. 188-193
- An Exploratory Study of One-Use and Reusable Software Components Reghu Anguswamy, William B. Frakes. 194-219
- Choosing Licenses In Free Open Source SoftwareIoannis E. Foukarakis, Georgia M. Kapitsaki, Nikolaos D. Tselikas. 200-204
- A Unified Model for Server Usage and Operational Costs Based on User Profiles: An Industrial EvaluationJohannes Pelto-Piri, Peter Molin, Richard Torkar. 205-210
- A Model-centric Approach for the Integration of Software Analysis Methods Xiangping Chen, Jiaxi Chen, Zibin Zhao, Lingshuang Shao. 211-216
- CATESR: Change-aware Test Suite Reduction Based on Partial Coverage of Test RequirementsLijiu Zhang, Xiang Chen, Qing Gu, Haigang Zhao, Xiaoyan Shi, Daoxu Chen. 217-224
- A Process Model for Human Resources Management Focused on Increasing the Quality of Software DevelopmentFlávio E. A. Horita, Jacques Duilio Brancher, Rodolfo Miranda de Barros. 225-230
- Verification of Cyber-Physical Systems Based on Differential-Algebraic Temporal Dynamic LogicXiaoxiang Zhai, Bixin Li, Min Zhu, Jiakai Li, Qiaoqiao Chen, Shunhui Ji. 231-234
- HybridUML Based Verification of CPS Using Differential Dynamic LogicMin Zhu, Bixin Li, Jiakai Li, Qiaoqiao Chen, Xiaoxiang Zhai, Shunhui Ji. 235-238
- A HybridUML and QdL Based Verification Method for CPS Self-AdaptabilityJiakai Li, Bixin Li, Qiaoqiao Chen, Min Zhu, Shunhui Ji, Xiaoxiang Zhai. 239-242
- Disabling Subsumptions in a Logic-Based ComponentÉric Grégoire, Sébastien Ramon. 243-248
- i2Learning: Perpetual Learning through Bias ShiftingDu Zhang. 249-255
- Evolutionary Learning and Fuzzy Logic Applied to a Load BalancerFrancisco Calaça Xavier, Max Gontijo de Oliveira, Cedric Luiz de Carvalho. 256-260
- Using Social Networks for Learning New Concepts in Multi-Agent SystemsShimaa M. El-Sherif, Behrouz Homayoun Far, Armin Eberlein. 261-266
- Identifying Coincidental Correctness for Fault Localization by Clustering Test CasesYi Miao, Zhenyu Chen, Sihan Li, Zhihong Zhao, Yuming Zhou. 267-272
- Regression Testing Prioritization Based on Fuzzy Inference SystemsPedro Santos Neto, Ricardo Britto, Thiago Soares, Werney Ayala, Jonathas Cruz, Ricardo Rabelo. 273-278
- Parallel Path Execution for Software Testing Over Automated Test CloudWei Liu, Xiaoqiang Liu, Feng Li, Yulong Gu, Lizhi Cai, Genxing Yang, Zhenyu Liu. 279-282
- An Empirical Study of Execution-Data Classification Based on Machine LearningDan Hao, Xingxia Wu, Lu Zhang 0023. 283-288
- Identification of Design Patterns Using Dependence AnalysisWentao Ma, Xiaoyu Zhou, Xiaofang Qi, Ju Qian, Lei Xu, Rui Yang. 289-292
- Slicing Concurrent Interprocedural Programs Based on Program Reachability GraphsXiaofang Qi, Xiaojing Xu, Peng Wang. 293-298
- A Usage-Based Unified Resource ModelYves Wautelet, Samedi Heng, Manuel Kolp. 299-304
- Petri Net Modeling of Application Server Performance for Web ServicesM. Rahmani, Azad H. Azadmanesh, Harvey P. Siy. 305-310
- Implementing Web Applications as Social Machines Composition: A Case StudyKellyton dos Santos Brito, Lenin Ernesto Abadie Otero, Patrícia Fontinele Muniz, Leandro Marques Nascimento, Vanilson André de Arruda Burégio, Vinicius Cardoso Garcia, Silvio Romero de Lemos Meira. 311-314
- Interactive Business Rules Framework for Knowledge Based Service Oriented ArchitectureDebashis Chanda, Dwijesh Dutta Majumder, Swapan Bhattacharya. 315-318
- Defining RESTful Web Services Test Cases from UML ModelsAlexandre L. Correa, Thiago Silva-de-Souza, Eber Assis Schmitz, Antonio Juarez Alencar. 319-323
- A Model Introducing SOAs Quality Attributes DecompositionRiad Belkhatir, Mourad Oussalah, Arnaud Viguier. 324-327
- Software as a Service: UndoHernán Merlino, Oscar Dieste, Patricia Pesado, Ramón García-Martínez. 328-332
- A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information StorageDaniel F. Fitch, Haiping Xu. 333-339
- Decidability of Minimal Supports of S-invariants and the Computation of their Supported S-invariants of Petri NetsFaming Lu, Qingtian Zeng, Hao Zhang, Yunxia Bao, Jiufang An. 340-345
- Automated Generation of Concurrent Test Code from Function NetsDianxiang Xu, Janghwan Tae. 346-351
- SAMAT - A Tool for Software Architecture Modeling and AnalysisSu Liu, Reng Zeng, Zhuo Sun, Xudong He. 352-358
- Singular Formulas for Compound Siphons, Complementary Siphons and Characteristic Vectors for Deadlock Prevention in Cloud ComputingGaiYun Liu, D. Y. Chao, Yao-Nan Lien. 359-362
- Model-Based Metamorphic Testing: A Case StudyJunhua Ding, Dianxiang Xu. 363-368
- Verifying Aspect-Oriented Activity Diagrams Against Crosscutting Properties with Petri Net AnalyzerZhanqi Cui, Linzhang Wang, Xi Liu, Lei Bu, Jianhua Zhao, Xuandong Li. 369-374
- Parametric Verification of TimeWorkflow NetsHanifa Boucheneb, Kamel Barkaoui. 375-380
- Resource Modeling and Analysis for Workflows: A Petri Net ApproachJiacun Wang, Demin Li. 381-386
- ACADA: Access Control-driven Architecture with Dynamic AdaptationÓscar Mortágua Pereira, Rui L. Aguiar, Maribel Yasmina Santos. 387-393
- Connectors for Secure Software Architectures Michael E. Shin, Bhavya Malhotra, Hassan Gomaa, TaegHyun Kang. 394-399
- How Social Network APIs Have Ended the Age of PrivacyDerek Doran, Sean Curley, Swapna S. Gokhale. 400-405
- Computer Forensics: Toward the Construction of Electronic Chain of Custody on the Semantic WebTamer Fares Gayed, Hakim Lounis, Moncef Bari. 406-411
- A Holistic Approach to Software TraceabilityHazeline U. Asuncion, Richard N. Taylor. 412-417
- Pointcut Design with AODL Saqib Iqbal, Gary Allen. 418-421
- Feature modeling and Verification based on Description LogicsGuohua Shen, Zhiqiu Huang, Changbao Tian, Qiang Ge, Wei Zhang. 422-425
- A Context Ontology Model for Pervasive Advertising: a Case Study on Pervasive DisplaysFrederico Bublitz, Hyggo Oliveira de Almeida, Angelo Perkusich. 426-431
- Ontology-based Representation of Simulation ModelsKatarina Grolinger, Miriam A. M. Capretz, José R. Marti, Krishan D. Srivastava. 432-437
- An Ontology-based Approach for Storing XML Data Into Relational DatabasesFrancisco Tiago Machado de Avelar, Deise de Brum Saccol, Eduardo Kessler Piveta. 438-443
- Automatic Generation of Architectural Models From Goals ModelsMonique Soares, João Pimentel, Jaelson Castro, Carla T. L. L. Silva, Cleice Talitha, Gabriela Guedes, Diego Dermeval. 444-447
- Towards Architectural Evolution through Model TransformationsJoão Pimentel, Emanuel Santos, Diego Dermeval, Jaelson Castro, Anthony Finkelstein. 448-451
- Using FCA-based Change Impact Analysis for Regression TestingXiaobing Sun, Bixin Li, Chuanqi Tao, Qiandong Zhang. 452-457
- Forecasting Fault Events in Power Distribution Grids Using Machine LearningAldo Dagnino, Karen Smiley, Lakshmi Ramachandran. 458-463
- Testing Interoperability Security PoliciesMazen El Maarabani, César Andrés, Ana R. Cavalli. 464-469
- A New Approach to Evaluate Path Feasibility and Coverage Ratio of EFSM Based on Multi-objective OptimizationRui Yang, Zhenyu Chen, Baowen Xu, Zhiyi Zhang, Wujie Zhou. 470-475
- Structural Testing for Multithreaded Programs: An Experimental Evaluation of the Cost, Strength and EffectivenessSilvana M. Melo, Simone do Rocio Senger de Souza, Paulo Sergio Lopes de Souza. 476-479
- Towards a Unified Source Code Measurement Framework Supporting Multiple Programming LanguagesReisha Humaira, Kazunori Sakamoto, Akira Ohashi, Hironori Washizaki, Yoshiaki Fukazawa. 480-485
- A Tiny Specification MetalanguageWalter W. Wilson, Yu Lei. 486-490
- SciprovMiner: Provenance Capture Using the OPM ModelTatiane O. M. Alves, Wander Gaspar, Regina M. M. Braga, Marco Antonio Machado, Wagner Arbex. 491-494
- Engineering Graphical Domain Specific Languages to Develop Embedded Robot ApplicationsDaniel B. F. Conrado, Valter Vieira de Camargo. 495-498
- Dynamically recommending design patternsS. Smith, D. R. Plante. 499-504
- Towards a Novel Semantic Approach for Process Patterns' Capitalization and ReuseNahla Jlaiel, Mohamed Ben Ahmed. 505-510
- DC2AP: A Dublin Core Application Profile to Analysis PatternsLucas Francisco da Matta Vegi, Jugurta Lisboa Filho, Glauber Luis da Silva Costa, Alcione de Paiva Oliveira, José Luís Braga. 511-516
- Bridging KDM and ASTM for Model-Driven Software ModernizationGaëtan Deltombe, Olivier Le Goaer, Franck Barbier. 517-524
- Modal ZIA, Modal Refinement Relation and Logical CharacterizationZining Cao. 525-530
- Towards Autonomic Business Process ModelsKarolyne Oliveira, Jaelson Castro, Sergio España, Oscar Pastor. 531-536
- Interoperable EMR Message Generation: A Model-Driven Software Product Line Approach Deepa Raka, Shih-Hsi Liu, Marjan Mernik. 537-540
- A Data Collaboration Model for Collaborative Design Based on C-NetXin Gao, Wenhui Hu, Wei Ye, Shikun Zhang, Xuan Sun. 541-544
- Working and Playing with SCRUMErick Baptista Passos, Danilo Medeiros, Wandresson Araújo, Pedro Santos Neto. 545-550
- Follow-the-Sun Software Development: A Controlled Experiment to Evaluate the Benefits of Adaptive and Prescriptive ApproachesJosiane Kroll, Alan R. Santos, Rafael Prikladnicki, Estevão Ricardo Hess, Rafael A. Glanzner, Afonso Sales, Jorge Luis Nicolas Audy, Paulo Henrique Lemelle Fernandes. 551-556
- Software Process Monitoring Using Statistical Process Control Integrated in Workflow SystemsMarília Aranha Freire, Daniel Alencar da Costa, Eduardo Aranha, Uirá Kulesza. 557-562
- Model Transformation for Frameworks Using Logical PlanningGuilherme A. Marchetti, Edson S. Gomi. 563-569
- Investigating the Use of Bayesian Networks as a Support Tool for Monitoring Software ProjectsFábio Pittoli, Abraham L. R. de Sousa, Daltro J. Nunes. 570-573
- Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language ProcessingAdriano Albuquerque, Vládia Pinheiro, Thiago Leite. 574-577
- Specification of Safety Critical Systems with Intelligent Software Agent MethodVinitha Hannah Subburaj, Joseph E. Urban, Manan R. Shah. 578-581
- Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web ApplicationsLuis Rivero, Tayana Conte. 582-587
- Improving a Web Usability Inspection Technique through an Observational StudyPriscila Fernandes, Tayana Conte, Bruno Bonifácio. 588-593
- Identification Guidelines for the Design of Interfaces in the context of ECAs and ADHDSandra Rodrigues Sarro Boarati, Cecilia Sosa Arias Peixoto. 594-598
- Measuring the Effect Of Usability Mechanisms On User Efficiency, Effectiveness and SatisfactionMarianella Aveledo, Diego M. Curtino, Agustín De la Rosa, Ana M. Moreno. 599-604
- Automatic Generation of Web Interfaces from User Interaction DiagramsFilipe Bianchi Damiani, Patricia Vilain. 605-610
- Semantic Technology Recommendation Based on the Analytic Network ProcessFilip Radulovic, Raul Garcia-Castro. 611-616
- P2P-based Publication and Location of Web Ontology for Knowledge Sharing in Virtual CommunitiesHuayou Si, Zhong Chen, Yong Deng. 617-621
- Empirical Validation of Variability-based Complexity Metrics for Software Product Line ArchitectureEdson Alves de Oliveira Junior, Itana Maria de Souza Gimenes, José Carlos Maldonado. 622-627
- A Mapping Study on Software Product Lines Testing ToolsCrescencio Rodrigues Lima Neto, Paulo Anselmo da Mota Silveira Neto, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira. 628-634
- Optimal Variability Selection in Product Line EngineeringRafael Pinto Medeiros, Uéverton dos Santos Souza, Fábio Protti, Leonardo Gresta Paulino Murta. 635-640
- Synthesizing Evidence on Risk Management: A Narrative Synthesis of two Mapping StudiesLuanna Lopes Lobato, Ivan do Carmo Machado, Paulo Anselmo da Mota Silveira Neto, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira. 641-646
- PlugSPL: An Automated Environment for Supporting Plugin-based Software Product LinesElder de M. Rodrigues, Avelino F. Zorzo, Edson Alves de Oliveira Junior, Itana Maria de Souza Gimenes, José Carlos Maldonado, Anderson R. P. Domingues. 647-650
- GS2SPL: Goals and Scenarios to Software Product LinesGabriela Guedes, Carla T. L. L. Silva, Jaelson Castro, Monique Soares, Diego Dermeval, Cleice Souza. 651-656
- A Set of Inspection Techniques on Software Product Line ModelsRafael Cunha, Tayana Conte, Eduardo Santana de Almeida, José Carlos Maldonado. 657-662
- Non-functional Properties in Software Product Lines: A Taxonomy for ClassificationMahdi Noorian, Ebrahim Bagheri, Weichang Du. 663-667
- A Proposal of Reference Architecture for the Reconfigurable Software DevelopmentFrank José Affonso, Evandro Luis Linhari Rodrigues. 668-671
- A Variability Management Method for Software Configuration FilesHiroaki Tanizaki, Toshiaki Aoki, Takuya Katayama. 672-677
- Tool Support for Anomaly Detection in Scientific Sensor DataIrbis Gallegos, Ann Q. Gates. 678-683
- Reconfiguration of Robot Applications using Data Dependency and Impact AnalysisMichael E. Shin, TaegHyun Kang, Sunghoon Kim, Seungwook Jung, Myungchan Roh. 684-687
- Spacemaker: Practical Formal Synthesis of Tradeoff Spaces for Object-Relational MappingHamid Bagheri, Kevin J. Sullivan, Sang H. Son. 688-693
- A Formal Support for Incremental Behavior Specification In Agile DevelopmentAnne-lise Courbis, Thomas Lambolais, Hong-Viet Luong, Thanh-Liem Phan, Christelle Urtado, Sylvain Vauttier. 694-799
- A Process-Based Approach to Improving Knowledge Sharing in Software EngineeringSarah B. Lee, Kenneth Steward. 700-705
- Automatic Acquisition of isA Relationships from Web TablesNorah Alrayes, Wo-Shun Luk. 706-711
- A Light Weight Alternative for OLAPHugo Cordeiro, Jackson Casimiro, Erick Passos. 712-717
- A Tool for Visualization of a Knowledge ModelSimon Suigen Guo, Christine W. Chan, Qing Zhou. 718-723
- Rendering UML Activity Diagrams as a Domain Specific Language - ADLCharoensak Narkngam, Yachai Limpiyakorn. 724-729
- umlTUowl - A Both Generic and Vendor-specific Approach for UML to OWL TransformationAndreas Grünwald, Thomas Moser. 730-736
- A Framework for Class Diagram Retrieval Using Genetic AlgorithmHamza Onoruoiza Salami, Moataz A. Ahmed. 737-740
- Managing Linear Hash in a Closed Space Satoshi Narata, Takao Miura. 741-746
- CLAT: Collaborative Learning Adaptive TutorAlaeddin M. H. Alawawdeh, César Andrés, Luis Llana. 747-752
- A proposal for the improvement of the technique of Earned Value Management utilizing the history of performance dataAdler Diniz de Souza, Ana Regina Cavalcanti da Rocha. 753-758
- A Goal-Driven Method for Selecting Issues Used in Agent NegotiationYen-Chieh Huang, Alan Liu. 759-762
- Using Cell Phones for Mosquito Vector Surveillance and ControlS. Lozano-Fuentes, Sudipto Ghosh, James M. Bieman, D. Sadhu, L. Eisen, Fadi Wedyan, E. Hernandez-Garcia, J. Garcia-Rejon, D. Tep-Chel. 763-767
- Proactive Two Way Mobile Advertisement Using a Collaborative Client Server ArchitectureWeimin Ding, Xiao Su. 768-773