Abstract is missing.
- SPAACE: : Self-Properties for an Autonomous & Autonomic Computing EnvironmentRoy Sterritt, Michael G. Hinchey. 3-8
- Progressive Autonomy - An Incremental Agent-based ApproachWalt Truszkowski, Christopher Rouff, Sidney C. Bailin, Mike Rilee. 9-15
- Specification and Implementation of Autonomic Large-Scale System Behaviors Using Domain Specific Modeling Language ToolsShikha Ahuja, Shweta Shetty, Sandeep Neema, Di Yao, Steven Nordstrom, Ted Bapty. 16-22
- Experimenting with an Evolving Ground/Space-based Software Architecture to Enable Sensor WebsDan Mandl, Stuart Frye. 23-28
- A Model-Based Approach to Controlling the ST-5 Constellation Lights-Out Using the GMSEC Message Bus and SimulinkJason Stanley, Robert Shendock, Kenneth J. Witt, Dan Mandl. 29-35
- Autonomous and Autonomic SwarmsMichael G. Hinchey, James L. Rash, Walter Truszkowski, Christopher Rouff, Roy Sterritt. 36-44
- Performance Assessment of Architectural Options on Intelligent Distributed SystemsCarlos Juiz, Joachim Zottl, Günter Haring, Ramón Puigjaner. 45-51
- A Framework for Reuse and Parallelization of Large-Scale Scientific Simulation CodeManolo Sherrill, Roberto C. Mancini, Frederick C. Harris Jr., Sergiu M. Dascalu. 52-58
- A Software Architecture Intended to Design High Quality Groupware ApplicationsJosé Luis Garrido, Patricia Paderewski, María Luisa Rodríguez-Almendros, Miguel J. Hornos, Manuel Noguera. 59-65
- Self*- Properties in NASA MissionRoy Sterritt, Christopher Rouff, James L. Rash, Walter Truszkowski, Michael G. Hinchey. 66-72
- V-FIRE: Virtual Fire in Realistic EnvironmentsFrederick C. Harris Jr., Michael Penick, Grant Kelly, Juan C. Quiroz, Sergiu M. Dascalu, Brian T. Westphal. 73-79
- Scope Equivalence of Concurrent Systems Based on Bipartite Directed Acyclic GraphMasaki Murakami. 80-86
- Interface Descriptions for Enterprise ArchitectureAditya Garg, Rick Kazman. 87-93
- Detection of Anomalies in a Software Architectural Style with Connectors: Position PaperMichael Shin, Yan Xu. 94-100
- Specification and Performance Metrics for Parallel ProgramsBrian J. d Auriol, Juan Ulloa. 101-107
- Supporting the Development of Adaptable and Secure Software Systems: An NFR ApproachNary Subramanian, Lawrence Chung. 108-114
- Evaluating Off-The-Shelf Architectural ComponentsKendra Cooper, Lawrence Chung, Weimin Ma. 115-121
- Privacy Aware Identity Information Sharing ProtocolTaesung Kim, Jong-Hyuk Roh, Seung-Hyun Kim. 122-125
- Giving Feedback on MASCOTime Simulation ResultsPere P. Sancho, Carlos Juiz, Ramón Puigjaner. 126-134
- Using Semantic Metrics to Assess Consistency between Design and Implementation of SoftwareCara Stein. 135-141
- The Effect of Object-Oriented Data Structure Design and Implementation on Lifecycle Effort: A Case StudyJack K. Horner. 142-148
- Implementing Multiple Priorities in a Publish-Subscribe System for Netcentric ApplicationsMargaret M. McMahon. 149-153
- Applying Design Patterns in Distributing a Genetic Algorithm ApplicationNick Burns, Mike Bradley, Mei-Ling Liu. 154-160
- UML-based Beowulf Cluster Availability ModelingHertong Song, Chokchai Leangsuksun, Raja Nassar, Yudan Liu, Christian Engelmann, Stephen L. Scott. 161-167
- Meta-Model Search: Using XPath to Search Domain-Specific ModelsRajesh Sudarsan, Jeffrey G. Gray. 168-174
- UML 2.0 Consistency Rules IdentificationJean-Pierre Seuma Vidal, Hugues Malgouyres, Gilles Motet. 175-181
- Executable Visual Software Modeling - The ZOOM ApproachXiaoping Jia, Adam Steele, Lizhang Qin, Hongming Liu, Chris Jones. 182-188
- Metainterfaces Support Structural and Object-Oriented Software CompositionEnn Tyugu. 189-194
- A Survey of Software Reliability Models and an Application of the Bayesian Belief Networks ModelQiaolan Wan, Mansur H. Samadzadeh. 195-201
- Discrete Time Modelling In Software Reliability - A Unified ApproachNazar Sarhan, Omar Shatnawi. 202-208
- Novel Obfuscation Algorithms for Software SecuritySuma Venkatesh, Levent Ertaul. 209-215
- An Attack Packet Simulator for Performance Test of Information Security SystemsWooyoung Soh, Junsang Jeon, Younseo Jeong. 216-222
- Strengthening Software Integrity through Privacy and Security Requirements ModellingMatthew Nicolas Kreeger. 223-229
- Electronic Voting Systems Security Requirements EngineeringKevin Daimi, Clarence Wilson. 230-238
- GUI State-based Accessibility Control in Hierarchical State MachinesMingtian Ni, Stephen E. Reichenbach. 239-245
- Towards Arguing the Cost-effectiveness of Coloured Petri NetsJens Bæk Jørgensen. 246-252
- Graph Theory in the Control Flow Analysis of the Large Time Critical ApplicationsSergej Alekseev, Günther Stiege. 253-259
- Generation of OCL Constraints from B Abstract MachinesJean-Christophe Voisinet, Bruno Tatibouët, Isabelle Jacques. 260-266
- Verification of Workflow Authorization ReasonabilityOuyangyu Yu, Liu Yu-shu. 267-272
- On a GUI based Editor for the Z NotationHiroshi Ishikawa 0003. 273-282
- Pseudo-Random System Testing: Coverage Estimation and EnhancementAli Y. Duale, Theodore J. Bohizic, Dennis W. Wittig. 283-289
- A Complete Automation of Unit Testing for Java ProgramsYoonsik Cheon, Myoung Kim, Ashaveena Perumandla. 290-295
- Analysis of Open Source Defect Tracking Tools for Use in Defect EstimationDileep Potnuri, Catherine Stringfellow. 296-301
- A Low Budget Approach to Distributed Automated Black-Box TestingAndreas Boklund, Christer Selvefors. 302-308
- A Process Model for Development and Utilization of Reusable Test AssetsAnnukka Mäntyniemi, Pekka Mäki-Asiala, Matti Kärki. 309-315
- Meta-Modeling Approach to Tool Support for Model Transformation to Validate Dynamic Behavior of SystemsMichael Shin, Marta Calderón. 316-322
- GUI Test Case Generation from UMLYachai Limpiyakorn, Petnamkang Wongsuttipakorn. 323-329
- Using Architectural Modeling for Integration TestingHassan Reza, Emanuel S. Grant. 330-337
- Test Case Prioritization for GUI TestingYachai Limpiyakorn, Pisak Kurusathian. 338-346
- Modeling QoS through Architectural ReflectionFrancesca Arcelli Fontana, Claudia Raibulet, Francesco Tisato. 347-363
- Model Reuse in MDASalim Bouzitouna, Marie-Pierre Gervais, Xavier Blanc. 354-360
- A Transformation Approach for Modeling and Analysis of Complex UML Statecharts: A Case StudyZhaoxia Hu, Sol M. Shatz. 361-367
- Software Architecture Evolution: Description and Management ProcessNassima Sadou, Mourad Oussalah, Dalila Tamzalit. 368-374
- Maturity of the MDA Tool-assisted Development Process using Business Archetypes: a Case StudyEric Lefebvre, Blanca Gil. 375-381
- JfelX: A Dynamic Model Driven ArchitectureAbhiram Gandhe, Puneet Agarwal, Gautam Shroff. 382-388
- A Domain Composition ApproachJacky Estublier, Anca Daniela Ionita, Germán Vega. 389-395
- A New Approach to Combine Models and Code in Model Driven DevelopmentStefan Sarstedt, Jens Kohlmeyer, Alexander Raschke, Matthias Schneiderhan. 396-402
- Component + Aspect = an Extensible and Adaptable System SoftwarePaniti Netinant. 403-407
- Integration of Wrapper Preprocessor into C/C++ IDE for Implementing Reusable ComponentsWalter Fortner, Hisham Haddad. 408-416
- A Cultural Shift in Teaching CS Programming Courses and Improving Software QualityMohammed Gomaa, Akram Salah, Syed M. Rahman. 417-426
- The Views of Quality for the Requirements DocumentBernard Wong. 427-434
- Software Requirements Phase for a Resource Utilization and Scheduling ToolJayathi Raghavan, Massood Towhidnejad. 435-441
- Research on Software Requirement Analysis Method Based on Five-Key Elements ArrangeWei Fu, Guoqiang Cai, Limin Jia, Yangdong Ye, Ye Zhang. 442-447
- A Fuzzy Logic-based Approach for Requirements Elicitation Techniques SelectionYirsaw Ayalew, Semahegn Abebe. 448-456