Abstract is missing.
- Is security engineering really just good software engineering?Alexander L. Wolf. 1 [doi]
- Resolving uncertainties during trace analysisAlexander Egyed. 3-12 [doi]
- Automating comprehensive safety analysis of concurrent programs using verisoft and TXLJürgen Dingel, Hongzhi Liang. 13-22 [doi]
- Efficient incremental algorithms for dynamic detection of likely invariantsJeff H. Perkins, Michael D. Ernst. 23-32 [doi]
- System architecture: the context for scenario-based model synthesisSebastián Uchitel, Robert Chatley, Jeff Kramer, Jeff Magee. 33-42 [doi]
- Merging partial behavioural modelsSebastián Uchitel, Marsha Chechik. 43-52 [doi]
- Reasoning about partial goal satisfaction for requirements and design engineeringEmmanuel Letier, Axel van Lamsweerde. 53-62 [doi]
- PSE: explaining program failures via postmortem static analysisRoman Manevich, Manu Sridharan, Stephen Adams, Manuvir Das, Zhe Yang. 63-72 [doi]
- Explaining abstract counterexamplesSagar Chaki, Alex Groce, Ofer Strichman. 73-82 [doi]
- Correlation exploitation in error rankingTed Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R. Engler. 83-93 [doi]
- The usability problem for home appliances: engineers caused it, engineers can fix it!Joe Marks. 95 [doi]
- Testing static analysis tools using exploitable buffer overflows from open source codeMisha Zitser, Richard Lippmann, Tim Leek. 97-106 [doi]
- Engineering human trust in mobile system collaborationsLicia Capra. 107-116 [doi]
- An efficient and backwards-compatible transformation to ensure memory safety of C programsWei Xu, Daniel C. DuVarney, R. Sekar. 117-126 [doi]
- Variability management with feature-oriented programming and aspectsMira Mezini, Klaus Ostermann. 127-136 [doi]
- Verifying aspect advice modularlyShriram Krishnamurthi, Kathi Fisler, Michael Greenberg. 137-146 [doi]
- A classification system and analysis for aspect-oriented programsMartin C. Rinard, Alexandru Salcianu, Suhabe Bugrara. 147-158 [doi]
- Implementing protocols via declarative event patternsRobert J. Walker, Kevin Viggers. 159-169 [doi]
- Making embedded software reuse practical and safeNancy G. Leveson, Kathryn Anne Weiss. 171-178 [doi]
- Modular design and verification of component-based mechatronic systems with online-reconfigurationHolger Giese, Sven Burmester, Wilhelm Schäfer, Oliver Oberschelp. 179-188 [doi]
- A type system for object modelsJonathan Edwards, Daniel Jackson, Emina Torlak. 189-199 [doi]
- Heuristic-guided counterexample search in FLAVERSJianbin Tan, George S. Avrunin, Lori A. Clarke, Shlomo Zilberstein, Stefan Leue. 201-210 [doi]
- Relevancy based semantic interoperation of reuse repositoriesYing Pan, Lei Wang, Lu Zhang, Bing Xie, Fuqing Yang. 211-220 [doi]
- How a good software practice thwarts collaboration: the multiple roles of APIs in software developmentCleidson R. B. de Souza, David F. Redmiles, Li-Te Cheng, David R. Millen, John F. Patterson. 221-230 [doi]
- Refining code-design mapping with flow analysisXiaofang Zhang, Michal Young, John Howard Eli Fiskio-Lasseter. 231-240 [doi]
- Scaling regression testing to large software systemsAlessandro Orso, Nanjuan Shi, Mary Jean Harrold. 241-251 [doi]
- Using an SQL coverage measurement for testing database applicationsMaría José Suárez Cabal, Javier Tuya. 253-262 [doi]
- Empirical evaluation of defect projection models for widely-deployed production software systemsPaul Luo Li, Mary Shaw, James D. Herbsleb, Bonnie K. Ray, Peter Santhanam. 263-272 [doi]