Abstract is missing.
- A design-centric view of the economy: abstractCarliss Baldwin. 1 [doi]
- Can developer-module networks predict failures?Martin Pinzger, Nachiappan Nagappan, Brendan Murphy. 2-12 [doi]
- Predicting failures with developer networks and social network analysisAndrew Meneely, Laurie Williams, Will Snipes, Jason Osborne. 13-23 [doi]
- Latent social structure in open source projectsChristian Bird, David S. Pattison, Raissa M. D Souza, Vladimir Filkov, Premkumar T. Devanbu. 24-35 [doi]
- Finding programming errors earlier by evaluating runtime monitors ahead-of-timeEric Bodden, Patrick Lam, Laurie J. Hendren. 36-47 [doi]
- Profile-guided program simplification for effective testing and analysisLingxiao Jiang, Zhendong Su. 48-58 [doi]
- A scalable technique for characterizing the usage of temporaries in framework-intensive Java applicationsBruno Dufour, Barbara G. Ryder, Gary Sevitsky. 59-70 [doi]
- An empirical study of the effect of time constraints on the cost-benefits of regression testingHyunsook Do, Siavash Mirarab, Ladan Tahvildari, Gregg Rothermel. 71-82 [doi]
- Deriving input syntactic structure from executionZhiqiang Lin, Xiangyu Zhang. 83-93 [doi]
- Inter-context control-flow and data-flow test adequacy criteria for nesC applicationsZhifeng Lai, Shing-Chi Cheung, Wing Kwon Chan. 94-104 [doi]
- The implications of method placement on API learnabilityJeffrey Stylos, Brad A. Myers. 105-112 [doi]
- Empirical evidence of the benefits of workspace awareness in software configuration managementAnita Sarma, David F. Redmiles, André van der Hoek. 113-123 [doi]
- Using assertions to help end-user programmers create dependable web macrosAndhy Koesnandar, Sebastian G. Elbaum, Gregg Rothermel, Lorin Hochstein, Christopher Scaffidi, Kathryn T. Stolee. 124-134 [doi]
- Randomized active atomicity violation detection in concurrent programsChang-Seo Park, Koushik Sen. 135-145 [doi]
- Generation of concurrency control code using discrete-event systems theoryChristopher Dragert, Jürgen Dingel, Karen Rudie. 146-157 [doi]
- Alchemy: transmuting base alloy specifications into implementationsShriram Krishnamurthi, Kathi Fisler, Daniel J. Dougherty, Daniel Yoo. 158-169 [doi]
- Efficient online monitoring of web-service SLAsFranco Raimondi, James Skene, Wolfgang Emmerich. 170-180 [doi]
- Automated identification of parameter mismatches in web applicationsWilliam G. J. Halfond, Alessandro Orso. 181-191 [doi]
- Modular verification of web services using efficient symbolic encoding and summarizationFang Yu, Chao Wang, Aarti Gupta, Tevfik Bultan. 192-202 [doi]
- Automatically locating framework extension examplesBarthélémy Dagenais, Harold Ossher. 203-213 [doi]
- Semi-automating small-scale source code reuse via structural correspondenceRylan Cottrell, Robert J. Walker, Jörg Denzinger. 214-225 [doi]
- Differential symbolic executionSuzette Person, Matthew B. Dwyer, Sebastian G. Elbaum, Corina S. Pasareanu. 226-237 [doi]
- Requirements engineering: from craft to disciplineAxel van Lamsweerde. 238-249 [doi]
- Effective blame for information-flow violationsDave King 0002, Trent Jaeger, Somesh Jha, Sanjit A. Seshia. 250-260 [doi]
- Model-based fault detection in context-aware adaptive applicationsMichele Sama, David S. Rosenblum, Zhimin Wang, Sebastian G. Elbaum. 261-271 [doi]
- Marple: a demand-driven path-sensitive buffer overflow detectorWei Le, Mary Lou Soffa. 272-282 [doi]
- Dev 2.0: model driven development in the cloudGautam Shroff. 283 [doi]
- ACM SIGSOFT impact paper award: reflections and prospectsDavid S. Rosenblum, Alexander L. Wolf. 284 [doi]
- Towards compositional synthesis of evolving systemsShiva Nejati, Mehrdad Sabetzadeh, Marsha Chechik, Sebastián Uchitel, Pamela Zave. 285-296 [doi]
- On correct and complete strong merging of partial behaviour modelsDario Fischbein, Sebastián Uchitel. 297-307 [doi]
- What makes a good bug report?Nicolas Bettenburg, Sascha Just, Adrian Schröter, Cathrin Weiss, Rahul Premraj, Thomas Zimmermann. 308-318 [doi]
- Experience in using a process language to define scientific workflow and generate dataset provenanceLeon J. Osterweil, Lori A. Clarke, Aaron M. Ellison, Rodion M. Podorozhny, Alexander E. Wise, Emery Boose, Julian L. Hadley. 319-329 [doi]
- ENNA: software effort estimation using ensemble of neural networks with associative memoryYigit Kultur, Burak Turhan, Ayse Basar Bener. 330-338 [doi]
- Javert: fully automatic mining of general temporal properties from dynamic tracesMark Gabel, Zhendong Su. 339-349 [doi]
- Doloto: code splitting for network-bound web 2.0 applicationsV. Benjamin Livshits, Emre Kiciman. 350-360 [doi]