Abstract is missing.
- Architectural Considerations for Decision Analysis SoftwareMats Danielson, Love Ekenberg. 3-14 [doi]
- A Computation Algorithm for the Configuration of BLE Devices Using k-Means MethodKensuke Onishi. 15-26 [doi]
- Towards a Software Product Industry ClassificationKarl Werder, Hua-Ying Wang. 27-37 [doi]
- New Approach to Multidisciplinary Content Driving of Engineering Model System Component GenerationLászló Horváth, Imre J. Rudas. 38-49 [doi]
- Analysis of Travelers' Intentions Using Photo and Check-In Data from Social Network ServicesJun Sasaki, Shizune Takahashi, Keizo Yamada, Masanori Takagi. 50-58 [doi]
- Decision-Making in Automotive Software Development - An Observational StudyEfi Papatheocharous, Ulrik Franke. 59-68 [doi]
- Enhanced Integration Support for Reliability PredictionThanh-Trung Pham, Alexander P. Vazhenin. 71-84 [doi]
- Test Automation for Speech-Based ApplicationsTobias Griebe, Marc Hesenius, Marc Gesthüsen, Volker Gruhn. 85-100 [doi]
- A Development Tool Chain for Reconfigurable WSNsHanen Grichi, Olfa Mosbahi, Mohamed Khalgui. 101-114 [doi]
- Software Engineering Artifact in Software Development Process - Linkage Between Issues and Code Review ProcessesDorealda Dalipaj, Jesús M. González-Barahona, Daniel Izquierdo-Cortazar. 115-122 [doi]
- Early Requirements Analysis for a Socio-Technical System Based on Goal DependenciesHaruhiko Kaiya, Shinpei Ogata, Shinpei Hayashi, Motoshi Saeki. 125-138 [doi]
- Binary Decision Diagram Algorithms to Perform Hard Analysis Operations on Variability ModelsRuben Heradio, Hector Perez-Morago, David Fernández-Amorós, Roberto Bean, Francisco Javier Cabrerizo, Carlos Cerrada, Enrique Herrera-Viedma. 139-154 [doi]
- Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging ModelsHaruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama. 155-166 [doi]
- Design and Control of Quad-Copter Using GPS and Inertial Sensors for Parcel DeliveryPrathamesh Pattar, Apurva Naik. 167-176 [doi]
- An Empirical Evaluation of Mobile Software Usability Using ISO 9126 and QoS DiffServ ModelKarima Moumane, Ali Idri, Khalid Nafil. 177-188 [doi]
- Length of Stay in Intensive Care Units - A Case Base EvaluationAna Silva, Henrique Vicente, António Abelha, Manuel Filipe Santos, José Machado 0001, João Neves, José Neves. 191-202 [doi]
- P300 Spelling and EEG Compressed Sensed Based on a Universal MegadictionaryMonica Fira, Victor-Andrei Maiorescu. 203-212 [doi]
- Cross-Tool Interoperability in Heterogeneous Application Lifecycle Management SystemsJozsef Klespitz, Miklós Biró, Levente Kovács. 213-220 [doi]
- A Runtime Middleware for Enabling Application Integration and Rapid Re-EngineeringMarios Komodromos, Christos Mettouris, Achilleas P. Achilleos, George A. Papadopoulos, Martin Deinhofer, Christoph Veigl, Alfred Doppler, Stefan Schurz. 221-232 [doi]
- Source Data and Bathymetry Editor in Tsunami Modeling EnvironmentKensaku Hayashi, Alexander Vazhenin, Andrey Marchuk. 235-245 [doi]
- Behavioral Verification of UML2.0/PoSM ComponentsTaoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech. 246-257 [doi]
- Web Services Orchestration's Monitor as a Web ServiceImene Hadded, Mahjoub Langar, Riadh Robbana. 258-269 [doi]
- Software for Engineering Representations in University CourseJózsef Gáti, Krisztina Nemethy, Aniko Szakal. 270-278 [doi]
- On Model Finding with Constraint PatternsDuc-Hanh Dang, Anh-Hoang Truong, Dang Van Hung. 279-290 [doi]
- A Secure Cloud-Based SCADA Application: The Use Case of a Water Supply NetworkGianfranco Cerullo, Giovanni Mazzeo, Gaetano Papale, Luigi Sgaglione, Rosario Cristaldi. 291-301 [doi]
- An Industrial Survey and Assessment on Free Mobile Testing ToolsHareton K. N. Leung, Kim Man Lui. 302-311 [doi]
- xGame: A Novel Approach for Developing Accessible Mobile GamesAly Moanes, Ahmed H. Ibrahim, Abdelrahman Hosny. 315-321 [doi]
- Implementation of a Wiki Development EnvironmentChristoph Hannebauer, Volker Gruhn. 322-332 [doi]
- Entailment Processing for Large RDF Data Sets Using GPUChantana Chantrapornchai, Chidchanok Choksuchat, Michael Haidl, Sergei Gorlatch. 333-345 [doi]
- Runtime Verification and Quality Assessment for Privacy Violations Detection in Social Networking SystemNajwa Abu Bakar, Ali Selamat. 346-357 [doi]
- A Deep Learning Approach for Searching Cloud-Hosted Software ProjectsGajo Petrovic, Vladimir Dimitrieski, Hamido Fujita. 358-368 [doi]