Abstract is missing.
- Quality Assurance in Model-Based Software Development: Challenges and OpportunitiesMichel R. V. Chaudron. 1-9 [doi]
- Quality Driven Software ArchitecturePeter Hruschka. 10-13 [doi]
- On the Benefit of Automated Static Analysis for Small and Medium-Sized Software EnterprisesMario Gleirscher, Dmitriy Golubitskiy, Maximilian Irlbeck, Stefan Wagner. 14-38 [doi]
- BIM: A Methodology to Transform Business Processes into Software SystemsFrancisco J. Duarte, Ricardo Jorge Machado, João M. Fernandes. 39-58 [doi]
- Mapping RUP Roles to Small Software Development TeamsPedro Borges, Paula Monteiro, Ricardo Jorge Machado. 59-70 [doi]
- Scaling Software Development Methods from Co-located to DistributedHarald Klein, Eric Knauss, Andreas Rausch. 71-83 [doi]
- Improving Open Source Software Process Quality Based on Defect Data MiningWikan Danar Sunindyo, Thomas Moser, Dietmar Winkler, Deepak Dhungana. 84-102 [doi]
- The Many Forms of Process Improvement - Results of an International SurveyTom McBride, Marion Lepmets. 103-120 [doi]
- Towards Efficient Component Performance Analysis in Component Based ArchitecturesNabila Salmi, Malika Ioualalen. 121-142 [doi]
- A Case Study on Software Risk Analysis in Medical Device DevelopmentChristin Lindholm, Jesper Pedersen Notander, Martin Höst. 143-158 [doi]
- Integrating Manual and Automatic Risk Assessment for Risk-Based TestingMichael Felderer, Christian Haisjackl, Ruth Breu, Johannes Motz. 159-180 [doi]
- Inspection and Test Process Integration Based on Explicit Test Prioritization StrategiesFrank Elberzhager, Alla Rosbach, Jürgen Münch, Robert Eschbach. 181-192 [doi]
- Towards a Security and Dependability Pattern Development Technique for Resource Constrained Embedded SystemsNicolas Desnos, Brahim Hamid, Christian Percebois, Damien Gouteux. 193-204 [doi]
- Modeling Ad-Hoc Collaboration for Automated Process SupportKomlan Akpédjé KEDJI, Bernard Coulette, Rédouane Lbath, Mahmoud Nassar. 205-216 [doi]
- Quality Needs Structure: Industrial Experiences in Systematically Defining Software Security RequirementsChristian Frühwirth, Richard Mordinyi. 217-229 [doi]