default search action
ACM SIGSOFT Software Engineering Notes, Volume 37
Volume 37, Number 1, January 2012
- Larry Bernstein:
Cross avoid shelf-ware by making your systems easy-to-use. 8-9 - Michael Wing:
Food for thought. 9-10 - Mark A. Ardis, Peter B. Henderson:
Software engineering education (SEEd). 10-11 - Mark Doernhoefer:
Surfing the net for software engineering notes. 12-20 - Peter G. Neumann:
Risks to the Public. 21-26
- Jonathan L. Krein, Charles D. Knutson, Lutz Prechelt, Natalia Juristo Juzgado:
Report from the 2nd international workshop on replication in empirical software engineering research (RESER 2011). 27-30 - Ansuman Banerjee, Sayak Ray, Pallab Dasgupta, P. P. Chakrabarti, S. Ramesh, P. Vignesh V. Ganesan:
A dynamic assertion-based verification platform for validation of UML designs. 1-14 - Hewijin Christine Jiau, Feng-Pu Yang:
Facing up to the inequality of crowdsourced API documentation. 1-9 - Kalpana Johari, Arvinder Kaur:
Validation of object oriented metrics using open source software system: an empirical study. 1-4 - Vallidevi Krishnamurthy, Chitra Babu:
Pattern based adaptation for service oriented applications. 1-6 - Pradeep Kumar, Yogesh Singh:
Assessment of software testing time using soft computing techniques. 1-6 - Rajni Mohana, Deepak Dahiya:
Approach and impact of a protocol for selection of service in web service platform. 1-6 - Bruno F. L. Santos, Hendrik T. Macedo:
Improving CUDA™ C/C++ encoding readability to foster parallel application development. 1-5 - Ashish Sharma, Dharmender Singh Kushwaha:
Applying requirement based complexity for the estimation of software development and testing effort. 1-11 - Vinay Singh, Vandana Bhattacherjee, Sandeep Bhattacharjee:
An analysis of dependency of coupling on software defects. 1-6 - Bedir Tekinerdogan, Semih Cetin, Muhammad Ali Babar, Patricia Lago, Juho Mäkiö:
Architecting in global software engineering. 1-7 - Daniel Varona, Luiz Fernando Capretz, Yadenis Piñero, Arif Raza:
Evolution of software engineers' personality profile. 1-5
- Greg Cooper:
DTrace: dynamic tracing in oracle Solaris, Mac OS X, and free BSD by Brendan Gregg and Jim Mauro. 34 - Robert L. Glass:
Managing projects in trouble: achieving turnaround and success by Ralph L. Kliem. 34 - Georgios Gousios:
Scalability rules 50 principles for scaling web sites by Martin L. Abbott and Michael T. Fisher. 35 - Vasile G. Teodorovici:
The eclipse graphical editing framework (GEF) by D. Rubel, J. Wren, and E. Clayberg. 35 - Vasile G. Teodorovici:
Continuous testing with ruby, rails and JavaScript by Ben Rady and Rod Coffin. 36 - Matt Mendell:
A practical guide to Fedora and Red Hat enterprise Linux by Mark G. Sobell. 36 - Chris Hathhorn:
Engineering a compiler, second edition by Keith D. Cooper and Linda Torczon (Review). 36-37 - William Del Ra:
The book of ruby by Huw Collingbourne. 37 - Will Tracz:
A bug hunter's diary: a guided tour through the wilds of software security by Tobias Klein. 37-38
Volume 37, Number 2, March 2012
- Larry Bernstein:
Pithy software engineering quotes. 6-7 - Robert Schaefer:
The secret life of academic papers. 7-8 - Mark A. Ardis, Peter B. Henderson:
Software Engineering Education (SEEd). 8-10 - Mark Doernhoefer:
Surfing the net for software engineering notes. 11-20 - Peter G. Neumann:
Risks to the public. 21-29
- Bedir Tekinerdogan:
Reflection on Turkish aspect-oriented software development workshop series. 30-33 - Robert J. Eisenberg:
A threshold based approach to technical debt. 1-6 - Vibha Gaur, Anuja Soni:
Analytical inference model for prediction and customization of inter-agent dependency requirements. 1-11 - S. Harikrishnan, Rajeev Kumar:
Space efficient non-constant time multi-method dispatch in object oriented systems. 1-6 - Suhel Ahmad Khan, Raees Ahmad Khan:
Integrity quantification model for object oriented design. 1-3 - Dipankar Majumdar, Swapan Bhattacharya:
Interoperability of constrained finite state automata. 1-8 - Krishna Raj P. M., Srinivasa K. G.:
Empirical studies of global volunteer collaboration in the development of free and open source software: analysis of six top ranked projects in sourceforge.net. 1-11 - Satwinder Singh, Karanjeet Singh Kahlon:
Effectiveness of refactoring metrics model to identify smelly and error prone classes in open source software. 1-11
- William Del Ra III:
Software systems architecture: second edition by Nick Rozanski and Eoin Woods. 36 - Robert J. Eisenberg:
Managing software debt building for inevitable change by Chris Sterling. 36-37 - Terry Ngo:
Essential app engine: building high-performance Java apps with Google app engine by Adriaan de Jonge. 37 - Vasile G. Teodorovici:
Work item management with IBM rational ClearQuest and Jazz: a customization guide by Shmuel Bashan and David E. Bellagio. 37-38
Volume 37, Number 3, May 2012
- Mike Wing:
Thank You. 7-8 - Mark A. Ardis, Peter B. Henderson:
Software engineering education (SEEd). 8-9 - Mark Doernhoefer:
Surfing the net for software engineering notes. 10-17 - Peter G. Neumann:
Risks to the public. 18-25
- Rakesh Shukla, Ashish Sureka, Rushikesh K. Joshi, Rajib Mall:
A report on software engineering education workshop. 26-31 - Steve Counsell, Stephen Swift:
Issues arising from refactoring studies: an experience report. 1-5 - Vallabh Anwikar, Ravindra Naik, Adnan Contractor, Hemanth Makkapati:
Domain-driven technique for functionality identification in source code. 1-8 - Manisha Tiwari, Padmaja Joshi:
Method cohesion analysis through concept lattices. 1-4 - Oscar Nierstrasz:
Agile software assessment with Moose. 1-5 - Deepak Arora, Bramah Hazela, Vipin Saxena:
Semantics for UML model transformation and generation of regular grammar. 1-5 - Tirimula Rao Benala, Satchidananda Dehuri, Rajib Mall:
Computational intelligence in software cost estimation: an emerging paradigm. 1-7 - Preeti Gulia, R. S. Chillar:
A new approach to generate and optimize test cases for UML state diagram using genetic algorithm. 1-5 - Daya Gupta, Rinky Dwivedi:
Method configuration from situational method engineering. 1-11 - Kawal Jeet, Renu Dhir, Harsh Kumar Verma:
A comparative study of bayesian and fuzzy approach to assess and predict maintainability of the software using activity-based quality model. 1-9 - Shujuan Jiang, Yanmei Zhang, Dandan Yi:
Test data generation approach for basis path coverage. 1-7 - Surender Kumar, Rajeev Kumar:
Precise static analysis for generic programs in object oriented languages. 1-6 - Priyanka Chawla, Inderveer Chana, Ajay Rana:
Empirical evaluation of cloud-based testing techniques: a systematic review. 1-9 - K. Sudheer Reddy, G. Partha Saradhi Varma, M. Kantha Reddy:
Discovering web usage patterns by using an innovative practical approach. 1-4 - K. Sudheer Reddy, G. Partha Saradhi Varma, I. Ramesh Babu:
Preprocessing the web server logs: an illustrative approach for effective usage mining. 1-5 - Shamim Ripon:
A unified tabular method for modeling variants of software product line. 1-7
- Scott Froberg:
software testing by Yogesh Singh. 36 - Robert Schaefer:
Fundamentals of multicore software development by Victor Pankratius, Ali-Reza Adi-Tabatabai, Walter Tichy. 37 - Harisankar Krishna Swamy:
Space based technologies and commercialized development: economic implications and benefits by Stella Tkatchova. 37-38 - William Del Ra III:
ACM ruby learning path by David A. Black. 38
Volume 37, Number 4, July 2012
- David Notkin:
TOSEM news. 7-8 - Larry Bernstein:
Software engineering design principles for ultra-large-scale systems. 8-9 - Robert Schaefer:
On having a second job as an adjunct. 9-10 - Mark Doernhoefer:
Surfing the net for software engineering notes. 11-19 - Peter G. Neumann:
Risks to the public. 20-29
- Andrea Herrmann, Maya Daneva, Jörg Dörr, Kurt Schneider:
2nd international workshop on creativity in requirements engineering: CreaRE 2012. 30-31 - Georg Herzwurm, Benedikt Krams, Wolfram Pietsch, Sixten Schockert:
Report from the 3rd international workshop on requirements prioritization for customer oriented software development: (RePriCo'12). 32-33 - J. Paul Gibson, Isabelle Perseil:
Introduction to UML and Formal Methods. 32-33 - Luciano Baresi, Angelo Morzenti, Alfredo Motta, Matteo Rossi:
A logic-based semantics for the verification of multi-diagram UML models. 1-8 - Kenro Yatake, Toshiaki Aoki:
SMT-based enumeration of object graphs from UML class diagrams. 1-8 - Étienne André, Christine Choppy, Kais Klai:
Formalizing non-concurrent UML state machines using colored petri nets. 1-8 - Jan Olaf Blech, Bernhard Schätz:
Towards a formal foundation of behavioral types for UML state-machines. 1-8 - Yoriyuki Yamagata, Weiqiang Kong, Akira Fukuda, Nguyen Van Tang, Hitoshi Ohsaki, Kenji Taguchi:
Formal semantics of extended hierarchical state transition matrix by CSP. 1-8 - Ning Ge, Marc Pantel, Xavier Crégut:
Time properties dedicated transformation from UML-MARTE activity to time transition system. 1-8 - Dan Li, Xiaoshan Li, Volker Stolz:
Model querying with graphical notation of QVT relations. 1-8 - Juliana Bowles, Dulani Apeksha Meedeniya:
Strongly consistent transformation of partial scenarios. 1-8 - Petra Brosch, Sebastian Gabmeyer, Gerti Kappel, Martina Seidl:
On formalizing EMF modeling operations with graph transformations. 1-8 - Jérémy Milhau, Frédéric Gervais, Régine Laleau, Marc Frappier:
Refinement patterns for ASTD. 1-8 - Oscar Carrillo, Samir Chouali, Hassan Mountassir:
Formalizing and verifying compatibility and consistency of SysML blocks. 1-8 - Bharath Cheluvaraju, Anjaneyulu Pasala, Srinivas Padmanabhuni, Sadhana Chevireddy:
A quantitative measure for preventive maintenance in software. 1-5 - Ajay Jain, Chandan Singh:
"Ad you like it": advertisement sourcing and selection technique across multiple heterogeneous applications. 1-6 - André Janus:
Towards a common agile software development model (ASDM). 1-8 - Kawal Jeet, Yadvirender Rana, Ruichi Xin:
A Bayesian network based approach for software reusability prediction. 1-5 - Deepika Kukreja, Umang Singh, B. V. R. Reddy:
Analytical models for trust based routing protocols in wireless ad hoc networks. 1-16 - Neeraj Kumar Sharma, Vibha Gaur, Sunil Kumar Muttoo:
A dynamic reputation system with built-in attack resilience to safeguard buyers in e-market. 1-19
- William Del Ra III:
Service design patterns: fundamental design solutions for SOAP/WSDL and RESTful web services by Robert Daigneau. 40 - Scott Froberg:
Programming perl, fourth edition by Tom Christiansen, Brian D. Foy and Larry Wall with Jon Orwant. 40 - Vasile G. Teodorovici:
Theory of conditional games by Wynn C. Stirling. 41
Volume 37, Number 5, September 2012
- Larry Bernstein:
Managing computer suppliers. 12-13 - Mark Grechanik:
The curse of database deadlocks: the problem with no good solution. 13-14 - Mark A. Ardis, Peter B. Henderson:
Software engineering education (SEEd): is software engineering ready for MOOCs? 14 - Mark Doernhoefer:
Surfing the net for software engineering notes. 17-26 - Peter G. Neumann:
Risks to the public. 27-33
- Rachel Harrison, Daniela Carneiro da Cruz, Pedro Rangel Henriques, Maria João Varanda Pereira, Shih-Hsi Liu, Tim Menzies, Marjan Mernik, Daniel Rodríguez:
Report from the first international workshop on realizing artificial intelligence synergies in software engineering (RAISE 2012). 34-35 - Philippe Kruchten, Robert L. Nord, Ipek Ozkaya, Joost Visser:
Technical debt in software development: from metaphor to theory report on the third international workshop on managing technical debt. 36-38 - P. Arun Babu, Senthil Kumar Chandran, Nagarajan Murali, T. Jayakumar:
An intuitive approach to determine test adequacy in safety-critical software. 1-10 - Anup Kumar Bandyopadhyay:
Application of TLRO to refute an incorrect mutual exclusion algorithm. 1-5 - Sanjay Kumar Dubey, Ajay Rana, Yajnaseni Dash:
Maintainability prediction of object-oriented software system by multilayer perceptron model. 1-4 - Ajay Jain:
Optimizing feature-access time through dynamic updates to application menu layout. 1-14 - Hemant K. Jain, Anjana Gosain:
A comprehensive study of view maintenance approaches in data warehousing evolution. 1-8 - Panos Louridas, Georgios Gousios:
A note on rigour and replicability. 1-4 - Manish Mahajan, Sumit Kumar, Rabins Porwal:
Applying genetic algorithm to increase the efficiency of a data flow-based test data generation approach. 1-5 - Sanjeev Patwa, Anil Kumar Malviya:
Reusability metrics and effect of reusability on testing of object oriented systems. 1-4 - Ekbal Rashid, Srikanta Patnaik, Vandana Bhattacherjee:
A survey in the area of machine learning and its application for software quality prediction. 1-7 - Alexander B. Romanovsky:
Deployment of formal methods in industry: the legacy of the FP7 ICT DEPLOY integrated project. 1-4 - Lakshmi Priya Sekar, Vinitha Reddy Gankidi, Subramanian Selvakumar:
Avoidance of security breach through selective permissions in android operating system. 1-9 - Mahesh Shirole, Rajeev Kumar:
Testing for concurrency in UML diagrams. 1-8 - A. D. Solomon:
On a new masters level program in software engineering. 1-3 - Ye-Chi Wu, Hewijin Christine Jiau:
A monitoring mechanism to support agility in service-based application evolution. 1-10
- Veit Jahns:
Principles of data integration by Anhai Doan, Alon Halevy, Zachary Ives. 43 - Richard St. Pierre:
The UX book, process and guidelines for ensuring a quality user experience by Rex Hartson and Pardha S. Pyla. 43-44 - Kwee Heong Tan:
How Google tests software by James A. Whittaker, Jason Arbon and Jeff Carollo. 44-45 - Holger M. Kienle:
Personal data privacy and protection in a surveillance era: technologies and practices by Christina Akrivopoulou and Athanasios Psygkas. 45-46
Volume 37, Number 6, November 2012
- Larry Bernstein:
Things I learned from taming software development. 5-6 - Mark Grechanik:
Random benchmark application generation for evaluating program analysis and testing tools. 6-7 - Robert Schaefer:
Limitations of web design. 7-8 - Mark A. Ardis, Peter B. Henderson:
Software engineering education (SEEd). 8-9 - Mark Doernhoefer:
Surfing the net for software engineering notes. 10-18 - Peter G. Neumann:
Risks to the public. 19-23
- Diego Garbervetsky, Sunghun Kim:
Report from 2nd international workshop on developing tools as plug-ins (TOPI 2012). 24-27 - Jonathan Bell, Kendra M. L. Cooper, Gail E. Kaiser, Swapneel Sheth:
Report from the second international workshop on games and software engineering (GAS 2012). 26-27 - Stefan Gruner, Bernhard Rumpe:
FormSERA workshop on formal methods in software engineering rigorous and agile approaches: 2nd of june 2012 at ICSE'2012 in Zürich (CH). 28-30 - Bedir Tekinerdogan:
First turkish software product line engineering workshop summary. 30-34 - Regina Thienne Colombo, Marcelo Schneck de Paula Pessôa, Ana Cervigni Guerra, Amândio Balcão Filho, Célio Caruso Gomes:
Prioritization of software security intangible attributes. 1-7 - Klaus Lochmann:
A benchmarking-inspired approach to determine threshold values for metrics. 1-8 - Ivan do Carmo Machado, John D. McGregor, Eduardo Santana de Almeida:
Strategies for testing products in software product lines. 1-8 - Birgit Hofer, Franz Wotawa, Rui Abreu:
AI for the win: improving spectrum-based fault localization. 1-8 - Andrew Meneely, Oluyinka Williams:
Interactive churn metrics: socio-technical variants of code churn. 1-6 - Bora Caglayan, Ayse Bener:
Issue ownership activity in two large software projects. 1-7 - Quoc-Sang Phan, Pasquale Malacaria, Oksana Tkachuk, Corina S. Pasareanu:
Symbolic quantitative information flow. 1-5 - Yufeng Zhang, Zhenbang Chen, Ji Wang:
S2PF: speculative symbolic PathFinder. 1-5 - Laura Panizo, María-del-Mar Gallardo:
An extension of Java PathFinder for hybrid systems. 1-5 - Artem Khyzha, Pavel Parízek, Corina S. Pasareanu:
Abstract pathfinder. 1-5 - Frank Rimlinger:
Test generation via symbolic simulation. 1-5 - Matteo Ceccarello, Nastaran Shafiei:
Tools to generate and check consistency of model classes for Java PathFinder. 1-5 - Heila van der Merwe, Brink van der Merwe, Willem Visser:
Verifying android applications using Java PathFinder. 1-5 - Nariman Mirzaei, Sam Malek, Corina S. Pasareanu, Naeem Esfahani, Riyadh Mahmood:
Testing android apps through symbolic execution. 1-5 - Diego Funes, Junaid Haroon Siddiqui, Sarfraz Khurshid:
Ranged Model Checking. 1-5 - Nastaran Shafiei, Peter C. Mehlitz:
Modeling class loaders in Java PathFinder version 7. 1-5 - Eric Mercer, Suzette Person, Neha Rungta:
Computing and visualizing the impact of change with Java PathFinder extensions. 1-5 - Jayeeta Chanda, Sabnam Sengupta, Ananya Kanjilal, Swapan Bhattacharya:
Traceability between service component and class: a model based approach. 1-5 - Ahmed El-Deeb:
A view on the state of software engineering practice: experience from Egypt. 1-4 - Noopur Goel, Manjari Gupta:
Empirical evaluation of the effect of flexibility upon testability of framework based application. 1-6 - Ajay Jain, Ravi Jain:
Method for self-destruction of digital files triggered under predefined constraints. 1-7 - Parminder Kaur, Hardeep Singh:
A modified version control tool for component-based systems. 1-10 - Janardan Misra, K. M. Annervaz, Vikrant S. Kaulgud, Shubhashis Sengupta, Gary Titus:
Java source-code clustering: unifying syntactic and semantic features. 1-8 - Mrunalini Marlakunta, T. V. Suresh Kumar, K. Rajani Kanth:
Dynamic process model for identifying modified data using mobile agents in real time ETL processes. 1-9 - Siva Brahmasani, Subramanian Selvakumar, E. Sivasankar:
Prevention of XSS attacks using STCD: server side tagging and client side differentiation. 1-9 - Vineet Sharma, S. A. M. Rizvi, Arun Sharma:
Software licenses: a tool to control distribution of software. 1-4 - Meenakshi Sharma, Nasib Singh Gill, Sunil Sikka:
Survey of object-oriented metrics: focusing on validation and formal specification. 1-5 - Indu Singh, Manoj Kumar:
A proposed model for data warehouse user behaviour using intrusion detection system. 1-7 - Wenyuan Wang, Zheng Zhang:
Balanced partition scheme for distributed caching systems to solve load imbalance problems. 1-6
- Harisankar Krishna Swamy:
Structured parallel programming patterns for efficient computation by Michael McCool, Arch D. Robison and James Reinders. 43 - Srinivasan M:
Agile Analytics by Ken Collier. 43-44
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.