default search action
Information & Software Technology, Volume 51
Volume 51, Number 1, January 2009
- Claes Wohlin:
Introduction to section most cited journal articles in Software Engineering. 1 - Claes Wohlin:
An analysis of the most cited articles in software engineering journals - 2002. 2-6 - Barbara A. Kitchenham, Pearl Brereton, David Budgen, Mark Turner, John Bailey, Stephen G. Linkman:
Systematic literature reviews in software engineering - A systematic literature review. 7-15 - Lionel C. Briand, Yvan Labiche, S. He:
Automating regression test selection based on UML designs. 16-30 - Jan Kofron, Frantisek Plásil, Ondrej Sery:
Modes in component behavior specification via EBP and their application in product lines. 31-41 - Marcos Dias de Assunção, Rajkumar Buyya:
Performance analysis of allocation policies for interGrid resource provisioning. 42-55 - Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend, Michael Stepp:
More on graph theoretic software watermarks: Implementation, analysis, and attacks. 56-67 - Robert L. Glass, Iris Vessey, Venkataraman Ramesh:
RESRES: The story behind the paper "Research in software engineering: An analysis of the literature". 68-70
- Vigdis By Kampenes, Tore Dybå, Jo Erskine Hannay, Dag I. K. Sjøberg:
A systematic review of quasi-experiments in software engineering. 71-82 - Li Qin, Vijayalakshmi Atluri:
Evaluating the validity of data instances against ontology evolution over the Semantic Web. 83-97 - Jan Chmiel, Tadeusz Morzy, Robert Wrembel:
Multiversion join index for multiversion data warehouse. 98-108 - Liang Xiao, Des Greer:
Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model-Driven Architecture. 109-137 - Marcelo Nassau Malta, Marco Túlio de Oliveira Valente:
Object-oriented transformations for extracting aspects. 138-149 - Finn Olav Bjørnson, Alf Inge Wang, Erik Arisholm:
Improving the effectiveness of root cause analysis in post mortem analysis: A controlled experiment. 150-161 - KeungSik Choi, Doo-Hwan Bae:
Dynamic project performance estimation by combining static estimation models with system dynamics. 162-172 - Li-Wei Chen, Sun-Jen Huang:
Accuracy and efficiency comparisons of single- and multi-cycled software classification models. 173-181 - Liang Huang, Mike Holcombe:
Empirical investigation towards the effectiveness of Test First programming. 182-194 - Sybren Deelstra, Marco Sinnema, Jan Bosch:
Variability assessment in software product families. 195-218 - Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson:
Models of motivation in software engineering. 219-233
Volume 51, Number 2, February 2009
- Panagiotis Katsaros:
A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach. 235-257 - Michiel Koning, Chang-Ai Sun, Marco Sinnema, Paris Avgeriou:
VxBPEL: Supporting variability for Web services in BPEL. 258-269 - Filippo Ricca, Marco Torchiano, Massimiliano Di Penta, Mariano Ceccato, Paolo Tonella:
Using acceptance tests as a support for clarifying requirements: A series of experiments. 270-283 - Ping Sun, Changjun Jiang:
Analysis of workflow dynamic changes based on Petri net. 284-292 - Alf Inge Wang, Erik Arisholm:
The effect of task order on the maintainability of object-oriented software. 293-305 - Amparo Navasa Martínez, Miguel Ángel Pérez Toledano, Juan Manuel Murillo:
An ADL dealing with aspects at software architecture stage. 306-324 - Costas Vassilakis, Giorgos Lepouras, Akrivi Katifori:
A heuristics-based approach to reverse engineering of electronic services. 325-336 - Paolo Guarda, Nicola Zannone:
Towards the development of privacy-aware systems. 337-350 - Ho-Won Jung, Dennis R. Goldenson:
Evaluating the relationship between process improvement and schedule deviation in software maintenance. 351-361 - Abdelghani Benharref, Rachida Dssouli, Mohamed Adel Serhani, Roch H. Glitho:
Efficient traces' collection mechanisms for passive testing of Web Services. 362-374 - Ching-Pao Chang, Chih-Ping Chu, Yu-Fang Yeh:
Integrating in-process software defect prediction with association mining to discover defect pattern. 375-384 - Wes Masri, Andy Podgurski:
Algorithms and tool support for dynamic information flow analysis. 385-404 - Gyun Woo, Heung Seok Chae, Jian Feng Cui, Jeong-Hoon Ji:
Revising cohesion measures by considering the impact of write interactions between class members. 405-417 - Monalisa Sarma, Rajib Mall:
Automatic generation of test specifications for coverage of system state transitions. 418-432 - Massimo Colosimo, Andrea De Lucia, Giuseppe Scanniello, Genoveffa Tortora:
Evaluating legacy system migration technologies through empirical studies. 433-447 - Gisèle Douta, Haydar Talib, Oscar Nierstrasz, Frank Langlotz:
CompAS: A new approach to commonality and variability analysis with applications in computer assisted orthopaedic surgery. 448-459 - Lihua Ran, Curtis E. Dyreson, Anneliese Amschler Andrews, Renée C. Bryce, Christopher J. Mallery:
Building test cases and oracles to automate the testing of web database applications. 460-477 - Aneesh Krishna, Sergiy A. Vilkomir, Aditya K. Ghose:
Consistency preserving co-evolution of formal specifications and agent-oriented conceptual models. 478-496 - Ilir Gashi, Peter T. Popov, Vladimir Stankovic:
Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach. 497-511 - Lionel C. Briand, Yvan Labiche, Tao Yue:
Automated traceability analysis for UML model refinements. 512-527 - Damjan Vavpotic, Marko Bajec:
An approach for concurrent evaluation of technical and social aspects of software development methodologies. 528-545 - Hui Liu, Hee Beng Kuan Tan:
Covering code behavior on input validation in functional testing. 546-553
Volume 51, Number 3, March 2009
- Anil S. Jadhav, Rajendra M. Sonar:
Evaluating and selecting software packages: A review. 555-563 - Pablo Moreno-Ger, Rubén Fuentes-Fernández, José Luis Sierra-Rodríguez, Baltasar Fernández-Manjón:
Model-checking for adventure videogames. 564-580 - Douwe Postmus, Jacob Wijngaard, Hans Wortmann:
An economic model to compare the profitability of pay-per-use and fixed-fee licensing. 581-588 - Stephen Thomas, Laurie A. Williams, Tao Xie:
On automated prepared statement generation to remove SQL injection vulnerabilities. 589-598 - Behshid Behkamal, Mohsen Kahani, Mohammad Kazem Akbari:
Customizing ISO 9126 quality model for evaluation of B2B applications. 599-609 - Kristian Bisgaard Lassen, Wil M. P. van der Aalst:
Complexity metrics for Workflow nets. 610-626 - Silvia Teresita Acuña, Marta Gómez, Natalia Juristo Juzgado:
How do personality, team processes and task characteristics relate to job satisfaction and software quality? 627-639 - Moataz A. Ahmed, Zeeshan Muzaffar:
Handling imprecision and uncertainty in software development effort prediction: A type-2 fuzzy logic based framework. 640-654 - LeMai Nguyen, Graeme G. Shanks:
A framework for understanding creativity in requirements engineering. 655-662 - Katja Karhu, Ossi Taipale, Kari Smolander:
Investigating the relationship between schedules and knowledge transfer in software testing. 663-677
Volume 51, Number 4, April 2009
- Jun-Wei Lin, Chin-Yu Huang:
Analysis of test suite reduction with enhanced tie-breaking techniques. 679-690 - Hyun-Goo Kang, Taisook Han:
A bottom-up pointer analysis using the update history. 691-707 - Raquel Blanco, Javier Tuya, Belarmino Adenso-Díaz:
Automated test data generation using a scatter search approach. 708-720 - Miroslaw Staron, Wilhelm Meding, Christer Nilsson:
A framework for developing measurement systems and its industrial evaluation. 721-737 - Stanislav Berlin, Tzvi Raz, Chanan Glezer, Moshe Zviran:
Comparison of estimation methods of cost and duration in IT projects. 738-748 - Pedro Valderas, Vicente Pelechano:
Introducing requirements traceability support in model-driven development of web applications. 749-768 - Esther Guerra, Juan de Lara, Alessio Malizia, Paloma Díaz:
Supporting user-oriented analysis for multi-view domain-specific visual languages. 769-784 - Helen M. Edwards, Sharon McDonald, S. Michelle Young:
The repertory grid technique: Its place in empirical software engineering research. 785-798 - R. Krishnamoorthi, S. A. Sahaaya Arul Mary:
Factor oriented requirement coverage based system test case prioritization of new and regression test cases. 799-808
Volume 51, Number 5, May 2009
- Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia:
Model-Driven Development for secure information systems. 809-814
- David A. Basin, Manuel Clavel, Jürgen Doser, Marina Egea:
Automated analysis of security-design models. 815-831 - Ghassan Beydoun, Graham Low, Haralambos Mouratidis, Brian Henderson-Sellers:
A security-aware metamodel for multi-agent systems (MAS). 832-845 - Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee, Siv Hilde Houmb:
An aspect-oriented methodology for designing secure applications. 846-864 - Zhi Jian Zhu, Mohammad Zulkernine:
A model-based aspect-oriented framework for building intrusion-aware software systems. 865-875 - Howard Chivers, Richard F. Paige:
XRound: A reversible template language and its application in model-based security analysis. 876-893 - Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca:
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies. 894-915 - Andreas L. Opdahl, Guttorm Sindre:
Experimental comparison of attack trees and misuse cases for security threat identification. 916-932 - Liang Xiao:
An adaptive security model using agent-oriented MDA. 933-955
Volume 51, Number 6, June 2009
- Wasif Afzal, Richard Torkar, Robert Feldt:
A systematic review of search-based testing for non-functional system properties. 957-976 - José Jacobo Zubcoff, Jesús Pardillo, Juan Trujillo:
A UML profile for the conceptual modelling of data-mining with time-series in data warehouses. 977-992 - Qingfeng He, Annie I. Antón:
Requirements-based Access Control Analysis and Policy Specification (ReCAPS). 993-1009 - Moe Thandar Wynn, H. M. W. Verbeek, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, David Edmond:
Reduction rules for YAWL workflows with cancellation regions and OR-joins. 1010-1020 - Anna Perini, Filippo Ricca, Angelo Susi:
Tool-supported requirements prioritization: Comparing the AHP and CBRank methods. 1021-1032 - Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini:
An engineering process for developing Secure Data Warehouses. 1033-1051 - Mercedes Amor, Lidia Fuentes:
Malaca: A component and aspect-oriented agent architecture. 1052-1065 - Stig Larsson, Petri Myllyperkiö, Fredrik Ekdahl, Ivica Crnkovic:
Software product integration: A case study-based synthesis of reference models. 1066-1080 - Jacques Wainer, Claudia Galindo Novoa Barsottini, Danilo Lacerda, Leandro Rodrigues Magalhães de Marco:
Empirical evaluation in Computer Science research published by ACM. 1081-1085
Volume 51, Number 7, July 2009
- Gursimran Singh Walia, Jeffrey C. Carver:
A systematic literature review to identify and classify software requirement errors. 1087-1109 - Jo Erskine Hannay, Tore Dybå, Erik Arisholm, Dag I. K. Sjøberg:
The effectiveness of pair programming: A meta-analysis. 1110-1122
- Robert M. Hierons:
Using status messages in the distributed test architecture. 1123-1130 - Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha, Doo-Hwan Bae:
A data flow-based structural testing technique for FBD programs. 1131-1139 - You-min Ha, Sanghyun Park, Sang-Wook Kim, Jung-Im Won, Jeehee Yoon:
A stock recommendation system exploiting rule discovery in stock databases. 1140-1149
- Seok-Won Lee, Mattia Monga:
Special section on Software Engineering for Secure Systems (SESS '07). 1150-1151 - Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:
On the secure software development process: CLASP, SDL and Touchpoints compared. 1152-1171 - Dries Vanoverberghe, Frank Piessens:
Security enforcement aware software development. 1172-1185
Volume 51, Number 8, August 2009
- Petia Wohed, Nick Russell, Arthur H. M. ter Hofstede, Birger Andersson, Wil M. P. van der Aalst:
Patterns-based evaluation of open source BPM systems: The cases of jBPM, OpenWFE, and Enhydra Shark. 1187-1216 - Iván García-Magariño, Rubén Fuentes-Fernández, Jorge J. Gómez-Sanz:
Guideline for the definition of EMF metamodels using an Entity-Relationship approach. 1217-1230 - Mahmood Niazi, Muhammad Ali Babar:
Identifying high perceived value practices of CMMI level 2: An empirical study. 1231-1243 - Georgia M. Kapitsaki, Dimitrios A. Kateros, George N. Prezerakos, Iakovos S. Venieris:
Model-driven development of composite context-aware web applications. 1244-1260 - Matjaz B. Juric, Ana Sasa, Ivan Rozman:
WS-BPEL Extensions for Versioning. 1261-1274 - Iris Reinhartz-Berger, Arnon Sturm:
Utilizing domain models for application design and validation. 1275-1289
Volume 51, Number 9, September 2009
- Joaquín Nicolás, José Ambrosio Toval Álvarez:
On the generation of requirements specifications from software engineering models: A systematic literature review. 1291-1307
- Ing-Long Wu, Ching-Yi Hung:
A strategy-based process for effectively determining system requirements in eCRM development. 1308-1318 - Mohammad R. Alshayeb:
Empirical investigation of refactoring effect on software quality. 1319-1326 - Eduardo Miranda, Pierre Bourque, Alain Abran:
Sizing user stories using paired comparisons. 1327-1337 - Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Han:
A method for detecting the theft of Java programs through analysis of the control flow information. 1338-1350 - Tihana Galinac:
Empirical evaluation of selected best practices in implementation of software process improvement. 1351-1364 - Danielle Azar, Haidar M. Harmanani, Rita Korkmaz:
A hybrid heuristic approach to optimize rule-based software quality estimation models. 1365-1376
Volume 51, Number 10, October 2009
- James R. Cordy, Lu Zhang:
Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008. 1377-1378
- Yue Jia, Mark Harman:
Higher Order Mutation Testing. 1379-1393 - Daniel M. Germán, Ahmed E. Hassan, Gregorio Robles:
Change impact graphs: Determining the impact of prior codechanges. 1394-1408 - Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla:
Decompilation of Java bytecode to Prolog by partial evaluation. 1409-1427 - Jonas Lundberg, Tobias Gutzmann, Marcus Edvinsson, Welf Löwe:
Fast and precise points-to analysis. 1428-1439 - Andrew Stone, Michelle Strout, Shweta Behere:
May/must analysis and the DFAGen data-flow analysis generator. 1440-1453 - Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Recovering structured data types from a legacy data model with overlays. 1454-1468 - Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano:
The life and death of statically detected vulnerabilities: An empirical study. 1469-1484
Volume 51, Number 11, November 2009
- Hong Zhu, Fevzi Belli:
Advancing test automation technology to meet the challenges of model-based software testing - Guest editors' introduction to the special section of the Third IEEE International Workshop on Automation of Software Test (AST 2008). 1485-1486 - Arilo Claudio Dias Neto, Guilherme Horta Travassos:
Model-based testing approaches selection for software projects. 1487-1504 - W. Eric Wong, Andy Restrepo, Byoungju Choi:
Validation of SDL specifications using EFSM-based test generation. 1505-1519 - Junhua Ding, Peter J. Clarke, Gonzalo Argote-Garcia, Xudong He:
A methodology for evaluating test coverage criteria of high levelPetri nets. 1520-1533 - José Carlos Bregieiro Ribeiro, Mário Zenha Rela, Francisco Fernández de Vega:
Test Case Evaluation and Input Domain Reduction strategies for the Evolutionary Testing of Object-Oriented software. 1534-1548
- Hong Zhu:
Engineering quality software - Guest editor's introduction to the special section of the Eighth International Conference on Quality Software (QSIC 2008). 1549-1550 - Lionel C. Briand, Yvan Labiche, Zaheer Bawar, Nadia Traldi Spido:
Using machine learning to refine Category-Partition test specifications and test suites. 1551-1564 - Shaoying Liu:
Integrating top-down and scenario-based methods for constructing software specifications. 1565-1572 - Zhenyu Zhang, W. K. Chan, T. H. Tse, Peifeng Hu, Xinming Wang:
Is non-parametric hypothesis testing model robust for statistical fault localization? 1573-1585 - Dharmalingam Ganesan, Thorsten Keuler, Yutaro Nishimura:
Architecture compliance checking at run-time. 1586-1600 - Martin Weiglhofer, Gordon Fraser, Franz Wotawa:
Using coverage to automate and improve test purpose based testing. 1601-1617 - Mohamed F. Ahmed, Swapna S. Gokhale:
Linux bugs: Life cycle, resolution and architectural analysis. 1618-1627
Volume 51, Number 12, December 2009
- Marcela Genero, Mario Piattini, Michel R. V. Chaudron:
Quality of UML models. 1629-1630
- Francisco J. Lucas, Fernando Molina, José Ambrosio Toval Álvarez:
A systematic review of UML model consistency management. 1631-1645 - Parastoo Mohagheghi, Vegard Dehlen, Tor Neple:
Definitions and approaches to model quality in model-based software development - A review of literature. 1646-1669 - Ariadi Nugroho:
Level of detail in UML models and its impact on model comprehension: A controlled experiment. 1670-1685 - Holger Eichelberger, Klaus Schmid:
Guidelines on the aesthetic quality of UML class diagrams. 1686-1698 - Bente Anda, Kai Hansen, Gunhild Sand:
An investigation of use case quality in a large safety-critical software development project. 1699-1711
- Carlos Gutiérrez, David Garcia Rosado, Eduardo Fernández-Medina:
The practical application of a process for eliciting and designing security in web service systems. 1712-1738 - Claus Pahl, Simon Giesecke, Wilhelm Hasselbring:
Ontology-based modelling of architectural styles. 1739-1749
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.