default search action
ACM Transactions on Software Engineering and Methodology, Volume 23
Volume 23, Number 1, February 2014
- David S. Rosenblum:
Editorial. 1:1-1:2 - Robrecht Haesevoets, Danny Weyns, Tom Holvoet:
Architecture-centric support for adaptive service collaborations. 2:1-2:40 - Andrew F. Tappenden, James Miller:
Automated cookie collection testing. 3:1-3:40 - Gabriele Bavota, Malcom Gethers, Rocco Oliveto, Denys Poshyvanyk, Andrea De Lucia:
Improving software modularization via automated analysis of latent topics and dependencies. 4:1-4:33 - Xiao Liu, Yun Yang, Dong Yuan, Jinjun Chen:
Do we need to handle every temporal violation in scientific workflow systems? 5:1-5:34 - Federico Mari, Igor Melatti, Ivano Salvo, Enrico Tronci:
Model-based synthesis of control software from system-level formal specifications. 6:1-6:42 - Eric Bodden, Éric Tanter, Milton Inostroza:
Join point interfaces for safe and flexible decoupling of aspects. 7:1-7:41 - Wes Masri, Rawad Abou Assi:
Prevalence of coincidental correctness and mitigation of its impact on fault localization. 8:1-8:28 - Lionel C. Briand, Davide Falessi, Shiva Nejati, Mehrdad Sabetzadeh, Tao Yue:
Traceability and SysML design slices to support safety inspections: A controlled experiment. 9:1-9:43 - Yuming Zhou, Baowen Xu, Hareton Leung, Lin Chen:
An in-depth study of the potentially confounding effect of class size in fault prediction. 10:1-10:51
Volume 23, Number 2, March 2014
- David S. Rosenblum:
Editorial. 11:1-11:4 - Kai Pan, Xintao Wu, Tao Xie:
Guided test generation for database applications via synthesized database interactions. 12:1-12:27 - Giuseppe Scanniello, Carmine Gravino, Marcela Genero, José A. Cruz-Lemus, Genoveffa Tortora:
On the impact of UML analysis models on source-code comprehensibility and modifiability. 13:1-13:26 - Thomas Fritz, Gail C. Murphy, Emerson R. Murphy-Hill, Jingwen Ou, Emily Hill:
Degree-of-knowledge: Modeling a developer's knowledge of code. 14:1-14:42 - Lunjin Lu, Dae-Kyoo Kim:
Required behavior of sequence diagrams: Semantics and conformance. 15:1-15:28 - Michael Unterkalmsteiner, Robert Feldt, Tony Gorschek:
A taxonomy for requirements engineering and software test alignment. 16:1-16:38 - Dharmalingam Ganesan, Mikael Lindvall:
ADAM: External dependency-driven architecture discovery and analysis of quality attributes. 17:1-17:51 - Klaas-Jan Stol, Paris Avgeriou, Muhammad Ali Babar, Yan Lucas, Brian Fitzgerald:
Key factors for adopting inner source. 18:1-18:35 - Mark Harman, Jens Krinke, Inmaculada Medina-Bulo, Francisco Palomo-Lozano, Jian Ren, Shin Yoo:
Exact scalable sensitivity analysis for the next release problem. 19:1-19:31 - Mariano M. Moscato, Carlos López Pombo, Marcelo F. Frias:
Dynamite: A tool for the verification of alloy models based on PVS. 20:1-20:37
Volume 23, Number 3, May 2014
- Mainul Islam, Christoph Csallner:
Generating Test Cases for Programs that Are Coded against Interfaces and Annotations. 21:1-21:38 - Lucas Layman, Victor R. Basili, Marvin V. Zelkowitz:
A Methodology for Exposing Risk in Achieving Emergent System Properties. 22:1-22:28 - Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas Rountev, Edith Schonberg, Gary Sevitsky:
Scalable Runtime Bloat Detection Using Abstract Dynamic Slicing. 23:1-23:50 - Nicoletta De Francesco, Giuseppe Lettieri, Antonella Santone, Gigliola Vaglini:
GreASE: A Tool for Efficient "Nonequivalence" Checking. 24:1-24:26 - Razieh Behjati, Shiva Nejati, Lionel C. Briand:
Architecture-Level Configuration of Large-Scale Embedded Software Systems. 25:1-25:43 - Kathryn T. Stolee, Sebastian G. Elbaum, Daniel Dobos:
Solving the Search for Source Code. 26:1-26:45
Volume 23, Number 4, August 2014
- David S. Rosenblum:
Editorial. 27:1 - Gail C. Murphy, Mauro Pezzè:
Introduction to the Special Issue International Conference on Software Engineering (ICSE 2012). 28:1-28:2 - Anders Møller, Mathias Schwarz:
Automated Detection of Client-State Manipulation Vulnerabilities. 29:1-29:30 - ThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest:
DIG: A Dynamic Invariant Generator for Polynomial and Array Invariants. 30:1-30:30 - Walid Maalej, Rebecca Tiarks, Tobias Roehm, Rainer Koschke:
On the Comprehension of Program Comprehension. 31:1-31:37 - Pingyu Zhang, Sebastian G. Elbaum:
Amplifying Tests to Validate Exception Handling Code: An Extended Study in the Mobile Application Domain. 32:1-32:28
- Tracy Hall, Min Zhang, David Bowes, Yi Sun:
Some Code Smells Have a Significant but Small Effect on Faults. 33:1-33:39 - Yueqi Li, Shing-Chi Cheung, Xiangyu Zhang, Yepang Liu:
Scaling Up Symbolic Analysis by Removing Z-Equivalent States. 34:1-34:32 - Peter C. Rigby, Daniel M. Germán, Laura L. E. Cowen, Margaret-Anne D. Storey:
Peer Review on Open-Source Software Projects: Parameters, Statistical Models, and Theory. 35:1-35:33
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.