Abstract is missing.
- Secrobat: Secure and Robust Component-based ArchitecturesArtem Vorobiev, Jun Han. 3-10 [doi]
- A precise estimation technique for test coverage of components in object-oriented frameworksYuji Sakata, Kazutoshi Yokoyama, Hironori Washizaki, Yoshiaki Fukazawa. 11-18 [doi]
- An Approach Based on Modeling Dynamic Behavior of the System to Assess the Impact of COTS UpgradesAnjaneyulu Pasala, Srinivasa Rao, Srinivas Gunturu, Purnendu Sinha. 19-26 [doi]
- Component composition through architectural patterns for problem framesChristine Choppy, Denis Hatebur, Maritta Heisel. 27-36 [doi]
- Component-based Development of MILLS: A Case Study in the development of an Inter-library Loan Software SystemNaresh Kumar Agarwal, Danny C. C. Poo, Teo Keng Yong. 37-44 [doi]
- Adopting Model-Driven Development for Integrated Services and Appliances in Home Network SystemsHiroshi Igaki, Masahide Nakamura, Ken-ichi Matsumoto, Mikio Aoyama. 45-52 [doi]
- Efficient Component Based Software Engineering using the TCEM Methodology and the TCET ToolSantokh Singh, Cheung Ling Kelly Yu. 53-60 [doi]
- Toward a Code Search Engine Based on the State-of-Art and PracticeVinicius Cardoso Garcia, Eduardo Santana de Almeida, Liana Barachisio Lisboa, Alexandre C. Martins, Silvio Romero de Lemos Meira, Daniel Lucrédio, Renata Pontin de Mattos Fortes. 61-70 [doi]
- Security-Oriented Service Composition and EvolutionJun Han, Khaled M. Khan. 71-78 [doi]
- A Coupling-based Complexity Metric for Remote Component-based Software Systems Toward Maintainability EstimationHironori Washizaki, Tomoki Nakagawa, Yuhki Saito, Yoshiaki Fukazawa. 79-86 [doi]
- A Formal Framework for Component Pr otocols Behavioural CompatibilityNabil Hameurlain. 87-94 [doi]
- A Portable Interceptor Mechanism on SOAP for Continuous AuditChen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin, William Cheng-Chung Chu. 95-104 [doi]
- A Practical Estimation Method for Complex REBhavani Palyagar, Frank Moisiadis. 105-112 [doi]
- Software Requirements Retrieval Using Use Case Terms and Structure Similarity ComputationAkadej Udomchaiporn, Nakornthip Prompoon, Pizzanu Kanongchaiyos. 113-120 [doi]
- Goal Oriented Requirement Engineering: A Critical Study of TechniquesShahzad Anwer, Naveed Ikram. 121-130 [doi]
- Integrating Stateful Services in WorkflowZakir Laliwala, Vikram Sorathia, Sanjay Chaudhary, Prateek Jain. 131-138 [doi]
- Value-Based Dynamic Composition of Web ServicesKazuto Nakamura, Mikio Aoyama. 139-146 [doi]
- A Comparative Study of Interface Design Approaches for Service-Oriented SoftwareHui Ming Teo, Wan M. N. Wan-Kadir. 147-156 [doi]
- Using Operational Architecture to Model Embedded SoftwareSang-Uk Jeon, Jang-Eui Hong, Doo-Hwan Bae. 157-164 [doi]
- A Method for Detecting and Measuring Architectural Layering Violations in Source CodeSantonu Sarkar, Girish Maskeri Rama, Shubha R.. 165-172 [doi]
- Towards a Model-driven Approach to Develop Applications based on Physical Active ObjectsLuciano Baresi, Paolo Beretta, Roberto Fraccapani, Carlo Ghezzi, Filippo Pacifici. 173-182 [doi]
- A systematic approach to connecting standalone theorem provers to formal development environmentsDavid Hemer. 183-190 [doi]
- Constructing Behavioral State Machine using Interface Protocol SpecificationOsamu Shigo, Atsushi Okawa, Daiki Kato. 191-198 [doi]
- Timing Verification of UML Activity Diagram Based Code Block Level Models for Real Time Multiprocessor System-on-Chip ApplicationsDipankar Das, Rajeev Kumar, P. P. Chakrabarti. 199-208 [doi]
- Modeling and Customization of Fault Tolerant Architecture using Object-Z/XVCLLing Yuan, Jin Song Dong, Jing Sun. 209-216 [doi]
- A Pattern based Model Evolution ApproachSoon-Kyeong Kim, David A. Carrington. 217-224 [doi]
- Safety Analysis for Dynamic Update of Object Oriented ProgramsYogesh Murarka, Umesh Bellur, Rushikesh K. Joshi. 225-232 [doi]
- Strengthening Method Contracts for ObjectsAtul Gupta, Amit Raj. 233-242 [doi]
- Testing of Timer Function Blocks in FBDEunkyoung Jee, Seungjae Jeon, Hojung Bang, Sung Deok Cha, Junbeom Yoo, Gee-Yong Park, Kee-Choon Kwon. 243-250 [doi]
- Generating interoperability tests for networked media devicesSrihari Sukumaran. 251-258 [doi]
- Interaction Testing in Model-Based Development: Effect on Model-CoverageRenée C. Bryce, Ajitha Rajan, Mats Per Erik Heimdahl. 259-268 [doi]
- Detecting Duplications in Sequence Diagrams Based on Suffix TreesHui Liu, Zhiyi Ma, Lu Zhang, Weizhong Shao. 269-276 [doi]
- Towards Interactive Fault Localization Using Test InformationDan Hao, Lu Zhang, Hong Mei, Jiasu Sun. 277-284 [doi]
- A framework for software product engineeringKesav V. Nori, N. Swaminathan. 285-292 [doi]
- Genericity - a Missing in Action Key to Software Simplification and ReuseStan Jarzabek. 293-300 [doi]
- An Empirical Study of Factors and their Relationships in Outsourced Software MaintenancePankaj Bhatt, Gautam Shroff, K. Williams, Arun Kumar Misra. 301-308 [doi]
- An Accurate and Convenient Undo Mechanism for RefactoringsKatsuhisa Maruyama. 309-316 [doi]
- Efficient and Accurate Software Pattern DetectionNiklas Pettersson, Welf Löwe. 317-326 [doi]
- Evaluation of Source Code Updates in Software Development Based on Component RankReishi Yokomori, Masami Noro, Katsuro Inoue. 327-334 [doi]
- An Experience With Design by ContractJudy Tantivongsathaporn, Daniel Stearns. 335-341 [doi]
- Usage Patterns of the Java Standard APIHoman Ma, Robert Amor, Ewan D. Tempero. 342-352 [doi]
- A case study of an empirical approach to component requirements in developing a plagiarism detection toolNoriko Hanakawa, Mike Barker. 353-360 [doi]
- Building Scalable Failure-proneness Models Using Complexity Metrics for Large Scale Software SystemsThirumalesh Bhat, Nachiappan Nagappan. 361-366 [doi]
- An Approach of a Technique for Effort Estimation of Iterations in Software ProjectsJosé Antonio Pow-Sang, Enrique Jolay-Vasquez. 367-376 [doi]
- Cycle Time ReductionNagesh Mukundarao. 377-384 [doi]
- A Process Model Design and Tool Development for Supplier Agreement Management of CMMI: Capability Level 2Chakkanart Vivatanavorasin, Nakornthip Prompoon, Athasit Surarerks. 385-392 [doi]
- A Theoretical Perspective on Knowledge Based Organizational LearningK. Alagarsamy, S. Justus, K. Iyakutti. 393-400 [doi]
- A Systematic Approach to Process Enactment Analysis as Input to Software Process Improvement or TailoringMing Huo, He Zhang, D. Ross Jeffery. 401-410 [doi]
- Inter-Model Consistency in UML Based on CPN FormalismYoshiyuki Shinkawa. 411-418 [doi]
- Introducing MDA in a large IT consultancy organizationVinay Kulkarni, Sreedhar Reddy. 419-426 [doi]
- Applying Formal Approach to Core Asset Instantiation in Product Line EngineeringSuk Kyung Shin, Jin Sun Her, Soo Dong Kim. 427-434 [doi]
- A Versioning Scheme for Consistent Evolution of OO ApplicationsUmesh Bellur, V. Vallieswaran. 435-444 [doi]
- A Knowledge-based Approach for Safety Analysis Using System InteractionsTariq Mahmood, Edmund Kazmierczak. 445-452 [doi]
- Project Replayer with Email Analysis - Revealing Contexts in Software DevelopmentKimiharu Okura, Keita Goto, Noriko Hanakawa, Shinji Kawaguchi, Hajimu Iida. 453-460 [doi]
- Cohesion Analysis in Linux KernelK. Vinay Kumar Reddy, D. Janakiram. 461-466 [doi]
- Visualizing Clone Cohesion and CouplingZhen Ming Jiang, Ahmed E. Hassan, Richard C. Holt. 467-476 [doi]
- Implementation and Evaluation of Teaching an Introductory Software Engineering Course Framed in Cognitive ApprenticeshipShen-Tzay Huang, Yi-Pei Cho, Yu-Jen Lin. 477-484 [doi]
- Security: Bridging the Academia-Industry Gap Using a Case StudyKirti Garg, Vasudeva Varma, K. N. Giridhar, Abhishek K. Mishra. 485-492 [doi]