Abstract is missing.
- Why the Virtual Nature of Software Makes It Ideal for Search Based OptimizationMark Harman. 1-12 [doi]
- A Formalisation of Constraint-Aware Model TransformationsAdrian Rutle, Alessandro Rossini, Yngve Lamo, Uwe Wolter. 13-28 [doi]
- Formal Real-Time Model Transformations in MOMENT2Artur Boronat, Peter Csaba Ölveczky. 29-43 [doi]
- Reusing Model Transformations While Preserving PropertiesEthan K. Jackson, Wolfram Schulte, Daniel Balasubramanian, Gabor Karsai. 44-58 [doi]
- Are Popular Classes More Defect Prone?Alberto Bacchelli, Marco D Ambros, Michele Lanza. 59-73 [doi]
- Operation-Based, Fine-Grained Version Control Model for Tree-Based RepresentationTung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, Tien N. Nguyen. 74-90 [doi]
- A Method for Analyzing Code Homology in Genealogy of Evolving SoftwareMasatomo Hashimoto, Akira Mori. 91-106 [doi]
- Dynamic Resource Scheduling in Disruption-Prone Software Development EnvironmentsJunchao Xiao, Leon J. Osterweil, Qing Wang, Mingshu Li. 107-122 [doi]
- Incremental Service Composition Based on Partial Matching of Visual ContractsMuhammad Naeem, Reiko Heckel, Fernando Orejas, Frank Hermann. 123-138 [doi]
- Formal Analysis and Verification of Self-Healing SystemsHartmut Ehrig, Claudia Ermel, Olga Runge, Antonio Bucchiarone, Patrizio Pelliccione. 139-153 [doi]
- Stochastic Simulation of Graph Transformation SystemsPaolo Torrini, Reiko Heckel, István Ráth. 154-157 [doi]
- Prescriptive Semantics for Big-Step Modelling LanguagesShahram Esmaeilsabzali, Nancy A. Day. 158-172 [doi]
- A Modular Model Composition TechniquePierre Kelsen, Qin Ma 0002. 173-187 [doi]
- A Verifiable Modeling Approach to Configurable Role-Based Access ControlDae-Kyoo Kim, Lunjin Lu, Sangsig Kim. 188-202 [doi]
- Incremental Consistency Checking of Dynamic ConstraintsIris Groher, Alexander Reder, Alexander Egyed. 203-217 [doi]
- Proving Consistency and Completeness of Model Classes Using Theory InterpretationÃdám Darvas, Peter Müller. 218-232 [doi]
- Automatic Cross Validation of Multiple Specifications: A Case StudyCarlo Ghezzi, Andrea Mocci, Guido Salvaneschi. 233-247 [doi]
- An Automata-Theoretic Approach to Hardware/Software Co-verificationJuncao Li, Fei Xie, Thomas Ball, Vladimir Levin, Con McGarvey. 248-262 [doi]
- Shape Refinement through Explicit Heap AnalysisDirk Beyer, Thomas A. Henzinger, Grégory Théoduloz, Damien Zufferey. 263-277 [doi]
- Memory Leaks Detection in Java by Bi-abductive InferenceDino Distefano, Ivana Filipovic. 278-292 [doi]
- Analyzing the Impact of Change in Multi-threaded ProgramsKrishnendu Chatterjee, Luca de Alfaro, Vishwanath Raman, César Sánchez. 293-307 [doi]
- Evaluating Ordering Heuristics for Dynamic Partial-Order Reduction TechniquesSteven Lauterburg, Rajesh K. Karmani, Darko Marinov, Gul Agha. 308-322 [doi]
- A Lightweight and Portable Approach to Making Concurrent Failures ReproducibleQingzhou Luo, Sai Zhang, Jianjun Zhao, Min Hu. 323-337 [doi]
- Efficient Runtime Assertion Checking of Assignable Clauses with DatagroupsHermann Lehner, Peter Müller. 338-352 [doi]
- Performance Modeling and Analysis of Context-Aware Mobile Software SystemsLuca Berardinelli, Vittorio Cortellessa, Antinisca Di Marco. 353-367 [doi]
- A Process to Effectively Identify Guilty Performance AntipatternsVittorio Cortellessa, Anne Martens, Ralf Reussner, Catia Trubiani. 368-382 [doi]