Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.04",
%%%     date            = "26 December 2021",
%%%     time            = "08:48:17 MST",
%%%     filename        = "sigsoft2010.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "01283 25058 128040 1211237",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "ACM SIGSOFT Software Engineering Notes;
%%%                        bibliography; BibTeX",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of ACM
%%%                        SIGSOFT Software Engineering Notes (CODEN
%%%                        SFENDP, ISSN 0163-5948 (print), 1943-5843
%%%                        (electronic)) for the years 2010--2019.
%%%                        Other decades are covered in companion
%%%                        bibliographies named sigsoftYYY0.bib.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        May 1976, and there are up to 8 issues per
%%%                        annual volume.
%%%
%%%                        The journal has Web sites at:
%%%
%%%                            http://www.sigsoft.org/
%%%                            https://dl.acm.org/citation.cfm?id=J728
%%%                            https://dl.acm.org/loi/sigsoft
%%%
%%%                        At version 1.04, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2010 ( 112)    2014 (  12)    2018 (  68)
%%%                             2011 ( 101)    2015 (   0)    2019 (  53)
%%%                             2012 ( 163)    2016 (  50)
%%%                             2013 ( 157)    2017 (  36)
%%%
%%%                             Article:        752
%%%
%%%                             Total entries:  752
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}}    \fi" #
    "\ifx \undefined \TM        \def \TM          {${}^{\sc TM}$} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-SIGSOFT               = "ACM SIGSOFT Software Engineering Notes"}

%%% ====================================================================
%%% Bibliography entries, sorted by publication order with ``bibsort
%%% --byvolume'':
@Article{deSousa:2010:AAR,
  author =       "Thiago C. de Sousa and Jorge R. {Almeida, Jr.} and
                 Sidney Viana and Judith Pav{\'o}n",
  title =        "Automatic analysis of requirements consistency with
                 the {B} method",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734114",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A consistent requirements specification is a
                 fundamental success factor for quality software
                 development projects. On the one hand, writing
                 requirements in a natural language is not good for an
                 automated conflict detection process. On the other
                 hand, formal methods provide the basis for consistency
                 checking of requirements specification automatically.
                 In this paper, the potential of the B method for
                 improving the requirements quality under the
                 consistency dimension is discussed. We present an
                 approach to use B specifications derived from a
                 controlled natural language to identify requirements
                 inconsistencies",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kalaimagal:2010:QIQ,
  author =       "Sivamuni Kalaimagal and Rengaramanujam Srinivasan",
  title =        "{Q'Facto 12}: an improved quality model for {COTS}
                 components",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734116",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component Based Software Engineering (CBSE) offers
                 developers the twin benefits of reduced software life
                 cycles and shorter development times. However the
                 success of the component based paradigm depends on the
                 quality of the COTS components purchased and integrated
                 into the existing software systems. The need of the
                 hour therefore is a quality model that can be used by
                 software developers to evaluate the quality of software
                 components before integrating them into existing
                 systems. This paper discusses a quality model called
                 Q'Facto12 based on the ISO25000 quality standard that
                 can be used to evaluate the quality of COTS components.
                 The model is an upgrade of an earlier model called the
                 Q'Facto 10 model that was proposed by us. This paper
                 provides an outline of the Q'Facto 12 model compares
                 the model with the Q'Facto 10 model and highlights why
                 the Q'Facto 12 model is better than the Q'Facto 10
                 model. An experimental study to demonstrate the use of
                 the model has also been presented",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nami:2010:SNN,
  author =       "Mohammad Reza Nami and Jila Saneipour",
  title =        "Self-* e-nursing: a new idea in nursing",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734117",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The rapid advances in Information and Communication
                 Technology (ICT), management, and network technologies
                 have had key role in emerging heterogeneous large-scale
                 distributed systems. The term of E-nursing has been
                 used to refer to the incorporation of ICT into nursing.
                 An Autonomous system has as its vision the creation of
                 self managing systems to address today's concerns of
                 complexity and total cost of ownership while meeting
                 tomorrow's needs for pervasive and ubiquitous
                 computation and communication. Purpose of this paper is
                 to present an autonomous virtual organization for
                 e-nursing describing their characteristics, effects on
                 quality factors, their building blocks architecture,
                 and challenges",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhatia:2010:ACB,
  author =       "Rajesh K. Bhatia and Mayank Dave and R. C. Joshi",
  title =        "Ant colony based rule generation for reusable software
                 component retrieval",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734110",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Storage and representation of reusable software
                 components in software repositories to facilitate
                 convenient identification and retrieval has been always
                 a concern for software reuse researchers. This paper
                 discusses and demonstrated an ant colony algorithm
                 based technique that generates rules to store and then
                 identify the component from software repository for
                 possible reuse. Proposed technique help user in
                 organization and storage of components in repository
                 and later can help in identifying most appropriate
                 component for given context. In first stage while
                 searching it makes use of keywords, their synonyms and
                 their inter-relationships. Then it makes use of ant
                 colony optimization; initial pheromone of one is
                 assigned to all domain representative terms of
                 components. By updating pheromone for participating
                 terms and non-participating terms iteratively and by
                 calculating the quality of each rule generated, it
                 leads to quality rules to represent and retrieve the
                 reusable components",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chodkowski:2010:RIA,
  author =       "Steven Chodkowski",
  title =        "Recommendations for the information architect's book
                 shelf",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734112",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dahiya:2010:TSE,
  author =       "Deepak Dahiya",
  title =        "Teaching software engineering: a practical approach",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734113",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In teaching software engineering, it is a major
                 challenge to integrate applied methodology and theory
                 into the practice of software development. Today
                 teaching a course in software engineering involves a
                 theoretical approach with white board and doing a
                 project at the end of the course. Teaching Software
                 engineering as a course involves many disciplines and
                 requires delivering lectures accompanied by lecture
                 demos and hands on lab sessions to accompany individual
                 constituent topics or areas that form the bricks and
                 mortar of this course. Only when the bricks and mortar
                 of software engineering have delivered a solid
                 foundation, is it then that software engineering as a
                 course will be delivered in a true and meaningful
                 sense. This paper presents a method to teach Software
                 Engineering using the applied approach that the author
                 designed and successfully used",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gill:2010:MDP,
  author =       "Nasib Singh Gill and Pradeep Tomar",
  title =        "Modified development process of component-based
                 software engineering",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734120",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based software engineering (CBSE) is a
                 branch of software engineering, the priority of which
                 is the separation of concerns in respect of the
                 wide-ranging functionality available throughout a given
                 software system. CBSE emphasizes on building system by
                 reusing high quality configurable software components.
                 This reduces its development cost as well as
                 time-to-market and ensures higher reliability, better
                 maintainability and quality by exploiting reusability.
                 In the traditional approach, when a software system is
                 going to be developed, the implementation has to be
                 done from scratch. With the advent of Object-Oriented
                 Technology (OOT), reusable software components have
                 become an indispensable part of programming knowledge.
                 In addition to those classes and methods included in
                 standard libraries of programming languages, such as
                 the Java API library, many reusable software components
                 are developed by software development organizations
                 specifically for reuse or repackaged from previously
                 developed systems. We propose here a modified
                 development process of CBSE and present our modified
                 development process of CBSE for increasing reusability
                 in different abstraction levels: architecture level,
                 modular design level and framework level. This modified
                 development process of CBSE change the reusability
                 approach into two different approaches
                 composition-based approach and generation-based. Lastly
                 on the basis of these two approaches we divide
                 component reuse into two different processes. First one
                 is process of development of reusable components which
                 is composition-based approach and second one is process
                 of development with reusable components which is based
                 on the generation-based according X model with the
                 benefits of reusable components in programming",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2010:MST,
  author =       "Anup Kumar Bandyopadhyay",
  title =        "Modeling of state transition rules and its
                 application",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--7",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734109",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A state transition rule is viewed as a cause and
                 effect relationship. An example is selected from the
                 common sense world. Six different instances of this
                 relationship are enumerated. A temporal logic based on
                 observation is proposed. This logic is used to model
                 the enumerated instances. Assuming some necessary
                 properties of a transition rule only two relevant
                 models are selected. One of them ensures that the
                 precondition is necessary where the other guarantees
                 its sufficiency. Noting these two characteristics the
                 first one is opted for proving the safety property
                 where the second is used to prove progress. We have
                 considered Peterson's two process mutual exclusion
                 algorithm as an illustrative example",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gupta:2010:TFR,
  author =       "Amit Gupta and Rajesh Bhatia",
  title =        "Testing functional requirements using B model
                 specifications",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--7",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734115",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Testing is very important part of software
                 development. Almost 80\% software fails because of the
                 improper or inefficient testing. Testing is performed
                 by different types of strategies. Generally testing is
                 performed on code, but if the software can be tested in
                 the earlier phases then most of the errors can be
                 eliminated and can be stopped from propagating to next
                 phase. Thus there is a need to explore testing
                 possibilities in earlier phases. This paper present a
                 novel requirement based testing approach that can fix
                 errors in initial phase. Formal Specification languages
                 play a vital role in software testing. Formal models
                 provide a precise specification of the system, and can
                 be used as a vehicle for driving the development
                 process. To perform requirement based testing, we need
                 a formal language that can deal with the requirement
                 specification efficiently. Many researchers have
                 proposed various approaches to generate test cases from
                 formal specifications. These approaches include test
                 case generation from various state based languages like
                 Z, VDM and B specifications. In this paper we proposed
                 a technique that can provide better coverage of
                 requirements as compared to other approaches. For
                 maximizing the coverage of requirements in our model,
                 we annotate our specifications with requirement
                 identifiers, which help in later stages to detect which
                 requirements are covered and which are yet to be
                 tested. Test cases are generated by extracting
                 invariants and post conditions from our specification,
                 and are transformed in a generalized form. Using test
                 selection criteria, we can cover all parts of our model
                 and generates test cases for each of our test
                 objective",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ripon:2010:PAS,
  author =       "Shamim H. Ripon",
  title =        "Process algebraic support for web service
                 composition",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--7",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734118",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web services technology provides a platform on which
                 we can develop distributed services. The
                 interoperability among these services is achieved by
                 various standard protocols. In recent years, several
                 researches suggested that process algebras provide a
                 satisfactory assistance to the whole process of web
                 services development. Business transactions, on the
                 other hand, involve the coordination and interaction
                 between multiple partners. With the emergence of web
                 services, business transactions are conducted using
                 these services. The coordination among the business
                 processes is crucial, so is the handling of faults that
                 can arise at any stage of a transaction. Compensation
                 is an error recovery mechanism to handle faults in
                 business transactions. Compensating CSP (cCSP) is a
                 language defined to model business transactions within
                 the framework of standard CSP process algebra. The
                 language defines a transaction as a process and has the
                 constructs for orchestration of compensations. In this
                 short note, we report a case study showing how cCSP can
                 be used to model business transactions. We also show a
                 mechanical verification technique to verify theoretical
                 properties of the language",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neogi:2010:EEV,
  author =       "Madhumita S. Neogi and Vandana Bhattacherjee",
  title =        "Evaluating the effectiveness of {VOSDM}: a vision
                 oriented approach",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--8",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734119",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Process models form the heart of software engineering
                 since software development process spans the life cycle
                 of any given project. Even though waterfall model forms
                 the basis of all software development models, the
                 demand for new models with design and implementation
                 occurring in parallel is on the increase. This research
                 aims at the evaluation of a vision oriented software
                 development model. In this study, the subjects are
                 final year post graduate students working for their
                 final term projects for small organizations in and
                 around our city. The group of students applied two
                 techniques for software development and it was found
                 that VOSDM was more effective and improved reliability.
                 The productivity did not show any significant
                 improvement",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wright:2010:ISD,
  author =       "M. Keith Wright and Charles J. {Capps III}",
  title =        "Information systems development project performance in
                 the 21st century",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734121",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents the results of a 2009 survey of
                 professional IT auditors that explored their
                 perceptions about root psychological and sociological
                 causes of Information Systems (IS) project failure
                 based on the punctuated equilibrium theoretical
                 framework. As predicted by punctuated equilibrium
                 theory, the results of the survey indicate that radical
                 as opposed to incremental organizational changes are
                 more effective in turning around ``runaway'' projects.
                 The results indicate that IS development project
                 performance is worse in government than in the private
                 sector, and provide support for the continued use of
                 punctuated equilibrium models for research in
                 information systems development project performance",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Capretz:2010:WDW,
  author =       "Luiz Fernando Capretz and Faheem Ahmed",
  title =        "Why do we need personality diversity in software
                 engineering?",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734111",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Diversity of skills is good for society, it is also
                 good in problem solving because different people see a
                 problem from several perspectives, so diversity should
                 be good for software engineering too. This study
                 tackles a difficult to study aspect of software
                 engineering, that is, how to best associate personnel
                 with the various tasks in a software project. The
                 approach uses psychological types to determine who is
                 best suited to particular development roles. The
                 article has four main objectives: (1) to arouse
                 awareness of human factors among software engineers;
                 (2) to investigate how psychological factors can
                 contribute to their effectiveness at work; (3) to
                 catalyze effort among software engineers leading
                 towards a deeper understanding and broader applications
                 of human factors in the light of the activities
                 involving the engineering of software; and (4) to
                 emphasize the important of skill diversity in the
                 software engineering field. This article provides
                 conceptual knowledge, reports findings, and presents
                 both real and hypothesized beliefs from the software
                 engineering community. Likewise, it is hoped that the
                 article will motivate software engineers and
                 psychologists to conduct more research in the area of
                 software psychology, so as to understand more
                 profoundly the possibilities for increased
                 effectiveness and fulfillment among software
                 engineers",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEa,
  author =       "Larry Bernstein",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "3--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734104",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2010:SEEa,
  author =       "Mark A. Ardis",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "4--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734105",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "5--14",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734106",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "15--24",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734107",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gorschek:2010:TIW,
  author =       "Tony Gorschek and Samuel Fricker and Sjaak Brinkkemper
                 and Christof Ebert",
  title =        "{Third International Workshop on Software Product
                 Management --- IWSPM'09}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "25--29",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734108",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software product management steers the success of a
                 product in all its lifecycle stages by thoughtful
                 application of planning, coordination, and control. The
                 third international workshop on software product
                 management (IWSPM{\^A}'09) was held in conjunction with
                 the International Conference on Requirements
                 Engineering (RE'09) in Atlanta USA. The aim was to
                 bring researchers and industry practitioners together
                 to discuss the area and unique challenges of software
                 and technology product management. Selected challenges
                 put forward by accepted papers from both industry and
                 academia were analyzed. The session discussions focused
                 on identifying future needs for research, the relevance
                 of which was assured by good industry presence at the
                 workshop. The workshop homepage can be found
                 http://2009.iwspm.org",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saur:2010:BRS,
  author =       "Joe Saur",
  title =        "Book Review: {{\booktitle{Simulation-Based Engineering
                 of Complex Systems}}, Second Edition, by John R.
                 Clymer, and published by John Wiley and Sons, 2009,
                 hardcover, ISBN 978-0-470-40129-3, 503 pp.}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "33--34",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734122",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tribbey:2010:BRF,
  author =       "Will Tribbey",
  title =        "Book Review: {{\booktitle{F\# for Scientists}}, by Jon
                 Harrop, and published by Wiley-Interscience, 2008,
                 hardback, ISBN 0-470-24211-6, 368pp.}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "34--35",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734123",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krizevnik:2010:ISP,
  author =       "Marcel Krizevnik and Matjaz B. Juric",
  title =        "Improved {SOA} persistence architectural model",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764821",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Companies often face difficulties when building the
                 data services layer. The most common problems are poor
                 data quality, performance issues and heterogeneity of
                 data sources. In this article, we propose solutions to
                 the problems described and merge them into a
                 comprehensive architectural model for the storage and
                 management of permanent data in SOA (Service Oriented
                 Architecture). In order to overcome problems related to
                 poor data quality, our architectural model requires the
                 use of adjusted MDM (Master Data Management).
                 Furthermore, we propose that all data transfer between
                 data services and business level goes in form of SDO
                 (Service Data Objects), which allow us a uniform data
                 access and manipulation, regardless of the data type.
                 As the best approach to improve performances,
                 scalability, availability and reliability of the data
                 services layer, our architecture introduces caching in
                 the intermediate layer with the use of in-memory data
                 grids. As an example of how the proposed solution can
                 also be used to improve parts of the SOA
                 infrastructure, we will present possible approach to
                 improve BPEL (Business Process Execution Language)
                 dehydration store.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nair:2010:PMB,
  author =       "T. R. Gopalakrishnan Nair and V. Suma",
  title =        "A paradigm for metric based inspection process for
                 enhancing defect management",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764827",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Inspection process in software development plays a
                 vital role in effective defect management. In order to
                 have an appropriate measurement of the inspection
                 process, we depend on a process metric called the Depth
                 of Inspection (DI). DI enables the manager within the
                 software community to identify and compare the level of
                 inspection performed in various projects. An empirical
                 study of several projects facilitated the evaluation of
                 a set of process coefficients which are capable of
                 predicting the DI values using multiple regression
                 models. The industry observed DI value based on defect
                 count and the DI value produced by the model are
                 strongly matching. This supports the predictive
                 capability of DI through process coefficients without
                 depending on the prior estimation of the defect
                 count.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Li:2010:TER,
  author =       "Zude Li and Mechelle Gittens and Syed Shariyar Murtaza
                 and Nazim H. Madhavji",
  title =        "A towards an extended relational algebra for software
                 architecture",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764823",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software architecture is often structured as
                 box-and-arrow graphs and has important implications for
                 system development and maintenance. We propose an
                 extended relational algebra to support presentation and
                 manipulation of both architectural structures and
                 implications. The core structure of this algebra is the
                 extended architectural relation (EAR). An EAR is a
                 mapping from an architectural relation (AR) to a
                 multi-set of attributes (M), where the AR is an
                 ordinary relation representing an architectural
                 structure, and the M represents a multi-set
                 representing a type of architectural implication. A set
                 of EAR operations is then defined to support EAR
                 manipulations. The main advantage of this extended
                 algebra over ordinary relational algebras is that the
                 architectural implications (the M part) are presented
                 and manipulated together with the architectural
                 structures (the AR part). This paper first discusses
                 why we propose the algebra, then briefly introduces
                 what the algebra is, and finally describes how to use
                 the algebra in a real scenario.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Georgieva:2010:CFS,
  author =       "Konstantina Georgieva",
  title =        "Conducting {FMEA} over the software development
                 process",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764819",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Failure mode and effects analysis (FMEA) is one of the
                 well-known analysis methods with an established
                 position in the traditional reliability analysis. It is
                 widely used but even so, it is not popular in software
                 engineering. To address this gap, in this paper we
                 propose an application of the FMEA method for the
                 software development process after which we visualize
                 our approach with a tool that makes the application of
                 SFMEA very easy. Our tool is available in our virtual
                 Software Measurement Laboratory ([email protected]) at
                 http:// www.smlab.de/webapplcations.html.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2010:SMM,
  author =       "Krishna Kumar and Rajesh Prasad and Suneeta Agarwal",
  title =        "Software maintenance by multi-patterns parameterized
                 string matching with q-gram",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764822",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the multi-patterns parameterized string matching
                 problem, a set of patterns $ P_0, P_1, P_2, \ldots {},
                 P_{r - 1}, r \geq 1 $, are said to match with a
                 sub-string $t$ of the text $T$, if there exists a
                 one-one correspondence between the symbols of patterns
                 and the symbols of $t$. This problem has an important
                 application in software maintenance, where it is often
                 required to find equivalency between two sections of
                 codes. Two sections of codes are said to be equivalent
                 if one can be transformed into the other by renaming
                 only identifiers and variables. In this paper, we
                 extend Forward Non-deterministic Directed Acyclic Word
                 Graph (DAWG) matching (FNDM) algorithm to PQFNDM for
                 parameterized string matching problem by using the
                 q-gram. Experimentally it has been observed that the
                 performance of PQFNDM improves with increasing value of
                 q up to half the length of the pattern. We further
                 modify PQFNDM to MPQFNDM for handling multiple
                 patterns. We compare the performance of PQFNDM (for
                 q=1) with parameterized shift-or (PSO) algorithm and
                 found that PQFNDM is better than PSO. We also show the
                 benefits of using multiple patterns.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Pandey:2010:ADL,
  author =       "R. K. Pandey",
  title =        "Architectural description languages {(ADLs)} vs {UML}:
                 a review",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764828",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The field of software architecture which is considered
                 as a subfield of software engineering is now about two
                 decades old. During this period a number of software
                 Architecture Description Languages (ADLs) emerged and
                 vanished. But none of the ADLs became much popular
                 amongst the practitioners except a few, that too only
                 in a specific domain. On the other hand Unified
                 Modeling Language (UML) which some times is not even
                 accepted as an ADL or accepted with a some hesitation
                 has become an industry de facto standard notation for
                 documenting software architectures. This paper makes an
                 attempt to find an answer to this question as to what
                 went wrong with the ADLs that they did not become much
                 popular beyond their place of origin. Is UML really an
                 Architecture Description Language.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Prasad:2010:PSM,
  author =       "Rajesh Prasad and Suneeta Agarwal",
  title =        "Parameterized string matching: an application to
                 software maintenance",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764829",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the problem of parameterized string matching, a
                 given pattern P is said to match with a sub-string $t$
                 of the text $T$, if there exists a one-one
                 correspondence between the symbols of P and the symbols
                 of $t$. This problem has an important application in
                 software maintenance, where it is often required to
                 find equivalency between two sections of codes. Two
                 sections of codes are said to be equivalent if one can
                 be transformed into the other by renaming only
                 identifiers and variables. In this paper, we propose
                 two new algorithms for the said problem by using the
                 q-gram approach. The first one is obtained by using
                 this approach on an existing string matching algorithm
                 (simplified backward non-deterministic directed acyclic
                 word graph matching (SBNDM)). The second one is
                 obtained by using the q-gram approach on the
                 parameterized string matching algorithm (parameterized
                 backward non-deterministic directed acyclic word graph
                 matching (PBNDM)). Performance of both the algorithms
                 is tested for various values of q and it has been
                 observed that both show their best performance for q
                 nearly equal to half of the pattern length. We also
                 study the effect on running time of these algorithms
                 with increasing the duplicity in the text.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Malhotra:2010:AML,
  author =       "Ruchika Malhotra and Arvinder Kaur and Yogesh Singh",
  title =        "Application of machine learning methods for software
                 effort prediction",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764825",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software effort estimation is an important area in the
                 field of software engineering. If the software
                 development effort is over estimated it may lead to
                 tight time schedules and thus quality and testing of
                 software may be compromised. In contrast, if the
                 software development effort is underestimated it may
                 lead to over allocation of man power and resource.
                 There are many models proposed in the literature for
                 estimating software effort. In this paper, we analyze
                 machine learning methods in order to develop models to
                 predict software development effort we used Maxwell
                 data consisting 63 projects. The results show that
                 linear regression, MSP and M5Rules are effective
                 methods for predicting software development effort.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mattmann:2010:UAT,
  author =       "Chris A. Mattmann and Amy J. Braverman and Daniel J.
                 Crichton",
  title =        "Understanding architectural tradeoffs necessary to
                 increase climate model intercomparison efficiency",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764826",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "NASA's Jet Propulsion Laboratory, in partnership with
                 Lawrence Livermore National Laboratory, has been
                 leading an effort to allow remote sensing data
                 available from NASA satellites to be easily compared
                 with climate model outputs available from the
                 DOE-funded Earth System Grid, a national asset in
                 climate science. This partnership is timely with the
                 looming Intergovernmental Panel on Climate Change
                 (IPCC)'s 5th Assement Report (AR5) in active
                 discussion, and the metrics to better understand
                 Earth's climate under formulation. JPL's project,
                 titled the Climate Data eXchange (CDX) provides an
                 easy-to-use software framework for climate scientists
                 to rapidly integrate and evaluate the efficacy of
                 observational data as applied to climate models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rajaram:2010:ESV,
  author =       "Kanchana Rajaram and Chitra Babu",
  title =        "Evolution of a simple vehicle registration system to
                 an {SOA} based e-governance application: a case study",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764830",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Transactions are one of the basic building blocks in
                 all business applications. The notion of a transaction
                 originated in the seventies and has evolved over time
                 to cater to complex business applications that are
                 distributed, heterogeneous, and loosely coupled. The
                 literature on transaction models is extensive and most
                 of them illustrate the ideas with case studies on
                 different applications. Since the applications are
                 different, it is diffcult to understand the limitations
                 of the models for the general case. However, such an
                 understanding is essential in order to develop a new
                 transaction model that caters to the changing business
                 requirements. This motivated us to investigate the
                 evolution of existing transaction models and to analyze
                 their shortcomings using a case study, Vehicle
                 Registration system. A taxonomy of the various
                 transaction models based on conceptual evolution has
                 also been presented. Further, the suitability of SOA to
                 large scale e-governance applications and the need for
                 developing better SOA Governance transaction frameworks
                 have been demonstrated.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gama:2010:SAA,
  author =       "Kiev Gama and Didier Donsez",
  title =        "A survey on approaches for addressing dependability
                 attributes in the {OSGi} service platform",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764818",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The OSGi service platform is being used in software
                 industry as the de facto middleware for developing and
                 deploying modular Java applications, using SOA
                 principles in centralized solutions. OSGi provides a
                 dynamic platform where components and services can be
                 deployed and undeployed at runtime, attracting the
                 attention of both commercial and research projects.
                 Although the platform is used in fields with different
                 purposes (e.g. experimentally used in healthcare,
                 commercially used in application servers) but where
                 dependability should be a pre-requisite for
                 applications, it is a fact that the OSGi technology
                 does not provide a dependable platform for executing
                 applications with such needs. Different research
                 efforts try to address dependability attributes
                 (availability, integrity, maintainability, reliability,
                 safety, and confidentiality) in the OSGi service
                 platform, but not necessarily all of these attributes
                 are completely covered or explicitly addressed in the
                 textual references. We provide a brief survey on recent
                 research efforts that try to improve dependability in
                 the OSGi service platform. We analyze and identify
                 which attributes are addressed on each approach, and
                 provide a discussion on the employed techniques,
                 similarities and results achieved on such approaches.
                 Al-though this survey remains limited to one technology
                 (OSGi), the problematic as well as all the employed
                 techniques in the analyzed efforts are pertinent to
                 other service and component-based systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hopfner:2010:EAD,
  author =       "Hagen H{\"o}pfner and Christian Bunse",
  title =        "Energy aware data management on {AVR} micro controller
                 based systems",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764820",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data management systems comprise various algorithms
                 for efficiently retrieving and managing data.
                 Typically, algorithm efficiency or performance is
                 correlated with execution speed. However, the uptime of
                 battery-powered mobile- and embedded systems strongly
                 depends on the energy consumption of the involved
                 components. This paper reports our results concerning
                 the energy consumption of different implementations of
                 sorting and join algorithms. We demonstrate that high
                 performance algorithms often require more energy than
                 slower ones. Furthermore, we show that dynamically
                 exchanging algorithms at runtime results in a better
                 throughput if energy is limited.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Suri:2010:DMF,
  author =       "P. K. Suri and Gurdev Singh",
  title =        "{DG-metrics} formulization for {DGML-based} software
                 design",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764832",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "DGML-based software-design representation uses
                 specially designed XML tags to represent the design
                 elements. This representation opens new possibilities
                 for verifying DGML-based software design against
                 existing design metrics and creation of new design
                 metrics. This paper discusses newly created design
                 metrics for the DGML-based design DG-Metrics. This
                 helps in identifying error prone modules in early
                 stages of software development process, tuning design
                 modules for better performance and in managing the
                 later phases of software development cycle with ease.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bastani:2010:LLD,
  author =       "Behzad Bastani",
  title =        "Low-level dynamic system formation with high-level
                 automation: extending {UML} in support of {UPnP}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--10",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764817",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "One way of defining system evolvability is in terms of
                 the low-level discrete-systems composition and dynamic
                 bindings. Evidently, direct low-level implementation
                 has its drawbacks and might be expensive for the
                 performance of system formation process and system
                 integrity. Engaging high-level design capabilities
                 based on a standard method in support of low-level
                 system formation can find a crucial role in this
                 setting. Universal Plug and Play (UPnP) is a well-known
                 standard facilitating dynamic integration of devices
                 into networks. Operating as a low-level programming
                 method, UPnP might be composed with high-level design
                 facilities. This paper presents a conceptual framework
                 to provide UPnP with native UML support through UML
                 extensions. An implemented UML to UPnP conversion model
                 offers the contribution of this research as an
                 automated solution for the high-level support.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2010:MRG,
  author =       "V. B. Singh and P. K. Kapur and Abhishek Tandon",
  title =        "Measuring reliability growth of software by
                 considering fault dependency, debugging time Lag
                 functions and irregular fluctuation",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--11",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764831",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The progress of software testing is influenced by
                 various uncertainty factors like effort expenditure,
                 skill of test personal, testing tool, defect density,
                 irregular state of open source project, and irregular
                 state of software fault-report phenomena on the bug
                 tracking system. Hence, there is an irregular
                 fluctuation in fault detection/removal rate during
                 testing phase. In software, the independence of
                 failures can hardly be assumed and dependency of faults
                 can also be considered as one of the factor for getting
                 irregular fluctuation. In Literature, various software
                 reliability growth models have been developed by
                 considering fault dependency with various debugging
                 time lag functions. But, none of the models have
                 incorporated irregular fluctuation in their fault
                 detection rate. Therefore, in this paper fault
                 dependency based software reliability growth models
                 have been developed by applying an It{\^o} type
                 Stochastic Differential Equations in order to
                 incorporate (i) the irregular fluctuation in the fault
                 detection process due to various uncertainty factor
                 during testing phase and (ii) irregular state of
                 software fault-report phenomena on the bug tracking
                 system. The proposed stochastic differential equation
                 based fault dependency models have been validated using
                 (i) open source software fault count data where
                 software fault-report phenomena on the bug tracking
                 system keep an irregular state and (ii) a fault
                 counting data with minor, major and critical faults.
                 The proposed models have been compared with the
                 existing fault dependency models. Various comparison
                 criteria results for goodness of fit have also been
                 presented in the paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mala:2010:QIO,
  author =       "D. Jeya Mala and V. Mohan",
  title =        "Quality improvement and optimization of test cases: a
                 hybrid genetic algorithm based approach",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--14",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764824",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software development organizations spend considerable
                 portion of their budget and time in testing related
                 activities. The effectiveness of the verification and
                 validation process depends upon the number of errors
                 found and rectified before releasing the software to
                 the customer side. This in turn depends upon the
                 quality of test cases generated. The solution is to
                 choose the most important and effective test cases and
                 removing the redundant and unnecessary ones; which in
                 turn leads to test case optimization. To achieve test
                 case optimization, this paper proposed a heuristics
                 guided population based search approach namely Hybrid
                 Genetic Algorithm (HGA) which combines the features of
                 Genetic Algorithm (GA) and Local Search (LS) techniques
                 to reduce the number of test cases by improving the
                 quality of test cases during the solution generation
                 process. Also, to evaluate the performance of the
                 proposed approach, a comparative study is conducted
                 with Genetic Algorithm and Bacteriologic Algorithm (BA)
                 and concluded that, the proposed HGA based approach
                 produces better results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Notkin:2010:ATF,
  author =       "David Notkin",
  title =        "{ACM TOSEM}: {FAQs} and Figures",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "5--6",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764811",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEb,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "6--7",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764812",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2010:PC,
  author =       "Mike Wing",
  title =        "Poetry in code",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "7--8",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764813",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ruparelia:2010:SDL,
  author =       "Nayan B. Ruparelia",
  title =        "Software development lifecycle models",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "8--13",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764814",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This history column article provides a tour of the
                 main software development life cycle (SDLC) models. (A
                 lifecycle covers all the stages of software from its
                 inception with requirements definition through to
                 fielding and maintenance.) System development lifecycle
                 models have drawn heavily on software and so the two
                 terms can be used interchangeably in terms of SDLC,
                 especially since software development in this respect
                 encompasses software systems development. Because the
                 merits of selecting and using an SDLC vary according to
                 the environment in which software is developed as well
                 as its application, I discuss three broad categories
                 for consideration when analyzing the relative merits of
                 SDLC models. I consider the waterfall model before the
                 other models because it has had a profound effect on
                 software development, and has additionally influenced
                 many SDLC models prevalent today. Thereafter, I
                 consider some of the mainstream models and finish with
                 a discussion of what the future could hold for SDLC
                 models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "14--23",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764815",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "24--32",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764816",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2010:RIS,
  author =       "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
                 Mishra",
  title =        "A report on the {``Information Systems in Distributed
                 Environments'' (ISDE) Workshop} at the {OTM 2009}
                 conferences",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "33--34",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764833",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from a one-day workshop on
                 ``Information Systems in Distributed Environments''
                 (ISDE), which was organized in conjunction with the OTM
                 Conferences 2009 in Vilamoura, Portugal, on November 3,
                 2009. The main focus of this workshop was to provide a
                 venue for the discussion of challenges related to the
                 development, operation, and maintenance of distributed
                 information systems, and their creation in the context
                 of global development projects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ben-Menachem:2010:PCV,
  author =       "Mordechai Ben-Menachem",
  title =        "Book Review: {{\booktitle{Parallel Coordinates: Visual
                 Multidimensional Geometry and its Applications}}, by
                 Alfred Inselberg, and published by Springer; 2009; ISBN
                 978-0-387-21507-5; pp. 580}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "39--39",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764834",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Safonov:2010:BRM,
  author =       "Vladimir O. Safonov",
  title =        "Book Review: {{\booktitle{Microsoft Windows
                 communication foundation: hands-on!}}, by Craig
                 McMurtry, Marc Mercuri and Nigel Watling, and published
                 by Sams Publishing, 2006 (paperback), ISBN
                 0-672-32877-1, 539 pp., \$39.99}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "40--40",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764835",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tee:2010:MEM,
  author =       "Sim-Hui Tee",
  title =        "Method efficiency model based on value relevancy",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--3",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811239",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Class methods are modules in a class that perform a
                 specific behavior. The best software practice in
                 defining a method is to assign a single task for each
                 method. It is always expected that each method should
                 carry out a unique task in its defining class. A series
                 of similar tasks are usually defined by overloaded
                 methods. Such a single-task practice of method
                 definition is seldom imposed on individual software
                 developers who extensively develop user-defined
                 methods. In this research, a method efficiency model is
                 developed with the objective of guiding the software
                 developers in developing an individual cohesive method.
                 Increased cohesion of methods is desirable because it
                 contributes to the enhancement of software
                 maintenance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sagar:2010:SCBa,
  author =       "Shrddha Sagar and N. W. Nerurkar and Arun Sharma",
  title =        "A soft computing based approach to estimate
                 reusability of software components",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--4",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811235",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based development (CBD) is the process of
                 assembling existing software components in an
                 application such that they satisfy a predefined
                 functionality. Reduced development time, effort and
                 cost are few merits of CBD. As components are
                 black-box, therefore the use of conventional metrics in
                 CBD is difficult, because these metrics needs analysis
                 of source codes. To assess the reuse of component, it
                 is important to estimate reusability of these
                 components. Present paper discusses reusability in
                 relation to CBD and proposes a reusability metrics for
                 black box components. It identifies the factors
                 affecting reusability of the components and establishes
                 relationship in between these factors and reusability.
                 Fuzzy logic based approach is used to estimate
                 reusability and results found on real time applications
                 are quite satisfactory. The proposed approach can be
                 used by the application developers to select highly
                 reusable components in the systems which will
                 eventually help in maintaining the system in a better
                 way.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Macedo:2010:MDD,
  author =       "Hendrik Macedo",
  title =        "Model driven development approach to natural language
                 generation systems",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811233",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Natural Language Generation systems have traditionally
                 been built using ad-hoc software engineering practices
                 with no explicit development process and no standard
                 software architecture. This situation has drastically
                 limited professional use of NLG technology. New
                 approaches to NLG application development that
                 considers domain-independence, languages and standards
                 of modern software engineering, could enhance its
                 practical use. This work proposes an NLG reference
                 architecture that leverages the most advanced open
                 standards in software architecture, modeling languages
                 and processing tools. In particular, it is shown how
                 dialogue-based voice-driven NLG applications can be
                 built from the up-to-date Model-driven Architecture
                 (MDA) approach. The implementation of a voice-driven
                 movie recommendation system demonstrates the
                 feasibility of the proposal.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2010:TCP,
  author =       "Yogesh Singh and Arvinder Kaur and Bharti Suri",
  title =        "Test case prioritization using ant colony
                 optimization",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811238",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Regression testing is primarily a maintenance activity
                 that is performed frequently to ensure the validity of
                 the modified software. In such cases, due to time and
                 cost constraints, the entire test suite cannot be run.
                 Thus, it becomes essential to prioritize the tests in
                 order to cover maximum faults in minimum time. In this
                 paper, ant colony optimization is used, which is a new
                 way to solve time constraint prioritization problem.
                 This paper presents the regression test prioritization
                 technique to reorder test suites in time constraint
                 environment along with an algorithm that implements the
                 technique.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Majumdar:2010:MRM,
  author =       "Dipankar Majumdar and Sabnam Sengupta and Ananya
                 Kanjilal and Swagata Kundu and Swapan Bhattacharya",
  title =        "A mathematical reusability model for quantifying the
                 reduction in development effort",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811234",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Effort and Cost Estimation is a very
                 important activity that includes very uncertain
                 elements. In the context of object-oriented software,
                 traditional methods and metrics were extended to help
                 managing this activity. Use Case Points (UCP) is a very
                 well known metrics used for estimation of
                 object-oriented systems. Use case models are used in
                 Object-Oriented Analysis for capturing and describing
                 the Functional-Requirements of a system. Several
                 methods for estimating software development effort are
                 based on attributes of a use case model. In this paper,
                 we propose a mathematical model based on vectors to
                 measure reusability of software design in terms of
                 reusability of the use cases. Increasing reusability of
                 the use case model would lead to decrease in
                 development effort. Using the vector model, we propose
                 an approach to measure Complexity Reduction Factor
                 (CRF) which measures percentage decrease in effort and
                 hence in cost with increasing reusability. This
                 quantitative analysis of effort reduction with
                 increased reusability would enable us in designing
                 reusable and cost effective software much earlier in
                 software development life cycle, right at the
                 requirement engineering phase. We have used
                 requirements of an Insurance system as a case study to
                 illustrate our approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Radhakishan:2010:CDI,
  author =       "V. Radhakishan and Yaser Farook and S. Selvakumar",
  title =        "{CRAYSE}: design and implementation of efficient text
                 search algorithm in a web crawler",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811236",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "CRAYSE1 is a SEarch WHIle CRAwl application, intended
                 to perform fast searching of text in web pages. A Web
                 crawler is a computer program that browses the World
                 Wide Web in a methodical, automated manner. This
                 process is also called spidering. Search engines, use
                 spidering as a means of providing up-to-date data. Most
                 of the existing web-crawlers archive the contents of
                 the web starting from the input URL. Search engines
                 index the results of web-crawlers and then perform
                 searching when queried. As such, the searching is not
                 performed while crawling. Hence such software can not
                 be used for general use by web browsers. Also, the
                 existing search mechanism in web browsers, search only
                 on the current page and not recursively through all the
                 links present in that page. In order to overcome such
                 disadvantages, we propose in this paper to implement a
                 web crawler that searches for a pattern efficiently and
                 recursively through all the links including pdf links
                 while crawling. CRAYSE can be used as a general purpose
                 open source software by web browsers. It can also be
                 used for offine searching. Further, the applications
                 that require selective archival of web pages (based on
                 the presence of a key word), can deploy CRAYSE for
                 efficient search operations. This paper focusses on the
                 design and implementation of CRAYSE and its
                 demonstration through web applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Campos:2010:IAC,
  author =       "Juliana Pinheiro Campos and Jos{\'e} Luis Braga and
                 Ant{\^a}nio Maria Pereira de Resende and Carlos
                 Henrique Os{\'o}rio Silva",
  title =        "Identification of aspect candidates by inspecting use
                 cases descriptions",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--9",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811231",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The identification of aspect candidates in the early
                 phases of software development process allows improving
                 the modularization of the requirements, to detect
                 conflicts early and maintain the separation of concerns
                 in the later phases of the process. However, the
                 identification of aspects in initial phases is a
                 non-trivial task, which can be costly and too
                 time-consuming. This paper presents a technique to
                 assist in the identification of aspect candidates in
                 the requirements, through inspection. Two case studies
                 were carried out to evaluate the proposed technique.
                 The results obtained from the case studies let us
                 conclude that the proposed technique facilitates the
                 identification of aspect candidates.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ratneshwer:2010:DAS,
  author =       "Ratneshwer and A. K. Tripathi",
  title =        "Dependence analysis of software component",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--9",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811237",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Dependence analysis among software components is still
                 a challenging issue for practitioners and researchers.
                 We propose the representation of dependence among
                 software components as a Component Interaction Graph
                 (CIG). We make use of a well known data structure
                 consisting of ``two linear arrays'' to represent the
                 CIG. Based on this representation, we derived some
                 dependency relationships. We evaluate the relationships
                 by Weyukers' properties. We also have demonstrated with
                 a possible CIG for a CBS to show the quantitative
                 characteristics of the derived relationships. This work
                 starts a discussion and calls for more extensive
                 research oriented studies by professionals and
                 academicians for perfection of the approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lee:2010:OIP,
  author =       "Tony Tony Lee",
  title =        "Optimizing {IT} process management",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--10",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811232",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, the author discusses some key concepts
                 in IT process management. The paper also includes the
                 recommendations in these following aspects: team
                 organization, physical environment, project selection,
                 politics, organizational communication, development
                 environment, staff development, and organizational
                 culture.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEc,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "3--4",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811227",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2010:BDM,
  author =       "Mike Wing",
  title =        "{Burt} doesn't manage",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "4--6",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811228",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2010:SEEb,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "6--7",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811229",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "8--16",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811244",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "17--23",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811245",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mandrioli:2010:SFS,
  author =       "Dino Mandrioli and Stephen Fickas and Carlo A. Furia
                 and Mehdi Jazayeri and Matteo Rossi and Michal Young",
  title =        "{SCORE}: the first student contest on software
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "24--30",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811240",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Student Contest on Software Engineering (SCORE),
                 organized for the first time in conjunction with the
                 International Conference on Software Engineering (ICSE)
                 2009, attracted 50 student teams from around the world,
                 produced an impressive and varied set of projects, and
                 earned appreciative comments from participants and even
                 from teams who chose not to submit their results to the
                 competition. It was a remarkable success, but not
                 without problems and setbacks. In this article we
                 explain the objectives, constraints, and design
                 philosophy of SCORE, particularly as they distinguish
                 it from the tradition of computer science contests
                 focused more narrowly on programming. We also recount
                 key approaches taken to design and management of this
                 novel kind of contest, the difficulties we met (some
                 still outstanding), and the lessons learned.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:BRC,
  author =       "Larry Bernstein",
  title =        "Book Review: {{\booktitle{Characterizing people as
                 non-linear, first-order components in software
                 development}}, by Alistair A. R. Cockburn and published
                 in Humans and Technology, HaT Technical Report 1999.03,
                 Oct 21, 1999}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "33--34",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811241",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ben-Menachem:2010:BRM,
  author =       "Mordechai Ben-Menachem",
  title =        "Book Review: {{\booktitle{Managing and Leading
                 Software Projects}} by Richard Fairley and published by
                 John Wiley \& Sons, Inc. with IEEE Computer Society
                 2009, (hardback), ISBN 978-0470-29455-0, pp. 510}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "34--34",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811242",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ben-Menachem:2010:BRR,
  author =       "Mordechai Ben-Menachem",
  title =        "Book Review: {{\booktitle{Reactive Systems: Modelling,
                 Specification and Verification}} by L. Aceto, et al.;
                 and published by Cambridge University Press;
                 distributed by Cambridge University Press; 2007,
                 (hardback), ISBN 978-0-521-87546-2, pp. 300}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "34--35",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811243",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rogers:2010:BRG,
  author =       "David S. Rogers",
  title =        "Book Review: {{\booktitle{Geometric Spanner Networks}}
                 by Giri Narasimhan and Michael Smid, and published by
                 Cambridge University Press, 2007, Hardback ISBN
                 978-0-521-81513-0, 500 pp., \$105}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "35--35",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811246",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fazal-e-Amin:2010:PES,
  author =       "Fazal-e-Amin and Ahmad Kamil Mahmood and Alan Oxley",
  title =        "Proposal for evaluation of software reusability
                 assessment approach employing a mixed method",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838703",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software engineering, as an engineering discipline, is
                 still quite young as compared to other engineering
                 disciplines. The software engineering research
                 community has made enormous contributions in past
                 decades to lay down its foundations. However, the
                 research methodologies in software engineering are
                 still not mature. One of the reasons in this regard is
                 the inherent complexity of this field. In this paper,
                 we focus on one aspect of this field --- the evaluation
                 of reusability assessment approaches. We begin by
                 reviewing existing ways of comparing reusability
                 assessment approaches. Following this we propose a
                 different approach. This includes a mixture of both
                 subjective and objective evaluation of a reusability
                 assessment approach. This is novel in that we feel that
                 subjective evaluation has been neglected by other
                 approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Banerjee:2010:RSS,
  author =       "C. Banerjee and S. K. Pandey",
  title =        "Research on software security awareness: problems and
                 prospects",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838701",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "People attack software deliberately to steal highly
                 sensitive as well as personal information with the sole
                 intention of carrying out well-funded, destructive and
                 unethical goals that could harm individuals, nations or
                 the whole world. Available technological controls could
                 be implemented to tighten access and minimize
                 persistent threats but the complete solution of secure
                 software could only be provided by changing the
                 behavior of the people involved. This can be achieved
                 through effective security awareness techniques
                 implemented by individuals because they are, in most
                 cases, the first target for gaining access into the
                 system. This paper highlights the utility of security
                 awareness with the help of recent published work for
                 building more secure software. In addition, areas that
                 need further investigations are identified in the
                 paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nerurkar:2010:ARA,
  author =       "N. W. Nerurkar and Avadhesh Kumar and Pallavi
                 Shrivastava",
  title =        "Assessment of reusability in aspect-oriented systems
                 using fuzzy logic",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838706",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Reusability of the software systems is becoming a very
                 important factor due to rapid software development and
                 increasing complexity. Software reusability improves
                 the quality of software product by reducing development
                 time, effort and cost. Researchers have explored many
                 methodologies in order to assess the reusability of
                 Object-Oriented (OO) software systems but the
                 assessment of the reusability of Aspect-Oriented (AO)
                 software systems is underexplored. Aspect-Oriented
                 Software Development (AOSD) is an emerging paradigm
                 that aims to modularize the crosscutting concerns in an
                 application, which cannot be modularized using
                 traditional procedure-oriented and object-oriented
                 approaches. By applying an aspect-oriented approach,
                 such concerns can be isolated resulting in the increase
                 maintainability and reusability of the system. In this
                 paper, we propose a reusability model for
                 aspect-oriented systems and assess it using fuzzy logic
                 technique.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sagar:2010:SCBb,
  author =       "Shrddha Sagar and N. W. Nerurkar and Arun Sharma",
  title =        "A soft computing based approach to estimate
                 reusability of software components",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838707",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based development (CBD) is the process of
                 assembling existing software components in an
                 application such that they satisfy a predefined
                 functionality. Reduced development time, effort and
                 cost are few merits of CBD. As components are
                 black-box, therefore the use of conventional metrics in
                 CBD is difficult, because these metrics needs analysis
                 of source codes. To assess the reuse of component, it
                 is important to estimate reusability of these
                 components. Present paper discusses reusability in
                 relation to CBD and proposes a reusability metrics for
                 black box components. It identifies the factors
                 affecting reusability of the components and establishes
                 relationship in between these factors and reusability.
                 Fuzzy logic based approach is used to estimate
                 reusability and results found on real time applications
                 are quite satisfactory. The proposed approach can be
                 used by the application developers to select highly
                 reusable components in the systems which will
                 eventually help in maintaining the system in a better
                 way.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2010:AFF,
  author =       "Yogesh Singh and Pradeep Kumar",
  title =        "Application of feed-forward neural networks for
                 software reliability prediction",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838709",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Many analytical models have been proposed for modeling
                 software reliability growth trends with different
                 predictive capabilities at different phases of testing
                 yet there still is a need to develop a model that can
                 be applied for accurate predictions in a realistic
                 environment. In this paper we describe a software
                 reliability prediction model using feed-forward neural
                 network for better reliability prediction through
                 back-propagation algorithm and discuss the issues of
                 network architecture and data representation methods.
                 We demonstrate a comparative analysis between the
                 proposed approach and three well known software
                 reliability growth prediction models using seven
                 different failure datasets collected from standard
                 software projects to test the validity of the presented
                 method. A numerical example also has been cited to
                 illustrate the results that revealed significant
                 improvement by using Artificial Neural Network (ANN)
                 over conventional statistical models based on NHPP.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gill:2010:NCM,
  author =       "Nasib S. Gill and Sunil Sikka",
  title =        "New complexity model for classes in object oriented
                 system",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838704",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Minimizing software complexity is the foremost
                 objective of each software development paradigm because
                 it affects all other attributes of software such as
                 maintainability, reliability, testability, reusability
                 etc. Measuring software complexity is always essential
                 for predicting fault proneness, computing development
                 efforts and evaluating maintainability of software.
                 This paper proposes a complexity model for classes in
                 object oriented systems. The model computes Class
                 Complexity (CC) as a sum of Method Complexity (MC) and
                 MC is further computed as a sum of Control Flow
                 Complexity (CFC), Total Method Call Complexity (TMCC)
                 and Total Data Call Complexity (TDCC). CFC is computed
                 using McCabe's cyclomatic complexity. TMCC and TDCC are
                 computed with adherence to the principle that ``The
                 higher the number of classes involved in method/data
                 calls and polymorphic method calls, makes the object
                 oriented software difficult to understand and
                 maintain''. The proposed model is also compared with
                 four Chidamber's and Kemerer's metrics-Weighted Methods
                 per Class (WMC), Response For a Class (RFC), Depth of
                 Inheritance Tree (DIT) and Coupling Between Objects
                 (CBO).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Long:2010:TDSa,
  author =       "Brad Long",
  title =        "Towards the design of a set-based {Java} collections
                 framework",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838705",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Java Collections Framework (JCF) was introduced as
                 standard in JDK 1.2. Since then several significant
                 enhancements have been made including the introduction
                 of generics and typed collections. One striking design
                 choice of the Java language designers was the exclusion
                 of map from the collections hierarchy. This paper looks
                 at how maps could be incorporated into the Java
                 collections hierarchy by describing early work on YACL
                 (Yet Another Collections Library). The intention of
                 YACL is to provide a suite of set-based collections
                 classes and operations whilst continuing to be
                 compatible with the JCF.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2010:EES,
  author =       "Ashish Sharma and Dharmender Singh Kushwaha",
  title =        "Early estimation of software complexity using
                 requirement engineering document",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838708",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There has been a continuous effort to estimate
                 software complexity but very little established methods
                 exist that can estimate the complexity of the software
                 before it is written. Since a high quality Software
                 Requirement Specification (SRS) is a pre requisite for
                 high quality software, this work attempts to
                 empirically demonstrate that the complexity of the code
                 can be determined based on its IEEE software
                 requirement specification document (IEEE 830-1998).
                 Existing complexity measures established are based on
                 the code and the cognitive metrics value of the
                 software. This may require recoding leading to loss of
                 time and cost. Considering the shortcoming of
                 code-based approaches, our proposed approach is able to
                 compute the complexity of yet-to-be-written software
                 immediately after freezing the requirement in the
                 Software development Lifecycle (SDLC) process. The
                 proposed complexity measure compares well with
                 established complexity measures like Halstead, Mc Cabe,
                 KLCID, CFS and CICM. Results obtained show that the
                 complexity values are comparable with other established
                 measures. The robustness of our complexity measure is
                 established by evaluating our measure against Weyuker
                 properties.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yazbek:2010:CQA,
  author =       "Hashem Yazbek",
  title =        "A concept of quality assurance for metrics in
                 {CASE-tools}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838711",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The quality of software has become more important to
                 software companies in the past years. Software
                 measurement is one of many approaches that is used to
                 check the quality of software [18]. This may involve
                 measuring some attributes of a software product or a
                 software process and comparing these measurements to
                 each other or to some desirable level. A software
                 metric is ``any type of measurement that relates to a
                 software system, process or related documentation''
                 [7]. Software metrics can help to improve the quality
                 of the produced software. However, metrics and metrics
                 tools are still not used in most software companies ---
                 for example in the 3 companies where we cooperated in
                 last 5 years. One reason is that there is lack of
                 knowledge about metrics and hence software metrics are
                 still unknown or difficult to use for some developers,
                 and software measurement is still time-consuming for
                 managers. Another reason is that, good metrics tools
                 are still expensive for small and middle companies. In
                 our opinion the effectiveness of metrics can be
                 improved by simple organizational expedients. In this
                 paper we present new/adapted requirements on metrics in
                 CASE tools to define flexible product quality models.
                 For this quality model we tried to use some standard
                 techniques, e.g. metrics suite, metrics visualization
                 or metrics filtering to show how metrics in CASE tools
                 can be defined and how it can benefit different people
                 who are involved in a software deployment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chatterjee:2010:PAA,
  author =       "Ram Chatterjee and Kalpana Johari",
  title =        "A prolific approach for automated generation of test
                 cases from informal requirements",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--11",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838702",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Specification-based testing begins with the
                 documentation of customers' requirements. This informal
                 depiction of requirements needs to undergo
                 formalization for effective test case generation to
                 corroborate specification-based testing so as to
                 catapult validation testing. In this paper, we discuss
                 a credible approach for test suite generation by
                 formalizing the informal requirements that further
                 proves prolific in pioneering effective test case
                 generation. The endeavor is directed towards testing
                 software in the absence of source code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Upadhyay:2010:DMI,
  author =       "Nitin Upadhyay and Bharat M. Deshapande and Vishnu P.
                 Agrawal",
  title =        "Developing maintainability index of a software
                 component: a digraph and matrix approach",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--11",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838710",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper describes a methodology based on a digraph
                 and matrix approach for developing the maintainability
                 (characteristic) index of a software component.
                 Sub-characteristics and associated attributes of a
                 component that characterize maintainability are
                 identified and modelled in terms of maintainability
                 digraph. The nodes in the digraph represent
                 maintainability sub-characteristics and edges represent
                 interactive complexity among the subcharacteristics. A
                 detailed procedure for the maintainability analysis of
                 component is suggested through a maintainability
                 function. The maintainability index (Im) is obtained
                 from VPF --- m (i.e. permanent of the matrix) by
                 substituting the numerical values of the
                 sub-characteristics and their interactions. The concept
                 of hypothetical best index and hypothetical worst index
                 is also proposed, which will help system developers to
                 identify relative comparison of candidates from
                 hypothetical best and hypothetical worst indices and
                 designers and developers to improve the component
                 maintainability characteristic (looking upon critical
                 attributed factors) by performing sensitivity analysis.
                 A higher value of the VPF --- m implies better
                 maintainability of a component. An example is also
                 presented to demonstrate and validate the effectiveness
                 of the methodology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEd,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "4--5",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838688",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Berliner:2010:EDC,
  author =       "Brian Berliner and Nayan B. Ruparelia",
  title =        "Early days of {CVS}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "5--6",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838689",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The topic of this article is to discuss the early days
                 of CVS, from the late 1980s to the mid 1990s. First, a
                 timeline depicting key milestones for those early days
                 is discussed and this is followed by an interview with
                 Brian Berliner, the creator of CVS in C. This article
                 concludes with a reading list on CVS for further
                 study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "8--17",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838690",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "18--24",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838691",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chan:2010:STR,
  author =       "Wing Kwong Chan and Christof J. Budnik and Gregory M.
                 Kapfhammer",
  title =        "Software testing research in practice: report on the
                 {5th International Workshop on the Automation of
                 Software Test}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "25--26",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838692",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 5th Workshop on the Automation of Software Test
                 co-located with ICSE 2010 provides a publication forum
                 that bridges the gap between the theory and practice of
                 automated testing. The workshop featured a twoday high
                 quality programs with a multi-session charette on
                 integration testing. Researchers shared with us their
                 insights on software testing through 15 regular papers
                 and 6 case-study papers were presented in six sessions
                 at the workshop. This report summarizes the
                 organization of the workshop as well as the sessions
                 and papers presented, the results of the charette
                 session, attendee feedback, and lessons learned.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dittrich:2010:CHA,
  author =       "Yvonne Dittrich and Helen Sharp and Heike Winshiers
                 Theophilus and Cleidson {De Souza} and Mikko Korpela
                 and Janice Singer",
  title =        "Cooperative and human aspects of software engineering:
                 {CHASE} 2010",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "27--29",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838693",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software is created by people --- software engineers
                 in cooperation with domain experts, users and other
                 stakeholders--in varied environments, under various
                 conditions. Thus understanding cooperative and human
                 aspects of software development is crucial to
                 comprehend how and which methods and tools are
                 required, to improve the creation and maintenance of
                 software. The 3rd workshop on Cooperative and Human
                 Aspects of Software Engineering held at the
                 International Conference on Software Engineering
                 continued the tradition from earlier workshops and
                 provided a lively forum to discuss current developments
                 and high quality research in the field. Further
                 dissemination of research results will lead to an
                 improvement of software development and deployment
                 across the globe.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lewis:2010:RIW,
  author =       "Grace Lewis and Dennis Smith and Andreas Metzger and
                 Andrea Zisman and Marco Pistore",
  title =        "Report of the {2nd International Workshop on
                 Principles of Engineering Service-Oriented Systems
                 (PESOS 2010)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "30--33",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838694",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Second International Workshop on Principles of
                 Engineering Service-Oriented Systems (PESOS 2010) was
                 held at the International Conference on Software
                 Engineering, ICSE 2010 on May 1 and 2, 2010. PESOS 2010
                 provided a forum for presenting and discussing current
                 work and research topics related to service-oriented
                 systems. The workshop had keynotes on SOA testing
                 challenges and adaptive service-oriented systems. There
                 were four paper sessions on the topics of service
                 development, testing and evolution of service-oriented
                 systems, service adaptation, and quality of service
                 (QoS) and Service-Level Agreements (SLAs) in
                 service-oriented environments. General discussions
                 focused on these overall themes. These discussions
                 resulted in the identification of research challenges
                 for the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Geihs:2010:RAI,
  author =       "Kurt Geihs and Stefan Gruner and Kay R{\"o}mer",
  title =        "Report about {1st ICSE Workshop on Software
                 Engineering for Sensor Network Applications (SESENA
                 2010)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "34--37",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838695",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "SESENA 2010, the First International Workshop on
                 Software Engineering for Sensor Network Applications,
                 took place under the umbrella of ICSE 2010, the 32nd
                 ACM/IEEE International Conference on Software
                 Engineering, in Cape Town, South Africa, in May 2010.
                 This post-workshop report summarizes the aims and
                 motivation as well as the technical contributions. See
                 also our workshop website at http://www.sesena.info/.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lago:2010:OSA,
  author =       "Patricia Lago and Paris Avgeriou and Philippe
                 Kruchten",
  title =        "Organizing a software architecture body of knowledge:
                 summary of the {5th SHARK} workshop, at {ICSE 2010}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "37--40",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838696",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Architectural Knowledge (AK) is defined as the
                 integrated representation of the software architecture
                 of a software-intensive system or family of systems
                 along with architectural decisions and their rationale,
                 external influence and the development environment. A
                 fifth workshop on Sharing and Reusing Architectural
                 Knowledge (SHARK) was held jointly with ICSE 2010 in
                 Cape Town, South Africa. The theme of this workshop was
                 the organization of a body of knowledge for software
                 architecture knowledge management. It featured thirteen
                 research position statements and three working groups
                 that discussed on focused topics. This report
                 summarizes the results of the discussions we held, and
                 suggests some topics for future research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hall:2010:IIW,
  author =       "Jon G. Hall and Lucia Rapanotti and Liping Zhao and
                 James Naish",
  title =        "{2010 ICSE International Workshop on Advances and
                 Applications of Problem Orientation (WAAPO-2010)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "40--41",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838697",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software problems originate in real world problems. A
                 software solution must address its real world problem
                 in a satisfactory way. A software engineer must
                 therefore understand the real world problem that their
                 software intends to address. To be able to do this, the
                 software engineer must understand the problem context
                 and how it is to be affected by the proposed software,
                 expressed as the requirements. Without this knowledge
                 the engineer can only hope to chance upon the right
                 solution for the problem. Application of
                 problem-oriented approaches may well be a way of
                 meeting this challenge. This article reports on
                 IWAAPO-2010, an ICSE workshop concerned with recent
                 developments in problem-oriented approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Knutson:2010:RIW,
  author =       "Charles D. Knutson and Jonathan L. Krein and Lutz
                 Prechelt and Natalia Juristo",
  title =        "Report from the {1st International Workshop on
                 Replication in Empirical Software Engineering Research
                 (RESER 2010)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "42--44",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838698",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The RESER 2010 Workshop, held on May 4, 2010 in Cape
                 Town, South Africa was co-located with the 32nd
                 International Conference on Software Engineering (ICSE
                 2010). The workshop provided a venue in which empirical
                 Software Engineering researchers could present and
                 discuss the theoretical foundations and methods of
                 replication, as well as the results of specific
                 replicated studies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Treude:2010:WRW,
  author =       "Christoph Treude and Margaret-Anne Storey and Kate
                 Ehrlich and Arie van Deursen",
  title =        "Workshop report from {Web2SE}: {First Workshop on Web
                 2.0 for Software Engineering}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "45--50",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838699",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web 2.0 technologies such as wikis, blogs, tags and
                 feeds have been adopted and adapted by software
                 engineers. With Web2SE, we provide a venue for
                 pertinent work by highlighting current state-of-the-art
                 research, by identifying research areas, and by
                 discussing implications of Web 2.0 on software
                 engineering. This paper reports on the paper
                 presentations and the discussions among participants at
                 Web2SE 2010 as well as on future directions of the
                 Web2SE community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Canfora:2010:IWE,
  author =       "Gerardo Canfora and Giulio Concas and Michele Marchesi
                 and Ewan Tempero and Hongyu Zhang",
  title =        "{2010 ICSE Workshop on Emerging Trends in Software
                 Metrics}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "51--53",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838700",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper reports on the 2010 ICSE Workshop on
                 Emerging Trends in Software Metrics (WETSoM 2010) held
                 on Tuesday 4 May 2010 in Cape Town, South Africa, as
                 part of the ICSE workshop series. The goal of this
                 workshop was to bring together researchers and
                 practitioners to discuss the progress of software
                 metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dekhane:2010:IAT,
  author =       "Sonal Dekhane",
  title =        "Install anywhere tutorial and reference guide by Zero
                 G Team",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "57--57",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862451",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Werden:2010:BRT,
  author =       "David A. Werden",
  title =        "Book Review: {{\booktitle{TCP\slash IP architecture,
                 design, and implementation in Linux}} by Sameer Seth
                 and M. Ajaykumar Venkatesulu}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "57--57",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862452",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2010:BRD,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{The design of design: essays
                 of a computer scientist}} by Frederick R. Brooks,
                 Jr.}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "58--58",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862455",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2010:BRM,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{Making it big in software:
                 get the job, work the org, become great}} by Sam
                 Lightstone}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "58--58",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862453",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2010:BRR,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{Remarkable Engineers: From
                 Riquet to Shannon}} by Ioan James}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "58--58",
  month =        oct,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862454",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Fri Jul 21 10:34:15 2017",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "http://dl.acm.org/citation.cfm?doid=1838687.1862454",
  acknowledgement = ack-nhfb,
  acmid =        "1862454",
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
  pagecount =    "1",
  subject-dates = "Claude Elwood Shannon (1916--2001)",
}

@Article{Dubey:2010:AUM,
  author =       "Sanjay Kumar Dubey and Ajay Rana",
  title =        "Assessment of usability metrics for object-oriented
                 software system",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874400",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The demand for efficient software is increasing day by
                 day. For this reason software developers need
                 appropriate metrics for the development of software
                 applications. Usability is one of the most important
                 fields in software engineering and a highly focused
                 quality factor. It is a key factor in the development
                 of successful software applications. Object-oriented
                 design techniques have become one of the most powerful
                 mechanisms to develop efficient software system.
                 Object-oriented software can play important role in
                 usability for software applications. It can not only
                 help in reducing the cost but also in developing highly
                 usable software systems. This paper focuses some
                 important issues and analyzes the relationship between
                 usability and object-oriented metrics",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2010:PMS,
  author =       "Amit Mishra and Sanjay Misra",
  title =        "People management in software industry: the key to
                 success",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874402",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Performance differences have been proved among
                 software professionals even in the conditions of
                 identical task. Companies and organizations are aware
                 of the fact that talent has great effect on their
                 success; still most of the software development
                 organizations are focusing so much on tools and
                 technology and little on people. In this paper, we are
                 trying to uncover the relation between the people
                 management-human resource management and software
                 engineering.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tee:2010:MCC,
  author =       "Sim-Hui Tee",
  title =        "Measuring class cohesion using mutant methods",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874409",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Class cohesion is a measure of software quality and
                 maintainability. A highly cohesive class implies that
                 its modules are functionally coherent and integrated.
                 To date, there are varying cohesion metrics that
                 measure class cohesion from different perspectives.
                 These metrics use different computation in the
                 evaluation of class cohesion. Novice software
                 developers have no access to the class cohesion of a
                 particular class if they are not familiar with these
                 metrics. In this paper, we provide a quick technique to
                 measure class cohesion without using complicated
                 calculation. We delimit our technique to measure class
                 cohesion in term of attribute sharing and method
                 invocation. We contend that the observation of the
                 impact of mutant methods provides a quick judgement on
                 the cohesion status. The proposed approach enables
                 novice software developers to quickly evaluate the
                 cohesion status of a class",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2010:ATD,
  author =       "Anup Kumar Bandyopadhyay and Nibedita Lenka",
  title =        "Application of {TLRO} to dining philosophers problem",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874397",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Recently modeling of a state transition rule has been
                 proposed using a temporal logic based on observation
                 (TLRO). The advantage of such representation lies in
                 the fact that the model is derived from the related
                 cause and effect relation and is expressed as an
                 implication. This structure makes manipulation easy.
                 Unlike weakest precondition calculus that can only
                 reason backward in time, present model can include both
                 backward and forward temporal reasoning. This is
                 therefore more expressive. In this paper TLRO based
                 modeling is used to derive three different deadlock
                 free solutions for Dining Philosophers problem. All
                 this solutions are proved using this model",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2010:SOM,
  author =       "Anup Kumar Bandyopadhyay",
  title =        "Spatial ordering of messages in a cyclic
                 architecture",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874398",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Spatial ordering of messages can be used fruitfully
                 for the design of distributed systems. For modeling
                 such systems we require a logical framework that
                 includes both spatial and temporal ordering predicates.
                 In order to illustrate its applicability a distributed
                 K mutual exclusion algorithm is proposed that requires
                 a unidirectional cyclic topology for its
                 implementation. The algorithm uses only point to point
                 communication rather than broadcast. It is shown that
                 the topological ordering of messages is important for
                 its correct operation",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhat:2010:CVB,
  author =       "Shubha Bhat and Vindhya Malagi and Krishnan Rangarajan
                 and Ramesh Babu",
  title =        "Computer vision based guidance in {UAVs}: software
                 engineering challenges",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874399",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper we discuss the key functional and
                 quality attribute requirements and the associated
                 design challenges in engineering a computer vision
                 guided UAV (Unmanned Aerial Vehicle) system. The
                 non-functional requirements of the UAV system as a
                 whole are identified and mapped to the computer vision
                 subsystem which aids in the navigation process.
                 Expectations on availability, reliability, performance,
                 security and evolution of the vision subsystemware
                 discussed and the related software design challenges
                 elaborated",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nair:2010:DPM,
  author =       "T. R. Gopalakrishnan Nair and Sri Aravindh and R.
                 Selvarani",
  title =        "Design property metrics to maintainability estimation:
                 a virtual method using functional relationship
                 mapping",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874404",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software maintenance is a vital component that every
                 company has to face when their product is delivered to
                 the stakeholders. This task may span for more than ten
                 years at the customer site. The cost of maintenance or
                 keeping software operational consumes 60-70\% of its
                 entire life cycle cost. Defining maintainability at the
                 design stage of the software development life cycle
                 (SDLC) will result in a cost effective product. In this
                 paper, we proposed a design time relationship model
                 between design properties and the maintainability of
                 the software. This analysis is performed based on the
                 influence of object oriented design metrics on software
                 maintainability",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Long:2010:TDSb,
  author =       "Brad Long",
  title =        "Towards the design of a set-based {Java} collections
                 framework",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874401",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Java Collections Framework (JCF) was introduced as
                 standard in JDK 1.2. Since then several significant
                 enhancements have been made including the introduction
                 of generics and typed collections. One striking design
                 choice of the Java language designers was the exclusion
                 of map from the collections hierarchy. This paper looks
                 at how maps could be incorporated into the Java
                 collections hierarchy by describing early work on YACL
                 (Yet Another Collections Library). The intention of
                 YACL is to provide a suite of set-based collections
                 classes and operations whilst continuing to be
                 compatible with the JCF",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Panigrahi:2010:MBR,
  author =       "Chhabi Rani Panigrahi and Rajib Mall",
  title =        "Model-based regression test case prioritization",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874405",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We propose a model-based regression test case
                 prioritization technique for object-oriented programs.
                 Our technique involves constructing a graph model of
                 the source code to represent control and data
                 dependences as well as static object relations such as
                 inheritance, aggregation and association. We construct
                 a forward slice of the model to identify all the model
                 elements that may be affected by a change.
                 Subsequently, the model elements are marked with the
                 specific test case(s) testing it. We construct backward
                 slice with respect to each model element executed by a
                 test case to determine all elements indirectly tested
                 by the test case. Then all the affected model elements
                 and the elements being tested are used to prioritize
                 test cases. Empirical studies carried out by us show
                 that our technique increases the detection of number of
                 faults on an average of 30 percent as compared to
                 traditional approaches in detecting regression errors",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Suri:2010:AGD,
  author =       "P. K. Suri and Gurdev Singh",
  title =        "Automatic generation of design search keywords from
                 software specifications to improve design search
                 results",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874408",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Design Notation Storage and Inference
                 Mechanism (DNSIM) is capable of storing software
                 designs by using Design Markup Language (DGML) tags and
                 reusing existing design elements to produce new
                 software designs. This mechanism performs search
                 operations on stored designs. The accuracy of the
                 search results depends upon the correctness of the
                 keywords provided to the search process. The challenge
                 is to input the Software Requirement Specification
                 (SRS) document as a search input to DNSIM and to
                 produce the best possible design from existing design
                 elements. This paper proposes a method to produce
                 requirement specification keywords from the formal
                 representation of the SRS. The DNSIM system uses the
                 keywords produced by our method and shows significant
                 improvements and accuracy in the design search
                 results",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mohanta:2010:AEP,
  author =       "Sirsendu Mohanta and Gopika Vinod and A. K. Ghosh and
                 Rajib Mall",
  title =        "An approach for early prediction of software
                 reliability",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874403",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the early stages of development, failure
                 information is not available to quantitatively measure
                 reliability of a software product. In this context, we
                 propose an approach to predict software reliability
                 early in the product development stages from design
                 metrics. First we predict reliabilities of the
                 components of a system. For this, we categorize the
                 different kinds of faults that can occur in a component
                 during its development and identify the design metrics
                 that correlate to these faults. We construct a Bayesian
                 Belief Network (BBN) model to predict reliabilities of
                 the components using the identified design metrics.
                 Based on predicted reliabilities and usage frequencies
                 of the components of a system, we determine the
                 reliability of the system. The applicability of our
                 proposed model is illustrated through a case study.
                 Results obtained from our case study indicate the
                 effectiveness of our approach",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sengupta:2010:EME,
  author =       "Abhik Sengupta and Vivek Nandey and Sabnam Sengupta",
  title =        "{ETDSOA}: a model for event and time driven service
                 oriented architecture",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874407",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture (SOA) is the paradigm
                 for IT architecture definition that has been recognized
                 by the industry and analyst groups as a new enterprise
                 architectural technique with the potential to transform
                 businesses into agile enterprises. This paper discusses
                 the emergent variant of Event and Time driven SOA
                 (ETDSOA) and discusses application areas. It proposes a
                 technique for conversion of a traditional and classical
                 SOA viewpoint into one of ETDSOA. The paper provides a
                 model for depicting a representative process flow
                 following the ETDSOA paradigm, using traditional
                 modeling constructs. This can be used gainfully to
                 design solutions following the ETDSOA paradigm with any
                 commonly available standard SOA framework. The inputs
                 can be used as well, for initially implementing the
                 framework with the benefit of improving ETDSOA solution
                 development",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2010:LSM,
  author =       "Robert Schaefer",
  title =        "The limits of systems-making organizations",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--20",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874406",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper provides an ontology of organizational
                 structures intended for software-intensive
                 systems-making. An archetype is presented and scaled in
                 stages to support larger, more complex projects.
                 Artifacts at each stage are identified and analyzed.
                 The first artifact analyzed is the engine of scaling,
                 specialization. Organizations that have been scaled for
                 the purpose of developing large complex systems will be
                 shown to themselves become large and complex, in part
                 for matching the problem to be solved but also for
                 self-management. Specialization first occurs with the
                 separation of the role of designer into designers and
                 managers whereby the designer's role and activities can
                 be abstracted into a limited set of objects to be
                 manipulated by managers. Design is transformed into a
                 model of design. The problem (or challenge) for
                 managers is of normalization of dysfunction, whereby
                 the model becomes both mistaken for and more valued
                 than the object modeled. The result of having
                 transformed essential roles and activities into objects
                 in a hierarchical organization will be shown to (one)
                 increase the positive effects on managing large-scale
                 organizations, (two) increase the negative effects on
                 design outcomes and (three) prevent the logical
                 association of item one with item two. Disassociations
                 incurred through specialization and normalization of
                 dysfunction will be shown to be counter-productive in
                 that they create and sustain high process but low sense
                 organizations. Conclusions will be presented on the
                 nature of large organizations, on the nature of their
                 risk evaluations, and on the inevitability of
                 dysfunctions and pathologies to lead not only to
                 project failure but also to immediately forget the
                 same",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEe,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "5--5",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874392",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2010:M,
  author =       "Mike Wing",
  title =        "The making of",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "5--7",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874393",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2010:SEEc,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software Engineering Education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "7--8",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874394",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSe,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "9--18",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874395",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPe,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "19--26",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874396",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tribbey:2010:BRN,
  author =       "Will Tribbey",
  title =        "Book Review: {{\booktitle{Numerical Recipes: The Art
                 of Scientific Computing}} (3rd Edition) by William H.
                 Press, Saul A. Teukolsky, William T. Vetterling, and
                 Brian P. Flannery, and published by Cambridge
                 University Press, 2007, hardback, ISBN
                 978-0-521-88068-8, 1235 pp.}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "30--31",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.187410",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Miyachi:2011:ASA,
  author =       "Christine Miyachi",
  title =        "Agile software architecture",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--3",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943388",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "When the Agile software development became popular in
                 software development communities, some engineers
                 thought that software architecture would die out. But
                 no matter what, a software project will have an
                 architecture, whether documented intentionally or
                 created on the fly. Software Architecture should enable
                 Agile development methods by itself being Agile. But
                 how? In this paper, I will discuss my experience of
                 doing architecture in an Agile way and in a non-Agile
                 way. Have an architecture that follows the Agile
                 principles is key to obtaining success in an Agile
                 development environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rech:2011:AEE,
  author =       "J{\"o}rg Rech and Eric Ras",
  title =        "Aggregation of experiences in experience factories
                 into software patterns",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--4",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943390",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In software engineering Experience Factories have been
                 in use for a long time to store and manage experiences
                 from software projects, typically in large
                 organizations. Beside the preservation of quantitative
                 or numerical experiences, e.g., in form of project
                 effort data or data from empirical studies, many
                 experience factories also preserve subjective or
                 qualitative experiences, e.g., in form of observations
                 or lessons learned from the projects. A key issue of
                 experience management is to aggregate these documented
                 experiences into more valuable software patterns. In
                 this article we report about the aggregation (i.e.,
                 formalization and generalization) of documented
                 experiences in an experience factory to software
                 patterns. Observations from real-world projects are
                 formalized (i.e., structurally contextualized) into
                 semi-formal experiences and, over time, several similar
                 of these experiences are generalized (i.e.,
                 systematically decontextualized) into software
                 patterns.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kayes:2011:ATI,
  author =       "Imrul Kayes",
  title =        "Agile Testing: Introducing {PRAT} as a Metric of
                 Testing Quality in {Scrum}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943384",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Scrum methodology has originated from agile software
                 develop-ment as an elixir to software projects which
                 are behind the sche-dule or which are highly likely to
                 have a problematic development phase. Also unlike any
                 other agile methodology, scrum is adaptive in nature.
                 This paper presents a metric that focuses on measuring
                 test quality in scrum. As product quality and process
                 quality is closely correlated, improved test quality
                 can ensure high quality deliverable product. Proposed
                 metric measures test quality of each sprint/ iteration
                 of scrum based upon some factor ratings which can be
                 used to get a comprehensive test quality overview of
                 testing process over longer periods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krishna:2011:APV,
  author =       "Raj P. M. Krishna and K. G. Srinivasa",
  title =        "Analysis of Projects and Volunteer Participation in
                 Large Scale Free and Open Source Software Ecosystem",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943389",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The ecology of Free and Open Source Software (FOSS) is
                 dotted by projects of every kind ranging from small
                 desktop applications to large mission critical systems.
                 To enable maximum visibility among the developer
                 community, these projects are often hosted in community
                 project management portals. The current work studies
                 one such portal, sourceforge. net by analysing the data
                 of 200,000 projects and 2 million developers for the
                 period Feb 2005 to Aug 2009. The scope of the present
                 study includes the analysis of developer contribution.
                 The slow growth rate of developer community and high
                 number of single developer projects are the major
                 findings of the present work.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sorkin:2011:LPG,
  author =       "Arthur Sorkin and Peter Donovan",
  title =        "{LR(1)} parser generation system: {LR(1)} error
                 recovery, oracles, and generic tokens",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943391",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The LR(1) Parser Generation System generates full
                 LR(1) parsers that are comparable in speed and size to
                 those generated by LALR(1) parser generators, such as
                 yacc [5]. In addition to the inherent advantages of
                 full LR(1) parsing, it contains a number of novel
                 features. This paper discusses three of them in detail:
                 an LR(1) grammar specified automatic error recovery
                 algorithm, oracles, and generic tokens. The error
                 recovery algorithm depends on the fact that full LR(1)
                 parse tables preserve context. Oracles are pieces of
                 code that are defined in a grammar and that are
                 executed between the scanner and parser. They are used
                 to resolve token ambiguities, including semantic ones.
                 Generic tokens are used to replace syntactically
                 identical tokens with a single token, which is, in
                 effect, a variable representing a set of tokens.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bishnu:2011:AKM,
  author =       "P. S. Bishnu and V. Bhattacherjee",
  title =        "Application of {K-Medoids} with {Kd}-Tree for Software
                 Fault Prediction",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943381",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software fault prediction area is subject to problems
                 like non availability of fault data which makes the
                 application of supervised techniques difficult. In such
                 cases unsupervised approaches like clustering are
                 helpful. In this paper, K-Medoids clustering approach
                 has been applied for software fault prediction. To
                 overcome the inherent computational complexity of
                 KMedoids algorithm a data structure called Kd-Tree has
                 been used to identify data agents in the datasets.
                 Partitioning Around Medoids is applied on these data
                 agents and this results in a set of medoids. All the
                 remaining data points are assigned to the nearest
                 medoids thus obtained to get the final clusters.
                 Software fault prediction error analysis results show
                 that our approach outperforms all unsupervised
                 approaches in the case of one given real dataset and
                 gives best values for the evaluation parameters. For
                 other real datasets, our results are comparable to
                 other techniques. Performance evaluation of our
                 technique with other techniques has been done. Results
                 show that our technique reduces the total number of
                 distance calculations drastically since the number of
                 data agents is much less than the number of data
                 points.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dubey:2011:UES,
  author =       "Sanjay Kumar Dubey and Ajay Rana",
  title =        "Usability Estimation of Software System by using
                 Object-Oriented Metrics",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943382",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Usability is one of the most important quality factors
                 in the fields of software engineering and an important
                 issue in the development of successful software
                 applications. To develop efficient software systems,
                 software developers need appropriate metrics.
                 Object-oriented metrics can play important role in the
                 development of successful and usable software
                 applications because object-oriented design techniques
                 have become one of the most powerful mechanisms to
                 fulfill the demand of efficient software systems.
                 Currently there are no comprehensive criteria for
                 estimating usability by using object-oriented metrics.
                 This paper focuses on usability and presents a
                 comparative analysis of various usability models and
                 metrics. It then analyzes the relationship between
                 usability and object-oriented metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2011:DMI,
  author =       "Kulwant Kaur and Hardeep Singh",
  title =        "Determination of Maintainability Index for Object
                 Oriented Systems",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943383",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In Object Oriented System, the quality of software
                 depends significantly on the decision taken at early
                 phases of the development. As per available artefact,
                 quality of the class description is very crucial for
                 system development. Maintenance is to repair defects in
                 software, to adapt the software to different
                 operational environments and to add or modify the
                 functionality of the system. In Object Oriented
                 Systems, maintainability factor needs more aspects to
                 explore. We have proposed Maintainability Index using
                 Package Metrics. We performed empirical evaluation
                 using three case studies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2011:RBC,
  author =       "Pankaj Kumar and Kamlesh Dutta",
  title =        "Relationship between Crosscutting Concerns and
                 Defects",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--7",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943385",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "NOTE FROM ACM: It has been determined that this paper
                 plagiarized earlier works. Therefore ACM has shut off
                 access to this paper. The paper by Pankaj Kumar and
                 Kamlesh Dutta plagiarizes the following work: Marc
                 Eaddy, Vibhav Garg, Alfred Aho, Nachiappan Nagappan,
                 Kaitlin Duck Sherwood, ``On the Relationship between
                 Crosscutting Concerns and Defects: An Empirical
                 Investigation'' found here, as well as the article:
                 Eaddy, M.; Zimmermann, T.; Sherwood, K. D.; Garg, V.;
                 Murphy, G. C.; Nagappan, N.; Aho, A. V.;, ``Do
                 Crosscutting Concerns Cause Defects?,'' Software
                 Engineering, IEEE Transactions on, vol. 34, no. 4, pp.
                 497--515, July--Aug. 2008.
                 https://doi.org/10.1109/TSE.2008.36. For further
                 information, contact the ACM Director of
                 Publications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumari:2011:AOO,
  author =       "Usha Kumari and Sucheta Bhasin",
  title =        "Application of Object-Oriented Metrics To {C++} and
                 {Java}: a Comparative Study",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943386",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The increasing importance of software measurement has
                 led to design and development of new software measures.
                 As the development of object-oriented software is
                 rising, more and more metrics are being defined for
                 object-oriented programming languages. But there is a
                 little understanding of comparative application of many
                 of these measures to different programming languages.
                 As a consequence, it is very difficult for software
                 managers and developers to select suitable measures and
                 programming languages for object-oriented systems. In
                 this paper, we investigate 23 object-oriented metrics
                 proposed by various researchers. The metrics are
                 applied to same set of 15 programs coded in C++ and
                 Java in an attempt to make comparative study of these
                 two prominent object-oriented programming languages.
                 The work done here reveals that these object-oriented
                 metrics can be applied successfully to both Java and
                 C++. But, Java proves to be more object-oriented than
                 C++ as per intuition. However, counting rules defined
                 for computation of these metrics should be framed more
                 carefully.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Vembuselvi:2011:LLL,
  author =       "C. Vembuselvi and S. Selvakumar",
  title =        "{LISISAP}: link level signature based secure anonymous
                 protocol for prevention of traffic analysis attacks",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943392",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "For any communication (wired or wireless) such as
                 control and data, the identity of source and
                 destination is revealed in the header portion of the
                 packet. Adversaries obtain sensitive information such
                 as the identity, location of a critical node, route,
                 data, etc., during communication by using traffic
                 analysis attacks, viz., similarity attack, data
                 integrity attack, packet counting attack, latency
                 attack, and clogging attack. Anonymous communication
                 prevents adversaries from doing traffic analysis
                 against the routing information embedded in the routing
                 messages and data packets. In order to thwart such
                 traffic analysis, anonymous communication protocols
                 were developed. In this paper, the existing anonymous
                 communication protocols were analyzed in terms of
                 techniques used, challenges, and applications.
                 Anonymous Routing protocol with Multiple Routes (ARMR)
                 is one of the existing protocols that achieves better
                 route anonymity using fake routes and multiple paths.
                 However, in ARMR, adversaries can modify the data with
                 genuine user pseudonyms and send the modified data to
                 the destination. In order to prevent data modification
                 by adversary at link level, in this paper a Link level
                 SIgnature based Secure Anonymous Protocol (LISISAP)
                 protocol is proposed. In LISISAP, source node generates
                 a signature for the data and sends the signature along
                 with the encrypted data to the next node. Further, the
                 next node verifies the signature. If signature matches,
                 it generates its own signature and sends the encrypted
                 data to its next node. Otherwise, it discards the
                 packet. Verified data and signature are sent by each
                 intermediate node until it reaches the destination. In
                 LISISAP, even if adversaries modify the data, every
                 node in the route including the destination node
                 verifies the data and discards the data if there is no
                 match in the signature. Similarity attacks can be
                 prevented by making the data look different on each hop
                 which could be achieved by encrypting the data with
                 link key. Proposed protocol, LISISAP is implemented and
                 tested in Smart and Secure Network. From the
                 experimental results, it is evident that the data
                 generated by source node is sent anonymously to the
                 destination. Thus, in LISISAP protocol, communication
                 is secure between nodes without revealing the node
                 identities. Anonymous properties such as identity
                 privacy, location privacy, route anonymity, and
                 robustness against several attacks were achieved.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Majumdar:2011:SSC,
  author =       "Dipankar Majumdar and Ananya Kanjilal and Swapan
                 Bhattacharya",
  title =        "Separation of scattered concerns: a graph based
                 approach for aspect mining",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943387",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Aspect Mining is a dynamic area of research in the
                 field of Software Engineering. Aspects are concerns
                 that are intermingled with other concerns thereby
                 reducing the understandability, maintainability and
                 scalability of the code. The concept of Separation of
                 Concerns (SoC) is often achieved until the Design
                 Phase, but gets difficult in the later phases of the
                 software development life cycle (SDLC). During program
                 maintenance the maintenance team is left with an
                 aggregation of procedures and variables, both of which
                 may be generically called user-defined tokens. This
                 paper proposes a graph-based approach to address the
                 problem of SoC during program maintenance. This is done
                 by the removal of some source code elements (e.g.,
                 user-defined-tokens), which can be responsible for
                 tangled concerns and complex code. These user-defined
                 tokens can be treated separately under the Aspect
                 Oriented Programming paradigm. The paper proposes a
                 graphical-model, which represents a procedural program
                 and defines a mathematical-model to identify and remove
                 the tangled and interleaving code-fragments. Thereafter
                 these code fragments are traced back to the
                 requirements engineering level through a formal
                 traceability model. This process yields the
                 corresponding user requirements that are associated
                 with these scattered code fragments. These identified
                 user requirements are put forward as Aspects, to be
                 handled or re-engineered under the Aspect Oriented
                 Programming paradigm.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2011:PSEa,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "6--7",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943372",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2011:LVP,
  author =       "Robert Schaefer",
  title =        "On the limits of visual programming languages",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "7--8",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943373",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2011:SEEa,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "8--9",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943374",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2011:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "10--18",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943375",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2011:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "19--27",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943376",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lutteri:2011:RIS,
  author =       "Emiliano Lutteri and Barbara Russo and Giancarlo
                 Succi",
  title =        "Report of the 4th international symposium on empirical
                 software engineering and measurement {ESEM} 2010",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "28--34",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943393",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes the research works, in
                 particular the full and short papers, presented at the
                 4th International Symposium on Empirical Software
                 Engineering and Measurement (ESEM 2010), held the 16th
                 and 17th of September in Bolzano-Bozen, Italy. The
                 program provided thirty full papers, twenty six short
                 papers and three invited talks held by Bertrand Meyer,
                 Steve Fraser and Carlo Ghezzi.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bateman:2011:HNT,
  author =       "Anita Bateman",
  title =        "Hands-on networking: from theory to practice by
                 {Maria} Luisa Merani, Maurizio Casoni, and {Walter}
                 Cerroni",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "38--38",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943377",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Russo:2011:BRM,
  author =       "Aryldo G. {Russo, Jr.}",
  title =        "Book Review: {{\booktitle{Modeling in Event-B ---
                 system and software engineering}} by Jean-Raymond
                 Abrial}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "38--39",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943378",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Berry:2011:BRS,
  author =       "Daniel M. Berry",
  title =        "Book Review: {{\booktitle{Software requirements and
                 design: the work of Michael Jackson}} by Bashar
                 Nuseibeh and Pamela Zave}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "39--40",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943379",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2011:BRG,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{Glitch: the hidden impact of
                 faulty software}} by Jeff Papows}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "41--41",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943380",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2011:CAS,
  author =       "Alok Mishra and Deepti Mishra",
  title =        "A curriculum for agile software development
                 methodologies",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--2",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968608",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Agile software development methodologies are
                 proliferating in software development organizations.
                 Agile techniques can handle changing business
                 requirements, schedule, cost, personnel turnover in an
                 effective way in organizations. Here, major components
                 of agile software development curriculum are discussed
                 along with suggestions towards making it a successful
                 course of software engineering curriculum.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chandra:2011:AST,
  author =       "Shalini Chandra and Raees Ahmad Khan",
  title =        "Availability state transition model",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--3",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968603",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Several security mechanisms such as digital signature,
                 timestamp audits and trails, encryption, throttling,
                 filtering, protect secrets etc. are available. These
                 security mechanisms are not completely able to stop
                 malicious attacks. For malicious hackers and attackers
                 it is comparatively easy to exploit security loopholes
                 at the user's end side. Behind such type of problem the
                 main reason is bad software design and its
                 implementation without proper risk analysis and
                 mitigation. So, an idea to model availability states an
                 Availability State Transition Model (ASTM) has been
                 proposed in this article. In ASTM methodology, only
                 design level details is required which can be easily
                 retrieved from the software's design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Baride:2011:CBS,
  author =       "Srikanth Baride and Kamlesh Dutta",
  title =        "A cloud based software testing paradigm for mobile
                 applications",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968601",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "The testing of applications for mobile computing
                 devices is cumbersome due to the bounded computational
                 resources that these devices have and diversity in
                 mobile environments. There are many different types of
                 emulators that have been proposed and used nowadays for
                 this purpose. But these emulators typically cannot
                 emulate: actual network speed and availability, actual
                 device specific content-rendering speed, memory
                 limitation, cache size, CPU speed, and stack size.
                 These emulators are designed for specific platforms,
                 which lack testing of applications on heterogeneous
                 mobile platforms. Cloud Computing has a potential to
                 overcome these challenges by taking up contemporary
                 progress in parallel and distributed systems,
                 virtualization, and software services. Cloud computing
                 empowers us to have adaptable and on-demand network
                 access to a common group of configurable computing
                 resources. In this article, we introduce a cloudbased
                 model that provides solutions to aforesaid challenges.
                 Our model sets up a mobile environment, actual device
                 and platform on the cloud resources for a given system
                 configuration. It also provides software testing
                 services to execute numerous tests automatically
                 according to a given application.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gandhi:2011:EGR,
  author =       "Parul Gandhi and Pradeep Kumar Bhatia",
  title =        "Estimation of generic reusability for object-oriented
                 software an empirical approach",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968606",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Inheritance and templates are key concepts in
                 object-oriented programming (OOP), and are essential
                 for achieving reusability and extendibility. The aim of
                 this paper is to explore traditional Halstead's metrics
                 and use them to propose more software metrics related
                 to generic method and attributes in an object-oriented
                 software. These metrics measure quantitative generic
                 construct with inheritance in an object-oriented code.
                 Two metrics GRr (Generic Reusability Ratio) and ERr
                 (Effort Ratio) are proposed in this paper. First metric
                 GRr (Generic Reusability Ratio) measures impact of
                 template in program volume and second metric ERr
                 (Effort Ratio) measures impact of template in
                 development effort. These metrics will be a tool for
                 estimating and evaluating costs of program design and
                 program tests as well as program complexity.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Choudhary:2011:TSF,
  author =       "R. K. Choudhary and R. A. Khan",
  title =        "Testing software fault tolerance techniques: future
                 direction",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968604",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software fault tolerance can itself be dangerous
                 error-prone because of the additional effort that must
                 be included in the programming process. The paper is
                 based upon research in the area of testing software
                 fault tolerance techniques. A Framework to Test Fault
                 Tolerance has been proposed and validated with industry
                 data. During the validation process we identified some
                 of the interesting findings that can be explored to
                 carry out further research in this area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Franky:2011:AMD,
  author =       "Mar{\'\i}a Consuelo Franky",
  title =        "Agile management and development of software projects
                 based on collaborative environments",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968605",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We've heard of Agile methodologies for several years,
                 but software projects have still delays and failures in
                 planning and management. How then automate the
                 processes of the development of software projects
                 following agile methodologies? In this paper we try to
                 answer this question by proposing an appropriate use of
                 collaborative environments for software development
                 that effectively translated into action the principles
                 and practices of Agile methodologies. The appropriate
                 use of these collaborative environments leads to a
                 truly agile management, where the project manager
                 achieves the vision and the continuous monitoring of
                 the project, and the participants become adapted to an
                 agile and productive discipline imposed by the
                 environment, regardless if they are geographically
                 dispersed. To ensure that appropriate use, this paper
                 proposes a methodological guide to achieve an agile
                 management of software projects by relying on a
                 particular collaborative environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nuthakki:2011:UUG,
  author =       "Murali K. Nuthakki and Mutlu Mete and Cihan Varol and
                 Sang C. Suh",
  title =        "{UXSOM}: {UML} generated {XML} to software metrics",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968609",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software developers are increasingly using Unified
                 Modeling Language (UML) tools to automate source code
                 generation. Therefore, nowadays calculating software
                 metrics from UML diagrams to evaluate software quality
                 is an important trend in the software industry.
                 However, acquisition of software metrics from
                 Extensible Markup Language (XML) export of UML tools
                 has been predominantly tool dependent. Moreover, each
                 new tool may have different specifications in XML.
                 Despite the overall need for a process to automate XML
                 unification, no current solution has yet been proposed.
                 Creating a framework to automate this assessment would
                 streamline development and increase efficiency in
                 software industry. With the aim to overcome this
                 deficiency, we developed a parser-based framework,
                 named UXSOM, to calculate software metrics
                 independently from the UML tool. Particularly UXSOM is
                 able to generate software metrics from the XML-based
                 outputs of the tools, ArgoUML, UMLET, MagicDraw, Sparx
                 Systems, and ESS Model. We showed a very general case
                 of UML class diagram, in which we extracted and
                 compared software metrics from these five different
                 tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bennett:2011:BDI,
  author =       "Travis A. Bennett and Coskun Bayrak",
  title =        "Bridging the data integration gap: from theory to
                 implementation",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968602",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The integration of multiple autonomous and
                 heterogeneous data sources (both across the web and via
                 a company intranet) has received much attention
                 throughout the years, particularly due to its many
                 applications in the fields of Artificial Intelligence
                 and medical research data sharing. Data integration
                 systems embody this work and have come very far in the
                 past twenty years. The problem of designing such
                 systems is characterized by a number of issues that are
                 interesting from a theoretical point of view: answering
                 queries using logical views, query containment and
                 completeness, automatic integration of existing data
                 sources via schema mapping tools, etc. In this work we
                 discuss these issues, compare and contrast various
                 proposed solutions (federated database systems and data
                 warehouses), and finally propose a novel extension of
                 the MVC (model, view, controller) web-based framework
                 that allows for the rapid development and
                 implementation of data integration systems solutions
                 suitable for use on the web.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Geetha:2011:FHP,
  author =       "D. Evangelin Geetha and T. V. Suresh Kumar and K.
                 Rajani Kanth",
  title =        "Framework for hybrid performance prediction process
                 model: use case performance engineering approach",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--15",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968607",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The dynamic behavior of distributed systems requires
                 that their performance characteristics be determined
                 rigorously, preferably in the early stages of software
                 engineering process. Evaluation of the performance at
                 the end of software development leads to increase in
                 the cost of design change. To compare design
                 alternatives or to identify system bottlenecks,
                 quantitative system analysis must be carried out from
                 the early stages of the software development life
                 cycle. In this paper we describe a process model,
                 Hybrid Performance Prediction Process Model that allows
                 modeling and evaluating distributed systems with the
                 explicit goal of assessing performance of the software
                 system during feasibility study. The use case
                 performance engineering approach proposed in this paper
                 exploits use case model and provides flexibility to
                 integrate the software performance prediction process
                 with software engineering process. We use an e-parking
                 application to demonstrate various elements in our
                 framework. The performance metrics are obtained and
                 analyzed by considering two software architectures.
                 Sensitivity analysis on the behavior of resources is
                 carried out. This analysis helps to determine the
                 capacity of the execution environment to obtain the
                 defined performance objectives.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2011:PSEb,
  author =       "Larry Bernstein",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "4--4",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968588",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2011:HWT,
  author =       "Michael Wing",
  title =        "How we talk about basics",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "4--6",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968589",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2011:SEEb,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software Engineering Education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "7--8",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968590",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2011:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "9--18",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968591",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2011:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "19--25",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968592",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fricker:2011:IRE,
  author =       "Samuel Fricker and Norbert Seyff",
  title =        "{1st International Requirements Engineering Efficiency
                 Workshop: REEW 2011}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "26--28",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968597",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Requirements engineering research has for a long time
                 focused on specification quality, leading to
                 recommendations of how to engineer ``perfect''
                 requirements specifications. Practitioners, however, do
                 not have the time, resources, and interests for
                 overdoing requirements engineering. Rather, many
                 situations call for shortcuts that allow investing
                 effort in those concerns that are critical for success,
                 while reducing effort in other areas where risk is
                 comparably smaller. The social context, smart
                 collaboration processes, and novel ways of looking at
                 the interface between stakeholders and the supplier can
                 be a basis to increase the yield of requirements
                 engineering, while reducing required effort. The
                 International Requirements Engineering Efficiency
                 Workshop (REEW 2011) aimed at initiating, facilitating,
                 and nurturing the discussion on efficient approaches to
                 engineer just good enough requirements. Requirements
                 engineering was seen as a means that can be simplified,
                 automated, or combined with other practices to achieve
                 successful systems in an economically efficient manner.
                 REEW 2011 provided a platform for the community of
                 practitioners and research experts that are interested
                 in productivity-enhancing approaches to requirements
                 engineering. This report describes the workshop results
                 including tactics, practice, and trade-offs for
                 achieving requirements engineering efficiency.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2011:ISD,
  author =       "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
                 Mishra",
  title =        "Information systems in distributed environments:
                 {ISDE} 2010",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "28--30",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968598",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from a one-day second international
                 workshop on ``Information Systems in Distributed
                 Environments'' (ISDE), which was organized in
                 conjunction with the OnTheMove Federated Conferences \&
                 Workshops (OTM 2010) at Hersonissos-Crete, Greece, on
                 October 26, 2010. The main focus of this workshop was
                 to provide a venue for the discussion of challenges
                 related to the development, operation, and maintenance
                 of distributed information systems, and their creation
                 in the context of global development projects. Further
                 dissemination of research results will lead to an
                 improvement of distributed information system
                 development and deployment across the glob.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Belani:2011:BRB,
  author =       "Hrvoje Belani",
  title =        "Book Review: {{\booktitle{Barcodes for mobile
                 devices}} by Hiroko Kato, Keng T. Tan and Douglas
                 Chai}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "32--33",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968593",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hagar:2011:BRT,
  author =       "Jon D. Hagar",
  title =        "Book Review: {{\booktitle{Testing IT: an off-the-shelf
                 software testing process}} by John Watkins and Simon
                 Mills}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "33--33",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968594",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Epps:2011:BRE,
  author =       "Bob Epps",
  title =        "Book Review: {{\booktitle{The elements of MATLAB
                 style}} by Richard K. Johnson}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "33--34",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968596",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/matlab.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Farrell-Vinary:2011:J,
  author =       "P. Farrell-Vinary",
  title =        "{JustInMind}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "34--35",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968595",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gupta:2011:VDC,
  author =       "Varun Gupta",
  title =        "Validation of dynamic coupling metrics for
                 object-oriented software",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--3",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020985",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Dynamic coupling metrics for object-oriented software
                 provide scope of coupling measurement up to the object
                 level and take into account important and widely used
                 object-oriented features such as inheritance,
                 polymorphism and dynamic binding during measurement.
                 The dynamic measures are computed at run-time, which
                 take into consideration the actual interactions taking
                 place among members of a class. In this paper, an
                 attempt has been made to evaluate dynamic coupling
                 metrics for object-oriented software using formal
                 evaluation framework proposed by Briand et al. A
                 practical and useful coupling measure must satisfy most
                 of the properties given in this framework. The results
                 of this study show that dynamic coupling metrics
                 satisfy all properties and parameters required by the
                 evaluation framework and thus dynamic coupling measures
                 are robust and useful.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Khajaria:2011:MSR,
  author =       "Krishna Khajaria and Manoj Kumar",
  title =        "Modeling of security requirements for decision
                 information systems",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020989",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data Warehouse (DW) is a decision information system
                 that facilitates decision makers for the fulfillment of
                 strategic decisions (decision making needs) by
                 extracting and integrating data from heterogeneous
                 sources. Due to sensitivity of the information to be
                 maintained in the DW, it becomes important to capture
                 information security goal as a quality goal of the
                 stakeholders for their organization from early stages
                 of DW life cycle. Various requirements engineering
                 techniques have been proposed in the DW literature
                 without paying much attention on security aspect.
                 Recently, AGDI (agent-goal-decision-information) model
                 was proposed to capture decision making needs of the
                 stakeholders for their organization to build a DW, but
                 security issue was not addressed. In this paper, we
                 propose an extension to the AGDI model to capture
                 security aspect (i.e. security goals of the
                 stakeholders) right from the beginning of requirements
                 modeling in order to prevent illegitimate attempts of
                 accessing DW. The application of the proposed extension
                 in the AGDI model has been demonstrated through a CASE
                 study of a University.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2011:QOR,
  author =       "Manoj Kumar and Anjana Gosain and Yogesh Singh",
  title =        "Quality-oriented requirements engineering for a data
                 warehouse",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020990",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Due to the increasing complexity of Data Warehouses
                 (DW), continuous attention must be paid for evaluation
                 of their quality throughout their design and
                 development. DW quality depends on the quality of all
                 requirements, conceptual, logical and physical models
                 used for DW design. Various authors have proposed
                 metrics to assure the quality of conceptual, logical
                 and physical models for DW. However, there is no
                 significant work in the DW literature to assure the
                 quality of a requirements model. A good quality
                 requirements model may lead to a good quality DW. In
                 this paper, we propose a quality-oriented requirements
                 model for a DW. In the proposed model, the notion of
                 perspective is introduced to capture the intention of
                 the agents (stakeholders) associated with their goals.
                 The agent may view a soft goal from two perspectives:
                 decisional and quality perspective. In the former, the
                 agent may refine a soft goal into the goal having well
                 defined criteria for its achievement and termed as
                 decisional goal, whereas in the later the agent may
                 define the various constraint (timing constraint,
                 budgetary constraint etc.) associated with the
                 decisional goals. The agents suggest the decisions for
                 achieving their decisional goals considering these
                 constraints. Thus, the decisional goals and the
                 constraints specified in the decisional and quality
                 perspective respectively should be maintained as
                 meta-data of the DW. In this way, the quality of DW
                 requirements model will be enhanced, which may lead to
                 enhance the quality of conceptual, logical and physical
                 model of DW.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dave:2011:CRM,
  author =       "Vachik S. Dave and Kamlesh Dutta",
  title =        "Comparison of regression model, feed-forward neural
                 network and radial basis neural network for software
                 development effort estimation",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020982",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Accurate estimation of software development parameters
                 such as effort, cost, and schedule is very important
                 for effectively managing software development projects.
                 Several software development effort estimation models
                 have been developed in the last few decades.
                 Determining, which is the best estimation model is
                 difficult to decide for a software management team. In
                 this paper we have compared Neural Network models and
                 regression model for software development effort
                 estimation. The comparison reveals that the Neural
                 Network (NN) is better for effort prediction compared
                 to regression analysis model. Further, we have compared
                 two Neural Network models --- Feed-Forward Neural
                 Network (FFNN) and Radial Basis Neural Network (RBNN).
                 The evaluation of the models is based on Mean Magnitude
                 Relative Error (MMRE), Relative Standard Deviation
                 (RSD) and Root Mean Squared Error (RMSE). The
                 experimental results show that the RBNN model exhibits
                 better prediction ability than FFNN.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sangwan:2011:RBF,
  author =       "Om Prakash Sangwan and Pradeep Kumar Bhatia and Yogesh
                 Singh",
  title =        "Radial basis function neural network based approach to
                 test oracle",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020992",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is an important discipline, and
                 consumes significant amount of effort. A proper
                 strategy is required to design and generate test cases
                 systematically and effectively. In this paper automated
                 software test case generation with Radial Basis
                 Function Neural Network (RBFNN) has been proposed and
                 empirically validated with the help of a case study and
                 compared with other techniques of soft computing.
                 Experimental results show that RBFNN is one of the best
                 technique for automated test case generation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yilmaz:2011:SPE,
  author =       "Murat Yilmaz and Rory V. O'Connor",
  title =        "A software process engineering approach to improving
                 software team productivity using socioeconomic
                 mechanism design",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020998",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software development is a knowledge and human
                 intensive activity. At the social level, the
                 interactions of these participants and their ability to
                 cooperate are important for improving the productivity
                 of teams and organizations. It is therefore not
                 surprising to discover that recent contributions in
                 software development have repeatedly asserted the
                 critical role of people in software development
                 efforts. However, existing approaches to software
                 development fail to fully exploit the importance of
                 social and intellectual capital that has been
                 highlighted in the fields of economics and sociology.
                 We propose that leveraging the existing approaches from
                 economics and sociology and applying to software
                 development can assist software organizations in
                 maximizing their return on investment. For example, by
                 applying one such approach, mechanism design, we can
                 improve and model the organization's total productivity
                 based on social aspects affecting productivity (i.e.
                 social productivity). This paper will discuss the
                 vision and progress for applying the concept of
                 mechanism design for optimizing software development
                 teams.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chanda:2011:SGA,
  author =       "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
                 and Swapan Bhattacharya",
  title =        "{SCAG}: a graphical approach to measure the complexity
                 of the {SOA} application",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020981",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture (SOA) provides a
                 foundation to achieve software reuse that enables
                 business professionals, who are not necessarily
                 programmers, to exploit the intrinsic properties of
                 software. A component-based programming model is the
                 key factor in the rapid adoption of SOA. SOA exploits
                 the properties of Component Based Software Engineering
                 (CBSE) in the form of services. SOA components help to
                 provide the business users with some flexibility to
                 play around with the components and rewire them to
                 create new business solutions. The complexity of SOA
                 application plays an important role in project planning
                 and determination of timeline and cost estimation and
                 allocation of resources. This paper proposes a
                 metric-based approach for the determination of relative
                 complexity and coupling of Component based SOA
                 application. We have proposed a Service Component
                 Architecture Graph (SCAG) which can be used for
                 graphical representation of the different service
                 module, the service components in the service module
                 and interaction among them. This metrics may be used by
                 developers to assess the complexity of SOA application
                 and if required redesign to create highly cohesive
                 components with minimal coupling. It will also promote
                 a culture of asset (reusable components) based
                 development by considering the factor like usability,
                 complexity, coupling etc. A case study is presented and
                 graph based analysis is done for deriving the
                 complexity, along with the other aspects of the
                 architecture.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Malhotra:2011:SFP,
  author =       "Ruchika Malhotra and Ankita Jain",
  title =        "Software fault prediction for object oriented systems:
                 a literature review",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020991",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There always has been a demand to produce efficient
                 and high quality software. There are various object
                 oriented metrics that measure various properties of the
                 software like coupling, cohesion, inheritance etc.
                 which affect the software to a large extent. These
                 metrics can be used in predicting important quality
                 attributes such as fault proneness, maintainability,
                 effort, productivity and reliability. Early prediction
                 of fault proneness will help us to focus on testing
                 resources and use them only on the classes which are
                 predicted to be fault-prone. Thus, this will help in
                 early phases of software development to give a
                 measurement of quality assessment. This paper provides
                 the review of the previous studies which are related to
                 software metrics and the fault proneness. In other
                 words, it reviews several journals and conference
                 papers on software fault prediction. There is large
                 number of software metrics proposed in the literature.
                 Each study uses a different subset of these metrics and
                 performs the analysis using different datasets. Also,
                 the researchers have used different approaches such as
                 Support vector machines, naive Bayes network, random
                 forest, artificial neural network, decision tree,
                 logistic regression etc. Thus, this study focuses on
                 the metrics used, dataset used and the evaluation or
                 analysis method used by various authors. This review
                 will be beneficial for the future studies as various
                 researchers and practitioners can use it for
                 comparative analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dubey:2011:AMM,
  author =       "Sanjay Kumar Dubey and Ajay Rana",
  title =        "Assessment of maintainability metrics for
                 object-oriented software system",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020983",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Many organizations assess the maintainability of
                 software systems before they are deployed.
                 Object-oriented design has been shown to be a useful
                 technique to develop and deliver quality software.
                 Objectoriented metrics can be used to assess the
                 maintainability of a software system. Various software
                 metrics and models have been developed and described.
                 This paper provides a review of this literature and the
                 related state-of-the-art. It also proposes a
                 maintainability model that is based on the analysis of
                 the relationship between object-oriented metrics and
                 maintainability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Seth:2011:DSB,
  author =       "Ashish Seth and Himanshu Agarwal and Ashim Raj
                 Singla",
  title =        "Designing a {SOA} based model",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020993",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture (SOA) is an
                 architectural approach that can be shared and reused.
                 Shortage of studies, research thrust and limited
                 expertise in the area of SOA keeps the application of
                 SOA in Small and Medium Enterprises (SMEs) limited.
                 Also in a country like India, whose major economy is
                 dependent on the small and medium enterprises, the
                 Indian Government is promoting the growth in this
                 sector. Successful examples of individual automated
                 enterprise services and traditional ERP implementation
                 systems exist but there is a lack of holistic,
                 integrated technical solutions that can be applied in
                 small and medium size enterprises. In this paper we
                 propose a five layered SOA based architecture that can
                 integrate all activities comprising Supply Chain
                 Management (SCM), Customer Relationship Management
                 (CRM), Technical and Enterprise Applications Tools
                 according to SMEs requirement. We also compared our
                 model with traditional ERP systems and other similar
                 approaches and found the proposed model is efficient,
                 cost effective and competent with similar existing
                 solutions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{V:2011:BBI,
  author =       "Sharath Chandra V. and S. Selvakumar",
  title =        "{BIXSAN}: browser independent {XSS} sanitizer for
                 prevention of {XSS} attacks",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020996",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Proliferation of social networking sites, and web
                 applications which deliver dynamic content to the
                 clients have increased the user created HTML content in
                 the World Wide Web. This user-created HTML content can
                 be a notorious vector for Cross-Site Scripting,(XSS)
                 attacks. XSS attacks have the ability to target
                 websites, steal confidential information of the users,
                 and hijack their accounts, etc. XSS attacks are
                 launched to exploit the vulnerabilities of the poorly
                 developed application code and data processing systems.
                 In particular, improper validation of user created
                 content and un-sanitized custom error messages
                 introduce vulnerability for XSS attacks. It is a
                 challenging task for any security mechanism to filter
                 out only the harmful HTML content and retain safe
                 content with high fidelity and robustness. This has
                 motivated us to develop a mechanism that filters out
                 the harmful HTML content, and allows safe HTML. The
                 existing solutions to XSS attack include use of regular
                 expressions to detect the presence of dynamic content
                 and client side filtering mechanisms such as Noscript
                 and Noxes tool. The drawbacks of these solutions are
                 low fidelity and disallowing of benign HTML. In order
                 to overcome these drawbacks BIXSAN, a Browser
                 Independent XSS SANitizer for prevention of XSS attacks
                 is proposed in this paper. BIXSAN includes the
                 proposition of three pronged strategy. These strategies
                 are as follows: Firstly the use of complete HTML parser
                 is proposed rather than approximating the behavior of
                 parser. The advantage of using complete HTML parser is
                 that it offers high fidelity. Secondly the use of
                 modified browser, viz., JavaScript Tester is proposed
                 to detect the presence of JavaScript for filtering it
                 out. Thirdly, identification of static tags is proposed
                 for allowing the benign HTML. Further, BIXSAN includes
                 the proposition of a parse tree generator at client
                 side browser to reduce the anomalous behavior of
                 browsers. BIXSAN was experimented in various browsers
                 such as Opera, Netscape, Internet Explorer (IE), and
                 Firefox and found to work for all the browsers. From
                 the experiments conducted it has been found that the
                 proposed BIXSAN prevents the injection of XSS attack
                 code successfully. Further, it has been verified that
                 BIXSAN reduces the anomalous behavior of browse.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yadav:2011:FSM,
  author =       "Seema Yadav and Khaleel Ahamd and Jayant Shekhar",
  title =        "Finite state machine based approach to prevent format
                 string attacks",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020997",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the computer field there are many types of input
                 validation attacks that occur, in which ``Format String
                 Overflow Attacks'' is one of the most important. Format
                 String Overflow Attacks remain the leading reason of
                 software vulnerability or exploits. Format string bugs
                 result in error such as wrong result type, memory
                 access error and crash and security breach. In this
                 paper, we proposed a Finite state machine which
                 prevents Format String Overflow Attacks in a secure way
                 with the help of several states of FSM. Proper checking
                 against format string overflow bugs can avoid
                 consequences due to exploits of format string overflow
                 bugs. The result of our proposed finite state machine
                 is improving the security problem and provides
                 protection to memory access from any unauthorized
                 user.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2011:ARM,
  author =       "Ajay Jain",
  title =        "Approach for reducing menu access time by enabling
                 bidirectional cursor movement within nested menu(s)",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020986",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There is a time value associated with the action an
                 application user must perform to traverse menu items to
                 reach a specific option. The time value increases when
                 menu options are arranged within multiple nested menus.
                 This work proposes a new menu layout that helps reduce
                 the time required to traverse menus, especially those
                 with multiple levels of nesting. This work also
                 includes the results of a statistical experiment that
                 measures the time taken to traverse using the suggested
                 approach. The results are compared with the time taken
                 to traverse using the traditional menu layout.
                 Experimental data (under pre-defined assumptions) seems
                 to significantly favor the proposed approach. The work
                 presents data samples, assumptions, and limitations of
                 the proposed approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Johari:2011:ESE,
  author =       "Kalpana Johari and Arvinder Kaur",
  title =        "Effect of software evolution on software metrics: an
                 open source case study",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020987",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software needs to evolve in order to be used for a
                 longer period. The changes corresponding to corrective,
                 preventive, adaptive and perfective maintenance leads
                 to software evolution. In this paper we are presenting
                 the results of study conducted on 13 versions of JHot
                 Draw and 16 versions of Rhino released over the period
                 of 10 years. We measured Object Oriented Metrics and
                 studied the changes in the measured values over
                 different releases of two medium sized software
                 developed using Java. We also investigated the
                 applicability of Lehman's Law of Software Evolution on
                 Object Oriented Software Systems using different
                 measures. We found that Lehman's laws related with
                 increasing complexity and continuous growth are
                 supported by the data and computed metrics measure.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2011:MVC,
  author =       "Parminder Kaur and Hardeep Singh",
  title =        "A model for versioning control mechanism in
                 component-based systems",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020988",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based systems provide a better reuse of
                 software components, greater flexibility, scalability
                 and higher quality of services. Component development
                 generally takes place due to the process of creating
                 and propagating changes in requirement definitions,
                 system designs, program source code, documentation and
                 test data. As a result, multiple versions of
                 constituent components come into existence. Thus, there
                 is a need to keep the track of multiple versions of
                 same component. To handle multiple versions of
                 constituent components, a version-control tool named as
                 Visual Version Control Tool (VVCT), for the management
                 of life-cycle evolution of component, is developed. The
                 developed tool satisfies all the conditions required
                 for version control in component-based systems. The
                 parameters required for uniform version management as
                 well as component frameworks are also satisfied by the
                 developed tool. To monitor and control the versioning
                 system, an example model is tested along with the set
                 of proposed metrics. This paper also incorporates
                 issues like component configuration, component
                 evolution, component framework, component version tree
                 and version-control metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2011:EEO,
  author =       "Satwinder Singh and K. S. Kahlon",
  title =        "Effectiveness of encapsulation and object-oriented
                 metrics to refactor code and identify error prone
                 classes using bad smells",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020994",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To assist maintenance and evolution teams, work needs
                 to be done at the onset of software development. One
                 such facilitation is refactoring the code, making it
                 easier to read, understand and maintain. Refactoring is
                 done by identifying bad smell areas in the code. In
                 this paper, based on empirical analysis, we develop a
                 metrics model to identify smelly classes. The role of
                 two new metrics (encapsulation and information hiding)
                 is also investigated for identifying smelly and faulty
                 classes in software code. This paper first presents a
                 binary statistical analysis of thev relationship
                 between metrics and bad smells, the results of which
                 show a significant relationship. Then, the metrics
                 model (with significant metrics shortlisted from the
                 binary analysis) for bad smell categorization (divided
                 into five categories) is developed. To verify our
                 model, we examine the open source Firefox system, which
                 has a strong industrial usage. The results show that
                 proposed metrics model for bad smell can predict faulty
                 classes with high accuracy, but in the case of the
                 categorized model not all categories of bad smells can
                 adequately identified the faulty and smelly classes.
                 Due to certain limitations of our study more
                 experiments are required to generalize the results of
                 bad smell and faulty class identification in software
                 code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gandotra:2011:LSA,
  author =       "Vandana Gandotra and Archana Archana Singhal and Punam
                 Bedi",
  title =        "Layered security architecture for threat management
                 using multi-agent system",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--11",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020984",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The increasing complexity of software systems along
                 with expanding connectivity has necessitated the
                 evolution of an integrated security framework adopting
                 innovative techniques for secure software systems. This
                 paper proposes a layered security architecture for
                 threat management using a multi-agent system to meet
                 the above objective. Layer- 1 of this framework is
                 designed for elicitation of realistic and flawless
                 security requirements. Layer-2 uses a Multi-Agent
                 system planning for avoidance of threats optimally. In
                 this mechanism autonomous agents interact and
                 coordinate with each other to achieve the common goal
                 of software security. An adaptive defense mechanism
                 using Meta-Agents in multi-agent system in conjunction
                 with fuzzy logic to counter the adaptive and compound
                 threats is the responsibility of Layer-3. Guidelines
                 proposed in this paper have augmented this security
                 architecture as a two-fold defensive strategy to ensure
                 that a hacker is not able to tamper data even if they
                 penetrate the periphery defenses. These proactive steps
                 can be implemented during the design and development
                 phases of the software life cycle in an incremental way
                 as per the budget and security requirements of a
                 software project. A case study on internet banking is
                 included in the paper to describe the proposed security
                 framework.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2011:ESEa,
  author =       "Larry Bernstein",
  title =        "Eternal software engineering questions",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "7--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021008",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2011:ESL,
  author =       "Michael Wing",
  title =        "Everything in {SE} is a lie",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "8--9",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021009",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2011:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "10--19",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021010",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2011:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "20--23",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021011",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Treude:2011:WRW,
  author =       "Christoph Treude and Margaret-Anne Storey and Arie van
                 Deursen and Andrew Begel and Sue Black",
  title =        "Workshop report from {Web2SE 2011: 2nd International
                 Workshop on Web 2.0 for Software Engineering}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "24--29",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020977",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web 2.0 technologies, such as wikis, blogs, tags and
                 feeds, have been adopted and adapted by software
                 engineers. With the annual Web2SE workshop, we provide
                 a venue for research on Web 2.0 for software
                 engineering by highlighting state-of-the-art work,
                 identifying current research areas, discussing
                 implications of Web 2.0 on software engineering, and
                 outlining the risks and challenges for researchers.
                 This report highlights the paper and tool
                 presentations, and the discussions among participants
                 at Web2SE 2011 in Honolulu, as well as future
                 directions of the Web2SE workshop community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Galster:2011:VSA,
  author =       "Matthias Galster and Paris Avgeriou and Danny Weyns
                 and Tomi M{\"a}nnist{\"o}",
  title =        "Variability in software architecture: current practice
                 and challenges",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "30--32",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020978",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Variability in software-intensive systems is usually
                 understood as the ability of a software artifact to be
                 changed in order to fit different contexts,
                 environments, or purposes. Software architecture on the
                 other hand determines the structure of a software
                 system, and is described in an architecture
                 description. This description includes the major
                 stakeholders of a software system and their concerns.
                 Variability is reflected in and facilitated through the
                 software architecture. The First International Workshop
                 on Variability in Software Architecture (VARSA) was
                 held jointly with WICSA 2011 in Boulder, Colorado. The
                 goal of the workshop was to explore and advance the
                 state-of-the art in variability in software
                 architecture. It featured four research paper
                 presentations, two invited talks, and three working
                 groups that discussed specific topics. This report
                 summarizes the themes of the workshop, presents the
                 results of the working group discussions, and suggests
                 topics for further research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ozkaya:2011:MTD,
  author =       "Ipek Ozkaya and Philippe Kruchten and Robert L. Nord
                 and Nanette Brown",
  title =        "Managing technical debt in software development:
                 report on the {2nd International Workshop on Managing
                 Technical Debt}, held at {ICSE 2011}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "33--35",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020979",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The technical debt metaphor is gaining significant
                 traction in the software development community as a way
                 to understand and communicate about issues of intrinsic
                 quality, value, and cost. This is a report on a second
                 workshop on managing technical debt, which took place
                 as part of the 33rd International Conference on
                 Software Engineering (ICSE 2011). The goal of this
                 second workshop was to discuss the management of
                 technical debt: to assess current practice in industry
                 and to further refine a research agenda for software
                 engineering in this area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lilja:2011:PAI,
  author =       "David J. Lilja and Raffaela Mirandola and Kai Sachs",
  title =        "Paper Abstracts of the {2nd International Conferernce
                 on Performance Engineering (ICPE 2011)}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "36--53",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2069288",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Foreword This issue of SEN contains the abstracts of
                 the papers, which were presented on the Second Joint
                 WOSP/SIPEW International Conference (ICPE 2011), held
                 in Karlsruhe, Germany, March 14-16, 2011, now
                 established as a regular event known as ACM/SPEC
                 International Conference on Performance Engineering
                 (ICPE). The primary goal of this conference series is
                 to bridge the gap between theory and practice in the
                 field of computer systems performance engineering by
                 providing a forum for sharing ideas and experiences
                 between industry and academia. This years conference
                 brought together researchers and industry practitioners
                 to share and present their experiences, discuss
                 challenges, and report on both state-of-the-art
                 research and work-in-progress on performance
                 engineering of software and systems, including
                 performance measurement, modeling, benchmark design,
                 and run-time performance management. The ICPE gives
                 researchers and practitioners a unique opportunity to
                 share their perspectives with others interested in the
                 various aspects of computer systems performance
                 engineering. The call for papers attracted 63 research
                 and 24 industrial paper submissions from Europe, Asia,
                 Africa, and North America. The program committees
                 accepted 19 full research papers and 7 short papers
                 together with 13 industrial papers. These papers cover
                 a variety of topics, including performance modeling and
                 techniques and measurement and benchmarking strategies
                 for adaptive systems, power management, virtualized
                 environments, and large-scale and distributed systems.
                 We are confident that you will find the abstracts
                 stimulating and that they will provide you with many
                 new ideas and insights. The full paper are available at
                 the ACM Digital Library. David J. Lilja: Program
                 Co-Chair, Research Track Raffaela Mirandola: Program
                 Co-Chair, Research Track Kai Sachs: Program Co-Chair,
                 Industrial Track",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2011:BRU,
  author =       "William {Del Ra}",
  title =        "Book Review: {{\booktitle{Usability testing
                 essentials: ready, set\ldots{}test!}} by Carol M.
                 Barnum}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "49--50",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021001",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Glaves:2011:BRA,
  author =       "Leslie Glaves",
  title =        "Book Review: {{\booktitle{API design for C++}} by
                 Martin Reddy}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "50--50",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021002",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mitrache:2011:BRI,
  author =       "Cristina Mitrache",
  title =        "Book Review: {{\booktitle{IT manager's handbook, the
                 business edition}} by Bill Holtsnider and Brian D.
                 Jaffe}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "51--51",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021003",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ngo:2011:BRD,
  author =       "Terry Ngo",
  title =        "Book Review: {{\booktitle{Data mining: practical
                 machine learning tools and technique}}, third edition
                 by Ian H. Witten, Eibe Frank, Mark A. Hell}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "51--52",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021004",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{OSullivan:2011:DMM,
  author =       "Michael O'Sullivan",
  title =        "Designing with the mind in mind: simple guide to
                 understanding user interface design rules by Jeff
                 {Johnson}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "52--52",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021005",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Vu:2011:BRA,
  author =       "Jodat Vu",
  title =        "Book Review: {{\booktitle{The art of multiprocessor
                 programming}} by Maurice Herlihy and Nir Shavit}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "52--53",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021006",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{White:2011:BRR,
  author =       "Randall L. White",
  title =        "Book Review: {{\booktitle{Reconfigurable embedded
                 control systems: applications for flexibility and
                 agility}} by Mohamed Khalgui and Han-Michale Hanisch}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "53--53",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021007",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Misra:2011:SAM,
  author =       "Sanjay Misra and Martha Omorodion",
  title =        "Survey on agile metrics and their inter-relationship
                 with other traditional development metrics",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047430",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In our civilized world today, measurement is very
                 important in every aspect of our lives as a means of
                 quantifying our success or progress in whatever
                 activity we involve ourselves in. Consequently, this
                 paper outlines the various metrics that are utilized in
                 the Agile development process and compares them with
                 the ones used in time past to measure success and
                 progress.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tee:2011:ISS,
  author =       "Sim-Hui Tee",
  title =        "Identifying structural similarity of methods using
                 isomorphic graphs",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047432",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "It is a recommended practice to use overloaded methods
                 in a class for a group of similar operations and
                 functions. However, it is possible that software
                 developers may violate the rule of overloaded methods.
                 In addition, non-overloaded method is used incorrectly
                 sometimes in composing similar functions. This paper
                 presents a technique, using isomorphic graphs, to
                 identify structural similarity between class methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2011:ILG,
  author =       "Alok Mishra and Deepti Mishra",
  title =        "Industry linked graduate software engineering
                 curriculum",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047429",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In recent years, Software Engineering (SE) has emerged
                 as an independent and mature discipline. In this
                 context, various studies are being done to provide
                 guidelines for undergraduate about graduate software
                 engineering curriculum design. This article presents
                 need of software industry related courses and discusses
                 significance of industry linked software engineering
                 education to meet educational objectives of all
                 stakeholders. Software industry oriented curriculum for
                 graduate level are discussed. Software industry aligned
                 courses will facilitate to increase their employment
                 prospects in industrial and other sectors.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2011:TBM,
  author =       "Anup Kumar Bandyopadhyay",
  title =        "{TLRO} based modeling of alternative commands and its
                 application to generalized distributed resource
                 allocation problem",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047421",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There are systems where alternative constructs need to
                 be used for its description. In weakest precondition
                 calculus disjunction of the post conditions of
                 constituent guarded commands is used as the post
                 condition of an alternative construct. Such
                 representation is not suitable because it does not
                 express a one to one correspondence between a guard and
                 the relevant component of the characterized post
                 condition. In this paper Temporal Logic Related to
                 Observation (TLRO) is used to solve this problem. Each
                 guarded command is expressed as a TLRO rule by using
                 its strongest post condition and the corresponding
                 precondition. List of these representations for all the
                 constituent guarded commands is the required model.
                 Technique is illustrated by considering a common sense
                 scenario. The scheme is then applied to a generalized
                 resource allocation algorithm which is a weaker version
                 of Drinking Philosophers problem.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumari:2011:CCM,
  author =       "Usha Kumari and Sucheta Bhasin",
  title =        "A composite complexity measure for component-based
                 systems",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047426",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The increasing importance of software measurement has
                 led to design and development of new software measures.
                 Controlling and minimizing software complexity is the
                 most important objective of each software development
                 paradigm because it affects all other software quality
                 attributes like reusability, reliability, testability,
                 maintainability etc. For this purpose, a number of
                 software complexity measures have been reported to
                 quantify different aspects of complexity.
                 Component-based software development (CBSD) is an
                 evolving paradigm where emphasis is laid on reuse of
                 existing components and effective designing of new
                 components. As the development of component-based
                 software is rising, more and more complexity metrics
                 are being developed for the same. In this paper, we
                 have attempted to design a composite complexity measure
                 to quantify important aspects of complexity of a
                 component-based system. The proposed measure takes into
                 account two major complexities of a component-based
                 system: one due to individual component and the other
                 due to its interaction with other components.
                 Individual component complexity may arise due to size
                 of a component, type and nesting level of control
                 structures present in code component. Component's
                 interaction complexity may be due to its interface with
                 other components. Graph theoretic notions and concept
                 of weights have been used to illustrate interaction
                 among software components and to compute complexity.
                 The proposed measure has been applied to four cases
                 chosen for present study and yields quiet encouraging
                 results which may further help in controlling the
                 complexity of component-based systems so as to minimize
                 both integration and maintenance efforts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Miranda:2011:TBP,
  author =       "Eduardo Miranda",
  title =        "Time boxing planning: buffered {Moscow} rules",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047428",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Time boxing is a management technique which
                 prioritizes schedule over deliverables but time boxes
                 which are merely a self, or an outside, imposed target
                 without agreed partial outcomes and justified certainty
                 are at best, an expression of good will on the part of
                 the team. This essay proposes the use of a modified set
                 of Moscow rules which accomplish the objectives of
                 prioritizing deliverables and providing a degree of
                 assurance as a function of the uncertainty of the
                 underlying estimates.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Suri:2011:ATC,
  author =       "Bharti Suri and Shweta Singhal",
  title =        "Analyzing test case selection and prioritization using
                 {ACO}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047431",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Regression testing is primarily a maintenance activity
                 that is performed frequently to ensure the validity of
                 the modified software. In such cases, due to time and
                 cost constraints, the entire test suite cannot be run.
                 Thus, it becomes essential to select or prioritize the
                 tests in order to cover maximum faults in minimum time.
                 Recently, Ant Colony Optimization (ACO), which is a new
                 way to solve time constraint prioritization problem,
                 has been utilized. This paper presents the analysis of
                 the regression test prioritization technique to reorder
                 test suites in time constraint environment along with
                 the sample runs on various programs. Our analysis
                 concluded that the ACO finds better orderings at higher
                 values of the time constraint (TC). The correctness of
                 the technique has also been recorded to be near optimal
                 at an average.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yu:2011:CIE,
  author =       "Liguo Yu",
  title =        "Coevolution of information ecosystems: a study of the
                 statistical relations among the growth rates of
                 hardware, system software, and application software",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047435",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "With the increasing use of information technology,
                 information ecosystems have emerged. Information
                 ecosystems not only include software products, but also
                 include hardware products. For example, application
                 software depends on system software, and both
                 application software and system software depend on
                 hardware devices. Together, they play important roles
                 in an information ecosystem. This paper analyzes the
                 coevolution of information ecosystem, where three
                 representatives of computer hardware, system software,
                 and application software products are studied.
                 Specifically, we analyze (1) the growth rate of Intel
                 processors, Linux operating systems, and Apache web
                 servers; and (2) the statistical relations among the
                 evolution of Intel processors, Linux operating systems,
                 and Apache web servers. Our study finds that a system
                 software product grows slower than its supporting
                 hardware products and a application software product
                 grows slower than its supporting system software and
                 hardware products.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2011:MSR,
  author =       "Ravinder Kumar and Kiran Khatter and Arvind Kalia",
  title =        "Measuring software reliability: a fuzzy model",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047425",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software reliability is an essential part of software
                 engineering to ensure the quality of a system. There
                 are various techniques, which can be used in building
                 models for predicting quality attributes. This paper
                 presents a Fuzzy model for software reliability
                 prediction. We have proposed three parameters
                 Availability, Failure Probability and Recoverability as
                 an integrated measure of software reliability. Fuzzy
                 Model provides a way to arrive at a discrete
                 Reliability Non-functional requirement (NFR) in
                 contrast to imprecise, vague and ambiguous. This model
                 will help us to evolve intermediate stages between
                 reliable state and unreliable state of a system.
                 Results obtained by proposed model show that this is
                 suitable for predicting software reliability of the
                 software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tyagi:2011:RCB,
  author =       "Kirti Tyagi and Arun Sharma",
  title =        "Reliability of component based systems: a critical
                 survey",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047434",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software reliability is defined as the probability of
                 the failure free operation of a software system for a
                 specified period of time in a specified environment.
                 Day by day software applications are growing more
                 complex and with more emphasis on reuse. Component
                 Based Software (CBS) applications have emerged. The
                 focus of this paper is to provide an overview for the
                 state of the art of Component Based Systems reliability
                 estimation. In this paper, we discussed various
                 approaches in terms of their scope, model, methods,
                 technique and validation scheme. This comparison
                 provides insight into determining the direction of
                 future CBS reliability research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Langsworth:2011:USA,
  author =       "Anthony Langsworth",
  title =        "Using static analysis tools to detect and correct
                 non-compliant cryptography",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047427",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Security is an increasing concern for application
                 developers, whether they are targeting internal
                 customers, organizations or the general public.
                 Particularly for the US public sector with requirements
                 like FIPS 140, developers need to identify and remove
                 superseded cryptography in both legacy applications and
                 new development. This paper outlines a mechanism using
                 static analysis tools to find outdated or improper
                 cryptography and suggest corrections or correct code.
                 This prevents the need for manual inspection and
                 correction by developers familiar with cryptography and
                 is more accurate than text searches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Khatri:2011:MBC,
  author =       "Sujata Khatri and R. S. Chhillar and V. B. Singh",
  title =        "Measuring bug complexity in object oriented software
                 system",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047424",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/python.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Bugs are inevitable in any software development life
                 cycle. Most bugs are detected and removed in the
                 testing phase. In software, we can classify bugs into
                 two categories: (1) bugs of different severity, from a
                 user's perspective,(how much damage the bug does) and
                 (2) bugs of different complexity(how much is the
                 debugging time lag between detection and correction).
                 Prior knowledge of bug distribution of different
                 complexity can help project managers in allocating
                 testing resources and tools. Various researchers have
                 proposed models for determining the proportion of bugs
                 present in software of different complexity but none of
                 these models have been applied to object oriented
                 software. In this paper, we have proposed a model that
                 will determine the proportion of different bug
                 complexity. The paper also suggests the suitability of
                 the proposed model for a particular data set. We have
                 taken two data sets based on object oriented
                 methodology namely SQL for Python and SQuirreL SQL
                 Client software developed under open source
                 environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Thakur:2011:DRB,
  author =       "Garima Thakur and Anjana Gosain",
  title =        "{DWEVOLVE}: a requirement based framework for data
                 warehouse evolution",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047433",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data warehouse integrate information from numerous
                 data sources under a unified schema and format to
                 provide effective results from multidimensional data
                 analysis in order to facilitate reporting and trend
                 analysis. These information sources are dynamic in
                 nature and keep on changing owing to the autonomous
                 nature of transactions being carried out in the
                 organization along with the complexity involved in
                 gathering requirements from the users. Requirements
                 elicitation and collection is difficult to perform
                 because user needs keep on changing. As a consequence,
                 the data warehouse must evolve so that it improves the
                 data quality by easily incorporating the changes in
                 requirements as well as source schema. In this paper we
                 present a theoretical framework called DWEVOLVE to
                 support data warehouse evolution. The proposed
                 framework enhances the functionality of previously
                 designed framework by taking into account the
                 requirements specified by the users. Provisions have
                 also been made to define and generate customized
                 reports according to the user needs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhatia:2011:FCM,
  author =       "Nitin Bhatia and Namarta Kapoor",
  title =        "Fuzzy cognitive map based approach for software
                 quality risk analysis",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047422",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents a software risk prediction tool
                 for risk analysis during the development of a software
                 product. The term ``Risk'' refers to a problem that can
                 threaten the success of the software project but has
                 not happened yet. Risks are uncertain. The main
                 objective of each organization is to provide very high
                 quality software to their customers. The term
                 ``Quality'' is a value to the person. But there is a
                 long list of software risks that can have adverse
                 impact on the quality of the software. It is necessary
                 to address all the risks; otherwise, they may lead to
                 undesireable results. Fuzzy Cognitive Maps (FCMs)
                 describe different concepts with different aspects of
                 the behaviour of complex systems. A software tool based
                 upon FCM has been developed for assessing software
                 risks. This paper describes the reasoning behind the
                 focus on risk management during the software
                 development process and its importance in delivering
                 high quality software by assessing software risks
                 during the development process using fuzzy cognitive
                 maps.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chhillar:2011:EAO,
  author =       "Rajender Singh Chhillar and Nisha",
  title =        "Empirical analysis of object-oriented design metrics
                 for predicting high, medium and low severity faults
                 using {Mallows Cp}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047423",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "An object-oriented approach has become a commonly-used
                 method in software-related activities. Many design
                 metrics for object-oriented systems have been proposed
                 and also employed for predicting and managing the
                 quality of processes and products. To enhance the
                 practical utility of object-oriented metrics in
                 software industry, various researchers have tried to
                 find relations between these metrics and fault
                 proneness, but very few focus on relating them with the
                 number-of-faults in different levels as per their
                 severity rating. In this study, empirical validation is
                 carried out on object-oriented design metrics (i.e.
                 Chidamber and Kemerer CK-metrics suite and source lines
                 of codes) for predicting number-of-faults in different
                 severity levels. Different statistical methods are used
                 to analyze the data, including correlation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2011:ESEb,
  author =       "Larry Bernstein",
  title =        "Eternal software engineering cross feature\slash
                 architecture design simplifications",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "6--6",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047415",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2011:SPH,
  author =       "Robert Schaefer",
  title =        "Software perspectives on history, culture and
                 efficiency",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "6--7",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047416",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2011:SEEc,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software Engineering Education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "7--8",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047417",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2011:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "9--18",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047418",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2011:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "19--23",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047419",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Acton:2011:BRL,
  author =       "Dorothy Acton",
  title =        "Book Review: {{\booktitle{Leadership, teamwork and
                 trust: building a competitive software capability}} by
                 Watts S. Humphrey and James W. Over}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "28--28",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047436",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ausden:2011:BRB,
  author =       "Howard Ausden",
  title =        "Book Review: {{\booktitle{Building parallel, embedded,
                 and real-time applications with Ada}} by John W.
                 McCormick, Frank Singhoff and Jerome Hugues}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "28--29",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047437",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2011:MBD,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Model-based development:
                 applications}}, by H. S. Lahman}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "29--29",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047438",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2011:BRB,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Brave NUI world: designing
                 natural user interfaces for touch and gesture}} by
                 Daniel Wigdor and Dennis Wixon}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "29--30",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047439",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saur:2011:NSM,
  author =       "Joe Saur",
  title =        "Network science for military coalition operations:
                 information exchange and interaction by Dinesh
                 {Verma}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "30--30",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047440",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2011:BRI,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Integrating and extending
                 BIRT}} 3rd edition by J. Weathersby, T. Bondurand, and
                 I. Chatalbasheva}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "31--31",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047441",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2011:LFE,
  author =       "Will Tracz",
  title =        "{Lord} of the files: essays on the social aspects of
                 software engineering by Russel Ovans",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "31--31",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047442",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Johari:2012:VOO,
  author =       "Kalpana Johari and Arvinder Kaur",
  title =        "Validation of object oriented metrics using open
                 source software system: an empirical study",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088893",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In today's environment the relevance of Free Open
                 Source Software Systems is understood and appreciated
                 both in academia and research. The debate about the
                 pros and cons of the open source vis-{\`a}-vis
                 proprietary software has been raging from ages ever
                 since Richard Stallman founded the Free Software
                 Foundation in 1985. With the changing trends in the
                 domain of Object Oriented Systems there is a need to
                 measure the fault predictability of software metrics on
                 open source software systems. In this paper we present
                 the results of empirical study which was conducted
                 using open source software, JHotDraw 7.5.1. We computed
                 the object oriented metrics, proposed by Chidamber and
                 Kemmerer, and performed bug-class mapping for the
                 software under study. We also studied the relationship
                 between the revisions made to open source software and
                 its software metrics measure.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Santos:2012:ICC,
  author =       "Bruno F. L. Santos and Hendrik T. Macedo",
  title =        "Improving {CUDA{\TM} C\slash C++} encoding readability
                 to foster parallel application development",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088897",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/pvm.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Graphical Processing Units (GPUs) have recently been
                 used to enable parallel application development. The
                 most prominent initiative has been provided by
                 NVIDIA{\TM} with the so-called CUDA{\TM} architecture,
                 designed to GeForce{\TM} graphic cards. However, even
                 with CUDA C-like programming language, parallel
                 codification remains somewhat awkward if compared to
                 sequential codification. The programmer still has to
                 deal with low-level hardware details such as generation
                 and synchronization of threads and GPU tracks and
                 sectors. In this paper, we propose a
                 programmer-friendly interface for CUDA-C programming,
                 in such a way that most hardware details are hidden
                 from the programmer. We show how code readability is
                 improved without undermining parallel execution
                 performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Varona:2012:ESE,
  author =       "Daniel Varona and Luiz Fernando Capretz and Yadenis
                 Pi{\~n}ero and Arif Raza",
  title =        "Evolution of software engineers' personality profile",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088901",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Myers-Briggs Type Indicator (MBTI) has been
                 applied to several studies that explore various
                 dimensions of human factors in software engineering.
                 Accordingly, this work reviews the results of these
                 studies to explore existing trends. In order to attain
                 a greater understanding of human resources in the
                 software industry, we have reviewed sixteen studies
                 that had been performed between 1985 and 2011. This
                 review concludes that the changes in the complexity of
                 software processes and products have created new roles
                 and demanded new skills for software engineers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krishnamurthy:2012:PBA,
  author =       "Vallidevi Krishnamurthy and Chitra Babu",
  title =        "Pattern based adaptation for service oriented
                 applications",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088894",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture(SOA) facilitates
                 developing applications that are inherently dynamic in
                 nature since the service binding happens at runtime by
                 matching the functional as well as Quality of
                 Service(QoS) requirements of the user. Further, the
                 running application can be dynamically reconfigured by
                 monitoring the application for possible violations in
                 the agreed QoS requirements. This paper advocates the
                 use of various patterns to facilitate such dynamic
                 reconfiguration in the various layers of the SOA
                 Reference Architecture. Towards this objective, Family
                 of Adapters pattern has been used in the service
                 component layer to achieve dynamic switching between
                 different versions of the same service without human
                 intervention. In addition, an SOA design pattern has
                 been employed in the business process layer to enhance
                 the efficiency of the application. This pattern based
                 approach has been tested by applying it to a sample SOA
                 based e-Shopping application case study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2012:AST,
  author =       "Pradeep Kumar and Yogesh Singh",
  title =        "Assessment of software testing time using soft
                 computing techniques",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088895",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Application of a soft computing approach in place of
                 traditional statistical techniques has shown a
                 remarkable improvement in reliability prediction. This
                 paper examines and compares Linear Regression (LR) and
                 five machine learning methods: (Artificial Neural
                 Network, Support Vector Machine, Decision Tree, Fuzzy
                 Inference System and Adaptive Neuro-Fuzzy Inference
                 System). These methods are explored empirically to find
                 the effect of severity of errors for the assessment of
                 software testing time. We use two publicly available
                 failure datasets to analyse and compare the regression
                 and machine learning methods for assessing the software
                 testing time. The performance of the proposed model is
                 compared by computing mean absolute error (MAE) and
                 root mean square error (RMSE). Based on the results
                 from rigours experiments, it is observed that model
                 accuracy using FIS and ANFIS method is better and
                 outperformed the model predicted using linear
                 regression and other machine learning methods. Finally,
                 we conclude that Adaptive Neuro-fuzzy Inference System
                 is useful in constructing software quality models
                 having better capability of generalization and less
                 dependent on sample size.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mohana:2012:AIP,
  author =       "Rajni Mohana and Deepak Dahiya",
  title =        "Approach and impact of a protocol for selection of
                 service in web service platform",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088896",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Business agility is an important challenge while
                 designing an enterprise application. Service oriented
                 architecture is used to combine many outsourced web
                 services to provide value added services to the users
                 with agility. A service registry is maintained to keep
                 track of various web service published by the service
                 providers. The key challenge for the service requester
                 is to pick the best web service among the various
                 functionally equivalent web services in the service
                 registry. This paper describes and analyses various
                 service selection protocols given by the researchers.
                 The approaches are classified into semantic and
                 non-semantic approach. It also proposes a novel
                 technique to look for the best web service based on QoS
                 like reliability, throughput etc. The solution to the
                 problem of selecting the best web service according to
                 the requirements is designed as a fuzzy expert system.
                 This rule based approach of Service registration and
                 lookup is adaptive and responds dynamically to quality
                 of service changes in the web services.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2012:ADC,
  author =       "Vinay Singh and Vandana Bhattacherjee and Sandeep
                 Bhattacharjee",
  title =        "An analysis of dependency of coupling on software
                 defects",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088899",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Functional independence is a key to good software
                 design and a good design results in high quality
                 software. Functional independence is the refined form
                 of the design concept of modularity, abstraction and
                 information hiding. Coupling is a measure of relative
                 interconnection among modules. Coupling in software has
                 been linked with maintainability and existing metrics
                 are used as predictors of external software quality
                 (e.g., fault -proneness, impact analysis, ripple effect
                 of changes, changeability). In this paper we
                 demonstrate the defects of software due to coupling by
                 studying five different attributes of coupling and
                 measured its impact on software defects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tekinerdogan:2012:AGS,
  author =       "Bedir Tekinerdogan and Semih Cetin and Muhammad Ali
                 Babar and Patricia Lago and Juho M{\"a}ki{\"o}",
  title =        "Architecting in global software engineering",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088900",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper summarizes the results of the First
                 Workshop on Architecting in Global Software Engineering
                 (GSE), which was organized in conjunction with the 6th
                 International Conference on Global Software Engineering
                 (ICGSE 2011). The workshop aimed to bring together
                 researchers and practitioners for defining and
                 advancing the state-of-the-art and state-of-the
                 practice in architecture design of global software
                 development systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jiau:2012:FIC,
  author =       "Hewijin Christine Jiau and Feng-Pu Yang",
  title =        "Facing up to the inequality of crowdsourced {API}
                 documentation",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--9",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088892",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "API usability is a crucial issue in software
                 development. One bottleneck of API usability is
                 insufficient documentation. This study empirically
                 confirmed the inequality of crowdsourced API
                 documentation, which is one of the main sources of API
                 documentation. To manage the inequality, a method for
                 documentation reuse is proposed based on the nature of
                 object-oriented programming language, inheritance. A
                 case study was conducted in Stackoverflow, which is a
                 widely used Q \& A site, to study the feasibility of
                 the documentation reuse. Results of the case study
                 indicate that documentation reuse is feasible in
                 improving both the coverage and quality of crowdsourced
                 API documentations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2012:ARB,
  author =       "Ashish Sharma and D. S. Kushwaha",
  title =        "Applying requirement based complexity for the
                 estimation of software development and testing effort",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--11",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088898",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The need of computing the software complexity in
                 requirement analysis phase of software development life
                 cycle (SDLC) would be an enormous benefit for
                 estimating the required development and testing effort
                 for yet to be developed software. Various research
                 proposals are directed towards minimizing the cost of
                 software. Also, a relationship between source code and
                 difficulty in developing a source code are also
                 attempted in order to estimate the complexity of the
                 proposed software for cost estimation, man power build
                 up, code and developer's evaluation. Therefore, this
                 paper presents a systematic and integrated approach for
                 the estimation of software development and testing
                 effort on the basis of improved requirement based
                 complexity (IRBC) of the proposed software. The IRBC
                 measure serves as the basis for estimation of these
                 software development activities to enable the
                 developers and practitioners to predict the critical
                 information about the software development intricacies.
                 Efficient software development requires accurate
                 estimates, since inappropriate estimates causes'
                 trouble during implementation of software process.
                 Hence, this paper presents a comprehensive approach,
                 for the prediction of software development and testing
                 effort using IRBC. For validation purpose, the proposed
                 measures are categorically compared with various
                 established and prevalent practices proposed in the
                 past like code based, use case based, algorithmic model
                 and function point based estimation measures. Finally,
                 the results obtained, validates the claim, for the
                 approaches discussed in this paper, for estimation of
                 software development and testing effort, in the early
                 phases of software development appears to be robust,
                 comprehensive, early alarming and compares well with
                 other measures proposed in the past. Hence, it is even
                 more useful because the complexity, development and
                 testing effort estimates are obtained at very early
                 stage.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Banerjee:2012:DAB,
  author =       "A. Banerjee and S. Ray and P. Dasgupta and P. P.
                 Chakrabarti and S. Ramesh and P. Vignesh and V.
                 Ganesan",
  title =        "A dynamic assertion-based verification platform for
                 validation of {UML} designs",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--14",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088891",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Capacity limitations continue to impede widespread
                 adoption of formal property verification in the design
                 validation flow of software and hardware systems. The
                 more popular choice (at least in the hardware domain)
                 has been dynamic property verification (DPV), which is
                 a semi-formal approach where the formal properties are
                 checked over simulation runs. DPV is highly scalable
                 and can support a rich specification language. The main
                 contribution of this paper is to build an integrated
                 DPV platform for validation of UML-based designs.
                 Specifically, we present (a) a language, named
                 Action-LTL (a simple extension of Linear Temporal
                 Logic) for writing assertions over data attributes and
                 events of UML models, and (b) an integrated dynamic
                 assertion-verification platform for verification of UML
                 designs. In view of the capacity limitations of
                 existing formal property verification tools, we believe
                 that the methods presented in this paper are of
                 immediate practical value to the UML design
                 community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:CAS,
  author =       "Larry Bernstein",
  title =        "Cross avoid shelf-ware by making your systems
                 easy-to-use",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "8--9",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088884",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2012:FT,
  author =       "Michael Wing",
  title =        "Food for thought",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "9--10",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088885",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEa,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "10--11",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088886",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "12--20",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088887",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "21--26",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088888",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krein:2012:RIW,
  author =       "Jonathan L. Krein and Charles D. Knutson and Lutz
                 Prechelt and Natalia Juristo",
  title =        "Report from the {2nd International Workshop on
                 Replication in Empirical Software Engineering Research
                 (RESER 2011)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "27--30",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088889",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The RESER workshop provides a venue in which empirical
                 software engineering researchers can discuss the
                 theoretical foundations and methods of replication, as
                 well as present the results of specific replicated
                 studies. In 2011, the workshop co-located with the
                 International Symposium on Empirical Software
                 Engineering and Measurement (ESEM) in Banff, Alberta,
                 Canada. In addition to several outstanding paper
                 sessions, highlights of the 2011 workshop included a
                 keynote address by Dr. Victor R. Basili, in which he
                 addressed the question, ``What's so hard about
                 replication of software engineering experiments?'' The
                 workshop also featured a joint replication panel
                 session discussing the first cooperative joint
                 replication ever conducted in empirical software
                 engineering research and a planning session for next
                 year's joint replication project addressing Conway's
                 Law.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Cooper:2012:BRD,
  author =       "Greg Cooper",
  title =        "Book Review: {{\booktitle{DTrace: dynamic tracing in
                 Oracle Solaris, Mac OS X, and FreeBSD}} by Brendan
                 Gregg and Jim Mauro}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "34--34",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088902",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Glass:2012:BRM,
  author =       "Robert L. Glass",
  title =        "Book Review: {{\booktitle{Managing projects in
                 trouble: achieving turnaround and success}} by Ralph L.
                 Kliem}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "34--34",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088903",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gousios:2012:BRS,
  author =       "Georgios Gousios",
  title =        "Book Review: {{\booktitle{Scalability rules 50
                 principles for scaling web sites}} by Martin L. Abbott
                 and Michael T. Fisher}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "35--35",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2139179",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2012:BRE,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{The Eclipse graphical
                 editing framework (GEF)}} by D. Rubel, J. Wren, and E.
                 Clayberg}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "35--35",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088905",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mendell:2012:BRP,
  author =       "Matt Mendell",
  title =        "Book Review: {{\booktitle{A practical guide to Fedora
                 and Red Hat enterprise Linux}} by Mark G. Sobell}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "36--36",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088907",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2012:BRC,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Continuous testing with
                 Ruby, Rails and JavaScript}} by Ben Rady and Rod
                 Coffin}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "36--36",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088906",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hathhorn:2012:BRE,
  author =       "Chris Hathhorn",
  title =        "Book Review: {{\booktitle{Engineering a compiler}},
                 second edition by Keith D. Cooper and Linda Torczon}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "36--37",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088908",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2012:BRB,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{The book of Ruby}} by Huw
                 Collingbourne}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "37--37",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088909",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2012:BHD,
  author =       "Will Tracz",
  title =        "A bug hunter's diary: a guided tour through the wilds
                 of software security by Tobias {Klein}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "37--38",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088910",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Khan:2012:IQM,
  author =       "Suhel Ahmad Khan and Raees Ahmad Khan",
  title =        "Integrity quantification model for object oriented
                 design",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--3",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108154",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Various surveys indicate that over the past several
                 years software security has risen in priority for many
                 software organizations. Security quantification in
                 early stage of software development life cycle assists
                 security experts to address security related problems
                 well in advance. Security assessment using model is
                 proved to be one of the established methods. Keeping in
                 view of the same, an Integrity Quantification Model
                 (IQM) is proposed in this paper. An effort is made by
                 authors to correlate design integrity with complexity
                 factors. Object oriented design metrics are used to
                 quantify complexity factors. The developed model has
                 been validated with realistic (small set of) data to
                 prove the significance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Eisenberg:2012:TBA,
  author =       "Robert J. Eisenberg",
  title =        "A threshold based approach to technical debt",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108151",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Nearly two decades ago, Ward Cunningham introduced us
                 to the term ``technical debt'' as a means of describing
                 the long term costs associated with a suboptimal
                 software design and implementation. For most programs,
                 especially those with a large legacy code baseline,
                 achieving zero absolute debt is an unnecessary and
                 unrealistic goal. It is important to recall that a
                 primary reason for managing and eliminating debt is to
                 drive down maintenance costs and to reduce defects. A
                 sufficiently low, manageable level of debt can minimize
                 the long-term impact, i.e., ``low debt interest
                 payments''. In this article, we define an approach for
                 establishing program specific thresholds to define
                 manageable levels of technical debt.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Harikrishnan:2012:SEN,
  author =       "S. Harikrishnan and Rajeev Kumar",
  title =        "Space efficient non-constant time multi-method
                 dispatch in object oriented systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108153",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Multi-method dispatch in object oriented programs
                 provides additional expressibility, readability and
                 elegance over single dispatch languages. Optimizing
                 multi-method dispatch is a central issue in compilers
                 that support multi-methods. Existing constant time
                 dispatch techniques for multi-methods keep either a
                 lookup table or a lookup tree after compressing the
                 same, the size of which can still be large if
                 compression is not effective. In this paper, we propose
                 a space efficient non-constant time technique (each
                 method address should be computed --- rather than being
                 looked up) for multi-method dispatch with single
                 inheritance type hierarchies. The method table
                 containing all the multi-method signatures is the only
                 data structure kept at run time. The table is arranged
                 by sorting on argument position to expedite method
                 search during dispatch. Heuristics is used during
                 method search such that those methods which are not
                 potential candidates are not included in the search.
                 The proposed technique saves space significantly while
                 the dispatch time grew higher compared to existing
                 techniques. When multi-method counts were within
                 practical bounds, the proposed technique was found to
                 offer dispatch time similar to existing techniques.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Majumdar:2012:ICF,
  author =       "Dipankar Majumdar and Swapan Bhattacharya",
  title =        "Interoperability of constrained finite state
                 automata",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--8",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108155",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Finite State Automata have been extended in a number
                 of ways with varied additional constraints with an
                 objective of modeling varied real life problems. The
                 current paper commonly refers to such extensions as
                 constrained automata. It aims at defining a generic
                 mathematical model for the constrained automata
                 targeted towards interoperability and possible
                 integration amongst them. The paper proposes and
                 demonstrates usage of hyper complex symbols that
                 realizes the objective.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gaur:2012:AIM,
  author =       "Vibha Gaur and Anuja Soni",
  title =        "Analytical inference model for prediction and
                 customization of inter-agent dependency requirements",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108152",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Inter-agent communication is one of the main concerns
                 of Agent Oriented Requirements Engineering (AORE). The
                 concern is delineated as managing inter-dependencies
                 and interaction among various agents performing
                 collaborative activities. To carry out cooperative
                 activities, the application areas viz. electronic
                 commerce and enterprise resource planning in the
                 distributed environment require an agent to predict and
                 customize dependency needs termed as Degree of
                 Dependency (DoD) so that the goal may be obtained
                 within resource constraints and with optimal number of
                 agents. To quantify and predict exertion load of an
                 agent within resource constraints, this paper proposes
                 an Analytical Inference Model (AIM) that would
                 facilitate the developer to evaluate and envisage DoD
                 and hence analyze the optimum number of agents to
                 obtain predicted DoD. In this work, Adaptive Neuro
                 Fuzzy Inference System (ANFIS) combining the potential
                 benefits of Artificial Neural Network (ANN) and Fuzzy
                 Logic (FL) is employed to discover the linear
                 relationship in input domain attributes and DoD. The
                 resultant optimization of exertion loads would
                 immensely improve the quality of the Multi-Agent
                 System. The hybrid, as well as back propagation
                 learning algorithm, is employed to adapt from training
                 data. The bestfitness of proposed model against test
                 data is examined by the performance
                 indicators-Coefficient of Correlation (CORR) and the
                 Normalized Root Mean Square Error (NRMSE). It is
                 observed that hybrid learning algorithm outperforms the
                 back propagation algorithm.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{M:2012:ESG,
  author =       "Krishna Raj P. M. and Srinivasa K. G.",
  title =        "Empirical studies of global volunteer collaboration in
                 the development of free and open source software:
                 analysis of six top ranked projects in {\tt
                 sourceforge.net}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108156",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Sourceforge.net is the largest portal hosting Free and
                 Open Source Software (FOSS). Among the projects
                 available in sourceforge.net, six top ranked projects
                 are selected for studying global volunteer
                 collaboration patterns over a period of 6 years
                 (2005--2011). It is found that a small set of
                 volunteers do most of the work in these projects. The
                 growth rate of volunteers, identification of core
                 developers, join and drop rate of volunteers, task
                 allocation and rate of task completion, movement of
                 existing volunteers among different projects and the
                 rate of new volunteer inclusion are also studied.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2012:ERM,
  author =       "Satwinder Singh and K. S. Kahlon",
  title =        "Effectiveness of refactoring metrics model to identify
                 smelly and error prone classes in open source
                 software",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108157",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In order to improve software maintainability, possible
                 improvement efforts must be made measurable. One such
                 effort is refactoring the code which makes the code
                 easier to read, understand and maintain. It is done by
                 identifying the bad smell area in the code. This paper
                 presents the results of an empirical study to develop a
                 metrics model to identify the smelly classes. In
                 addition, this metrics model is validated by
                 identifying the smelly and error prone classes. The
                 role of two new metrics (encapsulation and information
                 hiding) is also investigated for identifying smelly and
                 faulty classes in software code. This paper first
                 presents a binary statistical analysis of the
                 relationship between metrics and bad smells, the
                 results of which show a significant relationship. Then,
                 the metrics model (with significant metrics shortlisted
                 from the binary analysis) for bad smell categorization
                 (divided into five categories) is developed. To develop
                 the model, three releases of the open source Mozila
                 Firefox system are examined and the model is validated
                 on one version of Mozila Sea Monkey, which has a strong
                 industrial usage. The results show that metrics can
                 predict smelly and faulty classes with high accuracy,
                 but in the case of the categorized model, not all
                 categories of bad smells can adequately be identified.
                 Further, few categorised models can predict the faulty
                 classes. Based on these results, we recommend more
                 training for our model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:PSE,
  author =       "Larry Bernstein",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "6--7",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108160",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2012:SLA,
  author =       "Robert Schaefer",
  title =        "The secret life of academic papers",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "7--8",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108161",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEb,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software Engineering Education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "8--10",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108162",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "11--20",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108163",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "21--29",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108164",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tekinerdogan:2012:RTA,
  author =       "Bedir Tekinerdogan",
  title =        "Reflection on {Turkish} aspect-oriented software
                 development workshop series",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "30--33",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108165",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the last decade aspect-oriented software
                 development (AOSD) has gained a broad interest in both
                 academic institutions and industry. Likewise, several
                 international conferences and workshops have been
                 organized around the topic of AOSD. This paper
                 summarizes the results of the national Turkish
                 Aspect-Oriented Software Development Workshop series
                 that have been organized in the last decade with the
                 goal to stimulate the research and education on AOSD in
                 Turkey. The fifth workshop was organized in December
                 2011. Aspects identified and demonstrated during the
                 workshops have been collected in the so-called Aspect
                 Browser. We report both on the experiences from the
                 workshop series and the resulting aspect browser.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2012:BRSa,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Software systems
                 architecture}}, second edition, by Nick Rozanski and
                 Eoin Woods}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "36--36",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108171",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Eisenberg:2012:MSD,
  author =       "Robert Eisenberg",
  title =        "Managing software debt building for inevitable change
                 by Chris Sterling",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "36--37",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108172",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ngo:2012:BRE,
  author =       "Terry Ngo",
  title =        "Book Review: {{\booktitle{Essential app engine:
                 building high-performance Java apps with Google app
                 engine}} by Adriaan de Jonge}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "37--37",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108173",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2012:BRW,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Work item management with
                 IBM rational ClearQuest and Jazz: a customization
                 guide}} by Shmuel Bashan and David E. Bellagio}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "37--38",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108174",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rosenblum:2012:LCa,
  author =       "David S. Rosenblum",
  title =        "Letter from the Chair",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2370934",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Reddy:2012:DWU,
  author =       "K. Sudheer Reddy and G. Partha Saradhi Varma and M.
                 Kantha Reddy",
  title =        "Discovering web usage patterns by using an innovative
                 practical approach",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180939",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Pattern mining is one of the most pivotal steps in the
                 data mining is pattern mining and it immediately comes
                 after the preprocessing phase of WUM. Pattern discovery
                 deals with the sorted set of data items are presented
                 as part of the sequence. Using this pattern mining,
                 users can recognize the web paths that users commonly
                 follow on a web site easily. This research discovers
                 the most relevant and interesting behavioral patterns
                 by using a Web usage mining process. The server web
                 logs aids as an input to this process. We aim to
                 identify behavioral patterns of the users who typically
                 visit the web sites occasionally. We have employed a
                 method for clustering, based on pattern summaries. We
                 have conducted intense experiments and the results are
                 shown in this paper",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tiwari:2012:MCA,
  author =       "Manisha Tiwari and Padmaja Joshi",
  title =        "Method cohesion analysis through concept lattices",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180924",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Cohesion in object oriented technology is usually
                 associated with a class and hence majority of the
                 available cohesion metrics capture cohesion of classes.
                 Methods which are the main contributors to class
                 cohesion are not analyzed for their internal
                 cohesiveness. This concept paper proposes method
                 cohesion analysis through concept lattices. The
                 approach facilitates rapid identification of elements
                 (statements or variables) in methods that are less
                 cohesive with respect to the remaining part of the
                 method. The paper discusses the analysis and
                 interpretation of cohesion lattices. The approach is
                 demonstrated through dummy examples",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Arora:2012:SUM,
  author =       "Deepak Arora and Bramah Hazela and Vipin Saxena",
  title =        "Semantics for {UML} model transformation and
                 generation of regular grammar",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180931",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Graphs are one of the most popular non linear data
                 structures used to represent various data objects.
                 These graphical structures can further be classified
                 into directed and undirected graph representations. For
                 modeling purpose, UML has adopted the phenomenon of
                 directed graphical structures as statechart diagrams,
                 to exhibit dynamic specification of any software or non
                 software system. These diagrams are important as they
                 are used to represent all possible values that an
                 object can retain throughout its life cycle. Three key
                 components are required to change the state of any
                 object namely transition function, action and possible
                 inputs. Statechart diagrams are also useful to
                 determine all possible paths that an object will
                 undergo during its entire life span, while changing its
                 state. Further these paths can be represented with the
                 help of various established graphical modeling
                 techniques like Finite State Automata. The mapping and
                 further analysis of these path structures can be very
                 helpful in determining the correctness of the diagram
                 as well as to highlight the possible deficiencies in
                 the diagram. In the present work, authors have proposed
                 semantics for automatic transformation of UML
                 statechart diagram into its equivalent finite state
                 automata, by taking the advantage of both of the
                 models. Authors have also presented an approach to
                 generate regular grammar for the generated finite state
                 automata. This equivalent grammar can further be useful
                 to generate various test cases, to test UML statechart
                 diagram, against various test conditions. To better
                 illustrate, authors have also presented a case study of
                 an ATM machine and demonstrated that how this approach
                 is helpful to verify the correctness of design",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Counsell:2012:IAR,
  author =       "Steve Counsell and Stephen Swift",
  title =        "Issues arising from refactoring studies: an experience
                 report",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180922",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In theory, refactoring should reverse the trend in
                 code decay and many studies have explored the different
                 facets of refactoring (both its trends and
                 characteristics). While much progress has been made in
                 this area, a number of observations about refactoring
                 studies have become evident to us over the past seven
                 years in the time during which we have been undertaking
                 empirical studies in this area. This paper outlines our
                 experiences of the issues that arise with refactoring
                 studies. We outline six of those issues, together
                 forming the set of challenges that are still prevalent
                 in this area. The purpose of the paper is thus to put
                 under the spotlight the real potential benefits of
                 refactoring, but more importantly the challenges that
                 our experiences have raised",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gulia:2012:NAG,
  author =       "Preeti Gulia and R. S. Chillar",
  title =        "A new approach to generate and optimize test cases for
                 {UML} state diagram using genetic algorithm",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180933",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is an important part of the software
                 development process. The testing effort is divided into
                 three parts: test case generation, test execution and
                 test evaluation. Test case generation is the center of
                 testing process and automating. It saves time and
                 efforts and reduces the number of errors and faults. To
                 decrease the elevated cost of software testing and to
                 increase the reliability of the testing processes, a
                 new method has been created to automate the testing
                 process. This paper proposes a new approach to generate
                 and optimize test cases from UML State Chart diagram
                 using Genetic Algorithm. To generate the new test
                 sequence the method of crossover has been applied from
                 the Genetic Algorithm and the efficiency of the test
                 sequences is evaluated by Mutation Analysis",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nierstrasz:2012:ASA,
  author =       "Oscar Nierstrasz",
  title =        "Agile software assessment with Moose",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180925",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "During software maintenance, much time is spent
                 reading and assessing existing code. Unfortunately most
                 of the tools available for exploring and assessing
                 code, such as browsers, debuggers and profilers, focus
                 on development tasks, and offer little to support
                 program understanding. We present a platform for
                 software and data analysis, called Moose, which enables
                 the rapid development of custom tools for software
                 assessment. We demonstrate how Moose supports agile
                 software assessment through a series of demos, we
                 illustrate some of the custom tools that have been
                 developed, and we draw various lessons learned for
                 future work in this domain",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Reddy:2012:PWS,
  author =       "K. Sudheer Reddy and G. Partha Saradhi Varma and I.
                 Ramesh Babu",
  title =        "Preprocessing the web server logs: an illustrative
                 approach for effective usage mining",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180940",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data preprocessing is an important activity for
                 discovering behavioral patterns. The analysis of web
                 logs is an essential task for System Administrators to
                 safeguard adequate bandwidth and to maintain server
                 capacity on their business websites. A web Log file
                 represents user activities occurring over a period of
                 time. Web log files offer valuable insight into the
                 effective usage of the web site. It helps maintain an
                 account of the actual usage in a regular working system
                 as compared to the virtual setting of a usability lab.
                 This research paper focuses on the preprocessing
                 techniques implemented on a specially designed Web Sift
                 (WebIS) tool on an IIS web server and also proposes
                 some efficient heuristics and techniques",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2012:PSA,
  author =       "Surender Kumar and Rajeev Kumar",
  title =        "Precise static analysis for generic programs in object
                 oriented languages",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180937",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Genericity enriched with multiple data types and
                 classes is becoming a common feature of object oriented
                 languages. Therefore, static analysis of such generic
                 programs is gaining importance. Unfortunately such work
                 does not exist. In this work, we statically analyse
                 such generic programs for approximating the possible
                 dynamic (run-time) types of objects. We propose a
                 single pass technique for analyzing the generic
                 programs inter-procedurally statement-wise following
                 the control flow of the execution. The technique is
                 able to resolve the covariance, contravariance and
                 invariance relationship existing amongst different
                 instances with type parameters as arguments to a class.
                 We assess the performance of the proposed technique by
                 carrying out experiments on a set of standard benchmark
                 programs",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Benala:2012:CIS,
  author =       "Tirimula Rao Benala and Satchidananda Dehuri and Rajib
                 Mall",
  title =        "Computational intelligence in software cost
                 estimation: an emerging paradigm",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180932",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "One of the key features for the failure of project
                 estimation techniques is the selection of inappropriate
                 estimation models. Further, noisy data poses a
                 challenge to build accurate estimation models.
                 Therefore, the software cost estimation (SCE) is a
                 challenging problem that has attracted many researchers
                 over the past few decades. In the recent times,the use
                 of computational intelligence methodologies for
                 software cost estimation have gained prominence. This
                 paper reviews some of the commonly used computational
                 intelligence (CI) techniques and analyzes their
                 application in software cost estimation and outlines
                 the emerging trends in this area",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jiang:2012:TDG,
  author =       "Shujuan Jiang and Yanmei Zhang and Dandan Yi",
  title =        "Test data generation approach for basis path
                 coverage",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180936",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "On the basis of determining the feasibility of paths,
                 this paper proposes an evolutionary approach to
                 generating test data for feasible basis path coverage.
                 First, the structure of the program under test is
                 expressed by a control flow graph, and the target paths
                 are encoded into the form of hybrid-coding that
                 efficiently combines the statement label with the
                 outcome of a conditional statement (i.e. T or F). Then,
                 the genetic algorithm is employed to generate test data
                 for multiple paths coverage, and the fitness function
                 of an input data (an individual) takes into account the
                 degree of the execution track matching the target
                 paths. Finally, the proposed approach is applied in
                 several benchmark programs. The experimental results
                 show that the proposed approach cannot only avoid
                 redundant test but also improve the efficiency of test
                 data generation effectively",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ripon:2012:UTM,
  author =       "Shamim H. Ripon",
  title =        "A unified tabular method for modeling variants of
                 software product line",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180941",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Reuse of software is a promising approach to improving
                 the efficiency of software development regarding time,
                 cost and quality. Reuse requires a systematic approach.
                 The best results are achieved if we focus on systems in
                 a specific domain, so-called product line. The key
                 difference between the conventional software
                 engineering and software product line engineering is
                 variant management. The main idea of software product
                 line is to identify the common core functionality which
                 can be implemented once and reused afterwards for all
                 members of the product line. To facilitate this reuse
                 opportunity the domain engineering phase makes the
                 domain model comprising the common as well as variant
                 requirements. In principle, common requirements among
                 systems in a family are easy to handle. However,
                 problem arises during handling variants. Different
                 variants have dependencies on each other; a single
                 variant can affect several variants of the domain
                 model. These problems become complex when the volume of
                 information grows in a domain and there are a lot of
                 variants with several interdependencies. Hence, a
                 separate model is required for handling the variants.
                 This paper presents a mechanism, which we call, Unified
                 Tabular Method to facilitate the management of variant
                 dependencies in product lines. The tabular method
                 consists of a variant part to model the variants and
                 their dependencies, and a decision table to depict the
                 customization decision regarding each variant while
                 deriving customized products. Tabular method alleviates
                 the problem of possible explosion of variant
                 combinations and facilitates the tracing of variant
                 information in the domain model",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Anwikar:2012:DDT,
  author =       "Vallabh Anwikar and Ravindra Naik and Adnan Contractor
                 and Hemanth Makkapati",
  title =        "Domain-driven technique for functionality
                 identification in source code",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180923",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "While migrating existing software systems to Software
                 Product Lines, finding out the functionalities in the
                 software is critical. For maintenance activities like
                 deleting or changing existing features, or adding new
                 similar features, identifying and extracting
                 functionalities from the software is significant. This
                 paper describes a technique for creating mapping
                 between the source code and functionalities implemented
                 by it while exploiting the domain knowledge. The
                 technique is based on the notion of function variables
                 that are used by developers for expressing
                 functionality in the source code. By tracking the known
                 values of the function variables and evaluating the
                 conditions that use them, the mapping is identified.
                 Our technique makes use of static data flow analysis
                 and partial evaluation, and is designed with automation
                 perspective. After applying to few samples representing
                 real-life code structure and programming practices, the
                 technique identified precise mapping of the detailed
                 program elements to functions",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jeet:2012:CSB,
  author =       "Kawal Jeet and Renu Dhir and Harsh Verma",
  title =        "A comparative study of {Bayesian} and fuzzy approach
                 to assess and predict maintainability of the software
                 using activity-based quality model",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--9",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180935",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Quality is considered as one of the most important
                 aspects responsible for the success of the software.
                 The developers as well as the end users of the software
                 have accepted maintainability as a significant
                 characteristic due to its economic implications.
                 Several subjective techniques have been developed in
                 research to assess and predict maintainability but all
                 have been unsuccessful to do it practically and most of
                 them even fail to define it appropriately. The
                 activity-based quality model is one of the techniques
                 that have been found to be successful in defining
                 maintainability. This model assesses maintainability in
                 terms of average efforts required to maintain software
                 but lacks quantitative aspect that has been further
                 added by using Bayesian Network. In this paper, a
                 comparison of the Bayesian approach and Fuzzy approach
                 to deal with this model quantitatively has been done
                 wherein; Fuzzy approach has been found to be better
                 than Bayesian",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Priyanka:2012:EEC,
  author =       "Priyanka and Inderveer Chana and Ajay Rana",
  title =        "Empirical evaluation of cloud-based testing
                 techniques: a systematic review",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--9",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180938",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Testing is a challenging activity for many
                 software engineering projects, especially for large
                 scale systems. The amount of tests cases can range from
                 a few hundred to several thousands, requiring
                 significant computing resources and lengthy execution
                 times. Cloud computing offers the potential to address
                 both of these issues: it offers resources such as
                 virtualized hardware, effectively unlimited storage,
                 and software services that can aid in reducing the
                 execution time of large test suites in a cost-effective
                 manner. In this paper we report on a systematic review
                 of cloud based testing techniques published in major
                 software engineering journals and conferences conducted
                 by other researchers. Research papers were gathered
                 from various scholarly databases using provided search
                 engines within a given period of time. A total of 82
                 research papers are analyzed in this systematic review
                 and we classified it into four categories according to
                 issues addressed by them. We identified majority of the
                 research papers focused on Cloud based Testing and
                 Issues (38 papers) and 23 papers focused on Cloud based
                 Testing Frameworks. By looking at the areas focused by
                 existing researchers, gaps and untouched areas of cloud
                 based testing can be discovered",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gupta:2012:MCS,
  author =       "Daya Gupta and Rinky Dwivedi",
  title =        "Method configuration from situational method
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--11",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180934",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents a brief on evolution and
                 subsequent developments in the field of Situation
                 Method Engineering (SME) through exhaustive literature
                 review. The efforts of the various method engineers are
                 gathered, summarized and presented to show the overall
                 growth of this vital discipline. This research paper
                 starts with the assembly-based approaches and moves
                 towards method generation. The paper further analyzes
                 the proposals presented on the architecture of SME
                 processes followed by the OPEN Process Framework (OPF).
                 OPF depend on the four major components-Object-oriented
                 Process, Environment and Notation (OPEN). We evaluate
                 these proposals for various issues leading to method
                 configuration. The survey concludes with the proposals
                 on configurability of methods and current unresolved
                 issues that need to be addressed in one single approach
                 to configure a situation-specific coherent method",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2012:TY,
  author =       "Mike Wing",
  title =        "Thank You",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "7--8",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180926",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEc,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "8--9",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180927",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "10--17",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180928",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "18--25",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180929",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shukla:2012:RSE,
  author =       "Rakesh Shukla and Ashish Sureka and Rushikesh Joshi
                 and Rajib Mall",
  title =        "A report on {Software Engineering Education
                 Workshop}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "26--31",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180930",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this report, we present a summary and a few
                 reflections of a one day workshop on Software
                 Engineering Education held on February 22, 2012 at
                 Indian Institute of Technology, Kanpur, India
                 collocated with the 5th India Software Engineering
                 Conference. We identify a gap and believe there is a
                 need for creating an annual discussion forum that
                 serves the need of having a regular workshop for
                 software engineering education in India and also
                 benefit the global software engineering education
                 community by sharing the workshop insights and results
                 by a publication process. The workshop consists of two
                 keynotes, one from academia and one from industry, two
                 subgroups discussions and presentations by the
                 subgroups on their discussions. Three systematic
                 techniques, invitation of position statements, set up
                 of a Google group and an online survey, were employed
                 before the workshop to estimate number of participants,
                 subgroups and size of each subgroup for effective
                 discussions. Twenty participants attended the workshop.
                 The keynotes were on Using Collaborative Learning and
                 Divergent Thinking to Teach Software Engineering and on
                 Software Engineering Competency Development Model.
                 Three topics were selected for subgroups discussions by
                 the participants: use of various methods, such as
                 learning while playing and project-based software
                 engineering, over Power Point lecture, requirements and
                 needs of undergraduate software engineering degree
                 program from the perspective of Indian software
                 industry and curriculum content, coverage, and impact
                 of software engineering courses. The workshop was a
                 successful endeavor and the response in terms of the
                 contributions by participants is a clear indicator and
                 confirmation of the need of having a focused discussion
                 forum for brainstorming on software engineering
                 education in India",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Froberg:2012:BRS,
  author =       "Scott Froberg",
  title =        "Book Review: {{\booktitle{Software Testing}} by Yogesh
                 Singh}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "36--36",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180942",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2012:BRF,
  author =       "Robert Schaefer",
  title =        "Book Review: {{\booktitle{Fundamentals of multicore
                 software development}} by Victor Pankratius, Ali-Reza
                 Adi-Tabatabai, Walter Tichy}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "37--37",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180943",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Swamy:2012:BRSa,
  author =       "Harisankar Krishna Swamy",
  title =        "Book Review: {{\booktitle{Space based technologies and
                 commercialized development: economic implications and
                 benefits}} by Stella Tkatchova}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "37--38",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180944",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2012:BRA,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{ACM Ruby learning path}} by
                 David A. Black}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "38--38",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180945",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rosenblum:2012:LCb,
  author =       "David S. Rosenblum",
  title =        "Letter from Chair",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2370933",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Cheluvaraju:2012:QMP,
  author =       "Bharath Cheluvaraju and Anjaneyulu Pasala and Srinivas
                 Padmanabhuni and Sadhana Chevireddy",
  title =        "A quantitative measure for preventive maintenance in
                 software",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Several techniques have been developed to identify and
                 fix defects in software before its deployment. However,
                 the challenge is to quantify how well these techniques
                 prevent defects from occurring in the field from a
                 holistic perspective. Therefore, we propose a novel
                 software quality metric called ``The Preventability
                 Metric'' that measures the preventability of defects in
                 software. The metric is derived from a composite
                 quantitative evaluation of the efficiency and
                 effectiveness of the individual preventive techniques
                 employed on software before its deployment. It provides
                 a confidence on how well prevention of defects is
                 handled before deployment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jeet:2012:BNB,
  author =       "Kawal Jeet and Yadvirender Rana and Ruichi Xin",
  title =        "A {Bayesian} network based approach for software
                 reusability prediction",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237804",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Various factors having impact on reusability have been
                 found in research and practice. However, their true
                 interdependencies were never taken into consideration.
                 Using the approach discussed in this paper, various
                 factors and their dependencies can be depicted and the
                 true probability of success of reusability could be
                 easily found. Factors which are not found to have any
                 influence on reusability are also identified. Non
                 consideration of these factors decreases the burden of
                 evaluation and confines the study and evaluation to
                 only important factors for the study under
                 consideration.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2012:AYL,
  author =       "Ajay Jain and Chandan Singh",
  title =        "``{Ad} you like it'': advertisement sourcing and
                 selection technique across multiple heterogeneous
                 applications",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--6",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237802",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Sourcing and selection of online advertisement is done
                 with the objective of streaming advertisements that
                 match user's interests and internet surfing habits.
                 Choosing relevant advertisements that bring user's
                 focus and attention have higher click rate. Innovative
                 concepts, such as crawling recently surfed web pages
                 (or websites), user's (or web portal server)
                 geographical location, user's profile, age, gender, and
                 surfing habits., have been used to identify most
                 relevant advertisements. However, selecting and
                 streaming an advertisement that exactly matches user's
                 interest continues to be a challe. This paper proposes
                 and shares an innovative technique that significantly
                 helps in mapping user's interest quotient to streamed
                 advertisements. This technique respects the
                 individuality of a user and is able to differentiate
                 between users. The proposed solution is implemented by
                 enabling communication channels across multiple
                 heterogeneous user-initiated applications. Applications
                 that do not directly communicate with advertisement
                 data sources, leverage other application running on the
                 same user's account and submit their own metadata to
                 the applications attached to advertisement data
                 sources. The proposed paper helps in substituting
                 publisher's assumptions of a user's interest with
                 real-time user's objects of interest.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Andre:2012:FNC,
  author =       "{\'E}tienne Andr{\'e} and Christine Choppy and Kais
                 Klai",
  title =        "Formalizing non-concurrent {UML} state machines using
                 colored {Petri} nets",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237819",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "UML state machines are an interesting graphical
                 language to express dynamic systems behavior. However,
                 using the different features available (hierarchy,
                 internal/external transitions, entry/exit/do
                 activities, history pseudostates, etc.) may yield quite
                 complex behaviors that are difficult to inspect and
                 check visually. We introduce an algorithm to
                 automatically generate a colored Petri net model
                 associated with a state machine description, so as to
                 provide a formal specification. In this proposal,
                 although we do not consider concurrent aspects (such as
                 fork and join), we take into account all the above
                 mentioned features in a thorough and integrated way.
                 This is illustrated on some examples.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Baresi:2012:LBS,
  author =       "Luciano Baresi and Angelo Morzenti and Alfredo Motta
                 and Matteo Rossi",
  title =        "A logic-based semantics for the verification of
                 multi-diagram {UML} models",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237811",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "UML is a well-known and widely used design notation:
                 it offers a rich set of modeling elements, but their
                 behavior is often not properly defined. Many proposals
                 have tried to provide UML with a formal semantics, but
                 they often focus on a limited number of diagram types,
                 and thus do not provide a viable solution for the
                 actual verification of complex UML models. This paper
                 addresses a significant and consistent set of UML
                 diagrams, called MADES UML, and uses a metric temporal
                 logic to ascribe a formal semantics to them. It also
                 introduces a prototype verification tool based on a
                 bounded model / satisfiability checker. The
                 verification of a car collision avoidance system gave
                 encouraging results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Blech:2012:TFF,
  author =       "Jan Olaf Blech and Bernhard Sch{\"a}tz",
  title =        "Towards a formal foundation of behavioral types for
                 {UML} state-machines",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237814",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Behavioral types for model-based development comprise
                 abstract behavioral aspects of the models they are
                 associated with. Behavioral types allow checking that a
                 model fulfills these behavioral aspects. Furthermore,
                 as types can be related with each other, they support
                 more complex checks and guarantees like compatibility
                 in composition and refinement of models in a model
                 based development process. We propose a behavioral type
                 system and explain its properties, specifically
                 targeting a subset of UML state-machines. We present an
                 early implementation that generates behavioral type
                 definitions out of an Eclipse-based modeling
                 environment. These type definitions are generated for
                 the higher-order proof assistant Coq as files. We
                 present checking and comparison techniques based on
                 these files for behavioral aspects that can be derived
                 from the model definition.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bowles:2012:SCT,
  author =       "Juliana Bowles and Dulani Meedeniya",
  title =        "Strongly consistent transformation of partial
                 scenarios",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237809",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We present a formal approach for partial
                 transformation of scenario-based specifications.
                 Scenarios are captured as sequence diagrams (SDs) and
                 (partially) transformed into coloured Petri nets
                 (CPNs). Partial transformation is of interest for local
                 analysis, or within an incremental development approach
                 where interaction specifications are built
                 incrementally and combined with previous iteration
                 models. In previous work we defined a strongly
                 consistent transformation from SDs to CPNs. In this
                 paper, we extend the approach for partial
                 transformation whilst preserving the strongly
                 consistent nature of the transformation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Brosch:2012:FEM,
  author =       "Petra Brosch and Sebastian Gabmeyer and Gerti Kappel
                 and Martina Seidl",
  title =        "On formalizing {EMF} modeling operations with graph
                 transformations",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237810",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The development of software in accordance with the
                 model-driven engineering paradigm places model
                 transformations at a central position. Desirable yet
                 contradicting properties of model transformations are
                 user-friendliness as offered by-demonstration
                 approaches and formal conciseness as provided by
                 algebraic graph transformations which is indispensable
                 for verification tasks. In this paper, we show how to
                 unite the properties of the two different approaches.
                 We employ the state-of-the-art by-demonstration
                 environment Emo to prototype graph transformations by
                 embedding the operations obtained from Emo in the
                 formal framework of graph transformation theory.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Carrillo:2012:FVC,
  author =       "Oscar Carrillo and Samir Chouali and Hassan
                 Mountassir",
  title =        "Formalizing and verifying compatibility and
                 consistency of {SysML} blocks",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237813",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The objective of this paper is to define an approach
                 to formalize and verify the SysML blocks in a
                 refinement process. We propose to specify system
                 architecture with SysML Block Definition Diagram, this
                 diagram is then analyzed and decomposed into several
                 sub-blocks in order to verify their compatibility. The
                 structural architecture of an abstract block is given
                 by the Internal Block Diagram (IBD) which defines the
                 communication links between sub-blocks. The
                 compatibility verification between sub-blocks is only
                 made on linked sub-blocks. The behaviour of each
                 sub-block is described by an interface automaton which
                 species the invocations exchanged with its environment.
                 The verification between blocks is translated into
                 consistency verification between the blocks and
                 compatibility verification between their interface
                 automata. Incompatibilities can be inconsistent at
                 architecture level and at communication level if there
                 are deadlocks during the interaction between
                 sub-blocks. Once the verification is established
                 between the sub-blocks, the abstract block can be then
                 substituted by the sub-blocks which compose it.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ge:2012:TPD,
  author =       "Ning Ge and Marc Pantel and Xavier Cr{\'e}gut",
  title =        "Time properties dedicated transformation from
                 {UML}-{MARTE} activity to time transition system",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237807",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Critical Real-Time Systems (RTS) have strong
                 requirements concerning system's reliability. UML and
                 its profile MARTE are standardized modeling languages
                 widely accepted by industrial designers to cope with
                 the development of complex RTS. Relying on Model-Driven
                 Engineering (MDE), time properties verification of
                 UML-MARTE specifications at early phases of the system
                 lifecycle becomes possible. A key issue is to eliminate
                 the gap between UML semi-formal semantics and fully
                 formal executable semantics using model transformation.
                 The model transformation must guarantee the consistency
                 between high-level user models and lower-level
                 verification models. Meanwhile, it should guarantee
                 that the subsequent verification is not too expensive
                 and can be applied to real size industrial models. This
                 paper presents an approach to translate UML-MARTE
                 Activity Diagrams into Time Transition System (TTS)
                 with the aim of efficiently verifying time properties
                 in RTS. TTS is a generalization of Time Petri Nets
                 (TPN) with the priority and data handling at the
                 transition level, supported by TINA model checker. This
                 contribution focuses on how to define the TTS formal
                 semantics to avoid the core problem of state space
                 explosion in model checking. This work has been
                 integrated in a time properties verification framework
                 for UML-MARTE RTS specifications. The proposed method
                 is evaluated using a representative case study.
                 Experimental results are given to demonstrate the
                 method's performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Janus:2012:TCA,
  author =       "Andr{\'e} Janus",
  title =        "Towards a common agile software development model
                 {(ASDM)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237803",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper we use a formal approach to describe
                 Agile Software Development Methodologies. We extract
                 common attributes and properties out of Agile
                 Methodologies to establish a common Agile Software
                 Development Model (ASDM). To build our model we take a
                 look at the Agile Manifesto as well as eXtreme
                 Programing (XP) and Scrum, and also a project-specific
                 Agile Methodology called I2. We describe the Agile
                 Software Development Methodologies in terms of Sets,
                 Relations and Equations to make similarities and
                 differences visible. With this formal characterization
                 we can compare the Methodologies to each other and
                 extract the common attributes and properties as parts
                 of the common Agile Software Development Model (ASDM).
                 After establishing our model we assess the explanatory
                 power and aspects of completeness of the model to
                 identify weakness and improvement potential. The
                 explanatory power means the ability to characterize a
                 Methodology and compare different Methodologies to each
                 other. Completeness issues are related to the model
                 itself, to the model's instantiations (e. g. describing
                 XP with the ASDM) and the completeness of (relevant)
                 Practices. Using this approach we try to achieve better
                 theoretical understanding and comparability for Agile
                 Methodologies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Li:2012:MQG,
  author =       "Dan Li and Xiaoshan Li and Volker Stolz",
  title =        "Model querying with graphical notation of {QVT}
                 relations",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237808",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As a standard high-level model transformation
                 language, QVT Relations defines a graphical notation,
                 which provides a concise, intuitive way to specify
                 transformations. However, QVT Relations relies only on
                 the textual language OCL for model querying, leading to
                 verbose and complicated OCL expressions. Here, we
                 present a graphical model query facility based on the
                 checking semantics and pattern matching of QVT
                 Relations. The query facility also borrows from QVT
                 Relations the graphical notation. In addition we
                 propose an approach to map the queries into XSLT to
                 facilitate their execution. We have developed a tool
                 for designing the queries and automatically generating
                 the XSLT programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Milhau:2012:RPA,
  author =       "J{\'e}r{\'e}my Milhau and Fr{\'e}d{\'e}ric Gervais and
                 R{\'e}gine Laleau and Marc Frappier",
  title =        "Refinement patterns for {ASTD}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237818",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "astd is a formal and graphical language specifically
                 defined for information system specification. Up to
                 now, a specifier had to build an astd specification
                 from scratch and there were no refinement techniques
                 for stepwise construction. This paper aims at
                 introducing refinement patterns for astd, which are
                 inspired from real case studies. For each pattern,
                 proof obligations have been identified to define the
                 refinement semantics we want to provide. The three
                 refinement patterns presented in the paper are
                 illustrated by an example of a basic complaint
                 management system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yamagata:2012:FSE,
  author =       "Yoriyuki Yamagata and Weiqiang Kong and Akira Fukuda
                 and Van Tang Nguyen and Hitoshi Ohsaki and Kenji
                 Taguchi",
  title =        "Formal semantics of extended hierarchical state
                 transition matrix by {CSP}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237815",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Extended Hierarchical State Transition Matrix
                 (EHSTM) is a table-based modeling language frequently
                 used in industry for specifying behaviors of a system.
                 However, assuring correctness, i.e., having a design
                 satisfy certain desired properties, is a non-trivial
                 task. To address this problem, a model checker
                 dedicated to EHSTMs called Garakabu2 is developed.
                 However, there is no formal justification of Garakabu2,
                 since its semantics has never been fully formalized. In
                 this paper, we give a formal semantics to EHSTM by
                 translating it into CSP, Communicating Sequential
                 Processes. Our semantics covers most of the features
                 supported by Garakabu2. We manually translate the small
                 examples of EHSTM to CSP, and verify them by PAT, a CSP
                 based model checker. We also verify the examples
                 directly using Garakabu2 and show the result are same.
                 The experiments also show that verification using our
                 translation and PAT is much faster than that of
                 Garakabu2 for checking message type EHSTM.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yatake:2012:SBE,
  author =       "Kenro Yatake and Toshiaki Aoki",
  title =        "{SMT-based} enumeration of object graphs from {UML}
                 class diagrams",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237812",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents an encoding of the UML class
                 diagram with OCL invariants in an SMT solver for
                 enumerating all the object graphs from the class
                 diagram. Enumeration of all the object graphs was
                 necessary for our verification of operating systems by
                 model checking, i.e., exhaustively enumerate all the
                 structural variations of the environments to be checked
                 against an operating system. We present our encoding in
                 the SMT solver Yices with the technique of optimization
                 and isomorphism elimination.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kukreja:2012:AMT,
  author =       "Deepika Kukreja and Umang Singh and B. V. R. Reddy",
  title =        "Analytical models for trust based routing protocols in
                 wireless ad hoc networks",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--16",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In Wireless Ad Hoc Network environment, there are
                 three ways to understand a routing protocol: (i)
                 monitoring, (ii) simulation and (iii) modeling. In this
                 paper, the different trust based secure routing
                 protocols used in wireless ad hoc networks are
                 analyzed, modeled and described by incorporating
                 process flow diagrams. These process flow diagrams
                 represent stepwise work flow activities and actions. It
                 shows the overall flow of control of a process, program
                 or a protocol. This paper focuses on the security
                 aspects of routing by incorporating trust parameter
                 into account and also highlights methodology used in
                 secure routing protocols. Such protocols have been
                 categorized based on the model used for enforcing
                 security, methodology and information for making
                 effective routing decisions. In this paper, we model,
                 discuss and analyze trust based secure ad hoc routing
                 schemes which do not require each network node to work
                 in promiscuous mode. We propose and design a new
                 protocol --- Trust based Routing using Dominating Set
                 Approach (TRDSA) which overcomes the shortcomings of
                 existing protocols.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2012:DRS,
  author =       "Neeraj Kumar Sharma and Vibha Gaur and S. K. Muttoo",
  title =        "A dynamic reputation system with built-in attack
                 resilience to safeguard buyers in e-market",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--19",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237806",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Reputation systems aim to reduce the risk of loss due
                 to untrustworthy participants by providing a mechanism
                 for establishing trustworthiness between mutually
                 unknown online entities in an information asymmetric
                 e-market. These systems encourage honest behavior and
                 discourage malicious behavior of buyer and seller
                 agents by laying a foundation for security and
                 stability in the e-market. However, the success of a
                 reputation system depends on its built-in resilience
                 capabilities to foil various attacks. This paper
                 focuses on how to safeguard buyers from dishonest
                 sellers and advisors by incorporating an attack
                 resilient reputation computation methodology. The
                 objectives of the proposed dynamic reputation system in
                 the distributed environment are to reduce the incentive
                 for behaving dishonestly, and to minimize harm in case
                 of attacks by dishonest participants with the inherent
                 purpose of improving the quality of services in the
                 e-market.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Notkin:2012:TN,
  author =       "David Notkin",
  title =        "{TOSEM} news",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "7--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237826",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:SED,
  author =       "Larry Bernstein",
  title =        "Software engineering design principles for
                 ultra-large-scale systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "8--9",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2012:HSJ,
  author =       "Robert Schaefer",
  title =        "On having a second job as an adjunct",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "9--10",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "11--19",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "20--29",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237800",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Herrmann:2012:IWC,
  author =       "Andrea Herrmann and Maya Daneva and Joerg Doerr and
                 Kurt Schneider",
  title =        "{2nd International Workshop on Creativity in
                 Requirements Engineering: CreaRE 2012}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "30--31",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237816",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Requirements Engineering (RE) is a socially
                 constructed activity and as such it includes the
                 creation, development, assessment and communication of
                 innovative ideas. An idea can take the form of a
                 thought related either to the analysis of a problem, or
                 to the search of a solution to this problem, and it can
                 be concrete or abstract. Creative thinking is what RE
                 professionals tacitly or explicitly use in their RE
                 processes to conceptualize smart solutions to problems.
                 RE demands the stakeholders to create visions of a
                 future software system and to imagine all its
                 implications. Creativity techniques that have been
                 practiced in other fields can support this creative
                 part of RE. The CreaE series of workshops brings
                 together RE practitioners and researches who are
                 interested in discussing the role of creativity in RE
                 and the ways in which creativity techniques from other
                 disciplines can be leveraged in RE. CreaRE 2010 aimed
                 at creating awareness of the importance of research on
                 creativity in RE and initiated the conversation on
                 experiences of applying creativity techniques in
                 support of RE activities. CreaRE 2012 builds upon this
                 foundation and extends the discussion on creativity in
                 RE by actively fostering the exchange of ideas among
                 members of diverse communities that are engaged in RE
                 research and practice. CreaRE 2012 united an audience
                 reaching out to areas such as design, theatre
                 improvisation, stakeholder interactions, studies on
                 cultural heritage and multimedia systems. This report
                 describes the results of the workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gibson:2012:IUF,
  author =       "J. Paul Gibson and Isabelle Perseil",
  title =        "Introduction to {UML} and Formal Methods",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "32--33",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237825",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "It is with great pleasure that we introduce the 5th
                 IEEE International Workshop on UML and Formal Methods.
                 Already, in its short 5 year history, the workshop has
                 been located across the globe: Japan, Brazil, China,
                 Ireland, and --- this year --- in Paris, France. For
                 its first 3 years it was co-located with the
                 International Conference on Formal Engineering Methods,
                 whilst in the last 2 years it has been part of the
                 International Symposium on Formal Methods. The workshop
                 has a strong tradition of publishing the highest
                 quality accepted papers in either: the NASA journal of
                 ``Innovations in Systems and Software Engineering'', or
                 the ACM journal ``Software Engineering Notes'' (to whom
                 we have returned this year). The main objective of the
                 workshop has not changed during its lifetime, namely:
                 the building of bridges between informal, semi-formal
                 and formal notations. This objective can be seen in
                 each of the 4 main themes that make up the four
                 sessions of this year{\^A}'s workshop: I. UML diagram
                 formalization, II. Dynamic and real-time modeling, III.
                 Transformations, and IV. Patterns and blocks. Across
                 all sessions a wide range of formalisms and tools are
                 presented --- Extended Hierarchical State Transition
                 Matrices and CSP, the SMT solver Yice, MADES UML and
                 metric temporal logic, UML-MARTE and Time Transition
                 Systems, Colored Petri Nets, Behavioural types and Coq,
                 QVT-R and XSLT, EMF Model-ing Operations, ASTD and
                 SysML --- illustrating the breadth and depth of the
                 research being done by our community. We hope that you
                 enjoy reading these papers as much as we have: the
                 bridges are being built and we invite you to cross
                 them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Herzwurm:2012:RIW,
  author =       "Georg Herzwurm and Benedikt Krams and Wolfram Pietsch
                 and Sixten Schockert",
  title =        "Report from the {3rd International Workshop on
                 Requirements Prioritization for Customer Oriented
                 Software Development: (RePriCo'12)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "32--33",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237817",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Prioritization is an essential task within
                 requirements engineering to cope with complexity and to
                 establish focus properly. The 3rd Workshop on
                 Requirements Prioritization for customer oriented
                 Software Development (RePriCo'12) focused on
                 requirements prioritization and adjacent themes in the
                 context of customer oriented development of bespoke and
                 standard software. Five submissions have been accepted
                 for the proceedings and for presentation. The report
                 summarizes and points out key findings.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Froberg:2012:BRP,
  author =       "Scott Froberg",
  title =        "Book Review: {{\booktitle{Programming perl}}, fourth
                 edition by Tom Christiansen, Brian D. Foy and Larry
                 Wall with Jon Orwant}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "40--40",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237822",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2012:BRSb,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Service design patterns:
                 fundamental design solutions for SOAP\slash WSDL and
                 RESTful web services}} by Robert Daigneau}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "40--40",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237821",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2012:BRT,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Theory of conditional
                 games}} by Wynn C. Stirling}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "41--41",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237823",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Solomon:2012:NML,
  author =       "A. D. Solomon",
  title =        "On a new masters level program in software
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--3",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347713",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In a 1998 note [1] I described a new study program
                 leading to the Bachelor's Degree in Software
                 Engineering. I now report on a new Master's level
                 program in Software Engineering evolving from the
                 Bachelor's Degree program, and beginning in the fall
                 semester of this year. I discuss some of the events of
                 our 14 year old Bachelor's program, and the structuring
                 of our Master's program.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dubey:2012:MPO,
  author =       "Sanjay Kumar Dubey and Ajay Rana and Yajnaseni Dash",
  title =        "Maintainability prediction of object-oriented software
                 system by multilayer perceptron model",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347703",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To accomplish software quality, correct estimation of
                 maintainability is essential. However there is a
                 complex and non-linear relationship between
                 object-oriented metrics and maintainability. Thus
                 maintainability of object-oriented software can be
                 predicted by applying sophisticated modeling techniques
                 like artificial neural network. Multilayer Perceptron
                 neural network is chosen for the present study because
                 of its robustness and adaptability. This paper presents
                 the prediction of maintainability by using a Multilayer
                 Perceptron (MLP) model and compares the results of this
                 investigation with other models described earlier. It
                 is found that efficacy of MLP model is much better than
                 both Ward and GRNN network models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Louridas:2012:NRR,
  author =       "Panos Louridas and Georgios Gousios",
  title =        "A note on rigour and replicability",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347706",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As any empirical science, Software Engineering
                 research should strive towards better research
                 practices. Replication is regrettably not a priority
                 for Software Engineering researchers and, moreover, not
                 afforded by many published studies. Here we report our
                 experience from our encounter with a recent paper in a
                 flagship Software Engineering conference. Our
                 experience shows that current publication requirements
                 do not guarantee replicability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Patwa:2012:RME,
  author =       "Sanjeev Patwa and Anil Kumar Malviya",
  title =        "Reusability metrics and effect of reusability on
                 testing of object oriented systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347708",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software reuse has become very popular in software
                 development. There are several beneficial aspects of
                 object oriented systems including code reuse,
                 reusability and reusability of testing efforts.
                 Reusable software components are the building blocks
                 that can make a system able to respond quickly to
                 change. This paper presents the hypothesis that the
                 testing effort in object-oriented software can be
                 inherited and reused similar to that of the coding
                 effort. Therefore the testability and maintainability
                 of the object-oriented software can be improved by
                 adapting a reusability approach. In this paper some new
                 metrics namely Reusability of a Class in a System
                 (RCS), Average Degree of Reusability (AR), Specialize
                 class to Base class Reusable Metric (SBRM) have been
                 proposed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Romanovsky:2012:DFM,
  author =       "Alexander Romanovsky",
  title =        "Deployment of formal methods in industry: the legacy
                 of the {FP7 ICT DEPLOY} integrated project",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347710",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The work of the major EU-funded ICT DEPLOY Integrated
                 Project (February 2008 --- April 2012) on Industrial
                 Deployment of Advanced\ System Engineering Methods for
                 High Productivity and Dependability [1] was driven by
                 the tasks of achieving and evaluating industrial
                 takeup, initially by DEPLOY industrial partners, of
                 DEPLOY methods and tools, together with the necessary
                 further research on methods and tools. Our previous SEN
                 paper [2] introduced the project. The project has been
                 one of the most significant efforts ever focusing on
                 understanding the issues researchers and engineers face
                 during the deployment of formal methods. This paper
                 briefly reports on the project legacy and provides
                 pointers to the various sources of information produced
                 by the project.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2012:ATR,
  author =       "Anup Kumar Bandyopadhyay",
  title =        "Application of {TLRO} to refute an incorrect mutual
                 exclusion algorithm",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347702",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Modeling of iterative commands in a concurrent process
                 is difficult because the termination depends on the
                 states of different processes. In this paper a Temporal
                 Logic Related to Observation (TLRO)-based modeling of
                 the same is considered. For simplicity we restrict
                 ourselves to 'while do' construct only. Using a
                 commonsense scenario it is shown that the construct may
                 be described by a set of three state transition rules.
                 In a concurrent system the termination condition is
                 determined by the states of different processes. To
                 ensure termination, therefore, temporal ordering of the
                 executions of different state transition rules at
                 different processes needs to be investigated. For this
                 purpose we prove two theorems. The entire derivation is
                 then used to refute a well known incorrect mutual
                 exclusion algorithm. A counter example for the
                 algorithm could be derived during this exercise. This
                 is an improvement over our earlier effort that used the
                 weakest precondition calculus as a modeling tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mahajan:2012:AGA,
  author =       "Manish Mahajan and Sumit Kumar and Rabins Porwal",
  title =        "Applying genetic algorithm to increase the efficiency
                 of a data flow-based test data generation approach",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347707",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The success or failure of the entire software
                 development process relies on the software testing
                 component which is responsible for ensuring that the
                 software that is released is free from bugs. One of the
                 major labor intensive activities of software testing is
                 the generation of the test data for the purpose of
                 applying the testing methodologies. Many approaches
                 have been tried and tested for automating the process
                 of generating the test data. Meta-heuristics have been
                 applied extensively for improving the efficiency of the
                 process. This paper analyses the effectiveness of
                 applying genetic algorithms for generating test data
                 automatically using data flow testing approach. An
                 incremental coverage measurement method is used to
                 improve the convergence.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rashid:2012:SAM,
  author =       "Ekbal Rashid and Srikanta Patnayak and Vandana
                 Bhattacherjee",
  title =        "A survey in the area of machine learning and its
                 application for software quality prediction",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347709",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper explores software quality improvement
                 through early prediction of error patterns. It
                 summarizes a variety of techniques for software quality
                 prediction in the domain of software engineering. The
                 objective of this research is to apply the various
                 machine learning approaches, such as Case-Based
                 Reasoning and Fuzzy logic, to predict software quality.
                 The system predicts the error after accepting the
                 values of certain parameters of the software. This
                 paper advocates the use of case-based reasoning (i.e.,
                 CBR) to build a software quality prediction system with
                 the help of human experts. The prediction is based on
                 analogy. We have used different similarity measures to
                 find the best method that increases reliability. This
                 software is compiled using Turbo C++ 3.0 and hence it
                 is very compact and standalone. It can be readily
                 deployed on any configuration without affecting its
                 performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2012:CSV,
  author =       "Hemant Jain and Anjana Gosain",
  title =        "A comprehensive study of view maintenance approaches
                 in data warehousing evolution",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347705",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A data warehouse mainly stores integrated information
                 over data from many different remote data sources for
                 query and analysis. The integrated information at the
                 data warehouse is stored in the form of materialized
                 views. Using these materialized views, user queries may
                 be answered quickly and efficiently as the information
                 may be directly available. These materialized views
                 must be maintained in answer to actual relation updates
                 in the different remote sources. One of the issues
                 related to materialized views is that whether they
                 should be recomputed or they should be adapted
                 incrementally after every change in the base relations.
                 View maintenance is the process of updating a
                 materialized view in response to changes to the
                 underlying data is called view maintenance. There are
                 several algorithms developed by different authors to
                 ease the problem of view maintenance for data warehouse
                 systems. In this paper, we have provided a
                 comprehensive study on research works of different
                 authors related to DW view maintenance considering
                 various parameters and presented the same in tabular
                 way.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shirole:2012:TCU,
  author =       "Mahesh Shirole and Rajeev Kumar",
  title =        "Testing for concurrency in {UML} diagrams",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347712",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Concurrent programming is increasingly being used in
                 many applications with the advent of multi-cores. The
                 necessary support for execution of multi-threading is
                 getting richer. Notwithstanding, a concurrent program
                 may behave nondeterministically, it may result in
                 different outputs with the same input in different
                 runs. The aim of this study is to generate test
                 sequences for concurrency from unified modelling
                 language (UML) behavioral models such as sequence and
                 activity diagrams. Generating exhaustive test cases for
                 all concurrent interleaving sequences is exponential in
                 size. Therefore, it is necessary to find adequate test
                 cases in presence of concurrency to uncover errors due
                 to, e.g., data race, synchronization and deadlocks. In
                 order to generate adequate test cases a novel search
                 algorithm, which we call concurrent queue search (CQS)
                 is proposed. The CQS handles random nature of
                 concurrent tasks. To generate test scenarios, a
                 sequence diagram is converted into an activity diagram.
                 An activity diagram encapsulates sequential,
                 conditional, iterative and concurrent ows of the
                 control. By the experimental results, it was observed
                 that test sequences generated by CQS algorithm are
                 superior as compared to DFS and BFS search
                 algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sekar:2012:ASB,
  author =       "Lakshmi Priya Sekar and Vinitha Reddy Gankidi and
                 Selvakumar Subramanian",
  title =        "Avoidance of security breach through selective
                 permissions in {Android} operating system",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--9",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347711",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The current Android application framework has an ``all
                 or none'' permission policy, viz., an application can
                 be installed if and only if all the permissions are
                 granted. Also, no provision exists to deny granted
                 permissions after installation. Therefore, any
                 application can misuse the granted permission.
                 CyanogenMod addresses this issue by denying the
                 unwanted permissions which might cause the application
                 to crash. WhisperCore, has worked on this problem but
                 the working model is unavailable at the moment. APEX,
                 also is currently doing some research on this issue but
                 there is no publicly available document. In this paper,
                 the problem of misusing the granted permission n in
                 Android is addressed and a novel idea of 'shadow
                 manifest' is proposed. The proposed shadow manifest is
                 implemented by creating a novel Content Provider, viz.,
                 SelPermProvider, which hosts the user permissions. In
                 general, during the resource request phase, the system
                 manifest is checked and the resources are allocated.
                 But, in our implementation, the control is altered to
                 flow through the shadow manifest after the system
                 manifest is checked. If the query to shadow manifest is
                 TRUE, then the resource is granted else a dummy or null
                 value is returned. This facilitates the user to
                 identify the malware and block the malware from
                 achieving the intended task. Thus, the application is
                 unaware of the indirect permission denial and continues
                 to run normally. The user can decide which permission
                 to restrict by checking a log of all recent permission
                 requests, a facility provided in our app. The proposed
                 shadow manifest has been implemented and tested using
                 an application called 'Contacts\_Retrieve'. It was
                 found to successfully complete the application if the
                 shadow manifest returned TRUE, and unsuccessfully
                 complete otherwise.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Babu:2012:IAD,
  author =       "P. Arun Babu and C. Senthil Kumar and N. Murali and T.
                 Jayakumar",
  title =        "An intuitive approach to determine test adequacy in
                 safety-critical software",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347701",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Safety-critical software must adhere to stringent
                 quality standards and is expected to be thoroughly
                 tested. However, exhaustive testing of software is
                 usually impractical. The two main challenges faced by a
                 software testing team are generation of effective test
                 cases and demonstration of testing adequacy. This paper
                 proposes an intuitive and conservative approach to
                 determine the test adequacy in safety-critical
                 software. The approach is demonstrated through a case
                 study: the core temperature monitoring system of a
                 nuclear reactor. We combine conservative test coverage
                 of unique execution path test cases, and the results
                 from mutation testing to determine the test adequacy.
                 Although mutation testing is a powerful technique, the
                 difficulty in identifying equivalent mutants has
                 limited its practical utility. To gain confidence on
                 the computed test adequacy: (i) faults during mutation
                 testing must be induced at all possible execution paths
                 of the code, (ii) properties of unkilled mutants must
                 be studied, and (iii) all equivalent mutants must be
                 detected. In this regard; results of static, dynamic
                 and coverage analysis of the mutants is presented, and
                 a technique to identify the likely equivalent mutants
                 is proposed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wu:2012:MMS,
  author =       "Ye-Chi Wu and Hewijin Christine Jiau",
  title =        "A monitoring mechanism to support agility in
                 service-based application evolution",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347714",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service orientation promotes an agile development
                 paradigm for rapid application development and presents
                 evolutionary challenges to adapt to frequent
                 environmental changes. To maintain effective
                 service-based application operations, this research
                 introduces a Serv-Gears framework to maintain a
                 mechanism for evolution-need monitoring. Inheriting
                 major characteristics of a service-oriented paradigm,
                 this mechanism is designed in a service-based style to
                 facilitate development agility in evolution planning
                 and implementation. Serv-Gears allows developers to
                 continuously specify service-based monitors even during
                 application operations. The specified monitors are
                 included dynamically in the running application to
                 collect monitoring results. Evolution plans are then
                 effectively developed and assessed. Such an integrated
                 development environment provided by Serv-Gears
                 facilitates agile service-based application
                 evolution.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2012:OFA,
  author =       "Ajay Jain",
  title =        "Optimizing feature-access time through dynamic updates
                 to application menu layout",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--14",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347704",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As soon as a product or application is installed,
                 users want to start using it with zero usability
                 roadblocks. However, there is always a time quantity
                 associated with a user's series of actions that must be
                 performed while traversing application menu items to
                 reach a specific (desired) menu option. This time
                 factor plays a critical role in influencing user
                 experience and engagement; the more the number of
                 clicks, the greater the time taken in reaching the
                 desired menu item. This time lag may leave the user
                 frustrated. The time and distance traversed increases
                 further if the menu structure comprises multiple nested
                 menus within the parent menu. This paper proposes an
                 improvised dynamic menu layout based on usage
                 statistics. This work also demonstrates results of a
                 statistical experiment that compares the time taken in
                 reaching specific menu items with the proposed new
                 layout vs. the traditional menu layout. Experimental
                 data (under defined assumptions) is found to be
                 significantly in favor of the proposed approach. The
                 work also presents data samples, assumptions,
                 limitations, and benefits of the proposed approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:MCS,
  author =       "Larry Bernstein",
  title =        "Managing computer suppliers",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "12--13",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347718",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Grechanik:2012:CDD,
  author =       "Mark Grechanik",
  title =        "The curse of database deadlocks: the problem with no
                 good solution",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "13--14",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347719",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEd,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}: is software
                 engineering ready for {MOOCs}?",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "14--14",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347720",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSe,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "17--26",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347699",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPe,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "27--33",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347700",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Harrison:2012:RFI,
  author =       "Rachel Harrison and Daniela da Cruz and Pedro
                 Henriques and Maria Jo{\~a}o Varanda Pereira and
                 Shih-Hsi Liu and Tim Menzies and Marjan Mernik and
                 Daniel Rodriguez",
  title =        "Report from the {First International Workshop on
                 Realizing Artificial Intelligence Synergies in Software
                 Engineering (RAISE 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "34--35",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347697",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The aim of the Realizing Artificial Intelligence
                 Synergies in Software Engineering (RAISE) series of
                 workshops is to provide a forum for researchers and
                 industry practitioners to exchange and discuss the
                 latest innovative synergistic AI and SE techniques and
                 practices. Namely, we are interested in AI solutions to
                 SE problems and SE practices to answer AI obstacles,
                 and techniques that could benefit these realms
                 bidirectionally. This report summarizes the First
                 International RAISE Workshop and indicates some future
                 activities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kruchten:2012:TDS,
  author =       "Philippe Kruchten and Robert L. Nord and Ipek Ozkaya
                 and Joost Visser",
  title =        "Technical debt in software development: from metaphor
                 to theory report on the {Third International Workshop
                 on Managing Technical Debt}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "36--38",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347698",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The technical debt metaphor is gaining significant
                 traction in the software development community as a way
                 to understand and communicate issues of intrinsic
                 quality, value, and cost. This is a report on a third
                 workshop on managing technical debt, which took place
                 as part of the 34rd International Conference on
                 Software Engineering (ICSE 2012). The goal of this
                 third workshop was to discuss managing technical debt
                 as a part of the research agenda for the software
                 engineering field, in particular focusing on eliciting
                 and visualizing debt, and creating payback
                 strategies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jahns:2012:PDI,
  author =       "Veit Jahns",
  title =        "Principles of data integration by Anhai Doan, {Alon}
                 Halevy, Zachary {Ives}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "43--43",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347721",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{StPierre:2012:BRU,
  author =       "Richard {St. Pierre}",
  title =        "Book Review: {{\booktitle{The UX book, process and
                 guidelines for ensuring a quality user experience}} by
                 Rex Hartson and Pardha S. Pyla}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "43--44",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347722",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tan:2012:BRH,
  author =       "Kwee Heong Tan",
  title =        "Book Review: {{\booktitle{How Google tests software}}
                 by James A. Whittaker, Jason Arbon and Jeff Carollo}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "44--45",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347723",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kienle:2012:PDP,
  author =       "Holger M. Kienle",
  title =        "Personal data privacy and protection in a surveillance
                 era: technologies and practices by Christina
                 Akrivopoulou and Athanasios Psygkas",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "45--46",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347724",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{El-Deeb:2012:VSS,
  author =       "Ahmed El-Deeb",
  title =        "A view on the state of software engineering practice:
                 experience from {Egypt}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382762",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "An excerpt from Thomas Friedman's famous book The
                 World Is Flat, ``When developing countries start
                 thinking about the challenge of flatism\ldots{}. It has
                 to ask itself,'' ``To what extent is my country
                 advancing or being left behind by the flattening of the
                 world, and to what extent is it adapting to and taking
                 advantage of all the new platforms for collaborations
                 and competition?'' is vividly describing the appeal of
                 many developing countries in entering the software
                 industry. With the globalization of crafting software
                 and its services, the software industry is seen as a
                 lucrative economic growth opportunity. Unlike other
                 industrial investments, the software industry is
                 convenient to developing countries for its low-cost of
                 establishment. All is needed is an affordable real
                 estate rental, a bunch of PCs, and a few skilled
                 workers to get the business running. The globalization
                 of the software industry with attention given to
                 accessing the right skills no matter where and reducing
                 costs through cheap labor is even a realization to
                 those countries ambitions to remedy part of their
                 economic challenges. India preceded with utilizing such
                 potential and made good use of such globalization, or
                 flatism, of the software industry; positioning itself
                 as a successful model to those nations aspiring to
                 compete globally and establish economic growth. Egypt
                 is no exception from this ambition. Geographically
                 positioned in proximity to Europe at the crossroads of
                 Europe, Africa, and Asia and with access to abundant
                 low wage talent pool of multilingual technical
                 graduates annually are all factors that made it
                 conceivable that Egypt can compete in the global
                 industry of software. However, such entrance into
                 competition, notably with India as well as other Middle
                 Eastern countries, have shaped trends in the practices
                 of software engineering in Egypt as well as it did
                 emerge several challenges that Egypt should learn to
                 remedy if it wants to stay competitive in the global
                 software industry. This paper attempts to shed light on
                 salient current software engineering practices and
                 related challenges that would be affecting Egypt's
                 progress and competitive edge. In laying a foundation
                 to such brief survey of practices, this paper also
                 overviews major cornerstones that gave rise to the
                 establishment and support of such industry in Egypt.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2012:SLT,
  author =       "Vineet Sharma and S. A. M. Rizvi and Arun Sharma",
  title =        "Software Licenses --- A tool to control distribution
                 of software",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382769",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Workshop on Developing Tools as
                 Plug-Ins (TOPI) is a venue for researchers and
                 practitioners interested in plug-in development. The
                 main interest is understanding the opportunities and
                 challenges of developing tools as plug-ins, and thus,
                 we seek for discussions regarding the characteristics
                 of good plug-ins, interoperability requirements to
                 making tools available across platforms, recent
                 successful tools as plug-ins as well as foreseen medium
                 and long term challenges of tools as plug-ins. The
                 second edition of this workshop, TOPI 2012 was
                 co-located with the International Conference on
                 Software Engineering (ICSE 2012). TOPI 2012 received a
                 total of 32 submissions. Among them, 14 were accepted
                 as full papers and 4 as short papers. The audience
                 during the whole workshop ranged from 25 to 30
                 participants. The final program comprised position
                 papers including new proposals for plug-in
                 architectures as well as their interaction with
                 development environments and run-times, and papers
                 discussing the implementation of different kind of
                 tools as plug-ins. This report describes the main
                 results of TOPI 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ceccarello:2012:TGC,
  author =       "Matteo Ceccarello and Nastaran Shafiei",
  title =        "Tools to generate and check consistency of model
                 classes for {Java PathFinder}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Java PathFinder (JPF) is a model checker for Java
                 applications. Like any other model checker, JPF has to
                 combat the notorious state space explosion problem.
                 Since JPF is a JVM, it can only model check Java
                 bytecode and needs to handle native calls differently.
                 JPF tackles the state space explosion problem and
                 handles native calls by means of so-called model
                 classes and native peers. In this paper we focus on
                 model classes. For a class that either causes a state
                 space explosion or that contains native calls, one can
                 introduce a model class that either abstracts away
                 particular details or implements the native call in
                 Java. Rather than model checking the original class,
                 JPF model checks the model class instead. Writing such
                 model classes is time consuming and error prone. In
                 this paper we propose two tools to assist with the
                 development of model classes. The one tool generates a
                 skeleton of a model class. The other tool checks
                 whether a model class is consistent with the original
                 class.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chanda:2012:TBS,
  author =       "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
                 and Swapan Bhattacharya",
  title =        "Traceability between service component and class: a
                 model based approach",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382761",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service components are the key to the development of a
                 service-oriented solution as they provide the
                 implementation of the services. The implementation of
                 Service components provides the actual function of the
                 component and can be defined with one or more Java
                 classes. We propose a model named Service Component to
                 Class (SC2C) that maps the service components of an
                 application with that of the classes that implement the
                 service components. We also propose a visual model as a
                 part of SC2C that represents the classes and
                 relationship among classes. This model helps to
                 establish traceability among service components and
                 classes. We also introduce some traceability metrics to
                 measure traceability between the artifacts of Service
                 Oriented Architecture (SOA) and Object Oriented (OO)
                 paradigms. This work, along with our earlier work, help
                 in Software Configuration Management of a SOA
                 application. We provide an insurance system case study
                 to illustrate our approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Funes:2012:RMC,
  author =       "Diego Funes and Junaid Haroon Siddiqui and Sarfraz
                 Khurshid",
  title =        "Ranged Model Checking",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We introduce ranged model checking, a novel technique
                 for more effective checking of Java programs using the
                 Java PathFinder (JPF) model checker. Our key insight is
                 that the order in which JPF makes non-deterministic
                 choices denes a total ordering of execution paths it
                 explores in the program it checks. Thus, two in-order
                 paths define a range for restricting the model checking
                 run by defining a start point and an end point for
                 JPF's exploration. Moreover, a given set of paths can
                 be linearly ordered to define consecutive,
                 (essentially) non-overlapping ranges that partition the
                 exploration space and can be explored separately. While
                 restricting the run of a model checker is a well-known
                 technique in model checking, the key novelty of our
                 work is conceptually to restrict the run using vertical
                 boundaries rather than the traditional approach of
                 using a horizontal boundary, i.e., the search depth
                 bound. Initial results using our prototype
                 implementation using the JPF libraries demonstrate the
                 promise ranged model checking holds.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Khyzha:2012:AP,
  author =       "Artem Khyzha and Pavel Par{\'\i}zek and Corina S.
                 P{\u{a}}s{\u{a}}reanu",
  title =        "Abstract pathfinder",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382794",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We present Abstract Pathfinder, an extension to the
                 Java Pathfinder (JPF) verification tool-set that
                 supports data abstraction to reduce the large data
                 domains of a Java program to small, finite abstract
                 domains, making the program more amenable to
                 verification. We use data abstraction to compute an
                 over-approximation of the original program in such a
                 way that if a (safety) property is true in the
                 abstracted program the property is also true in the
                 original program. Our approach enhances JPF with an
                 abstract interpreter and abstract state-matching
                 mechanisms, together with a library of abstractions
                 from which the user can pick which abstractions to use
                 for a particular application. We discuss the details of
                 our implementation together with some preliminary
                 experiments with analyzing multi-threaded Java
                 programs, where Abstract Pathfinder achieves
                 significant time and memory savings as compared with
                 plain JPF.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mercer:2012:CVI,
  author =       "Eric Mercer and Suzette Person and Neha Rungta",
  title =        "Computing and visualizing the impact of change with
                 {Java PathFinder} extensions",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Change impact analysis techniques estimate the
                 potential effects of changes made to software. Directed
                 Incremental Symbolic Execution (DiSE) is a Java
                 PathFinder extension that computes the impact of
                 changes on program execution behaviors. The results of
                 DiSE are a set of impacted path conditions that can be
                 efficiently processed by a subsequent client analysis.
                 Path conditions, however, may not be intuitive for
                 software developers without the context of the source
                 code. In this paper we present a framework for
                 visualizing the results of DiSE. The visualization
                 includes annotated source code and control flow graphs
                 indicating program statements that are changed and
                 statements that may be impacted by the changes. A
                 simulation mode enables users to also observe the
                 impact of changes on symbolic execution of the program,
                 by showing the changes to the path conditions as the
                 user steps through the sequences of statements
                 executed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mirzaei:2012:TAA,
  author =       "Nariman Mirzaei and Sam Malek and Corina S.
                 P{\u{a}}s{\u{a}}reanu and Naeem Esfahani and Riyadh
                 Mahmood",
  title =        "Testing {Android} apps through symbolic execution",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "There is a growing need for automated testing
                 techniques aimed at Android apps. A critical challenge
                 is the systematic generation of test cases. One method
                 of systematically generating test cases for Java
                 programs is symbolic execution. But applying symbolic
                 execution tools, such as Symbolic Pathfinder (SPF), to
                 generate test cases for Android apps is challenged by
                 the fact that Android apps run on the Dalvik Virtual
                 Machine (DVM) instead of JVM. In addition, Android apps
                 are event driven and susceptible to path-divergence due
                 to their reliance on an application development
                 framework. This paper provides an overview of a
                 two-pronged approach to alleviate these issues. First,
                 we have developed a model of Android libraries in Java
                 Pathfinder (JPF) to enable execution of Android apps in
                 a way that addresses the issues of incompatibility with
                 JVM and path-divergence. Second, we have leveraged
                 program analysis techniques to correlate events with
                 their handlers for automatically generating
                 Android-specific drivers that simulate all valid
                 events.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Panizo:2012:EJP,
  author =       "Laura Panizo and Mar{\'\i}a del Mar Gallardo",
  title =        "An extension of {Java PathFinder} for hybrid systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Hybrid systems are characterized by combining discrete
                 and continuous behaviors. Verification of hybrid
                 systems is, in general, a difficult task due to the
                 potential complexity of the continuous dynamics.
                 Currently, there are different formalisms and tools
                 which are able to analyze specific types of hybrid
                 systems, model checking being one of the most used
                 approaches. In this paper, we describe an extension of
                 Java PathFinder in order to analyze hybrid systems. We
                 apply a general methodology which has been successfully
                 used to extend Spin. This methodology is non-intrusive,
                 and uses external libraries, such as the Parma
                 Polyhedra Library, to abstract the continuous behavior
                 of the hybrid system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Phan:2012:SQI,
  author =       "Quoc-Sang Phan and Pasquale Malacaria and Oksana
                 Tkachuk and Corina S. P{\u{a}}s{\u{a}}reanu",
  title =        "Symbolic quantitative information flow",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382791",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Quantitative Information Flow (QIF) is a powerful
                 approach to quantify leaks of confidential information
                 in a software system. Here we present a novel method
                 that precisely quantifies information leaks. In order
                 to mitigate the state-space explosion problem, we
                 propose a symbolic representation of data, and a
                 general SMT-based framework to explore systematically
                 the state space. Symbolic Execution fits well with our
                 framework, so we implement a method of QIF analysis
                 employing Symbolic Execution. We develop our method as
                 a prototype tool that can perform QIF analysis for a
                 software system developed in Java. The tool is built on
                 top of Java Pathfinder, an open source model checking
                 platform, and it is the first tool in the field to
                 support information-theoretic QIF analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rimlinger:2012:TGS,
  author =       "Frank Rimlinger",
  title =        "Test generation via symbolic simulation",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382795",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Mango extension project of JPF is an Eclipse
                 Workbench plugin which creates a functional
                 specification of Java source code. The specification is
                 presented as a series of navigable pages within Eclipse
                 views. Representative code examples containing faults
                 are processed by Mango. The output specification views
                 are then navigated for the purpose of discovering
                 robust fault recognition rules for automated testing.
                 This paper describes how the analyst and tool work
                 together to generate a test for a selected
                 vulnerability described in an Oracle publication, the
                 exposition of confidential data by the exception
                 handler mechanism.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shafiei:2012:MCL,
  author =       "Nastaran Shafiei and Peter Mehlitz",
  title =        "Modeling class loaders in {Java PathFinder} version
                 7",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382800",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The class loading mechanism is one of the essential
                 components of the Java runtime environment. Java class
                 loading is performed on-demand, allows multiple, user
                 extensible class loaders, and can associate a separate
                 type namespace with each class loader. Previous
                 versions of the Java Pathfinder (JPF) model checker
                 only provided a single, hardcoded class loading
                 mechanism. As one of the cornerstones of the upcoming
                 JPF version 7 (JPF v7), we have implemented a standard
                 Java conforming class loader infrastructure. Our
                 implementation does not only support different class
                 loaders and type namespaces, but also allows explicit
                 instantiation of multiple bootstrap class loaders which
                 is essential for model checking of distributed
                 applications --- the primary motivation for our work.
                 With the new class loading mechanism, such applications
                 can be mapped to threads using different bootstrap
                 class loaders, thus effectively separating all static
                 fields between application threads. In addition, the
                 JPF v7 class loading is considered to be the basis for
                 future verification of Java security properties.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2012:SOO,
  author =       "Meenakshi Sharma and Nasib S. Gill and Sunil Sikka",
  title =        "Survey of object-oriented metrics: focusing on
                 validation and formal specification",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382770",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To quantify various attributes of object-oriented
                 software systems, numerous object-oriented metrics have
                 been proposed by various researchers. This paper
                 surveys existing object-oriented metrics by focusing on
                 the two major issues-Validation and Formal
                 Specification. This paper provides researchers with an
                 understanding of existing object-oriented metrics in
                 terms of validation and formal specification. Because
                 few metrics are validated and formally specified, there
                 is a need of both validation and formal specification
                 of object-oriented metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{vanderMerwe:2012:VAA,
  author =       "Heila van der Merwe and Brink van der Merwe and Willem
                 Visser",
  title =        "Verifying {Android} applications using {Java
                 PathFinder}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Mobile application testing is a specialised and
                 complex field. Due to mobile applications' event driven
                 design and mobile runtime environment, there currently
                 exist only a small number of tools to verify these
                 applications. This paper describes the development of
                 JPF-ANDROID, an Android application verification tool.
                 JPF-ANDROID is built on Java Pathfinder, a Java model
                 checking engine. JPF-ANDROID provides a simplified
                 model of the Android framework on which an Android
                 application can run. It then allows the user to script
                 input events to drive the application flow. JPF-ANDROID
                 provides a way to detect common property violations
                 such as deadlocks and runtime exceptions in Android
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Zhang:2012:SSS,
  author =       "Yufeng Zhang and Zhenbang Chen and Ji Wang",
  title =        "{S2PF}: speculative symbolic {PathFinder}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382792",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Recently, symbolic execution has gained a significant
                 progress in its techniques and applications. However,
                 in practice, scalability is still a key challenge for
                 symbolic execution. In this paper, we present S2PF,
                 which improves the scalability of Symbolic PathFinder
                 by integrating speculative symbolic execution with the
                 general heuristic search framework. In addition, two
                 optimizations are proposed to improve the speculative
                 symbolic execution in S2PF. Experimental results on six
                 programs show that, S2PF can reduce the solver
                 invocations by 36.4\% to 48.7\% (with an average of
                 40.3\%), and save the search time by 30.6\% to 43.5\%
                 (with an average of 35\%).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bell:2012:RSIa,
  author =       "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
                 and Swapneel Sheth",
  title =        "Report from the {Second International Workshop on
                 Games and Software Engineering (GAS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382763",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Meneely:2012:ICM,
  author =       "Andrew Meneely and Oluyinka Williams",
  title =        "Interactive churn metrics: socio-technical variants of
                 code churn",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382785",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A central part of software quality is finding bugs.
                 One method of finding bugs is by measuring important
                 aspects of the software product and the development
                 process. In recent history, researchers have discovered
                 evidence of a ``code churn'' effect whereby the degree
                 to which a given source code file has changed over time
                 is correlated with faults and vulnerabilities.
                 Computing the code churn metric comes from counting
                 source code differences in version control
                 repositories. However, code churn does not take into
                 account a critical factor of any software development
                 team: the human factor, specifically who is making the
                 changes. In this paper, we introduce a new class of
                 human-centered metrics, ``interactive churn metrics''
                 as variants of code churn. Using the git blame tool, we
                 identify the most recent developer who changed a given
                 line of code in a file prior to a given revision. Then,
                 for each line changed in a given revision, determined
                 if the revision author was changing his or her own code
                 (``self churn''), or the author was changing code last
                 modified by somebody else (``interactive churn''). We
                 derive and present several metrics from this concept.
                 Finally, we conducted an empirical analysis of these
                 metrics on the PHP programming language and its
                 post-release vulnerabilities. We found that our
                 interactive churn metrics are statistically correlated
                 with post-release vulnerabilities and only weakly
                 correlated with code churn metrics and source lines of
                 code. The results indicate that interactive churn
                 metrics are associated with software quality and are
                 different from the code churn and source lines of
                 code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wang:2012:BPS,
  author =       "Wenyuan Wang and Zheng Zhang",
  title =        "Balanced partition scheme for distributed caching
                 systems to solve load imbalance problems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382772",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Distributed caching system is usually used to
                 alleviate database load in constructing an enterprise
                 web application system. It helps to speed up dynamic
                 web applications. In order to improve the utilization
                 of caching cluster, an appropriate data partitioning
                 and placement scheme is usually applied. This paper
                 proposes a Balanced Partition Scheme (BPS) to solve
                 load imbalance problems and highly skewed data requests
                 in web application. In the BPS, which is based on
                 consistent hash algorithm, the partition and placement
                 schemes are designed respectively to guarantee a
                 system's load balance even when the requests of this
                 system are highly skewed. The range of hash function is
                 divided into several groups equally and those groups
                 will be relocated when caching nodes are overloaded.
                 The implementation and evaluation of the BPS is also
                 presented in this paper. The effectiveness of the BPS
                 has been verified in the simulation experiment and the
                 BPS can successfully solve load imbalance problems when
                 faced with a large number of get/set requests.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Caglayan:2012:IOA,
  author =       "Bora Caglayan and Ayse Bener",
  title =        "Issue ownership activity in two large software
                 projects",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382786",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Issue management is one of the major challenges of
                 software development teams. Balanced workload
                 allocation of developers who are responsible for the
                 maintenance of the software product would impact the
                 long-term reliability of the product. In this paper, we
                 analyse the issue report, issue ownership, and issue
                 resolve patterns of two large software products over a
                 period of time. We use GINI index to estimate the
                 inequalities in issue ownership over time. Our results
                 indicate that a small group of developers tends to take
                 the ownership of a large portion of new issues
                 especially when the active issue count is relatively
                 high in the software development life cycle. We discuss
                 the implications of this trend and propose long-term
                 issue management strategies to deal with them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Colombo:2012:PSS,
  author =       "Regina Thienne Colombo and Marcelo Schneck Pess{\^o}a
                 and Ana Cervigni Guerra and Amandio Balc{\~a}o Filho
                 and C{\'e}lio Caruso Gomes",
  title =        "Prioritization of software security intangible
                 attributes",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382781",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Intangible elements, such as value ranges of software
                 security properties (e.g., confidentiality, integrity
                 and availability), can be seen as resources to enforce
                 software security. There are no standard units
                 regarding these properties, turning their measurement
                 into a difficult process. On the other hand, we can
                 measure or estimate priorities for intangible elements
                 from tangible ones, since their priorities are
                 proportional. The priorities of tangible resources can
                 be used to assign values to the priorities of
                 intangible resources through the experience of the
                 involved analysts. In this paper, we present a
                 theoretical process based on mathematical constructs to
                 score the priority and to estimate measures of software
                 security attributes. This process causes the complex
                 systems decomposition into simpler and smaller systems,
                 thus allowing the estimation of properties that will
                 help the understanding and measurement of software
                 security properties. Our results provide a model for
                 access security; the priority score of security
                 attributes is calculated using the AHP methodology. We
                 illustrate the application of our approach in a Web
                 management system for governmental research
                 institutions, presenting results that may support
                 managers in the prioritization, evaluation and
                 management of security requirements related to Web
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lago:2012:RIW,
  author =       "Patricia Lago and Grace A. Lewis and Andreas Metzger
                 and Vladimir Tosic and Domenico Bianculli and Antinisca
                 {Di Marco} and Andrea Polini and Pierluigi Plebani",
  title =        "Report of the {4th International Workshop on
                 Principles of Engineering Service-Oriented Systems
                 (PESOS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382764",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 4th International Workshop on Principles of
                 Engineering Service-Oriented Systems (PESOS 2012) was
                 held at the International Conference on Software
                 Engineering, ICSE 2012, on June 4, 2012. The special
                 theme of this 4th edition of PESOS was ``The Internet
                 of Services.'' PESOS 2012 brought together software
                 engineering researchers from academia and industry, as
                 well as practitioners working in the areas of
                 service-oriented systems, to discuss research
                 challenges, recent developments, novel application
                 scenarios, as well as methods, techniques, experiences,
                 and tools to support engineering, evolution and
                 adaptation of large-scale, highly-dynamic
                 service-oriented systems. For the first time, PESOS
                 featured a special session on ``The Quest for Case
                 Studies.'' This effort created an initial reference set
                 of case studies, hosted on a publicly-available
                 repository, for the research community in
                 service-oriented systems. The multiple discussions
                 throughout the day resulted in the identification
                 service requirements for the Internet of Services.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2012:PMD,
  author =       "Indu Singh and Manoj Kumar",
  title =        "A proposed model for data warehouse user behaviour
                 using intrusion detection system",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382771",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data Warehouse (DW) systems maintain sensitive and
                 crucial information, which is integrated from various
                 heterogeneous sources of organization. With the ever
                 increasing deployment and usage of networks, these
                 systems are becoming more vulnerable to malicious
                 attacks. With the increased number of attacks,
                 intrusion detection has become vital part of
                 Information Security. In this paper, we have proposed a
                 model for analyzing and detecting anomalous events
                 based on user behavior analysis through usage patterns,
                 user profiles and session management. After monitoring
                 the events in the system, if any intrusion activity
                 occurs, then alerts are issued to system
                 administrators. Since a user profile is not necessarily
                 fixed but rather it evolves with changing time, so a
                 dynamic user behavior modeling is represented as a
                 sequence of events and combination of fact and
                 dimension tables accessed by the users. In this way, DW
                 systems may be protected by the malicious attacks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hofer:2012:AWI,
  author =       "Birgit Hofer and Franz Wotawa and Rui Abreu",
  title =        "{AI} for the win: improving spectrum-based fault
                 localization",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382784",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A considerable amount of time in software engineering
                 is spent in debugging. In practice, mainly debugging
                 tools which allow for executing a program step-by-step
                 and setting break points are used. This debugging
                 method is however very time consuming and cumbersome.
                 There is a need for tools which undertake the task of
                 narrowing down the most likely fault locations. These
                 tools must complete this task with as little user
                 interaction as possible and the results computed must
                 be beneficial so that such tools appeal to programmers.
                 In order to come up with such tools, we present three
                 variants of the well-known spectrum-based fault
                 localization technique that are enhanced by using
                 methods from Artificial Intelligence. Each of the three
                 combined approaches outperforms the underlying basic
                 method concerning diagnostic accuracy. Hence, the
                 presented approaches support the hypothesis that
                 combining techniques from different areas is
                 beneficial. In addition to the introduction of these
                 techniques, we perform an empirical evaluation, discuss
                 open challenges of debugging and outline possible
                 solutions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lochmann:2012:BIA,
  author =       "Klaus Lochmann",
  title =        "A benchmarking-inspired approach to determine
                 threshold values for metrics",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382782",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In order to assess software quality by software
                 metrics, usually, thresholds for metric values are
                 needed. A common problem is to define reasonable
                 threshold values. One possible solution is to use a
                 benchmarking approach: the threshold value for a metric
                 is calculated based on the metric values of a set of
                 systems, which are called benchmarking base. A relevant
                 question is, how the used benchmarking base influences
                 the result of the software quality assessment. Based on
                 the quality assessment approach of Quamoco, we conduct
                 a series of experiments, using different benchmarking
                 bases. For each benchmarking base a quality assessment
                 of a series of test systems is conducted. We analyze
                 the whether the quality assessment results of the test
                 systems are concordant for different benchmarking
                 bases. The main findings are: (1) The bigger the
                 benchmarking base, the less divergent are the rankings,
                 and the less is the variance of the results. (2) The
                 size of the systems contained within a benchmarking
                 base does not influence the results, i.e. a
                 benchmarking base containing small systems works
                 equally well for small and large systems, and vice
                 versa. These results show that benchmarking is a
                 feasible approach for determining threshold values.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Machado:2012:STP,
  author =       "Ivan do Carmo Machado and John D. McGregor and Eduardo
                 Santana de Almeida",
  title =        "Strategies for testing products in software product
                 lines",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382783",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The software product line engineering strategy enables
                 the achievement of significant improvements in quality
                 through reuse of carefully crafted software assets
                 across multiple products. However, high levels of
                 quality in the software product line assets, which are
                 used to create products, must be accompanied by
                 effective and efficient test strategies for the
                 products in the software product line. The goal of this
                 study is to understand which strategies for testing
                 products in software product lines have been reported
                 in the literature, enabling discussions on the
                 significant issues, and also pointing out further
                 research directions. A systematic literature review was
                 carried out that identified two hundred seventy-three
                 papers, published from the years 1998 and early in
                 2012. From such a set of papers, a systematic selection
                 resulted in forty-one relevant papers. The analysis of
                 the reported strategies comprised two important
                 aspects: the selection of products for testing, and the
                 actual test of products. The findings showed a range of
                 strategies, dealing with both aspects, but few
                 empirical evaluations of their effectiveness have been
                 performed, which limits the inferences that can be
                 drawn.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Misra:2012:JSC,
  author =       "Janardan Misra and Annervaz KM and Vikrant Kaulgud and
                 Shubhashis Sengupta and Gary Titus",
  title =        "{Java} source-code clustering: Unifying syntactic and
                 semantic features",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382766",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from an international workshop on
                 ``Social and Algorithmic Issues in Business Support''
                 (SAIBS), which was organized in conjunction with the
                 16th ADBIS Conference in Poznan, Poland, on September
                 17, 2012. The main focus of this workshop was to
                 provide a venue for the discussion whether social
                 stands in opposition to algorithmic or systematic. We
                 analyzed social contribution to business processes
                 taking into account possible benefits and risk factors.
                 Questions raised in collected research and discussion
                 related to how far business could relay on social input
                 and what were the limits or what were the areas where
                 introducing crowdsourced components might increase
                 overall risk value to unacceptable level? Algorithmic
                 approach to observe and collect social behaviour was
                 discussed in the context of internet auctions
                 participants and car drivers equipped in mobile
                 application for instant route planning and collecting
                 feedback cartracking data. Having in mind Andrew Keen's
                 critique of social contribution in Web 2.0-related
                 phenomena we looked for the Wisdom of Crowds [1].
                 Collected conclusions and further dissemination of
                 research results should lead to an improvement in
                 utilizing social impact on software development and
                 business processes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Brahmasani:2012:PXA,
  author =       "Siva Brahmasani and Subramanian Selvakumar and E.
                 Sivasankar",
  title =        "Prevention of {XSS} attacks using {STCD}: Server side
                 tagging and client side differentiation",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382768",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Variability (the ability of a software system or
                 software artifact to be adapted for use in a specific
                 context) is reflected in and facilitated through the
                 software architecture. The Second International
                 Workshop on Variability in Software Architecture
                 (VARSA) was held in conjunction with the Joint 10th
                 Working IEEE/IFIP Conference on Software Architecture
                 and 6th European Conference on Software Architecture
                 2012 in Helsinki, Finland. The workshop aimed at
                 exploring current and emerging methods, languages,
                 notations technologies and tools to model, implement,
                 and manage variability in the software architecture. It
                 featured one industrial talk, five research paper
                 presentations, and three working group discussions.
                 Working groups discussed topics that emerged during the
                 workshop. This report summarizes the themes of the
                 workshop and presents the results of the working group
                 discussions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mrunalini:2012:DPM,
  author =       "M. Mrunalini and T. V. Suresh Kumar and K. Rajani
                 Kanth",
  title =        "Dynamic process model for identifying modified data
                 using mobile agents in real time {ETL} processes",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382767",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Usability and accessibility issues are common causes
                 why software fails to meet user requirements. However,
                 requirements engineers still focus on functional
                 requirements and might ignore to also elicit system
                 usability and accessibility requirements. This is a
                 high risk which can lead to project and software
                 failure. Improving the usability and accessibility of a
                 system in a later development stage is costly and time
                 consuming. Targeting these concerns, the workshop
                 envisioned that research must address the proper
                 integration of system usability and accessibility
                 requirements into the requirements engineering process
                 and also must focus on how to manage and control the
                 evaluation of these requirements in a systematic way.
                 UsARE 2012 provided a platform for discussing issues
                 which are relevant for both fields, the Requirements
                 Engineering (RE) and the Human Computer Interaction
                 (HCI). The workshop aim was to bring\ together people
                 from these two communities (RE and HCI) to explore this
                 integration. Researchers and practitioners were invited
                 to submit contributions including problem statements,
                 technical solutions, experience reports, planned work
                 and vision papers. Envisioned results may help aligning
                 RE and HCI processes in order to overcome open issues
                 in these fields.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2012:MVC,
  author =       "Parminder Kaur and Hardeep Singh",
  title =        "A Modified Version Control Tool for Component-Based
                 Systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--10",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382765",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 8th International Conference on the Quality of
                 Information and Communications Technology (QUATIC 2012)
                 took place in Lisbon, Portugal, from 3 to 6 September
                 2012. QUATIC serves as a forum for disseminating
                 advanced methods, techniques and tools for supporting
                 quality approaches to ICT engineering and management.
                 The Conference Program of the 2012 edition was
                 organized on a series of Thematic Tracks on the first
                 day, each corresponding to a specific topic of
                 interest, and a Main Track on the second and third days
                 of the conference, with keynote speakers and extended
                 paper presentations selected among the best papers of
                 the thematic tracks. This short report summarizes the
                 paper and keynote presentations at QUATIC 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:TLT,
  author =       "Larry Bernstein",
  title =        "Things i learned from taming software development",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "5--6",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382757",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Grechanik:2012:RBA,
  author =       "Mark Grechanik",
  title =        "Random benchmark application generation for evaluating
                 program analysis and testing tools",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "6--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382758",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2012:LWD,
  author =       "Robert Schaefer",
  title =        "Limitations of web design",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "7--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382759",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEe,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "8--9",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382760",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSf,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "10--18",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382780",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPf,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "19--23",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382779",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Garbervetsky:2012:RIW,
  author =       "Diego Garbervetsky and Sunghun Kim",
  title =        "Report from {2nd International Workshop on Developing
                 Tools as Plug-Ins (TOPI 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "24--27",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382775",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Workshop on Developing Tools as
                 Plug-Ins (TOPI) is a venue for researchers and
                 practitioners interested in plug-in development. The
                 main interest is understanding the opportunities and
                 challenges of developing tools as plug-ins, and thus,
                 we seek for discussions regarding the characteristics
                 of good plug-ins, interoperability requirements to
                 making tools available across platforms, recent
                 successful tools as plug-ins as well as foreseen medium
                 and long term challenges of tools as plug-ins. The
                 second edition of this workshop, TOPI 2012 was
                 co-located with the International Conference on
                 Software Engineering (ICSE 2012). TOPI 2012 received a
                 total of 32 submissions. Among them, 14 were accepted
                 as full papers and 4 as short papers. The audience
                 during the whole workshop ranged from 25 to 30
                 participants. The final program comprised position
                 papers including new proposals for plug-in
                 architectures as well as their interaction with
                 development environments and run-times, and papers
                 discussing the implementation of different kind of
                 tools as plug-ins. This report describes the main
                 results of TOPI 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bell:2012:RSIb,
  author =       "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
                 and Swapneel Sheth",
  title =        "Report from the {Second International Workshop on
                 Games and Software Engineering (GAS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "26--27",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382776",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Second International Workshop on Games and
                 Software Engineering (GAS 2012) was held in June 2012,
                 collocated with ICSE 2012 in Zurich, Switzerland. GAS
                 2012 explores issues that crosscut the software
                 engineering and the game engineering communities.
                 Advances in game engineering techniques can be adopted
                 by the software engineering community to develop more
                 engaging applications across diverse domains:
                 education; healthcare; fitness; sustainable activities
                 (e.g., recycling awareness); and so on. Successful
                 computer games feature a property that is not always
                 found in traditional software: they are highly
                 engaging. Engaging games enthrall players and result in
                 users willing to spend increasing amounts of time and
                 money playing them. Nine submissions were accepted for
                 the workshop, which also featured a panel session and
                 an informal poster session.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gruner:2012:FWF,
  author =       "Stefan Gruner and Bernhard Rumpe",
  title =        "{FormSERA Workshop on Formal Methods in Software
                 Engineering Rigorous and Agile Approaches}: 2nd of
                 {June 2012} at {ICSE'2012} in {Z{\"u}rich (CH)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "28--30",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382777",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes the activities and results of
                 the FormSERA workshop on Formal Methods in Software
                 Engineering --- Rigorous and Agile Approaches. The
                 workshop took place on the 2nd of June 2012 in
                 Z{\"u}rich (CH) under the umbrella of the 34th
                 International Conference on Software Engineering, ICSE
                 2012, see http://www.formsera.org/.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tekinerdogan:2012:FTS,
  author =       "Bedir Tekinerdogan",
  title =        "{First Turkish Software Product Line Engineering
                 Workshop} summary",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "30--34",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382778",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software reuse has been a goal of the software
                 community since the early days of software engineering.
                 In this context software product line engineering
                 (SPLE) has gained a broad interest in both academic
                 institutions and industry. This trend can also be
                 observed in Turkey. In the recent years an increasing
                 number of software companies in Turkey have adopted a
                 SPLE approach while others are planning to make the
                 transition. This paper summarizes the results of the
                 First Turkish Software Product Line Engineering
                 Workshop that has been organized in Ankara in June
                 2012. The primary goal of the workshop was to reflect
                 on the state of practice in SPLE in Turkey. For this
                 five leading SPLE companies in Turkey have shared their
                 experiences in adopting SPLE, and using interactive
                 discussions a research agenda for SPLE in Turkey has
                 been defined. We report both on the experiences from
                 the workshop and the resulting research topics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Swamy:2012:BRSb,
  author =       "Harisankar Krishna Swamy",
  title =        "Book Review: {{\booktitle{Structured parallel
                 programming patterns for efficient computation}} by
                 Michael McCool, Arch D. Robison and James Reinders}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "43--43",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382773",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bangalore:2012:BRA,
  author =       "Srinivasan M. Bangalore",
  title =        "Book Review: {{\booktitle{Agile Analytics}} by Ken
                 Collier}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "43--44",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382774",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2013:CLS,
  author =       "Alok Mishra and Deepti Mishra",
  title =        "A curriculum for large scale software development",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413042",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Large scale software developments are becoming common
                 in software development organizations. Getting exposure
                 to work on similar projects is very significant for
                 this course. Here, major components of large scale
                 software development curriculum are discussed along
                 with suggestions towards making it a successful course
                 of software engineering curriculum.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Couto:2013:CDE,
  author =       "Cesar Couto and Cristiano Maffort and Rogel Garcia and
                 Marco Tulio Valente",
  title =        "{COMETS}: a dataset for empirical research on software
                 evolution using source code metrics and time series
                 analysis",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--3",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413047",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper documents a time series dataset on the
                 evolution of seventeen object-oriented metrics
                 extracted from ten open-source systems. By making this
                 dataset public our goal is to assist researchers with
                 interest in software evolution analysis and modeling.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Pande:2013:OCS,
  author =       "Jeetendra Pande and Christopher J. Garcia and Durgesh
                 Pant",
  title =        "Optimal component selection for component based
                 software development using pliability metric",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413044",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component Based Software Development (CBSD) has gained
                 widespread acceptance as it often results in higher
                 quality software with a significant reduction in
                 development time and costs. A key idea behind CBSD is
                 the extensive reuse and composition of preexisting
                 modules into new software. In this paper we introduce
                 the pliability metric, which is well suited to a
                 component-based orientation and extends previous
                 metrics. Pliability is a flexible measure that assesses
                 software quality across different quality attributes in
                 terms of the quality of its components. In addition, we
                 have developed an optimal component selection model
                 based on integer programming, for maximizing
                 pliability. Through computational experimentation we
                 demonstrate that this model is capable of finding
                 optimal solutions to problems with a very large number
                 of components and requirements in a short time.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bedi:2013:MMT,
  author =       "Punam Bedi and Vandana Gandotra and Archana Singhal
                 and Himanshi Narang and Sumit Sharma",
  title =        "Mitigating multi-threats optimally in proactive threat
                 management",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413041",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In turbulent economic times, the cost effectiveness of
                 security measures is of the utmost importance when
                 designing safeguards or countermeasures. This paper
                 presents an optimal approach: MMT-O, Mitigating
                 Multi-Threats Optimally, to meet the above challenges.
                 The proposed approach is based on an optimum mitigation
                 path set generation algorithm that provides optimal
                 plans for threat/vulnerability management which can be
                 adopted at the design level of the software life cycle.
                 In MMT-O, a multi-threat attack graph is generated by
                 combining all of the individual threats responsible for
                 security compromise of the system. It identifies a
                 unique set of attacks needing mitigation by removing
                 redundant nodes, as an attack can be a part of multiple
                 threats. The proposed algorithm, implemented in Java,
                 provides the minimum mitigation paths required to be
                 blocked to avert the threat. Countermeasures using a
                 multi-agent system are inducted in these identified
                 mitigation paths to avert the threat optimally. The
                 proposed approach has been applied on different test
                 cases and the results validate its economic
                 justification over traditional security solutions as a
                 part of proactive threat management.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saxena:2013:UML,
  author =       "Vipin Saxena and Deepak Arora and Nimesh Mishra",
  title =        "{UML} modeling of load optimization for distributed
                 computer systems based on genetic algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413043",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Distributed computing has now become one of the most
                 efficient network system configurations to exhibit
                 parallelism in loosely coupled systems. These systems
                 are known for better reliability, availability,
                 scalability and robustness, intended to provide high
                 performance computing in a very efficient manner. The
                 composition of distributed systems consists of multiple
                 autonomous computers that can be geographically
                 dispersed and interconnected with each other to provide
                 optimum resource utilization. The degree of resource
                 utilization is one of the key criteria for evaluating
                 the performance of such systems. We propose a
                 genetic-algorithm-based approach to load optimization
                 in a distributed computing environment. Genetics
                 algorithm has been adapted from the biological gene
                 theory. Since it shows the existence of the fittest
                 chromosome from the sample chromosomes population, it
                 may be used to find the most optimum solution for any
                 problem. This research work demonstrates the
                 implication of genetic algorithms to optimize the
                 overall waiting time for a set of processes to be
                 executed on a set of servers. In order to understand
                 the design complexity, we modeled the proposed approach
                 using UML class and sequence diagrams. The results of
                 the proposed model have been found beneficial when
                 implemented and tested under various test scenarios
                 using C++.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2013:ESE,
  author =       "Gagandeep Singh and Hardeep Singh",
  title =        "Effect of software evolution on metrics and
                 applicability of {Lehman}'s laws of software
                 evolution",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413046",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nagpal:2013:ASE,
  author =       "Geeta Nagpal and Moin Uddin and Arvinder Kaur",
  title =        "Analyzing software effort estimation using k means
                 clustered regression approach",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--9",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413045",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software estimation is an area where more assurances
                 have been broken than in any other area of software
                 development. Numerous studies attempting new and
                 reliable software effort estimation techniques have
                 been proposed but no consensus as to which techniques
                 are the most appropriate has been reached so far. Due
                 to the intangible nature of ``software'', effort
                 estimation with a high level of accuracy remains a
                 dream for developers. It is unlikely to expect very
                 accurate estimates of development effort because of the
                 inherent uncertainty in software projects and the
                 complex and dynamic interaction of factors that impact
                 software development. Heterogeneity exists in software
                 engineering datasets because data is obtained from
                 diverse sources. This can be reduced by defining
                 certain relationships between the data values by
                 classifying them into different clusters. This study
                 focuses on how the combination of clustering and
                 regression techniques can reduce the potential problem
                 in effectiveness of predictive efficiency due to
                 heterogeneity of the data. Using a clustered approach
                 creates subsets of data having a degree of homogeneity
                 that enhances prediction accuracy. It was also observed
                 in this study that ridge regression performs better
                 than other regression techniques. Another key finding
                 is that by selecting a subset of highly predictive
                 attributes using Grey relational analysis a significant
                 improvement in prediction can be achieved.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Huang:2013:TOQ,
  author =       "Shihong Huang and Dragutin Petkovic and Kazunori Okada
                 and Marc Sosnick and Shenhaochen Zhu and Rainer
                 Todtenhoefer",
  title =        "Toward objective and quantitative assessment and
                 prediction of teamwork effectiveness in software
                 engineering courses",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "7--9",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413071",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "10--19",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413072",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "20--26",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413073",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bencomo:2013:RIW,
  author =       "Nelly Bencomo and Gordon Blair and Sebastian G{\"o}tz
                 and Brice Morin and Bernhard Rumpe",
  title =        "Report on the {7th International Workshop on
                 Models@Runtime}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "27--30",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413061",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 7th edition of the workshop Models@Runtime was
                 held at the 15th International Conference on Model
                 Driven Engineering Languages and Systems (MODELS). The
                 workshop took place in the city of Innsbruck, Austria,
                 on the 2nd of October 2012. The workshop was organised
                 by Nelly Bencomo, Gordon Blair, Sebastian G{\~A}\P tz,
                 Brice Morin and Bernhard Rumpe. It was attended by at
                 least 48 people. In this report we present a synopsis
                 of the presentations and breakout discussions that took
                 place during the workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lago:2013:EIC,
  author =       "Patricia Lago and Rick Kazman and Niklaus Meyer and
                 Maurizio Morisio and Hausi A. M{\"u}ller and Frances
                 Paulisch",
  title =        "Exploring initial challenges for green software
                 engineering: summary of the first {GREENS} workshop, at
                 {ICSE 2012}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "31--33",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413062",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The GREENS workshop provides a forum for practitioners
                 and academics to share knowledge, ideas, practices and
                 current results related to green and sustainable
                 software engineering. This first workshop was held at
                 ICSE 2012 in Zurich, Switzerland. It featured a keynote
                 talk, twelve research position statements and two
                 breakout sessions that discussed topics that ranged
                 from bringing sustainability and energy efficiency into
                 all software lifecycle stages, to green measures and
                 estimations, practices, notations, and tools to both
                 greening the software engineering process, and greening
                 the resulting Information and Communication Technology
                 systems. This report presents the themes of the
                 workshop, summarizes the results of the discussions
                 held in the breakout sessions, as well as the
                 identified research challenges.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bell:2013:RSI,
  author =       "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
                 and Swapneel Sheth",
  title =        "Report from the {Second International Workshop on
                 Games and Software Engineering (GAS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "34--35",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413063",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lago:2013:RIW,
  author =       "Patricia Lago and Grace A. Lewis and Andreas Metzger
                 and Vladimir Tosic and Domenico Bianculli and Antinisca
                 {Di Marco} and Andrea Polini and Pierluigi Plebani",
  title =        "Report of the {4th International Workshop on
                 Principles of Engineering Service-Oriented Systems
                 (PESOS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "35--38",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413064",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 4th International Workshop on Principles of
                 Engineering Service-Oriented Systems (PESOS 2012) was
                 held at the International Conference on Software
                 Engineering, ICSE 2012, on June 4, 2012. The special
                 theme of this 4th edition of PESOS was ``The Internet
                 of Services.'' PESOS 2012 brought together software
                 engineering researchers from academia and industry, as
                 well as practitioners working in the areas of
                 service-oriented systems, to discuss research
                 challenges, recent developments, novel application
                 scenarios, as well as methods, techniques, experiences,
                 and tools to support engineering, evolution and
                 adaptation of large-scale, highly-dynamic
                 service-oriented systems. For the first time, PESOS
                 featured a special session on ``The Quest for Case
                 Studies.'' This effort created an initial reference set
                 of case studies, hosted on a publicly-available
                 repository, for the research community in
                 service-oriented systems. The multiple discussions
                 throughout the day resulted in the identification
                 service requirements for the Internet of Services.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2013:MVC,
  author =       "Parminder Kaur and Hardeep Singh",
  title =        "A Modified Version Control Tool for Component-Based
                 Systems",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "39--41",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382765",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 8th International Conference on the Quality of
                 Information and Communications Technology (QUATIC 2012)
                 took place in Lisbon, Portugal, from 3 to 6 September
                 2012. QUATIC serves as a forum for disseminating
                 advanced methods, techniques and tools for supporting
                 quality approaches to ICT engineering and management.
                 The Conference Program of the 2012 edition was
                 organized on a series of Thematic Tracks on the first
                 day, each corresponding to a specific topic of
                 interest, and a Main Track on the second and third days
                 of the conference, with keynote speakers and extended
                 paper presentations selected among the best papers of
                 the thematic tracks. This short report summarizes the
                 paper and keynote presentations at QUATIC 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Misra:2013:JSC,
  author =       "Janardan Misra and Annervaz KM and Vikrant Kaulgud and
                 Shubhashis Sengupta and Gary Titus",
  title =        "{Java} source-code clustering: Unifying syntactic and
                 semantic features",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "41--43",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382766",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from an international workshop on
                 ``Social and Algorithmic Issues in Business Support''
                 (SAIBS), which was organized in conjunction with the
                 16th ADBIS Conference in Poznan, Poland, on September
                 17, 2012. The main focus of this workshop was to
                 provide a venue for the discussion whether social
                 stands in opposition to algorithmic or systematic. We
                 analyzed social contribution to business processes
                 taking into account possible benefits and risk factors.
                 Questions raised in collected research and discussion
                 related to how far business could relay on social input
                 and what were the limits or what were the areas where
                 introducing crowdsourced components might increase
                 overall risk value to unacceptable level? Algorithmic
                 approach to observe and collect social behaviour was
                 discussed in the context of internet auctions
                 participants and car drivers equipped in mobile
                 application for instant route planning and collecting
                 feedback car-tracking data. Having in mind Andrew
                 Keen's critique of social contribution in Web
                 2.0-related phenomena we looked for the Wisdom of
                 Crowds [1]. Collected conclusions and further
                 dissemination of research results should lead to an
                 improvement in utilizing social impact on software
                 development and business processes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mrunalini:2013:DPM,
  author =       "M. Mrunalini and T. V. Suresh Kumar and K. Rajani
                 Kanth",
  title =        "Dynamic process model for identifying modified data
                 using mobile agents in real time {ETL} processes",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "43--46",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382767",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Usability and accessibility issues are common causes
                 why software fails to meet user requirements. However,
                 requirements engineers still focus on functional
                 requirements and might ignore to also elicit system
                 usability and accessibility requirements. This is a
                 high risk which can lead to project and software
                 failure. Improving the usability and accessibility of a
                 system in a later development stage is costly and time
                 consuming. Targeting these concerns, the workshop
                 envisioned that research must address the proper
                 integration of system usability and accessibility
                 requirements into the requirements engineering process
                 and also must focus on how to manage and control the
                 evaluation of these requirements in a systematic way.
                 UsARE 2012 provided a platform for discussing issues
                 which are relevant for both fields, the Requirements
                 Engineering (RE) and the Human Computer Interaction
                 (HCI). The workshop aim was to bring\ together people
                 from these two communities (RE and HCI) to explore this
                 integration. Researchers and practitioners were invited
                 to submit contributions including problem statements,
                 technical solutions, experience reports, planned work
                 and vision papers. Envisioned results may help aligning
                 RE and HCI processes in order to overcome open issues
                 in these fields.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Brahmasani:2013:PXA,
  author =       "Siva Brahmasani and Subramanian Selvakumar and E.
                 Sivasankar",
  title =        "Prevention of {XSS} attacks using {STCD}: Server side
                 tagging and client side differentiation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "46--49",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382768",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Variability (the ability of a software system or
                 software artifact to be adapted for use in a specific
                 context) is reflected in and facilitated through the
                 software architecture. The Second International
                 Workshop on Variability in Software Architecture
                 (VARSA) was held in conjunction with the Joint 10th
                 Working IEEE/IFIP Conference on Software Architecture
                 and 6th European Conference on Software Architecture
                 2012 in Helsinki, Finland. The workshop aimed at
                 exploring current and emerging methods, languages,
                 notations technologies and tools to model, implement,
                 and manage variability in the software architecture. It
                 featured one industrial talk, five research paper
                 presentations, and three working group discussions.
                 Working groups discussed topics that emerged during the
                 workshop. This report summarizes the themes of the
                 workshop and presents the results of the working group
                 discussions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2013:SLT,
  author =       "Vineet Sharma and S. A. M. Rizvi and Arun Sharma",
  title =        "Software Licenses --- A tool to control distribution
                 of software",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "49--51",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382769",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Workshop on Developing Tools as
                 Plug-Ins (TOPI) is a venue for researchers and
                 practitioners interested in plug-in development. The
                 main interest is understanding the opportunities and
                 challenges of developing tools as plug-ins, and thus,
                 we seek for discussions regarding the characteristics
                 of good plug-ins, interoperability requirements to
                 making tools available across platforms, recent
                 successful tools as plug-ins as well as foreseen medium
                 and long term challenges of tools as plug-ins. The
                 second edition of this workshop, TOPI 2012 was
                 co-located with the International Conference on
                 Software Engineering (ICSE 2012). TOPI 2012 received a
                 total of 32 submissions. Among them, 14 were accepted
                 as full papers and 4 as short papers. The audience
                 during the whole workshop ranged from 25 to 30
                 participants. The final program comprised position
                 papers including new proposals for plug-in
                 architectures as well as their interaction with
                 development environments and run-times, and papers
                 discussing the implementation of different kind of
                 tools as plug-ins. This report describes the main
                 results of TOPI 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Beshilas:2013:BRC,
  author =       "Bill Beshilas",
  title =        "Book Review: {{\booktitle{Collaborative enterprise
                 architecture}} by Stefan Bente, Uwe Bombosch, and
                 Shailendra Langade}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "54--54",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413051",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chapelle:2013:BRO,
  author =       "Gregory Chapelle",
  title =        "Book Review: {{\booktitle{The official Ubuntu book}},
                 seventh edition by Matthew Helmke and Amber Graner}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "54--55",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413052",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2013:BRJ,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Java application
                 architecture: modularity patterns with examples using
                 OSGi}} by Kirk Knoernschild}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "55--55",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413053",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kienle:2013:BRG,
  author =       "Holger M. Kienle",
  title =        "Book Review: {{\booktitle{Grounded innovation:
                 strategies for creating digital products}} by Lars Erik
                 Holmquist}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "55--56",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413054",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Paige:2013:BRS,
  author =       "Michael Paige",
  title =        "Book Review: {{\booktitle{Sams teach yourself jQuery
                 mobile in 24 hours}} by Phil Dutson}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "56--57",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413055",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sampaio:2013:BRQ,
  author =       "Alberto Sampaio",
  title =        "Book Review: {{\booktitle{Quantifying the user
                 experience: practical statistics for user research}} by
                 Jeff Sauro and James R. Lewis}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "57--58",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413056",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saur:2013:TLP,
  author =       "Joe Saur",
  title =        "Think like a programmer: an introduction to creative
                 problem solving by V. {Anton} Spraul",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "58--58",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413057",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Stobie:2013:BRX,
  author =       "Keith Stobie",
  title =        "Book Review: {{\booktitle{OS X Mountain Lion Pocket
                 Guide}} by Chris Seibold}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "59--59",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413058",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRM,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Modern embedded computing:
                 designing connected, pervasive, media-rich systems}} by
                 Peter Barry and Patrick Crowley}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "59--60",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413059",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Catal:2013:TEB,
  author =       "Cagatay Catal",
  title =        "Teaching evidence-based software engineering to master
                 students: a single lecture within a course or an entire
                 semester-long course?",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "1--2",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439981",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, we summarize our perspective on
                 teaching evidence-based software engineering (EBSE) to
                 master students. In this semester, we aimed to
                 investigate this subject as a single lecture within a
                 master course called Software Architecture instead of
                 an entire semester-long course called EBSE. Each of the
                 students delivered a systematic mapping study report
                 related to the software architecture at the end of the
                 semester and these project reports showed that this
                 teaching approach is quite useful for master students
                 even though this teaching activity is too short.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rabelo:2013:ACG,
  author =       "Ricardo A. C. Rabelo and Hendrik T. Macedo and Eduardo
                 O. Freire and Rodrigo M. Oliveira",
  title =        "Automatic code generation of {SIMUROSOT} game
                 strategies: an approach based on finite state
                 machines",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "1--8",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439983",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Robot soccer is a multidisciplinary research field of
                 growing academic interest. Scientific competitions
                 worldwide have driven major technological advances in
                 the field, since research institutes and universities
                 often enroll their robotic teams and present the
                 developments achieved during the previous year. The
                 FIRA is a leading international organization that
                 promotes such type of competition. One of its various
                 competition categories is that of virtual robots
                 competing in a simulation platform called SIMUROSOT.
                 This 3D simulation platform is available so that
                 researchers and students can develop robot teams and
                 test their performance appropriately and repeatedly.
                 The major problem with the mainstream encoding
                 mechanism used in the preparation of robot teams for
                 SimuroSot is the lack of a formal process to
                 standardize the programming and model the game
                 strategies. Such lack of standardization causes several
                 limitations on the competition as a science promoter,
                 namely: (1) the difficulty of understanding other's
                 code, (2) absence of abstraction for the conceiving of
                 game strategies, (3) need for high programming skills
                 in order to produce effective game strategies and (4)
                 lack of clear separation between robots movimentation
                 primitives and specific application domain concerns ---
                 in this case, the soccer domain. This paper proposes a
                 semi-formal specification for the modeling of team game
                 strategies to the FIRA SIMUROSOT category. This
                 specification defines two levels of mapping: (1)
                 mapping of the application domain information --- in
                 this case, the soccer competition --- to Finite State
                 Machines and (2) mapping of Finite State Machines that
                 represent game strategies of a team to their respective
                 coding in a target programming language, making use of
                 coding standards that ensure the readability and
                 maintainability of the final code. Encodings of game
                 strategies in the programming language Lingo has been
                 provided following the proposal. The error-free
                 execution of such encodings on the simulation platform
                 shows the proposal feasibility.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tiwari:2013:RRT,
  author =       "Rajeev Tiwari and Noopur Goel",
  title =        "Reuse: reducing test effort",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439982",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Testing effort consumes more than half of all
                 development effort and is one of the important factors,
                 which obstruct quality assurance. Software reuse
                 enhances quality and productivity and at the same time
                 reduces the time-to-market of the software products. As
                 reuse applies to the development process, so too, it
                 applies to the testing process. In this paper, we
                 discuss reuse-oriented test approaches, which are used
                 to reduce the testing effort. Further, we present the
                 state-of-the-art in reuse-oriented test approaches
                 employed in reuse-oriented development processes. At
                 the end of the current paper, we argue that the current
                 trend is towards built-in test and model based testing
                 in the applications developed through reusable
                 software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Zage:2013:SSE,
  author =       "Wayne Zage",
  title =        "The security and software engineering research center
                 {(S2ERC)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "6--7",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439977",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2013:RLL,
  author =       "Robert Schaefer",
  title =        "Relay ladder logic considered harmful",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "8--9",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439978",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2013:SEEa,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "9--10",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439979",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "11--19",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439980",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "20--25",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2440001",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ralph:2013:RFS,
  author =       "Paul Ralph and Pontus Johnson and Howell Jordan",
  title =        "Report on the {First SEMAT Workshop on General Theory
                 of Software Engineering (GTSE 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "26--28",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439999",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Many academic disciplines have general theories, which
                 apply across the discipline and underlie much of its
                 research. Examples include the Big Bang theory
                 (cosmology), Maxwell's equations (electrodynamics), the
                 theories of the cell and evolution (biology), the
                 theory of supply and demand (economics), and the
                 general theory of crime (criminology). Software
                 engineering, in contrast, has no widely-accepted
                 general theory. Consequently, the SEMAT Initiative
                 organized a workshop to encourage development of
                 general theory in software engineering. Workshop
                 participants reached broad consensus that software
                 engineering would benefit from better theoretical
                 foundations, which require diverse theoretical
                 approaches, consensus on a primary dependent variable
                 and better instrumentation and descriptive research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lewis:2013:RIIa,
  author =       "Grace A. Lewis and Anca Ionita and Marin Litoiu",
  title =        "Report of the {2012 IEEE 6th International Workshop on
                 the Maintenance and Evolution of Service-Oriented and
                 Cloud-Based Systems (MESOCA 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "29--32",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439998",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 2012 IEEE 6th International Workshop on the
                 Maintenance and Evolution of Service-Oriented and
                 Cloud-Based Systems (MESOCA 2012) was held as a
                 co-located event of the International Conference on
                 Software Maintenance, ICSM 2012, on September 24, 2012.
                 MESOCA 2012 brought together software engineering
                 researchers from academia and industry, as well as
                 practitioners, to share results and open issues in the
                 area of maintenance and evolution of service-oriented
                 and cloudbased systems. The many discussions throughout
                 the day resulted in the identification of promising
                 areas of research to address existing gaps and
                 problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Froberg:2013:BRD,
  author =       "Scott Froberg",
  title =        "Book Review: {{\booktitle{Distributed and cloud
                 computing from parallel processing to the Internet of
                 Things}} by Kai Hwang, Geoffry C. Fox, and Jack J.
                 Dongarra}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "34--34",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439991",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/d/dongarra-jack-j.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{M:2013:BRL,
  author =       "Srinivasan M.",
  title =        "Book Review: {{\booktitle{Learning Rails 3}} by Simon
                 St. Laurent, Edd Dumbill and Eric J. Gruber}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "34--34",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439992",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Froberg:2013:BRP,
  author =       "Scott Froberg",
  title =        "Book Review: {{\booktitle{Private cloud computing:
                 consolidation, virtualization, and service-oriented
                 infrastructure}} by Stephen R. Smoot, Nam K. Tan}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "35--35",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439994",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gvero:2013:BRO,
  author =       "Igor Gvero",
  title =        "Book Review: {{\booktitle{Observing the user
                 experience}}, 2nd edition: a practitioner's guide to
                 user research by Elizabeth Goodman, Mike Kuniavsky, and
                 Andrea Moed}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "35--35",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439993",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Berzal:2013:BRS,
  author =       "Fernando Berzal",
  title =        "Book Review: {{\booktitle{Structured parallel
                 programming}} by Michael McCool, James Reinders \& Arch
                 Robison}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "35--39",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439995",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Baliyan:2013:FMH,
  author =       "Niyati Baliyan and Vidushi Sharma and Shivani",
  title =        "A fuzzy model for high-level clones in software",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464531",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "High-level similarities in software, referred to as
                 High-Level Clones (HLCs) may manifest themselves as
                 behavior clones, concept clones, collocated simple
                 clones or domain model clones [3]. The presence of such
                 similarities may deter the maintainability of software,
                 while identifying them may improve the reuse,
                 reengineering, evolution and understandability of
                 software [2]. This study proposes an integrated measure
                 of high-level cloning, using a four input fuzzy model.
                 It also proves that the calculated extent of high-level
                 cloning is practically equal to the simulation result
                 in the MATLAB's fuzzy toolbox.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Meng:2013:PBL,
  author =       "Zhang Meng",
  title =        "{PPCA-based} license plate detection algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464541",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Detection of license plates is a critical part of
                 License Plate Recognition (LPR) systems. In this paper
                 we employ methods based on Probabilistic Principal
                 Component Analysis (PPCA) to extract license plate
                 areas out of vehicle images, and apply an improved
                 normalization step to data preprocessing. The analysis
                 of our experiment shows that this algorithm achieves
                 good accuracy dealing with still vehicle images.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2013:SPM,
  author =       "Alok Mishra and Deepti Mishra",
  title =        "Software project management tools: a brief comparative
                 view",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464537",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The task of managing a software project can be an
                 extremely complex one, drawing on many personal, team,
                 and organizational resources. The quality of a software
                 product is dependent on the process in which the
                 project is completed. Time delays in software
                 development project and low productivity tend to fall
                 right to the bottom line. Recently, the evolution of
                 project management tools for both software and
                 non-software applications has been accelerating at a
                 rapid pace, and the number of available products have
                 grown significantly. There are many project management
                 tools and software being developed everyday to help
                 managers to automate the administration of individual
                 projects or groups of projects during their life-cycle.
                 This article presents a short comparison of popular
                 software project management tools.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chaudhary:2013:ERA,
  author =       "Ritika Chaudhary and Ram Chatterjee",
  title =        "Essence of reusability in aspect-oriented systems",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464532",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Programmers practicing software development have long
                 realized that reusability is an important area of
                 concern --- it is an attribute of quality, which
                 depicts the extent to which a module can be used again
                 in different applications with slight modification.
                 Software professionals often adopt the Module-oriented
                 Approach (MOA) and / or the Object-Oriented Approach
                 (OOA) to develop reusable software. However, these
                 approaches do not address crosscutting concerns (such
                 as logging, security etc.), which are scattered
                 throughout the code and which if poorly done adversely
                 affect reusability and maintainability. Readers may
                 note that ``reusability'' is a quality attribute whose
                 assessment remains quite underexplored. This paper
                 discusses the importance of reusability as a quality
                 attribute and its essence in Aspect-Oriented Systems.
                 This paper has been split into Introduction, Quality
                 Parameters, Conclusion and Future Scope. In the
                 Introduction, the focus is on how Aspect-Oriented
                 Software development addresses the problem of
                 crosscutting concerns. Quality parameters emphasize the
                 concept of reusability within the domains of
                 Object-Oriented Programming and Aspect-Oriented
                 Programming and signify the importance of assessing
                 reusability in Aspect-Oriented Systems. In the future,
                 maintainability will be one of the factors to be
                 considered for assessment of Aspect-Oriented Systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rao:2013:OST,
  author =       "K. Koteswara Rao and GSVP Raju and Srinivasan
                 Nagaraj",
  title =        "Optimizing the software testing efficiency by using a
                 genetic algorithm: a design methodology",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464539",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents a design method for optimizing
                 software-testing efficiency by identifying the most
                 critical path clusters in a program. This is done by
                 the application of soft computing techniques,
                 specifically genetic algorithms. We develop a genetic
                 algorithm that selects the software path clusters to
                 test, which are weighted in accordance with the
                 criticality of the path. Exhaustive software testing is
                 rarely possible because it becomes intractable for even
                 medium-sized software applications. Typically only
                 parts of a program can be tested, but these parts are
                 not necessarily the most error prone ones. Therefore,
                 we are designing a more selective approach for testing
                 the paths that are more critical, which results in
                 improving the testing efficiency.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hasteer:2013:PAR,
  author =       "Nitasha Hasteer and Abhay Bansal and B. K. Murthy",
  title =        "Pragmatic assessment of research intensive areas in
                 cloud: a systematic review",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464533",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Cloud computing is a name given to a set of systems
                 for enabling ubiquitous, convenient, on-demand network
                 access to a shared pool of configurable computing
                 resources (e.g., networks, servers, storage,
                 applications, and services) that can be rapidly
                 provisioned and released with minimal management effort
                 or service provider interaction. Cloud computing is
                 aimed at making an organization more agile and cost
                 effective. Due to the rapid evolution of Cloud
                 Computing in the recent past, it is relevant to
                 investigate the key areas of research of this
                 technology. In this paper, we present a systematic
                 review of research intensive areas in the field of
                 cloud computing. Research papers in the period from
                 2009 to 2012 were gathered. A total of 36 research
                 papers were reviewed systematically and categorized
                 into four broad categories based on the issues
                 addressed by them. We identified that the majority of
                 the research papers focused on Cloud Security. By
                 systematically analyzing the work accomplished so far,
                 the gaps and yet to be explored areas in this field are
                 brought to light.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Malhotra:2013:DFT,
  author =       "Ruchika Malhotra and Divya Tiwari",
  title =        "Development of a framework for test case
                 prioritization using genetic algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464536",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Testing is a time and effort consuming part
                 of the software development life cycle. Retesting a
                 software application during the maintenance phase, with
                 the entire test suite and additional test cases for the
                 modifications in the software, within budget and time,
                 is a challenge for software testers. Test Case
                 Prioritization is used to overcome this problem by
                 prioritizing the test cases in order to maximize
                 certain testing objectives like fault detection rate,
                 statement coverage, etc. In this paper, we propose a
                 framework for test case prioritization that emphasizes
                 a new metric, APBC$_m$ (modified Average Percentage of
                 Block Coverage). This metric evaluates the rate of code
                 coverage by incorporating knowledge about the
                 significance of blocks of code in the form of weights.
                 We have used this metric as fitness evaluation function
                 in a Genetic Algorithm in order to evaluate the
                 effectiveness of a test case sequence. We have also
                 developed a tool that implements the Genetic Algorithm
                 in the Java language in order to compute and validate
                 the results. Thereafter, we use the tool for test case
                 prioritization, and compare and assess the results with
                 those produced by the tool when APBC (Average
                 Percentage of Block Coverage) is used as fitness
                 function.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{N:2013:MER,
  author =       "Parimala N. and Ranjeet Kumar",
  title =        "Mapping extended rationale diagrams to {OLAP}
                 queries",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464538",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We propose a method that enables decision makers to
                 formulate OLAP queries. Firstly, the decision maker's
                 analysis requirements are expressed as an extended
                 rationale diagram. Subsequently, using the extended
                 rationale diagram, we verify whether it is possible to
                 get the information from the data warehouse. If it is,
                 we generate the outline of the corresponding OLAP
                 query. If it is not, we inform the user about the
                 missing information.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Zaidi:2013:MVE,
  author =       "Taskeen Zaidi and Vipin Saxena",
  title =        "Modeling and validation of execution of tasks on high
                 speed network under distributed environment",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464540",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "During the past years, distributed computing approach
                 has become an integral part of many of the software
                 companies. This is because of low cost infrastructure
                 involvement and faster execution of the tasks, sharing
                 of resources, etc. In the year 2009, the Indian
                 Government has established distributed network called
                 as National Knowledge Network (NKN). The main objective
                 of NKN is to connect all of the Indian universities,
                 research institutions, computing labs, digital
                 libraries, countrywide classrooms, etc. In the present
                 paper, a well-known object-oriented Unified Modeling
                 Language (UML) is used to construct a model for the
                 execution of the tasks across a distributed network.
                 Authors have designed a static step topology for the
                 faster execution of tasks. Static and dynamic behaviors
                 of the execution of the tasks are represented through
                 UML class and state diagrams, respectively. For
                 validation of the UML model, the state diagram is
                 converted into a Finite State Machine (FSM) and
                 different test cases are generated to validate the
                 proposed model across distributed network
                 environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rao:2013:CPS,
  author =       "V. Bhujanga Rao and P. Seetha Ramaiah and K. Raja
                 Kumar",
  title =        "Clinical programming software to manage patient's data
                 with a cochlear implant",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464535",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Auditory prostheses (AP) using Cochlear Implant
                 System, a.k.a. bionic ears, are widely used electronic
                 devices that electrically stimulate the auditory nerve
                 using an electrode array, surgically placed in the
                 inner ear for patients suffering from severe to
                 profound senosorineural deafness. The AP mainly
                 contains an external Body Worn Speech Processor (BWSP)
                 and an internal Implantable Receiver Stimulator (IRS).
                 The BWSP receives an external sound or speech and
                 generates encoded speech data bits for transmission to
                 the IRS via a Radio Frequency transcutaneous link to
                 excite the electrode array. After surgical placement of
                 the electrode array in the inner ear, the BWSP should
                 be fine-tuned to achieve the 80 to 100\% speech
                 reception abilities of the patient by an audiologist
                 using Clinical Programming Software (CPS). The tuning
                 process involves several tasks such as identifying the
                 active electrode contacts, determining the detection
                 and pain threshold of each active electrode, and
                 loading these values into BWSP by reprogramming the
                 BWSP. The main objective of this paper is to describe a
                 simple personal-computer based, user-friendly CPS,
                 which fine tunes the BWSP to achieve the best possible
                 speech reception abilities of each patient and to
                 perform post-operative fitting procedures by an
                 audiologist. The CPS was developed to perform the
                 post-operative fine tuning procedures such as (i)
                 measurement of electrode tissue impedance, (ii) fitting
                 to determine the hearing threshold and comfort levels
                 for each active electrode, and (iii) reprogramming the
                 speech processor using the identified threshold and
                 comfort values. Finally, experimental results are
                 presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2013:TTO,
  author =       "Ajay Jain",
  title =        "Touch target optimization technique using virtual
                 finger-tip library",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--9",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464534",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Touch functionality is the latest mantra for consumers
                 buying new smartphones or mobile devices. With devices
                 screens becoming more compact, providing a user
                 interface with easy navigation and effective usage is
                 becoming increasingly difficult. Typically, the screens
                 are designed using relevant design guidelines and work
                 well for the general majority of people. However, every
                 user is different. The way they handle the touch
                 screen, the size of their finger-tips, everything is
                 different. A single common UI design then fails to
                 satisfy all the different users. Hence, there is a need
                 to bridge the existing gap between the device UI screen
                 design and the variances attached with users' touch
                 inputs. Our latest work1, discussed in this paper,
                 solves this challenge to a significant extent by
                 providing a library of virtual finger-tip entries. Each
                 finger-tip entry in the library is pre-attached with a
                 specific surface area attached to it. These
                 finger-tips, although virtual, are provided with the
                 functionality that they act as wearable objects for a
                 device user. Once worn, the device owner need not worry
                 about their actual finger-tip size (that is, the
                 surface area of user's finger on the device screen).
                 Irrespective of a user's actual finger-tip size, when
                 you place your finger on any icon on the screen, it
                 uses exactly the same surface area that the virtual
                 finger-tip uses. Virtual finger-tip sizes are
                 calculated dynamically based on the relative size
                 interpretations from the actual finger-tip size and the
                 touch inputs to the device. Multiple virtual finger
                 tips options are listed in the library enabling a
                 device user to select the most appropriate one
                 depending on the touch target they plan to work on.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2013:SEEb,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "5--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464527",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krishnamurthi:2013:AES,
  author =       "Shriram Krishnamurthi",
  title =        "Artifact evaluation for software conferences",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "7--10",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464530",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software and other digital artifacts are amongst the
                 most valuable contributions of computer science. Yet
                 our conferences treat these mostly as second-class
                 artifacts--especially conferences in the software
                 sciences, which ought to know better. This article
                 argues for elevating these other artifacts by making
                 them part of the evaluation process for papers, and
                 reports on experience from an iteration of an Artifact
                 Evaluation Committee for ESEC/FSE 2011.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "11--20",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464528",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "21--28",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464529",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ebert:2013:BRS,
  author =       "John Ebert",
  title =        "Book Review: {{\booktitle{SOA with REST: principles,
                 patterns \& constraints for building enterprise
                 solutions with REST}} by Thomas Erl, Benjamin Carlyle,
                 Cesare Pautasso, Raj Balasubramanian}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "32--33",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464551",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gvero:2013:BRC,
  author =       "Igor Gvero",
  title =        "Book Review: {{\booktitle{Core Java volume I:
                 fundamentals}}, 9th edition by Cay S. Horstmann and
                 Gary Cornell}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "33--33",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464552",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2013:BRM,
  author =       "Robert Schaefer",
  title =        "Book Review: {{\booktitle{Managing the unmanageable:
                 rules, tools, and insights for managing software people
                 and teams}} by Micky W. Mantle and Ron Lichty}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "34--35",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464553",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRL,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Learning JavaScript: a
                 hands-on guide to the fundamentals of modern
                 JavaScript}} by Tim Wright}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "35--36",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464554",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:TTD,
  author =       "Vasile G. Teodorovici",
  title =        "{Tcl\slash Tk}: a developer's guide, third edition by
                 Clif Flynt",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "36--36",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464555",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2013:NAS,
  author =       "Paritosh Jain and Nitish Garg",
  title =        "A novel approach for slicing of object oriented
                 programs",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--4",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492266",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper extends the graph-less technique proposed
                 by Beszedes for slicing Object Oriented Programs. The
                 proposed approach computes the dynamic slices of the
                 OOPs, especially, in case of polymorphism. The approach
                 generates the defined-used (d-u) chains of the objects
                 and variables used in the program and computes the
                 slice using the generated d-u chains; it then debugs
                 the program by detecting the various possible bugs and
                 generates messages suggesting that a bug may be
                 present. A GUI tool has been developed to compute and
                 display the computed slices. The tool allows the user
                 to browse the program and see the generated advice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Raina:2013:ATR,
  author =       "Shikha Raina and Arun Prakash Agarwal",
  title =        "An automated tool for regression testing in web
                 applications",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--4",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492272",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Regression testing of web applications is a costly
                 activity as it tends to generate more test cases than
                 the previous stages of software testing. This cost can
                 be reduced significantly by identifying and testing
                 only the modified parts of a web application. This will
                 require locating the changes that have been introduced
                 in the web application from the previous version that
                 was tested. In this paper we have introduced an
                 automated tool for locating the changes in the web
                 application which will thereby aid in effective
                 regression testing of the application. This tool
                 compromise of 3 parts, (a) a web crawler that crawls
                 the web application, (b) an HTML DOM tree generator
                 that generates the DOM tree for a specified web page,
                 (c) an comparator that compares the new DOM tree with a
                 previous version of the DOM tree stored in our
                 system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{S:2013:NSO,
  author =       "Indu S. and Srinivas N. K. and Harish P. J. and
                 GangaPrasad R. and Nobby Varghese and N. S. Sreekanth
                 and Supriya N. Pal",
  title =        "[{NLP@Desktop}]: a service oriented architecture for
                 integrating {NLP} services in desktop clients",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--4",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492265",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Research and development in Natural Language
                 Processing (NLP) has made significant progress over the
                 last decade. Many robust NLP systems have been
                 developed for handling machine translation,
                 question-answering, summarization, topic detection,
                 cluster analysis, information extraction, named entity
                 recognition (NER), etc. Despite this advancement in NLP
                 research, the results are still not accessible for
                 common desktop users. In the current scenario, it is
                 difficult to integrate a new NLP tool with the existing
                 text processing applications. To overcome this, we have
                 implemented a service deployer framework based on
                 DBus[1] for the seamless integration of NLP
                 applications with desktop clients like email clients,
                 word processors, browsers etc. This framework enables
                 NLP researchers to make their products equipped for the
                 desktop clients with minimal efforts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Badri:2013:RBU,
  author =       "Mourad Badri and Linda Badri and William Flageol",
  title =        "On the relationship between use cases and test suites
                 size: an exploratory study",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492261",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing, which plays a crucial role in
                 software quality assurance, is a time and resource
                 consuming process. It is, therefore, necessary to
                 estimate as soon as possible the effort required to
                 test software, so that activities can be planned and
                 resources can be optimally allocated. Unfortunately,
                 little is known about the prediction of the testing
                 effort. In this paper, we address the testing effort
                 from the perspective of test suites size. The study
                 presented aims at exploring empirically the
                 relationships between use cases and the size of test
                 suites in object-oriented systems. We introduce four
                 metrics to characterize the size and complexity of use
                 cases. The size of test suites is measured in terms of
                 lines of test code. We performed an experimental study
                 using data collected from five cases studies. Results
                 provide evidence that there is a significant
                 relationship between use case metrics and the size of
                 test suites.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Goel:2013:ARO,
  author =       "Brij Mohan Goel and Pradeep Kumar Bhatia",
  title =        "Analysis of reusability of object-oriented systems
                 using object-oriented metrics",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492264",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In object-oriented systems, assessing reusability
                 plays a key role in reducing a cost and improving the
                 quality of the software. Object-oriented programming
                 helps in achieving the concept of reusability through
                 different types of inheritance programs, which further
                 help in developing reusable software modules. And
                 object-oriented metrics identify the effectiveness of
                 each reuse strategy. Software reusability has
                 considerable effect on software quality. Software
                 quality increases as reuse of software components
                 increases. But software quality improvement cannot be
                 understood unless it is measured. This paper focuses on
                 an empirical evaluation of object-oriented metrics in
                 C++ using three different object-oriented features.
                 Three programs have been considered as input for the
                 study --- the first program uses multilevel
                 inheritance, the second program uses multiple
                 inheritance and the third program uses hierarchical
                 inheritance. We have found that multilevel inheritance
                 has more impact on reusability among these three
                 features.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Pandey:2013:SEA,
  author =       "Adesh Kr. Pandey and C. P. Agrawal and Arun Sharma and
                 P. Sasikala",
  title =        "Study of empirical approaches to analyze the software
                 metrics",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492270",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software affects nearly every aspect of human lives.
                 Software functional quality is a key to achieve
                 industrial and business relevance, in particular to
                 industrial development and growth. Software metrics are
                 important indicators to improve the processes and
                 products in all organizations. They define baselines of
                 quality and productivity and enable comparisons against
                 industry averages that help in identifying
                 opportunities for improvement. In addition, Software
                 metrics design and analysis are major activities in the
                 software development life cycle. Software metrics play
                 a vital role in software cost, quality, scheduling,
                 reliability and maintenance. There are various methods
                 to decide which metrics should be used for which
                 purposes. Attributes of a metric may be independent; or
                 attributes may depend on one another. Analytical
                 Hierarchy Process (AHP) is used to assign weights to
                 various parameters of a decision model when they are
                 related to each other in a particular hierarchy.
                 Analytical Network Process (ANP) and Fuzzy ANP are used
                 to solve the decision problem, where attributes of
                 decision parameters form dependency networks. The
                 objective of this paper is to explore the possibilities
                 of using empirical approaches like AHP, ANP and Fuzzy
                 ANP to analyze the software metrics by measuring the
                 weights of different attributes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Taibi:2013:ROS,
  author =       "Fathi Taibi",
  title =        "Reusability of open-source program code: a conceptual
                 model and empirical investigation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492276",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Reusing program modules is one of the most direct and
                 useful ways to develop cost effective software,
                 especially with the availability of huge amounts of
                 open-source projects. Reuse saves cost, increases the
                 speed of development and improves software reliability.
                 The quality of popular open-source packages is good as
                 shown by various empirical studies. However, the
                 quality of less known packages and the large number of
                 projects developed by programming enthusiasts is
                 unknown. Reusing them may be the source of more
                 problems rather than being a solution to a problem. In
                 this paper, a conceptual model is proposed to measure
                 the reusability of program modules. A balanced set of
                 well-established metrics is used to compute the most
                 significant factors of reusability and an empirical
                 investigation is conducted to measure the reusability
                 of the modules of randomly selected open-source Java
                 projects. The results obtained are thoroughly analyzed
                 to discover the real reusability potential of
                 open-source program code together with suggestions on
                 how to improve this potential.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2013:RBR,
  author =       "Kuldeep Kumar and Sandeep Kumar",
  title =        "A rule-based recommendation system for selection of
                 software development life cycle models",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--6",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492269",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The selection of a software development life cycle
                 (SDLC) model for a software project is highly dependent
                 upon the characteristics of the software product to be
                 developed. We classified software products according to
                 characteristics that matter for SDLC selection. We
                 surveyed literature to elicit recommendations for SDLC
                 selection. We formalized our findings to present a rule
                 based recommendation system that can be helpful to
                 software developers in selecting the most appropriate
                 SDLC model to be used for the development of a software
                 product. We conducted an initial evaluation of our
                 system. We believe our SDLC recommendation system
                 provides useful hints for selecting an SDLC, and
                 provides a base for validating and refining SDLC
                 recommendation rules.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Varshney:2013:SBS,
  author =       "Sapna Varshney and Monica Mehrotra",
  title =        "Search based software test data generation for
                 structural testing: a perspective",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--6",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492277",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is an important and expensive phase
                 of the software development life cycle. Over the past
                 few decades, there has been an ongoing research to
                 automate the process of software testing but the
                 attempts have been constrained by the size and the
                 complexity of software especially due to the use of
                 dynamic memory allocation which makes the software
                 behavior highly unpredictable. The use of metaheuristic
                 global search techniques for software test data
                 generation has been the focus of researchers in recent
                 years. Many new techniques and hybrid methods have been
                 proposed to tackle the problem more effectively. This
                 study provides an overview of the various techniques
                 that have been applied for structural test data
                 generation. It also presents the open areas, challenges
                 and future directions in the field of search based
                 software testing with an emphasis on test data
                 generation for structural testing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhasin:2013:CAB,
  author =       "Harsh Bhasin and Neha Singla and Shruti Sharma",
  title =        "Cellular automata based test data generation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492262",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Manual Test Data Generation is an expensive, error
                 prone and tedious task. Therefore, there is an
                 immediate need to make the automation of this process
                 as efficient and effective as possible. The work
                 presented intends to automate the process of Test Data
                 Generation with a goal of attaining maximum coverage. A
                 Cellular Automata system is discrete in space and time.
                 Cellular Automata have been applied to things like
                 designing water distribution systems and studying the
                 patterns of migration. This fascinating technique has
                 been amalgamated with standard test data generation
                 techniques to give rise to a technique which generates
                 better test cases than the existing techniques. The
                 approach has been verified on programs selected in
                 accordance with their Lines of Code and utility. The
                 results obtained have been verified. The proposed work
                 is a part of a larger system being developed, which
                 takes into account both black box and white box
                 testing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dalal:2013:ESR,
  author =       "Sandeep Dalal and Rajender Singh Chhillar",
  title =        "Empirical study of root cause analysis of software
                 failure",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492263",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Root Cause Analysis (RCA) is the process of
                 identifying project issues, correcting them and taking
                 preventive actions to avoid occurrences of such issues
                 in the future. Issues could be variance in schedule,
                 effort, cost, productivity, expected results of
                 software, performance parameters and customer
                 satisfaction. RCA also involves collecting valid data,
                 analyzing it, deriving metrics and finding root causes
                 using RCA methods. In this paper we will do Root cause
                 analysis of some severe software failures that happened
                 in the past and of some failures in ongoing projects in
                 the software Industry. We will also describe various
                 RCA methods and processes used in the software Industry
                 to reduce the chances of software failure.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rai:2013:BIO,
  author =       "Deepak Rai and Kirti Tyagi",
  title =        "Bio-inspired optimization techniques: a critical
                 comparative study",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492271",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Despite insistent and breathtaking advances in
                 computing, we continue to be humbled by the variety and
                 adaptability of the natural world around us.
                 Bio-inspired optimization is a term that covers a wide
                 variety of computational approaches that are based on
                 the principles of biological systems. This motivates
                 the application of biology to optimization problems.
                 Biologically inspired computing and optimization is a
                 major subset of natural computation. This paper
                 presents a critical survey of bio-inspired optimization
                 techniques. There are many legacy optimization
                 techniques available. This survey explains almost all
                 important bio-inspired optimization techniques based on
                 their development, intention, performance and
                 application. It provides insight into determining the
                 direction of future optimization techniques research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singhal:2013:CRV,
  author =       "Abhishek Singhal and Abhay Bansal and Avadhesh Kumar",
  title =        "A critical review of various testing techniques in
                 aspect-oriented software systems",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--9",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492275",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is a very crucial phase of the
                 software development life cycle. In order to develop
                 quality software using any approach such as
                 module-oriented, object-oriented, aspect-oriented and
                 componentbased, testing plays a crucial role.
                 Aspect-Oriented Programming (AOP) is a relatively new
                 software development approach and testing of software
                 developed using this approach has not matured enough.
                 Researchers have proposed various testing techniques
                 for AOP. It is important to analyze existing
                 Aspect-Oriented testing techniques in order to develop
                 new, better, more efficient techniques. This paper
                 presents a critical review of various existing testing
                 techniques for AOP.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jiang:2013:CBP,
  author =       "JianMin Jiang and Shi Zhang and Ping Gong and Zhong
                 Hong",
  title =        "Configuring business process models",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--10",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492267",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A configurable business process model (sometimes
                 referred to as a reference business process model) may
                 be configured to meet the specific requirements of an
                 organization. The configuration activity is required to
                 automatically determine the variability of a
                 configurable process model and ensure the correctness
                 of a specific process model. However, few approaches
                 solve the problem. In this paper, we propose an
                 innovative approach for automatically separating a
                 configurable process model into atomic and correct
                 sub-process models (sub-process models without abnormal
                 behavioral problems). The atomic sub-process models
                 that fulfill specific requirements are merged into
                 specific process models that are provided for
                 organizations. Compared with existing approaches, since
                 the configuration activity is incorporated into the
                 verification process of a process model at design time
                 and can obtain all feasible configurations, our
                 approach avoids independently handling the
                 configuration activity and does not suffer from
                 computational complexity. Moreover, our approach is
                 language-independent. We have developed a prototype
                 tool for configuring these process models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Voola:2013:CRP,
  author =       "Persis Voola and A. Vinaya Babu",
  title =        "Comparison of requirements prioritization techniques
                 employing different scales of measurement",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--10",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492278",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The objective of this paper is to conduct a controlled
                 experiment with the three requirements prioritization
                 techniques: Numerical Assignment (NA), Analytic
                 Hierarchy Process (AHP) and Extensive Numerical
                 Assignment (ENA), each based on ordinal, ratio and
                 interval scales respectively. NA and AHP are widely
                 used traditional requirements prioritization
                 techniques. ENA is a novel technique introduced by the
                 authors, which acknowledges the uncertain and
                 incomplete nature of human judgment about requirements
                 priorities, which are in turn uncertain guesses about
                 the upcoming product. The aim of the experiment is to
                 examine the three techniques using various objective
                 and subjective measures like number of decisions, time
                 consumption, ease of use, attractiveness, scalability
                 and reprioritizability. The experiment was executed by
                 prioritizing the requirements of a university website
                 system with students as participants in the experiment.
                 The results of the experiment proved that ENA
                 transcends NA and AHP.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shareef:2013:CCA,
  author =       "Jawwad Wasat Shareef and R. K. Pandey",
  title =        "{CAME}: {Component Assembly Metrics Extraction} using
                 {UML}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--12",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492273",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In Object-Oriented software development, complexity
                 metrics help software engineers to identify the
                 deficiencies in the design of the software system that
                 are likely to become problem points in the subsequent
                 phases of the SDLC, like testing and maintenance.
                 Metrics for Component Based Software Development (CBSD)
                 have also been proposed by the researchers. Lately the
                 emphasis has been on metrics that are applicable during
                 early phases of the SDLC. The XML Meta Data Interchange
                 (XMI) standard has been implemented in most of the
                 commercial and open source UML tools. It is now
                 possible to automate the metrics extraction procedure
                 right from the UML design documents. Detection of
                 design deficiencies early in the design phase saves a
                 lot of time and effort and results in a more
                 maintainable design. In the present paper, we discuss
                 the design and implementation of a metrics tool for
                 CBSD. We have implemented component based metrics in a
                 parser-based tool, which hereafter we refer to as CAME
                 (Component Assembly Metrics Extraction), to calculate
                 metrics from UML design documents. CAME is capable of
                 generating software metrics proposed by researchers for
                 Component Based Software Systems. We demonstrate our
                 tool using UML component assembly diagrams for a
                 University Case Registration System (UCRS) and its
                 representation in UML and metrics extraction
                 procedure.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shirole:2013:UBM,
  author =       "Mahesh Shirole and Rajeev Kumar",
  title =        "{UML} behavioral model based test case generation: a
                 survey",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--13",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492274",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In software engineering, system modeling is the
                 process of formulating a representation of a real
                 system in an abstract way to understand its behavior.
                 Software testing encourages reusing these models for
                 testing purpose. This expedites the process of test
                 case generation. UML structural and behavioral
                 specification diagrams have been used by testing
                 researchers for generation of test scenarios and test
                 data. The aim of this survey is to improve the
                 understanding of UML based testing techniques. We have
                 focused on test case generation from the behavioral
                 specification diagrams, namely sequence, state chart
                 and activity diagrams. We classify the various research
                 approaches that are based on formal specifications,
                 graph theoretic, heuristic testing, and direct UML
                 specification processing. We discuss the issues of test
                 coverage associated with these approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jones:2013:FPU,
  author =       "Capers Jones",
  title =        "Function points as a universal software metric",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--27",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492268",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Function point metrics are the most accurate and
                 effective metrics yet developed for software sizing and
                 also for studying software productivity, quality,
                 costs, risks, and economic value. Unlike the older
                 ``lines of code'' metric function points can be used to
                 study requirements, design, and in fact all software
                 activities from development through maintenance. In the
                 future function point metrics can easily become a
                 universal metric used for all software applications and
                 for all software contracts in all countries. The
                 government of Brazil already requires function points
                 for all software contracts, and South Korea and Italy
                 may soon follow. However, there are some logistical
                 problems with function point metrics that need to be
                 understood and overcome in order for function point
                 metrics to become the primary metric for software
                 economic analysis. Manual function point counting is
                 too slow and costly to be used on large software
                 projects above 10,000 function points in size. Also,
                 application size is not constant but grows at about 2\%
                 per calendar month during development and 8\% or more
                 per calendar year for as long as software is in active
                 use. This paper discusses a method of high-speed
                 function point counting that can size any application
                 in less than two minutes, and which can predict
                 application growth during development and for five
                 years after release. This new method is based on
                 pattern matching and is covered by U.S. utility patent
                 application and hence is patent pending.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Anderson:2013:IC,
  author =       "Glyn Anderson",
  title =        "Idle cycles",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "6--9",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492284",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2013:BES,
  author =       "Robert Schaefer",
  title =        "Business-efficient software development processes",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "7--8",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492283",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "10--18",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492250",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "19--24",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492249",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wang:2013:RFA,
  author =       "Qianxiang Wang and Lin Liu",
  title =        "Report on the {Fourth Asia-Pacific Symposium on
                 Internetware (Internetware 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "25--26",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492281",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Internet provides an open infrastructure for
                 exchanging and sharing information resources among
                 people all over the world. The rapid development and
                 wide application of the Internet makes it a new
                 mainstream platform for using, developing, deploying
                 and executing software systems. In order to provide an
                 interactive forum for researchers and professionals
                 from related disciplines to meet and exchange ideas
                 addressing the challenges in the Internetware setting,
                 the Technical Committees on Software Engineering and
                 System Software of China Computer Federation (CCF)
                 sponsored the Asia-Pacific Symposium on Internetware
                 series, with ACM's Cooperation. In this report, we
                 report news from the Internetware 2012, specially the 5
                 keynotes and 4 regular papers that were recommended for
                 publication in a special issue on ``Internetware'' of
                 the International Journal of Software and Informatics
                 after presented at the symposium.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Xie:2013:RIS,
  author =       "Tao Xie and Lu Zhang and Hong Mei",
  title =        "Report on the {International Symposium on High
                 Confidence Software (ISHCS 2011\slash 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "27--33",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492282",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To provide a forum for researchers in related research
                 areas to address the challenges in high confidence
                 software, exchange ideas, and foster collaborations,
                 the Institute of Software and Key Laboratory of High
                 Confidence Software Technologies (Ministry of
                 Education) at Peking University hosted and sponsored
                 the International Symposium on High Confidence Software
                 in 2011 and 2012. The symposium consisted of a series
                 of invited talks from internationally known researchers
                 on the symposium topic, discussion/panel sessions, and
                 poster sessions to enable substantial interactions
                 among attendees.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chapelle:2013:BRP,
  author =       "Gregory Chapelle",
  title =        "Book Review: {{\booktitle{A practical guide to Linux
                 commands, editors, and shell-programming}}, third
                 edition by Mark G. Sobell}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "38--38",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492251",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kimm:2013:BRO,
  author =       "Larry Kimm",
  title =        "Book Review: {{\booktitle{It's our research: getting
                 stakeholder buy-in for user experience research
                 projects}} by Tomer Sharon}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "38--39",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492252",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Paige:2013:BRT,
  author =       "Michael Paige",
  title =        "Book Review: {{\booktitle{The tangled web: a guide to
                 securing modern web applications}} by Michal
                 Zalewski}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "39--40",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492253",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saur:2013:BRD,
  author =       "Joe Saur",
  title =        "Book Review: {{\booktitle{Design for Emotion}} by
                 Trevor van Gorp and Edie Adams}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "40--40",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492254",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRS,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Security and privacy for
                 Microsoft Office 2010 users}} by Mitch Tulloch}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "40--41",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492255",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRU,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Ubuntu unleashed}}, 2013
                 edition by Matthew Helmke with Andrew Hudson and Paul
                 Hudson}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "41--41",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492256",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Terra:2013:QCC,
  author =       "Ricardo Terra and Luis Fernando Miranda and Marco
                 Tulio Valente and Roberto S. Bigonha",
  title =        "{Qualitas.class Corpus}: a compiled version of the
                 {Qualitas Corpus}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507314",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper documents a compiled version of the
                 Qualitas Corpus named Qualitas.class Corpus. We provide
                 compiled Java projects for the 111 systems included in
                 the corpus. We also gathered a large amount of metrics
                 data (such as measurements from complexity, coupling,
                 and CK metrics) about the systems. By making
                 Qualitas.class Corpus public, our goal is to assist
                 researchers by removing the compilation effort when
                 conducting empirical studies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Raghunath:2013:DRB,
  author =       "Amritha Raghunath and Sadhana Ramachandran and
                 Selvakumar Subramanian and Sreevatsan Vaidyanathan",
  title =        "Data rate based adaptive thread assignment solution
                 for combating the {SlowPOST} denial of service attack",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507310",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Denial of Service (DoS) attacks represent a major
                 threat to network security, especially in today's
                 networked world. There has been significant research in
                 this area, primarily focused on mitigating and
                 preventing DoS attacks affecting transport layer
                 services. This paper addresses issues arising from a
                 new variation of a DoS attack, namely the SlowPOST
                 attack that affects Application Layer services. In
                 SlowPOST, the malicious clients send data at a slow
                 rate after the connection is established, and the
                 server is left waiting for the data to arrive. These
                 attacks are particularly devastating due to their
                 ability to resist detection due to their protocol
                 compliance. In addition, such attacks do not require
                 the massive resources that DoS attacks normally
                 require, making them easier to launch. Some solutions
                 for this issue have already been deployed in some
                 commercial servers. These solutions are based on either
                 monitoring traffic or enforcing a time limit on the
                 transmission of the protocol headers. In order to
                 achieve reliable detection, the detection parameters
                 need to adapt to the constantly changing traffic. This
                 paper proposes a novel algorithm that uses the data
                 rate of connections to evolve a threshold for
                 determining potential attackers in SlowPOST. This
                 proposed method is tested by subjecting a server to an
                 attack, and it was observed that in the absence of this
                 method, the servicing of legitimate requests is not
                 completed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2013:MMQ,
  author =       "Gagandeep Singh",
  title =        "Metrics for measuring the quality of object-oriented
                 software",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507311",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents metrics for measuring the quality
                 of object-oriented software. Quality of software
                 generally depends on five parameters namely efficiency,
                 understandability, complexity, reusability and
                 maintainability. All of these parameters are associated
                 with certain metrics. Quality of software can be
                 measured by using object-oriented metrics. Software
                 tends to become more complex over a series of releases
                 and maintaining them becomes a more difficult task.
                 Thus quality of software also tends to decrease over
                 time. In this paper, a study is performed using
                 object-oriented metrics that are computed over
                 different releases of the software application
                 JFreeChart.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bajaj:2013:MPD,
  author =       "Punam Bajaj and Vineet Arora",
  title =        "Multi-person decision-making for requirements
                 prioritization using fuzzy {AHP}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507302",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The success of a system depends upon how effectively
                 it accomplishes its intended purpose by meeting all
                 stakeholders' concerns pertaining to conflicting
                 requirements such as cost, size, time, performance etc.
                 Conflicts occur because the requirements are
                 individually refined, without consideration to how they
                 may impact the other stakeholders in the system. As the
                 stakeholders' concerns are uncertain and subjective in
                 nature, this paper proposes a novel approach to
                 prioritize the conflicting requirements using Fuzzy
                 Analytic Hierarchy Process and an alpha cut. A total
                 compatible ordering is achieved to resolve the
                 conflicting preferences of the stakeholders. It assists
                 the project managers to develop a system that meets the
                 expectations of all the stakeholders. A case study of
                 the Travel Management Planning Website is presented to
                 illustrate the application of the methodology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2013:TGC,
  author =       "Pavitdeep Singh and Satwinder Singh and Jatinder
                 Kaur",
  title =        "Tool for generating code metrics for {C\#} source code
                 using abstract syntax tree technique",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507312",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/csharp.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software maintenance is one of the key activities in
                 any software engineering process in which source code
                 analysis plays a crucial role. Due to the high cost of
                 maintenance, it has become quite necessary to produce
                 high quality software. Over time, numerous analyses
                 have been performed on source code to determine
                 complexity and other metrics. Lots of papers have been
                 published for object oriented languages but mostly
                 concentrating on C++ and Java, very few has been
                 published for more modern languages like C\#. This
                 paper proposes a Software Quality Assurance Tool for
                 measuring the different code metrics for the object
                 oriented language C\# at the class and method levels.
                 The technique consists of generating the abstract
                 syntax tree of the source code using Nfactory
                 libraries. The Interface is built using the Win Form
                 application which provides an impressive GUI for the
                 tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sinhal:2013:NFB,
  author =       "Amit Sinhal and Bhupendra Verma",
  title =        "A novel fuzzy based approach for effort estimation in
                 software development",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507313",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Accurate and credible software effort estimation is
                 always a challenge for academic research and software
                 industry. In the beginning, estimation was carried out
                 using only human expertise or algorithmic models, but
                 more recently, interest has turned to a range of Soft
                 Computing techniques. New paradigms such as Fuzzy Logic
                 enable a choice for software effort estimation.
                 Constructive Cost Model (COCOMO) is considered to be
                 the most widely used model for effort estimation.
                 Effort drivers have immense influence on COCOMO and
                 this paper investigates the role of cost drivers
                 (effort features) in improving the precision of effort
                 estimation using Fuzzy Logic. Fuzzy logic-based
                 estimation models are more appropriate when indistinct
                 and incorrect information is to be used. This paper
                 aims at estimating effort in an efficient way using a
                 Fuzzy technique. For this purpose, the COCOMO81 dataset
                 and the Fuzzy Inference System (FIS) of MATLAB are used
                 for implementation. At the end, the outcomes are
                 compared against traditional methods using parameters
                 like Mean Magnitude of Relative Error (MMRE) and Pred
                 (25).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ahmad:2013:FAA,
  author =       "Aakash Ahmad and Pooyan Jamshidi and Claus Pahl",
  title =        "A framework for acquisition and application of
                 software architecture evolution knowledge: 14",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507301",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software systems continuously evolve as a consequence
                 of frequent changes in their functional requirements
                 and the environment surrounding them.
                 Architecture-centric software evolution (ACSE) enables
                 changes in software structure and behaviour while
                 abstracting the complex implementation-specific
                 details. However, due to recurring evolution there is a
                 need for solutions that enable a systematic reuse of
                 frequent changes in software architectures. In recent
                 years, architecture change patterns and evolution
                 styles proved successful in promoting reuse expertise
                 to tackle architecture evolution. However, there do not
                 exist any solutions that enable a continuous
                 acquisition and application of architecture evolution
                 knowledge to systematically address frequent changes in
                 software architectures. In this paper, we propose a
                 framework PatEvol that aims to unify the concepts of
                 (i) software repository mining and (ii) software
                 evolution to enable acquisition and application of
                 architecture evolution knowledge. In the proposed
                 PatEvol framework, we present knowledge acquisition
                 (architecture evolution mining) to enable post-mortem
                 analysis of evolution histories to empirically discover
                 evolution-centric knowledge. Furthermore, we support
                 reuse of discovered knowledge to enable knowledge
                 application (architecture evolution execution) that
                 enables evolution-off-the-shelf in software
                 architectures. Tool support facilitates the knowledge
                 acquisition and knowledge application processes in the
                 PatEvol framework.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hazra:2013:CAR,
  author =       "Rumpa Hazra and Shouvik Dey and Ananya Kanjilal and
                 Swapan Bhattacharya",
  title =        "Comparative analysis of real time resource access
                 control protocols using {UML} 2.0",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507305",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The behaviors of real time software systems do not
                 depend only on the values of input and output signals,
                 but also on the times of their occurrences. Real time
                 systems (RTS) interact with their environments using
                 time constrained input/output signals. The complexity
                 of Real Time Systems is continually increasing which
                 makes their design very challenging. In RTS, the
                 scheduling of tasks with hard deadlines has been an
                 important area of research. Unified Modeling Language
                 (UML), the standard visual object-oriented modeling
                 language, is suitable to deal with this complexity. The
                 main objective of this paper is to compare two
                 protocols using UML 2.0 models. The shortcomings of the
                 existing Priority Inheritance protocol are represented
                 using one UML model. Further, the Stack Based Priority
                 Ceiling protocol is used to overcome this difficulty
                 using an improved model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DeSousaCoelho:2013:SDM,
  author =       "Jailton {De Sousa Coelho, Jr.} and Jos{\'e} Luis Braga
                 and Bernardo Giori Ambr{\'o}sio",
  title =        "System dynamics model for simulation of the software
                 inspection process",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507306",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Repairing a defect in the late phases of software
                 development can be a hundred times more expensive than
                 finding and fixing it during the requirements and
                 design phase. Software inspection is a technique that
                 may be used to aid in the identification of defects
                 during early stages of the process and avoid
                 propagation of such defects to later phases. The
                 cost-benefit of inspections may be significant if they
                 are efficiently performed. Since this process is
                 affected by several quality factors, the analysis of
                 the overall context of inspection may become complex.
                 Project managers are reluctant to introduce inspection
                 due to uncertainty regarding its real benefits. This
                 paper presents a system dynamics model, which is a
                 descriptive technique for systems modeling and
                 simulation and involves several variables that strongly
                 influence inspection efficiency. The influence levels
                 of model variables are quantified based on real or
                 empirical experiments reported in the literature, in
                 order to approximate model results to values that would
                 be obtained in the real world. The model allows the
                 reproduction of scenarios without paying the costs and
                 facing the risks of a real project implementation.
                 Therefore, it enables the analysis of inspection
                 effects on the software development process.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2013:MSD,
  author =       "Ajay Jain and Kusha Chopra",
  title =        "Malware signing detection system",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507307",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software malware not only creates financial damages to
                 corporate and individual computer users, but also
                 invades privacy, exploits their devices and induces
                 other significant losses. While efficient tools and
                 technologies that control and limit malware spread
                 across devices in the public domain are being
                 developed, the problem is far from being resolved. We
                 worked on a methodology that uses techniques to detect
                 malware during in-house development and prevents
                 malware from being released in the field. This work
                 helps determine and handle situations where a person,
                 authorized to access an authentic signing certificate
                 [1] signs malware (or set of file(s)) intended to
                 perform harmful operations, such as spreading a virus
                 on a computer using the said certificate, and releases
                 the malicious code publicly or to a community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhasin:2013:CGT,
  author =       "Harsh Bhasin and Neha Singla",
  title =        "Cellular-genetic test data generation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--9",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507303",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Test Data Generation is the soul of automated testing.
                 The dream of having efficient and robust automated
                 testing software can be fulfilled only if the task of
                 designing a robust automated test data generator can be
                 accomplished. In the work we explore the gaps in the
                 existing techniques and intend to fill these gaps by
                 proposing new algorithms. The following work presents
                 algorithms that handle almost all the constructs of
                 procedural programming languages. The proposed
                 technique uses cellular automata as its base. The use
                 of Cellular Automata brings a blend of artificial life
                 to the work. The work is a continuation of our earlier
                 attempt to amalgamate Cellular Automata based
                 algorithms to generate test data. The technique has
                 been applied to C programs and is currently being
                 tested on a financial enterprise resource planning
                 system. Since, the solution of most of the problems can
                 be found by observing nature, we must explore
                 artificial nature to accomplish the above task.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chanda:2013:BSE,
  author =       "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
                 and Swapan Bhattacharya",
  title =        "Behavioral and structural evolution of {SOA} from
                 {OO}: an integrated approach",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--9",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507304",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture caters to the
                 ``Separation of Concerns'' and incorporates
                 reusability, granularity, modularity, componentization
                 and interoperability. There are many software products
                 that have been developed in the object-oriented
                 paradigm. To incorporate the positive aspects of the
                 service-oriented paradigm, they need to be evolved to
                 the service-oriented domain. In this paper, we define
                 an integrated approach towards consistent evolution of
                 Object Oriented (OO) paradigm to the Service Oriented
                 (SOA) domain. There are some proven Object Oriented
                 Design Tools that can be used for Service Oriented
                 Application design incorporating both the behavioral
                 and structural aspects. The work in this paper involves
                 a set of activities like formalizing the different UML
                 diagrams, formal mapping of object components to
                 service level components and establishing consistency
                 among them. We also establish a traceability model for
                 consistent evolution of Service Oriented Applications
                 from existing Object Oriented Applications by mapping
                 behavioral and structural artifacts of both domains.
                 This will establish traceability from implementation
                 phases back to the requirements phases of an SOA
                 application.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jalila:2013:EEO,
  author =       "A. Jalila and D. Jeya Mala",
  title =        "Empirical evidence on {OCL} formal specification-based
                 metrics as a predictor of fault-proneness",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507308",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "OCL formal specification has been widely used for
                 precise software modeling. In general, it is used to
                 express constraints on design documents. As a novel
                 approach, its usage can be extended to support
                 effective testing, such as testing fault-prone
                 components to improve software quality. In this paper,
                 CK (Chidamber and Kemerer) metrics that can be
                 extracted from OCL expressions are validated against
                 module complexity. Moreover, our study proposes a new
                 metric suite that can be directly extracted from OCL
                 expressions to quantify module complexity. A weight has
                 been assigned to each metric to reflect its importance
                 in fault-prone component identification. Our study
                 shows that metrics collected from OCL specifications
                 are good predictors of the fault-prone components of a
                 system during design time. An early knowledge of
                 fault-prone components of the system can be useful to
                 distribute efforts required for software development
                 and testing activities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mala:2013:CCT,
  author =       "D. Jeya Mala and K. Sabari Nathan and S. Balamurugan",
  title =        "Critical components testing using hybrid genetic
                 algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--13",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507309",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As quality of software plays a vital role in real time
                 systems, it is essential to identify the crucial parts
                 in the system and to test them effectively. In the
                 proposed approach, the critical components are
                 identified by means of mutation based impact analysis.
                 The next task is to test the critical components using
                 the Hybrid Genetic Algorithm (HGA) based test case
                 generation and optimization approach. The mutants are
                 automatically generated by seeding faults into each
                 method of all the components in the Software Under Test
                 (SUT). The initial set of test cases is generated using
                 randomized test data. The generated test cases are
                 executed over the original and the mutant to identify
                 whether the test case detects the error or not. Based
                 on the results, the Mutation Score (MS) is calculated,
                 which always lies between 0 and 1. The best test cases
                 are chosen based on having higher mutation scores and
                 are executed on mutants to analyze how each component
                 affects the other components in the SUT. Based on the
                 analysis, the critical components are identified and
                 they need rigorous testing using the test cases
                 generated by the HGA. The algorithm uses the RemoveTop
                 and LocalBest improvement heuristics to achieve near
                 optimal solutions. In unit testing, the test cases are
                 executed against the original and the mutant. The test
                 case optimization is done by evaluating the
                 effectiveness of test suites using the Mutation Score
                 and the Branch Coverage Value (BCV). In pair-wise
                 testing, the effective test cases are selected based on
                 the higher mutation scores and branch coverage values.
                 The components are executed against these test cases
                 and the execution traces are recorded. The traced
                 results are compared against the expected outputs which
                 were previously stored in the repository and the
                 statuses are updated. Based on the statuses, the faulty
                 methods are revealed. The efficiency of the proposed
                 approach is compared with Genetic Algorithm (GA) and we
                 concluded that the final test suite size and the total
                 execution time are reduced in the proposed approach.
                 Finally various graphs and PDF reports are generated
                 for visualization purposes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Raccoon:2013:U,
  author =       "Raccoon and Dog",
  title =        "Unknownness",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "8--17",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507318",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2013:Pa,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "17--18",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507319",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2013:SEEc,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "18--18",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2517896",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSe,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "19--27",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507290",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPe,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "28--33",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507289",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Prikladnicki:2013:CHA,
  author =       "Rafael Prikladnicki and Yvonne Dittrich and Helen
                 Sharp and Cleidson {De Souza} and Marcelo Cataldo and
                 Rashina Hoda",
  title =        "Cooperative and human aspects of software engineering:
                 {CHASE} 2013",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "34--37",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507321",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software is created by people for people working in a
                 range of environments and under various conditions.
                 Understanding the cooperative and human aspects of
                 software development is crucial in order to comprehend
                 how methods and tools are used, and thereby improve the
                 creation and maintenance of software. Both researchers
                 and practitioners have recognized the need to
                 investigate these aspects, but the results of such
                 investigations are dispersed in different conferences
                 and communities. The 6th workshop on Cooperative and
                 Human Aspects of Software Engineering held at the
                 International Conference on Software Engineering
                 continued the tradition from earlier workshops and
                 provide a lively forum to discuss current developments
                 and high quality research in the field, providing both
                 a meeting place for the community and the possibility
                 for researchers interested in joining the field to
                 present and discuss their work in progress and to get
                 an overview of the field. Further dissemination of
                 research results will lead to improvement of software
                 development and deployment across the globe.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dingsoyr:2013:RCL,
  author =       "Torgeir Dings{\o}yr and Nils Brede Moe",
  title =        "Research challenges in large-scale agile software
                 development",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "38--39",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507322",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Agile software development methods are increasingly
                 used in large-scale software development. This article
                 summarizes some of the discussion on research
                 challenges in large-scale agile development at a
                 workshop at the International Conference on Agile
                 Software Development (XP2013), in the form of a
                 research agenda.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Galster:2013:VSE,
  author =       "Matthias Galster and Mehdi Mirakhorli and Jane
                 Cleland-Huang and Janet E. Burge and Xavier Franch and
                 Roshanak Roshandel and Paris Avgeriou",
  title =        "Views on software engineering from the twin peaks of
                 requirements and architecture",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "40--42",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507323",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The disciplines of requirements engineering (RE) and
                 software architecture (SA) are fundamental to the
                 success of software projects. Even though RE and SA are
                 often considered in isolation, drawing a line between
                 RE and SA is neither feasible nor reasonable as
                 requirements and architectural design impact each
                 other. This observation motivated the Twin Peaks model
                 that was the subject of the Second International
                 Workshop on the Twin Peaks of Requirements and
                 Architecture ([email protected] 2013). [email
                 protected] 2013 was held in conjunction with the 35th
                 International Conference on Software Engineering 2013
                 in San Francisco, CA. The workshop aimed at providing a
                 forum for researchers, practitioners and educators from
                 the areas of RE and SA to discuss their experiences,
                 forge new collaborations, and explore innovative
                 solutions that address the challenges that occur when
                 relating RE and SA. The workshop provided participants
                 with an opportunity to become familiar with the
                 relationship between RE and SA in the broader context
                 of software engineering, rather than in an isolated
                 context of either RE or SA. The workshop featured one
                 industrial keynote, five research paper presentations,
                 two invited talks and four working group discussions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hunt:2013:RDA,
  author =       "Johanna Hunt and Xiaofeng Wang",
  title =        "{Research Dojo}: applying agile principles to agile
                 research --- workshop summary from {XP2013}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "43--46",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507324",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes key findings from a workshop
                 held at the 14th International Conference on Agile
                 Software Development (XP2013) called ``Research Dojo:
                 Collaborative Approaches for our Agile Community''.
                 Both software development and research are
                 knowledge-intensive endeavors. While agile approaches
                 have been increasingly adopted in software development
                 projects, whether such approaches can beneficially be
                 applied to conducting research is a phenomenon yet to
                 be fully explored. The objective of the workshop was to
                 gain a deeper understanding of the similarities and
                 differences between academic research and agile
                 software development, in order to explore whether agile
                 practices can also be used for collaboratively
                 conducted research. The opinions of the workshop
                 participants are summarized and observations of the
                 research dojo session carried out by the participants
                 are reported. We conclude by identifying further areas
                 for investigation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Johnson:2013:RSS,
  author =       "Pontus Johnson and Paul Ralph and Michael Goedicke and
                 Pan-Wei Ng and Klaas-Jan Stol and Kari Smolander and
                 Iaakov Exman and Dewayne E. Perry",
  title =        "Report on the {Second SEMAT Workshop on General Theory
                 of Software Engineering (GTSE 2013)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "47--50",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2529923",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kruchten:2013:TDT,
  author =       "Philippe Kruchten and Robert L. Nord and Ipek Ozkaya
                 and Davide Falessi",
  title =        "Technical debt: towards a crisper definition report on
                 the {4th International Workshop on Managing Technical
                 Debt}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "51--54",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507326",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As the pace of software delivery increases and
                 technology rapidly changes, organizations seek guidance
                 on how to insure the sustainability of their software
                 development effort. Over the past four years running
                 the workshops on Managing Technical Debt, we have seen
                 increased interest from the software industry to
                 understanding and managing technical debt. A better
                 understanding of the concept of technical debt, and how
                 to approach it, both from a theoretical and a practical
                 perspective is necessary to advance its state of the
                 art and practice. In this paper, we highlight the
                 current confusion in industry on the definition of
                 technical debt, their contributions that have led to a
                 deeper understanding of this concept and the limits of
                 the metaphor, the criteria to discriminate what is
                 technical debt and not, and areas of further
                 investigation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lewis:2013:RIIb,
  author =       "Grace A. Lewis and Nachiappan Nagappan and Jeff Gray
                 and David Rosenblum and Henry Muccini and Emad Shihab",
  title =        "Report of the {2013 ICSE 1st International Workshop on
                 Engineering Mobile-Enabled Systems (MOBS 2013)}: 12",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "55--58",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507327",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 2013 1st International Workshop on Engineering
                 Mobile-Enabled Systems (MOBS 2013) was held in
                 conjunction with the 35th International Conference on
                 Software Engineering, ICSE 2013, on May 25, 2013 in San
                 Francisco, CA USA. MOBS 2013 brought together software
                 engineering researchers from academia and industry, as
                 well as practitioners, to share results and open issues
                 in diverse areas of engineering mobile-enabled systems.
                 The many discussions throughout the day resulted in the
                 identification of three promising areas of research to
                 address existing gaps and problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hunt:2013:RPS,
  author =       "Johanna Hunt and Olumide Akerele and Tomi Juhola and
                 Michael Waterman",
  title =        "Report from the {PhD} symposium at {XP2013}: an
                 adaptive experiment in feedback",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "59--62",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507328",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, we describe the PhD Symposium organized
                 as a part of the 14th International Conference on Agile
                 Software Development (XP2013). The Symposium was run
                 with an experimental adaptive structure and was divided
                 into two workshops distributed across the conference as
                 well as individual sessions during the conference. The
                 activities of the second workshop were adapted based on
                 the learning needs of the attendees. In this report we
                 describe the structure of the two scheduled workshops,
                 the activities conducted both during and between them,
                 and evaluate the outcome of this Symposium format.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Beschastnikh:2013:BRP,
  author =       "Ivan Beschastnikh",
  title =        "Book Review: {{\booktitle{Presentation patterns:
                 techniques for crafting better presentations}} by Neal
                 Ford, Matthew McCullough and Nathaniel Schutta}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "67--67",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507291",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gvero:2013:CCE,
  author =       "Igor Gvero",
  title =        "Computers as components, 3rd edition: principles of
                 embedded computing system design by Marilyn {Wolf}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "67--68",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507292",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRD,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Drupal For Designers}} by
                 Dani Nordin}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "68--68",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.250729",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRJ,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{jQuery, jQuery UI and jQuery
                 Mobile: recipes and examples}} by Adriaan de Jonge and
                 Phil Dutson}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "68--69",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507294",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chauhan:2013:DSM,
  author =       "Sandeep Chauhan and Arun Sharma and P. S. Grover",
  title =        "Developing self managing software systems using agile
                 modeling",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Design, development and operation of self managing
                 systems are extremely challenging. Having an
                 appropriate development model is of paramount
                 significance for self managing systems. Various
                 approaches have been studied and used in the past. It
                 has been observed that self managing systems may be
                 very good candidates for agile modelling and
                 development. In this paper, we propose a generic
                 architecture along with a life cycle and an Agile
                 Modelling Approach (AMA) for developing self-managing
                 systems. AMA may be applied to software development
                 projects in an effective, flexible and lightweight
                 manner. Moreover, AMA may be used for requirements,
                 analysis, architecture and design, along with the
                 use-case, object, aspect, data or user-interface
                 models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2013:QAE,
  author =       "Rakesh Kumar and Hardeep Singh",
  title =        "A qualitative analysis of effects of security risks on
                 architecture of an information system",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532809",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Information systems are the backbone of almost every
                 business. The rise in the usage and the development of
                 information networks over the years has added to the
                 magnitude and frequent occurrences of threats to these
                 very systems. Therefore, researchers and developers
                 need to fill the gaps between early knowledge about
                 risks and current level of risks and threats posed to
                 information systems. The paper, done qualitatively,
                 explores the various effects on the architecture of the
                 information systems when the systems are exposed to
                 attacks. The conceptual results, presented in the paper
                 explore the relation of security risks to the
                 architectural components of information systems. The
                 findings can help the developer community to design
                 architecturally sound and secure information systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{B:2013:SHE,
  author =       "Sugavanesh B. and Hari Prasath R. and Selvakumar S.",
  title =        "{SHS}-{HTTPS} enforcer: enforcing {HTTPS} and
                 preventing {MITM} attacks",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532802",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web servers provide immunity against Man In The Middle
                 (MITM) attacks and eavesdropping by using HTTP Strict
                 Transport Security (HSTS) to force user agents to
                 communicate only over HTTPS connections. However, the
                 initial connection request from a user is made over an
                 insecure HTTP connection. This issue was addressed by
                 user agents; Google Chrome and Firefox, implicitly, by
                 including a static list of URLs to be accessed only
                 over secure HTTPS connections. Since, these user agents
                 maintain their lists independently, the URLs used by
                 one user agent are invisible to another. A user is
                 prone to MITM attacks, especially in public hotspot
                 environments, when accessing a URL present in the list
                 of secure URLs of one browser but not in another, since
                 the initial handshake from that user agent is insecure.
                 Attacks can be initiated by modifying the outgoing HTTP
                 packets and also the HTTPS response packets from the
                 webserver. This motivated us to propose a solution
                 independent of user agents, by merging the static URL
                 lists of different user agents and enforcing HTTPS for
                 all those URLs. In this paper, we propose a solution,
                 SHSHTTPS Enforcer that introduces a local daemon to
                 enforce URL redirection before the request flows out of
                 the client for the URLs in a list compiled from
                 multiple sources. The proposed solution has been
                 demonstrated through a prototype implementation of the
                 Squid Proxy server as our local daemon. The experiment
                 was conducted by providing a URL, which was not present
                 in one browser's list but was present in another
                 browser's list. It was evident that SHS-HTTPS Enforcer
                 enforced HTTPS successfully and MITM attacks were
                 prevented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Castelluccia:2013:TEB,
  author =       "Daniela Castelluccia and Giuseppe Visaggio",
  title =        "Teaching evidence-based software engineering: learning
                 by a collaborative mapping study of open source
                 software",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532803",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, we share our experiences about teaching
                 evidence-based software engineering to students of a
                 Master degree program in Computer Science. We provided
                 a semester-long course, composed of lessons about
                 empirical and experimental methods. It also included a
                 collaborative project concerning a systematic mapping
                 study of the challenges in the adoption of open source
                 software in a business context. All students
                 collaborated on the project by analyzing emerging
                 results in the scientific literature. They evaluated
                 the proposals in terms of level of novelty and evidence
                 and delivered a complete report, which summarized the
                 risk factors in the adoption of open source software
                 and offers technical knowledge about evolutionary
                 patterns and development community support, with
                 practical implications. As a side effect, this
                 problem-based learning approach provides a positive
                 impact in terms of students' participation, teamwork
                 attitude, professional interest in open source
                 software, and exam passing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jeet:2013:SRE,
  author =       "Kawal Jeet and Renu Dhir",
  title =        "Software re-engineering using imperialist competitive
                 algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532808",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Maintenance is one of the important phases of the
                 software development life cycle which contributes to
                 the effective and long term use of any software system.
                 It can become cumbersome and costly for software
                 maintainers when subsystem boundaries are not clearly
                 defined. Further, the problem gets worse due to the
                 system evolution, lack of current documentation and
                 lack of original design documentation. The application
                 of clustering techniques and tools helps software
                 maintenance programmers to recover high-level views of
                 system designs and hence leads to better understanding
                 and maintenance of software systems. In this paper, we
                 have used a sociopolitical Imperialist Competitive
                 Algorithm for software module clustering and compared
                 it with existing evolutionary approaches. We conclude
                 that the novel socio-political approach produces better
                 quality clusters as compared to the earlier
                 evolutionary genetic approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Garg:2013:NBG,
  author =       "Deepak Garg and Amitava Datta and Tim French",
  title =        "A novel bipartite graph approach for selection and
                 prioritisation of test cases",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532806",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Every regression testing cycle of a software
                 application results in new test cases being introduced
                 in a test suite. Many test cases from previous
                 regression testing cycles become unstable or unusable
                 due to the removal/addition of the new functionalities.
                 The execution of a large number of unusable test cases
                 results in less test coverage and higher test execution
                 time. The lower test coverage is due to the coverage of
                 the non-existent code statements. The higher test
                 execution time is due to the execution of unused and
                 broken test cases. In this paper, we propose a new
                 bipartite graph approach to eliminate the subset of
                 test cases that are not relevant for the testing of the
                 current version of a software application. The
                 suggested approach helps in executing a minimal set of
                 test cases that are required to cover more code
                 statements.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Goel:2013:IHL,
  author =       "Brij Mohan Goel and Pradeep Kumar Bhatia",
  title =        "Investigating of high and low impact faults in
                 object-oriented projects",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532807",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "For optimum utilization of resources and reducing the
                 cost of software, the fault detection and elimination
                 process must be properly planned and for this type of
                 planning prediction of fault-prone module is gaining
                 importance among researchers. It would be valuable to
                 know how object-oriented design metrics and class
                 fault-proneness are related when fault impact is taken
                 into account. In this paper, we use the logistic
                 regression method to empirically investigate the
                 usefulness of object-oriented design metrics in
                 predicting fault-proneness when taking fault impact
                 into account. Our results, based on a public domain
                 NASA Promise data set, indicate that most of these
                 design metrics are statistically related to
                 fault-proneness of classes across fault impact, and the
                 prediction capabilities of the investigated metrics
                 greatly depend on the impact of faults. More
                 specifically, these design metrics are able to predict
                 high/low impact faults in fault-prone classes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mary:2013:PSA,
  author =       "S. Roselin Mary and Paul Rodrigues and E. R..
                 Naganathan",
  title =        "Patterns of software architecture in {Vastu}: a new
                 revelation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532815",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Patterns play an important role in architecture.
                 Plenty of patterns exist but remain undiscovered. Many
                 of the patterns used in different fields are knowingly
                 or unknowingly used in the field of software
                 architecture. This technical paper briefly explains
                 various patterns in the Indian architectural science
                 Vastu and also presents a brief discussion of various
                 available software architectural patterns. An attempt
                 is made here to find correlations between patterns
                 existing in vastu and software architecture. Further,
                 based on the facts established in vastu, it may be
                 possible to build any kind of complex systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Levine:2013:CSS,
  author =       "Gertrude N. Levine",
  title =        "Computer security with service degradations",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532810",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Computer systems invest substantial resources in
                 securing their service. Costs of failure prevention are
                 balanced against those of detection and recovery, even
                 though recovery mechanisms can cause greater
                 degradations of services. Most computer users consider
                 degradations of service to be insidious and injurious.
                 Yet, service degradations commonly assist in both the
                 prevention and the curtailment of failures. Their
                 toleration enables service continuation following fault
                 activation, during which degradations are monitored for
                 symptoms of security breaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Haller:2013:MT,
  author =       "Klaus Haller",
  title =        "Mobile Testing",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532813",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Mobile apps are everywhere. Some apps entertain and
                 others enable business transactions. Apps increasingly
                 interact with complex IT landscapes. For example, a
                 banking app on a mobile device acts as a front end that
                 invokes services on a back-end server of the bank,
                 which might contact even more servers. Mobile testing
                 becomes crucial and challenging. This paper follows a
                 user-centric testing approach. The app's architecture
                 matters for testing, as does its user base and usage
                 context. Addressing these factors ensures that test
                 cases cover all relevant areas. Most apps need test
                 automation for two reasons: agility and compatibly.
                 Agile projects test frequently, such as every night, to
                 detect bugs early. Compatibility tests ensure that an
                 app runs on all relevant devices and operating system
                 versions on the market. Thus, testers execute test
                 scripts on many devices. This demands for a private
                 device cloud and a mobile test automation framework.
                 Swisscom IT Services followed this path, enabling us to
                 address the major quality issues we identified for
                 mobile apps: pre-usage failures (installation fails,
                 app crashes during startup) and lack of basic
                 regression testing (upgrades buggier than
                 predecessor).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2013:RPT,
  author =       "Lalit Kumar Singh and Gopika Vinod and A. K.
                 Tripathi",
  title =        "Reliability prediction through system modeling",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--10",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.25328012",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Quantifying software reliability, such as performance
                 and dependability, through stochastic behavior models
                 (or labeled transition systems) is already a common
                 practice in the software analysis community. However,
                 those models are usually too fine grained to represent
                 an accurate view of the software system by its
                 stakeholders. Scenarios, on the other hand, are capable
                 not only to describe the system traces as behavior
                 models do but also depict very clearly the system
                 components designed to provide the intended system
                 behavior as well as to outline a high level
                 architecture view of the system being described. In
                 this paper, we introduce a case study of a safety
                 critical computer based system that is running in an
                 Indian Nuclear Power Plant. We define clear component
                 interfaces, from which we analyze its software
                 reliability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dutta:2013:ERD,
  author =       "Animesh Dutta and Shrutilipi Bhattacharjee and Ananya
                 Kanjilal and Ranjan Dasgupta and Swapan Bhattacharya",
  title =        "Engineering of requirements for a distributed
                 teleteaching system: a conceptual graph-based
                 approach",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--12",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532814",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This work proposes a graph based requirement analysis
                 approach and its verification methodology to address
                 the challenges of requirements engineering in the
                 context of a distributed teleteaching system.
                 Requirements are generally expressed in natural
                 language and in the absence or limited use of the
                 requirements elicitation phase, verification of
                 requirements and traceability of requirements to
                 different artifacts of the subsequent phases becomes
                 difficult. In this work we use i* diagrams, the well
                 known standard for agent based requirements analysis.
                 Then we propose Extended Means Ends Analysis (EMEA)
                 with the addition of some new constructs. Next we
                 define a transformation algorithm to derive a
                 conceptual graph (CG) and propose a method for
                 conceptual graph based requirements specification and
                 its verification. A metrics based evaluation for
                 performance measurement of the proposed method in terms
                 of requirements traceability is presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mala:2013:CAT,
  author =       "D. Jeya Mala and S. Balamurugan and K. Sabari Nathan",
  title =        "Criticality analyzer and tester: an effective approach
                 for critical component identification \& verification
                 using {ABC}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--12",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532811",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Now a days, software industries satisfy users' needs
                 through developing software. To satisfy their
                 customers, the software developers need to identify the
                 critical components that make serious impacts on users'
                 requirements. Tracking critical components is an
                 important and timeconsuming process. In this paper, we
                 propose a novel approach, Criticality Analysis, which
                 identifies the critical components of an application.
                 The identified critical components are verified to
                 ensure that they are failure-free using the intelligent
                 search based optimization algorithm, Artificial Bee
                 Colony.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ahmad:2013:WSE,
  author =       "Faisal Ahmad and Suvamoy Changder and Anirban Sarkar",
  title =        "{Web} service execution model for cloud environment",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--13",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web services describe a standardized way of
                 integrating Web-based applications. In recent days,
                 with the advancement of cloud computing, web services
                 play pivoting roles towards meeting complex business
                 objectives on a large scale. However, engineering
                 dynamic web services is a complex task as they can be
                 added, modified and deleted on the fly and even without
                 any prior notification. Executing a large scale
                 business process using dynamic web services is very
                 challenging. This paper proposes an execution machine,
                 called Web Service Dynamic Execution Machine (WSDE
                 machine), which works in the execution layer of the
                 three layered architecture for web service dynamics
                 [23]. The proposed machine is capable of executing
                 business processes having both deterministic and
                 non-deterministic flows, where the related web services
                 are represented using a graph-based semantic based
                 formal model. The generic nature of the WSDE machine is
                 useful in improving performance, scalability and
                 maintainability of large scale web service based
                 information systems. In this paper, the proposed WSDE
                 machine is also illustrated with a suitable case
                 study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{deCastro:2013:SGP,
  author =       "Ronney Moreira de Castro and Jos{\'e} Luis Braga and
                 Liziane Santos Soares",
  title =        "Selection of good practices for small software
                 development teams: a knowledge-based approach",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--15",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532804",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The world is increasingly dependent on technology and
                 computing systems. Software organizations are facing a
                 highly competitive market, and thus seeking good
                 practices and processes that help keep them
                 competitive. The quality of their products becomes a
                 differentiating factor and is directly associated with
                 these processes. The software products they deliver
                 play a major role in this competitive scenario, to
                 which small organizations do not have easy access. Our
                 study is directed to those small and
                 micro-organizations that lack the necessary financial
                 assets to hire people, adopt and implement expensive
                 processes, or even implement good development
                 practices. In this paper we present our approach to
                 help those organizations find good practices to enhance
                 their software development processes. The method
                 consisted of obtaining a possible company profile based
                 on technical attributes, given as input to a
                 knowledge-based system that derived a list of possible
                 practices to be adopted according to that profile. Then
                 project managers can select those more suitable to the
                 company's present demands, and implement them in
                 smaller steps according to the organization maturity
                 levels. The approach was currently tested in two
                 organizations that are by now implementing the
                 suggested practices. The proposed system is freely
                 available through the internet.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Katic:2013:WAC,
  author =       "Marija Katic",
  title =        "Why attending conferences is important for your
                 research: {ESEC\slash FSE 2013} experience summary",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "5--6",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532787",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, a personal perspective on how important
                 for a scientist is to attend conferences is given. The
                 report is influenced by the author's attendance of the
                 9th joint meeting of the European Software Engineering
                 Conference and the ACM SIGSOFT Symposium on the
                 Foundations of Software Engineering (ESEC/FSE 2013).
                 ESEC/FSE 2013 took place in Saint Petersburg, Russia
                 and gathered researchers, practitioners, and educators
                 from all over the world that presented and discussed
                 the most recent work, trends, and challenges in the
                 field of software engineering. ESEC/FSE joined the main
                 conference, and several co-located events: two
                 conferences, four workshops, doctoral symposium and
                 seven tutorials. While the main conference covered
                 broad topics in software engineering, the two
                 co-located conferences were targeted to the specific
                 software engineering community: multicore software
                 engineering, performance, and tools, and to the
                 search-based software engineering community.
                 Additionally, there were four interesting workshops: on
                 social software engineering, on software evolution, on
                 software ecosystem architectures, and on softw