Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.04",
%%%     date            = "26 December 2021",
%%%     time            = "08:48:17 MST",
%%%     filename        = "sigsoft2010.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "01283 25058 128040 1211237",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "ACM SIGSOFT Software Engineering Notes;
%%%                        bibliography; BibTeX",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of ACM
%%%                        SIGSOFT Software Engineering Notes (CODEN
%%%                        SFENDP, ISSN 0163-5948 (print), 1943-5843
%%%                        (electronic)) for the years 2010--2019.
%%%                        Other decades are covered in companion
%%%                        bibliographies named sigsoftYYY0.bib.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        May 1976, and there are up to 8 issues per
%%%                        annual volume.
%%%
%%%                        The journal has Web sites at:
%%%
%%%                            http://www.sigsoft.org/
%%%                            https://dl.acm.org/citation.cfm?id=J728
%%%                            https://dl.acm.org/loi/sigsoft
%%%
%%%                        At version 1.04, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2010 ( 112)    2014 (  12)    2018 (  68)
%%%                             2011 ( 101)    2015 (   0)    2019 (  53)
%%%                             2012 ( 163)    2016 (  50)
%%%                             2013 ( 157)    2017 (  36)
%%%
%%%                             Article:        752
%%%
%%%                             Total entries:  752
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}}    \fi" #
    "\ifx \undefined \TM        \def \TM          {${}^{\sc TM}$} \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-SIGSOFT               = "ACM SIGSOFT Software Engineering Notes"}

%%% ====================================================================
%%% Bibliography entries, sorted by publication order with ``bibsort
%%% --byvolume'':
@Article{deSousa:2010:AAR,
  author =       "Thiago C. de Sousa and Jorge R. {Almeida, Jr.} and
                 Sidney Viana and Judith Pav{\'o}n",
  title =        "Automatic analysis of requirements consistency with
                 the {B} method",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734114",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A consistent requirements specification is a
                 fundamental success factor for quality software
                 development projects. On the one hand, writing
                 requirements in a natural language is not good for an
                 automated conflict detection process. On the other
                 hand, formal methods provide the basis for consistency
                 checking of requirements specification automatically.
                 In this paper, the potential of the B method for
                 improving the requirements quality under the
                 consistency dimension is discussed. We present an
                 approach to use B specifications derived from a
                 controlled natural language to identify requirements
                 inconsistencies",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kalaimagal:2010:QIQ,
  author =       "Sivamuni Kalaimagal and Rengaramanujam Srinivasan",
  title =        "{Q'Facto 12}: an improved quality model for {COTS}
                 components",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734116",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component Based Software Engineering (CBSE) offers
                 developers the twin benefits of reduced software life
                 cycles and shorter development times. However the
                 success of the component based paradigm depends on the
                 quality of the COTS components purchased and integrated
                 into the existing software systems. The need of the
                 hour therefore is a quality model that can be used by
                 software developers to evaluate the quality of software
                 components before integrating them into existing
                 systems. This paper discusses a quality model called
                 Q'Facto12 based on the ISO25000 quality standard that
                 can be used to evaluate the quality of COTS components.
                 The model is an upgrade of an earlier model called the
                 Q'Facto 10 model that was proposed by us. This paper
                 provides an outline of the Q'Facto 12 model compares
                 the model with the Q'Facto 10 model and highlights why
                 the Q'Facto 12 model is better than the Q'Facto 10
                 model. An experimental study to demonstrate the use of
                 the model has also been presented",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nami:2010:SNN,
  author =       "Mohammad Reza Nami and Jila Saneipour",
  title =        "Self-* e-nursing: a new idea in nursing",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734117",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The rapid advances in Information and Communication
                 Technology (ICT), management, and network technologies
                 have had key role in emerging heterogeneous large-scale
                 distributed systems. The term of E-nursing has been
                 used to refer to the incorporation of ICT into nursing.
                 An Autonomous system has as its vision the creation of
                 self managing systems to address today's concerns of
                 complexity and total cost of ownership while meeting
                 tomorrow's needs for pervasive and ubiquitous
                 computation and communication. Purpose of this paper is
                 to present an autonomous virtual organization for
                 e-nursing describing their characteristics, effects on
                 quality factors, their building blocks architecture,
                 and challenges",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhatia:2010:ACB,
  author =       "Rajesh K. Bhatia and Mayank Dave and R. C. Joshi",
  title =        "Ant colony based rule generation for reusable software
                 component retrieval",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734110",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Storage and representation of reusable software
                 components in software repositories to facilitate
                 convenient identification and retrieval has been always
                 a concern for software reuse researchers. This paper
                 discusses and demonstrated an ant colony algorithm
                 based technique that generates rules to store and then
                 identify the component from software repository for
                 possible reuse. Proposed technique help user in
                 organization and storage of components in repository
                 and later can help in identifying most appropriate
                 component for given context. In first stage while
                 searching it makes use of keywords, their synonyms and
                 their inter-relationships. Then it makes use of ant
                 colony optimization; initial pheromone of one is
                 assigned to all domain representative terms of
                 components. By updating pheromone for participating
                 terms and non-participating terms iteratively and by
                 calculating the quality of each rule generated, it
                 leads to quality rules to represent and retrieve the
                 reusable components",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chodkowski:2010:RIA,
  author =       "Steven Chodkowski",
  title =        "Recommendations for the information architect's book
                 shelf",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734112",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dahiya:2010:TSE,
  author =       "Deepak Dahiya",
  title =        "Teaching software engineering: a practical approach",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734113",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In teaching software engineering, it is a major
                 challenge to integrate applied methodology and theory
                 into the practice of software development. Today
                 teaching a course in software engineering involves a
                 theoretical approach with white board and doing a
                 project at the end of the course. Teaching Software
                 engineering as a course involves many disciplines and
                 requires delivering lectures accompanied by lecture
                 demos and hands on lab sessions to accompany individual
                 constituent topics or areas that form the bricks and
                 mortar of this course. Only when the bricks and mortar
                 of software engineering have delivered a solid
                 foundation, is it then that software engineering as a
                 course will be delivered in a true and meaningful
                 sense. This paper presents a method to teach Software
                 Engineering using the applied approach that the author
                 designed and successfully used",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gill:2010:MDP,
  author =       "Nasib Singh Gill and Pradeep Tomar",
  title =        "Modified development process of component-based
                 software engineering",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734120",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based software engineering (CBSE) is a
                 branch of software engineering, the priority of which
                 is the separation of concerns in respect of the
                 wide-ranging functionality available throughout a given
                 software system. CBSE emphasizes on building system by
                 reusing high quality configurable software components.
                 This reduces its development cost as well as
                 time-to-market and ensures higher reliability, better
                 maintainability and quality by exploiting reusability.
                 In the traditional approach, when a software system is
                 going to be developed, the implementation has to be
                 done from scratch. With the advent of Object-Oriented
                 Technology (OOT), reusable software components have
                 become an indispensable part of programming knowledge.
                 In addition to those classes and methods included in
                 standard libraries of programming languages, such as
                 the Java API library, many reusable software components
                 are developed by software development organizations
                 specifically for reuse or repackaged from previously
                 developed systems. We propose here a modified
                 development process of CBSE and present our modified
                 development process of CBSE for increasing reusability
                 in different abstraction levels: architecture level,
                 modular design level and framework level. This modified
                 development process of CBSE change the reusability
                 approach into two different approaches
                 composition-based approach and generation-based. Lastly
                 on the basis of these two approaches we divide
                 component reuse into two different processes. First one
                 is process of development of reusable components which
                 is composition-based approach and second one is process
                 of development with reusable components which is based
                 on the generation-based according X model with the
                 benefits of reusable components in programming",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2010:MST,
  author =       "Anup Kumar Bandyopadhyay",
  title =        "Modeling of state transition rules and its
                 application",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--7",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734109",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A state transition rule is viewed as a cause and
                 effect relationship. An example is selected from the
                 common sense world. Six different instances of this
                 relationship are enumerated. A temporal logic based on
                 observation is proposed. This logic is used to model
                 the enumerated instances. Assuming some necessary
                 properties of a transition rule only two relevant
                 models are selected. One of them ensures that the
                 precondition is necessary where the other guarantees
                 its sufficiency. Noting these two characteristics the
                 first one is opted for proving the safety property
                 where the second is used to prove progress. We have
                 considered Peterson's two process mutual exclusion
                 algorithm as an illustrative example",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gupta:2010:TFR,
  author =       "Amit Gupta and Rajesh Bhatia",
  title =        "Testing functional requirements using B model
                 specifications",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--7",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734115",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Testing is very important part of software
                 development. Almost 80\% software fails because of the
                 improper or inefficient testing. Testing is performed
                 by different types of strategies. Generally testing is
                 performed on code, but if the software can be tested in
                 the earlier phases then most of the errors can be
                 eliminated and can be stopped from propagating to next
                 phase. Thus there is a need to explore testing
                 possibilities in earlier phases. This paper present a
                 novel requirement based testing approach that can fix
                 errors in initial phase. Formal Specification languages
                 play a vital role in software testing. Formal models
                 provide a precise specification of the system, and can
                 be used as a vehicle for driving the development
                 process. To perform requirement based testing, we need
                 a formal language that can deal with the requirement
                 specification efficiently. Many researchers have
                 proposed various approaches to generate test cases from
                 formal specifications. These approaches include test
                 case generation from various state based languages like
                 Z, VDM and B specifications. In this paper we proposed
                 a technique that can provide better coverage of
                 requirements as compared to other approaches. For
                 maximizing the coverage of requirements in our model,
                 we annotate our specifications with requirement
                 identifiers, which help in later stages to detect which
                 requirements are covered and which are yet to be
                 tested. Test cases are generated by extracting
                 invariants and post conditions from our specification,
                 and are transformed in a generalized form. Using test
                 selection criteria, we can cover all parts of our model
                 and generates test cases for each of our test
                 objective",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ripon:2010:PAS,
  author =       "Shamim H. Ripon",
  title =        "Process algebraic support for web service
                 composition",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--7",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734118",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web services technology provides a platform on which
                 we can develop distributed services. The
                 interoperability among these services is achieved by
                 various standard protocols. In recent years, several
                 researches suggested that process algebras provide a
                 satisfactory assistance to the whole process of web
                 services development. Business transactions, on the
                 other hand, involve the coordination and interaction
                 between multiple partners. With the emergence of web
                 services, business transactions are conducted using
                 these services. The coordination among the business
                 processes is crucial, so is the handling of faults that
                 can arise at any stage of a transaction. Compensation
                 is an error recovery mechanism to handle faults in
                 business transactions. Compensating CSP (cCSP) is a
                 language defined to model business transactions within
                 the framework of standard CSP process algebra. The
                 language defines a transaction as a process and has the
                 constructs for orchestration of compensations. In this
                 short note, we report a case study showing how cCSP can
                 be used to model business transactions. We also show a
                 mechanical verification technique to verify theoretical
                 properties of the language",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neogi:2010:EEV,
  author =       "Madhumita S. Neogi and Vandana Bhattacherjee",
  title =        "Evaluating the effectiveness of {VOSDM}: a vision
                 oriented approach",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--8",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734119",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Process models form the heart of software engineering
                 since software development process spans the life cycle
                 of any given project. Even though waterfall model forms
                 the basis of all software development models, the
                 demand for new models with design and implementation
                 occurring in parallel is on the increase. This research
                 aims at the evaluation of a vision oriented software
                 development model. In this study, the subjects are
                 final year post graduate students working for their
                 final term projects for small organizations in and
                 around our city. The group of students applied two
                 techniques for software development and it was found
                 that VOSDM was more effective and improved reliability.
                 The productivity did not show any significant
                 improvement",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wright:2010:ISD,
  author =       "M. Keith Wright and Charles J. {Capps III}",
  title =        "Information systems development project performance in
                 the 21st century",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734121",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents the results of a 2009 survey of
                 professional IT auditors that explored their
                 perceptions about root psychological and sociological
                 causes of Information Systems (IS) project failure
                 based on the punctuated equilibrium theoretical
                 framework. As predicted by punctuated equilibrium
                 theory, the results of the survey indicate that radical
                 as opposed to incremental organizational changes are
                 more effective in turning around ``runaway'' projects.
                 The results indicate that IS development project
                 performance is worse in government than in the private
                 sector, and provide support for the continued use of
                 punctuated equilibrium models for research in
                 information systems development project performance",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Capretz:2010:WDW,
  author =       "Luiz Fernando Capretz and Faheem Ahmed",
  title =        "Why do we need personality diversity in software
                 engineering?",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734111",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Diversity of skills is good for society, it is also
                 good in problem solving because different people see a
                 problem from several perspectives, so diversity should
                 be good for software engineering too. This study
                 tackles a difficult to study aspect of software
                 engineering, that is, how to best associate personnel
                 with the various tasks in a software project. The
                 approach uses psychological types to determine who is
                 best suited to particular development roles. The
                 article has four main objectives: (1) to arouse
                 awareness of human factors among software engineers;
                 (2) to investigate how psychological factors can
                 contribute to their effectiveness at work; (3) to
                 catalyze effort among software engineers leading
                 towards a deeper understanding and broader applications
                 of human factors in the light of the activities
                 involving the engineering of software; and (4) to
                 emphasize the important of skill diversity in the
                 software engineering field. This article provides
                 conceptual knowledge, reports findings, and presents
                 both real and hypothesized beliefs from the software
                 engineering community. Likewise, it is hoped that the
                 article will motivate software engineers and
                 psychologists to conduct more research in the area of
                 software psychology, so as to understand more
                 profoundly the possibilities for increased
                 effectiveness and fulfillment among software
                 engineers",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEa,
  author =       "Larry Bernstein",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "3--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734104",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2010:SEEa,
  author =       "Mark A. Ardis",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "4--4",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734105",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "5--14",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734106",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "15--24",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734107",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gorschek:2010:TIW,
  author =       "Tony Gorschek and Samuel Fricker and Sjaak Brinkkemper
                 and Christof Ebert",
  title =        "{Third International Workshop on Software Product
                 Management --- IWSPM'09}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "25--29",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734108",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software product management steers the success of a
                 product in all its lifecycle stages by thoughtful
                 application of planning, coordination, and control. The
                 third international workshop on software product
                 management (IWSPM{\^A}'09) was held in conjunction with
                 the International Conference on Requirements
                 Engineering (RE'09) in Atlanta USA. The aim was to
                 bring researchers and industry practitioners together
                 to discuss the area and unique challenges of software
                 and technology product management. Selected challenges
                 put forward by accepted papers from both industry and
                 academia were analyzed. The session discussions focused
                 on identifying future needs for research, the relevance
                 of which was assured by good industry presence at the
                 workshop. The workshop homepage can be found
                 http://2009.iwspm.org",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saur:2010:BRS,
  author =       "Joe Saur",
  title =        "Book Review: {{\booktitle{Simulation-Based Engineering
                 of Complex Systems}}, Second Edition, by John R.
                 Clymer, and published by John Wiley and Sons, 2009,
                 hardcover, ISBN 978-0-470-40129-3, 503 pp.}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "33--34",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734122",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tribbey:2010:BRF,
  author =       "Will Tribbey",
  title =        "Book Review: {{\booktitle{F\# for Scientists}}, by Jon
                 Harrop, and published by Wiley-Interscience, 2008,
                 hardback, ISBN 0-470-24211-6, 368pp.}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "2",
  pages =        "34--35",
  month =        mar,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1734103.1734123",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:52 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krizevnik:2010:ISP,
  author =       "Marcel Krizevnik and Matjaz B. Juric",
  title =        "Improved {SOA} persistence architectural model",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764821",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Companies often face difficulties when building the
                 data services layer. The most common problems are poor
                 data quality, performance issues and heterogeneity of
                 data sources. In this article, we propose solutions to
                 the problems described and merge them into a
                 comprehensive architectural model for the storage and
                 management of permanent data in SOA (Service Oriented
                 Architecture). In order to overcome problems related to
                 poor data quality, our architectural model requires the
                 use of adjusted MDM (Master Data Management).
                 Furthermore, we propose that all data transfer between
                 data services and business level goes in form of SDO
                 (Service Data Objects), which allow us a uniform data
                 access and manipulation, regardless of the data type.
                 As the best approach to improve performances,
                 scalability, availability and reliability of the data
                 services layer, our architecture introduces caching in
                 the intermediate layer with the use of in-memory data
                 grids. As an example of how the proposed solution can
                 also be used to improve parts of the SOA
                 infrastructure, we will present possible approach to
                 improve BPEL (Business Process Execution Language)
                 dehydration store.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nair:2010:PMB,
  author =       "T. R. Gopalakrishnan Nair and V. Suma",
  title =        "A paradigm for metric based inspection process for
                 enhancing defect management",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764827",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Inspection process in software development plays a
                 vital role in effective defect management. In order to
                 have an appropriate measurement of the inspection
                 process, we depend on a process metric called the Depth
                 of Inspection (DI). DI enables the manager within the
                 software community to identify and compare the level of
                 inspection performed in various projects. An empirical
                 study of several projects facilitated the evaluation of
                 a set of process coefficients which are capable of
                 predicting the DI values using multiple regression
                 models. The industry observed DI value based on defect
                 count and the DI value produced by the model are
                 strongly matching. This supports the predictive
                 capability of DI through process coefficients without
                 depending on the prior estimation of the defect
                 count.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Li:2010:TER,
  author =       "Zude Li and Mechelle Gittens and Syed Shariyar Murtaza
                 and Nazim H. Madhavji",
  title =        "A towards an extended relational algebra for software
                 architecture",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764823",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software architecture is often structured as
                 box-and-arrow graphs and has important implications for
                 system development and maintenance. We propose an
                 extended relational algebra to support presentation and
                 manipulation of both architectural structures and
                 implications. The core structure of this algebra is the
                 extended architectural relation (EAR). An EAR is a
                 mapping from an architectural relation (AR) to a
                 multi-set of attributes (M), where the AR is an
                 ordinary relation representing an architectural
                 structure, and the M represents a multi-set
                 representing a type of architectural implication. A set
                 of EAR operations is then defined to support EAR
                 manipulations. The main advantage of this extended
                 algebra over ordinary relational algebras is that the
                 architectural implications (the M part) are presented
                 and manipulated together with the architectural
                 structures (the AR part). This paper first discusses
                 why we propose the algebra, then briefly introduces
                 what the algebra is, and finally describes how to use
                 the algebra in a real scenario.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Georgieva:2010:CFS,
  author =       "Konstantina Georgieva",
  title =        "Conducting {FMEA} over the software development
                 process",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764819",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Failure mode and effects analysis (FMEA) is one of the
                 well-known analysis methods with an established
                 position in the traditional reliability analysis. It is
                 widely used but even so, it is not popular in software
                 engineering. To address this gap, in this paper we
                 propose an application of the FMEA method for the
                 software development process after which we visualize
                 our approach with a tool that makes the application of
                 SFMEA very easy. Our tool is available in our virtual
                 Software Measurement Laboratory ([email protected]) at
                 http:// www.smlab.de/webapplcations.html.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2010:SMM,
  author =       "Krishna Kumar and Rajesh Prasad and Suneeta Agarwal",
  title =        "Software maintenance by multi-patterns parameterized
                 string matching with q-gram",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764822",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the multi-patterns parameterized string matching
                 problem, a set of patterns $ P_0, P_1, P_2, \ldots {},
                 P_{r - 1}, r \geq 1 $, are said to match with a
                 sub-string $t$ of the text $T$, if there exists a
                 one-one correspondence between the symbols of patterns
                 and the symbols of $t$. This problem has an important
                 application in software maintenance, where it is often
                 required to find equivalency between two sections of
                 codes. Two sections of codes are said to be equivalent
                 if one can be transformed into the other by renaming
                 only identifiers and variables. In this paper, we
                 extend Forward Non-deterministic Directed Acyclic Word
                 Graph (DAWG) matching (FNDM) algorithm to PQFNDM for
                 parameterized string matching problem by using the
                 q-gram. Experimentally it has been observed that the
                 performance of PQFNDM improves with increasing value of
                 q up to half the length of the pattern. We further
                 modify PQFNDM to MPQFNDM for handling multiple
                 patterns. We compare the performance of PQFNDM (for
                 q=1) with parameterized shift-or (PSO) algorithm and
                 found that PQFNDM is better than PSO. We also show the
                 benefits of using multiple patterns.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Pandey:2010:ADL,
  author =       "R. K. Pandey",
  title =        "Architectural description languages {(ADLs)} vs {UML}:
                 a review",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764828",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The field of software architecture which is considered
                 as a subfield of software engineering is now about two
                 decades old. During this period a number of software
                 Architecture Description Languages (ADLs) emerged and
                 vanished. But none of the ADLs became much popular
                 amongst the practitioners except a few, that too only
                 in a specific domain. On the other hand Unified
                 Modeling Language (UML) which some times is not even
                 accepted as an ADL or accepted with a some hesitation
                 has become an industry de facto standard notation for
                 documenting software architectures. This paper makes an
                 attempt to find an answer to this question as to what
                 went wrong with the ADLs that they did not become much
                 popular beyond their place of origin. Is UML really an
                 Architecture Description Language.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Prasad:2010:PSM,
  author =       "Rajesh Prasad and Suneeta Agarwal",
  title =        "Parameterized string matching: an application to
                 software maintenance",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764829",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the problem of parameterized string matching, a
                 given pattern P is said to match with a sub-string $t$
                 of the text $T$, if there exists a one-one
                 correspondence between the symbols of P and the symbols
                 of $t$. This problem has an important application in
                 software maintenance, where it is often required to
                 find equivalency between two sections of codes. Two
                 sections of codes are said to be equivalent if one can
                 be transformed into the other by renaming only
                 identifiers and variables. In this paper, we propose
                 two new algorithms for the said problem by using the
                 q-gram approach. The first one is obtained by using
                 this approach on an existing string matching algorithm
                 (simplified backward non-deterministic directed acyclic
                 word graph matching (SBNDM)). The second one is
                 obtained by using the q-gram approach on the
                 parameterized string matching algorithm (parameterized
                 backward non-deterministic directed acyclic word graph
                 matching (PBNDM)). Performance of both the algorithms
                 is tested for various values of q and it has been
                 observed that both show their best performance for q
                 nearly equal to half of the pattern length. We also
                 study the effect on running time of these algorithms
                 with increasing the duplicity in the text.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Malhotra:2010:AML,
  author =       "Ruchika Malhotra and Arvinder Kaur and Yogesh Singh",
  title =        "Application of machine learning methods for software
                 effort prediction",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764825",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software effort estimation is an important area in the
                 field of software engineering. If the software
                 development effort is over estimated it may lead to
                 tight time schedules and thus quality and testing of
                 software may be compromised. In contrast, if the
                 software development effort is underestimated it may
                 lead to over allocation of man power and resource.
                 There are many models proposed in the literature for
                 estimating software effort. In this paper, we analyze
                 machine learning methods in order to develop models to
                 predict software development effort we used Maxwell
                 data consisting 63 projects. The results show that
                 linear regression, MSP and M5Rules are effective
                 methods for predicting software development effort.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mattmann:2010:UAT,
  author =       "Chris A. Mattmann and Amy J. Braverman and Daniel J.
                 Crichton",
  title =        "Understanding architectural tradeoffs necessary to
                 increase climate model intercomparison efficiency",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764826",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "NASA's Jet Propulsion Laboratory, in partnership with
                 Lawrence Livermore National Laboratory, has been
                 leading an effort to allow remote sensing data
                 available from NASA satellites to be easily compared
                 with climate model outputs available from the
                 DOE-funded Earth System Grid, a national asset in
                 climate science. This partnership is timely with the
                 looming Intergovernmental Panel on Climate Change
                 (IPCC)'s 5th Assement Report (AR5) in active
                 discussion, and the metrics to better understand
                 Earth's climate under formulation. JPL's project,
                 titled the Climate Data eXchange (CDX) provides an
                 easy-to-use software framework for climate scientists
                 to rapidly integrate and evaluate the efficacy of
                 observational data as applied to climate models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rajaram:2010:ESV,
  author =       "Kanchana Rajaram and Chitra Babu",
  title =        "Evolution of a simple vehicle registration system to
                 an {SOA} based e-governance application: a case study",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764830",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Transactions are one of the basic building blocks in
                 all business applications. The notion of a transaction
                 originated in the seventies and has evolved over time
                 to cater to complex business applications that are
                 distributed, heterogeneous, and loosely coupled. The
                 literature on transaction models is extensive and most
                 of them illustrate the ideas with case studies on
                 different applications. Since the applications are
                 different, it is diffcult to understand the limitations
                 of the models for the general case. However, such an
                 understanding is essential in order to develop a new
                 transaction model that caters to the changing business
                 requirements. This motivated us to investigate the
                 evolution of existing transaction models and to analyze
                 their shortcomings using a case study, Vehicle
                 Registration system. A taxonomy of the various
                 transaction models based on conceptual evolution has
                 also been presented. Further, the suitability of SOA to
                 large scale e-governance applications and the need for
                 developing better SOA Governance transaction frameworks
                 have been demonstrated.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gama:2010:SAA,
  author =       "Kiev Gama and Didier Donsez",
  title =        "A survey on approaches for addressing dependability
                 attributes in the {OSGi} service platform",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764818",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The OSGi service platform is being used in software
                 industry as the de facto middleware for developing and
                 deploying modular Java applications, using SOA
                 principles in centralized solutions. OSGi provides a
                 dynamic platform where components and services can be
                 deployed and undeployed at runtime, attracting the
                 attention of both commercial and research projects.
                 Although the platform is used in fields with different
                 purposes (e.g. experimentally used in healthcare,
                 commercially used in application servers) but where
                 dependability should be a pre-requisite for
                 applications, it is a fact that the OSGi technology
                 does not provide a dependable platform for executing
                 applications with such needs. Different research
                 efforts try to address dependability attributes
                 (availability, integrity, maintainability, reliability,
                 safety, and confidentiality) in the OSGi service
                 platform, but not necessarily all of these attributes
                 are completely covered or explicitly addressed in the
                 textual references. We provide a brief survey on recent
                 research efforts that try to improve dependability in
                 the OSGi service platform. We analyze and identify
                 which attributes are addressed on each approach, and
                 provide a discussion on the employed techniques,
                 similarities and results achieved on such approaches.
                 Al-though this survey remains limited to one technology
                 (OSGi), the problematic as well as all the employed
                 techniques in the analyzed efforts are pertinent to
                 other service and component-based systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hopfner:2010:EAD,
  author =       "Hagen H{\"o}pfner and Christian Bunse",
  title =        "Energy aware data management on {AVR} micro controller
                 based systems",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764820",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data management systems comprise various algorithms
                 for efficiently retrieving and managing data.
                 Typically, algorithm efficiency or performance is
                 correlated with execution speed. However, the uptime of
                 battery-powered mobile- and embedded systems strongly
                 depends on the energy consumption of the involved
                 components. This paper reports our results concerning
                 the energy consumption of different implementations of
                 sorting and join algorithms. We demonstrate that high
                 performance algorithms often require more energy than
                 slower ones. Furthermore, we show that dynamically
                 exchanging algorithms at runtime results in a better
                 throughput if energy is limited.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Suri:2010:DMF,
  author =       "P. K. Suri and Gurdev Singh",
  title =        "{DG-metrics} formulization for {DGML-based} software
                 design",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764832",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "DGML-based software-design representation uses
                 specially designed XML tags to represent the design
                 elements. This representation opens new possibilities
                 for verifying DGML-based software design against
                 existing design metrics and creation of new design
                 metrics. This paper discusses newly created design
                 metrics for the DGML-based design DG-Metrics. This
                 helps in identifying error prone modules in early
                 stages of software development process, tuning design
                 modules for better performance and in managing the
                 later phases of software development cycle with ease.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bastani:2010:LLD,
  author =       "Behzad Bastani",
  title =        "Low-level dynamic system formation with high-level
                 automation: extending {UML} in support of {UPnP}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--10",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764817",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "One way of defining system evolvability is in terms of
                 the low-level discrete-systems composition and dynamic
                 bindings. Evidently, direct low-level implementation
                 has its drawbacks and might be expensive for the
                 performance of system formation process and system
                 integrity. Engaging high-level design capabilities
                 based on a standard method in support of low-level
                 system formation can find a crucial role in this
                 setting. Universal Plug and Play (UPnP) is a well-known
                 standard facilitating dynamic integration of devices
                 into networks. Operating as a low-level programming
                 method, UPnP might be composed with high-level design
                 facilities. This paper presents a conceptual framework
                 to provide UPnP with native UML support through UML
                 extensions. An implemented UML to UPnP conversion model
                 offers the contribution of this research as an
                 automated solution for the high-level support.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2010:MRG,
  author =       "V. B. Singh and P. K. Kapur and Abhishek Tandon",
  title =        "Measuring reliability growth of software by
                 considering fault dependency, debugging time Lag
                 functions and irregular fluctuation",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--11",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764831",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The progress of software testing is influenced by
                 various uncertainty factors like effort expenditure,
                 skill of test personal, testing tool, defect density,
                 irregular state of open source project, and irregular
                 state of software fault-report phenomena on the bug
                 tracking system. Hence, there is an irregular
                 fluctuation in fault detection/removal rate during
                 testing phase. In software, the independence of
                 failures can hardly be assumed and dependency of faults
                 can also be considered as one of the factor for getting
                 irregular fluctuation. In Literature, various software
                 reliability growth models have been developed by
                 considering fault dependency with various debugging
                 time lag functions. But, none of the models have
                 incorporated irregular fluctuation in their fault
                 detection rate. Therefore, in this paper fault
                 dependency based software reliability growth models
                 have been developed by applying an It{\^o} type
                 Stochastic Differential Equations in order to
                 incorporate (i) the irregular fluctuation in the fault
                 detection process due to various uncertainty factor
                 during testing phase and (ii) irregular state of
                 software fault-report phenomena on the bug tracking
                 system. The proposed stochastic differential equation
                 based fault dependency models have been validated using
                 (i) open source software fault count data where
                 software fault-report phenomena on the bug tracking
                 system keep an irregular state and (ii) a fault
                 counting data with minor, major and critical faults.
                 The proposed models have been compared with the
                 existing fault dependency models. Various comparison
                 criteria results for goodness of fit have also been
                 presented in the paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mala:2010:QIO,
  author =       "D. Jeya Mala and V. Mohan",
  title =        "Quality improvement and optimization of test cases: a
                 hybrid genetic algorithm based approach",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "1--14",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764824",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software development organizations spend considerable
                 portion of their budget and time in testing related
                 activities. The effectiveness of the verification and
                 validation process depends upon the number of errors
                 found and rectified before releasing the software to
                 the customer side. This in turn depends upon the
                 quality of test cases generated. The solution is to
                 choose the most important and effective test cases and
                 removing the redundant and unnecessary ones; which in
                 turn leads to test case optimization. To achieve test
                 case optimization, this paper proposed a heuristics
                 guided population based search approach namely Hybrid
                 Genetic Algorithm (HGA) which combines the features of
                 Genetic Algorithm (GA) and Local Search (LS) techniques
                 to reduce the number of test cases by improving the
                 quality of test cases during the solution generation
                 process. Also, to evaluate the performance of the
                 proposed approach, a comparative study is conducted
                 with Genetic Algorithm and Bacteriologic Algorithm (BA)
                 and concluded that, the proposed HGA based approach
                 produces better results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Notkin:2010:ATF,
  author =       "David Notkin",
  title =        "{ACM TOSEM}: {FAQs} and Figures",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "5--6",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764811",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEb,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "6--7",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764812",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2010:PC,
  author =       "Mike Wing",
  title =        "Poetry in code",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "7--8",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764813",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ruparelia:2010:SDL,
  author =       "Nayan B. Ruparelia",
  title =        "Software development lifecycle models",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "8--13",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764814",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This history column article provides a tour of the
                 main software development life cycle (SDLC) models. (A
                 lifecycle covers all the stages of software from its
                 inception with requirements definition through to
                 fielding and maintenance.) System development lifecycle
                 models have drawn heavily on software and so the two
                 terms can be used interchangeably in terms of SDLC,
                 especially since software development in this respect
                 encompasses software systems development. Because the
                 merits of selecting and using an SDLC vary according to
                 the environment in which software is developed as well
                 as its application, I discuss three broad categories
                 for consideration when analyzing the relative merits of
                 SDLC models. I consider the waterfall model before the
                 other models because it has had a profound effect on
                 software development, and has additionally influenced
                 many SDLC models prevalent today. Thereafter, I
                 consider some of the mainstream models and finish with
                 a discussion of what the future could hold for SDLC
                 models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "14--23",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764815",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "24--32",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764816",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2010:RIS,
  author =       "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
                 Mishra",
  title =        "A report on the {``Information Systems in Distributed
                 Environments'' (ISDE) Workshop} at the {OTM 2009}
                 conferences",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "33--34",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764833",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from a one-day workshop on
                 ``Information Systems in Distributed Environments''
                 (ISDE), which was organized in conjunction with the OTM
                 Conferences 2009 in Vilamoura, Portugal, on November 3,
                 2009. The main focus of this workshop was to provide a
                 venue for the discussion of challenges related to the
                 development, operation, and maintenance of distributed
                 information systems, and their creation in the context
                 of global development projects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ben-Menachem:2010:PCV,
  author =       "Mordechai Ben-Menachem",
  title =        "Book Review: {{\booktitle{Parallel Coordinates: Visual
                 Multidimensional Geometry and its Applications}}, by
                 Alfred Inselberg, and published by Springer; 2009; ISBN
                 978-0-387-21507-5; pp. 580}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "39--39",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764834",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Safonov:2010:BRM,
  author =       "Vladimir O. Safonov",
  title =        "Book Review: {{\booktitle{Microsoft Windows
                 communication foundation: hands-on!}}, by Craig
                 McMurtry, Marc Mercuri and Nigel Watling, and published
                 by Sams Publishing, 2006 (paperback), ISBN
                 0-672-32877-1, 539 pp., \$39.99}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "3",
  pages =        "40--40",
  month =        may,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1764810.1764835",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:53 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tee:2010:MEM,
  author =       "Sim-Hui Tee",
  title =        "Method efficiency model based on value relevancy",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--3",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811239",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Class methods are modules in a class that perform a
                 specific behavior. The best software practice in
                 defining a method is to assign a single task for each
                 method. It is always expected that each method should
                 carry out a unique task in its defining class. A series
                 of similar tasks are usually defined by overloaded
                 methods. Such a single-task practice of method
                 definition is seldom imposed on individual software
                 developers who extensively develop user-defined
                 methods. In this research, a method efficiency model is
                 developed with the objective of guiding the software
                 developers in developing an individual cohesive method.
                 Increased cohesion of methods is desirable because it
                 contributes to the enhancement of software
                 maintenance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sagar:2010:SCBa,
  author =       "Shrddha Sagar and N. W. Nerurkar and Arun Sharma",
  title =        "A soft computing based approach to estimate
                 reusability of software components",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--4",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811235",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based development (CBD) is the process of
                 assembling existing software components in an
                 application such that they satisfy a predefined
                 functionality. Reduced development time, effort and
                 cost are few merits of CBD. As components are
                 black-box, therefore the use of conventional metrics in
                 CBD is difficult, because these metrics needs analysis
                 of source codes. To assess the reuse of component, it
                 is important to estimate reusability of these
                 components. Present paper discusses reusability in
                 relation to CBD and proposes a reusability metrics for
                 black box components. It identifies the factors
                 affecting reusability of the components and establishes
                 relationship in between these factors and reusability.
                 Fuzzy logic based approach is used to estimate
                 reusability and results found on real time applications
                 are quite satisfactory. The proposed approach can be
                 used by the application developers to select highly
                 reusable components in the systems which will
                 eventually help in maintaining the system in a better
                 way.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Macedo:2010:MDD,
  author =       "Hendrik Macedo",
  title =        "Model driven development approach to natural language
                 generation systems",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811233",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Natural Language Generation systems have traditionally
                 been built using ad-hoc software engineering practices
                 with no explicit development process and no standard
                 software architecture. This situation has drastically
                 limited professional use of NLG technology. New
                 approaches to NLG application development that
                 considers domain-independence, languages and standards
                 of modern software engineering, could enhance its
                 practical use. This work proposes an NLG reference
                 architecture that leverages the most advanced open
                 standards in software architecture, modeling languages
                 and processing tools. In particular, it is shown how
                 dialogue-based voice-driven NLG applications can be
                 built from the up-to-date Model-driven Architecture
                 (MDA) approach. The implementation of a voice-driven
                 movie recommendation system demonstrates the
                 feasibility of the proposal.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2010:TCP,
  author =       "Yogesh Singh and Arvinder Kaur and Bharti Suri",
  title =        "Test case prioritization using ant colony
                 optimization",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811238",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Regression testing is primarily a maintenance activity
                 that is performed frequently to ensure the validity of
                 the modified software. In such cases, due to time and
                 cost constraints, the entire test suite cannot be run.
                 Thus, it becomes essential to prioritize the tests in
                 order to cover maximum faults in minimum time. In this
                 paper, ant colony optimization is used, which is a new
                 way to solve time constraint prioritization problem.
                 This paper presents the regression test prioritization
                 technique to reorder test suites in time constraint
                 environment along with an algorithm that implements the
                 technique.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Majumdar:2010:MRM,
  author =       "Dipankar Majumdar and Sabnam Sengupta and Ananya
                 Kanjilal and Swagata Kundu and Swapan Bhattacharya",
  title =        "A mathematical reusability model for quantifying the
                 reduction in development effort",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811234",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Effort and Cost Estimation is a very
                 important activity that includes very uncertain
                 elements. In the context of object-oriented software,
                 traditional methods and metrics were extended to help
                 managing this activity. Use Case Points (UCP) is a very
                 well known metrics used for estimation of
                 object-oriented systems. Use case models are used in
                 Object-Oriented Analysis for capturing and describing
                 the Functional-Requirements of a system. Several
                 methods for estimating software development effort are
                 based on attributes of a use case model. In this paper,
                 we propose a mathematical model based on vectors to
                 measure reusability of software design in terms of
                 reusability of the use cases. Increasing reusability of
                 the use case model would lead to decrease in
                 development effort. Using the vector model, we propose
                 an approach to measure Complexity Reduction Factor
                 (CRF) which measures percentage decrease in effort and
                 hence in cost with increasing reusability. This
                 quantitative analysis of effort reduction with
                 increased reusability would enable us in designing
                 reusable and cost effective software much earlier in
                 software development life cycle, right at the
                 requirement engineering phase. We have used
                 requirements of an Insurance system as a case study to
                 illustrate our approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Radhakishan:2010:CDI,
  author =       "V. Radhakishan and Yaser Farook and S. Selvakumar",
  title =        "{CRAYSE}: design and implementation of efficient text
                 search algorithm in a web crawler",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811236",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "CRAYSE1 is a SEarch WHIle CRAwl application, intended
                 to perform fast searching of text in web pages. A Web
                 crawler is a computer program that browses the World
                 Wide Web in a methodical, automated manner. This
                 process is also called spidering. Search engines, use
                 spidering as a means of providing up-to-date data. Most
                 of the existing web-crawlers archive the contents of
                 the web starting from the input URL. Search engines
                 index the results of web-crawlers and then perform
                 searching when queried. As such, the searching is not
                 performed while crawling. Hence such software can not
                 be used for general use by web browsers. Also, the
                 existing search mechanism in web browsers, search only
                 on the current page and not recursively through all the
                 links present in that page. In order to overcome such
                 disadvantages, we propose in this paper to implement a
                 web crawler that searches for a pattern efficiently and
                 recursively through all the links including pdf links
                 while crawling. CRAYSE can be used as a general purpose
                 open source software by web browsers. It can also be
                 used for offine searching. Further, the applications
                 that require selective archival of web pages (based on
                 the presence of a key word), can deploy CRAYSE for
                 efficient search operations. This paper focusses on the
                 design and implementation of CRAYSE and its
                 demonstration through web applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Campos:2010:IAC,
  author =       "Juliana Pinheiro Campos and Jos{\'e} Luis Braga and
                 Ant{\^a}nio Maria Pereira de Resende and Carlos
                 Henrique Os{\'o}rio Silva",
  title =        "Identification of aspect candidates by inspecting use
                 cases descriptions",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--9",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811231",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The identification of aspect candidates in the early
                 phases of software development process allows improving
                 the modularization of the requirements, to detect
                 conflicts early and maintain the separation of concerns
                 in the later phases of the process. However, the
                 identification of aspects in initial phases is a
                 non-trivial task, which can be costly and too
                 time-consuming. This paper presents a technique to
                 assist in the identification of aspect candidates in
                 the requirements, through inspection. Two case studies
                 were carried out to evaluate the proposed technique.
                 The results obtained from the case studies let us
                 conclude that the proposed technique facilitates the
                 identification of aspect candidates.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ratneshwer:2010:DAS,
  author =       "Ratneshwer and A. K. Tripathi",
  title =        "Dependence analysis of software component",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--9",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811237",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Dependence analysis among software components is still
                 a challenging issue for practitioners and researchers.
                 We propose the representation of dependence among
                 software components as a Component Interaction Graph
                 (CIG). We make use of a well known data structure
                 consisting of ``two linear arrays'' to represent the
                 CIG. Based on this representation, we derived some
                 dependency relationships. We evaluate the relationships
                 by Weyukers' properties. We also have demonstrated with
                 a possible CIG for a CBS to show the quantitative
                 characteristics of the derived relationships. This work
                 starts a discussion and calls for more extensive
                 research oriented studies by professionals and
                 academicians for perfection of the approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lee:2010:OIP,
  author =       "Tony Tony Lee",
  title =        "Optimizing {IT} process management",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "1--10",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811232",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, the author discusses some key concepts
                 in IT process management. The paper also includes the
                 recommendations in these following aspects: team
                 organization, physical environment, project selection,
                 politics, organizational communication, development
                 environment, staff development, and organizational
                 culture.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEc,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "3--4",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811227",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2010:BDM,
  author =       "Mike Wing",
  title =        "{Burt} doesn't manage",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "4--6",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811228",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2010:SEEb,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "6--7",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811229",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "8--16",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811244",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "17--23",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811245",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mandrioli:2010:SFS,
  author =       "Dino Mandrioli and Stephen Fickas and Carlo A. Furia
                 and Mehdi Jazayeri and Matteo Rossi and Michal Young",
  title =        "{SCORE}: the first student contest on software
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "24--30",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811240",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Student Contest on Software Engineering (SCORE),
                 organized for the first time in conjunction with the
                 International Conference on Software Engineering (ICSE)
                 2009, attracted 50 student teams from around the world,
                 produced an impressive and varied set of projects, and
                 earned appreciative comments from participants and even
                 from teams who chose not to submit their results to the
                 competition. It was a remarkable success, but not
                 without problems and setbacks. In this article we
                 explain the objectives, constraints, and design
                 philosophy of SCORE, particularly as they distinguish
                 it from the tradition of computer science contests
                 focused more narrowly on programming. We also recount
                 key approaches taken to design and management of this
                 novel kind of contest, the difficulties we met (some
                 still outstanding), and the lessons learned.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:BRC,
  author =       "Larry Bernstein",
  title =        "Book Review: {{\booktitle{Characterizing people as
                 non-linear, first-order components in software
                 development}}, by Alistair A. R. Cockburn and published
                 in Humans and Technology, HaT Technical Report 1999.03,
                 Oct 21, 1999}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "33--34",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811241",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ben-Menachem:2010:BRM,
  author =       "Mordechai Ben-Menachem",
  title =        "Book Review: {{\booktitle{Managing and Leading
                 Software Projects}} by Richard Fairley and published by
                 John Wiley \& Sons, Inc. with IEEE Computer Society
                 2009, (hardback), ISBN 978-0470-29455-0, pp. 510}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "34--34",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811242",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ben-Menachem:2010:BRR,
  author =       "Mordechai Ben-Menachem",
  title =        "Book Review: {{\booktitle{Reactive Systems: Modelling,
                 Specification and Verification}} by L. Aceto, et al.;
                 and published by Cambridge University Press;
                 distributed by Cambridge University Press; 2007,
                 (hardback), ISBN 978-0-521-87546-2, pp. 300}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "34--35",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811243",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rogers:2010:BRG,
  author =       "David S. Rogers",
  title =        "Book Review: {{\booktitle{Geometric Spanner Networks}}
                 by Giri Narasimhan and Michael Smid, and published by
                 Cambridge University Press, 2007, Hardback ISBN
                 978-0-521-81513-0, 500 pp., \$105}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "4",
  pages =        "35--35",
  month =        jul,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1811226.1811246",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:55 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fazal-e-Amin:2010:PES,
  author =       "Fazal-e-Amin and Ahmad Kamil Mahmood and Alan Oxley",
  title =        "Proposal for evaluation of software reusability
                 assessment approach employing a mixed method",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838703",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software engineering, as an engineering discipline, is
                 still quite young as compared to other engineering
                 disciplines. The software engineering research
                 community has made enormous contributions in past
                 decades to lay down its foundations. However, the
                 research methodologies in software engineering are
                 still not mature. One of the reasons in this regard is
                 the inherent complexity of this field. In this paper,
                 we focus on one aspect of this field --- the evaluation
                 of reusability assessment approaches. We begin by
                 reviewing existing ways of comparing reusability
                 assessment approaches. Following this we propose a
                 different approach. This includes a mixture of both
                 subjective and objective evaluation of a reusability
                 assessment approach. This is novel in that we feel that
                 subjective evaluation has been neglected by other
                 approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Banerjee:2010:RSS,
  author =       "C. Banerjee and S. K. Pandey",
  title =        "Research on software security awareness: problems and
                 prospects",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838701",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "People attack software deliberately to steal highly
                 sensitive as well as personal information with the sole
                 intention of carrying out well-funded, destructive and
                 unethical goals that could harm individuals, nations or
                 the whole world. Available technological controls could
                 be implemented to tighten access and minimize
                 persistent threats but the complete solution of secure
                 software could only be provided by changing the
                 behavior of the people involved. This can be achieved
                 through effective security awareness techniques
                 implemented by individuals because they are, in most
                 cases, the first target for gaining access into the
                 system. This paper highlights the utility of security
                 awareness with the help of recent published work for
                 building more secure software. In addition, areas that
                 need further investigations are identified in the
                 paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nerurkar:2010:ARA,
  author =       "N. W. Nerurkar and Avadhesh Kumar and Pallavi
                 Shrivastava",
  title =        "Assessment of reusability in aspect-oriented systems
                 using fuzzy logic",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838706",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Reusability of the software systems is becoming a very
                 important factor due to rapid software development and
                 increasing complexity. Software reusability improves
                 the quality of software product by reducing development
                 time, effort and cost. Researchers have explored many
                 methodologies in order to assess the reusability of
                 Object-Oriented (OO) software systems but the
                 assessment of the reusability of Aspect-Oriented (AO)
                 software systems is underexplored. Aspect-Oriented
                 Software Development (AOSD) is an emerging paradigm
                 that aims to modularize the crosscutting concerns in an
                 application, which cannot be modularized using
                 traditional procedure-oriented and object-oriented
                 approaches. By applying an aspect-oriented approach,
                 such concerns can be isolated resulting in the increase
                 maintainability and reusability of the system. In this
                 paper, we propose a reusability model for
                 aspect-oriented systems and assess it using fuzzy logic
                 technique.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sagar:2010:SCBb,
  author =       "Shrddha Sagar and N. W. Nerurkar and Arun Sharma",
  title =        "A soft computing based approach to estimate
                 reusability of software components",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838707",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based development (CBD) is the process of
                 assembling existing software components in an
                 application such that they satisfy a predefined
                 functionality. Reduced development time, effort and
                 cost are few merits of CBD. As components are
                 black-box, therefore the use of conventional metrics in
                 CBD is difficult, because these metrics needs analysis
                 of source codes. To assess the reuse of component, it
                 is important to estimate reusability of these
                 components. Present paper discusses reusability in
                 relation to CBD and proposes a reusability metrics for
                 black box components. It identifies the factors
                 affecting reusability of the components and establishes
                 relationship in between these factors and reusability.
                 Fuzzy logic based approach is used to estimate
                 reusability and results found on real time applications
                 are quite satisfactory. The proposed approach can be
                 used by the application developers to select highly
                 reusable components in the systems which will
                 eventually help in maintaining the system in a better
                 way.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2010:AFF,
  author =       "Yogesh Singh and Pradeep Kumar",
  title =        "Application of feed-forward neural networks for
                 software reliability prediction",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838709",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Many analytical models have been proposed for modeling
                 software reliability growth trends with different
                 predictive capabilities at different phases of testing
                 yet there still is a need to develop a model that can
                 be applied for accurate predictions in a realistic
                 environment. In this paper we describe a software
                 reliability prediction model using feed-forward neural
                 network for better reliability prediction through
                 back-propagation algorithm and discuss the issues of
                 network architecture and data representation methods.
                 We demonstrate a comparative analysis between the
                 proposed approach and three well known software
                 reliability growth prediction models using seven
                 different failure datasets collected from standard
                 software projects to test the validity of the presented
                 method. A numerical example also has been cited to
                 illustrate the results that revealed significant
                 improvement by using Artificial Neural Network (ANN)
                 over conventional statistical models based on NHPP.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gill:2010:NCM,
  author =       "Nasib S. Gill and Sunil Sikka",
  title =        "New complexity model for classes in object oriented
                 system",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838704",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Minimizing software complexity is the foremost
                 objective of each software development paradigm because
                 it affects all other attributes of software such as
                 maintainability, reliability, testability, reusability
                 etc. Measuring software complexity is always essential
                 for predicting fault proneness, computing development
                 efforts and evaluating maintainability of software.
                 This paper proposes a complexity model for classes in
                 object oriented systems. The model computes Class
                 Complexity (CC) as a sum of Method Complexity (MC) and
                 MC is further computed as a sum of Control Flow
                 Complexity (CFC), Total Method Call Complexity (TMCC)
                 and Total Data Call Complexity (TDCC). CFC is computed
                 using McCabe's cyclomatic complexity. TMCC and TDCC are
                 computed with adherence to the principle that ``The
                 higher the number of classes involved in method/data
                 calls and polymorphic method calls, makes the object
                 oriented software difficult to understand and
                 maintain''. The proposed model is also compared with
                 four Chidamber's and Kemerer's metrics-Weighted Methods
                 per Class (WMC), Response For a Class (RFC), Depth of
                 Inheritance Tree (DIT) and Coupling Between Objects
                 (CBO).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Long:2010:TDSa,
  author =       "Brad Long",
  title =        "Towards the design of a set-based {Java} collections
                 framework",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838705",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Java Collections Framework (JCF) was introduced as
                 standard in JDK 1.2. Since then several significant
                 enhancements have been made including the introduction
                 of generics and typed collections. One striking design
                 choice of the Java language designers was the exclusion
                 of map from the collections hierarchy. This paper looks
                 at how maps could be incorporated into the Java
                 collections hierarchy by describing early work on YACL
                 (Yet Another Collections Library). The intention of
                 YACL is to provide a suite of set-based collections
                 classes and operations whilst continuing to be
                 compatible with the JCF.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2010:EES,
  author =       "Ashish Sharma and Dharmender Singh Kushwaha",
  title =        "Early estimation of software complexity using
                 requirement engineering document",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838708",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There has been a continuous effort to estimate
                 software complexity but very little established methods
                 exist that can estimate the complexity of the software
                 before it is written. Since a high quality Software
                 Requirement Specification (SRS) is a pre requisite for
                 high quality software, this work attempts to
                 empirically demonstrate that the complexity of the code
                 can be determined based on its IEEE software
                 requirement specification document (IEEE 830-1998).
                 Existing complexity measures established are based on
                 the code and the cognitive metrics value of the
                 software. This may require recoding leading to loss of
                 time and cost. Considering the shortcoming of
                 code-based approaches, our proposed approach is able to
                 compute the complexity of yet-to-be-written software
                 immediately after freezing the requirement in the
                 Software development Lifecycle (SDLC) process. The
                 proposed complexity measure compares well with
                 established complexity measures like Halstead, Mc Cabe,
                 KLCID, CFS and CICM. Results obtained show that the
                 complexity values are comparable with other established
                 measures. The robustness of our complexity measure is
                 established by evaluating our measure against Weyuker
                 properties.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yazbek:2010:CQA,
  author =       "Hashem Yazbek",
  title =        "A concept of quality assurance for metrics in
                 {CASE-tools}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838711",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The quality of software has become more important to
                 software companies in the past years. Software
                 measurement is one of many approaches that is used to
                 check the quality of software [18]. This may involve
                 measuring some attributes of a software product or a
                 software process and comparing these measurements to
                 each other or to some desirable level. A software
                 metric is ``any type of measurement that relates to a
                 software system, process or related documentation''
                 [7]. Software metrics can help to improve the quality
                 of the produced software. However, metrics and metrics
                 tools are still not used in most software companies ---
                 for example in the 3 companies where we cooperated in
                 last 5 years. One reason is that there is lack of
                 knowledge about metrics and hence software metrics are
                 still unknown or difficult to use for some developers,
                 and software measurement is still time-consuming for
                 managers. Another reason is that, good metrics tools
                 are still expensive for small and middle companies. In
                 our opinion the effectiveness of metrics can be
                 improved by simple organizational expedients. In this
                 paper we present new/adapted requirements on metrics in
                 CASE tools to define flexible product quality models.
                 For this quality model we tried to use some standard
                 techniques, e.g. metrics suite, metrics visualization
                 or metrics filtering to show how metrics in CASE tools
                 can be defined and how it can benefit different people
                 who are involved in a software deployment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chatterjee:2010:PAA,
  author =       "Ram Chatterjee and Kalpana Johari",
  title =        "A prolific approach for automated generation of test
                 cases from informal requirements",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--11",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838702",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Specification-based testing begins with the
                 documentation of customers' requirements. This informal
                 depiction of requirements needs to undergo
                 formalization for effective test case generation to
                 corroborate specification-based testing so as to
                 catapult validation testing. In this paper, we discuss
                 a credible approach for test suite generation by
                 formalizing the informal requirements that further
                 proves prolific in pioneering effective test case
                 generation. The endeavor is directed towards testing
                 software in the absence of source code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Upadhyay:2010:DMI,
  author =       "Nitin Upadhyay and Bharat M. Deshapande and Vishnu P.
                 Agrawal",
  title =        "Developing maintainability index of a software
                 component: a digraph and matrix approach",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "1--11",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838710",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper describes a methodology based on a digraph
                 and matrix approach for developing the maintainability
                 (characteristic) index of a software component.
                 Sub-characteristics and associated attributes of a
                 component that characterize maintainability are
                 identified and modelled in terms of maintainability
                 digraph. The nodes in the digraph represent
                 maintainability sub-characteristics and edges represent
                 interactive complexity among the subcharacteristics. A
                 detailed procedure for the maintainability analysis of
                 component is suggested through a maintainability
                 function. The maintainability index (Im) is obtained
                 from VPF --- m (i.e. permanent of the matrix) by
                 substituting the numerical values of the
                 sub-characteristics and their interactions. The concept
                 of hypothetical best index and hypothetical worst index
                 is also proposed, which will help system developers to
                 identify relative comparison of candidates from
                 hypothetical best and hypothetical worst indices and
                 designers and developers to improve the component
                 maintainability characteristic (looking upon critical
                 attributed factors) by performing sensitivity analysis.
                 A higher value of the VPF --- m implies better
                 maintainability of a component. An example is also
                 presented to demonstrate and validate the effectiveness
                 of the methodology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEd,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "4--5",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838688",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Berliner:2010:EDC,
  author =       "Brian Berliner and Nayan B. Ruparelia",
  title =        "Early days of {CVS}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "5--6",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838689",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The topic of this article is to discuss the early days
                 of CVS, from the late 1980s to the mid 1990s. First, a
                 timeline depicting key milestones for those early days
                 is discussed and this is followed by an interview with
                 Brian Berliner, the creator of CVS in C. This article
                 concludes with a reading list on CVS for further
                 study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "8--17",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838690",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "18--24",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838691",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chan:2010:STR,
  author =       "Wing Kwong Chan and Christof J. Budnik and Gregory M.
                 Kapfhammer",
  title =        "Software testing research in practice: report on the
                 {5th International Workshop on the Automation of
                 Software Test}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "25--26",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838692",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 5th Workshop on the Automation of Software Test
                 co-located with ICSE 2010 provides a publication forum
                 that bridges the gap between the theory and practice of
                 automated testing. The workshop featured a twoday high
                 quality programs with a multi-session charette on
                 integration testing. Researchers shared with us their
                 insights on software testing through 15 regular papers
                 and 6 case-study papers were presented in six sessions
                 at the workshop. This report summarizes the
                 organization of the workshop as well as the sessions
                 and papers presented, the results of the charette
                 session, attendee feedback, and lessons learned.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dittrich:2010:CHA,
  author =       "Yvonne Dittrich and Helen Sharp and Heike Winshiers
                 Theophilus and Cleidson {De Souza} and Mikko Korpela
                 and Janice Singer",
  title =        "Cooperative and human aspects of software engineering:
                 {CHASE} 2010",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "27--29",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838693",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software is created by people --- software engineers
                 in cooperation with domain experts, users and other
                 stakeholders--in varied environments, under various
                 conditions. Thus understanding cooperative and human
                 aspects of software development is crucial to
                 comprehend how and which methods and tools are
                 required, to improve the creation and maintenance of
                 software. The 3rd workshop on Cooperative and Human
                 Aspects of Software Engineering held at the
                 International Conference on Software Engineering
                 continued the tradition from earlier workshops and
                 provided a lively forum to discuss current developments
                 and high quality research in the field. Further
                 dissemination of research results will lead to an
                 improvement of software development and deployment
                 across the globe.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lewis:2010:RIW,
  author =       "Grace Lewis and Dennis Smith and Andreas Metzger and
                 Andrea Zisman and Marco Pistore",
  title =        "Report of the {2nd International Workshop on
                 Principles of Engineering Service-Oriented Systems
                 (PESOS 2010)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "30--33",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838694",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Second International Workshop on Principles of
                 Engineering Service-Oriented Systems (PESOS 2010) was
                 held at the International Conference on Software
                 Engineering, ICSE 2010 on May 1 and 2, 2010. PESOS 2010
                 provided a forum for presenting and discussing current
                 work and research topics related to service-oriented
                 systems. The workshop had keynotes on SOA testing
                 challenges and adaptive service-oriented systems. There
                 were four paper sessions on the topics of service
                 development, testing and evolution of service-oriented
                 systems, service adaptation, and quality of service
                 (QoS) and Service-Level Agreements (SLAs) in
                 service-oriented environments. General discussions
                 focused on these overall themes. These discussions
                 resulted in the identification of research challenges
                 for the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Geihs:2010:RAI,
  author =       "Kurt Geihs and Stefan Gruner and Kay R{\"o}mer",
  title =        "Report about {1st ICSE Workshop on Software
                 Engineering for Sensor Network Applications (SESENA
                 2010)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "34--37",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838695",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "SESENA 2010, the First International Workshop on
                 Software Engineering for Sensor Network Applications,
                 took place under the umbrella of ICSE 2010, the 32nd
                 ACM/IEEE International Conference on Software
                 Engineering, in Cape Town, South Africa, in May 2010.
                 This post-workshop report summarizes the aims and
                 motivation as well as the technical contributions. See
                 also our workshop website at http://www.sesena.info/.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lago:2010:OSA,
  author =       "Patricia Lago and Paris Avgeriou and Philippe
                 Kruchten",
  title =        "Organizing a software architecture body of knowledge:
                 summary of the {5th SHARK} workshop, at {ICSE 2010}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "37--40",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838696",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Architectural Knowledge (AK) is defined as the
                 integrated representation of the software architecture
                 of a software-intensive system or family of systems
                 along with architectural decisions and their rationale,
                 external influence and the development environment. A
                 fifth workshop on Sharing and Reusing Architectural
                 Knowledge (SHARK) was held jointly with ICSE 2010 in
                 Cape Town, South Africa. The theme of this workshop was
                 the organization of a body of knowledge for software
                 architecture knowledge management. It featured thirteen
                 research position statements and three working groups
                 that discussed on focused topics. This report
                 summarizes the results of the discussions we held, and
                 suggests some topics for future research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hall:2010:IIW,
  author =       "Jon G. Hall and Lucia Rapanotti and Liping Zhao and
                 James Naish",
  title =        "{2010 ICSE International Workshop on Advances and
                 Applications of Problem Orientation (WAAPO-2010)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "40--41",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838697",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software problems originate in real world problems. A
                 software solution must address its real world problem
                 in a satisfactory way. A software engineer must
                 therefore understand the real world problem that their
                 software intends to address. To be able to do this, the
                 software engineer must understand the problem context
                 and how it is to be affected by the proposed software,
                 expressed as the requirements. Without this knowledge
                 the engineer can only hope to chance upon the right
                 solution for the problem. Application of
                 problem-oriented approaches may well be a way of
                 meeting this challenge. This article reports on
                 IWAAPO-2010, an ICSE workshop concerned with recent
                 developments in problem-oriented approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Knutson:2010:RIW,
  author =       "Charles D. Knutson and Jonathan L. Krein and Lutz
                 Prechelt and Natalia Juristo",
  title =        "Report from the {1st International Workshop on
                 Replication in Empirical Software Engineering Research
                 (RESER 2010)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "42--44",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838698",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The RESER 2010 Workshop, held on May 4, 2010 in Cape
                 Town, South Africa was co-located with the 32nd
                 International Conference on Software Engineering (ICSE
                 2010). The workshop provided a venue in which empirical
                 Software Engineering researchers could present and
                 discuss the theoretical foundations and methods of
                 replication, as well as the results of specific
                 replicated studies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Treude:2010:WRW,
  author =       "Christoph Treude and Margaret-Anne Storey and Kate
                 Ehrlich and Arie van Deursen",
  title =        "Workshop report from {Web2SE}: {First Workshop on Web
                 2.0 for Software Engineering}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "45--50",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838699",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web 2.0 technologies such as wikis, blogs, tags and
                 feeds have been adopted and adapted by software
                 engineers. With Web2SE, we provide a venue for
                 pertinent work by highlighting current state-of-the-art
                 research, by identifying research areas, and by
                 discussing implications of Web 2.0 on software
                 engineering. This paper reports on the paper
                 presentations and the discussions among participants at
                 Web2SE 2010 as well as on future directions of the
                 Web2SE community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Canfora:2010:IWE,
  author =       "Gerardo Canfora and Giulio Concas and Michele Marchesi
                 and Ewan Tempero and Hongyu Zhang",
  title =        "{2010 ICSE Workshop on Emerging Trends in Software
                 Metrics}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "51--53",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1838700",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper reports on the 2010 ICSE Workshop on
                 Emerging Trends in Software Metrics (WETSoM 2010) held
                 on Tuesday 4 May 2010 in Cape Town, South Africa, as
                 part of the ICSE workshop series. The goal of this
                 workshop was to bring together researchers and
                 practitioners to discuss the progress of software
                 metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dekhane:2010:IAT,
  author =       "Sonal Dekhane",
  title =        "Install anywhere tutorial and reference guide by Zero
                 G Team",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "57--57",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862451",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Werden:2010:BRT,
  author =       "David A. Werden",
  title =        "Book Review: {{\booktitle{TCP\slash IP architecture,
                 design, and implementation in Linux}} by Sameer Seth
                 and M. Ajaykumar Venkatesulu}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "57--57",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862452",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2010:BRD,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{The design of design: essays
                 of a computer scientist}} by Frederick R. Brooks,
                 Jr.}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "58--58",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862455",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2010:BRM,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{Making it big in software:
                 get the job, work the org, become great}} by Sam
                 Lightstone}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "58--58",
  month =        sep,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862453",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:57 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2010:BRR,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{Remarkable Engineers: From
                 Riquet to Shannon}} by Ioan James}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "5",
  pages =        "58--58",
  month =        oct,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1838687.1862454",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Fri Jul 21 10:34:15 2017",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/s/shannon-claude-elwood.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "http://dl.acm.org/citation.cfm?doid=1838687.1862454",
  acknowledgement = ack-nhfb,
  acmid =        "1862454",
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
  pagecount =    "1",
  subject-dates = "Claude Elwood Shannon (1916--2001)",
}

@Article{Dubey:2010:AUM,
  author =       "Sanjay Kumar Dubey and Ajay Rana",
  title =        "Assessment of usability metrics for object-oriented
                 software system",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874400",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The demand for efficient software is increasing day by
                 day. For this reason software developers need
                 appropriate metrics for the development of software
                 applications. Usability is one of the most important
                 fields in software engineering and a highly focused
                 quality factor. It is a key factor in the development
                 of successful software applications. Object-oriented
                 design techniques have become one of the most powerful
                 mechanisms to develop efficient software system.
                 Object-oriented software can play important role in
                 usability for software applications. It can not only
                 help in reducing the cost but also in developing highly
                 usable software systems. This paper focuses some
                 important issues and analyzes the relationship between
                 usability and object-oriented metrics",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2010:PMS,
  author =       "Amit Mishra and Sanjay Misra",
  title =        "People management in software industry: the key to
                 success",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874402",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Performance differences have been proved among
                 software professionals even in the conditions of
                 identical task. Companies and organizations are aware
                 of the fact that talent has great effect on their
                 success; still most of the software development
                 organizations are focusing so much on tools and
                 technology and little on people. In this paper, we are
                 trying to uncover the relation between the people
                 management-human resource management and software
                 engineering.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tee:2010:MCC,
  author =       "Sim-Hui Tee",
  title =        "Measuring class cohesion using mutant methods",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874409",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Class cohesion is a measure of software quality and
                 maintainability. A highly cohesive class implies that
                 its modules are functionally coherent and integrated.
                 To date, there are varying cohesion metrics that
                 measure class cohesion from different perspectives.
                 These metrics use different computation in the
                 evaluation of class cohesion. Novice software
                 developers have no access to the class cohesion of a
                 particular class if they are not familiar with these
                 metrics. In this paper, we provide a quick technique to
                 measure class cohesion without using complicated
                 calculation. We delimit our technique to measure class
                 cohesion in term of attribute sharing and method
                 invocation. We contend that the observation of the
                 impact of mutant methods provides a quick judgement on
                 the cohesion status. The proposed approach enables
                 novice software developers to quickly evaluate the
                 cohesion status of a class",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2010:ATD,
  author =       "Anup Kumar Bandyopadhyay and Nibedita Lenka",
  title =        "Application of {TLRO} to dining philosophers problem",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874397",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Recently modeling of a state transition rule has been
                 proposed using a temporal logic based on observation
                 (TLRO). The advantage of such representation lies in
                 the fact that the model is derived from the related
                 cause and effect relation and is expressed as an
                 implication. This structure makes manipulation easy.
                 Unlike weakest precondition calculus that can only
                 reason backward in time, present model can include both
                 backward and forward temporal reasoning. This is
                 therefore more expressive. In this paper TLRO based
                 modeling is used to derive three different deadlock
                 free solutions for Dining Philosophers problem. All
                 this solutions are proved using this model",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2010:SOM,
  author =       "Anup Kumar Bandyopadhyay",
  title =        "Spatial ordering of messages in a cyclic
                 architecture",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874398",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Spatial ordering of messages can be used fruitfully
                 for the design of distributed systems. For modeling
                 such systems we require a logical framework that
                 includes both spatial and temporal ordering predicates.
                 In order to illustrate its applicability a distributed
                 K mutual exclusion algorithm is proposed that requires
                 a unidirectional cyclic topology for its
                 implementation. The algorithm uses only point to point
                 communication rather than broadcast. It is shown that
                 the topological ordering of messages is important for
                 its correct operation",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhat:2010:CVB,
  author =       "Shubha Bhat and Vindhya Malagi and Krishnan Rangarajan
                 and Ramesh Babu",
  title =        "Computer vision based guidance in {UAVs}: software
                 engineering challenges",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874399",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper we discuss the key functional and
                 quality attribute requirements and the associated
                 design challenges in engineering a computer vision
                 guided UAV (Unmanned Aerial Vehicle) system. The
                 non-functional requirements of the UAV system as a
                 whole are identified and mapped to the computer vision
                 subsystem which aids in the navigation process.
                 Expectations on availability, reliability, performance,
                 security and evolution of the vision subsystemware
                 discussed and the related software design challenges
                 elaborated",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nair:2010:DPM,
  author =       "T. R. Gopalakrishnan Nair and Sri Aravindh and R.
                 Selvarani",
  title =        "Design property metrics to maintainability estimation:
                 a virtual method using functional relationship
                 mapping",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874404",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software maintenance is a vital component that every
                 company has to face when their product is delivered to
                 the stakeholders. This task may span for more than ten
                 years at the customer site. The cost of maintenance or
                 keeping software operational consumes 60-70\% of its
                 entire life cycle cost. Defining maintainability at the
                 design stage of the software development life cycle
                 (SDLC) will result in a cost effective product. In this
                 paper, we proposed a design time relationship model
                 between design properties and the maintainability of
                 the software. This analysis is performed based on the
                 influence of object oriented design metrics on software
                 maintainability",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Long:2010:TDSb,
  author =       "Brad Long",
  title =        "Towards the design of a set-based {Java} collections
                 framework",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874401",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Java Collections Framework (JCF) was introduced as
                 standard in JDK 1.2. Since then several significant
                 enhancements have been made including the introduction
                 of generics and typed collections. One striking design
                 choice of the Java language designers was the exclusion
                 of map from the collections hierarchy. This paper looks
                 at how maps could be incorporated into the Java
                 collections hierarchy by describing early work on YACL
                 (Yet Another Collections Library). The intention of
                 YACL is to provide a suite of set-based collections
                 classes and operations whilst continuing to be
                 compatible with the JCF",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Panigrahi:2010:MBR,
  author =       "Chhabi Rani Panigrahi and Rajib Mall",
  title =        "Model-based regression test case prioritization",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874405",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We propose a model-based regression test case
                 prioritization technique for object-oriented programs.
                 Our technique involves constructing a graph model of
                 the source code to represent control and data
                 dependences as well as static object relations such as
                 inheritance, aggregation and association. We construct
                 a forward slice of the model to identify all the model
                 elements that may be affected by a change.
                 Subsequently, the model elements are marked with the
                 specific test case(s) testing it. We construct backward
                 slice with respect to each model element executed by a
                 test case to determine all elements indirectly tested
                 by the test case. Then all the affected model elements
                 and the elements being tested are used to prioritize
                 test cases. Empirical studies carried out by us show
                 that our technique increases the detection of number of
                 faults on an average of 30 percent as compared to
                 traditional approaches in detecting regression errors",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Suri:2010:AGD,
  author =       "P. K. Suri and Gurdev Singh",
  title =        "Automatic generation of design search keywords from
                 software specifications to improve design search
                 results",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874408",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Design Notation Storage and Inference
                 Mechanism (DNSIM) is capable of storing software
                 designs by using Design Markup Language (DGML) tags and
                 reusing existing design elements to produce new
                 software designs. This mechanism performs search
                 operations on stored designs. The accuracy of the
                 search results depends upon the correctness of the
                 keywords provided to the search process. The challenge
                 is to input the Software Requirement Specification
                 (SRS) document as a search input to DNSIM and to
                 produce the best possible design from existing design
                 elements. This paper proposes a method to produce
                 requirement specification keywords from the formal
                 representation of the SRS. The DNSIM system uses the
                 keywords produced by our method and shows significant
                 improvements and accuracy in the design search
                 results",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mohanta:2010:AEP,
  author =       "Sirsendu Mohanta and Gopika Vinod and A. K. Ghosh and
                 Rajib Mall",
  title =        "An approach for early prediction of software
                 reliability",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874403",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the early stages of development, failure
                 information is not available to quantitatively measure
                 reliability of a software product. In this context, we
                 propose an approach to predict software reliability
                 early in the product development stages from design
                 metrics. First we predict reliabilities of the
                 components of a system. For this, we categorize the
                 different kinds of faults that can occur in a component
                 during its development and identify the design metrics
                 that correlate to these faults. We construct a Bayesian
                 Belief Network (BBN) model to predict reliabilities of
                 the components using the identified design metrics.
                 Based on predicted reliabilities and usage frequencies
                 of the components of a system, we determine the
                 reliability of the system. The applicability of our
                 proposed model is illustrated through a case study.
                 Results obtained from our case study indicate the
                 effectiveness of our approach",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sengupta:2010:EME,
  author =       "Abhik Sengupta and Vivek Nandey and Sabnam Sengupta",
  title =        "{ETDSOA}: a model for event and time driven service
                 oriented architecture",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874407",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture (SOA) is the paradigm
                 for IT architecture definition that has been recognized
                 by the industry and analyst groups as a new enterprise
                 architectural technique with the potential to transform
                 businesses into agile enterprises. This paper discusses
                 the emergent variant of Event and Time driven SOA
                 (ETDSOA) and discusses application areas. It proposes a
                 technique for conversion of a traditional and classical
                 SOA viewpoint into one of ETDSOA. The paper provides a
                 model for depicting a representative process flow
                 following the ETDSOA paradigm, using traditional
                 modeling constructs. This can be used gainfully to
                 design solutions following the ETDSOA paradigm with any
                 commonly available standard SOA framework. The inputs
                 can be used as well, for initially implementing the
                 framework with the benefit of improving ETDSOA solution
                 development",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2010:LSM,
  author =       "Robert Schaefer",
  title =        "The limits of systems-making organizations",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "1--20",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874406",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper provides an ontology of organizational
                 structures intended for software-intensive
                 systems-making. An archetype is presented and scaled in
                 stages to support larger, more complex projects.
                 Artifacts at each stage are identified and analyzed.
                 The first artifact analyzed is the engine of scaling,
                 specialization. Organizations that have been scaled for
                 the purpose of developing large complex systems will be
                 shown to themselves become large and complex, in part
                 for matching the problem to be solved but also for
                 self-management. Specialization first occurs with the
                 separation of the role of designer into designers and
                 managers whereby the designer's role and activities can
                 be abstracted into a limited set of objects to be
                 manipulated by managers. Design is transformed into a
                 model of design. The problem (or challenge) for
                 managers is of normalization of dysfunction, whereby
                 the model becomes both mistaken for and more valued
                 than the object modeled. The result of having
                 transformed essential roles and activities into objects
                 in a hierarchical organization will be shown to (one)
                 increase the positive effects on managing large-scale
                 organizations, (two) increase the negative effects on
                 design outcomes and (three) prevent the logical
                 association of item one with item two. Disassociations
                 incurred through specialization and normalization of
                 dysfunction will be shown to be counter-productive in
                 that they create and sustain high process but low sense
                 organizations. Conclusions will be presented on the
                 nature of large organizations, on the nature of their
                 risk evaluations, and on the inevitability of
                 dysfunctions and pathologies to lead not only to
                 project failure but also to immediately forget the
                 same",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2010:PSEe,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "5--5",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874392",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2010:M,
  author =       "Mike Wing",
  title =        "The making of",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "5--7",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874393",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2010:SEEc,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software Engineering Education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "7--8",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874394",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2010:SNSe,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "9--18",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874395",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2010:RPe,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "19--26",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.1874396",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tribbey:2010:BRN,
  author =       "Will Tribbey",
  title =        "Book Review: {{\booktitle{Numerical Recipes: The Art
                 of Scientific Computing}} (3rd Edition) by William H.
                 Press, Saul A. Teukolsky, William T. Vetterling, and
                 Brian P. Flannery, and published by Cambridge
                 University Press, 2007, hardback, ISBN
                 978-0-521-88068-8, 1235 pp.}",
  journal =      j-SIGSOFT,
  volume =       "35",
  number =       "6",
  pages =        "30--31",
  month =        nov,
  year =         "2010",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1874391.187410",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:15:58 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Miyachi:2011:ASA,
  author =       "Christine Miyachi",
  title =        "Agile software architecture",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--3",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943388",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "When the Agile software development became popular in
                 software development communities, some engineers
                 thought that software architecture would die out. But
                 no matter what, a software project will have an
                 architecture, whether documented intentionally or
                 created on the fly. Software Architecture should enable
                 Agile development methods by itself being Agile. But
                 how? In this paper, I will discuss my experience of
                 doing architecture in an Agile way and in a non-Agile
                 way. Have an architecture that follows the Agile
                 principles is key to obtaining success in an Agile
                 development environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rech:2011:AEE,
  author =       "J{\"o}rg Rech and Eric Ras",
  title =        "Aggregation of experiences in experience factories
                 into software patterns",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--4",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943390",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In software engineering Experience Factories have been
                 in use for a long time to store and manage experiences
                 from software projects, typically in large
                 organizations. Beside the preservation of quantitative
                 or numerical experiences, e.g., in form of project
                 effort data or data from empirical studies, many
                 experience factories also preserve subjective or
                 qualitative experiences, e.g., in form of observations
                 or lessons learned from the projects. A key issue of
                 experience management is to aggregate these documented
                 experiences into more valuable software patterns. In
                 this article we report about the aggregation (i.e.,
                 formalization and generalization) of documented
                 experiences in an experience factory to software
                 patterns. Observations from real-world projects are
                 formalized (i.e., structurally contextualized) into
                 semi-formal experiences and, over time, several similar
                 of these experiences are generalized (i.e.,
                 systematically decontextualized) into software
                 patterns.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kayes:2011:ATI,
  author =       "Imrul Kayes",
  title =        "Agile Testing: Introducing {PRAT} as a Metric of
                 Testing Quality in {Scrum}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943384",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Scrum methodology has originated from agile software
                 develop-ment as an elixir to software projects which
                 are behind the sche-dule or which are highly likely to
                 have a problematic development phase. Also unlike any
                 other agile methodology, scrum is adaptive in nature.
                 This paper presents a metric that focuses on measuring
                 test quality in scrum. As product quality and process
                 quality is closely correlated, improved test quality
                 can ensure high quality deliverable product. Proposed
                 metric measures test quality of each sprint/ iteration
                 of scrum based upon some factor ratings which can be
                 used to get a comprehensive test quality overview of
                 testing process over longer periods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krishna:2011:APV,
  author =       "Raj P. M. Krishna and K. G. Srinivasa",
  title =        "Analysis of Projects and Volunteer Participation in
                 Large Scale Free and Open Source Software Ecosystem",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943389",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The ecology of Free and Open Source Software (FOSS) is
                 dotted by projects of every kind ranging from small
                 desktop applications to large mission critical systems.
                 To enable maximum visibility among the developer
                 community, these projects are often hosted in community
                 project management portals. The current work studies
                 one such portal, sourceforge. net by analysing the data
                 of 200,000 projects and 2 million developers for the
                 period Feb 2005 to Aug 2009. The scope of the present
                 study includes the analysis of developer contribution.
                 The slow growth rate of developer community and high
                 number of single developer projects are the major
                 findings of the present work.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sorkin:2011:LPG,
  author =       "Arthur Sorkin and Peter Donovan",
  title =        "{LR(1)} parser generation system: {LR(1)} error
                 recovery, oracles, and generic tokens",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--5",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943391",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The LR(1) Parser Generation System generates full
                 LR(1) parsers that are comparable in speed and size to
                 those generated by LALR(1) parser generators, such as
                 yacc [5]. In addition to the inherent advantages of
                 full LR(1) parsing, it contains a number of novel
                 features. This paper discusses three of them in detail:
                 an LR(1) grammar specified automatic error recovery
                 algorithm, oracles, and generic tokens. The error
                 recovery algorithm depends on the fact that full LR(1)
                 parse tables preserve context. Oracles are pieces of
                 code that are defined in a grammar and that are
                 executed between the scanner and parser. They are used
                 to resolve token ambiguities, including semantic ones.
                 Generic tokens are used to replace syntactically
                 identical tokens with a single token, which is, in
                 effect, a variable representing a set of tokens.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bishnu:2011:AKM,
  author =       "P. S. Bishnu and V. Bhattacherjee",
  title =        "Application of {K-Medoids} with {Kd}-Tree for Software
                 Fault Prediction",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943381",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software fault prediction area is subject to problems
                 like non availability of fault data which makes the
                 application of supervised techniques difficult. In such
                 cases unsupervised approaches like clustering are
                 helpful. In this paper, K-Medoids clustering approach
                 has been applied for software fault prediction. To
                 overcome the inherent computational complexity of
                 KMedoids algorithm a data structure called Kd-Tree has
                 been used to identify data agents in the datasets.
                 Partitioning Around Medoids is applied on these data
                 agents and this results in a set of medoids. All the
                 remaining data points are assigned to the nearest
                 medoids thus obtained to get the final clusters.
                 Software fault prediction error analysis results show
                 that our approach outperforms all unsupervised
                 approaches in the case of one given real dataset and
                 gives best values for the evaluation parameters. For
                 other real datasets, our results are comparable to
                 other techniques. Performance evaluation of our
                 technique with other techniques has been done. Results
                 show that our technique reduces the total number of
                 distance calculations drastically since the number of
                 data agents is much less than the number of data
                 points.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dubey:2011:UES,
  author =       "Sanjay Kumar Dubey and Ajay Rana",
  title =        "Usability Estimation of Software System by using
                 Object-Oriented Metrics",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943382",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Usability is one of the most important quality factors
                 in the fields of software engineering and an important
                 issue in the development of successful software
                 applications. To develop efficient software systems,
                 software developers need appropriate metrics.
                 Object-oriented metrics can play important role in the
                 development of successful and usable software
                 applications because object-oriented design techniques
                 have become one of the most powerful mechanisms to
                 fulfill the demand of efficient software systems.
                 Currently there are no comprehensive criteria for
                 estimating usability by using object-oriented metrics.
                 This paper focuses on usability and presents a
                 comparative analysis of various usability models and
                 metrics. It then analyzes the relationship between
                 usability and object-oriented metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2011:DMI,
  author =       "Kulwant Kaur and Hardeep Singh",
  title =        "Determination of Maintainability Index for Object
                 Oriented Systems",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943383",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In Object Oriented System, the quality of software
                 depends significantly on the decision taken at early
                 phases of the development. As per available artefact,
                 quality of the class description is very crucial for
                 system development. Maintenance is to repair defects in
                 software, to adapt the software to different
                 operational environments and to add or modify the
                 functionality of the system. In Object Oriented
                 Systems, maintainability factor needs more aspects to
                 explore. We have proposed Maintainability Index using
                 Package Metrics. We performed empirical evaluation
                 using three case studies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2011:RBC,
  author =       "Pankaj Kumar and Kamlesh Dutta",
  title =        "Relationship between Crosscutting Concerns and
                 Defects",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--7",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943385",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "NOTE FROM ACM: It has been determined that this paper
                 plagiarized earlier works. Therefore ACM has shut off
                 access to this paper. The paper by Pankaj Kumar and
                 Kamlesh Dutta plagiarizes the following work: Marc
                 Eaddy, Vibhav Garg, Alfred Aho, Nachiappan Nagappan,
                 Kaitlin Duck Sherwood, ``On the Relationship between
                 Crosscutting Concerns and Defects: An Empirical
                 Investigation'' found here, as well as the article:
                 Eaddy, M.; Zimmermann, T.; Sherwood, K. D.; Garg, V.;
                 Murphy, G. C.; Nagappan, N.; Aho, A. V.;, ``Do
                 Crosscutting Concerns Cause Defects?,'' Software
                 Engineering, IEEE Transactions on, vol. 34, no. 4, pp.
                 497--515, July--Aug. 2008.
                 https://doi.org/10.1109/TSE.2008.36. For further
                 information, contact the ACM Director of
                 Publications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumari:2011:AOO,
  author =       "Usha Kumari and Sucheta Bhasin",
  title =        "Application of Object-Oriented Metrics To {C++} and
                 {Java}: a Comparative Study",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943386",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The increasing importance of software measurement has
                 led to design and development of new software measures.
                 As the development of object-oriented software is
                 rising, more and more metrics are being defined for
                 object-oriented programming languages. But there is a
                 little understanding of comparative application of many
                 of these measures to different programming languages.
                 As a consequence, it is very difficult for software
                 managers and developers to select suitable measures and
                 programming languages for object-oriented systems. In
                 this paper, we investigate 23 object-oriented metrics
                 proposed by various researchers. The metrics are
                 applied to same set of 15 programs coded in C++ and
                 Java in an attempt to make comparative study of these
                 two prominent object-oriented programming languages.
                 The work done here reveals that these object-oriented
                 metrics can be applied successfully to both Java and
                 C++. But, Java proves to be more object-oriented than
                 C++ as per intuition. However, counting rules defined
                 for computation of these metrics should be framed more
                 carefully.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Vembuselvi:2011:LLL,
  author =       "C. Vembuselvi and S. Selvakumar",
  title =        "{LISISAP}: link level signature based secure anonymous
                 protocol for prevention of traffic analysis attacks",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--10",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943392",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "For any communication (wired or wireless) such as
                 control and data, the identity of source and
                 destination is revealed in the header portion of the
                 packet. Adversaries obtain sensitive information such
                 as the identity, location of a critical node, route,
                 data, etc., during communication by using traffic
                 analysis attacks, viz., similarity attack, data
                 integrity attack, packet counting attack, latency
                 attack, and clogging attack. Anonymous communication
                 prevents adversaries from doing traffic analysis
                 against the routing information embedded in the routing
                 messages and data packets. In order to thwart such
                 traffic analysis, anonymous communication protocols
                 were developed. In this paper, the existing anonymous
                 communication protocols were analyzed in terms of
                 techniques used, challenges, and applications.
                 Anonymous Routing protocol with Multiple Routes (ARMR)
                 is one of the existing protocols that achieves better
                 route anonymity using fake routes and multiple paths.
                 However, in ARMR, adversaries can modify the data with
                 genuine user pseudonyms and send the modified data to
                 the destination. In order to prevent data modification
                 by adversary at link level, in this paper a Link level
                 SIgnature based Secure Anonymous Protocol (LISISAP)
                 protocol is proposed. In LISISAP, source node generates
                 a signature for the data and sends the signature along
                 with the encrypted data to the next node. Further, the
                 next node verifies the signature. If signature matches,
                 it generates its own signature and sends the encrypted
                 data to its next node. Otherwise, it discards the
                 packet. Verified data and signature are sent by each
                 intermediate node until it reaches the destination. In
                 LISISAP, even if adversaries modify the data, every
                 node in the route including the destination node
                 verifies the data and discards the data if there is no
                 match in the signature. Similarity attacks can be
                 prevented by making the data look different on each hop
                 which could be achieved by encrypting the data with
                 link key. Proposed protocol, LISISAP is implemented and
                 tested in Smart and Secure Network. From the
                 experimental results, it is evident that the data
                 generated by source node is sent anonymously to the
                 destination. Thus, in LISISAP protocol, communication
                 is secure between nodes without revealing the node
                 identities. Anonymous properties such as identity
                 privacy, location privacy, route anonymity, and
                 robustness against several attacks were achieved.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Majumdar:2011:SSC,
  author =       "Dipankar Majumdar and Ananya Kanjilal and Swapan
                 Bhattacharya",
  title =        "Separation of scattered concerns: a graph based
                 approach for aspect mining",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943387",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Aspect Mining is a dynamic area of research in the
                 field of Software Engineering. Aspects are concerns
                 that are intermingled with other concerns thereby
                 reducing the understandability, maintainability and
                 scalability of the code. The concept of Separation of
                 Concerns (SoC) is often achieved until the Design
                 Phase, but gets difficult in the later phases of the
                 software development life cycle (SDLC). During program
                 maintenance the maintenance team is left with an
                 aggregation of procedures and variables, both of which
                 may be generically called user-defined tokens. This
                 paper proposes a graph-based approach to address the
                 problem of SoC during program maintenance. This is done
                 by the removal of some source code elements (e.g.,
                 user-defined-tokens), which can be responsible for
                 tangled concerns and complex code. These user-defined
                 tokens can be treated separately under the Aspect
                 Oriented Programming paradigm. The paper proposes a
                 graphical-model, which represents a procedural program
                 and defines a mathematical-model to identify and remove
                 the tangled and interleaving code-fragments. Thereafter
                 these code fragments are traced back to the
                 requirements engineering level through a formal
                 traceability model. This process yields the
                 corresponding user requirements that are associated
                 with these scattered code fragments. These identified
                 user requirements are put forward as Aspects, to be
                 handled or re-engineered under the Aspect Oriented
                 Programming paradigm.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2011:PSEa,
  author =       "Larry Bernstein and H{\'a}kon {\'A}g{\'u}stsson",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "6--7",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943372",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2011:LVP,
  author =       "Robert Schaefer",
  title =        "On the limits of visual programming languages",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "7--8",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943373",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2011:SEEa,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "8--9",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943374",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2011:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "10--18",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943375",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2011:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "19--27",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943376",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lutteri:2011:RIS,
  author =       "Emiliano Lutteri and Barbara Russo and Giancarlo
                 Succi",
  title =        "Report of the 4th international symposium on empirical
                 software engineering and measurement {ESEM} 2010",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "28--34",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943393",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes the research works, in
                 particular the full and short papers, presented at the
                 4th International Symposium on Empirical Software
                 Engineering and Measurement (ESEM 2010), held the 16th
                 and 17th of September in Bolzano-Bozen, Italy. The
                 program provided thirty full papers, twenty six short
                 papers and three invited talks held by Bertrand Meyer,
                 Steve Fraser and Carlo Ghezzi.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bateman:2011:HNT,
  author =       "Anita Bateman",
  title =        "Hands-on networking: from theory to practice by
                 {Maria} Luisa Merani, Maurizio Casoni, and {Walter}
                 Cerroni",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "38--38",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943377",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Russo:2011:BRM,
  author =       "Aryldo G. {Russo, Jr.}",
  title =        "Book Review: {{\booktitle{Modeling in Event-B ---
                 system and software engineering}} by Jean-Raymond
                 Abrial}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "38--39",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943378",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Berry:2011:BRS,
  author =       "Daniel M. Berry",
  title =        "Book Review: {{\booktitle{Software requirements and
                 design: the work of Michael Jackson}} by Bashar
                 Nuseibeh and Pamela Zave}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "39--40",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943379",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2011:BRG,
  author =       "Will Tracz",
  title =        "Book Review: {{\booktitle{Glitch: the hidden impact of
                 faulty software}} by Jeff Papows}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "2",
  pages =        "41--41",
  month =        mar,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1943371.1943380",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:00 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2011:CAS,
  author =       "Alok Mishra and Deepti Mishra",
  title =        "A curriculum for agile software development
                 methodologies",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--2",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968608",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Agile software development methodologies are
                 proliferating in software development organizations.
                 Agile techniques can handle changing business
                 requirements, schedule, cost, personnel turnover in an
                 effective way in organizations. Here, major components
                 of agile software development curriculum are discussed
                 along with suggestions towards making it a successful
                 course of software engineering curriculum.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chandra:2011:AST,
  author =       "Shalini Chandra and Raees Ahmad Khan",
  title =        "Availability state transition model",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--3",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968603",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Several security mechanisms such as digital signature,
                 timestamp audits and trails, encryption, throttling,
                 filtering, protect secrets etc. are available. These
                 security mechanisms are not completely able to stop
                 malicious attacks. For malicious hackers and attackers
                 it is comparatively easy to exploit security loopholes
                 at the user's end side. Behind such type of problem the
                 main reason is bad software design and its
                 implementation without proper risk analysis and
                 mitigation. So, an idea to model availability states an
                 Availability State Transition Model (ASTM) has been
                 proposed in this article. In ASTM methodology, only
                 design level details is required which can be easily
                 retrieved from the software's design.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Baride:2011:CBS,
  author =       "Srikanth Baride and Kamlesh Dutta",
  title =        "A cloud based software testing paradigm for mobile
                 applications",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968601",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "The testing of applications for mobile computing
                 devices is cumbersome due to the bounded computational
                 resources that these devices have and diversity in
                 mobile environments. There are many different types of
                 emulators that have been proposed and used nowadays for
                 this purpose. But these emulators typically cannot
                 emulate: actual network speed and availability, actual
                 device specific content-rendering speed, memory
                 limitation, cache size, CPU speed, and stack size.
                 These emulators are designed for specific platforms,
                 which lack testing of applications on heterogeneous
                 mobile platforms. Cloud Computing has a potential to
                 overcome these challenges by taking up contemporary
                 progress in parallel and distributed systems,
                 virtualization, and software services. Cloud computing
                 empowers us to have adaptable and on-demand network
                 access to a common group of configurable computing
                 resources. In this article, we introduce a cloudbased
                 model that provides solutions to aforesaid challenges.
                 Our model sets up a mobile environment, actual device
                 and platform on the cloud resources for a given system
                 configuration. It also provides software testing
                 services to execute numerous tests automatically
                 according to a given application.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gandhi:2011:EGR,
  author =       "Parul Gandhi and Pradeep Kumar Bhatia",
  title =        "Estimation of generic reusability for object-oriented
                 software an empirical approach",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968606",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Inheritance and templates are key concepts in
                 object-oriented programming (OOP), and are essential
                 for achieving reusability and extendibility. The aim of
                 this paper is to explore traditional Halstead's metrics
                 and use them to propose more software metrics related
                 to generic method and attributes in an object-oriented
                 software. These metrics measure quantitative generic
                 construct with inheritance in an object-oriented code.
                 Two metrics GRr (Generic Reusability Ratio) and ERr
                 (Effort Ratio) are proposed in this paper. First metric
                 GRr (Generic Reusability Ratio) measures impact of
                 template in program volume and second metric ERr
                 (Effort Ratio) measures impact of template in
                 development effort. These metrics will be a tool for
                 estimating and evaluating costs of program design and
                 program tests as well as program complexity.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Choudhary:2011:TSF,
  author =       "R. K. Choudhary and R. A. Khan",
  title =        "Testing software fault tolerance techniques: future
                 direction",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968604",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software fault tolerance can itself be dangerous
                 error-prone because of the additional effort that must
                 be included in the programming process. The paper is
                 based upon research in the area of testing software
                 fault tolerance techniques. A Framework to Test Fault
                 Tolerance has been proposed and validated with industry
                 data. During the validation process we identified some
                 of the interesting findings that can be explored to
                 carry out further research in this area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Franky:2011:AMD,
  author =       "Mar{\'\i}a Consuelo Franky",
  title =        "Agile management and development of software projects
                 based on collaborative environments",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968605",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We've heard of Agile methodologies for several years,
                 but software projects have still delays and failures in
                 planning and management. How then automate the
                 processes of the development of software projects
                 following agile methodologies? In this paper we try to
                 answer this question by proposing an appropriate use of
                 collaborative environments for software development
                 that effectively translated into action the principles
                 and practices of Agile methodologies. The appropriate
                 use of these collaborative environments leads to a
                 truly agile management, where the project manager
                 achieves the vision and the continuous monitoring of
                 the project, and the participants become adapted to an
                 agile and productive discipline imposed by the
                 environment, regardless if they are geographically
                 dispersed. To ensure that appropriate use, this paper
                 proposes a methodological guide to achieve an agile
                 management of software projects by relying on a
                 particular collaborative environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nuthakki:2011:UUG,
  author =       "Murali K. Nuthakki and Mutlu Mete and Cihan Varol and
                 Sang C. Suh",
  title =        "{UXSOM}: {UML} generated {XML} to software metrics",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968609",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software developers are increasingly using Unified
                 Modeling Language (UML) tools to automate source code
                 generation. Therefore, nowadays calculating software
                 metrics from UML diagrams to evaluate software quality
                 is an important trend in the software industry.
                 However, acquisition of software metrics from
                 Extensible Markup Language (XML) export of UML tools
                 has been predominantly tool dependent. Moreover, each
                 new tool may have different specifications in XML.
                 Despite the overall need for a process to automate XML
                 unification, no current solution has yet been proposed.
                 Creating a framework to automate this assessment would
                 streamline development and increase efficiency in
                 software industry. With the aim to overcome this
                 deficiency, we developed a parser-based framework,
                 named UXSOM, to calculate software metrics
                 independently from the UML tool. Particularly UXSOM is
                 able to generate software metrics from the XML-based
                 outputs of the tools, ArgoUML, UMLET, MagicDraw, Sparx
                 Systems, and ESS Model. We showed a very general case
                 of UML class diagram, in which we extracted and
                 compared software metrics from these five different
                 tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bennett:2011:BDI,
  author =       "Travis A. Bennett and Coskun Bayrak",
  title =        "Bridging the data integration gap: from theory to
                 implementation",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968602",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The integration of multiple autonomous and
                 heterogeneous data sources (both across the web and via
                 a company intranet) has received much attention
                 throughout the years, particularly due to its many
                 applications in the fields of Artificial Intelligence
                 and medical research data sharing. Data integration
                 systems embody this work and have come very far in the
                 past twenty years. The problem of designing such
                 systems is characterized by a number of issues that are
                 interesting from a theoretical point of view: answering
                 queries using logical views, query containment and
                 completeness, automatic integration of existing data
                 sources via schema mapping tools, etc. In this work we
                 discuss these issues, compare and contrast various
                 proposed solutions (federated database systems and data
                 warehouses), and finally propose a novel extension of
                 the MVC (model, view, controller) web-based framework
                 that allows for the rapid development and
                 implementation of data integration systems solutions
                 suitable for use on the web.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Geetha:2011:FHP,
  author =       "D. Evangelin Geetha and T. V. Suresh Kumar and K.
                 Rajani Kanth",
  title =        "Framework for hybrid performance prediction process
                 model: use case performance engineering approach",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "1--15",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968607",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The dynamic behavior of distributed systems requires
                 that their performance characteristics be determined
                 rigorously, preferably in the early stages of software
                 engineering process. Evaluation of the performance at
                 the end of software development leads to increase in
                 the cost of design change. To compare design
                 alternatives or to identify system bottlenecks,
                 quantitative system analysis must be carried out from
                 the early stages of the software development life
                 cycle. In this paper we describe a process model,
                 Hybrid Performance Prediction Process Model that allows
                 modeling and evaluating distributed systems with the
                 explicit goal of assessing performance of the software
                 system during feasibility study. The use case
                 performance engineering approach proposed in this paper
                 exploits use case model and provides flexibility to
                 integrate the software performance prediction process
                 with software engineering process. We use an e-parking
                 application to demonstrate various elements in our
                 framework. The performance metrics are obtained and
                 analyzed by considering two software architectures.
                 Sensitivity analysis on the behavior of resources is
                 carried out. This analysis helps to determine the
                 capacity of the execution environment to obtain the
                 defined performance objectives.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2011:PSEb,
  author =       "Larry Bernstein",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "4--4",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968588",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2011:HWT,
  author =       "Michael Wing",
  title =        "How we talk about basics",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "4--6",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968589",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2011:SEEb,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software Engineering Education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "7--8",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968590",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2011:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "9--18",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968591",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2011:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "19--25",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968592",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fricker:2011:IRE,
  author =       "Samuel Fricker and Norbert Seyff",
  title =        "{1st International Requirements Engineering Efficiency
                 Workshop: REEW 2011}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "26--28",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968597",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Requirements engineering research has for a long time
                 focused on specification quality, leading to
                 recommendations of how to engineer ``perfect''
                 requirements specifications. Practitioners, however, do
                 not have the time, resources, and interests for
                 overdoing requirements engineering. Rather, many
                 situations call for shortcuts that allow investing
                 effort in those concerns that are critical for success,
                 while reducing effort in other areas where risk is
                 comparably smaller. The social context, smart
                 collaboration processes, and novel ways of looking at
                 the interface between stakeholders and the supplier can
                 be a basis to increase the yield of requirements
                 engineering, while reducing required effort. The
                 International Requirements Engineering Efficiency
                 Workshop (REEW 2011) aimed at initiating, facilitating,
                 and nurturing the discussion on efficient approaches to
                 engineer just good enough requirements. Requirements
                 engineering was seen as a means that can be simplified,
                 automated, or combined with other practices to achieve
                 successful systems in an economically efficient manner.
                 REEW 2011 provided a platform for the community of
                 practitioners and research experts that are interested
                 in productivity-enhancing approaches to requirements
                 engineering. This report describes the workshop results
                 including tactics, practice, and trade-offs for
                 achieving requirements engineering efficiency.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2011:ISD,
  author =       "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
                 Mishra",
  title =        "Information systems in distributed environments:
                 {ISDE} 2010",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "28--30",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968598",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from a one-day second international
                 workshop on ``Information Systems in Distributed
                 Environments'' (ISDE), which was organized in
                 conjunction with the OnTheMove Federated Conferences \&
                 Workshops (OTM 2010) at Hersonissos-Crete, Greece, on
                 October 26, 2010. The main focus of this workshop was
                 to provide a venue for the discussion of challenges
                 related to the development, operation, and maintenance
                 of distributed information systems, and their creation
                 in the context of global development projects. Further
                 dissemination of research results will lead to an
                 improvement of distributed information system
                 development and deployment across the glob.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Belani:2011:BRB,
  author =       "Hrvoje Belani",
  title =        "Book Review: {{\booktitle{Barcodes for mobile
                 devices}} by Hiroko Kato, Keng T. Tan and Douglas
                 Chai}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "32--33",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968593",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hagar:2011:BRT,
  author =       "Jon D. Hagar",
  title =        "Book Review: {{\booktitle{Testing IT: an off-the-shelf
                 software testing process}} by John Watkins and Simon
                 Mills}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "33--33",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968594",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Epps:2011:BRE,
  author =       "Bob Epps",
  title =        "Book Review: {{\booktitle{The elements of MATLAB
                 style}} by Richard K. Johnson}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "33--34",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968596",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/matlab.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Farrell-Vinary:2011:J,
  author =       "P. Farrell-Vinary",
  title =        "{JustInMind}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "3",
  pages =        "34--35",
  month =        may,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/1968587.1968595",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:02 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gupta:2011:VDC,
  author =       "Varun Gupta",
  title =        "Validation of dynamic coupling metrics for
                 object-oriented software",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--3",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020985",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Dynamic coupling metrics for object-oriented software
                 provide scope of coupling measurement up to the object
                 level and take into account important and widely used
                 object-oriented features such as inheritance,
                 polymorphism and dynamic binding during measurement.
                 The dynamic measures are computed at run-time, which
                 take into consideration the actual interactions taking
                 place among members of a class. In this paper, an
                 attempt has been made to evaluate dynamic coupling
                 metrics for object-oriented software using formal
                 evaluation framework proposed by Briand et al. A
                 practical and useful coupling measure must satisfy most
                 of the properties given in this framework. The results
                 of this study show that dynamic coupling metrics
                 satisfy all properties and parameters required by the
                 evaluation framework and thus dynamic coupling measures
                 are robust and useful.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Khajaria:2011:MSR,
  author =       "Krishna Khajaria and Manoj Kumar",
  title =        "Modeling of security requirements for decision
                 information systems",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020989",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data Warehouse (DW) is a decision information system
                 that facilitates decision makers for the fulfillment of
                 strategic decisions (decision making needs) by
                 extracting and integrating data from heterogeneous
                 sources. Due to sensitivity of the information to be
                 maintained in the DW, it becomes important to capture
                 information security goal as a quality goal of the
                 stakeholders for their organization from early stages
                 of DW life cycle. Various requirements engineering
                 techniques have been proposed in the DW literature
                 without paying much attention on security aspect.
                 Recently, AGDI (agent-goal-decision-information) model
                 was proposed to capture decision making needs of the
                 stakeholders for their organization to build a DW, but
                 security issue was not addressed. In this paper, we
                 propose an extension to the AGDI model to capture
                 security aspect (i.e. security goals of the
                 stakeholders) right from the beginning of requirements
                 modeling in order to prevent illegitimate attempts of
                 accessing DW. The application of the proposed extension
                 in the AGDI model has been demonstrated through a CASE
                 study of a University.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2011:QOR,
  author =       "Manoj Kumar and Anjana Gosain and Yogesh Singh",
  title =        "Quality-oriented requirements engineering for a data
                 warehouse",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020990",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Due to the increasing complexity of Data Warehouses
                 (DW), continuous attention must be paid for evaluation
                 of their quality throughout their design and
                 development. DW quality depends on the quality of all
                 requirements, conceptual, logical and physical models
                 used for DW design. Various authors have proposed
                 metrics to assure the quality of conceptual, logical
                 and physical models for DW. However, there is no
                 significant work in the DW literature to assure the
                 quality of a requirements model. A good quality
                 requirements model may lead to a good quality DW. In
                 this paper, we propose a quality-oriented requirements
                 model for a DW. In the proposed model, the notion of
                 perspective is introduced to capture the intention of
                 the agents (stakeholders) associated with their goals.
                 The agent may view a soft goal from two perspectives:
                 decisional and quality perspective. In the former, the
                 agent may refine a soft goal into the goal having well
                 defined criteria for its achievement and termed as
                 decisional goal, whereas in the later the agent may
                 define the various constraint (timing constraint,
                 budgetary constraint etc.) associated with the
                 decisional goals. The agents suggest the decisions for
                 achieving their decisional goals considering these
                 constraints. Thus, the decisional goals and the
                 constraints specified in the decisional and quality
                 perspective respectively should be maintained as
                 meta-data of the DW. In this way, the quality of DW
                 requirements model will be enhanced, which may lead to
                 enhance the quality of conceptual, logical and physical
                 model of DW.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dave:2011:CRM,
  author =       "Vachik S. Dave and Kamlesh Dutta",
  title =        "Comparison of regression model, feed-forward neural
                 network and radial basis neural network for software
                 development effort estimation",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020982",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Accurate estimation of software development parameters
                 such as effort, cost, and schedule is very important
                 for effectively managing software development projects.
                 Several software development effort estimation models
                 have been developed in the last few decades.
                 Determining, which is the best estimation model is
                 difficult to decide for a software management team. In
                 this paper we have compared Neural Network models and
                 regression model for software development effort
                 estimation. The comparison reveals that the Neural
                 Network (NN) is better for effort prediction compared
                 to regression analysis model. Further, we have compared
                 two Neural Network models --- Feed-Forward Neural
                 Network (FFNN) and Radial Basis Neural Network (RBNN).
                 The evaluation of the models is based on Mean Magnitude
                 Relative Error (MMRE), Relative Standard Deviation
                 (RSD) and Root Mean Squared Error (RMSE). The
                 experimental results show that the RBNN model exhibits
                 better prediction ability than FFNN.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sangwan:2011:RBF,
  author =       "Om Prakash Sangwan and Pradeep Kumar Bhatia and Yogesh
                 Singh",
  title =        "Radial basis function neural network based approach to
                 test oracle",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020992",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is an important discipline, and
                 consumes significant amount of effort. A proper
                 strategy is required to design and generate test cases
                 systematically and effectively. In this paper automated
                 software test case generation with Radial Basis
                 Function Neural Network (RBFNN) has been proposed and
                 empirically validated with the help of a case study and
                 compared with other techniques of soft computing.
                 Experimental results show that RBFNN is one of the best
                 technique for automated test case generation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yilmaz:2011:SPE,
  author =       "Murat Yilmaz and Rory V. O'Connor",
  title =        "A software process engineering approach to improving
                 software team productivity using socioeconomic
                 mechanism design",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020998",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software development is a knowledge and human
                 intensive activity. At the social level, the
                 interactions of these participants and their ability to
                 cooperate are important for improving the productivity
                 of teams and organizations. It is therefore not
                 surprising to discover that recent contributions in
                 software development have repeatedly asserted the
                 critical role of people in software development
                 efforts. However, existing approaches to software
                 development fail to fully exploit the importance of
                 social and intellectual capital that has been
                 highlighted in the fields of economics and sociology.
                 We propose that leveraging the existing approaches from
                 economics and sociology and applying to software
                 development can assist software organizations in
                 maximizing their return on investment. For example, by
                 applying one such approach, mechanism design, we can
                 improve and model the organization's total productivity
                 based on social aspects affecting productivity (i.e.
                 social productivity). This paper will discuss the
                 vision and progress for applying the concept of
                 mechanism design for optimizing software development
                 teams.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chanda:2011:SGA,
  author =       "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
                 and Swapan Bhattacharya",
  title =        "{SCAG}: a graphical approach to measure the complexity
                 of the {SOA} application",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020981",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture (SOA) provides a
                 foundation to achieve software reuse that enables
                 business professionals, who are not necessarily
                 programmers, to exploit the intrinsic properties of
                 software. A component-based programming model is the
                 key factor in the rapid adoption of SOA. SOA exploits
                 the properties of Component Based Software Engineering
                 (CBSE) in the form of services. SOA components help to
                 provide the business users with some flexibility to
                 play around with the components and rewire them to
                 create new business solutions. The complexity of SOA
                 application plays an important role in project planning
                 and determination of timeline and cost estimation and
                 allocation of resources. This paper proposes a
                 metric-based approach for the determination of relative
                 complexity and coupling of Component based SOA
                 application. We have proposed a Service Component
                 Architecture Graph (SCAG) which can be used for
                 graphical representation of the different service
                 module, the service components in the service module
                 and interaction among them. This metrics may be used by
                 developers to assess the complexity of SOA application
                 and if required redesign to create highly cohesive
                 components with minimal coupling. It will also promote
                 a culture of asset (reusable components) based
                 development by considering the factor like usability,
                 complexity, coupling etc. A case study is presented and
                 graph based analysis is done for deriving the
                 complexity, along with the other aspects of the
                 architecture.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Malhotra:2011:SFP,
  author =       "Ruchika Malhotra and Ankita Jain",
  title =        "Software fault prediction for object oriented systems:
                 a literature review",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020991",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There always has been a demand to produce efficient
                 and high quality software. There are various object
                 oriented metrics that measure various properties of the
                 software like coupling, cohesion, inheritance etc.
                 which affect the software to a large extent. These
                 metrics can be used in predicting important quality
                 attributes such as fault proneness, maintainability,
                 effort, productivity and reliability. Early prediction
                 of fault proneness will help us to focus on testing
                 resources and use them only on the classes which are
                 predicted to be fault-prone. Thus, this will help in
                 early phases of software development to give a
                 measurement of quality assessment. This paper provides
                 the review of the previous studies which are related to
                 software metrics and the fault proneness. In other
                 words, it reviews several journals and conference
                 papers on software fault prediction. There is large
                 number of software metrics proposed in the literature.
                 Each study uses a different subset of these metrics and
                 performs the analysis using different datasets. Also,
                 the researchers have used different approaches such as
                 Support vector machines, naive Bayes network, random
                 forest, artificial neural network, decision tree,
                 logistic regression etc. Thus, this study focuses on
                 the metrics used, dataset used and the evaluation or
                 analysis method used by various authors. This review
                 will be beneficial for the future studies as various
                 researchers and practitioners can use it for
                 comparative analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dubey:2011:AMM,
  author =       "Sanjay Kumar Dubey and Ajay Rana",
  title =        "Assessment of maintainability metrics for
                 object-oriented software system",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020983",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Many organizations assess the maintainability of
                 software systems before they are deployed.
                 Object-oriented design has been shown to be a useful
                 technique to develop and deliver quality software.
                 Objectoriented metrics can be used to assess the
                 maintainability of a software system. Various software
                 metrics and models have been developed and described.
                 This paper provides a review of this literature and the
                 related state-of-the-art. It also proposes a
                 maintainability model that is based on the analysis of
                 the relationship between object-oriented metrics and
                 maintainability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Seth:2011:DSB,
  author =       "Ashish Seth and Himanshu Agarwal and Ashim Raj
                 Singla",
  title =        "Designing a {SOA} based model",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020993",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture (SOA) is an
                 architectural approach that can be shared and reused.
                 Shortage of studies, research thrust and limited
                 expertise in the area of SOA keeps the application of
                 SOA in Small and Medium Enterprises (SMEs) limited.
                 Also in a country like India, whose major economy is
                 dependent on the small and medium enterprises, the
                 Indian Government is promoting the growth in this
                 sector. Successful examples of individual automated
                 enterprise services and traditional ERP implementation
                 systems exist but there is a lack of holistic,
                 integrated technical solutions that can be applied in
                 small and medium size enterprises. In this paper we
                 propose a five layered SOA based architecture that can
                 integrate all activities comprising Supply Chain
                 Management (SCM), Customer Relationship Management
                 (CRM), Technical and Enterprise Applications Tools
                 according to SMEs requirement. We also compared our
                 model with traditional ERP systems and other similar
                 approaches and found the proposed model is efficient,
                 cost effective and competent with similar existing
                 solutions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{V:2011:BBI,
  author =       "Sharath Chandra V. and S. Selvakumar",
  title =        "{BIXSAN}: browser independent {XSS} sanitizer for
                 prevention of {XSS} attacks",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020996",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Proliferation of social networking sites, and web
                 applications which deliver dynamic content to the
                 clients have increased the user created HTML content in
                 the World Wide Web. This user-created HTML content can
                 be a notorious vector for Cross-Site Scripting,(XSS)
                 attacks. XSS attacks have the ability to target
                 websites, steal confidential information of the users,
                 and hijack their accounts, etc. XSS attacks are
                 launched to exploit the vulnerabilities of the poorly
                 developed application code and data processing systems.
                 In particular, improper validation of user created
                 content and un-sanitized custom error messages
                 introduce vulnerability for XSS attacks. It is a
                 challenging task for any security mechanism to filter
                 out only the harmful HTML content and retain safe
                 content with high fidelity and robustness. This has
                 motivated us to develop a mechanism that filters out
                 the harmful HTML content, and allows safe HTML. The
                 existing solutions to XSS attack include use of regular
                 expressions to detect the presence of dynamic content
                 and client side filtering mechanisms such as Noscript
                 and Noxes tool. The drawbacks of these solutions are
                 low fidelity and disallowing of benign HTML. In order
                 to overcome these drawbacks BIXSAN, a Browser
                 Independent XSS SANitizer for prevention of XSS attacks
                 is proposed in this paper. BIXSAN includes the
                 proposition of three pronged strategy. These strategies
                 are as follows: Firstly the use of complete HTML parser
                 is proposed rather than approximating the behavior of
                 parser. The advantage of using complete HTML parser is
                 that it offers high fidelity. Secondly the use of
                 modified browser, viz., JavaScript Tester is proposed
                 to detect the presence of JavaScript for filtering it
                 out. Thirdly, identification of static tags is proposed
                 for allowing the benign HTML. Further, BIXSAN includes
                 the proposition of a parse tree generator at client
                 side browser to reduce the anomalous behavior of
                 browsers. BIXSAN was experimented in various browsers
                 such as Opera, Netscape, Internet Explorer (IE), and
                 Firefox and found to work for all the browsers. From
                 the experiments conducted it has been found that the
                 proposed BIXSAN prevents the injection of XSS attack
                 code successfully. Further, it has been verified that
                 BIXSAN reduces the anomalous behavior of browse.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yadav:2011:FSM,
  author =       "Seema Yadav and Khaleel Ahamd and Jayant Shekhar",
  title =        "Finite state machine based approach to prevent format
                 string attacks",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020997",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the computer field there are many types of input
                 validation attacks that occur, in which ``Format String
                 Overflow Attacks'' is one of the most important. Format
                 String Overflow Attacks remain the leading reason of
                 software vulnerability or exploits. Format string bugs
                 result in error such as wrong result type, memory
                 access error and crash and security breach. In this
                 paper, we proposed a Finite state machine which
                 prevents Format String Overflow Attacks in a secure way
                 with the help of several states of FSM. Proper checking
                 against format string overflow bugs can avoid
                 consequences due to exploits of format string overflow
                 bugs. The result of our proposed finite state machine
                 is improving the security problem and provides
                 protection to memory access from any unauthorized
                 user.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2011:ARM,
  author =       "Ajay Jain",
  title =        "Approach for reducing menu access time by enabling
                 bidirectional cursor movement within nested menu(s)",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020986",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There is a time value associated with the action an
                 application user must perform to traverse menu items to
                 reach a specific option. The time value increases when
                 menu options are arranged within multiple nested menus.
                 This work proposes a new menu layout that helps reduce
                 the time required to traverse menus, especially those
                 with multiple levels of nesting. This work also
                 includes the results of a statistical experiment that
                 measures the time taken to traverse using the suggested
                 approach. The results are compared with the time taken
                 to traverse using the traditional menu layout.
                 Experimental data (under pre-defined assumptions) seems
                 to significantly favor the proposed approach. The work
                 presents data samples, assumptions, and limitations of
                 the proposed approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Johari:2011:ESE,
  author =       "Kalpana Johari and Arvinder Kaur",
  title =        "Effect of software evolution on software metrics: an
                 open source case study",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020987",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software needs to evolve in order to be used for a
                 longer period. The changes corresponding to corrective,
                 preventive, adaptive and perfective maintenance leads
                 to software evolution. In this paper we are presenting
                 the results of study conducted on 13 versions of JHot
                 Draw and 16 versions of Rhino released over the period
                 of 10 years. We measured Object Oriented Metrics and
                 studied the changes in the measured values over
                 different releases of two medium sized software
                 developed using Java. We also investigated the
                 applicability of Lehman's Law of Software Evolution on
                 Object Oriented Software Systems using different
                 measures. We found that Lehman's laws related with
                 increasing complexity and continuous growth are
                 supported by the data and computed metrics measure.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2011:MVC,
  author =       "Parminder Kaur and Hardeep Singh",
  title =        "A model for versioning control mechanism in
                 component-based systems",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020988",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based systems provide a better reuse of
                 software components, greater flexibility, scalability
                 and higher quality of services. Component development
                 generally takes place due to the process of creating
                 and propagating changes in requirement definitions,
                 system designs, program source code, documentation and
                 test data. As a result, multiple versions of
                 constituent components come into existence. Thus, there
                 is a need to keep the track of multiple versions of
                 same component. To handle multiple versions of
                 constituent components, a version-control tool named as
                 Visual Version Control Tool (VVCT), for the management
                 of life-cycle evolution of component, is developed. The
                 developed tool satisfies all the conditions required
                 for version control in component-based systems. The
                 parameters required for uniform version management as
                 well as component frameworks are also satisfied by the
                 developed tool. To monitor and control the versioning
                 system, an example model is tested along with the set
                 of proposed metrics. This paper also incorporates
                 issues like component configuration, component
                 evolution, component framework, component version tree
                 and version-control metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2011:EEO,
  author =       "Satwinder Singh and K. S. Kahlon",
  title =        "Effectiveness of encapsulation and object-oriented
                 metrics to refactor code and identify error prone
                 classes using bad smells",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020994",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To assist maintenance and evolution teams, work needs
                 to be done at the onset of software development. One
                 such facilitation is refactoring the code, making it
                 easier to read, understand and maintain. Refactoring is
                 done by identifying bad smell areas in the code. In
                 this paper, based on empirical analysis, we develop a
                 metrics model to identify smelly classes. The role of
                 two new metrics (encapsulation and information hiding)
                 is also investigated for identifying smelly and faulty
                 classes in software code. This paper first presents a
                 binary statistical analysis of thev relationship
                 between metrics and bad smells, the results of which
                 show a significant relationship. Then, the metrics
                 model (with significant metrics shortlisted from the
                 binary analysis) for bad smell categorization (divided
                 into five categories) is developed. To verify our
                 model, we examine the open source Firefox system, which
                 has a strong industrial usage. The results show that
                 proposed metrics model for bad smell can predict faulty
                 classes with high accuracy, but in the case of the
                 categorized model not all categories of bad smells can
                 adequately identified the faulty and smelly classes.
                 Due to certain limitations of our study more
                 experiments are required to generalize the results of
                 bad smell and faulty class identification in software
                 code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gandotra:2011:LSA,
  author =       "Vandana Gandotra and Archana Archana Singhal and Punam
                 Bedi",
  title =        "Layered security architecture for threat management
                 using multi-agent system",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "1--11",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020984",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The increasing complexity of software systems along
                 with expanding connectivity has necessitated the
                 evolution of an integrated security framework adopting
                 innovative techniques for secure software systems. This
                 paper proposes a layered security architecture for
                 threat management using a multi-agent system to meet
                 the above objective. Layer- 1 of this framework is
                 designed for elicitation of realistic and flawless
                 security requirements. Layer-2 uses a Multi-Agent
                 system planning for avoidance of threats optimally. In
                 this mechanism autonomous agents interact and
                 coordinate with each other to achieve the common goal
                 of software security. An adaptive defense mechanism
                 using Meta-Agents in multi-agent system in conjunction
                 with fuzzy logic to counter the adaptive and compound
                 threats is the responsibility of Layer-3. Guidelines
                 proposed in this paper have augmented this security
                 architecture as a two-fold defensive strategy to ensure
                 that a hacker is not able to tamper data even if they
                 penetrate the periphery defenses. These proactive steps
                 can be implemented during the design and development
                 phases of the software life cycle in an incremental way
                 as per the budget and security requirements of a
                 software project. A case study on internet banking is
                 included in the paper to describe the proposed security
                 framework.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2011:ESEa,
  author =       "Larry Bernstein",
  title =        "Eternal software engineering questions",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "7--7",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021008",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2011:ESL,
  author =       "Michael Wing",
  title =        "Everything in {SE} is a lie",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "8--9",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021009",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2011:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "10--19",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021010",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2011:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "20--23",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021011",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Treude:2011:WRW,
  author =       "Christoph Treude and Margaret-Anne Storey and Arie van
                 Deursen and Andrew Begel and Sue Black",
  title =        "Workshop report from {Web2SE 2011: 2nd International
                 Workshop on Web 2.0 for Software Engineering}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "24--29",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020977",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web 2.0 technologies, such as wikis, blogs, tags and
                 feeds, have been adopted and adapted by software
                 engineers. With the annual Web2SE workshop, we provide
                 a venue for research on Web 2.0 for software
                 engineering by highlighting state-of-the-art work,
                 identifying current research areas, discussing
                 implications of Web 2.0 on software engineering, and
                 outlining the risks and challenges for researchers.
                 This report highlights the paper and tool
                 presentations, and the discussions among participants
                 at Web2SE 2011 in Honolulu, as well as future
                 directions of the Web2SE workshop community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Galster:2011:VSA,
  author =       "Matthias Galster and Paris Avgeriou and Danny Weyns
                 and Tomi M{\"a}nnist{\"o}",
  title =        "Variability in software architecture: current practice
                 and challenges",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "30--32",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020978",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Variability in software-intensive systems is usually
                 understood as the ability of a software artifact to be
                 changed in order to fit different contexts,
                 environments, or purposes. Software architecture on the
                 other hand determines the structure of a software
                 system, and is described in an architecture
                 description. This description includes the major
                 stakeholders of a software system and their concerns.
                 Variability is reflected in and facilitated through the
                 software architecture. The First International Workshop
                 on Variability in Software Architecture (VARSA) was
                 held jointly with WICSA 2011 in Boulder, Colorado. The
                 goal of the workshop was to explore and advance the
                 state-of-the art in variability in software
                 architecture. It featured four research paper
                 presentations, two invited talks, and three working
                 groups that discussed specific topics. This report
                 summarizes the themes of the workshop, presents the
                 results of the working group discussions, and suggests
                 topics for further research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ozkaya:2011:MTD,
  author =       "Ipek Ozkaya and Philippe Kruchten and Robert L. Nord
                 and Nanette Brown",
  title =        "Managing technical debt in software development:
                 report on the {2nd International Workshop on Managing
                 Technical Debt}, held at {ICSE 2011}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "33--35",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2020979",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The technical debt metaphor is gaining significant
                 traction in the software development community as a way
                 to understand and communicate about issues of intrinsic
                 quality, value, and cost. This is a report on a second
                 workshop on managing technical debt, which took place
                 as part of the 33rd International Conference on
                 Software Engineering (ICSE 2011). The goal of this
                 second workshop was to discuss the management of
                 technical debt: to assess current practice in industry
                 and to further refine a research agenda for software
                 engineering in this area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lilja:2011:PAI,
  author =       "David J. Lilja and Raffaela Mirandola and Kai Sachs",
  title =        "Paper Abstracts of the {2nd International Conferernce
                 on Performance Engineering (ICPE 2011)}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "36--53",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2069288",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Foreword This issue of SEN contains the abstracts of
                 the papers, which were presented on the Second Joint
                 WOSP/SIPEW International Conference (ICPE 2011), held
                 in Karlsruhe, Germany, March 14-16, 2011, now
                 established as a regular event known as ACM/SPEC
                 International Conference on Performance Engineering
                 (ICPE). The primary goal of this conference series is
                 to bridge the gap between theory and practice in the
                 field of computer systems performance engineering by
                 providing a forum for sharing ideas and experiences
                 between industry and academia. This years conference
                 brought together researchers and industry practitioners
                 to share and present their experiences, discuss
                 challenges, and report on both state-of-the-art
                 research and work-in-progress on performance
                 engineering of software and systems, including
                 performance measurement, modeling, benchmark design,
                 and run-time performance management. The ICPE gives
                 researchers and practitioners a unique opportunity to
                 share their perspectives with others interested in the
                 various aspects of computer systems performance
                 engineering. The call for papers attracted 63 research
                 and 24 industrial paper submissions from Europe, Asia,
                 Africa, and North America. The program committees
                 accepted 19 full research papers and 7 short papers
                 together with 13 industrial papers. These papers cover
                 a variety of topics, including performance modeling and
                 techniques and measurement and benchmarking strategies
                 for adaptive systems, power management, virtualized
                 environments, and large-scale and distributed systems.
                 We are confident that you will find the abstracts
                 stimulating and that they will provide you with many
                 new ideas and insights. The full paper are available at
                 the ACM Digital Library. David J. Lilja: Program
                 Co-Chair, Research Track Raffaela Mirandola: Program
                 Co-Chair, Research Track Kai Sachs: Program Co-Chair,
                 Industrial Track",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2011:BRU,
  author =       "William {Del Ra}",
  title =        "Book Review: {{\booktitle{Usability testing
                 essentials: ready, set\ldots{}test!}} by Carol M.
                 Barnum}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "49--50",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021001",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Glaves:2011:BRA,
  author =       "Leslie Glaves",
  title =        "Book Review: {{\booktitle{API design for C++}} by
                 Martin Reddy}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "50--50",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021002",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mitrache:2011:BRI,
  author =       "Cristina Mitrache",
  title =        "Book Review: {{\booktitle{IT manager's handbook, the
                 business edition}} by Bill Holtsnider and Brian D.
                 Jaffe}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "51--51",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021003",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ngo:2011:BRD,
  author =       "Terry Ngo",
  title =        "Book Review: {{\booktitle{Data mining: practical
                 machine learning tools and technique}}, third edition
                 by Ian H. Witten, Eibe Frank, Mark A. Hell}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "51--52",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021004",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{OSullivan:2011:DMM,
  author =       "Michael O'Sullivan",
  title =        "Designing with the mind in mind: simple guide to
                 understanding user interface design rules by Jeff
                 {Johnson}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "52--52",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021005",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Vu:2011:BRA,
  author =       "Jodat Vu",
  title =        "Book Review: {{\booktitle{The art of multiprocessor
                 programming}} by Maurice Herlihy and Nir Shavit}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "52--53",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021006",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{White:2011:BRR,
  author =       "Randall L. White",
  title =        "Book Review: {{\booktitle{Reconfigurable embedded
                 control systems: applications for flexibility and
                 agility}} by Mohamed Khalgui and Han-Michale Hanisch}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "5",
  pages =        "53--53",
  month =        sep,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2020976.2021007",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:04 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Misra:2011:SAM,
  author =       "Sanjay Misra and Martha Omorodion",
  title =        "Survey on agile metrics and their inter-relationship
                 with other traditional development metrics",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047430",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In our civilized world today, measurement is very
                 important in every aspect of our lives as a means of
                 quantifying our success or progress in whatever
                 activity we involve ourselves in. Consequently, this
                 paper outlines the various metrics that are utilized in
                 the Agile development process and compares them with
                 the ones used in time past to measure success and
                 progress.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tee:2011:ISS,
  author =       "Sim-Hui Tee",
  title =        "Identifying structural similarity of methods using
                 isomorphic graphs",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047432",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "It is a recommended practice to use overloaded methods
                 in a class for a group of similar operations and
                 functions. However, it is possible that software
                 developers may violate the rule of overloaded methods.
                 In addition, non-overloaded method is used incorrectly
                 sometimes in composing similar functions. This paper
                 presents a technique, using isomorphic graphs, to
                 identify structural similarity between class methods.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2011:ILG,
  author =       "Alok Mishra and Deepti Mishra",
  title =        "Industry linked graduate software engineering
                 curriculum",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047429",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In recent years, Software Engineering (SE) has emerged
                 as an independent and mature discipline. In this
                 context, various studies are being done to provide
                 guidelines for undergraduate about graduate software
                 engineering curriculum design. This article presents
                 need of software industry related courses and discusses
                 significance of industry linked software engineering
                 education to meet educational objectives of all
                 stakeholders. Software industry oriented curriculum for
                 graduate level are discussed. Software industry aligned
                 courses will facilitate to increase their employment
                 prospects in industrial and other sectors.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2011:TBM,
  author =       "Anup Kumar Bandyopadhyay",
  title =        "{TLRO} based modeling of alternative commands and its
                 application to generalized distributed resource
                 allocation problem",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047421",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There are systems where alternative constructs need to
                 be used for its description. In weakest precondition
                 calculus disjunction of the post conditions of
                 constituent guarded commands is used as the post
                 condition of an alternative construct. Such
                 representation is not suitable because it does not
                 express a one to one correspondence between a guard and
                 the relevant component of the characterized post
                 condition. In this paper Temporal Logic Related to
                 Observation (TLRO) is used to solve this problem. Each
                 guarded command is expressed as a TLRO rule by using
                 its strongest post condition and the corresponding
                 precondition. List of these representations for all the
                 constituent guarded commands is the required model.
                 Technique is illustrated by considering a common sense
                 scenario. The scheme is then applied to a generalized
                 resource allocation algorithm which is a weaker version
                 of Drinking Philosophers problem.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumari:2011:CCM,
  author =       "Usha Kumari and Sucheta Bhasin",
  title =        "A composite complexity measure for component-based
                 systems",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047426",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The increasing importance of software measurement has
                 led to design and development of new software measures.
                 Controlling and minimizing software complexity is the
                 most important objective of each software development
                 paradigm because it affects all other software quality
                 attributes like reusability, reliability, testability,
                 maintainability etc. For this purpose, a number of
                 software complexity measures have been reported to
                 quantify different aspects of complexity.
                 Component-based software development (CBSD) is an
                 evolving paradigm where emphasis is laid on reuse of
                 existing components and effective designing of new
                 components. As the development of component-based
                 software is rising, more and more complexity metrics
                 are being developed for the same. In this paper, we
                 have attempted to design a composite complexity measure
                 to quantify important aspects of complexity of a
                 component-based system. The proposed measure takes into
                 account two major complexities of a component-based
                 system: one due to individual component and the other
                 due to its interaction with other components.
                 Individual component complexity may arise due to size
                 of a component, type and nesting level of control
                 structures present in code component. Component's
                 interaction complexity may be due to its interface with
                 other components. Graph theoretic notions and concept
                 of weights have been used to illustrate interaction
                 among software components and to compute complexity.
                 The proposed measure has been applied to four cases
                 chosen for present study and yields quiet encouraging
                 results which may further help in controlling the
                 complexity of component-based systems so as to minimize
                 both integration and maintenance efforts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Miranda:2011:TBP,
  author =       "Eduardo Miranda",
  title =        "Time boxing planning: buffered {Moscow} rules",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047428",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Time boxing is a management technique which
                 prioritizes schedule over deliverables but time boxes
                 which are merely a self, or an outside, imposed target
                 without agreed partial outcomes and justified certainty
                 are at best, an expression of good will on the part of
                 the team. This essay proposes the use of a modified set
                 of Moscow rules which accomplish the objectives of
                 prioritizing deliverables and providing a degree of
                 assurance as a function of the uncertainty of the
                 underlying estimates.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Suri:2011:ATC,
  author =       "Bharti Suri and Shweta Singhal",
  title =        "Analyzing test case selection and prioritization using
                 {ACO}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047431",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Regression testing is primarily a maintenance activity
                 that is performed frequently to ensure the validity of
                 the modified software. In such cases, due to time and
                 cost constraints, the entire test suite cannot be run.
                 Thus, it becomes essential to select or prioritize the
                 tests in order to cover maximum faults in minimum time.
                 Recently, Ant Colony Optimization (ACO), which is a new
                 way to solve time constraint prioritization problem,
                 has been utilized. This paper presents the analysis of
                 the regression test prioritization technique to reorder
                 test suites in time constraint environment along with
                 the sample runs on various programs. Our analysis
                 concluded that the ACO finds better orderings at higher
                 values of the time constraint (TC). The correctness of
                 the technique has also been recorded to be near optimal
                 at an average.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yu:2011:CIE,
  author =       "Liguo Yu",
  title =        "Coevolution of information ecosystems: a study of the
                 statistical relations among the growth rates of
                 hardware, system software, and application software",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047435",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "With the increasing use of information technology,
                 information ecosystems have emerged. Information
                 ecosystems not only include software products, but also
                 include hardware products. For example, application
                 software depends on system software, and both
                 application software and system software depend on
                 hardware devices. Together, they play important roles
                 in an information ecosystem. This paper analyzes the
                 coevolution of information ecosystem, where three
                 representatives of computer hardware, system software,
                 and application software products are studied.
                 Specifically, we analyze (1) the growth rate of Intel
                 processors, Linux operating systems, and Apache web
                 servers; and (2) the statistical relations among the
                 evolution of Intel processors, Linux operating systems,
                 and Apache web servers. Our study finds that a system
                 software product grows slower than its supporting
                 hardware products and a application software product
                 grows slower than its supporting system software and
                 hardware products.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2011:MSR,
  author =       "Ravinder Kumar and Kiran Khatter and Arvind Kalia",
  title =        "Measuring software reliability: a fuzzy model",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047425",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software reliability is an essential part of software
                 engineering to ensure the quality of a system. There
                 are various techniques, which can be used in building
                 models for predicting quality attributes. This paper
                 presents a Fuzzy model for software reliability
                 prediction. We have proposed three parameters
                 Availability, Failure Probability and Recoverability as
                 an integrated measure of software reliability. Fuzzy
                 Model provides a way to arrive at a discrete
                 Reliability Non-functional requirement (NFR) in
                 contrast to imprecise, vague and ambiguous. This model
                 will help us to evolve intermediate stages between
                 reliable state and unreliable state of a system.
                 Results obtained by proposed model show that this is
                 suitable for predicting software reliability of the
                 software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tyagi:2011:RCB,
  author =       "Kirti Tyagi and Arun Sharma",
  title =        "Reliability of component based systems: a critical
                 survey",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047434",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software reliability is defined as the probability of
                 the failure free operation of a software system for a
                 specified period of time in a specified environment.
                 Day by day software applications are growing more
                 complex and with more emphasis on reuse. Component
                 Based Software (CBS) applications have emerged. The
                 focus of this paper is to provide an overview for the
                 state of the art of Component Based Systems reliability
                 estimation. In this paper, we discussed various
                 approaches in terms of their scope, model, methods,
                 technique and validation scheme. This comparison
                 provides insight into determining the direction of
                 future CBS reliability research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Langsworth:2011:USA,
  author =       "Anthony Langsworth",
  title =        "Using static analysis tools to detect and correct
                 non-compliant cryptography",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047427",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Security is an increasing concern for application
                 developers, whether they are targeting internal
                 customers, organizations or the general public.
                 Particularly for the US public sector with requirements
                 like FIPS 140, developers need to identify and remove
                 superseded cryptography in both legacy applications and
                 new development. This paper outlines a mechanism using
                 static analysis tools to find outdated or improper
                 cryptography and suggest corrections or correct code.
                 This prevents the need for manual inspection and
                 correction by developers familiar with cryptography and
                 is more accurate than text searches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Khatri:2011:MBC,
  author =       "Sujata Khatri and R. S. Chhillar and V. B. Singh",
  title =        "Measuring bug complexity in object oriented software
                 system",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047424",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/python.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Bugs are inevitable in any software development life
                 cycle. Most bugs are detected and removed in the
                 testing phase. In software, we can classify bugs into
                 two categories: (1) bugs of different severity, from a
                 user's perspective,(how much damage the bug does) and
                 (2) bugs of different complexity(how much is the
                 debugging time lag between detection and correction).
                 Prior knowledge of bug distribution of different
                 complexity can help project managers in allocating
                 testing resources and tools. Various researchers have
                 proposed models for determining the proportion of bugs
                 present in software of different complexity but none of
                 these models have been applied to object oriented
                 software. In this paper, we have proposed a model that
                 will determine the proportion of different bug
                 complexity. The paper also suggests the suitability of
                 the proposed model for a particular data set. We have
                 taken two data sets based on object oriented
                 methodology namely SQL for Python and SQuirreL SQL
                 Client software developed under open source
                 environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Thakur:2011:DRB,
  author =       "Garima Thakur and Anjana Gosain",
  title =        "{DWEVOLVE}: a requirement based framework for data
                 warehouse evolution",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047433",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data warehouse integrate information from numerous
                 data sources under a unified schema and format to
                 provide effective results from multidimensional data
                 analysis in order to facilitate reporting and trend
                 analysis. These information sources are dynamic in
                 nature and keep on changing owing to the autonomous
                 nature of transactions being carried out in the
                 organization along with the complexity involved in
                 gathering requirements from the users. Requirements
                 elicitation and collection is difficult to perform
                 because user needs keep on changing. As a consequence,
                 the data warehouse must evolve so that it improves the
                 data quality by easily incorporating the changes in
                 requirements as well as source schema. In this paper we
                 present a theoretical framework called DWEVOLVE to
                 support data warehouse evolution. The proposed
                 framework enhances the functionality of previously
                 designed framework by taking into account the
                 requirements specified by the users. Provisions have
                 also been made to define and generate customized
                 reports according to the user needs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhatia:2011:FCM,
  author =       "Nitin Bhatia and Namarta Kapoor",
  title =        "Fuzzy cognitive map based approach for software
                 quality risk analysis",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047422",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents a software risk prediction tool
                 for risk analysis during the development of a software
                 product. The term ``Risk'' refers to a problem that can
                 threaten the success of the software project but has
                 not happened yet. Risks are uncertain. The main
                 objective of each organization is to provide very high
                 quality software to their customers. The term
                 ``Quality'' is a value to the person. But there is a
                 long list of software risks that can have adverse
                 impact on the quality of the software. It is necessary
                 to address all the risks; otherwise, they may lead to
                 undesireable results. Fuzzy Cognitive Maps (FCMs)
                 describe different concepts with different aspects of
                 the behaviour of complex systems. A software tool based
                 upon FCM has been developed for assessing software
                 risks. This paper describes the reasoning behind the
                 focus on risk management during the software
                 development process and its importance in delivering
                 high quality software by assessing software risks
                 during the development process using fuzzy cognitive
                 maps.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chhillar:2011:EAO,
  author =       "Rajender Singh Chhillar and Nisha",
  title =        "Empirical analysis of object-oriented design metrics
                 for predicting high, medium and low severity faults
                 using {Mallows Cp}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047423",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "An object-oriented approach has become a commonly-used
                 method in software-related activities. Many design
                 metrics for object-oriented systems have been proposed
                 and also employed for predicting and managing the
                 quality of processes and products. To enhance the
                 practical utility of object-oriented metrics in
                 software industry, various researchers have tried to
                 find relations between these metrics and fault
                 proneness, but very few focus on relating them with the
                 number-of-faults in different levels as per their
                 severity rating. In this study, empirical validation is
                 carried out on object-oriented design metrics (i.e.
                 Chidamber and Kemerer CK-metrics suite and source lines
                 of codes) for predicting number-of-faults in different
                 severity levels. Different statistical methods are used
                 to analyze the data, including correlation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2011:ESEb,
  author =       "Larry Bernstein",
  title =        "Eternal software engineering cross feature\slash
                 architecture design simplifications",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "6--6",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047415",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2011:SPH,
  author =       "Robert Schaefer",
  title =        "Software perspectives on history, culture and
                 efficiency",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "6--7",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047416",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2011:SEEc,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software Engineering Education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "7--8",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047417",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2011:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "9--18",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047418",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2011:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "19--23",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047419",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Acton:2011:BRL,
  author =       "Dorothy Acton",
  title =        "Book Review: {{\booktitle{Leadership, teamwork and
                 trust: building a competitive software capability}} by
                 Watts S. Humphrey and James W. Over}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "28--28",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047436",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ausden:2011:BRB,
  author =       "Howard Ausden",
  title =        "Book Review: {{\booktitle{Building parallel, embedded,
                 and real-time applications with Ada}} by John W.
                 McCormick, Frank Singhoff and Jerome Hugues}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "28--29",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047437",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/adabooks.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2011:MBD,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Model-based development:
                 applications}}, by H. S. Lahman}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "29--29",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047438",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2011:BRB,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Brave NUI world: designing
                 natural user interfaces for touch and gesture}} by
                 Daniel Wigdor and Dennis Wixon}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "29--30",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047439",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saur:2011:NSM,
  author =       "Joe Saur",
  title =        "Network science for military coalition operations:
                 information exchange and interaction by Dinesh
                 {Verma}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "30--30",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047440",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2011:BRI,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Integrating and extending
                 BIRT}} 3rd edition by J. Weathersby, T. Bondurand, and
                 I. Chatalbasheva}",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "31--31",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047441",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2011:LFE,
  author =       "Will Tracz",
  title =        "{Lord} of the files: essays on the social aspects of
                 software engineering by Russel Ovans",
  journal =      j-SIGSOFT,
  volume =       "36",
  number =       "6",
  pages =        "31--31",
  month =        nov,
  year =         "2011",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2047414.2047442",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:07 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Johari:2012:VOO,
  author =       "Kalpana Johari and Arvinder Kaur",
  title =        "Validation of object oriented metrics using open
                 source software system: an empirical study",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088893",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In today's environment the relevance of Free Open
                 Source Software Systems is understood and appreciated
                 both in academia and research. The debate about the
                 pros and cons of the open source vis-{\`a}-vis
                 proprietary software has been raging from ages ever
                 since Richard Stallman founded the Free Software
                 Foundation in 1985. With the changing trends in the
                 domain of Object Oriented Systems there is a need to
                 measure the fault predictability of software metrics on
                 open source software systems. In this paper we present
                 the results of empirical study which was conducted
                 using open source software, JHotDraw 7.5.1. We computed
                 the object oriented metrics, proposed by Chidamber and
                 Kemmerer, and performed bug-class mapping for the
                 software under study. We also studied the relationship
                 between the revisions made to open source software and
                 its software metrics measure.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Santos:2012:ICC,
  author =       "Bruno F. L. Santos and Hendrik T. Macedo",
  title =        "Improving {CUDA{\TM} C\slash C++} encoding readability
                 to foster parallel application development",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088897",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/pvm.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Graphical Processing Units (GPUs) have recently been
                 used to enable parallel application development. The
                 most prominent initiative has been provided by
                 NVIDIA{\TM} with the so-called CUDA{\TM} architecture,
                 designed to GeForce{\TM} graphic cards. However, even
                 with CUDA C-like programming language, parallel
                 codification remains somewhat awkward if compared to
                 sequential codification. The programmer still has to
                 deal with low-level hardware details such as generation
                 and synchronization of threads and GPU tracks and
                 sectors. In this paper, we propose a
                 programmer-friendly interface for CUDA-C programming,
                 in such a way that most hardware details are hidden
                 from the programmer. We show how code readability is
                 improved without undermining parallel execution
                 performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Varona:2012:ESE,
  author =       "Daniel Varona and Luiz Fernando Capretz and Yadenis
                 Pi{\~n}ero and Arif Raza",
  title =        "Evolution of software engineers' personality profile",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088901",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Myers-Briggs Type Indicator (MBTI) has been
                 applied to several studies that explore various
                 dimensions of human factors in software engineering.
                 Accordingly, this work reviews the results of these
                 studies to explore existing trends. In order to attain
                 a greater understanding of human resources in the
                 software industry, we have reviewed sixteen studies
                 that had been performed between 1985 and 2011. This
                 review concludes that the changes in the complexity of
                 software processes and products have created new roles
                 and demanded new skills for software engineers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krishnamurthy:2012:PBA,
  author =       "Vallidevi Krishnamurthy and Chitra Babu",
  title =        "Pattern based adaptation for service oriented
                 applications",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088894",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture(SOA) facilitates
                 developing applications that are inherently dynamic in
                 nature since the service binding happens at runtime by
                 matching the functional as well as Quality of
                 Service(QoS) requirements of the user. Further, the
                 running application can be dynamically reconfigured by
                 monitoring the application for possible violations in
                 the agreed QoS requirements. This paper advocates the
                 use of various patterns to facilitate such dynamic
                 reconfiguration in the various layers of the SOA
                 Reference Architecture. Towards this objective, Family
                 of Adapters pattern has been used in the service
                 component layer to achieve dynamic switching between
                 different versions of the same service without human
                 intervention. In addition, an SOA design pattern has
                 been employed in the business process layer to enhance
                 the efficiency of the application. This pattern based
                 approach has been tested by applying it to a sample SOA
                 based e-Shopping application case study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2012:AST,
  author =       "Pradeep Kumar and Yogesh Singh",
  title =        "Assessment of software testing time using soft
                 computing techniques",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088895",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Application of a soft computing approach in place of
                 traditional statistical techniques has shown a
                 remarkable improvement in reliability prediction. This
                 paper examines and compares Linear Regression (LR) and
                 five machine learning methods: (Artificial Neural
                 Network, Support Vector Machine, Decision Tree, Fuzzy
                 Inference System and Adaptive Neuro-Fuzzy Inference
                 System). These methods are explored empirically to find
                 the effect of severity of errors for the assessment of
                 software testing time. We use two publicly available
                 failure datasets to analyse and compare the regression
                 and machine learning methods for assessing the software
                 testing time. The performance of the proposed model is
                 compared by computing mean absolute error (MAE) and
                 root mean square error (RMSE). Based on the results
                 from rigours experiments, it is observed that model
                 accuracy using FIS and ANFIS method is better and
                 outperformed the model predicted using linear
                 regression and other machine learning methods. Finally,
                 we conclude that Adaptive Neuro-fuzzy Inference System
                 is useful in constructing software quality models
                 having better capability of generalization and less
                 dependent on sample size.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mohana:2012:AIP,
  author =       "Rajni Mohana and Deepak Dahiya",
  title =        "Approach and impact of a protocol for selection of
                 service in web service platform",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088896",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Business agility is an important challenge while
                 designing an enterprise application. Service oriented
                 architecture is used to combine many outsourced web
                 services to provide value added services to the users
                 with agility. A service registry is maintained to keep
                 track of various web service published by the service
                 providers. The key challenge for the service requester
                 is to pick the best web service among the various
                 functionally equivalent web services in the service
                 registry. This paper describes and analyses various
                 service selection protocols given by the researchers.
                 The approaches are classified into semantic and
                 non-semantic approach. It also proposes a novel
                 technique to look for the best web service based on QoS
                 like reliability, throughput etc. The solution to the
                 problem of selecting the best web service according to
                 the requirements is designed as a fuzzy expert system.
                 This rule based approach of Service registration and
                 lookup is adaptive and responds dynamically to quality
                 of service changes in the web services.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2012:ADC,
  author =       "Vinay Singh and Vandana Bhattacherjee and Sandeep
                 Bhattacharjee",
  title =        "An analysis of dependency of coupling on software
                 defects",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088899",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Functional independence is a key to good software
                 design and a good design results in high quality
                 software. Functional independence is the refined form
                 of the design concept of modularity, abstraction and
                 information hiding. Coupling is a measure of relative
                 interconnection among modules. Coupling in software has
                 been linked with maintainability and existing metrics
                 are used as predictors of external software quality
                 (e.g., fault -proneness, impact analysis, ripple effect
                 of changes, changeability). In this paper we
                 demonstrate the defects of software due to coupling by
                 studying five different attributes of coupling and
                 measured its impact on software defects.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tekinerdogan:2012:AGS,
  author =       "Bedir Tekinerdogan and Semih Cetin and Muhammad Ali
                 Babar and Patricia Lago and Juho M{\"a}ki{\"o}",
  title =        "Architecting in global software engineering",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088900",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper summarizes the results of the First
                 Workshop on Architecting in Global Software Engineering
                 (GSE), which was organized in conjunction with the 6th
                 International Conference on Global Software Engineering
                 (ICGSE 2011). The workshop aimed to bring together
                 researchers and practitioners for defining and
                 advancing the state-of-the-art and state-of-the
                 practice in architecture design of global software
                 development systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jiau:2012:FIC,
  author =       "Hewijin Christine Jiau and Feng-Pu Yang",
  title =        "Facing up to the inequality of crowdsourced {API}
                 documentation",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--9",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088892",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "API usability is a crucial issue in software
                 development. One bottleneck of API usability is
                 insufficient documentation. This study empirically
                 confirmed the inequality of crowdsourced API
                 documentation, which is one of the main sources of API
                 documentation. To manage the inequality, a method for
                 documentation reuse is proposed based on the nature of
                 object-oriented programming language, inheritance. A
                 case study was conducted in Stackoverflow, which is a
                 widely used Q \& A site, to study the feasibility of
                 the documentation reuse. Results of the case study
                 indicate that documentation reuse is feasible in
                 improving both the coverage and quality of crowdsourced
                 API documentations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2012:ARB,
  author =       "Ashish Sharma and D. S. Kushwaha",
  title =        "Applying requirement based complexity for the
                 estimation of software development and testing effort",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--11",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088898",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The need of computing the software complexity in
                 requirement analysis phase of software development life
                 cycle (SDLC) would be an enormous benefit for
                 estimating the required development and testing effort
                 for yet to be developed software. Various research
                 proposals are directed towards minimizing the cost of
                 software. Also, a relationship between source code and
                 difficulty in developing a source code are also
                 attempted in order to estimate the complexity of the
                 proposed software for cost estimation, man power build
                 up, code and developer's evaluation. Therefore, this
                 paper presents a systematic and integrated approach for
                 the estimation of software development and testing
                 effort on the basis of improved requirement based
                 complexity (IRBC) of the proposed software. The IRBC
                 measure serves as the basis for estimation of these
                 software development activities to enable the
                 developers and practitioners to predict the critical
                 information about the software development intricacies.
                 Efficient software development requires accurate
                 estimates, since inappropriate estimates causes'
                 trouble during implementation of software process.
                 Hence, this paper presents a comprehensive approach,
                 for the prediction of software development and testing
                 effort using IRBC. For validation purpose, the proposed
                 measures are categorically compared with various
                 established and prevalent practices proposed in the
                 past like code based, use case based, algorithmic model
                 and function point based estimation measures. Finally,
                 the results obtained, validates the claim, for the
                 approaches discussed in this paper, for estimation of
                 software development and testing effort, in the early
                 phases of software development appears to be robust,
                 comprehensive, early alarming and compares well with
                 other measures proposed in the past. Hence, it is even
                 more useful because the complexity, development and
                 testing effort estimates are obtained at very early
                 stage.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Banerjee:2012:DAB,
  author =       "A. Banerjee and S. Ray and P. Dasgupta and P. P.
                 Chakrabarti and S. Ramesh and P. Vignesh and V.
                 Ganesan",
  title =        "A dynamic assertion-based verification platform for
                 validation of {UML} designs",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "1--14",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088891",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Capacity limitations continue to impede widespread
                 adoption of formal property verification in the design
                 validation flow of software and hardware systems. The
                 more popular choice (at least in the hardware domain)
                 has been dynamic property verification (DPV), which is
                 a semi-formal approach where the formal properties are
                 checked over simulation runs. DPV is highly scalable
                 and can support a rich specification language. The main
                 contribution of this paper is to build an integrated
                 DPV platform for validation of UML-based designs.
                 Specifically, we present (a) a language, named
                 Action-LTL (a simple extension of Linear Temporal
                 Logic) for writing assertions over data attributes and
                 events of UML models, and (b) an integrated dynamic
                 assertion-verification platform for verification of UML
                 designs. In view of the capacity limitations of
                 existing formal property verification tools, we believe
                 that the methods presented in this paper are of
                 immediate practical value to the UML design
                 community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:CAS,
  author =       "Larry Bernstein",
  title =        "Cross avoid shelf-ware by making your systems
                 easy-to-use",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "8--9",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088884",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2012:FT,
  author =       "Michael Wing",
  title =        "Food for thought",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "9--10",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088885",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEa,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "10--11",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088886",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "12--20",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088887",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "21--26",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088888",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krein:2012:RIW,
  author =       "Jonathan L. Krein and Charles D. Knutson and Lutz
                 Prechelt and Natalia Juristo",
  title =        "Report from the {2nd International Workshop on
                 Replication in Empirical Software Engineering Research
                 (RESER 2011)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "27--30",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088889",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The RESER workshop provides a venue in which empirical
                 software engineering researchers can discuss the
                 theoretical foundations and methods of replication, as
                 well as present the results of specific replicated
                 studies. In 2011, the workshop co-located with the
                 International Symposium on Empirical Software
                 Engineering and Measurement (ESEM) in Banff, Alberta,
                 Canada. In addition to several outstanding paper
                 sessions, highlights of the 2011 workshop included a
                 keynote address by Dr. Victor R. Basili, in which he
                 addressed the question, ``What's so hard about
                 replication of software engineering experiments?'' The
                 workshop also featured a joint replication panel
                 session discussing the first cooperative joint
                 replication ever conducted in empirical software
                 engineering research and a planning session for next
                 year's joint replication project addressing Conway's
                 Law.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Cooper:2012:BRD,
  author =       "Greg Cooper",
  title =        "Book Review: {{\booktitle{DTrace: dynamic tracing in
                 Oracle Solaris, Mac OS X, and FreeBSD}} by Brendan
                 Gregg and Jim Mauro}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "34--34",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088902",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Glass:2012:BRM,
  author =       "Robert L. Glass",
  title =        "Book Review: {{\booktitle{Managing projects in
                 trouble: achieving turnaround and success}} by Ralph L.
                 Kliem}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "34--34",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088903",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gousios:2012:BRS,
  author =       "Georgios Gousios",
  title =        "Book Review: {{\booktitle{Scalability rules 50
                 principles for scaling web sites}} by Martin L. Abbott
                 and Michael T. Fisher}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "35--35",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2139179",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2012:BRE,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{The Eclipse graphical
                 editing framework (GEF)}} by D. Rubel, J. Wren, and E.
                 Clayberg}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "35--35",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088905",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mendell:2012:BRP,
  author =       "Matt Mendell",
  title =        "Book Review: {{\booktitle{A practical guide to Fedora
                 and Red Hat enterprise Linux}} by Mark G. Sobell}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "36--36",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088907",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2012:BRC,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Continuous testing with
                 Ruby, Rails and JavaScript}} by Ben Rady and Rod
                 Coffin}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "36--36",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088906",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hathhorn:2012:BRE,
  author =       "Chris Hathhorn",
  title =        "Book Review: {{\booktitle{Engineering a compiler}},
                 second edition by Keith D. Cooper and Linda Torczon}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "36--37",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088908",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2012:BRB,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{The book of Ruby}} by Huw
                 Collingbourne}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "37--37",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088909",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2012:BHD,
  author =       "Will Tracz",
  title =        "A bug hunter's diary: a guided tour through the wilds
                 of software security by Tobias {Klein}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "1",
  pages =        "37--38",
  month =        jan,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2088883.2088910",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:09 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Khan:2012:IQM,
  author =       "Suhel Ahmad Khan and Raees Ahmad Khan",
  title =        "Integrity quantification model for object oriented
                 design",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--3",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108154",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Various surveys indicate that over the past several
                 years software security has risen in priority for many
                 software organizations. Security quantification in
                 early stage of software development life cycle assists
                 security experts to address security related problems
                 well in advance. Security assessment using model is
                 proved to be one of the established methods. Keeping in
                 view of the same, an Integrity Quantification Model
                 (IQM) is proposed in this paper. An effort is made by
                 authors to correlate design integrity with complexity
                 factors. Object oriented design metrics are used to
                 quantify complexity factors. The developed model has
                 been validated with realistic (small set of) data to
                 prove the significance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Eisenberg:2012:TBA,
  author =       "Robert J. Eisenberg",
  title =        "A threshold based approach to technical debt",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108151",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Nearly two decades ago, Ward Cunningham introduced us
                 to the term ``technical debt'' as a means of describing
                 the long term costs associated with a suboptimal
                 software design and implementation. For most programs,
                 especially those with a large legacy code baseline,
                 achieving zero absolute debt is an unnecessary and
                 unrealistic goal. It is important to recall that a
                 primary reason for managing and eliminating debt is to
                 drive down maintenance costs and to reduce defects. A
                 sufficiently low, manageable level of debt can minimize
                 the long-term impact, i.e., ``low debt interest
                 payments''. In this article, we define an approach for
                 establishing program specific thresholds to define
                 manageable levels of technical debt.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Harikrishnan:2012:SEN,
  author =       "S. Harikrishnan and Rajeev Kumar",
  title =        "Space efficient non-constant time multi-method
                 dispatch in object oriented systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108153",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Multi-method dispatch in object oriented programs
                 provides additional expressibility, readability and
                 elegance over single dispatch languages. Optimizing
                 multi-method dispatch is a central issue in compilers
                 that support multi-methods. Existing constant time
                 dispatch techniques for multi-methods keep either a
                 lookup table or a lookup tree after compressing the
                 same, the size of which can still be large if
                 compression is not effective. In this paper, we propose
                 a space efficient non-constant time technique (each
                 method address should be computed --- rather than being
                 looked up) for multi-method dispatch with single
                 inheritance type hierarchies. The method table
                 containing all the multi-method signatures is the only
                 data structure kept at run time. The table is arranged
                 by sorting on argument position to expedite method
                 search during dispatch. Heuristics is used during
                 method search such that those methods which are not
                 potential candidates are not included in the search.
                 The proposed technique saves space significantly while
                 the dispatch time grew higher compared to existing
                 techniques. When multi-method counts were within
                 practical bounds, the proposed technique was found to
                 offer dispatch time similar to existing techniques.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Majumdar:2012:ICF,
  author =       "Dipankar Majumdar and Swapan Bhattacharya",
  title =        "Interoperability of constrained finite state
                 automata",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--8",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108155",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Finite State Automata have been extended in a number
                 of ways with varied additional constraints with an
                 objective of modeling varied real life problems. The
                 current paper commonly refers to such extensions as
                 constrained automata. It aims at defining a generic
                 mathematical model for the constrained automata
                 targeted towards interoperability and possible
                 integration amongst them. The paper proposes and
                 demonstrates usage of hyper complex symbols that
                 realizes the objective.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gaur:2012:AIM,
  author =       "Vibha Gaur and Anuja Soni",
  title =        "Analytical inference model for prediction and
                 customization of inter-agent dependency requirements",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108152",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Inter-agent communication is one of the main concerns
                 of Agent Oriented Requirements Engineering (AORE). The
                 concern is delineated as managing inter-dependencies
                 and interaction among various agents performing
                 collaborative activities. To carry out cooperative
                 activities, the application areas viz. electronic
                 commerce and enterprise resource planning in the
                 distributed environment require an agent to predict and
                 customize dependency needs termed as Degree of
                 Dependency (DoD) so that the goal may be obtained
                 within resource constraints and with optimal number of
                 agents. To quantify and predict exertion load of an
                 agent within resource constraints, this paper proposes
                 an Analytical Inference Model (AIM) that would
                 facilitate the developer to evaluate and envisage DoD
                 and hence analyze the optimum number of agents to
                 obtain predicted DoD. In this work, Adaptive Neuro
                 Fuzzy Inference System (ANFIS) combining the potential
                 benefits of Artificial Neural Network (ANN) and Fuzzy
                 Logic (FL) is employed to discover the linear
                 relationship in input domain attributes and DoD. The
                 resultant optimization of exertion loads would
                 immensely improve the quality of the Multi-Agent
                 System. The hybrid, as well as back propagation
                 learning algorithm, is employed to adapt from training
                 data. The bestfitness of proposed model against test
                 data is examined by the performance
                 indicators-Coefficient of Correlation (CORR) and the
                 Normalized Root Mean Square Error (NRMSE). It is
                 observed that hybrid learning algorithm outperforms the
                 back propagation algorithm.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{M:2012:ESG,
  author =       "Krishna Raj P. M. and Srinivasa K. G.",
  title =        "Empirical studies of global volunteer collaboration in
                 the development of free and open source software:
                 analysis of six top ranked projects in {\tt
                 sourceforge.net}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108156",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Sourceforge.net is the largest portal hosting Free and
                 Open Source Software (FOSS). Among the projects
                 available in sourceforge.net, six top ranked projects
                 are selected for studying global volunteer
                 collaboration patterns over a period of 6 years
                 (2005--2011). It is found that a small set of
                 volunteers do most of the work in these projects. The
                 growth rate of volunteers, identification of core
                 developers, join and drop rate of volunteers, task
                 allocation and rate of task completion, movement of
                 existing volunteers among different projects and the
                 rate of new volunteer inclusion are also studied.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2012:ERM,
  author =       "Satwinder Singh and K. S. Kahlon",
  title =        "Effectiveness of refactoring metrics model to identify
                 smelly and error prone classes in open source
                 software",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108157",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In order to improve software maintainability, possible
                 improvement efforts must be made measurable. One such
                 effort is refactoring the code which makes the code
                 easier to read, understand and maintain. It is done by
                 identifying the bad smell area in the code. This paper
                 presents the results of an empirical study to develop a
                 metrics model to identify the smelly classes. In
                 addition, this metrics model is validated by
                 identifying the smelly and error prone classes. The
                 role of two new metrics (encapsulation and information
                 hiding) is also investigated for identifying smelly and
                 faulty classes in software code. This paper first
                 presents a binary statistical analysis of the
                 relationship between metrics and bad smells, the
                 results of which show a significant relationship. Then,
                 the metrics model (with significant metrics shortlisted
                 from the binary analysis) for bad smell categorization
                 (divided into five categories) is developed. To develop
                 the model, three releases of the open source Mozila
                 Firefox system are examined and the model is validated
                 on one version of Mozila Sea Monkey, which has a strong
                 industrial usage. The results show that metrics can
                 predict smelly and faulty classes with high accuracy,
                 but in the case of the categorized model, not all
                 categories of bad smells can adequately be identified.
                 Further, few categorised models can predict the faulty
                 classes. Based on these results, we recommend more
                 training for our model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:PSE,
  author =       "Larry Bernstein",
  title =        "Pithy software engineering quotes",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "6--7",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108160",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2012:SLA,
  author =       "Robert Schaefer",
  title =        "The secret life of academic papers",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "7--8",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108161",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEb,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software Engineering Education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "8--10",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108162",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "11--20",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108163",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "21--29",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108164",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tekinerdogan:2012:RTA,
  author =       "Bedir Tekinerdogan",
  title =        "Reflection on {Turkish} aspect-oriented software
                 development workshop series",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "30--33",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108165",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the last decade aspect-oriented software
                 development (AOSD) has gained a broad interest in both
                 academic institutions and industry. Likewise, several
                 international conferences and workshops have been
                 organized around the topic of AOSD. This paper
                 summarizes the results of the national Turkish
                 Aspect-Oriented Software Development Workshop series
                 that have been organized in the last decade with the
                 goal to stimulate the research and education on AOSD in
                 Turkey. The fifth workshop was organized in December
                 2011. Aspects identified and demonstrated during the
                 workshops have been collected in the so-called Aspect
                 Browser. We report both on the experiences from the
                 workshop series and the resulting aspect browser.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2012:BRSa,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Software systems
                 architecture}}, second edition, by Nick Rozanski and
                 Eoin Woods}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "36--36",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108171",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Eisenberg:2012:MSD,
  author =       "Robert Eisenberg",
  title =        "Managing software debt building for inevitable change
                 by Chris Sterling",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "36--37",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108172",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ngo:2012:BRE,
  author =       "Terry Ngo",
  title =        "Book Review: {{\booktitle{Essential app engine:
                 building high-performance Java apps with Google app
                 engine}} by Adriaan de Jonge}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "37--37",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108173",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2012:BRW,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Work item management with
                 IBM rational ClearQuest and Jazz: a customization
                 guide}} by Shmuel Bashan and David E. Bellagio}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "2",
  pages =        "37--38",
  month =        mar,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2108144.2108174",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:11 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rosenblum:2012:LCa,
  author =       "David S. Rosenblum",
  title =        "Letter from the Chair",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2370934",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Reddy:2012:DWU,
  author =       "K. Sudheer Reddy and G. Partha Saradhi Varma and M.
                 Kantha Reddy",
  title =        "Discovering web usage patterns by using an innovative
                 practical approach",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180939",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Pattern mining is one of the most pivotal steps in the
                 data mining is pattern mining and it immediately comes
                 after the preprocessing phase of WUM. Pattern discovery
                 deals with the sorted set of data items are presented
                 as part of the sequence. Using this pattern mining,
                 users can recognize the web paths that users commonly
                 follow on a web site easily. This research discovers
                 the most relevant and interesting behavioral patterns
                 by using a Web usage mining process. The server web
                 logs aids as an input to this process. We aim to
                 identify behavioral patterns of the users who typically
                 visit the web sites occasionally. We have employed a
                 method for clustering, based on pattern summaries. We
                 have conducted intense experiments and the results are
                 shown in this paper",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tiwari:2012:MCA,
  author =       "Manisha Tiwari and Padmaja Joshi",
  title =        "Method cohesion analysis through concept lattices",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180924",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Cohesion in object oriented technology is usually
                 associated with a class and hence majority of the
                 available cohesion metrics capture cohesion of classes.
                 Methods which are the main contributors to class
                 cohesion are not analyzed for their internal
                 cohesiveness. This concept paper proposes method
                 cohesion analysis through concept lattices. The
                 approach facilitates rapid identification of elements
                 (statements or variables) in methods that are less
                 cohesive with respect to the remaining part of the
                 method. The paper discusses the analysis and
                 interpretation of cohesion lattices. The approach is
                 demonstrated through dummy examples",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Arora:2012:SUM,
  author =       "Deepak Arora and Bramah Hazela and Vipin Saxena",
  title =        "Semantics for {UML} model transformation and
                 generation of regular grammar",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180931",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Graphs are one of the most popular non linear data
                 structures used to represent various data objects.
                 These graphical structures can further be classified
                 into directed and undirected graph representations. For
                 modeling purpose, UML has adopted the phenomenon of
                 directed graphical structures as statechart diagrams,
                 to exhibit dynamic specification of any software or non
                 software system. These diagrams are important as they
                 are used to represent all possible values that an
                 object can retain throughout its life cycle. Three key
                 components are required to change the state of any
                 object namely transition function, action and possible
                 inputs. Statechart diagrams are also useful to
                 determine all possible paths that an object will
                 undergo during its entire life span, while changing its
                 state. Further these paths can be represented with the
                 help of various established graphical modeling
                 techniques like Finite State Automata. The mapping and
                 further analysis of these path structures can be very
                 helpful in determining the correctness of the diagram
                 as well as to highlight the possible deficiencies in
                 the diagram. In the present work, authors have proposed
                 semantics for automatic transformation of UML
                 statechart diagram into its equivalent finite state
                 automata, by taking the advantage of both of the
                 models. Authors have also presented an approach to
                 generate regular grammar for the generated finite state
                 automata. This equivalent grammar can further be useful
                 to generate various test cases, to test UML statechart
                 diagram, against various test conditions. To better
                 illustrate, authors have also presented a case study of
                 an ATM machine and demonstrated that how this approach
                 is helpful to verify the correctness of design",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Counsell:2012:IAR,
  author =       "Steve Counsell and Stephen Swift",
  title =        "Issues arising from refactoring studies: an experience
                 report",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180922",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In theory, refactoring should reverse the trend in
                 code decay and many studies have explored the different
                 facets of refactoring (both its trends and
                 characteristics). While much progress has been made in
                 this area, a number of observations about refactoring
                 studies have become evident to us over the past seven
                 years in the time during which we have been undertaking
                 empirical studies in this area. This paper outlines our
                 experiences of the issues that arise with refactoring
                 studies. We outline six of those issues, together
                 forming the set of challenges that are still prevalent
                 in this area. The purpose of the paper is thus to put
                 under the spotlight the real potential benefits of
                 refactoring, but more importantly the challenges that
                 our experiences have raised",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gulia:2012:NAG,
  author =       "Preeti Gulia and R. S. Chillar",
  title =        "A new approach to generate and optimize test cases for
                 {UML} state diagram using genetic algorithm",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180933",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is an important part of the software
                 development process. The testing effort is divided into
                 three parts: test case generation, test execution and
                 test evaluation. Test case generation is the center of
                 testing process and automating. It saves time and
                 efforts and reduces the number of errors and faults. To
                 decrease the elevated cost of software testing and to
                 increase the reliability of the testing processes, a
                 new method has been created to automate the testing
                 process. This paper proposes a new approach to generate
                 and optimize test cases from UML State Chart diagram
                 using Genetic Algorithm. To generate the new test
                 sequence the method of crossover has been applied from
                 the Genetic Algorithm and the efficiency of the test
                 sequences is evaluated by Mutation Analysis",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nierstrasz:2012:ASA,
  author =       "Oscar Nierstrasz",
  title =        "Agile software assessment with Moose",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180925",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "During software maintenance, much time is spent
                 reading and assessing existing code. Unfortunately most
                 of the tools available for exploring and assessing
                 code, such as browsers, debuggers and profilers, focus
                 on development tasks, and offer little to support
                 program understanding. We present a platform for
                 software and data analysis, called Moose, which enables
                 the rapid development of custom tools for software
                 assessment. We demonstrate how Moose supports agile
                 software assessment through a series of demos, we
                 illustrate some of the custom tools that have been
                 developed, and we draw various lessons learned for
                 future work in this domain",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Reddy:2012:PWS,
  author =       "K. Sudheer Reddy and G. Partha Saradhi Varma and I.
                 Ramesh Babu",
  title =        "Preprocessing the web server logs: an illustrative
                 approach for effective usage mining",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180940",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data preprocessing is an important activity for
                 discovering behavioral patterns. The analysis of web
                 logs is an essential task for System Administrators to
                 safeguard adequate bandwidth and to maintain server
                 capacity on their business websites. A web Log file
                 represents user activities occurring over a period of
                 time. Web log files offer valuable insight into the
                 effective usage of the web site. It helps maintain an
                 account of the actual usage in a regular working system
                 as compared to the virtual setting of a usability lab.
                 This research paper focuses on the preprocessing
                 techniques implemented on a specially designed Web Sift
                 (WebIS) tool on an IIS web server and also proposes
                 some efficient heuristics and techniques",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2012:PSA,
  author =       "Surender Kumar and Rajeev Kumar",
  title =        "Precise static analysis for generic programs in object
                 oriented languages",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180937",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Genericity enriched with multiple data types and
                 classes is becoming a common feature of object oriented
                 languages. Therefore, static analysis of such generic
                 programs is gaining importance. Unfortunately such work
                 does not exist. In this work, we statically analyse
                 such generic programs for approximating the possible
                 dynamic (run-time) types of objects. We propose a
                 single pass technique for analyzing the generic
                 programs inter-procedurally statement-wise following
                 the control flow of the execution. The technique is
                 able to resolve the covariance, contravariance and
                 invariance relationship existing amongst different
                 instances with type parameters as arguments to a class.
                 We assess the performance of the proposed technique by
                 carrying out experiments on a set of standard benchmark
                 programs",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Benala:2012:CIS,
  author =       "Tirimula Rao Benala and Satchidananda Dehuri and Rajib
                 Mall",
  title =        "Computational intelligence in software cost
                 estimation: an emerging paradigm",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180932",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "One of the key features for the failure of project
                 estimation techniques is the selection of inappropriate
                 estimation models. Further, noisy data poses a
                 challenge to build accurate estimation models.
                 Therefore, the software cost estimation (SCE) is a
                 challenging problem that has attracted many researchers
                 over the past few decades. In the recent times,the use
                 of computational intelligence methodologies for
                 software cost estimation have gained prominence. This
                 paper reviews some of the commonly used computational
                 intelligence (CI) techniques and analyzes their
                 application in software cost estimation and outlines
                 the emerging trends in this area",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jiang:2012:TDG,
  author =       "Shujuan Jiang and Yanmei Zhang and Dandan Yi",
  title =        "Test data generation approach for basis path
                 coverage",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180936",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "On the basis of determining the feasibility of paths,
                 this paper proposes an evolutionary approach to
                 generating test data for feasible basis path coverage.
                 First, the structure of the program under test is
                 expressed by a control flow graph, and the target paths
                 are encoded into the form of hybrid-coding that
                 efficiently combines the statement label with the
                 outcome of a conditional statement (i.e. T or F). Then,
                 the genetic algorithm is employed to generate test data
                 for multiple paths coverage, and the fitness function
                 of an input data (an individual) takes into account the
                 degree of the execution track matching the target
                 paths. Finally, the proposed approach is applied in
                 several benchmark programs. The experimental results
                 show that the proposed approach cannot only avoid
                 redundant test but also improve the efficiency of test
                 data generation effectively",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ripon:2012:UTM,
  author =       "Shamim H. Ripon",
  title =        "A unified tabular method for modeling variants of
                 software product line",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180941",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Reuse of software is a promising approach to improving
                 the efficiency of software development regarding time,
                 cost and quality. Reuse requires a systematic approach.
                 The best results are achieved if we focus on systems in
                 a specific domain, so-called product line. The key
                 difference between the conventional software
                 engineering and software product line engineering is
                 variant management. The main idea of software product
                 line is to identify the common core functionality which
                 can be implemented once and reused afterwards for all
                 members of the product line. To facilitate this reuse
                 opportunity the domain engineering phase makes the
                 domain model comprising the common as well as variant
                 requirements. In principle, common requirements among
                 systems in a family are easy to handle. However,
                 problem arises during handling variants. Different
                 variants have dependencies on each other; a single
                 variant can affect several variants of the domain
                 model. These problems become complex when the volume of
                 information grows in a domain and there are a lot of
                 variants with several interdependencies. Hence, a
                 separate model is required for handling the variants.
                 This paper presents a mechanism, which we call, Unified
                 Tabular Method to facilitate the management of variant
                 dependencies in product lines. The tabular method
                 consists of a variant part to model the variants and
                 their dependencies, and a decision table to depict the
                 customization decision regarding each variant while
                 deriving customized products. Tabular method alleviates
                 the problem of possible explosion of variant
                 combinations and facilitates the tracing of variant
                 information in the domain model",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Anwikar:2012:DDT,
  author =       "Vallabh Anwikar and Ravindra Naik and Adnan Contractor
                 and Hemanth Makkapati",
  title =        "Domain-driven technique for functionality
                 identification in source code",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--8",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180923",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "While migrating existing software systems to Software
                 Product Lines, finding out the functionalities in the
                 software is critical. For maintenance activities like
                 deleting or changing existing features, or adding new
                 similar features, identifying and extracting
                 functionalities from the software is significant. This
                 paper describes a technique for creating mapping
                 between the source code and functionalities implemented
                 by it while exploiting the domain knowledge. The
                 technique is based on the notion of function variables
                 that are used by developers for expressing
                 functionality in the source code. By tracking the known
                 values of the function variables and evaluating the
                 conditions that use them, the mapping is identified.
                 Our technique makes use of static data flow analysis
                 and partial evaluation, and is designed with automation
                 perspective. After applying to few samples representing
                 real-life code structure and programming practices, the
                 technique identified precise mapping of the detailed
                 program elements to functions",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jeet:2012:CSB,
  author =       "Kawal Jeet and Renu Dhir and Harsh Verma",
  title =        "A comparative study of {Bayesian} and fuzzy approach
                 to assess and predict maintainability of the software
                 using activity-based quality model",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--9",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180935",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Quality is considered as one of the most important
                 aspects responsible for the success of the software.
                 The developers as well as the end users of the software
                 have accepted maintainability as a significant
                 characteristic due to its economic implications.
                 Several subjective techniques have been developed in
                 research to assess and predict maintainability but all
                 have been unsuccessful to do it practically and most of
                 them even fail to define it appropriately. The
                 activity-based quality model is one of the techniques
                 that have been found to be successful in defining
                 maintainability. This model assesses maintainability in
                 terms of average efforts required to maintain software
                 but lacks quantitative aspect that has been further
                 added by using Bayesian Network. In this paper, a
                 comparison of the Bayesian approach and Fuzzy approach
                 to deal with this model quantitatively has been done
                 wherein; Fuzzy approach has been found to be better
                 than Bayesian",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Priyanka:2012:EEC,
  author =       "Priyanka and Inderveer Chana and Ajay Rana",
  title =        "Empirical evaluation of cloud-based testing
                 techniques: a systematic review",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--9",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180938",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Testing is a challenging activity for many
                 software engineering projects, especially for large
                 scale systems. The amount of tests cases can range from
                 a few hundred to several thousands, requiring
                 significant computing resources and lengthy execution
                 times. Cloud computing offers the potential to address
                 both of these issues: it offers resources such as
                 virtualized hardware, effectively unlimited storage,
                 and software services that can aid in reducing the
                 execution time of large test suites in a cost-effective
                 manner. In this paper we report on a systematic review
                 of cloud based testing techniques published in major
                 software engineering journals and conferences conducted
                 by other researchers. Research papers were gathered
                 from various scholarly databases using provided search
                 engines within a given period of time. A total of 82
                 research papers are analyzed in this systematic review
                 and we classified it into four categories according to
                 issues addressed by them. We identified majority of the
                 research papers focused on Cloud based Testing and
                 Issues (38 papers) and 23 papers focused on Cloud based
                 Testing Frameworks. By looking at the areas focused by
                 existing researchers, gaps and untouched areas of cloud
                 based testing can be discovered",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gupta:2012:MCS,
  author =       "Daya Gupta and Rinky Dwivedi",
  title =        "Method configuration from situational method
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "1--11",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180934",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents a brief on evolution and
                 subsequent developments in the field of Situation
                 Method Engineering (SME) through exhaustive literature
                 review. The efforts of the various method engineers are
                 gathered, summarized and presented to show the overall
                 growth of this vital discipline. This research paper
                 starts with the assembly-based approaches and moves
                 towards method generation. The paper further analyzes
                 the proposals presented on the architecture of SME
                 processes followed by the OPEN Process Framework (OPF).
                 OPF depend on the four major components-Object-oriented
                 Process, Environment and Notation (OPEN). We evaluate
                 these proposals for various issues leading to method
                 configuration. The survey concludes with the proposals
                 on configurability of methods and current unresolved
                 issues that need to be addressed in one single approach
                 to configure a situation-specific coherent method",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wing:2012:TY,
  author =       "Mike Wing",
  title =        "Thank You",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "7--8",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180926",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEc,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "8--9",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180927",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "10--17",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180928",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "18--25",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2180921.2180929",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shukla:2012:RSE,
  author =       "Rakesh Shukla and Ashish Sureka and Rushikesh Joshi
                 and Rajib Mall",
  title =        "A report on {Software Engineering Education
                 Workshop}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "26--31",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180930",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this report, we present a summary and a few
                 reflections of a one day workshop on Software
                 Engineering Education held on February 22, 2012 at
                 Indian Institute of Technology, Kanpur, India
                 collocated with the 5th India Software Engineering
                 Conference. We identify a gap and believe there is a
                 need for creating an annual discussion forum that
                 serves the need of having a regular workshop for
                 software engineering education in India and also
                 benefit the global software engineering education
                 community by sharing the workshop insights and results
                 by a publication process. The workshop consists of two
                 keynotes, one from academia and one from industry, two
                 subgroups discussions and presentations by the
                 subgroups on their discussions. Three systematic
                 techniques, invitation of position statements, set up
                 of a Google group and an online survey, were employed
                 before the workshop to estimate number of participants,
                 subgroups and size of each subgroup for effective
                 discussions. Twenty participants attended the workshop.
                 The keynotes were on Using Collaborative Learning and
                 Divergent Thinking to Teach Software Engineering and on
                 Software Engineering Competency Development Model.
                 Three topics were selected for subgroups discussions by
                 the participants: use of various methods, such as
                 learning while playing and project-based software
                 engineering, over Power Point lecture, requirements and
                 needs of undergraduate software engineering degree
                 program from the perspective of Indian software
                 industry and curriculum content, coverage, and impact
                 of software engineering courses. The workshop was a
                 successful endeavor and the response in terms of the
                 contributions by participants is a clear indicator and
                 confirmation of the need of having a focused discussion
                 forum for brainstorming on software engineering
                 education in India",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Froberg:2012:BRS,
  author =       "Scott Froberg",
  title =        "Book Review: {{\booktitle{Software Testing}} by Yogesh
                 Singh}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "36--36",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180942",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2012:BRF,
  author =       "Robert Schaefer",
  title =        "Book Review: {{\booktitle{Fundamentals of multicore
                 software development}} by Victor Pankratius, Ali-Reza
                 Adi-Tabatabai, Walter Tichy}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "37--37",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180943",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Swamy:2012:BRSa,
  author =       "Harisankar Krishna Swamy",
  title =        "Book Review: {{\booktitle{Space based technologies and
                 commercialized development: economic implications and
                 benefits}} by Stella Tkatchova}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "37--38",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180944",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2012:BRA,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{ACM Ruby learning path}} by
                 David A. Black}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "3",
  pages =        "38--38",
  month =        may,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/180921.2180945",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:12 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rosenblum:2012:LCb,
  author =       "David S. Rosenblum",
  title =        "Letter from Chair",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2370933",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Cheluvaraju:2012:QMP,
  author =       "Bharath Cheluvaraju and Anjaneyulu Pasala and Srinivas
                 Padmanabhuni and Sadhana Chevireddy",
  title =        "A quantitative measure for preventive maintenance in
                 software",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Several techniques have been developed to identify and
                 fix defects in software before its deployment. However,
                 the challenge is to quantify how well these techniques
                 prevent defects from occurring in the field from a
                 holistic perspective. Therefore, we propose a novel
                 software quality metric called ``The Preventability
                 Metric'' that measures the preventability of defects in
                 software. The metric is derived from a composite
                 quantitative evaluation of the efficiency and
                 effectiveness of the individual preventive techniques
                 employed on software before its deployment. It provides
                 a confidence on how well prevention of defects is
                 handled before deployment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jeet:2012:BNB,
  author =       "Kawal Jeet and Yadvirender Rana and Ruichi Xin",
  title =        "A {Bayesian} network based approach for software
                 reusability prediction",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237804",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Various factors having impact on reusability have been
                 found in research and practice. However, their true
                 interdependencies were never taken into consideration.
                 Using the approach discussed in this paper, various
                 factors and their dependencies can be depicted and the
                 true probability of success of reusability could be
                 easily found. Factors which are not found to have any
                 influence on reusability are also identified. Non
                 consideration of these factors decreases the burden of
                 evaluation and confines the study and evaluation to
                 only important factors for the study under
                 consideration.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2012:AYL,
  author =       "Ajay Jain and Chandan Singh",
  title =        "``{Ad} you like it'': advertisement sourcing and
                 selection technique across multiple heterogeneous
                 applications",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--6",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237802",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Sourcing and selection of online advertisement is done
                 with the objective of streaming advertisements that
                 match user's interests and internet surfing habits.
                 Choosing relevant advertisements that bring user's
                 focus and attention have higher click rate. Innovative
                 concepts, such as crawling recently surfed web pages
                 (or websites), user's (or web portal server)
                 geographical location, user's profile, age, gender, and
                 surfing habits., have been used to identify most
                 relevant advertisements. However, selecting and
                 streaming an advertisement that exactly matches user's
                 interest continues to be a challe. This paper proposes
                 and shares an innovative technique that significantly
                 helps in mapping user's interest quotient to streamed
                 advertisements. This technique respects the
                 individuality of a user and is able to differentiate
                 between users. The proposed solution is implemented by
                 enabling communication channels across multiple
                 heterogeneous user-initiated applications. Applications
                 that do not directly communicate with advertisement
                 data sources, leverage other application running on the
                 same user's account and submit their own metadata to
                 the applications attached to advertisement data
                 sources. The proposed paper helps in substituting
                 publisher's assumptions of a user's interest with
                 real-time user's objects of interest.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Andre:2012:FNC,
  author =       "{\'E}tienne Andr{\'e} and Christine Choppy and Kais
                 Klai",
  title =        "Formalizing non-concurrent {UML} state machines using
                 colored {Petri} nets",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237819",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "UML state machines are an interesting graphical
                 language to express dynamic systems behavior. However,
                 using the different features available (hierarchy,
                 internal/external transitions, entry/exit/do
                 activities, history pseudostates, etc.) may yield quite
                 complex behaviors that are difficult to inspect and
                 check visually. We introduce an algorithm to
                 automatically generate a colored Petri net model
                 associated with a state machine description, so as to
                 provide a formal specification. In this proposal,
                 although we do not consider concurrent aspects (such as
                 fork and join), we take into account all the above
                 mentioned features in a thorough and integrated way.
                 This is illustrated on some examples.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Baresi:2012:LBS,
  author =       "Luciano Baresi and Angelo Morzenti and Alfredo Motta
                 and Matteo Rossi",
  title =        "A logic-based semantics for the verification of
                 multi-diagram {UML} models",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237811",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "UML is a well-known and widely used design notation:
                 it offers a rich set of modeling elements, but their
                 behavior is often not properly defined. Many proposals
                 have tried to provide UML with a formal semantics, but
                 they often focus on a limited number of diagram types,
                 and thus do not provide a viable solution for the
                 actual verification of complex UML models. This paper
                 addresses a significant and consistent set of UML
                 diagrams, called MADES UML, and uses a metric temporal
                 logic to ascribe a formal semantics to them. It also
                 introduces a prototype verification tool based on a
                 bounded model / satisfiability checker. The
                 verification of a car collision avoidance system gave
                 encouraging results.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Blech:2012:TFF,
  author =       "Jan Olaf Blech and Bernhard Sch{\"a}tz",
  title =        "Towards a formal foundation of behavioral types for
                 {UML} state-machines",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237814",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Behavioral types for model-based development comprise
                 abstract behavioral aspects of the models they are
                 associated with. Behavioral types allow checking that a
                 model fulfills these behavioral aspects. Furthermore,
                 as types can be related with each other, they support
                 more complex checks and guarantees like compatibility
                 in composition and refinement of models in a model
                 based development process. We propose a behavioral type
                 system and explain its properties, specifically
                 targeting a subset of UML state-machines. We present an
                 early implementation that generates behavioral type
                 definitions out of an Eclipse-based modeling
                 environment. These type definitions are generated for
                 the higher-order proof assistant Coq as files. We
                 present checking and comparison techniques based on
                 these files for behavioral aspects that can be derived
                 from the model definition.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bowles:2012:SCT,
  author =       "Juliana Bowles and Dulani Meedeniya",
  title =        "Strongly consistent transformation of partial
                 scenarios",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237809",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We present a formal approach for partial
                 transformation of scenario-based specifications.
                 Scenarios are captured as sequence diagrams (SDs) and
                 (partially) transformed into coloured Petri nets
                 (CPNs). Partial transformation is of interest for local
                 analysis, or within an incremental development approach
                 where interaction specifications are built
                 incrementally and combined with previous iteration
                 models. In previous work we defined a strongly
                 consistent transformation from SDs to CPNs. In this
                 paper, we extend the approach for partial
                 transformation whilst preserving the strongly
                 consistent nature of the transformation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Brosch:2012:FEM,
  author =       "Petra Brosch and Sebastian Gabmeyer and Gerti Kappel
                 and Martina Seidl",
  title =        "On formalizing {EMF} modeling operations with graph
                 transformations",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237810",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The development of software in accordance with the
                 model-driven engineering paradigm places model
                 transformations at a central position. Desirable yet
                 contradicting properties of model transformations are
                 user-friendliness as offered by-demonstration
                 approaches and formal conciseness as provided by
                 algebraic graph transformations which is indispensable
                 for verification tasks. In this paper, we show how to
                 unite the properties of the two different approaches.
                 We employ the state-of-the-art by-demonstration
                 environment Emo to prototype graph transformations by
                 embedding the operations obtained from Emo in the
                 formal framework of graph transformation theory.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Carrillo:2012:FVC,
  author =       "Oscar Carrillo and Samir Chouali and Hassan
                 Mountassir",
  title =        "Formalizing and verifying compatibility and
                 consistency of {SysML} blocks",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237813",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The objective of this paper is to define an approach
                 to formalize and verify the SysML blocks in a
                 refinement process. We propose to specify system
                 architecture with SysML Block Definition Diagram, this
                 diagram is then analyzed and decomposed into several
                 sub-blocks in order to verify their compatibility. The
                 structural architecture of an abstract block is given
                 by the Internal Block Diagram (IBD) which defines the
                 communication links between sub-blocks. The
                 compatibility verification between sub-blocks is only
                 made on linked sub-blocks. The behaviour of each
                 sub-block is described by an interface automaton which
                 species the invocations exchanged with its environment.
                 The verification between blocks is translated into
                 consistency verification between the blocks and
                 compatibility verification between their interface
                 automata. Incompatibilities can be inconsistent at
                 architecture level and at communication level if there
                 are deadlocks during the interaction between
                 sub-blocks. Once the verification is established
                 between the sub-blocks, the abstract block can be then
                 substituted by the sub-blocks which compose it.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ge:2012:TPD,
  author =       "Ning Ge and Marc Pantel and Xavier Cr{\'e}gut",
  title =        "Time properties dedicated transformation from
                 {UML}-{MARTE} activity to time transition system",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237807",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Critical Real-Time Systems (RTS) have strong
                 requirements concerning system's reliability. UML and
                 its profile MARTE are standardized modeling languages
                 widely accepted by industrial designers to cope with
                 the development of complex RTS. Relying on Model-Driven
                 Engineering (MDE), time properties verification of
                 UML-MARTE specifications at early phases of the system
                 lifecycle becomes possible. A key issue is to eliminate
                 the gap between UML semi-formal semantics and fully
                 formal executable semantics using model transformation.
                 The model transformation must guarantee the consistency
                 between high-level user models and lower-level
                 verification models. Meanwhile, it should guarantee
                 that the subsequent verification is not too expensive
                 and can be applied to real size industrial models. This
                 paper presents an approach to translate UML-MARTE
                 Activity Diagrams into Time Transition System (TTS)
                 with the aim of efficiently verifying time properties
                 in RTS. TTS is a generalization of Time Petri Nets
                 (TPN) with the priority and data handling at the
                 transition level, supported by TINA model checker. This
                 contribution focuses on how to define the TTS formal
                 semantics to avoid the core problem of state space
                 explosion in model checking. This work has been
                 integrated in a time properties verification framework
                 for UML-MARTE RTS specifications. The proposed method
                 is evaluated using a representative case study.
                 Experimental results are given to demonstrate the
                 method's performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Janus:2012:TCA,
  author =       "Andr{\'e} Janus",
  title =        "Towards a common agile software development model
                 {(ASDM)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237803",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper we use a formal approach to describe
                 Agile Software Development Methodologies. We extract
                 common attributes and properties out of Agile
                 Methodologies to establish a common Agile Software
                 Development Model (ASDM). To build our model we take a
                 look at the Agile Manifesto as well as eXtreme
                 Programing (XP) and Scrum, and also a project-specific
                 Agile Methodology called I2. We describe the Agile
                 Software Development Methodologies in terms of Sets,
                 Relations and Equations to make similarities and
                 differences visible. With this formal characterization
                 we can compare the Methodologies to each other and
                 extract the common attributes and properties as parts
                 of the common Agile Software Development Model (ASDM).
                 After establishing our model we assess the explanatory
                 power and aspects of completeness of the model to
                 identify weakness and improvement potential. The
                 explanatory power means the ability to characterize a
                 Methodology and compare different Methodologies to each
                 other. Completeness issues are related to the model
                 itself, to the model's instantiations (e. g. describing
                 XP with the ASDM) and the completeness of (relevant)
                 Practices. Using this approach we try to achieve better
                 theoretical understanding and comparability for Agile
                 Methodologies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Li:2012:MQG,
  author =       "Dan Li and Xiaoshan Li and Volker Stolz",
  title =        "Model querying with graphical notation of {QVT}
                 relations",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237808",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As a standard high-level model transformation
                 language, QVT Relations defines a graphical notation,
                 which provides a concise, intuitive way to specify
                 transformations. However, QVT Relations relies only on
                 the textual language OCL for model querying, leading to
                 verbose and complicated OCL expressions. Here, we
                 present a graphical model query facility based on the
                 checking semantics and pattern matching of QVT
                 Relations. The query facility also borrows from QVT
                 Relations the graphical notation. In addition we
                 propose an approach to map the queries into XSLT to
                 facilitate their execution. We have developed a tool
                 for designing the queries and automatically generating
                 the XSLT programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Milhau:2012:RPA,
  author =       "J{\'e}r{\'e}my Milhau and Fr{\'e}d{\'e}ric Gervais and
                 R{\'e}gine Laleau and Marc Frappier",
  title =        "Refinement patterns for {ASTD}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237818",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "astd is a formal and graphical language specifically
                 defined for information system specification. Up to
                 now, a specifier had to build an astd specification
                 from scratch and there were no refinement techniques
                 for stepwise construction. This paper aims at
                 introducing refinement patterns for astd, which are
                 inspired from real case studies. For each pattern,
                 proof obligations have been identified to define the
                 refinement semantics we want to provide. The three
                 refinement patterns presented in the paper are
                 illustrated by an example of a basic complaint
                 management system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yamagata:2012:FSE,
  author =       "Yoriyuki Yamagata and Weiqiang Kong and Akira Fukuda
                 and Van Tang Nguyen and Hitoshi Ohsaki and Kenji
                 Taguchi",
  title =        "Formal semantics of extended hierarchical state
                 transition matrix by {CSP}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237815",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Extended Hierarchical State Transition Matrix
                 (EHSTM) is a table-based modeling language frequently
                 used in industry for specifying behaviors of a system.
                 However, assuring correctness, i.e., having a design
                 satisfy certain desired properties, is a non-trivial
                 task. To address this problem, a model checker
                 dedicated to EHSTMs called Garakabu2 is developed.
                 However, there is no formal justification of Garakabu2,
                 since its semantics has never been fully formalized. In
                 this paper, we give a formal semantics to EHSTM by
                 translating it into CSP, Communicating Sequential
                 Processes. Our semantics covers most of the features
                 supported by Garakabu2. We manually translate the small
                 examples of EHSTM to CSP, and verify them by PAT, a CSP
                 based model checker. We also verify the examples
                 directly using Garakabu2 and show the result are same.
                 The experiments also show that verification using our
                 translation and PAT is much faster than that of
                 Garakabu2 for checking message type EHSTM.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yatake:2012:SBE,
  author =       "Kenro Yatake and Toshiaki Aoki",
  title =        "{SMT-based} enumeration of object graphs from {UML}
                 class diagrams",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237812",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents an encoding of the UML class
                 diagram with OCL invariants in an SMT solver for
                 enumerating all the object graphs from the class
                 diagram. Enumeration of all the object graphs was
                 necessary for our verification of operating systems by
                 model checking, i.e., exhaustively enumerate all the
                 structural variations of the environments to be checked
                 against an operating system. We present our encoding in
                 the SMT solver Yices with the technique of optimization
                 and isomorphism elimination.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kukreja:2012:AMT,
  author =       "Deepika Kukreja and Umang Singh and B. V. R. Reddy",
  title =        "Analytical models for trust based routing protocols in
                 wireless ad hoc networks",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--16",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In Wireless Ad Hoc Network environment, there are
                 three ways to understand a routing protocol: (i)
                 monitoring, (ii) simulation and (iii) modeling. In this
                 paper, the different trust based secure routing
                 protocols used in wireless ad hoc networks are
                 analyzed, modeled and described by incorporating
                 process flow diagrams. These process flow diagrams
                 represent stepwise work flow activities and actions. It
                 shows the overall flow of control of a process, program
                 or a protocol. This paper focuses on the security
                 aspects of routing by incorporating trust parameter
                 into account and also highlights methodology used in
                 secure routing protocols. Such protocols have been
                 categorized based on the model used for enforcing
                 security, methodology and information for making
                 effective routing decisions. In this paper, we model,
                 discuss and analyze trust based secure ad hoc routing
                 schemes which do not require each network node to work
                 in promiscuous mode. We propose and design a new
                 protocol --- Trust based Routing using Dominating Set
                 Approach (TRDSA) which overcomes the shortcomings of
                 existing protocols.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2012:DRS,
  author =       "Neeraj Kumar Sharma and Vibha Gaur and S. K. Muttoo",
  title =        "A dynamic reputation system with built-in attack
                 resilience to safeguard buyers in e-market",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "1--19",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237806",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Reputation systems aim to reduce the risk of loss due
                 to untrustworthy participants by providing a mechanism
                 for establishing trustworthiness between mutually
                 unknown online entities in an information asymmetric
                 e-market. These systems encourage honest behavior and
                 discourage malicious behavior of buyer and seller
                 agents by laying a foundation for security and
                 stability in the e-market. However, the success of a
                 reputation system depends on its built-in resilience
                 capabilities to foil various attacks. This paper
                 focuses on how to safeguard buyers from dishonest
                 sellers and advisors by incorporating an attack
                 resilient reputation computation methodology. The
                 objectives of the proposed dynamic reputation system in
                 the distributed environment are to reduce the incentive
                 for behaving dishonestly, and to minimize harm in case
                 of attacks by dishonest participants with the inherent
                 purpose of improving the quality of services in the
                 e-market.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Notkin:2012:TN,
  author =       "David Notkin",
  title =        "{TOSEM} news",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "7--8",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237826",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:SED,
  author =       "Larry Bernstein",
  title =        "Software engineering design principles for
                 ultra-large-scale systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "8--9",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2012:HSJ,
  author =       "Robert Schaefer",
  title =        "On having a second job as an adjunct",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "9--10",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "11--19",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "20--29",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237800",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Herrmann:2012:IWC,
  author =       "Andrea Herrmann and Maya Daneva and Joerg Doerr and
                 Kurt Schneider",
  title =        "{2nd International Workshop on Creativity in
                 Requirements Engineering: CreaRE 2012}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "30--31",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237816",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Requirements Engineering (RE) is a socially
                 constructed activity and as such it includes the
                 creation, development, assessment and communication of
                 innovative ideas. An idea can take the form of a
                 thought related either to the analysis of a problem, or
                 to the search of a solution to this problem, and it can
                 be concrete or abstract. Creative thinking is what RE
                 professionals tacitly or explicitly use in their RE
                 processes to conceptualize smart solutions to problems.
                 RE demands the stakeholders to create visions of a
                 future software system and to imagine all its
                 implications. Creativity techniques that have been
                 practiced in other fields can support this creative
                 part of RE. The CreaE series of workshops brings
                 together RE practitioners and researches who are
                 interested in discussing the role of creativity in RE
                 and the ways in which creativity techniques from other
                 disciplines can be leveraged in RE. CreaRE 2010 aimed
                 at creating awareness of the importance of research on
                 creativity in RE and initiated the conversation on
                 experiences of applying creativity techniques in
                 support of RE activities. CreaRE 2012 builds upon this
                 foundation and extends the discussion on creativity in
                 RE by actively fostering the exchange of ideas among
                 members of diverse communities that are engaged in RE
                 research and practice. CreaRE 2012 united an audience
                 reaching out to areas such as design, theatre
                 improvisation, stakeholder interactions, studies on
                 cultural heritage and multimedia systems. This report
                 describes the results of the workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gibson:2012:IUF,
  author =       "J. Paul Gibson and Isabelle Perseil",
  title =        "Introduction to {UML} and Formal Methods",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "32--33",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237825",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "It is with great pleasure that we introduce the 5th
                 IEEE International Workshop on UML and Formal Methods.
                 Already, in its short 5 year history, the workshop has
                 been located across the globe: Japan, Brazil, China,
                 Ireland, and --- this year --- in Paris, France. For
                 its first 3 years it was co-located with the
                 International Conference on Formal Engineering Methods,
                 whilst in the last 2 years it has been part of the
                 International Symposium on Formal Methods. The workshop
                 has a strong tradition of publishing the highest
                 quality accepted papers in either: the NASA journal of
                 ``Innovations in Systems and Software Engineering'', or
                 the ACM journal ``Software Engineering Notes'' (to whom
                 we have returned this year). The main objective of the
                 workshop has not changed during its lifetime, namely:
                 the building of bridges between informal, semi-formal
                 and formal notations. This objective can be seen in
                 each of the 4 main themes that make up the four
                 sessions of this year{\^A}'s workshop: I. UML diagram
                 formalization, II. Dynamic and real-time modeling, III.
                 Transformations, and IV. Patterns and blocks. Across
                 all sessions a wide range of formalisms and tools are
                 presented --- Extended Hierarchical State Transition
                 Matrices and CSP, the SMT solver Yice, MADES UML and
                 metric temporal logic, UML-MARTE and Time Transition
                 Systems, Colored Petri Nets, Behavioural types and Coq,
                 QVT-R and XSLT, EMF Model-ing Operations, ASTD and
                 SysML --- illustrating the breadth and depth of the
                 research being done by our community. We hope that you
                 enjoy reading these papers as much as we have: the
                 bridges are being built and we invite you to cross
                 them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Herzwurm:2012:RIW,
  author =       "Georg Herzwurm and Benedikt Krams and Wolfram Pietsch
                 and Sixten Schockert",
  title =        "Report from the {3rd International Workshop on
                 Requirements Prioritization for Customer Oriented
                 Software Development: (RePriCo'12)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "32--33",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237817",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Prioritization is an essential task within
                 requirements engineering to cope with complexity and to
                 establish focus properly. The 3rd Workshop on
                 Requirements Prioritization for customer oriented
                 Software Development (RePriCo'12) focused on
                 requirements prioritization and adjacent themes in the
                 context of customer oriented development of bespoke and
                 standard software. Five submissions have been accepted
                 for the proceedings and for presentation. The report
                 summarizes and points out key findings.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Froberg:2012:BRP,
  author =       "Scott Froberg",
  title =        "Book Review: {{\booktitle{Programming perl}}, fourth
                 edition by Tom Christiansen, Brian D. Foy and Larry
                 Wall with Jon Orwant}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "40--40",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237822",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2012:BRSb,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Service design patterns:
                 fundamental design solutions for SOAP\slash WSDL and
                 RESTful web services}} by Robert Daigneau}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "40--40",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237821",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2012:BRT,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Theory of conditional
                 games}} by Wynn C. Stirling}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "4",
  pages =        "41--41",
  month =        jul,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2237796.2237823",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:14 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Solomon:2012:NML,
  author =       "A. D. Solomon",
  title =        "On a new masters level program in software
                 engineering",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--3",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347713",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In a 1998 note [1] I described a new study program
                 leading to the Bachelor's Degree in Software
                 Engineering. I now report on a new Master's level
                 program in Software Engineering evolving from the
                 Bachelor's Degree program, and beginning in the fall
                 semester of this year. I discuss some of the events of
                 our 14 year old Bachelor's program, and the structuring
                 of our Master's program.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dubey:2012:MPO,
  author =       "Sanjay Kumar Dubey and Ajay Rana and Yajnaseni Dash",
  title =        "Maintainability prediction of object-oriented software
                 system by multilayer perceptron model",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347703",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To accomplish software quality, correct estimation of
                 maintainability is essential. However there is a
                 complex and non-linear relationship between
                 object-oriented metrics and maintainability. Thus
                 maintainability of object-oriented software can be
                 predicted by applying sophisticated modeling techniques
                 like artificial neural network. Multilayer Perceptron
                 neural network is chosen for the present study because
                 of its robustness and adaptability. This paper presents
                 the prediction of maintainability by using a Multilayer
                 Perceptron (MLP) model and compares the results of this
                 investigation with other models described earlier. It
                 is found that efficacy of MLP model is much better than
                 both Ward and GRNN network models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Louridas:2012:NRR,
  author =       "Panos Louridas and Georgios Gousios",
  title =        "A note on rigour and replicability",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347706",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As any empirical science, Software Engineering
                 research should strive towards better research
                 practices. Replication is regrettably not a priority
                 for Software Engineering researchers and, moreover, not
                 afforded by many published studies. Here we report our
                 experience from our encounter with a recent paper in a
                 flagship Software Engineering conference. Our
                 experience shows that current publication requirements
                 do not guarantee replicability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Patwa:2012:RME,
  author =       "Sanjeev Patwa and Anil Kumar Malviya",
  title =        "Reusability metrics and effect of reusability on
                 testing of object oriented systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347708",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software reuse has become very popular in software
                 development. There are several beneficial aspects of
                 object oriented systems including code reuse,
                 reusability and reusability of testing efforts.
                 Reusable software components are the building blocks
                 that can make a system able to respond quickly to
                 change. This paper presents the hypothesis that the
                 testing effort in object-oriented software can be
                 inherited and reused similar to that of the coding
                 effort. Therefore the testability and maintainability
                 of the object-oriented software can be improved by
                 adapting a reusability approach. In this paper some new
                 metrics namely Reusability of a Class in a System
                 (RCS), Average Degree of Reusability (AR), Specialize
                 class to Base class Reusable Metric (SBRM) have been
                 proposed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Romanovsky:2012:DFM,
  author =       "Alexander Romanovsky",
  title =        "Deployment of formal methods in industry: the legacy
                 of the {FP7 ICT DEPLOY} integrated project",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347710",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The work of the major EU-funded ICT DEPLOY Integrated
                 Project (February 2008 --- April 2012) on Industrial
                 Deployment of Advanced\ System Engineering Methods for
                 High Productivity and Dependability [1] was driven by
                 the tasks of achieving and evaluating industrial
                 takeup, initially by DEPLOY industrial partners, of
                 DEPLOY methods and tools, together with the necessary
                 further research on methods and tools. Our previous SEN
                 paper [2] introduced the project. The project has been
                 one of the most significant efforts ever focusing on
                 understanding the issues researchers and engineers face
                 during the deployment of formal methods. This paper
                 briefly reports on the project legacy and provides
                 pointers to the various sources of information produced
                 by the project.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bandyopadhyay:2012:ATR,
  author =       "Anup Kumar Bandyopadhyay",
  title =        "Application of {TLRO} to refute an incorrect mutual
                 exclusion algorithm",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347702",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Modeling of iterative commands in a concurrent process
                 is difficult because the termination depends on the
                 states of different processes. In this paper a Temporal
                 Logic Related to Observation (TLRO)-based modeling of
                 the same is considered. For simplicity we restrict
                 ourselves to 'while do' construct only. Using a
                 commonsense scenario it is shown that the construct may
                 be described by a set of three state transition rules.
                 In a concurrent system the termination condition is
                 determined by the states of different processes. To
                 ensure termination, therefore, temporal ordering of the
                 executions of different state transition rules at
                 different processes needs to be investigated. For this
                 purpose we prove two theorems. The entire derivation is
                 then used to refute a well known incorrect mutual
                 exclusion algorithm. A counter example for the
                 algorithm could be derived during this exercise. This
                 is an improvement over our earlier effort that used the
                 weakest precondition calculus as a modeling tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mahajan:2012:AGA,
  author =       "Manish Mahajan and Sumit Kumar and Rabins Porwal",
  title =        "Applying genetic algorithm to increase the efficiency
                 of a data flow-based test data generation approach",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347707",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The success or failure of the entire software
                 development process relies on the software testing
                 component which is responsible for ensuring that the
                 software that is released is free from bugs. One of the
                 major labor intensive activities of software testing is
                 the generation of the test data for the purpose of
                 applying the testing methodologies. Many approaches
                 have been tried and tested for automating the process
                 of generating the test data. Meta-heuristics have been
                 applied extensively for improving the efficiency of the
                 process. This paper analyses the effectiveness of
                 applying genetic algorithms for generating test data
                 automatically using data flow testing approach. An
                 incremental coverage measurement method is used to
                 improve the convergence.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rashid:2012:SAM,
  author =       "Ekbal Rashid and Srikanta Patnayak and Vandana
                 Bhattacherjee",
  title =        "A survey in the area of machine learning and its
                 application for software quality prediction",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347709",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper explores software quality improvement
                 through early prediction of error patterns. It
                 summarizes a variety of techniques for software quality
                 prediction in the domain of software engineering. The
                 objective of this research is to apply the various
                 machine learning approaches, such as Case-Based
                 Reasoning and Fuzzy logic, to predict software quality.
                 The system predicts the error after accepting the
                 values of certain parameters of the software. This
                 paper advocates the use of case-based reasoning (i.e.,
                 CBR) to build a software quality prediction system with
                 the help of human experts. The prediction is based on
                 analogy. We have used different similarity measures to
                 find the best method that increases reliability. This
                 software is compiled using Turbo C++ 3.0 and hence it
                 is very compact and standalone. It can be readily
                 deployed on any configuration without affecting its
                 performance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2012:CSV,
  author =       "Hemant Jain and Anjana Gosain",
  title =        "A comprehensive study of view maintenance approaches
                 in data warehousing evolution",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347705",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A data warehouse mainly stores integrated information
                 over data from many different remote data sources for
                 query and analysis. The integrated information at the
                 data warehouse is stored in the form of materialized
                 views. Using these materialized views, user queries may
                 be answered quickly and efficiently as the information
                 may be directly available. These materialized views
                 must be maintained in answer to actual relation updates
                 in the different remote sources. One of the issues
                 related to materialized views is that whether they
                 should be recomputed or they should be adapted
                 incrementally after every change in the base relations.
                 View maintenance is the process of updating a
                 materialized view in response to changes to the
                 underlying data is called view maintenance. There are
                 several algorithms developed by different authors to
                 ease the problem of view maintenance for data warehouse
                 systems. In this paper, we have provided a
                 comprehensive study on research works of different
                 authors related to DW view maintenance considering
                 various parameters and presented the same in tabular
                 way.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shirole:2012:TCU,
  author =       "Mahesh Shirole and Rajeev Kumar",
  title =        "Testing for concurrency in {UML} diagrams",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347712",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Concurrent programming is increasingly being used in
                 many applications with the advent of multi-cores. The
                 necessary support for execution of multi-threading is
                 getting richer. Notwithstanding, a concurrent program
                 may behave nondeterministically, it may result in
                 different outputs with the same input in different
                 runs. The aim of this study is to generate test
                 sequences for concurrency from unified modelling
                 language (UML) behavioral models such as sequence and
                 activity diagrams. Generating exhaustive test cases for
                 all concurrent interleaving sequences is exponential in
                 size. Therefore, it is necessary to find adequate test
                 cases in presence of concurrency to uncover errors due
                 to, e.g., data race, synchronization and deadlocks. In
                 order to generate adequate test cases a novel search
                 algorithm, which we call concurrent queue search (CQS)
                 is proposed. The CQS handles random nature of
                 concurrent tasks. To generate test scenarios, a
                 sequence diagram is converted into an activity diagram.
                 An activity diagram encapsulates sequential,
                 conditional, iterative and concurrent ows of the
                 control. By the experimental results, it was observed
                 that test sequences generated by CQS algorithm are
                 superior as compared to DFS and BFS search
                 algorithms.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sekar:2012:ASB,
  author =       "Lakshmi Priya Sekar and Vinitha Reddy Gankidi and
                 Selvakumar Subramanian",
  title =        "Avoidance of security breach through selective
                 permissions in {Android} operating system",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--9",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347711",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The current Android application framework has an ``all
                 or none'' permission policy, viz., an application can
                 be installed if and only if all the permissions are
                 granted. Also, no provision exists to deny granted
                 permissions after installation. Therefore, any
                 application can misuse the granted permission.
                 CyanogenMod addresses this issue by denying the
                 unwanted permissions which might cause the application
                 to crash. WhisperCore, has worked on this problem but
                 the working model is unavailable at the moment. APEX,
                 also is currently doing some research on this issue but
                 there is no publicly available document. In this paper,
                 the problem of misusing the granted permission n in
                 Android is addressed and a novel idea of 'shadow
                 manifest' is proposed. The proposed shadow manifest is
                 implemented by creating a novel Content Provider, viz.,
                 SelPermProvider, which hosts the user permissions. In
                 general, during the resource request phase, the system
                 manifest is checked and the resources are allocated.
                 But, in our implementation, the control is altered to
                 flow through the shadow manifest after the system
                 manifest is checked. If the query to shadow manifest is
                 TRUE, then the resource is granted else a dummy or null
                 value is returned. This facilitates the user to
                 identify the malware and block the malware from
                 achieving the intended task. Thus, the application is
                 unaware of the indirect permission denial and continues
                 to run normally. The user can decide which permission
                 to restrict by checking a log of all recent permission
                 requests, a facility provided in our app. The proposed
                 shadow manifest has been implemented and tested using
                 an application called 'Contacts\_Retrieve'. It was
                 found to successfully complete the application if the
                 shadow manifest returned TRUE, and unsuccessfully
                 complete otherwise.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Babu:2012:IAD,
  author =       "P. Arun Babu and C. Senthil Kumar and N. Murali and T.
                 Jayakumar",
  title =        "An intuitive approach to determine test adequacy in
                 safety-critical software",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347701",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Safety-critical software must adhere to stringent
                 quality standards and is expected to be thoroughly
                 tested. However, exhaustive testing of software is
                 usually impractical. The two main challenges faced by a
                 software testing team are generation of effective test
                 cases and demonstration of testing adequacy. This paper
                 proposes an intuitive and conservative approach to
                 determine the test adequacy in safety-critical
                 software. The approach is demonstrated through a case
                 study: the core temperature monitoring system of a
                 nuclear reactor. We combine conservative test coverage
                 of unique execution path test cases, and the results
                 from mutation testing to determine the test adequacy.
                 Although mutation testing is a powerful technique, the
                 difficulty in identifying equivalent mutants has
                 limited its practical utility. To gain confidence on
                 the computed test adequacy: (i) faults during mutation
                 testing must be induced at all possible execution paths
                 of the code, (ii) properties of unkilled mutants must
                 be studied, and (iii) all equivalent mutants must be
                 detected. In this regard; results of static, dynamic
                 and coverage analysis of the mutants is presented, and
                 a technique to identify the likely equivalent mutants
                 is proposed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wu:2012:MMS,
  author =       "Ye-Chi Wu and Hewijin Christine Jiau",
  title =        "A monitoring mechanism to support agility in
                 service-based application evolution",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347714",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service orientation promotes an agile development
                 paradigm for rapid application development and presents
                 evolutionary challenges to adapt to frequent
                 environmental changes. To maintain effective
                 service-based application operations, this research
                 introduces a Serv-Gears framework to maintain a
                 mechanism for evolution-need monitoring. Inheriting
                 major characteristics of a service-oriented paradigm,
                 this mechanism is designed in a service-based style to
                 facilitate development agility in evolution planning
                 and implementation. Serv-Gears allows developers to
                 continuously specify service-based monitors even during
                 application operations. The specified monitors are
                 included dynamically in the running application to
                 collect monitoring results. Evolution plans are then
                 effectively developed and assessed. Such an integrated
                 development environment provided by Serv-Gears
                 facilitates agile service-based application
                 evolution.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2012:OFA,
  author =       "Ajay Jain",
  title =        "Optimizing feature-access time through dynamic updates
                 to application menu layout",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "1--14",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347704",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As soon as a product or application is installed,
                 users want to start using it with zero usability
                 roadblocks. However, there is always a time quantity
                 associated with a user's series of actions that must be
                 performed while traversing application menu items to
                 reach a specific (desired) menu option. This time
                 factor plays a critical role in influencing user
                 experience and engagement; the more the number of
                 clicks, the greater the time taken in reaching the
                 desired menu item. This time lag may leave the user
                 frustrated. The time and distance traversed increases
                 further if the menu structure comprises multiple nested
                 menus within the parent menu. This paper proposes an
                 improvised dynamic menu layout based on usage
                 statistics. This work also demonstrates results of a
                 statistical experiment that compares the time taken in
                 reaching specific menu items with the proposed new
                 layout vs. the traditional menu layout. Experimental
                 data (under defined assumptions) is found to be
                 significantly in favor of the proposed approach. The
                 work also presents data samples, assumptions,
                 limitations, and benefits of the proposed approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:MCS,
  author =       "Larry Bernstein",
  title =        "Managing computer suppliers",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "12--13",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347718",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Grechanik:2012:CDD,
  author =       "Mark Grechanik",
  title =        "The curse of database deadlocks: the problem with no
                 good solution",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "13--14",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347719",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEd,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}: is software
                 engineering ready for {MOOCs}?",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "14--14",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347720",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSe,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "17--26",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347699",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPe,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "27--33",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347700",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Harrison:2012:RFI,
  author =       "Rachel Harrison and Daniela da Cruz and Pedro
                 Henriques and Maria Jo{\~a}o Varanda Pereira and
                 Shih-Hsi Liu and Tim Menzies and Marjan Mernik and
                 Daniel Rodriguez",
  title =        "Report from the {First International Workshop on
                 Realizing Artificial Intelligence Synergies in Software
                 Engineering (RAISE 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "34--35",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347697",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The aim of the Realizing Artificial Intelligence
                 Synergies in Software Engineering (RAISE) series of
                 workshops is to provide a forum for researchers and
                 industry practitioners to exchange and discuss the
                 latest innovative synergistic AI and SE techniques and
                 practices. Namely, we are interested in AI solutions to
                 SE problems and SE practices to answer AI obstacles,
                 and techniques that could benefit these realms
                 bidirectionally. This report summarizes the First
                 International RAISE Workshop and indicates some future
                 activities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kruchten:2012:TDS,
  author =       "Philippe Kruchten and Robert L. Nord and Ipek Ozkaya
                 and Joost Visser",
  title =        "Technical debt in software development: from metaphor
                 to theory report on the {Third International Workshop
                 on Managing Technical Debt}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "36--38",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347698",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The technical debt metaphor is gaining significant
                 traction in the software development community as a way
                 to understand and communicate issues of intrinsic
                 quality, value, and cost. This is a report on a third
                 workshop on managing technical debt, which took place
                 as part of the 34rd International Conference on
                 Software Engineering (ICSE 2012). The goal of this
                 third workshop was to discuss managing technical debt
                 as a part of the research agenda for the software
                 engineering field, in particular focusing on eliciting
                 and visualizing debt, and creating payback
                 strategies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jahns:2012:PDI,
  author =       "Veit Jahns",
  title =        "Principles of data integration by Anhai Doan, {Alon}
                 Halevy, Zachary {Ives}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "43--43",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347721",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{StPierre:2012:BRU,
  author =       "Richard {St. Pierre}",
  title =        "Book Review: {{\booktitle{The UX book, process and
                 guidelines for ensuring a quality user experience}} by
                 Rex Hartson and Pardha S. Pyla}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "43--44",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347722",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tan:2012:BRH,
  author =       "Kwee Heong Tan",
  title =        "Book Review: {{\booktitle{How Google tests software}}
                 by James A. Whittaker, Jason Arbon and Jeff Carollo}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "44--45",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347723",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kienle:2012:PDP,
  author =       "Holger M. Kienle",
  title =        "Personal data privacy and protection in a surveillance
                 era: technologies and practices by Christina
                 Akrivopoulou and Athanasios Psygkas",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "5",
  pages =        "45--46",
  month =        sep,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2347696.2347724",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:16 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{El-Deeb:2012:VSS,
  author =       "Ahmed El-Deeb",
  title =        "A view on the state of software engineering practice:
                 experience from {Egypt}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382762",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "An excerpt from Thomas Friedman's famous book The
                 World Is Flat, ``When developing countries start
                 thinking about the challenge of flatism\ldots{}. It has
                 to ask itself,'' ``To what extent is my country
                 advancing or being left behind by the flattening of the
                 world, and to what extent is it adapting to and taking
                 advantage of all the new platforms for collaborations
                 and competition?'' is vividly describing the appeal of
                 many developing countries in entering the software
                 industry. With the globalization of crafting software
                 and its services, the software industry is seen as a
                 lucrative economic growth opportunity. Unlike other
                 industrial investments, the software industry is
                 convenient to developing countries for its low-cost of
                 establishment. All is needed is an affordable real
                 estate rental, a bunch of PCs, and a few skilled
                 workers to get the business running. The globalization
                 of the software industry with attention given to
                 accessing the right skills no matter where and reducing
                 costs through cheap labor is even a realization to
                 those countries ambitions to remedy part of their
                 economic challenges. India preceded with utilizing such
                 potential and made good use of such globalization, or
                 flatism, of the software industry; positioning itself
                 as a successful model to those nations aspiring to
                 compete globally and establish economic growth. Egypt
                 is no exception from this ambition. Geographically
                 positioned in proximity to Europe at the crossroads of
                 Europe, Africa, and Asia and with access to abundant
                 low wage talent pool of multilingual technical
                 graduates annually are all factors that made it
                 conceivable that Egypt can compete in the global
                 industry of software. However, such entrance into
                 competition, notably with India as well as other Middle
                 Eastern countries, have shaped trends in the practices
                 of software engineering in Egypt as well as it did
                 emerge several challenges that Egypt should learn to
                 remedy if it wants to stay competitive in the global
                 software industry. This paper attempts to shed light on
                 salient current software engineering practices and
                 related challenges that would be affecting Egypt's
                 progress and competitive edge. In laying a foundation
                 to such brief survey of practices, this paper also
                 overviews major cornerstones that gave rise to the
                 establishment and support of such industry in Egypt.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2012:SLT,
  author =       "Vineet Sharma and S. A. M. Rizvi and Arun Sharma",
  title =        "Software Licenses --- A tool to control distribution
                 of software",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382769",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Workshop on Developing Tools as
                 Plug-Ins (TOPI) is a venue for researchers and
                 practitioners interested in plug-in development. The
                 main interest is understanding the opportunities and
                 challenges of developing tools as plug-ins, and thus,
                 we seek for discussions regarding the characteristics
                 of good plug-ins, interoperability requirements to
                 making tools available across platforms, recent
                 successful tools as plug-ins as well as foreseen medium
                 and long term challenges of tools as plug-ins. The
                 second edition of this workshop, TOPI 2012 was
                 co-located with the International Conference on
                 Software Engineering (ICSE 2012). TOPI 2012 received a
                 total of 32 submissions. Among them, 14 were accepted
                 as full papers and 4 as short papers. The audience
                 during the whole workshop ranged from 25 to 30
                 participants. The final program comprised position
                 papers including new proposals for plug-in
                 architectures as well as their interaction with
                 development environments and run-times, and papers
                 discussing the implementation of different kind of
                 tools as plug-ins. This report describes the main
                 results of TOPI 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ceccarello:2012:TGC,
  author =       "Matteo Ceccarello and Nastaran Shafiei",
  title =        "Tools to generate and check consistency of model
                 classes for {Java PathFinder}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Java PathFinder (JPF) is a model checker for Java
                 applications. Like any other model checker, JPF has to
                 combat the notorious state space explosion problem.
                 Since JPF is a JVM, it can only model check Java
                 bytecode and needs to handle native calls differently.
                 JPF tackles the state space explosion problem and
                 handles native calls by means of so-called model
                 classes and native peers. In this paper we focus on
                 model classes. For a class that either causes a state
                 space explosion or that contains native calls, one can
                 introduce a model class that either abstracts away
                 particular details or implements the native call in
                 Java. Rather than model checking the original class,
                 JPF model checks the model class instead. Writing such
                 model classes is time consuming and error prone. In
                 this paper we propose two tools to assist with the
                 development of model classes. The one tool generates a
                 skeleton of a model class. The other tool checks
                 whether a model class is consistent with the original
                 class.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chanda:2012:TBS,
  author =       "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
                 and Swapan Bhattacharya",
  title =        "Traceability between service component and class: a
                 model based approach",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382761",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service components are the key to the development of a
                 service-oriented solution as they provide the
                 implementation of the services. The implementation of
                 Service components provides the actual function of the
                 component and can be defined with one or more Java
                 classes. We propose a model named Service Component to
                 Class (SC2C) that maps the service components of an
                 application with that of the classes that implement the
                 service components. We also propose a visual model as a
                 part of SC2C that represents the classes and
                 relationship among classes. This model helps to
                 establish traceability among service components and
                 classes. We also introduce some traceability metrics to
                 measure traceability between the artifacts of Service
                 Oriented Architecture (SOA) and Object Oriented (OO)
                 paradigms. This work, along with our earlier work, help
                 in Software Configuration Management of a SOA
                 application. We provide an insurance system case study
                 to illustrate our approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Funes:2012:RMC,
  author =       "Diego Funes and Junaid Haroon Siddiqui and Sarfraz
                 Khurshid",
  title =        "Ranged Model Checking",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We introduce ranged model checking, a novel technique
                 for more effective checking of Java programs using the
                 Java PathFinder (JPF) model checker. Our key insight is
                 that the order in which JPF makes non-deterministic
                 choices denes a total ordering of execution paths it
                 explores in the program it checks. Thus, two in-order
                 paths define a range for restricting the model checking
                 run by defining a start point and an end point for
                 JPF's exploration. Moreover, a given set of paths can
                 be linearly ordered to define consecutive,
                 (essentially) non-overlapping ranges that partition the
                 exploration space and can be explored separately. While
                 restricting the run of a model checker is a well-known
                 technique in model checking, the key novelty of our
                 work is conceptually to restrict the run using vertical
                 boundaries rather than the traditional approach of
                 using a horizontal boundary, i.e., the search depth
                 bound. Initial results using our prototype
                 implementation using the JPF libraries demonstrate the
                 promise ranged model checking holds.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Khyzha:2012:AP,
  author =       "Artem Khyzha and Pavel Par{\'\i}zek and Corina S.
                 P{\u{a}}s{\u{a}}reanu",
  title =        "Abstract pathfinder",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382794",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We present Abstract Pathfinder, an extension to the
                 Java Pathfinder (JPF) verification tool-set that
                 supports data abstraction to reduce the large data
                 domains of a Java program to small, finite abstract
                 domains, making the program more amenable to
                 verification. We use data abstraction to compute an
                 over-approximation of the original program in such a
                 way that if a (safety) property is true in the
                 abstracted program the property is also true in the
                 original program. Our approach enhances JPF with an
                 abstract interpreter and abstract state-matching
                 mechanisms, together with a library of abstractions
                 from which the user can pick which abstractions to use
                 for a particular application. We discuss the details of
                 our implementation together with some preliminary
                 experiments with analyzing multi-threaded Java
                 programs, where Abstract Pathfinder achieves
                 significant time and memory savings as compared with
                 plain JPF.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mercer:2012:CVI,
  author =       "Eric Mercer and Suzette Person and Neha Rungta",
  title =        "Computing and visualizing the impact of change with
                 {Java PathFinder} extensions",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Change impact analysis techniques estimate the
                 potential effects of changes made to software. Directed
                 Incremental Symbolic Execution (DiSE) is a Java
                 PathFinder extension that computes the impact of
                 changes on program execution behaviors. The results of
                 DiSE are a set of impacted path conditions that can be
                 efficiently processed by a subsequent client analysis.
                 Path conditions, however, may not be intuitive for
                 software developers without the context of the source
                 code. In this paper we present a framework for
                 visualizing the results of DiSE. The visualization
                 includes annotated source code and control flow graphs
                 indicating program statements that are changed and
                 statements that may be impacted by the changes. A
                 simulation mode enables users to also observe the
                 impact of changes on symbolic execution of the program,
                 by showing the changes to the path conditions as the
                 user steps through the sequences of statements
                 executed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mirzaei:2012:TAA,
  author =       "Nariman Mirzaei and Sam Malek and Corina S.
                 P{\u{a}}s{\u{a}}reanu and Naeem Esfahani and Riyadh
                 Mahmood",
  title =        "Testing {Android} apps through symbolic execution",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "There is a growing need for automated testing
                 techniques aimed at Android apps. A critical challenge
                 is the systematic generation of test cases. One method
                 of systematically generating test cases for Java
                 programs is symbolic execution. But applying symbolic
                 execution tools, such as Symbolic Pathfinder (SPF), to
                 generate test cases for Android apps is challenged by
                 the fact that Android apps run on the Dalvik Virtual
                 Machine (DVM) instead of JVM. In addition, Android apps
                 are event driven and susceptible to path-divergence due
                 to their reliance on an application development
                 framework. This paper provides an overview of a
                 two-pronged approach to alleviate these issues. First,
                 we have developed a model of Android libraries in Java
                 Pathfinder (JPF) to enable execution of Android apps in
                 a way that addresses the issues of incompatibility with
                 JVM and path-divergence. Second, we have leveraged
                 program analysis techniques to correlate events with
                 their handlers for automatically generating
                 Android-specific drivers that simulate all valid
                 events.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Panizo:2012:EJP,
  author =       "Laura Panizo and Mar{\'\i}a del Mar Gallardo",
  title =        "An extension of {Java PathFinder} for hybrid systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Hybrid systems are characterized by combining discrete
                 and continuous behaviors. Verification of hybrid
                 systems is, in general, a difficult task due to the
                 potential complexity of the continuous dynamics.
                 Currently, there are different formalisms and tools
                 which are able to analyze specific types of hybrid
                 systems, model checking being one of the most used
                 approaches. In this paper, we describe an extension of
                 Java PathFinder in order to analyze hybrid systems. We
                 apply a general methodology which has been successfully
                 used to extend Spin. This methodology is non-intrusive,
                 and uses external libraries, such as the Parma
                 Polyhedra Library, to abstract the continuous behavior
                 of the hybrid system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Phan:2012:SQI,
  author =       "Quoc-Sang Phan and Pasquale Malacaria and Oksana
                 Tkachuk and Corina S. P{\u{a}}s{\u{a}}reanu",
  title =        "Symbolic quantitative information flow",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382791",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Quantitative Information Flow (QIF) is a powerful
                 approach to quantify leaks of confidential information
                 in a software system. Here we present a novel method
                 that precisely quantifies information leaks. In order
                 to mitigate the state-space explosion problem, we
                 propose a symbolic representation of data, and a
                 general SMT-based framework to explore systematically
                 the state space. Symbolic Execution fits well with our
                 framework, so we implement a method of QIF analysis
                 employing Symbolic Execution. We develop our method as
                 a prototype tool that can perform QIF analysis for a
                 software system developed in Java. The tool is built on
                 top of Java Pathfinder, an open source model checking
                 platform, and it is the first tool in the field to
                 support information-theoretic QIF analysis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rimlinger:2012:TGS,
  author =       "Frank Rimlinger",
  title =        "Test generation via symbolic simulation",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382795",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Mango extension project of JPF is an Eclipse
                 Workbench plugin which creates a functional
                 specification of Java source code. The specification is
                 presented as a series of navigable pages within Eclipse
                 views. Representative code examples containing faults
                 are processed by Mango. The output specification views
                 are then navigated for the purpose of discovering
                 robust fault recognition rules for automated testing.
                 This paper describes how the analyst and tool work
                 together to generate a test for a selected
                 vulnerability described in an Oracle publication, the
                 exposition of confidential data by the exception
                 handler mechanism.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shafiei:2012:MCL,
  author =       "Nastaran Shafiei and Peter Mehlitz",
  title =        "Modeling class loaders in {Java PathFinder} version
                 7",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382800",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The class loading mechanism is one of the essential
                 components of the Java runtime environment. Java class
                 loading is performed on-demand, allows multiple, user
                 extensible class loaders, and can associate a separate
                 type namespace with each class loader. Previous
                 versions of the Java Pathfinder (JPF) model checker
                 only provided a single, hardcoded class loading
                 mechanism. As one of the cornerstones of the upcoming
                 JPF version 7 (JPF v7), we have implemented a standard
                 Java conforming class loader infrastructure. Our
                 implementation does not only support different class
                 loaders and type namespaces, but also allows explicit
                 instantiation of multiple bootstrap class loaders which
                 is essential for model checking of distributed
                 applications --- the primary motivation for our work.
                 With the new class loading mechanism, such applications
                 can be mapped to threads using different bootstrap
                 class loaders, thus effectively separating all static
                 fields between application threads. In addition, the
                 JPF v7 class loading is considered to be the basis for
                 future verification of Java security properties.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2012:SOO,
  author =       "Meenakshi Sharma and Nasib S. Gill and Sunil Sikka",
  title =        "Survey of object-oriented metrics: focusing on
                 validation and formal specification",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382770",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To quantify various attributes of object-oriented
                 software systems, numerous object-oriented metrics have
                 been proposed by various researchers. This paper
                 surveys existing object-oriented metrics by focusing on
                 the two major issues-Validation and Formal
                 Specification. This paper provides researchers with an
                 understanding of existing object-oriented metrics in
                 terms of validation and formal specification. Because
                 few metrics are validated and formally specified, there
                 is a need of both validation and formal specification
                 of object-oriented metrics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{vanderMerwe:2012:VAA,
  author =       "Heila van der Merwe and Brink van der Merwe and Willem
                 Visser",
  title =        "Verifying {Android} applications using {Java
                 PathFinder}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Mobile application testing is a specialised and
                 complex field. Due to mobile applications' event driven
                 design and mobile runtime environment, there currently
                 exist only a small number of tools to verify these
                 applications. This paper describes the development of
                 JPF-ANDROID, an Android application verification tool.
                 JPF-ANDROID is built on Java Pathfinder, a Java model
                 checking engine. JPF-ANDROID provides a simplified
                 model of the Android framework on which an Android
                 application can run. It then allows the user to script
                 input events to drive the application flow. JPF-ANDROID
                 provides a way to detect common property violations
                 such as deadlocks and runtime exceptions in Android
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Zhang:2012:SSS,
  author =       "Yufeng Zhang and Zhenbang Chen and Ji Wang",
  title =        "{S2PF}: speculative symbolic {PathFinder}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382792",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Recently, symbolic execution has gained a significant
                 progress in its techniques and applications. However,
                 in practice, scalability is still a key challenge for
                 symbolic execution. In this paper, we present S2PF,
                 which improves the scalability of Symbolic PathFinder
                 by integrating speculative symbolic execution with the
                 general heuristic search framework. In addition, two
                 optimizations are proposed to improve the speculative
                 symbolic execution in S2PF. Experimental results on six
                 programs show that, S2PF can reduce the solver
                 invocations by 36.4\% to 48.7\% (with an average of
                 40.3\%), and save the search time by 30.6\% to 43.5\%
                 (with an average of 35\%).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bell:2012:RSIa,
  author =       "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
                 and Swapneel Sheth",
  title =        "Report from the {Second International Workshop on
                 Games and Software Engineering (GAS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382763",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Meneely:2012:ICM,
  author =       "Andrew Meneely and Oluyinka Williams",
  title =        "Interactive churn metrics: socio-technical variants of
                 code churn",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382785",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A central part of software quality is finding bugs.
                 One method of finding bugs is by measuring important
                 aspects of the software product and the development
                 process. In recent history, researchers have discovered
                 evidence of a ``code churn'' effect whereby the degree
                 to which a given source code file has changed over time
                 is correlated with faults and vulnerabilities.
                 Computing the code churn metric comes from counting
                 source code differences in version control
                 repositories. However, code churn does not take into
                 account a critical factor of any software development
                 team: the human factor, specifically who is making the
                 changes. In this paper, we introduce a new class of
                 human-centered metrics, ``interactive churn metrics''
                 as variants of code churn. Using the git blame tool, we
                 identify the most recent developer who changed a given
                 line of code in a file prior to a given revision. Then,
                 for each line changed in a given revision, determined
                 if the revision author was changing his or her own code
                 (``self churn''), or the author was changing code last
                 modified by somebody else (``interactive churn''). We
                 derive and present several metrics from this concept.
                 Finally, we conducted an empirical analysis of these
                 metrics on the PHP programming language and its
                 post-release vulnerabilities. We found that our
                 interactive churn metrics are statistically correlated
                 with post-release vulnerabilities and only weakly
                 correlated with code churn metrics and source lines of
                 code. The results indicate that interactive churn
                 metrics are associated with software quality and are
                 different from the code churn and source lines of
                 code.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wang:2012:BPS,
  author =       "Wenyuan Wang and Zheng Zhang",
  title =        "Balanced partition scheme for distributed caching
                 systems to solve load imbalance problems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382772",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Distributed caching system is usually used to
                 alleviate database load in constructing an enterprise
                 web application system. It helps to speed up dynamic
                 web applications. In order to improve the utilization
                 of caching cluster, an appropriate data partitioning
                 and placement scheme is usually applied. This paper
                 proposes a Balanced Partition Scheme (BPS) to solve
                 load imbalance problems and highly skewed data requests
                 in web application. In the BPS, which is based on
                 consistent hash algorithm, the partition and placement
                 schemes are designed respectively to guarantee a
                 system's load balance even when the requests of this
                 system are highly skewed. The range of hash function is
                 divided into several groups equally and those groups
                 will be relocated when caching nodes are overloaded.
                 The implementation and evaluation of the BPS is also
                 presented in this paper. The effectiveness of the BPS
                 has been verified in the simulation experiment and the
                 BPS can successfully solve load imbalance problems when
                 faced with a large number of get/set requests.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Caglayan:2012:IOA,
  author =       "Bora Caglayan and Ayse Bener",
  title =        "Issue ownership activity in two large software
                 projects",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382786",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Issue management is one of the major challenges of
                 software development teams. Balanced workload
                 allocation of developers who are responsible for the
                 maintenance of the software product would impact the
                 long-term reliability of the product. In this paper, we
                 analyse the issue report, issue ownership, and issue
                 resolve patterns of two large software products over a
                 period of time. We use GINI index to estimate the
                 inequalities in issue ownership over time. Our results
                 indicate that a small group of developers tends to take
                 the ownership of a large portion of new issues
                 especially when the active issue count is relatively
                 high in the software development life cycle. We discuss
                 the implications of this trend and propose long-term
                 issue management strategies to deal with them.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Colombo:2012:PSS,
  author =       "Regina Thienne Colombo and Marcelo Schneck Pess{\^o}a
                 and Ana Cervigni Guerra and Amandio Balc{\~a}o Filho
                 and C{\'e}lio Caruso Gomes",
  title =        "Prioritization of software security intangible
                 attributes",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382781",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Intangible elements, such as value ranges of software
                 security properties (e.g., confidentiality, integrity
                 and availability), can be seen as resources to enforce
                 software security. There are no standard units
                 regarding these properties, turning their measurement
                 into a difficult process. On the other hand, we can
                 measure or estimate priorities for intangible elements
                 from tangible ones, since their priorities are
                 proportional. The priorities of tangible resources can
                 be used to assign values to the priorities of
                 intangible resources through the experience of the
                 involved analysts. In this paper, we present a
                 theoretical process based on mathematical constructs to
                 score the priority and to estimate measures of software
                 security attributes. This process causes the complex
                 systems decomposition into simpler and smaller systems,
                 thus allowing the estimation of properties that will
                 help the understanding and measurement of software
                 security properties. Our results provide a model for
                 access security; the priority score of security
                 attributes is calculated using the AHP methodology. We
                 illustrate the application of our approach in a Web
                 management system for governmental research
                 institutions, presenting results that may support
                 managers in the prioritization, evaluation and
                 management of security requirements related to Web
                 applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lago:2012:RIW,
  author =       "Patricia Lago and Grace A. Lewis and Andreas Metzger
                 and Vladimir Tosic and Domenico Bianculli and Antinisca
                 {Di Marco} and Andrea Polini and Pierluigi Plebani",
  title =        "Report of the {4th International Workshop on
                 Principles of Engineering Service-Oriented Systems
                 (PESOS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382764",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 4th International Workshop on Principles of
                 Engineering Service-Oriented Systems (PESOS 2012) was
                 held at the International Conference on Software
                 Engineering, ICSE 2012, on June 4, 2012. The special
                 theme of this 4th edition of PESOS was ``The Internet
                 of Services.'' PESOS 2012 brought together software
                 engineering researchers from academia and industry, as
                 well as practitioners working in the areas of
                 service-oriented systems, to discuss research
                 challenges, recent developments, novel application
                 scenarios, as well as methods, techniques, experiences,
                 and tools to support engineering, evolution and
                 adaptation of large-scale, highly-dynamic
                 service-oriented systems. For the first time, PESOS
                 featured a special session on ``The Quest for Case
                 Studies.'' This effort created an initial reference set
                 of case studies, hosted on a publicly-available
                 repository, for the research community in
                 service-oriented systems. The multiple discussions
                 throughout the day resulted in the identification
                 service requirements for the Internet of Services.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2012:PMD,
  author =       "Indu Singh and Manoj Kumar",
  title =        "A proposed model for data warehouse user behaviour
                 using intrusion detection system",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382771",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Data Warehouse (DW) systems maintain sensitive and
                 crucial information, which is integrated from various
                 heterogeneous sources of organization. With the ever
                 increasing deployment and usage of networks, these
                 systems are becoming more vulnerable to malicious
                 attacks. With the increased number of attacks,
                 intrusion detection has become vital part of
                 Information Security. In this paper, we have proposed a
                 model for analyzing and detecting anomalous events
                 based on user behavior analysis through usage patterns,
                 user profiles and session management. After monitoring
                 the events in the system, if any intrusion activity
                 occurs, then alerts are issued to system
                 administrators. Since a user profile is not necessarily
                 fixed but rather it evolves with changing time, so a
                 dynamic user behavior modeling is represented as a
                 sequence of events and combination of fact and
                 dimension tables accessed by the users. In this way, DW
                 systems may be protected by the malicious attacks.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hofer:2012:AWI,
  author =       "Birgit Hofer and Franz Wotawa and Rui Abreu",
  title =        "{AI} for the win: improving spectrum-based fault
                 localization",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382784",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A considerable amount of time in software engineering
                 is spent in debugging. In practice, mainly debugging
                 tools which allow for executing a program step-by-step
                 and setting break points are used. This debugging
                 method is however very time consuming and cumbersome.
                 There is a need for tools which undertake the task of
                 narrowing down the most likely fault locations. These
                 tools must complete this task with as little user
                 interaction as possible and the results computed must
                 be beneficial so that such tools appeal to programmers.
                 In order to come up with such tools, we present three
                 variants of the well-known spectrum-based fault
                 localization technique that are enhanced by using
                 methods from Artificial Intelligence. Each of the three
                 combined approaches outperforms the underlying basic
                 method concerning diagnostic accuracy. Hence, the
                 presented approaches support the hypothesis that
                 combining techniques from different areas is
                 beneficial. In addition to the introduction of these
                 techniques, we perform an empirical evaluation, discuss
                 open challenges of debugging and outline possible
                 solutions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lochmann:2012:BIA,
  author =       "Klaus Lochmann",
  title =        "A benchmarking-inspired approach to determine
                 threshold values for metrics",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382782",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In order to assess software quality by software
                 metrics, usually, thresholds for metric values are
                 needed. A common problem is to define reasonable
                 threshold values. One possible solution is to use a
                 benchmarking approach: the threshold value for a metric
                 is calculated based on the metric values of a set of
                 systems, which are called benchmarking base. A relevant
                 question is, how the used benchmarking base influences
                 the result of the software quality assessment. Based on
                 the quality assessment approach of Quamoco, we conduct
                 a series of experiments, using different benchmarking
                 bases. For each benchmarking base a quality assessment
                 of a series of test systems is conducted. We analyze
                 the whether the quality assessment results of the test
                 systems are concordant for different benchmarking
                 bases. The main findings are: (1) The bigger the
                 benchmarking base, the less divergent are the rankings,
                 and the less is the variance of the results. (2) The
                 size of the systems contained within a benchmarking
                 base does not influence the results, i.e. a
                 benchmarking base containing small systems works
                 equally well for small and large systems, and vice
                 versa. These results show that benchmarking is a
                 feasible approach for determining threshold values.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Machado:2012:STP,
  author =       "Ivan do Carmo Machado and John D. McGregor and Eduardo
                 Santana de Almeida",
  title =        "Strategies for testing products in software product
                 lines",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382783",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The software product line engineering strategy enables
                 the achievement of significant improvements in quality
                 through reuse of carefully crafted software assets
                 across multiple products. However, high levels of
                 quality in the software product line assets, which are
                 used to create products, must be accompanied by
                 effective and efficient test strategies for the
                 products in the software product line. The goal of this
                 study is to understand which strategies for testing
                 products in software product lines have been reported
                 in the literature, enabling discussions on the
                 significant issues, and also pointing out further
                 research directions. A systematic literature review was
                 carried out that identified two hundred seventy-three
                 papers, published from the years 1998 and early in
                 2012. From such a set of papers, a systematic selection
                 resulted in forty-one relevant papers. The analysis of
                 the reported strategies comprised two important
                 aspects: the selection of products for testing, and the
                 actual test of products. The findings showed a range of
                 strategies, dealing with both aspects, but few
                 empirical evaluations of their effectiveness have been
                 performed, which limits the inferences that can be
                 drawn.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Misra:2012:JSC,
  author =       "Janardan Misra and Annervaz KM and Vikrant Kaulgud and
                 Shubhashis Sengupta and Gary Titus",
  title =        "{Java} source-code clustering: Unifying syntactic and
                 semantic features",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382766",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from an international workshop on
                 ``Social and Algorithmic Issues in Business Support''
                 (SAIBS), which was organized in conjunction with the
                 16th ADBIS Conference in Poznan, Poland, on September
                 17, 2012. The main focus of this workshop was to
                 provide a venue for the discussion whether social
                 stands in opposition to algorithmic or systematic. We
                 analyzed social contribution to business processes
                 taking into account possible benefits and risk factors.
                 Questions raised in collected research and discussion
                 related to how far business could relay on social input
                 and what were the limits or what were the areas where
                 introducing crowdsourced components might increase
                 overall risk value to unacceptable level? Algorithmic
                 approach to observe and collect social behaviour was
                 discussed in the context of internet auctions
                 participants and car drivers equipped in mobile
                 application for instant route planning and collecting
                 feedback cartracking data. Having in mind Andrew Keen's
                 critique of social contribution in Web 2.0-related
                 phenomena we looked for the Wisdom of Crowds [1].
                 Collected conclusions and further dissemination of
                 research results should lead to an improvement in
                 utilizing social impact on software development and
                 business processes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Brahmasani:2012:PXA,
  author =       "Siva Brahmasani and Subramanian Selvakumar and E.
                 Sivasankar",
  title =        "Prevention of {XSS} attacks using {STCD}: Server side
                 tagging and client side differentiation",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382768",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Variability (the ability of a software system or
                 software artifact to be adapted for use in a specific
                 context) is reflected in and facilitated through the
                 software architecture. The Second International
                 Workshop on Variability in Software Architecture
                 (VARSA) was held in conjunction with the Joint 10th
                 Working IEEE/IFIP Conference on Software Architecture
                 and 6th European Conference on Software Architecture
                 2012 in Helsinki, Finland. The workshop aimed at
                 exploring current and emerging methods, languages,
                 notations technologies and tools to model, implement,
                 and manage variability in the software architecture. It
                 featured one industrial talk, five research paper
                 presentations, and three working group discussions.
                 Working groups discussed topics that emerged during the
                 workshop. This report summarizes the themes of the
                 workshop and presents the results of the working group
                 discussions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mrunalini:2012:DPM,
  author =       "M. Mrunalini and T. V. Suresh Kumar and K. Rajani
                 Kanth",
  title =        "Dynamic process model for identifying modified data
                 using mobile agents in real time {ETL} processes",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--9",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382767",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Usability and accessibility issues are common causes
                 why software fails to meet user requirements. However,
                 requirements engineers still focus on functional
                 requirements and might ignore to also elicit system
                 usability and accessibility requirements. This is a
                 high risk which can lead to project and software
                 failure. Improving the usability and accessibility of a
                 system in a later development stage is costly and time
                 consuming. Targeting these concerns, the workshop
                 envisioned that research must address the proper
                 integration of system usability and accessibility
                 requirements into the requirements engineering process
                 and also must focus on how to manage and control the
                 evaluation of these requirements in a systematic way.
                 UsARE 2012 provided a platform for discussing issues
                 which are relevant for both fields, the Requirements
                 Engineering (RE) and the Human Computer Interaction
                 (HCI). The workshop aim was to bring\ together people
                 from these two communities (RE and HCI) to explore this
                 integration. Researchers and practitioners were invited
                 to submit contributions including problem statements,
                 technical solutions, experience reports, planned work
                 and vision papers. Envisioned results may help aligning
                 RE and HCI processes in order to overcome open issues
                 in these fields.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2012:MVC,
  author =       "Parminder Kaur and Hardeep Singh",
  title =        "A Modified Version Control Tool for Component-Based
                 Systems",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "1--10",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382765",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 8th International Conference on the Quality of
                 Information and Communications Technology (QUATIC 2012)
                 took place in Lisbon, Portugal, from 3 to 6 September
                 2012. QUATIC serves as a forum for disseminating
                 advanced methods, techniques and tools for supporting
                 quality approaches to ICT engineering and management.
                 The Conference Program of the 2012 edition was
                 organized on a series of Thematic Tracks on the first
                 day, each corresponding to a specific topic of
                 interest, and a Main Track on the second and third days
                 of the conference, with keynote speakers and extended
                 paper presentations selected among the best papers of
                 the thematic tracks. This short report summarizes the
                 paper and keynote presentations at QUATIC 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bernstein:2012:TLT,
  author =       "Larry Bernstein",
  title =        "Things i learned from taming software development",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "5--6",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382757",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Grechanik:2012:RBA,
  author =       "Mark Grechanik",
  title =        "Random benchmark application generation for evaluating
                 program analysis and testing tools",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "6--7",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382758",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2012:LWD,
  author =       "Robert Schaefer",
  title =        "Limitations of web design",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "7--8",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382759",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2012:SEEe,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "8--9",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382760",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2012:SNSf,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "10--18",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382780",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2012:RPf,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "19--23",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382779",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Garbervetsky:2012:RIW,
  author =       "Diego Garbervetsky and Sunghun Kim",
  title =        "Report from {2nd International Workshop on Developing
                 Tools as Plug-Ins (TOPI 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "24--27",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382775",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Workshop on Developing Tools as
                 Plug-Ins (TOPI) is a venue for researchers and
                 practitioners interested in plug-in development. The
                 main interest is understanding the opportunities and
                 challenges of developing tools as plug-ins, and thus,
                 we seek for discussions regarding the characteristics
                 of good plug-ins, interoperability requirements to
                 making tools available across platforms, recent
                 successful tools as plug-ins as well as foreseen medium
                 and long term challenges of tools as plug-ins. The
                 second edition of this workshop, TOPI 2012 was
                 co-located with the International Conference on
                 Software Engineering (ICSE 2012). TOPI 2012 received a
                 total of 32 submissions. Among them, 14 were accepted
                 as full papers and 4 as short papers. The audience
                 during the whole workshop ranged from 25 to 30
                 participants. The final program comprised position
                 papers including new proposals for plug-in
                 architectures as well as their interaction with
                 development environments and run-times, and papers
                 discussing the implementation of different kind of
                 tools as plug-ins. This report describes the main
                 results of TOPI 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bell:2012:RSIb,
  author =       "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
                 and Swapneel Sheth",
  title =        "Report from the {Second International Workshop on
                 Games and Software Engineering (GAS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "26--27",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382776",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Second International Workshop on Games and
                 Software Engineering (GAS 2012) was held in June 2012,
                 collocated with ICSE 2012 in Zurich, Switzerland. GAS
                 2012 explores issues that crosscut the software
                 engineering and the game engineering communities.
                 Advances in game engineering techniques can be adopted
                 by the software engineering community to develop more
                 engaging applications across diverse domains:
                 education; healthcare; fitness; sustainable activities
                 (e.g., recycling awareness); and so on. Successful
                 computer games feature a property that is not always
                 found in traditional software: they are highly
                 engaging. Engaging games enthrall players and result in
                 users willing to spend increasing amounts of time and
                 money playing them. Nine submissions were accepted for
                 the workshop, which also featured a panel session and
                 an informal poster session.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gruner:2012:FWF,
  author =       "Stefan Gruner and Bernhard Rumpe",
  title =        "{FormSERA Workshop on Formal Methods in Software
                 Engineering Rigorous and Agile Approaches}: 2nd of
                 {June 2012} at {ICSE'2012} in {Z{\"u}rich (CH)}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "28--30",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382777",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes the activities and results of
                 the FormSERA workshop on Formal Methods in Software
                 Engineering --- Rigorous and Agile Approaches. The
                 workshop took place on the 2nd of June 2012 in
                 Z{\"u}rich (CH) under the umbrella of the 34th
                 International Conference on Software Engineering, ICSE
                 2012, see http://www.formsera.org/.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tekinerdogan:2012:FTS,
  author =       "Bedir Tekinerdogan",
  title =        "{First Turkish Software Product Line Engineering
                 Workshop} summary",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "30--34",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382778",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software reuse has been a goal of the software
                 community since the early days of software engineering.
                 In this context software product line engineering
                 (SPLE) has gained a broad interest in both academic
                 institutions and industry. This trend can also be
                 observed in Turkey. In the recent years an increasing
                 number of software companies in Turkey have adopted a
                 SPLE approach while others are planning to make the
                 transition. This paper summarizes the results of the
                 First Turkish Software Product Line Engineering
                 Workshop that has been organized in Ankara in June
                 2012. The primary goal of the workshop was to reflect
                 on the state of practice in SPLE in Turkey. For this
                 five leading SPLE companies in Turkey have shared their
                 experiences in adopting SPLE, and using interactive
                 discussions a research agenda for SPLE in Turkey has
                 been defined. We report both on the experiences from
                 the workshop and the resulting research topics.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Swamy:2012:BRSb,
  author =       "Harisankar Krishna Swamy",
  title =        "Book Review: {{\booktitle{Structured parallel
                 programming patterns for efficient computation}} by
                 Michael McCool, Arch D. Robison and James Reinders}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "43--43",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382773",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bangalore:2012:BRA,
  author =       "Srinivasan M. Bangalore",
  title =        "Book Review: {{\booktitle{Agile Analytics}} by Ken
                 Collier}",
  journal =      j-SIGSOFT,
  volume =       "37",
  number =       "6",
  pages =        "43--44",
  month =        nov,
  year =         "2012",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2382756.2382774",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:18 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2013:CLS,
  author =       "Alok Mishra and Deepti Mishra",
  title =        "A curriculum for large scale software development",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413042",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Large scale software developments are becoming common
                 in software development organizations. Getting exposure
                 to work on similar projects is very significant for
                 this course. Here, major components of large scale
                 software development curriculum are discussed along
                 with suggestions towards making it a successful course
                 of software engineering curriculum.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Couto:2013:CDE,
  author =       "Cesar Couto and Cristiano Maffort and Rogel Garcia and
                 Marco Tulio Valente",
  title =        "{COMETS}: a dataset for empirical research on software
                 evolution using source code metrics and time series
                 analysis",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--3",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413047",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper documents a time series dataset on the
                 evolution of seventeen object-oriented metrics
                 extracted from ten open-source systems. By making this
                 dataset public our goal is to assist researchers with
                 interest in software evolution analysis and modeling.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Pande:2013:OCS,
  author =       "Jeetendra Pande and Christopher J. Garcia and Durgesh
                 Pant",
  title =        "Optimal component selection for component based
                 software development using pliability metric",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413044",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component Based Software Development (CBSD) has gained
                 widespread acceptance as it often results in higher
                 quality software with a significant reduction in
                 development time and costs. A key idea behind CBSD is
                 the extensive reuse and composition of preexisting
                 modules into new software. In this paper we introduce
                 the pliability metric, which is well suited to a
                 component-based orientation and extends previous
                 metrics. Pliability is a flexible measure that assesses
                 software quality across different quality attributes in
                 terms of the quality of its components. In addition, we
                 have developed an optimal component selection model
                 based on integer programming, for maximizing
                 pliability. Through computational experimentation we
                 demonstrate that this model is capable of finding
                 optimal solutions to problems with a very large number
                 of components and requirements in a short time.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bedi:2013:MMT,
  author =       "Punam Bedi and Vandana Gandotra and Archana Singhal
                 and Himanshi Narang and Sumit Sharma",
  title =        "Mitigating multi-threats optimally in proactive threat
                 management",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413041",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In turbulent economic times, the cost effectiveness of
                 security measures is of the utmost importance when
                 designing safeguards or countermeasures. This paper
                 presents an optimal approach: MMT-O, Mitigating
                 Multi-Threats Optimally, to meet the above challenges.
                 The proposed approach is based on an optimum mitigation
                 path set generation algorithm that provides optimal
                 plans for threat/vulnerability management which can be
                 adopted at the design level of the software life cycle.
                 In MMT-O, a multi-threat attack graph is generated by
                 combining all of the individual threats responsible for
                 security compromise of the system. It identifies a
                 unique set of attacks needing mitigation by removing
                 redundant nodes, as an attack can be a part of multiple
                 threats. The proposed algorithm, implemented in Java,
                 provides the minimum mitigation paths required to be
                 blocked to avert the threat. Countermeasures using a
                 multi-agent system are inducted in these identified
                 mitigation paths to avert the threat optimally. The
                 proposed approach has been applied on different test
                 cases and the results validate its economic
                 justification over traditional security solutions as a
                 part of proactive threat management.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saxena:2013:UML,
  author =       "Vipin Saxena and Deepak Arora and Nimesh Mishra",
  title =        "{UML} modeling of load optimization for distributed
                 computer systems based on genetic algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413043",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Distributed computing has now become one of the most
                 efficient network system configurations to exhibit
                 parallelism in loosely coupled systems. These systems
                 are known for better reliability, availability,
                 scalability and robustness, intended to provide high
                 performance computing in a very efficient manner. The
                 composition of distributed systems consists of multiple
                 autonomous computers that can be geographically
                 dispersed and interconnected with each other to provide
                 optimum resource utilization. The degree of resource
                 utilization is one of the key criteria for evaluating
                 the performance of such systems. We propose a
                 genetic-algorithm-based approach to load optimization
                 in a distributed computing environment. Genetics
                 algorithm has been adapted from the biological gene
                 theory. Since it shows the existence of the fittest
                 chromosome from the sample chromosomes population, it
                 may be used to find the most optimum solution for any
                 problem. This research work demonstrates the
                 implication of genetic algorithms to optimize the
                 overall waiting time for a set of processes to be
                 executed on a set of servers. In order to understand
                 the design complexity, we modeled the proposed approach
                 using UML class and sequence diagrams. The results of
                 the proposed model have been found beneficial when
                 implemented and tested under various test scenarios
                 using C++.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2013:ESE,
  author =       "Gagandeep Singh and Hardeep Singh",
  title =        "Effect of software evolution on metrics and
                 applicability of {Lehman}'s laws of software
                 evolution",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413046",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nagpal:2013:ASE,
  author =       "Geeta Nagpal and Moin Uddin and Arvinder Kaur",
  title =        "Analyzing software effort estimation using k means
                 clustered regression approach",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "1--9",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413045",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software estimation is an area where more assurances
                 have been broken than in any other area of software
                 development. Numerous studies attempting new and
                 reliable software effort estimation techniques have
                 been proposed but no consensus as to which techniques
                 are the most appropriate has been reached so far. Due
                 to the intangible nature of ``software'', effort
                 estimation with a high level of accuracy remains a
                 dream for developers. It is unlikely to expect very
                 accurate estimates of development effort because of the
                 inherent uncertainty in software projects and the
                 complex and dynamic interaction of factors that impact
                 software development. Heterogeneity exists in software
                 engineering datasets because data is obtained from
                 diverse sources. This can be reduced by defining
                 certain relationships between the data values by
                 classifying them into different clusters. This study
                 focuses on how the combination of clustering and
                 regression techniques can reduce the potential problem
                 in effectiveness of predictive efficiency due to
                 heterogeneity of the data. Using a clustered approach
                 creates subsets of data having a degree of homogeneity
                 that enhances prediction accuracy. It was also observed
                 in this study that ridge regression performs better
                 than other regression techniques. Another key finding
                 is that by selecting a subset of highly predictive
                 attributes using Grey relational analysis a significant
                 improvement in prediction can be achieved.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Huang:2013:TOQ,
  author =       "Shihong Huang and Dragutin Petkovic and Kazunori Okada
                 and Marc Sosnick and Shenhaochen Zhu and Rainer
                 Todtenhoefer",
  title =        "Toward objective and quantitative assessment and
                 prediction of teamwork effectiveness in software
                 engineering courses",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "7--9",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413071",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "10--19",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413072",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "20--26",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413073",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bencomo:2013:RIW,
  author =       "Nelly Bencomo and Gordon Blair and Sebastian G{\"o}tz
                 and Brice Morin and Bernhard Rumpe",
  title =        "Report on the {7th International Workshop on
                 Models@Runtime}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "27--30",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413061",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 7th edition of the workshop Models@Runtime was
                 held at the 15th International Conference on Model
                 Driven Engineering Languages and Systems (MODELS). The
                 workshop took place in the city of Innsbruck, Austria,
                 on the 2nd of October 2012. The workshop was organised
                 by Nelly Bencomo, Gordon Blair, Sebastian G{\~A}\P tz,
                 Brice Morin and Bernhard Rumpe. It was attended by at
                 least 48 people. In this report we present a synopsis
                 of the presentations and breakout discussions that took
                 place during the workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lago:2013:EIC,
  author =       "Patricia Lago and Rick Kazman and Niklaus Meyer and
                 Maurizio Morisio and Hausi A. M{\"u}ller and Frances
                 Paulisch",
  title =        "Exploring initial challenges for green software
                 engineering: summary of the first {GREENS} workshop, at
                 {ICSE 2012}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "31--33",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413062",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The GREENS workshop provides a forum for practitioners
                 and academics to share knowledge, ideas, practices and
                 current results related to green and sustainable
                 software engineering. This first workshop was held at
                 ICSE 2012 in Zurich, Switzerland. It featured a keynote
                 talk, twelve research position statements and two
                 breakout sessions that discussed topics that ranged
                 from bringing sustainability and energy efficiency into
                 all software lifecycle stages, to green measures and
                 estimations, practices, notations, and tools to both
                 greening the software engineering process, and greening
                 the resulting Information and Communication Technology
                 systems. This report presents the themes of the
                 workshop, summarizes the results of the discussions
                 held in the breakout sessions, as well as the
                 identified research challenges.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bell:2013:RSI,
  author =       "Jonathan Bell and Kendra M. L. Cooper and Gail Kaiser
                 and Swapneel Sheth",
  title =        "Report from the {Second International Workshop on
                 Games and Software Engineering (GAS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "34--35",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413063",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lago:2013:RIW,
  author =       "Patricia Lago and Grace A. Lewis and Andreas Metzger
                 and Vladimir Tosic and Domenico Bianculli and Antinisca
                 {Di Marco} and Andrea Polini and Pierluigi Plebani",
  title =        "Report of the {4th International Workshop on
                 Principles of Engineering Service-Oriented Systems
                 (PESOS 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "35--38",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413064",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 4th International Workshop on Principles of
                 Engineering Service-Oriented Systems (PESOS 2012) was
                 held at the International Conference on Software
                 Engineering, ICSE 2012, on June 4, 2012. The special
                 theme of this 4th edition of PESOS was ``The Internet
                 of Services.'' PESOS 2012 brought together software
                 engineering researchers from academia and industry, as
                 well as practitioners working in the areas of
                 service-oriented systems, to discuss research
                 challenges, recent developments, novel application
                 scenarios, as well as methods, techniques, experiences,
                 and tools to support engineering, evolution and
                 adaptation of large-scale, highly-dynamic
                 service-oriented systems. For the first time, PESOS
                 featured a special session on ``The Quest for Case
                 Studies.'' This effort created an initial reference set
                 of case studies, hosted on a publicly-available
                 repository, for the research community in
                 service-oriented systems. The multiple discussions
                 throughout the day resulted in the identification
                 service requirements for the Internet of Services.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2013:MVC,
  author =       "Parminder Kaur and Hardeep Singh",
  title =        "A Modified Version Control Tool for Component-Based
                 Systems",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "39--41",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382765",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 8th International Conference on the Quality of
                 Information and Communications Technology (QUATIC 2012)
                 took place in Lisbon, Portugal, from 3 to 6 September
                 2012. QUATIC serves as a forum for disseminating
                 advanced methods, techniques and tools for supporting
                 quality approaches to ICT engineering and management.
                 The Conference Program of the 2012 edition was
                 organized on a series of Thematic Tracks on the first
                 day, each corresponding to a specific topic of
                 interest, and a Main Track on the second and third days
                 of the conference, with keynote speakers and extended
                 paper presentations selected among the best papers of
                 the thematic tracks. This short report summarizes the
                 paper and keynote presentations at QUATIC 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Misra:2013:JSC,
  author =       "Janardan Misra and Annervaz KM and Vikrant Kaulgud and
                 Shubhashis Sengupta and Gary Titus",
  title =        "{Java} source-code clustering: Unifying syntactic and
                 semantic features",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "41--43",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382766",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from an international workshop on
                 ``Social and Algorithmic Issues in Business Support''
                 (SAIBS), which was organized in conjunction with the
                 16th ADBIS Conference in Poznan, Poland, on September
                 17, 2012. The main focus of this workshop was to
                 provide a venue for the discussion whether social
                 stands in opposition to algorithmic or systematic. We
                 analyzed social contribution to business processes
                 taking into account possible benefits and risk factors.
                 Questions raised in collected research and discussion
                 related to how far business could relay on social input
                 and what were the limits or what were the areas where
                 introducing crowdsourced components might increase
                 overall risk value to unacceptable level? Algorithmic
                 approach to observe and collect social behaviour was
                 discussed in the context of internet auctions
                 participants and car drivers equipped in mobile
                 application for instant route planning and collecting
                 feedback car-tracking data. Having in mind Andrew
                 Keen's critique of social contribution in Web
                 2.0-related phenomena we looked for the Wisdom of
                 Crowds [1]. Collected conclusions and further
                 dissemination of research results should lead to an
                 improvement in utilizing social impact on software
                 development and business processes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mrunalini:2013:DPM,
  author =       "M. Mrunalini and T. V. Suresh Kumar and K. Rajani
                 Kanth",
  title =        "Dynamic process model for identifying modified data
                 using mobile agents in real time {ETL} processes",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "43--46",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382767",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Usability and accessibility issues are common causes
                 why software fails to meet user requirements. However,
                 requirements engineers still focus on functional
                 requirements and might ignore to also elicit system
                 usability and accessibility requirements. This is a
                 high risk which can lead to project and software
                 failure. Improving the usability and accessibility of a
                 system in a later development stage is costly and time
                 consuming. Targeting these concerns, the workshop
                 envisioned that research must address the proper
                 integration of system usability and accessibility
                 requirements into the requirements engineering process
                 and also must focus on how to manage and control the
                 evaluation of these requirements in a systematic way.
                 UsARE 2012 provided a platform for discussing issues
                 which are relevant for both fields, the Requirements
                 Engineering (RE) and the Human Computer Interaction
                 (HCI). The workshop aim was to bring\ together people
                 from these two communities (RE and HCI) to explore this
                 integration. Researchers and practitioners were invited
                 to submit contributions including problem statements,
                 technical solutions, experience reports, planned work
                 and vision papers. Envisioned results may help aligning
                 RE and HCI processes in order to overcome open issues
                 in these fields.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Brahmasani:2013:PXA,
  author =       "Siva Brahmasani and Subramanian Selvakumar and E.
                 Sivasankar",
  title =        "Prevention of {XSS} attacks using {STCD}: Server side
                 tagging and client side differentiation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "46--49",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382768",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Variability (the ability of a software system or
                 software artifact to be adapted for use in a specific
                 context) is reflected in and facilitated through the
                 software architecture. The Second International
                 Workshop on Variability in Software Architecture
                 (VARSA) was held in conjunction with the Joint 10th
                 Working IEEE/IFIP Conference on Software Architecture
                 and 6th European Conference on Software Architecture
                 2012 in Helsinki, Finland. The workshop aimed at
                 exploring current and emerging methods, languages,
                 notations technologies and tools to model, implement,
                 and manage variability in the software architecture. It
                 featured one industrial talk, five research paper
                 presentations, and three working group discussions.
                 Working groups discussed topics that emerged during the
                 workshop. This report summarizes the themes of the
                 workshop and presents the results of the working group
                 discussions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2013:SLT,
  author =       "Vineet Sharma and S. A. M. Rizvi and Arun Sharma",
  title =        "Software Licenses --- A tool to control distribution
                 of software",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "49--51",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2382769",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Workshop on Developing Tools as
                 Plug-Ins (TOPI) is a venue for researchers and
                 practitioners interested in plug-in development. The
                 main interest is understanding the opportunities and
                 challenges of developing tools as plug-ins, and thus,
                 we seek for discussions regarding the characteristics
                 of good plug-ins, interoperability requirements to
                 making tools available across platforms, recent
                 successful tools as plug-ins as well as foreseen medium
                 and long term challenges of tools as plug-ins. The
                 second edition of this workshop, TOPI 2012 was
                 co-located with the International Conference on
                 Software Engineering (ICSE 2012). TOPI 2012 received a
                 total of 32 submissions. Among them, 14 were accepted
                 as full papers and 4 as short papers. The audience
                 during the whole workshop ranged from 25 to 30
                 participants. The final program comprised position
                 papers including new proposals for plug-in
                 architectures as well as their interaction with
                 development environments and run-times, and papers
                 discussing the implementation of different kind of
                 tools as plug-ins. This report describes the main
                 results of TOPI 2012.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Beshilas:2013:BRC,
  author =       "Bill Beshilas",
  title =        "Book Review: {{\booktitle{Collaborative enterprise
                 architecture}} by Stefan Bente, Uwe Bombosch, and
                 Shailendra Langade}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "54--54",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413051",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chapelle:2013:BRO,
  author =       "Gregory Chapelle",
  title =        "Book Review: {{\booktitle{The official Ubuntu book}},
                 seventh edition by Matthew Helmke and Amber Graner}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "54--55",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413052",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DelRa:2013:BRJ,
  author =       "William {Del Ra III}",
  title =        "Book Review: {{\booktitle{Java application
                 architecture: modularity patterns with examples using
                 OSGi}} by Kirk Knoernschild}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "55--55",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413053",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kienle:2013:BRG,
  author =       "Holger M. Kienle",
  title =        "Book Review: {{\booktitle{Grounded innovation:
                 strategies for creating digital products}} by Lars Erik
                 Holmquist}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "55--56",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413054",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Paige:2013:BRS,
  author =       "Michael Paige",
  title =        "Book Review: {{\booktitle{Sams teach yourself jQuery
                 mobile in 24 hours}} by Phil Dutson}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "56--57",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413055",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sampaio:2013:BRQ,
  author =       "Alberto Sampaio",
  title =        "Book Review: {{\booktitle{Quantifying the user
                 experience: practical statistics for user research}} by
                 Jeff Sauro and James R. Lewis}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "57--58",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413056",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saur:2013:TLP,
  author =       "Joe Saur",
  title =        "Think like a programmer: an introduction to creative
                 problem solving by V. {Anton} Spraul",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "58--58",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413057",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Stobie:2013:BRX,
  author =       "Keith Stobie",
  title =        "Book Review: {{\booktitle{OS X Mountain Lion Pocket
                 Guide}} by Chris Seibold}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "59--59",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413058",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRM,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Modern embedded computing:
                 designing connected, pervasive, media-rich systems}} by
                 Peter Barry and Patrick Crowley}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "1",
  pages =        "59--60",
  month =        jan,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2413038.2413059",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:22 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Catal:2013:TEB,
  author =       "Cagatay Catal",
  title =        "Teaching evidence-based software engineering to master
                 students: a single lecture within a course or an entire
                 semester-long course?",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "1--2",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439981",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, we summarize our perspective on
                 teaching evidence-based software engineering (EBSE) to
                 master students. In this semester, we aimed to
                 investigate this subject as a single lecture within a
                 master course called Software Architecture instead of
                 an entire semester-long course called EBSE. Each of the
                 students delivered a systematic mapping study report
                 related to the software architecture at the end of the
                 semester and these project reports showed that this
                 teaching approach is quite useful for master students
                 even though this teaching activity is too short.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rabelo:2013:ACG,
  author =       "Ricardo A. C. Rabelo and Hendrik T. Macedo and Eduardo
                 O. Freire and Rodrigo M. Oliveira",
  title =        "Automatic code generation of {SIMUROSOT} game
                 strategies: an approach based on finite state
                 machines",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "1--8",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439983",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Robot soccer is a multidisciplinary research field of
                 growing academic interest. Scientific competitions
                 worldwide have driven major technological advances in
                 the field, since research institutes and universities
                 often enroll their robotic teams and present the
                 developments achieved during the previous year. The
                 FIRA is a leading international organization that
                 promotes such type of competition. One of its various
                 competition categories is that of virtual robots
                 competing in a simulation platform called SIMUROSOT.
                 This 3D simulation platform is available so that
                 researchers and students can develop robot teams and
                 test their performance appropriately and repeatedly.
                 The major problem with the mainstream encoding
                 mechanism used in the preparation of robot teams for
                 SimuroSot is the lack of a formal process to
                 standardize the programming and model the game
                 strategies. Such lack of standardization causes several
                 limitations on the competition as a science promoter,
                 namely: (1) the difficulty of understanding other's
                 code, (2) absence of abstraction for the conceiving of
                 game strategies, (3) need for high programming skills
                 in order to produce effective game strategies and (4)
                 lack of clear separation between robots movimentation
                 primitives and specific application domain concerns ---
                 in this case, the soccer domain. This paper proposes a
                 semi-formal specification for the modeling of team game
                 strategies to the FIRA SIMUROSOT category. This
                 specification defines two levels of mapping: (1)
                 mapping of the application domain information --- in
                 this case, the soccer competition --- to Finite State
                 Machines and (2) mapping of Finite State Machines that
                 represent game strategies of a team to their respective
                 coding in a target programming language, making use of
                 coding standards that ensure the readability and
                 maintainability of the final code. Encodings of game
                 strategies in the programming language Lingo has been
                 provided following the proposal. The error-free
                 execution of such encodings on the simulation platform
                 shows the proposal feasibility.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tiwari:2013:RRT,
  author =       "Rajeev Tiwari and Noopur Goel",
  title =        "Reuse: reducing test effort",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "1--11",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439982",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Testing effort consumes more than half of all
                 development effort and is one of the important factors,
                 which obstruct quality assurance. Software reuse
                 enhances quality and productivity and at the same time
                 reduces the time-to-market of the software products. As
                 reuse applies to the development process, so too, it
                 applies to the testing process. In this paper, we
                 discuss reuse-oriented test approaches, which are used
                 to reduce the testing effort. Further, we present the
                 state-of-the-art in reuse-oriented test approaches
                 employed in reuse-oriented development processes. At
                 the end of the current paper, we argue that the current
                 trend is towards built-in test and model based testing
                 in the applications developed through reusable
                 software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Zage:2013:SSE,
  author =       "Wayne Zage",
  title =        "The security and software engineering research center
                 {(S2ERC)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "6--7",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439977",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2013:RLL,
  author =       "Robert Schaefer",
  title =        "Relay ladder logic considered harmful",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "8--9",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439978",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2013:SEEa,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "9--10",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439979",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "11--19",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439980",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "20--25",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2440001",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ralph:2013:RFS,
  author =       "Paul Ralph and Pontus Johnson and Howell Jordan",
  title =        "Report on the {First SEMAT Workshop on General Theory
                 of Software Engineering (GTSE 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "26--28",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439999",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Many academic disciplines have general theories, which
                 apply across the discipline and underlie much of its
                 research. Examples include the Big Bang theory
                 (cosmology), Maxwell's equations (electrodynamics), the
                 theories of the cell and evolution (biology), the
                 theory of supply and demand (economics), and the
                 general theory of crime (criminology). Software
                 engineering, in contrast, has no widely-accepted
                 general theory. Consequently, the SEMAT Initiative
                 organized a workshop to encourage development of
                 general theory in software engineering. Workshop
                 participants reached broad consensus that software
                 engineering would benefit from better theoretical
                 foundations, which require diverse theoretical
                 approaches, consensus on a primary dependent variable
                 and better instrumentation and descriptive research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lewis:2013:RIIa,
  author =       "Grace A. Lewis and Anca Ionita and Marin Litoiu",
  title =        "Report of the {2012 IEEE 6th International Workshop on
                 the Maintenance and Evolution of Service-Oriented and
                 Cloud-Based Systems (MESOCA 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "29--32",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439998",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 2012 IEEE 6th International Workshop on the
                 Maintenance and Evolution of Service-Oriented and
                 Cloud-Based Systems (MESOCA 2012) was held as a
                 co-located event of the International Conference on
                 Software Maintenance, ICSM 2012, on September 24, 2012.
                 MESOCA 2012 brought together software engineering
                 researchers from academia and industry, as well as
                 practitioners, to share results and open issues in the
                 area of maintenance and evolution of service-oriented
                 and cloudbased systems. The many discussions throughout
                 the day resulted in the identification of promising
                 areas of research to address existing gaps and
                 problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Froberg:2013:BRD,
  author =       "Scott Froberg",
  title =        "Book Review: {{\booktitle{Distributed and cloud
                 computing from parallel processing to the Internet of
                 Things}} by Kai Hwang, Geoffry C. Fox, and Jack J.
                 Dongarra}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "34--34",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439991",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/bibnet/authors/d/dongarra-jack-j.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{M:2013:BRL,
  author =       "Srinivasan M.",
  title =        "Book Review: {{\booktitle{Learning Rails 3}} by Simon
                 St. Laurent, Edd Dumbill and Eric J. Gruber}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "34--34",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439992",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Froberg:2013:BRP,
  author =       "Scott Froberg",
  title =        "Book Review: {{\booktitle{Private cloud computing:
                 consolidation, virtualization, and service-oriented
                 infrastructure}} by Stephen R. Smoot, Nam K. Tan}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "35--35",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439994",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gvero:2013:BRO,
  author =       "Igor Gvero",
  title =        "Book Review: {{\booktitle{Observing the user
                 experience}}, 2nd edition: a practitioner's guide to
                 user research by Elizabeth Goodman, Mike Kuniavsky, and
                 Andrea Moed}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "35--35",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439993",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Berzal:2013:BRS,
  author =       "Fernando Berzal",
  title =        "Book Review: {{\booktitle{Structured parallel
                 programming}} by Michael McCool, James Reinders \& Arch
                 Robison}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "2",
  pages =        "35--39",
  month =        mar,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2439976.2439995",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:24 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Baliyan:2013:FMH,
  author =       "Niyati Baliyan and Vidushi Sharma and Shivani",
  title =        "A fuzzy model for high-level clones in software",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464531",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "High-level similarities in software, referred to as
                 High-Level Clones (HLCs) may manifest themselves as
                 behavior clones, concept clones, collocated simple
                 clones or domain model clones [3]. The presence of such
                 similarities may deter the maintainability of software,
                 while identifying them may improve the reuse,
                 reengineering, evolution and understandability of
                 software [2]. This study proposes an integrated measure
                 of high-level cloning, using a four input fuzzy model.
                 It also proves that the calculated extent of high-level
                 cloning is practically equal to the simulation result
                 in the MATLAB's fuzzy toolbox.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Meng:2013:PBL,
  author =       "Zhang Meng",
  title =        "{PPCA-based} license plate detection algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464541",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Detection of license plates is a critical part of
                 License Plate Recognition (LPR) systems. In this paper
                 we employ methods based on Probabilistic Principal
                 Component Analysis (PPCA) to extract license plate
                 areas out of vehicle images, and apply an improved
                 normalization step to data preprocessing. The analysis
                 of our experiment shows that this algorithm achieves
                 good accuracy dealing with still vehicle images.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2013:SPM,
  author =       "Alok Mishra and Deepti Mishra",
  title =        "Software project management tools: a brief comparative
                 view",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--4",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464537",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The task of managing a software project can be an
                 extremely complex one, drawing on many personal, team,
                 and organizational resources. The quality of a software
                 product is dependent on the process in which the
                 project is completed. Time delays in software
                 development project and low productivity tend to fall
                 right to the bottom line. Recently, the evolution of
                 project management tools for both software and
                 non-software applications has been accelerating at a
                 rapid pace, and the number of available products have
                 grown significantly. There are many project management
                 tools and software being developed everyday to help
                 managers to automate the administration of individual
                 projects or groups of projects during their life-cycle.
                 This article presents a short comparison of popular
                 software project management tools.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chaudhary:2013:ERA,
  author =       "Ritika Chaudhary and Ram Chatterjee",
  title =        "Essence of reusability in aspect-oriented systems",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464532",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Programmers practicing software development have long
                 realized that reusability is an important area of
                 concern --- it is an attribute of quality, which
                 depicts the extent to which a module can be used again
                 in different applications with slight modification.
                 Software professionals often adopt the Module-oriented
                 Approach (MOA) and / or the Object-Oriented Approach
                 (OOA) to develop reusable software. However, these
                 approaches do not address crosscutting concerns (such
                 as logging, security etc.), which are scattered
                 throughout the code and which if poorly done adversely
                 affect reusability and maintainability. Readers may
                 note that ``reusability'' is a quality attribute whose
                 assessment remains quite underexplored. This paper
                 discusses the importance of reusability as a quality
                 attribute and its essence in Aspect-Oriented Systems.
                 This paper has been split into Introduction, Quality
                 Parameters, Conclusion and Future Scope. In the
                 Introduction, the focus is on how Aspect-Oriented
                 Software development addresses the problem of
                 crosscutting concerns. Quality parameters emphasize the
                 concept of reusability within the domains of
                 Object-Oriented Programming and Aspect-Oriented
                 Programming and signify the importance of assessing
                 reusability in Aspect-Oriented Systems. In the future,
                 maintainability will be one of the factors to be
                 considered for assessment of Aspect-Oriented Systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rao:2013:OST,
  author =       "K. Koteswara Rao and GSVP Raju and Srinivasan
                 Nagaraj",
  title =        "Optimizing the software testing efficiency by using a
                 genetic algorithm: a design methodology",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--5",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464539",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents a design method for optimizing
                 software-testing efficiency by identifying the most
                 critical path clusters in a program. This is done by
                 the application of soft computing techniques,
                 specifically genetic algorithms. We develop a genetic
                 algorithm that selects the software path clusters to
                 test, which are weighted in accordance with the
                 criticality of the path. Exhaustive software testing is
                 rarely possible because it becomes intractable for even
                 medium-sized software applications. Typically only
                 parts of a program can be tested, but these parts are
                 not necessarily the most error prone ones. Therefore,
                 we are designing a more selective approach for testing
                 the paths that are more critical, which results in
                 improving the testing efficiency.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hasteer:2013:PAR,
  author =       "Nitasha Hasteer and Abhay Bansal and B. K. Murthy",
  title =        "Pragmatic assessment of research intensive areas in
                 cloud: a systematic review",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464533",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Cloud computing is a name given to a set of systems
                 for enabling ubiquitous, convenient, on-demand network
                 access to a shared pool of configurable computing
                 resources (e.g., networks, servers, storage,
                 applications, and services) that can be rapidly
                 provisioned and released with minimal management effort
                 or service provider interaction. Cloud computing is
                 aimed at making an organization more agile and cost
                 effective. Due to the rapid evolution of Cloud
                 Computing in the recent past, it is relevant to
                 investigate the key areas of research of this
                 technology. In this paper, we present a systematic
                 review of research intensive areas in the field of
                 cloud computing. Research papers in the period from
                 2009 to 2012 were gathered. A total of 36 research
                 papers were reviewed systematically and categorized
                 into four broad categories based on the issues
                 addressed by them. We identified that the majority of
                 the research papers focused on Cloud Security. By
                 systematically analyzing the work accomplished so far,
                 the gaps and yet to be explored areas in this field are
                 brought to light.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Malhotra:2013:DFT,
  author =       "Ruchika Malhotra and Divya Tiwari",
  title =        "Development of a framework for test case
                 prioritization using genetic algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464536",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Testing is a time and effort consuming part
                 of the software development life cycle. Retesting a
                 software application during the maintenance phase, with
                 the entire test suite and additional test cases for the
                 modifications in the software, within budget and time,
                 is a challenge for software testers. Test Case
                 Prioritization is used to overcome this problem by
                 prioritizing the test cases in order to maximize
                 certain testing objectives like fault detection rate,
                 statement coverage, etc. In this paper, we propose a
                 framework for test case prioritization that emphasizes
                 a new metric, APBC$_m$ (modified Average Percentage of
                 Block Coverage). This metric evaluates the rate of code
                 coverage by incorporating knowledge about the
                 significance of blocks of code in the form of weights.
                 We have used this metric as fitness evaluation function
                 in a Genetic Algorithm in order to evaluate the
                 effectiveness of a test case sequence. We have also
                 developed a tool that implements the Genetic Algorithm
                 in the Java language in order to compute and validate
                 the results. Thereafter, we use the tool for test case
                 prioritization, and compare and assess the results with
                 those produced by the tool when APBC (Average
                 Percentage of Block Coverage) is used as fitness
                 function.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{N:2013:MER,
  author =       "Parimala N. and Ranjeet Kumar",
  title =        "Mapping extended rationale diagrams to {OLAP}
                 queries",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464538",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We propose a method that enables decision makers to
                 formulate OLAP queries. Firstly, the decision maker's
                 analysis requirements are expressed as an extended
                 rationale diagram. Subsequently, using the extended
                 rationale diagram, we verify whether it is possible to
                 get the information from the data warehouse. If it is,
                 we generate the outline of the corresponding OLAP
                 query. If it is not, we inform the user about the
                 missing information.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Zaidi:2013:MVE,
  author =       "Taskeen Zaidi and Vipin Saxena",
  title =        "Modeling and validation of execution of tasks on high
                 speed network under distributed environment",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464540",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "During the past years, distributed computing approach
                 has become an integral part of many of the software
                 companies. This is because of low cost infrastructure
                 involvement and faster execution of the tasks, sharing
                 of resources, etc. In the year 2009, the Indian
                 Government has established distributed network called
                 as National Knowledge Network (NKN). The main objective
                 of NKN is to connect all of the Indian universities,
                 research institutions, computing labs, digital
                 libraries, countrywide classrooms, etc. In the present
                 paper, a well-known object-oriented Unified Modeling
                 Language (UML) is used to construct a model for the
                 execution of the tasks across a distributed network.
                 Authors have designed a static step topology for the
                 faster execution of tasks. Static and dynamic behaviors
                 of the execution of the tasks are represented through
                 UML class and state diagrams, respectively. For
                 validation of the UML model, the state diagram is
                 converted into a Finite State Machine (FSM) and
                 different test cases are generated to validate the
                 proposed model across distributed network
                 environment.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rao:2013:CPS,
  author =       "V. Bhujanga Rao and P. Seetha Ramaiah and K. Raja
                 Kumar",
  title =        "Clinical programming software to manage patient's data
                 with a cochlear implant",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--7",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464535",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Auditory prostheses (AP) using Cochlear Implant
                 System, a.k.a. bionic ears, are widely used electronic
                 devices that electrically stimulate the auditory nerve
                 using an electrode array, surgically placed in the
                 inner ear for patients suffering from severe to
                 profound senosorineural deafness. The AP mainly
                 contains an external Body Worn Speech Processor (BWSP)
                 and an internal Implantable Receiver Stimulator (IRS).
                 The BWSP receives an external sound or speech and
                 generates encoded speech data bits for transmission to
                 the IRS via a Radio Frequency transcutaneous link to
                 excite the electrode array. After surgical placement of
                 the electrode array in the inner ear, the BWSP should
                 be fine-tuned to achieve the 80 to 100\% speech
                 reception abilities of the patient by an audiologist
                 using Clinical Programming Software (CPS). The tuning
                 process involves several tasks such as identifying the
                 active electrode contacts, determining the detection
                 and pain threshold of each active electrode, and
                 loading these values into BWSP by reprogramming the
                 BWSP. The main objective of this paper is to describe a
                 simple personal-computer based, user-friendly CPS,
                 which fine tunes the BWSP to achieve the best possible
                 speech reception abilities of each patient and to
                 perform post-operative fitting procedures by an
                 audiologist. The CPS was developed to perform the
                 post-operative fine tuning procedures such as (i)
                 measurement of electrode tissue impedance, (ii) fitting
                 to determine the hearing threshold and comfort levels
                 for each active electrode, and (iii) reprogramming the
                 speech processor using the identified threshold and
                 comfort values. Finally, experimental results are
                 presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2013:TTO,
  author =       "Ajay Jain",
  title =        "Touch target optimization technique using virtual
                 finger-tip library",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "1--9",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464534",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Touch functionality is the latest mantra for consumers
                 buying new smartphones or mobile devices. With devices
                 screens becoming more compact, providing a user
                 interface with easy navigation and effective usage is
                 becoming increasingly difficult. Typically, the screens
                 are designed using relevant design guidelines and work
                 well for the general majority of people. However, every
                 user is different. The way they handle the touch
                 screen, the size of their finger-tips, everything is
                 different. A single common UI design then fails to
                 satisfy all the different users. Hence, there is a need
                 to bridge the existing gap between the device UI screen
                 design and the variances attached with users' touch
                 inputs. Our latest work1, discussed in this paper,
                 solves this challenge to a significant extent by
                 providing a library of virtual finger-tip entries. Each
                 finger-tip entry in the library is pre-attached with a
                 specific surface area attached to it. These
                 finger-tips, although virtual, are provided with the
                 functionality that they act as wearable objects for a
                 device user. Once worn, the device owner need not worry
                 about their actual finger-tip size (that is, the
                 surface area of user's finger on the device screen).
                 Irrespective of a user's actual finger-tip size, when
                 you place your finger on any icon on the screen, it
                 uses exactly the same surface area that the virtual
                 finger-tip uses. Virtual finger-tip sizes are
                 calculated dynamically based on the relative size
                 interpretations from the actual finger-tip size and the
                 touch inputs to the device. Multiple virtual finger
                 tips options are listed in the library enabling a
                 device user to select the most appropriate one
                 depending on the touch target they plan to work on.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2013:SEEb,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "5--6",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464527",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Krishnamurthi:2013:AES,
  author =       "Shriram Krishnamurthi",
  title =        "Artifact evaluation for software conferences",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "7--10",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464530",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software and other digital artifacts are amongst the
                 most valuable contributions of computer science. Yet
                 our conferences treat these mostly as second-class
                 artifacts--especially conferences in the software
                 sciences, which ought to know better. This article
                 argues for elevating these other artifacts by making
                 them part of the evaluation process for papers, and
                 reports on experience from an iteration of an Artifact
                 Evaluation Committee for ESEC/FSE 2011.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "11--20",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464528",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "21--28",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464529",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ebert:2013:BRS,
  author =       "John Ebert",
  title =        "Book Review: {{\booktitle{SOA with REST: principles,
                 patterns \& constraints for building enterprise
                 solutions with REST}} by Thomas Erl, Benjamin Carlyle,
                 Cesare Pautasso, Raj Balasubramanian}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "32--33",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464551",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gvero:2013:BRC,
  author =       "Igor Gvero",
  title =        "Book Review: {{\booktitle{Core Java volume I:
                 fundamentals}}, 9th edition by Cay S. Horstmann and
                 Gary Cornell}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "33--33",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464552",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2013:BRM,
  author =       "Robert Schaefer",
  title =        "Book Review: {{\booktitle{Managing the unmanageable:
                 rules, tools, and insights for managing software people
                 and teams}} by Micky W. Mantle and Ron Lichty}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "34--35",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464553",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRL,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Learning JavaScript: a
                 hands-on guide to the fundamentals of modern
                 JavaScript}} by Tim Wright}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "35--36",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464554",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:TTD,
  author =       "Vasile G. Teodorovici",
  title =        "{Tcl\slash Tk}: a developer's guide, third edition by
                 Clif Flynt",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "3",
  pages =        "36--36",
  month =        may,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2464526.2464555",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:25 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2013:NAS,
  author =       "Paritosh Jain and Nitish Garg",
  title =        "A novel approach for slicing of object oriented
                 programs",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--4",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492266",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper extends the graph-less technique proposed
                 by Beszedes for slicing Object Oriented Programs. The
                 proposed approach computes the dynamic slices of the
                 OOPs, especially, in case of polymorphism. The approach
                 generates the defined-used (d-u) chains of the objects
                 and variables used in the program and computes the
                 slice using the generated d-u chains; it then debugs
                 the program by detecting the various possible bugs and
                 generates messages suggesting that a bug may be
                 present. A GUI tool has been developed to compute and
                 display the computed slices. The tool allows the user
                 to browse the program and see the generated advice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Raina:2013:ATR,
  author =       "Shikha Raina and Arun Prakash Agarwal",
  title =        "An automated tool for regression testing in web
                 applications",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--4",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492272",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Regression testing of web applications is a costly
                 activity as it tends to generate more test cases than
                 the previous stages of software testing. This cost can
                 be reduced significantly by identifying and testing
                 only the modified parts of a web application. This will
                 require locating the changes that have been introduced
                 in the web application from the previous version that
                 was tested. In this paper we have introduced an
                 automated tool for locating the changes in the web
                 application which will thereby aid in effective
                 regression testing of the application. This tool
                 compromise of 3 parts, (a) a web crawler that crawls
                 the web application, (b) an HTML DOM tree generator
                 that generates the DOM tree for a specified web page,
                 (c) an comparator that compares the new DOM tree with a
                 previous version of the DOM tree stored in our
                 system.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{S:2013:NSO,
  author =       "Indu S. and Srinivas N. K. and Harish P. J. and
                 GangaPrasad R. and Nobby Varghese and N. S. Sreekanth
                 and Supriya N. Pal",
  title =        "[{NLP@Desktop}]: a service oriented architecture for
                 integrating {NLP} services in desktop clients",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--4",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492265",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Research and development in Natural Language
                 Processing (NLP) has made significant progress over the
                 last decade. Many robust NLP systems have been
                 developed for handling machine translation,
                 question-answering, summarization, topic detection,
                 cluster analysis, information extraction, named entity
                 recognition (NER), etc. Despite this advancement in NLP
                 research, the results are still not accessible for
                 common desktop users. In the current scenario, it is
                 difficult to integrate a new NLP tool with the existing
                 text processing applications. To overcome this, we have
                 implemented a service deployer framework based on
                 DBus[1] for the seamless integration of NLP
                 applications with desktop clients like email clients,
                 word processors, browsers etc. This framework enables
                 NLP researchers to make their products equipped for the
                 desktop clients with minimal efforts.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Badri:2013:RBU,
  author =       "Mourad Badri and Linda Badri and William Flageol",
  title =        "On the relationship between use cases and test suites
                 size: an exploratory study",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492261",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing, which plays a crucial role in
                 software quality assurance, is a time and resource
                 consuming process. It is, therefore, necessary to
                 estimate as soon as possible the effort required to
                 test software, so that activities can be planned and
                 resources can be optimally allocated. Unfortunately,
                 little is known about the prediction of the testing
                 effort. In this paper, we address the testing effort
                 from the perspective of test suites size. The study
                 presented aims at exploring empirically the
                 relationships between use cases and the size of test
                 suites in object-oriented systems. We introduce four
                 metrics to characterize the size and complexity of use
                 cases. The size of test suites is measured in terms of
                 lines of test code. We performed an experimental study
                 using data collected from five cases studies. Results
                 provide evidence that there is a significant
                 relationship between use case metrics and the size of
                 test suites.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Goel:2013:ARO,
  author =       "Brij Mohan Goel and Pradeep Kumar Bhatia",
  title =        "Analysis of reusability of object-oriented systems
                 using object-oriented metrics",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492264",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In object-oriented systems, assessing reusability
                 plays a key role in reducing a cost and improving the
                 quality of the software. Object-oriented programming
                 helps in achieving the concept of reusability through
                 different types of inheritance programs, which further
                 help in developing reusable software modules. And
                 object-oriented metrics identify the effectiveness of
                 each reuse strategy. Software reusability has
                 considerable effect on software quality. Software
                 quality increases as reuse of software components
                 increases. But software quality improvement cannot be
                 understood unless it is measured. This paper focuses on
                 an empirical evaluation of object-oriented metrics in
                 C++ using three different object-oriented features.
                 Three programs have been considered as input for the
                 study --- the first program uses multilevel
                 inheritance, the second program uses multiple
                 inheritance and the third program uses hierarchical
                 inheritance. We have found that multilevel inheritance
                 has more impact on reusability among these three
                 features.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Pandey:2013:SEA,
  author =       "Adesh Kr. Pandey and C. P. Agrawal and Arun Sharma and
                 P. Sasikala",
  title =        "Study of empirical approaches to analyze the software
                 metrics",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492270",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software affects nearly every aspect of human lives.
                 Software functional quality is a key to achieve
                 industrial and business relevance, in particular to
                 industrial development and growth. Software metrics are
                 important indicators to improve the processes and
                 products in all organizations. They define baselines of
                 quality and productivity and enable comparisons against
                 industry averages that help in identifying
                 opportunities for improvement. In addition, Software
                 metrics design and analysis are major activities in the
                 software development life cycle. Software metrics play
                 a vital role in software cost, quality, scheduling,
                 reliability and maintenance. There are various methods
                 to decide which metrics should be used for which
                 purposes. Attributes of a metric may be independent; or
                 attributes may depend on one another. Analytical
                 Hierarchy Process (AHP) is used to assign weights to
                 various parameters of a decision model when they are
                 related to each other in a particular hierarchy.
                 Analytical Network Process (ANP) and Fuzzy ANP are used
                 to solve the decision problem, where attributes of
                 decision parameters form dependency networks. The
                 objective of this paper is to explore the possibilities
                 of using empirical approaches like AHP, ANP and Fuzzy
                 ANP to analyze the software metrics by measuring the
                 weights of different attributes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Taibi:2013:ROS,
  author =       "Fathi Taibi",
  title =        "Reusability of open-source program code: a conceptual
                 model and empirical investigation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492276",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Reusing program modules is one of the most direct and
                 useful ways to develop cost effective software,
                 especially with the availability of huge amounts of
                 open-source projects. Reuse saves cost, increases the
                 speed of development and improves software reliability.
                 The quality of popular open-source packages is good as
                 shown by various empirical studies. However, the
                 quality of less known packages and the large number of
                 projects developed by programming enthusiasts is
                 unknown. Reusing them may be the source of more
                 problems rather than being a solution to a problem. In
                 this paper, a conceptual model is proposed to measure
                 the reusability of program modules. A balanced set of
                 well-established metrics is used to compute the most
                 significant factors of reusability and an empirical
                 investigation is conducted to measure the reusability
                 of the modules of randomly selected open-source Java
                 projects. The results obtained are thoroughly analyzed
                 to discover the real reusability potential of
                 open-source program code together with suggestions on
                 how to improve this potential.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2013:RBR,
  author =       "Kuldeep Kumar and Sandeep Kumar",
  title =        "A rule-based recommendation system for selection of
                 software development life cycle models",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--6",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492269",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The selection of a software development life cycle
                 (SDLC) model for a software project is highly dependent
                 upon the characteristics of the software product to be
                 developed. We classified software products according to
                 characteristics that matter for SDLC selection. We
                 surveyed literature to elicit recommendations for SDLC
                 selection. We formalized our findings to present a rule
                 based recommendation system that can be helpful to
                 software developers in selecting the most appropriate
                 SDLC model to be used for the development of a software
                 product. We conducted an initial evaluation of our
                 system. We believe our SDLC recommendation system
                 provides useful hints for selecting an SDLC, and
                 provides a base for validating and refining SDLC
                 recommendation rules.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Varshney:2013:SBS,
  author =       "Sapna Varshney and Monica Mehrotra",
  title =        "Search based software test data generation for
                 structural testing: a perspective",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--6",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492277",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is an important and expensive phase
                 of the software development life cycle. Over the past
                 few decades, there has been an ongoing research to
                 automate the process of software testing but the
                 attempts have been constrained by the size and the
                 complexity of software especially due to the use of
                 dynamic memory allocation which makes the software
                 behavior highly unpredictable. The use of metaheuristic
                 global search techniques for software test data
                 generation has been the focus of researchers in recent
                 years. Many new techniques and hybrid methods have been
                 proposed to tackle the problem more effectively. This
                 study provides an overview of the various techniques
                 that have been applied for structural test data
                 generation. It also presents the open areas, challenges
                 and future directions in the field of search based
                 software testing with an emphasis on test data
                 generation for structural testing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhasin:2013:CAB,
  author =       "Harsh Bhasin and Neha Singla and Shruti Sharma",
  title =        "Cellular automata based test data generation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492262",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Manual Test Data Generation is an expensive, error
                 prone and tedious task. Therefore, there is an
                 immediate need to make the automation of this process
                 as efficient and effective as possible. The work
                 presented intends to automate the process of Test Data
                 Generation with a goal of attaining maximum coverage. A
                 Cellular Automata system is discrete in space and time.
                 Cellular Automata have been applied to things like
                 designing water distribution systems and studying the
                 patterns of migration. This fascinating technique has
                 been amalgamated with standard test data generation
                 techniques to give rise to a technique which generates
                 better test cases than the existing techniques. The
                 approach has been verified on programs selected in
                 accordance with their Lines of Code and utility. The
                 results obtained have been verified. The proposed work
                 is a part of a larger system being developed, which
                 takes into account both black box and white box
                 testing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dalal:2013:ESR,
  author =       "Sandeep Dalal and Rajender Singh Chhillar",
  title =        "Empirical study of root cause analysis of software
                 failure",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492263",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Root Cause Analysis (RCA) is the process of
                 identifying project issues, correcting them and taking
                 preventive actions to avoid occurrences of such issues
                 in the future. Issues could be variance in schedule,
                 effort, cost, productivity, expected results of
                 software, performance parameters and customer
                 satisfaction. RCA also involves collecting valid data,
                 analyzing it, deriving metrics and finding root causes
                 using RCA methods. In this paper we will do Root cause
                 analysis of some severe software failures that happened
                 in the past and of some failures in ongoing projects in
                 the software Industry. We will also describe various
                 RCA methods and processes used in the software Industry
                 to reduce the chances of software failure.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rai:2013:BIO,
  author =       "Deepak Rai and Kirti Tyagi",
  title =        "Bio-inspired optimization techniques: a critical
                 comparative study",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--7",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492271",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Despite insistent and breathtaking advances in
                 computing, we continue to be humbled by the variety and
                 adaptability of the natural world around us.
                 Bio-inspired optimization is a term that covers a wide
                 variety of computational approaches that are based on
                 the principles of biological systems. This motivates
                 the application of biology to optimization problems.
                 Biologically inspired computing and optimization is a
                 major subset of natural computation. This paper
                 presents a critical survey of bio-inspired optimization
                 techniques. There are many legacy optimization
                 techniques available. This survey explains almost all
                 important bio-inspired optimization techniques based on
                 their development, intention, performance and
                 application. It provides insight into determining the
                 direction of future optimization techniques research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singhal:2013:CRV,
  author =       "Abhishek Singhal and Abhay Bansal and Avadhesh Kumar",
  title =        "A critical review of various testing techniques in
                 aspect-oriented software systems",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--9",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492275",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is a very crucial phase of the
                 software development life cycle. In order to develop
                 quality software using any approach such as
                 module-oriented, object-oriented, aspect-oriented and
                 componentbased, testing plays a crucial role.
                 Aspect-Oriented Programming (AOP) is a relatively new
                 software development approach and testing of software
                 developed using this approach has not matured enough.
                 Researchers have proposed various testing techniques
                 for AOP. It is important to analyze existing
                 Aspect-Oriented testing techniques in order to develop
                 new, better, more efficient techniques. This paper
                 presents a critical review of various existing testing
                 techniques for AOP.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jiang:2013:CBP,
  author =       "JianMin Jiang and Shi Zhang and Ping Gong and Zhong
                 Hong",
  title =        "Configuring business process models",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--10",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492267",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "A configurable business process model (sometimes
                 referred to as a reference business process model) may
                 be configured to meet the specific requirements of an
                 organization. The configuration activity is required to
                 automatically determine the variability of a
                 configurable process model and ensure the correctness
                 of a specific process model. However, few approaches
                 solve the problem. In this paper, we propose an
                 innovative approach for automatically separating a
                 configurable process model into atomic and correct
                 sub-process models (sub-process models without abnormal
                 behavioral problems). The atomic sub-process models
                 that fulfill specific requirements are merged into
                 specific process models that are provided for
                 organizations. Compared with existing approaches, since
                 the configuration activity is incorporated into the
                 verification process of a process model at design time
                 and can obtain all feasible configurations, our
                 approach avoids independently handling the
                 configuration activity and does not suffer from
                 computational complexity. Moreover, our approach is
                 language-independent. We have developed a prototype
                 tool for configuring these process models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Voola:2013:CRP,
  author =       "Persis Voola and A. Vinaya Babu",
  title =        "Comparison of requirements prioritization techniques
                 employing different scales of measurement",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--10",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492278",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The objective of this paper is to conduct a controlled
                 experiment with the three requirements prioritization
                 techniques: Numerical Assignment (NA), Analytic
                 Hierarchy Process (AHP) and Extensive Numerical
                 Assignment (ENA), each based on ordinal, ratio and
                 interval scales respectively. NA and AHP are widely
                 used traditional requirements prioritization
                 techniques. ENA is a novel technique introduced by the
                 authors, which acknowledges the uncertain and
                 incomplete nature of human judgment about requirements
                 priorities, which are in turn uncertain guesses about
                 the upcoming product. The aim of the experiment is to
                 examine the three techniques using various objective
                 and subjective measures like number of decisions, time
                 consumption, ease of use, attractiveness, scalability
                 and reprioritizability. The experiment was executed by
                 prioritizing the requirements of a university website
                 system with students as participants in the experiment.
                 The results of the experiment proved that ENA
                 transcends NA and AHP.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shareef:2013:CCA,
  author =       "Jawwad Wasat Shareef and R. K. Pandey",
  title =        "{CAME}: {Component Assembly Metrics Extraction} using
                 {UML}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--12",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492273",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In Object-Oriented software development, complexity
                 metrics help software engineers to identify the
                 deficiencies in the design of the software system that
                 are likely to become problem points in the subsequent
                 phases of the SDLC, like testing and maintenance.
                 Metrics for Component Based Software Development (CBSD)
                 have also been proposed by the researchers. Lately the
                 emphasis has been on metrics that are applicable during
                 early phases of the SDLC. The XML Meta Data Interchange
                 (XMI) standard has been implemented in most of the
                 commercial and open source UML tools. It is now
                 possible to automate the metrics extraction procedure
                 right from the UML design documents. Detection of
                 design deficiencies early in the design phase saves a
                 lot of time and effort and results in a more
                 maintainable design. In the present paper, we discuss
                 the design and implementation of a metrics tool for
                 CBSD. We have implemented component based metrics in a
                 parser-based tool, which hereafter we refer to as CAME
                 (Component Assembly Metrics Extraction), to calculate
                 metrics from UML design documents. CAME is capable of
                 generating software metrics proposed by researchers for
                 Component Based Software Systems. We demonstrate our
                 tool using UML component assembly diagrams for a
                 University Case Registration System (UCRS) and its
                 representation in UML and metrics extraction
                 procedure.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shirole:2013:UBM,
  author =       "Mahesh Shirole and Rajeev Kumar",
  title =        "{UML} behavioral model based test case generation: a
                 survey",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--13",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492274",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In software engineering, system modeling is the
                 process of formulating a representation of a real
                 system in an abstract way to understand its behavior.
                 Software testing encourages reusing these models for
                 testing purpose. This expedites the process of test
                 case generation. UML structural and behavioral
                 specification diagrams have been used by testing
                 researchers for generation of test scenarios and test
                 data. The aim of this survey is to improve the
                 understanding of UML based testing techniques. We have
                 focused on test case generation from the behavioral
                 specification diagrams, namely sequence, state chart
                 and activity diagrams. We classify the various research
                 approaches that are based on formal specifications,
                 graph theoretic, heuristic testing, and direct UML
                 specification processing. We discuss the issues of test
                 coverage associated with these approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jones:2013:FPU,
  author =       "Capers Jones",
  title =        "Function points as a universal software metric",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "1--27",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492268",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Function point metrics are the most accurate and
                 effective metrics yet developed for software sizing and
                 also for studying software productivity, quality,
                 costs, risks, and economic value. Unlike the older
                 ``lines of code'' metric function points can be used to
                 study requirements, design, and in fact all software
                 activities from development through maintenance. In the
                 future function point metrics can easily become a
                 universal metric used for all software applications and
                 for all software contracts in all countries. The
                 government of Brazil already requires function points
                 for all software contracts, and South Korea and Italy
                 may soon follow. However, there are some logistical
                 problems with function point metrics that need to be
                 understood and overcome in order for function point
                 metrics to become the primary metric for software
                 economic analysis. Manual function point counting is
                 too slow and costly to be used on large software
                 projects above 10,000 function points in size. Also,
                 application size is not constant but grows at about 2\%
                 per calendar month during development and 8\% or more
                 per calendar year for as long as software is in active
                 use. This paper discusses a method of high-speed
                 function point counting that can size any application
                 in less than two minutes, and which can predict
                 application growth during development and for five
                 years after release. This new method is based on
                 pattern matching and is covered by U.S. utility patent
                 application and hence is patent pending.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Anderson:2013:IC,
  author =       "Glyn Anderson",
  title =        "Idle cycles",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "6--9",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492284",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2013:BES,
  author =       "Robert Schaefer",
  title =        "Business-efficient software development processes",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "7--8",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492283",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "10--18",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492250",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "19--24",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492249",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wang:2013:RFA,
  author =       "Qianxiang Wang and Lin Liu",
  title =        "Report on the {Fourth Asia-Pacific Symposium on
                 Internetware (Internetware 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "25--26",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492281",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Internet provides an open infrastructure for
                 exchanging and sharing information resources among
                 people all over the world. The rapid development and
                 wide application of the Internet makes it a new
                 mainstream platform for using, developing, deploying
                 and executing software systems. In order to provide an
                 interactive forum for researchers and professionals
                 from related disciplines to meet and exchange ideas
                 addressing the challenges in the Internetware setting,
                 the Technical Committees on Software Engineering and
                 System Software of China Computer Federation (CCF)
                 sponsored the Asia-Pacific Symposium on Internetware
                 series, with ACM's Cooperation. In this report, we
                 report news from the Internetware 2012, specially the 5
                 keynotes and 4 regular papers that were recommended for
                 publication in a special issue on ``Internetware'' of
                 the International Journal of Software and Informatics
                 after presented at the symposium.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Xie:2013:RIS,
  author =       "Tao Xie and Lu Zhang and Hong Mei",
  title =        "Report on the {International Symposium on High
                 Confidence Software (ISHCS 2011\slash 2012)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "27--33",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492282",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To provide a forum for researchers in related research
                 areas to address the challenges in high confidence
                 software, exchange ideas, and foster collaborations,
                 the Institute of Software and Key Laboratory of High
                 Confidence Software Technologies (Ministry of
                 Education) at Peking University hosted and sponsored
                 the International Symposium on High Confidence Software
                 in 2011 and 2012. The symposium consisted of a series
                 of invited talks from internationally known researchers
                 on the symposium topic, discussion/panel sessions, and
                 poster sessions to enable substantial interactions
                 among attendees.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chapelle:2013:BRP,
  author =       "Gregory Chapelle",
  title =        "Book Review: {{\booktitle{A practical guide to Linux
                 commands, editors, and shell-programming}}, third
                 edition by Mark G. Sobell}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "38--38",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492251",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kimm:2013:BRO,
  author =       "Larry Kimm",
  title =        "Book Review: {{\booktitle{It's our research: getting
                 stakeholder buy-in for user experience research
                 projects}} by Tomer Sharon}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "38--39",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492252",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Paige:2013:BRT,
  author =       "Michael Paige",
  title =        "Book Review: {{\booktitle{The tangled web: a guide to
                 securing modern web applications}} by Michal
                 Zalewski}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "39--40",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492253",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saur:2013:BRD,
  author =       "Joe Saur",
  title =        "Book Review: {{\booktitle{Design for Emotion}} by
                 Trevor van Gorp and Edie Adams}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "40--40",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492254",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRS,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Security and privacy for
                 Microsoft Office 2010 users}} by Mitch Tulloch}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "40--41",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492255",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRU,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Ubuntu unleashed}}, 2013
                 edition by Matthew Helmke with Andrew Hudson and Paul
                 Hudson}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "4",
  pages =        "41--41",
  month =        jul,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2492248.2492256",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:27 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Terra:2013:QCC,
  author =       "Ricardo Terra and Luis Fernando Miranda and Marco
                 Tulio Valente and Roberto S. Bigonha",
  title =        "{Qualitas.class Corpus}: a compiled version of the
                 {Qualitas Corpus}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--4",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507314",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper documents a compiled version of the
                 Qualitas Corpus named Qualitas.class Corpus. We provide
                 compiled Java projects for the 111 systems included in
                 the corpus. We also gathered a large amount of metrics
                 data (such as measurements from complexity, coupling,
                 and CK metrics) about the systems. By making
                 Qualitas.class Corpus public, our goal is to assist
                 researchers by removing the compilation effort when
                 conducting empirical studies.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Raghunath:2013:DRB,
  author =       "Amritha Raghunath and Sadhana Ramachandran and
                 Selvakumar Subramanian and Sreevatsan Vaidyanathan",
  title =        "Data rate based adaptive thread assignment solution
                 for combating the {SlowPOST} denial of service attack",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507310",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Denial of Service (DoS) attacks represent a major
                 threat to network security, especially in today's
                 networked world. There has been significant research in
                 this area, primarily focused on mitigating and
                 preventing DoS attacks affecting transport layer
                 services. This paper addresses issues arising from a
                 new variation of a DoS attack, namely the SlowPOST
                 attack that affects Application Layer services. In
                 SlowPOST, the malicious clients send data at a slow
                 rate after the connection is established, and the
                 server is left waiting for the data to arrive. These
                 attacks are particularly devastating due to their
                 ability to resist detection due to their protocol
                 compliance. In addition, such attacks do not require
                 the massive resources that DoS attacks normally
                 require, making them easier to launch. Some solutions
                 for this issue have already been deployed in some
                 commercial servers. These solutions are based on either
                 monitoring traffic or enforcing a time limit on the
                 transmission of the protocol headers. In order to
                 achieve reliable detection, the detection parameters
                 need to adapt to the constantly changing traffic. This
                 paper proposes a novel algorithm that uses the data
                 rate of connections to evolve a threshold for
                 determining potential attackers in SlowPOST. This
                 proposed method is tested by subjecting a server to an
                 attack, and it was observed that in the absence of this
                 method, the servicing of legitimate requests is not
                 completed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2013:MMQ,
  author =       "Gagandeep Singh",
  title =        "Metrics for measuring the quality of object-oriented
                 software",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--5",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507311",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper presents metrics for measuring the quality
                 of object-oriented software. Quality of software
                 generally depends on five parameters namely efficiency,
                 understandability, complexity, reusability and
                 maintainability. All of these parameters are associated
                 with certain metrics. Quality of software can be
                 measured by using object-oriented metrics. Software
                 tends to become more complex over a series of releases
                 and maintaining them becomes a more difficult task.
                 Thus quality of software also tends to decrease over
                 time. In this paper, a study is performed using
                 object-oriented metrics that are computed over
                 different releases of the software application
                 JFreeChart.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bajaj:2013:MPD,
  author =       "Punam Bajaj and Vineet Arora",
  title =        "Multi-person decision-making for requirements
                 prioritization using fuzzy {AHP}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507302",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The success of a system depends upon how effectively
                 it accomplishes its intended purpose by meeting all
                 stakeholders' concerns pertaining to conflicting
                 requirements such as cost, size, time, performance etc.
                 Conflicts occur because the requirements are
                 individually refined, without consideration to how they
                 may impact the other stakeholders in the system. As the
                 stakeholders' concerns are uncertain and subjective in
                 nature, this paper proposes a novel approach to
                 prioritize the conflicting requirements using Fuzzy
                 Analytic Hierarchy Process and an alpha cut. A total
                 compatible ordering is achieved to resolve the
                 conflicting preferences of the stakeholders. It assists
                 the project managers to develop a system that meets the
                 expectations of all the stakeholders. A case study of
                 the Travel Management Planning Website is presented to
                 illustrate the application of the methodology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2013:TGC,
  author =       "Pavitdeep Singh and Satwinder Singh and Jatinder
                 Kaur",
  title =        "Tool for generating code metrics for {C\#} source code
                 using abstract syntax tree technique",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507312",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/csharp.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software maintenance is one of the key activities in
                 any software engineering process in which source code
                 analysis plays a crucial role. Due to the high cost of
                 maintenance, it has become quite necessary to produce
                 high quality software. Over time, numerous analyses
                 have been performed on source code to determine
                 complexity and other metrics. Lots of papers have been
                 published for object oriented languages but mostly
                 concentrating on C++ and Java, very few has been
                 published for more modern languages like C\#. This
                 paper proposes a Software Quality Assurance Tool for
                 measuring the different code metrics for the object
                 oriented language C\# at the class and method levels.
                 The technique consists of generating the abstract
                 syntax tree of the source code using Nfactory
                 libraries. The Interface is built using the Win Form
                 application which provides an impressive GUI for the
                 tool.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sinhal:2013:NFB,
  author =       "Amit Sinhal and Bhupendra Verma",
  title =        "A novel fuzzy based approach for effort estimation in
                 software development",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--6",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507313",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Accurate and credible software effort estimation is
                 always a challenge for academic research and software
                 industry. In the beginning, estimation was carried out
                 using only human expertise or algorithmic models, but
                 more recently, interest has turned to a range of Soft
                 Computing techniques. New paradigms such as Fuzzy Logic
                 enable a choice for software effort estimation.
                 Constructive Cost Model (COCOMO) is considered to be
                 the most widely used model for effort estimation.
                 Effort drivers have immense influence on COCOMO and
                 this paper investigates the role of cost drivers
                 (effort features) in improving the precision of effort
                 estimation using Fuzzy Logic. Fuzzy logic-based
                 estimation models are more appropriate when indistinct
                 and incorrect information is to be used. This paper
                 aims at estimating effort in an efficient way using a
                 Fuzzy technique. For this purpose, the COCOMO81 dataset
                 and the Fuzzy Inference System (FIS) of MATLAB are used
                 for implementation. At the end, the outcomes are
                 compared against traditional methods using parameters
                 like Mean Magnitude of Relative Error (MMRE) and Pred
                 (25).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ahmad:2013:FAA,
  author =       "Aakash Ahmad and Pooyan Jamshidi and Claus Pahl",
  title =        "A framework for acquisition and application of
                 software architecture evolution knowledge: 14",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507301",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software systems continuously evolve as a consequence
                 of frequent changes in their functional requirements
                 and the environment surrounding them.
                 Architecture-centric software evolution (ACSE) enables
                 changes in software structure and behaviour while
                 abstracting the complex implementation-specific
                 details. However, due to recurring evolution there is a
                 need for solutions that enable a systematic reuse of
                 frequent changes in software architectures. In recent
                 years, architecture change patterns and evolution
                 styles proved successful in promoting reuse expertise
                 to tackle architecture evolution. However, there do not
                 exist any solutions that enable a continuous
                 acquisition and application of architecture evolution
                 knowledge to systematically address frequent changes in
                 software architectures. In this paper, we propose a
                 framework PatEvol that aims to unify the concepts of
                 (i) software repository mining and (ii) software
                 evolution to enable acquisition and application of
                 architecture evolution knowledge. In the proposed
                 PatEvol framework, we present knowledge acquisition
                 (architecture evolution mining) to enable post-mortem
                 analysis of evolution histories to empirically discover
                 evolution-centric knowledge. Furthermore, we support
                 reuse of discovered knowledge to enable knowledge
                 application (architecture evolution execution) that
                 enables evolution-off-the-shelf in software
                 architectures. Tool support facilitates the knowledge
                 acquisition and knowledge application processes in the
                 PatEvol framework.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hazra:2013:CAR,
  author =       "Rumpa Hazra and Shouvik Dey and Ananya Kanjilal and
                 Swapan Bhattacharya",
  title =        "Comparative analysis of real time resource access
                 control protocols using {UML} 2.0",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--7",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507305",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The behaviors of real time software systems do not
                 depend only on the values of input and output signals,
                 but also on the times of their occurrences. Real time
                 systems (RTS) interact with their environments using
                 time constrained input/output signals. The complexity
                 of Real Time Systems is continually increasing which
                 makes their design very challenging. In RTS, the
                 scheduling of tasks with hard deadlines has been an
                 important area of research. Unified Modeling Language
                 (UML), the standard visual object-oriented modeling
                 language, is suitable to deal with this complexity. The
                 main objective of this paper is to compare two
                 protocols using UML 2.0 models. The shortcomings of the
                 existing Priority Inheritance protocol are represented
                 using one UML model. Further, the Stack Based Priority
                 Ceiling protocol is used to overcome this difficulty
                 using an improved model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{DeSousaCoelho:2013:SDM,
  author =       "Jailton {De Sousa Coelho, Jr.} and Jos{\'e} Luis Braga
                 and Bernardo Giori Ambr{\'o}sio",
  title =        "System dynamics model for simulation of the software
                 inspection process",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507306",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Repairing a defect in the late phases of software
                 development can be a hundred times more expensive than
                 finding and fixing it during the requirements and
                 design phase. Software inspection is a technique that
                 may be used to aid in the identification of defects
                 during early stages of the process and avoid
                 propagation of such defects to later phases. The
                 cost-benefit of inspections may be significant if they
                 are efficiently performed. Since this process is
                 affected by several quality factors, the analysis of
                 the overall context of inspection may become complex.
                 Project managers are reluctant to introduce inspection
                 due to uncertainty regarding its real benefits. This
                 paper presents a system dynamics model, which is a
                 descriptive technique for systems modeling and
                 simulation and involves several variables that strongly
                 influence inspection efficiency. The influence levels
                 of model variables are quantified based on real or
                 empirical experiments reported in the literature, in
                 order to approximate model results to values that would
                 be obtained in the real world. The model allows the
                 reproduction of scenarios without paying the costs and
                 facing the risks of a real project implementation.
                 Therefore, it enables the analysis of inspection
                 effects on the software development process.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2013:MSD,
  author =       "Ajay Jain and Kusha Chopra",
  title =        "Malware signing detection system",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--8",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507307",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software malware not only creates financial damages to
                 corporate and individual computer users, but also
                 invades privacy, exploits their devices and induces
                 other significant losses. While efficient tools and
                 technologies that control and limit malware spread
                 across devices in the public domain are being
                 developed, the problem is far from being resolved. We
                 worked on a methodology that uses techniques to detect
                 malware during in-house development and prevents
                 malware from being released in the field. This work
                 helps determine and handle situations where a person,
                 authorized to access an authentic signing certificate
                 [1] signs malware (or set of file(s)) intended to
                 perform harmful operations, such as spreading a virus
                 on a computer using the said certificate, and releases
                 the malicious code publicly or to a community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhasin:2013:CGT,
  author =       "Harsh Bhasin and Neha Singla",
  title =        "Cellular-genetic test data generation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--9",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507303",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Test Data Generation is the soul of automated testing.
                 The dream of having efficient and robust automated
                 testing software can be fulfilled only if the task of
                 designing a robust automated test data generator can be
                 accomplished. In the work we explore the gaps in the
                 existing techniques and intend to fill these gaps by
                 proposing new algorithms. The following work presents
                 algorithms that handle almost all the constructs of
                 procedural programming languages. The proposed
                 technique uses cellular automata as its base. The use
                 of Cellular Automata brings a blend of artificial life
                 to the work. The work is a continuation of our earlier
                 attempt to amalgamate Cellular Automata based
                 algorithms to generate test data. The technique has
                 been applied to C programs and is currently being
                 tested on a financial enterprise resource planning
                 system. Since, the solution of most of the problems can
                 be found by observing nature, we must explore
                 artificial nature to accomplish the above task.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chanda:2013:BSE,
  author =       "Jayeeta Chanda and Sabnam Sengupta and Ananya Kanjilal
                 and Swapan Bhattacharya",
  title =        "Behavioral and structural evolution of {SOA} from
                 {OO}: an integrated approach",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--9",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507304",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Service Oriented Architecture caters to the
                 ``Separation of Concerns'' and incorporates
                 reusability, granularity, modularity, componentization
                 and interoperability. There are many software products
                 that have been developed in the object-oriented
                 paradigm. To incorporate the positive aspects of the
                 service-oriented paradigm, they need to be evolved to
                 the service-oriented domain. In this paper, we define
                 an integrated approach towards consistent evolution of
                 Object Oriented (OO) paradigm to the Service Oriented
                 (SOA) domain. There are some proven Object Oriented
                 Design Tools that can be used for Service Oriented
                 Application design incorporating both the behavioral
                 and structural aspects. The work in this paper involves
                 a set of activities like formalizing the different UML
                 diagrams, formal mapping of object components to
                 service level components and establishing consistency
                 among them. We also establish a traceability model for
                 consistent evolution of Service Oriented Applications
                 from existing Object Oriented Applications by mapping
                 behavioral and structural artifacts of both domains.
                 This will establish traceability from implementation
                 phases back to the requirements phases of an SOA
                 application.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jalila:2013:EEO,
  author =       "A. Jalila and D. Jeya Mala",
  title =        "Empirical evidence on {OCL} formal specification-based
                 metrics as a predictor of fault-proneness",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--10",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507308",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "OCL formal specification has been widely used for
                 precise software modeling. In general, it is used to
                 express constraints on design documents. As a novel
                 approach, its usage can be extended to support
                 effective testing, such as testing fault-prone
                 components to improve software quality. In this paper,
                 CK (Chidamber and Kemerer) metrics that can be
                 extracted from OCL expressions are validated against
                 module complexity. Moreover, our study proposes a new
                 metric suite that can be directly extracted from OCL
                 expressions to quantify module complexity. A weight has
                 been assigned to each metric to reflect its importance
                 in fault-prone component identification. Our study
                 shows that metrics collected from OCL specifications
                 are good predictors of the fault-prone components of a
                 system during design time. An early knowledge of
                 fault-prone components of the system can be useful to
                 distribute efforts required for software development
                 and testing activities.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mala:2013:CCT,
  author =       "D. Jeya Mala and K. Sabari Nathan and S. Balamurugan",
  title =        "Critical components testing using hybrid genetic
                 algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "1--13",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507309",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As quality of software plays a vital role in real time
                 systems, it is essential to identify the crucial parts
                 in the system and to test them effectively. In the
                 proposed approach, the critical components are
                 identified by means of mutation based impact analysis.
                 The next task is to test the critical components using
                 the Hybrid Genetic Algorithm (HGA) based test case
                 generation and optimization approach. The mutants are
                 automatically generated by seeding faults into each
                 method of all the components in the Software Under Test
                 (SUT). The initial set of test cases is generated using
                 randomized test data. The generated test cases are
                 executed over the original and the mutant to identify
                 whether the test case detects the error or not. Based
                 on the results, the Mutation Score (MS) is calculated,
                 which always lies between 0 and 1. The best test cases
                 are chosen based on having higher mutation scores and
                 are executed on mutants to analyze how each component
                 affects the other components in the SUT. Based on the
                 analysis, the critical components are identified and
                 they need rigorous testing using the test cases
                 generated by the HGA. The algorithm uses the RemoveTop
                 and LocalBest improvement heuristics to achieve near
                 optimal solutions. In unit testing, the test cases are
                 executed against the original and the mutant. The test
                 case optimization is done by evaluating the
                 effectiveness of test suites using the Mutation Score
                 and the Branch Coverage Value (BCV). In pair-wise
                 testing, the effective test cases are selected based on
                 the higher mutation scores and branch coverage values.
                 The components are executed against these test cases
                 and the execution traces are recorded. The traced
                 results are compared against the expected outputs which
                 were previously stored in the repository and the
                 statuses are updated. Based on the statuses, the faulty
                 methods are revealed. The efficiency of the proposed
                 approach is compared with Genetic Algorithm (GA) and we
                 concluded that the final test suite size and the total
                 execution time are reduced in the proposed approach.
                 Finally various graphs and PDF reports are generated
                 for visualization purposes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Raccoon:2013:U,
  author =       "Raccoon and Dog",
  title =        "Unknownness",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "8--17",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507318",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2013:Pa,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "17--18",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507319",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2013:SEEc,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "18--18",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2517896",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSe,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "19--27",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507290",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPe,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "28--33",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507289",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Prikladnicki:2013:CHA,
  author =       "Rafael Prikladnicki and Yvonne Dittrich and Helen
                 Sharp and Cleidson {De Souza} and Marcelo Cataldo and
                 Rashina Hoda",
  title =        "Cooperative and human aspects of software engineering:
                 {CHASE} 2013",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "34--37",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507321",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software is created by people for people working in a
                 range of environments and under various conditions.
                 Understanding the cooperative and human aspects of
                 software development is crucial in order to comprehend
                 how methods and tools are used, and thereby improve the
                 creation and maintenance of software. Both researchers
                 and practitioners have recognized the need to
                 investigate these aspects, but the results of such
                 investigations are dispersed in different conferences
                 and communities. The 6th workshop on Cooperative and
                 Human Aspects of Software Engineering held at the
                 International Conference on Software Engineering
                 continued the tradition from earlier workshops and
                 provide a lively forum to discuss current developments
                 and high quality research in the field, providing both
                 a meeting place for the community and the possibility
                 for researchers interested in joining the field to
                 present and discuss their work in progress and to get
                 an overview of the field. Further dissemination of
                 research results will lead to improvement of software
                 development and deployment across the globe.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dingsoyr:2013:RCL,
  author =       "Torgeir Dings{\o}yr and Nils Brede Moe",
  title =        "Research challenges in large-scale agile software
                 development",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "38--39",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507322",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Agile software development methods are increasingly
                 used in large-scale software development. This article
                 summarizes some of the discussion on research
                 challenges in large-scale agile development at a
                 workshop at the International Conference on Agile
                 Software Development (XP2013), in the form of a
                 research agenda.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Galster:2013:VSE,
  author =       "Matthias Galster and Mehdi Mirakhorli and Jane
                 Cleland-Huang and Janet E. Burge and Xavier Franch and
                 Roshanak Roshandel and Paris Avgeriou",
  title =        "Views on software engineering from the twin peaks of
                 requirements and architecture",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "40--42",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507323",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The disciplines of requirements engineering (RE) and
                 software architecture (SA) are fundamental to the
                 success of software projects. Even though RE and SA are
                 often considered in isolation, drawing a line between
                 RE and SA is neither feasible nor reasonable as
                 requirements and architectural design impact each
                 other. This observation motivated the Twin Peaks model
                 that was the subject of the Second International
                 Workshop on the Twin Peaks of Requirements and
                 Architecture ([email protected] 2013). [email
                 protected] 2013 was held in conjunction with the 35th
                 International Conference on Software Engineering 2013
                 in San Francisco, CA. The workshop aimed at providing a
                 forum for researchers, practitioners and educators from
                 the areas of RE and SA to discuss their experiences,
                 forge new collaborations, and explore innovative
                 solutions that address the challenges that occur when
                 relating RE and SA. The workshop provided participants
                 with an opportunity to become familiar with the
                 relationship between RE and SA in the broader context
                 of software engineering, rather than in an isolated
                 context of either RE or SA. The workshop featured one
                 industrial keynote, five research paper presentations,
                 two invited talks and four working group discussions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hunt:2013:RDA,
  author =       "Johanna Hunt and Xiaofeng Wang",
  title =        "{Research Dojo}: applying agile principles to agile
                 research --- workshop summary from {XP2013}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "43--46",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507324",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes key findings from a workshop
                 held at the 14th International Conference on Agile
                 Software Development (XP2013) called ``Research Dojo:
                 Collaborative Approaches for our Agile Community''.
                 Both software development and research are
                 knowledge-intensive endeavors. While agile approaches
                 have been increasingly adopted in software development
                 projects, whether such approaches can beneficially be
                 applied to conducting research is a phenomenon yet to
                 be fully explored. The objective of the workshop was to
                 gain a deeper understanding of the similarities and
                 differences between academic research and agile
                 software development, in order to explore whether agile
                 practices can also be used for collaboratively
                 conducted research. The opinions of the workshop
                 participants are summarized and observations of the
                 research dojo session carried out by the participants
                 are reported. We conclude by identifying further areas
                 for investigation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Johnson:2013:RSS,
  author =       "Pontus Johnson and Paul Ralph and Michael Goedicke and
                 Pan-Wei Ng and Klaas-Jan Stol and Kari Smolander and
                 Iaakov Exman and Dewayne E. Perry",
  title =        "Report on the {Second SEMAT Workshop on General Theory
                 of Software Engineering (GTSE 2013)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "47--50",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2529923",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kruchten:2013:TDT,
  author =       "Philippe Kruchten and Robert L. Nord and Ipek Ozkaya
                 and Davide Falessi",
  title =        "Technical debt: towards a crisper definition report on
                 the {4th International Workshop on Managing Technical
                 Debt}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "51--54",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507326",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As the pace of software delivery increases and
                 technology rapidly changes, organizations seek guidance
                 on how to insure the sustainability of their software
                 development effort. Over the past four years running
                 the workshops on Managing Technical Debt, we have seen
                 increased interest from the software industry to
                 understanding and managing technical debt. A better
                 understanding of the concept of technical debt, and how
                 to approach it, both from a theoretical and a practical
                 perspective is necessary to advance its state of the
                 art and practice. In this paper, we highlight the
                 current confusion in industry on the definition of
                 technical debt, their contributions that have led to a
                 deeper understanding of this concept and the limits of
                 the metaphor, the criteria to discriminate what is
                 technical debt and not, and areas of further
                 investigation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lewis:2013:RIIb,
  author =       "Grace A. Lewis and Nachiappan Nagappan and Jeff Gray
                 and David Rosenblum and Henry Muccini and Emad Shihab",
  title =        "Report of the {2013 ICSE 1st International Workshop on
                 Engineering Mobile-Enabled Systems (MOBS 2013)}: 12",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "55--58",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507327",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 2013 1st International Workshop on Engineering
                 Mobile-Enabled Systems (MOBS 2013) was held in
                 conjunction with the 35th International Conference on
                 Software Engineering, ICSE 2013, on May 25, 2013 in San
                 Francisco, CA USA. MOBS 2013 brought together software
                 engineering researchers from academia and industry, as
                 well as practitioners, to share results and open issues
                 in diverse areas of engineering mobile-enabled systems.
                 The many discussions throughout the day resulted in the
                 identification of three promising areas of research to
                 address existing gaps and problems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hunt:2013:RPS,
  author =       "Johanna Hunt and Olumide Akerele and Tomi Juhola and
                 Michael Waterman",
  title =        "Report from the {PhD} symposium at {XP2013}: an
                 adaptive experiment in feedback",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "59--62",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507328",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, we describe the PhD Symposium organized
                 as a part of the 14th International Conference on Agile
                 Software Development (XP2013). The Symposium was run
                 with an experimental adaptive structure and was divided
                 into two workshops distributed across the conference as
                 well as individual sessions during the conference. The
                 activities of the second workshop were adapted based on
                 the learning needs of the attendees. In this report we
                 describe the structure of the two scheduled workshops,
                 the activities conducted both during and between them,
                 and evaluate the outcome of this Symposium format.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Beschastnikh:2013:BRP,
  author =       "Ivan Beschastnikh",
  title =        "Book Review: {{\booktitle{Presentation patterns:
                 techniques for crafting better presentations}} by Neal
                 Ford, Matthew McCullough and Nathaniel Schutta}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "67--67",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507291",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gvero:2013:CCE,
  author =       "Igor Gvero",
  title =        "Computers as components, 3rd edition: principles of
                 embedded computing system design by Marilyn {Wolf}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "67--68",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507292",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRD,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Drupal For Designers}} by
                 Dani Nordin}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "68--68",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.250729",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRJ,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{jQuery, jQuery UI and jQuery
                 Mobile: recipes and examples}} by Adriaan de Jonge and
                 Phil Dutson}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "5",
  pages =        "68--69",
  month =        sep,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2507288.2507294",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:29 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chauhan:2013:DSM,
  author =       "Sandeep Chauhan and Arun Sharma and P. S. Grover",
  title =        "Developing self managing software systems using agile
                 modeling",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Design, development and operation of self managing
                 systems are extremely challenging. Having an
                 appropriate development model is of paramount
                 significance for self managing systems. Various
                 approaches have been studied and used in the past. It
                 has been observed that self managing systems may be
                 very good candidates for agile modelling and
                 development. In this paper, we propose a generic
                 architecture along with a life cycle and an Agile
                 Modelling Approach (AMA) for developing self-managing
                 systems. AMA may be applied to software development
                 projects in an effective, flexible and lightweight
                 manner. Moreover, AMA may be used for requirements,
                 analysis, architecture and design, along with the
                 use-case, object, aspect, data or user-interface
                 models.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2013:QAE,
  author =       "Rakesh Kumar and Hardeep Singh",
  title =        "A qualitative analysis of effects of security risks on
                 architecture of an information system",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--3",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532809",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Information systems are the backbone of almost every
                 business. The rise in the usage and the development of
                 information networks over the years has added to the
                 magnitude and frequent occurrences of threats to these
                 very systems. Therefore, researchers and developers
                 need to fill the gaps between early knowledge about
                 risks and current level of risks and threats posed to
                 information systems. The paper, done qualitatively,
                 explores the various effects on the architecture of the
                 information systems when the systems are exposed to
                 attacks. The conceptual results, presented in the paper
                 explore the relation of security risks to the
                 architectural components of information systems. The
                 findings can help the developer community to design
                 architecturally sound and secure information systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{B:2013:SHE,
  author =       "Sugavanesh B. and Hari Prasath R. and Selvakumar S.",
  title =        "{SHS}-{HTTPS} enforcer: enforcing {HTTPS} and
                 preventing {MITM} attacks",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532802",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web servers provide immunity against Man In The Middle
                 (MITM) attacks and eavesdropping by using HTTP Strict
                 Transport Security (HSTS) to force user agents to
                 communicate only over HTTPS connections. However, the
                 initial connection request from a user is made over an
                 insecure HTTP connection. This issue was addressed by
                 user agents; Google Chrome and Firefox, implicitly, by
                 including a static list of URLs to be accessed only
                 over secure HTTPS connections. Since, these user agents
                 maintain their lists independently, the URLs used by
                 one user agent are invisible to another. A user is
                 prone to MITM attacks, especially in public hotspot
                 environments, when accessing a URL present in the list
                 of secure URLs of one browser but not in another, since
                 the initial handshake from that user agent is insecure.
                 Attacks can be initiated by modifying the outgoing HTTP
                 packets and also the HTTPS response packets from the
                 webserver. This motivated us to propose a solution
                 independent of user agents, by merging the static URL
                 lists of different user agents and enforcing HTTPS for
                 all those URLs. In this paper, we propose a solution,
                 SHSHTTPS Enforcer that introduces a local daemon to
                 enforce URL redirection before the request flows out of
                 the client for the URLs in a list compiled from
                 multiple sources. The proposed solution has been
                 demonstrated through a prototype implementation of the
                 Squid Proxy server as our local daemon. The experiment
                 was conducted by providing a URL, which was not present
                 in one browser's list but was present in another
                 browser's list. It was evident that SHS-HTTPS Enforcer
                 enforced HTTPS successfully and MITM attacks were
                 prevented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Castelluccia:2013:TEB,
  author =       "Daniela Castelluccia and Giuseppe Visaggio",
  title =        "Teaching evidence-based software engineering: learning
                 by a collaborative mapping study of open source
                 software",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532803",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, we share our experiences about teaching
                 evidence-based software engineering to students of a
                 Master degree program in Computer Science. We provided
                 a semester-long course, composed of lessons about
                 empirical and experimental methods. It also included a
                 collaborative project concerning a systematic mapping
                 study of the challenges in the adoption of open source
                 software in a business context. All students
                 collaborated on the project by analyzing emerging
                 results in the scientific literature. They evaluated
                 the proposals in terms of level of novelty and evidence
                 and delivered a complete report, which summarized the
                 risk factors in the adoption of open source software
                 and offers technical knowledge about evolutionary
                 patterns and development community support, with
                 practical implications. As a side effect, this
                 problem-based learning approach provides a positive
                 impact in terms of students' participation, teamwork
                 attitude, professional interest in open source
                 software, and exam passing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jeet:2013:SRE,
  author =       "Kawal Jeet and Renu Dhir",
  title =        "Software re-engineering using imperialist competitive
                 algorithm",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532808",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Maintenance is one of the important phases of the
                 software development life cycle which contributes to
                 the effective and long term use of any software system.
                 It can become cumbersome and costly for software
                 maintainers when subsystem boundaries are not clearly
                 defined. Further, the problem gets worse due to the
                 system evolution, lack of current documentation and
                 lack of original design documentation. The application
                 of clustering techniques and tools helps software
                 maintenance programmers to recover high-level views of
                 system designs and hence leads to better understanding
                 and maintenance of software systems. In this paper, we
                 have used a sociopolitical Imperialist Competitive
                 Algorithm for software module clustering and compared
                 it with existing evolutionary approaches. We conclude
                 that the novel socio-political approach produces better
                 quality clusters as compared to the earlier
                 evolutionary genetic approaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Garg:2013:NBG,
  author =       "Deepak Garg and Amitava Datta and Tim French",
  title =        "A novel bipartite graph approach for selection and
                 prioritisation of test cases",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532806",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Every regression testing cycle of a software
                 application results in new test cases being introduced
                 in a test suite. Many test cases from previous
                 regression testing cycles become unstable or unusable
                 due to the removal/addition of the new functionalities.
                 The execution of a large number of unusable test cases
                 results in less test coverage and higher test execution
                 time. The lower test coverage is due to the coverage of
                 the non-existent code statements. The higher test
                 execution time is due to the execution of unused and
                 broken test cases. In this paper, we propose a new
                 bipartite graph approach to eliminate the subset of
                 test cases that are not relevant for the testing of the
                 current version of a software application. The
                 suggested approach helps in executing a minimal set of
                 test cases that are required to cover more code
                 statements.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Goel:2013:IHL,
  author =       "Brij Mohan Goel and Pradeep Kumar Bhatia",
  title =        "Investigating of high and low impact faults in
                 object-oriented projects",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532807",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "For optimum utilization of resources and reducing the
                 cost of software, the fault detection and elimination
                 process must be properly planned and for this type of
                 planning prediction of fault-prone module is gaining
                 importance among researchers. It would be valuable to
                 know how object-oriented design metrics and class
                 fault-proneness are related when fault impact is taken
                 into account. In this paper, we use the logistic
                 regression method to empirically investigate the
                 usefulness of object-oriented design metrics in
                 predicting fault-proneness when taking fault impact
                 into account. Our results, based on a public domain
                 NASA Promise data set, indicate that most of these
                 design metrics are statistically related to
                 fault-proneness of classes across fault impact, and the
                 prediction capabilities of the investigated metrics
                 greatly depend on the impact of faults. More
                 specifically, these design metrics are able to predict
                 high/low impact faults in fault-prone classes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mary:2013:PSA,
  author =       "S. Roselin Mary and Paul Rodrigues and E. R..
                 Naganathan",
  title =        "Patterns of software architecture in {Vastu}: a new
                 revelation",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532815",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Patterns play an important role in architecture.
                 Plenty of patterns exist but remain undiscovered. Many
                 of the patterns used in different fields are knowingly
                 or unknowingly used in the field of software
                 architecture. This technical paper briefly explains
                 various patterns in the Indian architectural science
                 Vastu and also presents a brief discussion of various
                 available software architectural patterns. An attempt
                 is made here to find correlations between patterns
                 existing in vastu and software architecture. Further,
                 based on the facts established in vastu, it may be
                 possible to build any kind of complex systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Levine:2013:CSS,
  author =       "Gertrude N. Levine",
  title =        "Computer security with service degradations",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--7",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532810",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Computer systems invest substantial resources in
                 securing their service. Costs of failure prevention are
                 balanced against those of detection and recovery, even
                 though recovery mechanisms can cause greater
                 degradations of services. Most computer users consider
                 degradations of service to be insidious and injurious.
                 Yet, service degradations commonly assist in both the
                 prevention and the curtailment of failures. Their
                 toleration enables service continuation following fault
                 activation, during which degradations are monitored for
                 symptoms of security breaches.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Haller:2013:MT,
  author =       "Klaus Haller",
  title =        "Mobile Testing",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--8",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532813",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Mobile apps are everywhere. Some apps entertain and
                 others enable business transactions. Apps increasingly
                 interact with complex IT landscapes. For example, a
                 banking app on a mobile device acts as a front end that
                 invokes services on a back-end server of the bank,
                 which might contact even more servers. Mobile testing
                 becomes crucial and challenging. This paper follows a
                 user-centric testing approach. The app's architecture
                 matters for testing, as does its user base and usage
                 context. Addressing these factors ensures that test
                 cases cover all relevant areas. Most apps need test
                 automation for two reasons: agility and compatibly.
                 Agile projects test frequently, such as every night, to
                 detect bugs early. Compatibility tests ensure that an
                 app runs on all relevant devices and operating system
                 versions on the market. Thus, testers execute test
                 scripts on many devices. This demands for a private
                 device cloud and a mobile test automation framework.
                 Swisscom IT Services followed this path, enabling us to
                 address the major quality issues we identified for
                 mobile apps: pre-usage failures (installation fails,
                 app crashes during startup) and lack of basic
                 regression testing (upgrades buggier than
                 predecessor).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2013:RPT,
  author =       "Lalit Kumar Singh and Gopika Vinod and A. K.
                 Tripathi",
  title =        "Reliability prediction through system modeling",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--10",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.25328012",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Quantifying software reliability, such as performance
                 and dependability, through stochastic behavior models
                 (or labeled transition systems) is already a common
                 practice in the software analysis community. However,
                 those models are usually too fine grained to represent
                 an accurate view of the software system by its
                 stakeholders. Scenarios, on the other hand, are capable
                 not only to describe the system traces as behavior
                 models do but also depict very clearly the system
                 components designed to provide the intended system
                 behavior as well as to outline a high level
                 architecture view of the system being described. In
                 this paper, we introduce a case study of a safety
                 critical computer based system that is running in an
                 Indian Nuclear Power Plant. We define clear component
                 interfaces, from which we analyze its software
                 reliability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dutta:2013:ERD,
  author =       "Animesh Dutta and Shrutilipi Bhattacharjee and Ananya
                 Kanjilal and Ranjan Dasgupta and Swapan Bhattacharya",
  title =        "Engineering of requirements for a distributed
                 teleteaching system: a conceptual graph-based
                 approach",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--12",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532814",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This work proposes a graph based requirement analysis
                 approach and its verification methodology to address
                 the challenges of requirements engineering in the
                 context of a distributed teleteaching system.
                 Requirements are generally expressed in natural
                 language and in the absence or limited use of the
                 requirements elicitation phase, verification of
                 requirements and traceability of requirements to
                 different artifacts of the subsequent phases becomes
                 difficult. In this work we use i* diagrams, the well
                 known standard for agent based requirements analysis.
                 Then we propose Extended Means Ends Analysis (EMEA)
                 with the addition of some new constructs. Next we
                 define a transformation algorithm to derive a
                 conceptual graph (CG) and propose a method for
                 conceptual graph based requirements specification and
                 its verification. A metrics based evaluation for
                 performance measurement of the proposed method in terms
                 of requirements traceability is presented.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mala:2013:CAT,
  author =       "D. Jeya Mala and S. Balamurugan and K. Sabari Nathan",
  title =        "Criticality analyzer and tester: an effective approach
                 for critical component identification \& verification
                 using {ABC}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--12",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532811",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Now a days, software industries satisfy users' needs
                 through developing software. To satisfy their
                 customers, the software developers need to identify the
                 critical components that make serious impacts on users'
                 requirements. Tracking critical components is an
                 important and timeconsuming process. In this paper, we
                 propose a novel approach, Criticality Analysis, which
                 identifies the critical components of an application.
                 The identified critical components are verified to
                 ensure that they are failure-free using the intelligent
                 search based optimization algorithm, Artificial Bee
                 Colony.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ahmad:2013:WSE,
  author =       "Faisal Ahmad and Suvamoy Changder and Anirban Sarkar",
  title =        "{Web} service execution model for cloud environment",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--13",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Web services describe a standardized way of
                 integrating Web-based applications. In recent days,
                 with the advancement of cloud computing, web services
                 play pivoting roles towards meeting complex business
                 objectives on a large scale. However, engineering
                 dynamic web services is a complex task as they can be
                 added, modified and deleted on the fly and even without
                 any prior notification. Executing a large scale
                 business process using dynamic web services is very
                 challenging. This paper proposes an execution machine,
                 called Web Service Dynamic Execution Machine (WSDE
                 machine), which works in the execution layer of the
                 three layered architecture for web service dynamics
                 [23]. The proposed machine is capable of executing
                 business processes having both deterministic and
                 non-deterministic flows, where the related web services
                 are represented using a graph-based semantic based
                 formal model. The generic nature of the WSDE machine is
                 useful in improving performance, scalability and
                 maintainability of large scale web service based
                 information systems. In this paper, the proposed WSDE
                 machine is also illustrated with a suitable case
                 study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{deCastro:2013:SGP,
  author =       "Ronney Moreira de Castro and Jos{\'e} Luis Braga and
                 Liziane Santos Soares",
  title =        "Selection of good practices for small software
                 development teams: a knowledge-based approach",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "1--15",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532804",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The world is increasingly dependent on technology and
                 computing systems. Software organizations are facing a
                 highly competitive market, and thus seeking good
                 practices and processes that help keep them
                 competitive. The quality of their products becomes a
                 differentiating factor and is directly associated with
                 these processes. The software products they deliver
                 play a major role in this competitive scenario, to
                 which small organizations do not have easy access. Our
                 study is directed to those small and
                 micro-organizations that lack the necessary financial
                 assets to hire people, adopt and implement expensive
                 processes, or even implement good development
                 practices. In this paper we present our approach to
                 help those organizations find good practices to enhance
                 their software development processes. The method
                 consisted of obtaining a possible company profile based
                 on technical attributes, given as input to a
                 knowledge-based system that derived a list of possible
                 practices to be adopted according to that profile. Then
                 project managers can select those more suitable to the
                 company's present demands, and implement them in
                 smaller steps according to the organization maturity
                 levels. The approach was currently tested in two
                 organizations that are by now implementing the
                 suggested practices. The proposed system is freely
                 available through the internet.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Katic:2013:WAC,
  author =       "Marija Katic",
  title =        "Why attending conferences is important for your
                 research: {ESEC\slash FSE 2013} experience summary",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "5--6",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532787",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, a personal perspective on how important
                 for a scientist is to attend conferences is given. The
                 report is influenced by the author's attendance of the
                 9th joint meeting of the European Software Engineering
                 Conference and the ACM SIGSOFT Symposium on the
                 Foundations of Software Engineering (ESEC/FSE 2013).
                 ESEC/FSE 2013 took place in Saint Petersburg, Russia
                 and gathered researchers, practitioners, and educators
                 from all over the world that presented and discussed
                 the most recent work, trends, and challenges in the
                 field of software engineering. ESEC/FSE joined the main
                 conference, and several co-located events: two
                 conferences, four workshops, doctoral symposium and
                 seven tutorials. While the main conference covered
                 broad topics in software engineering, the two
                 co-located conferences were targeted to the specific
                 software engineering community: multicore software
                 engineering, performance, and tools, and to the
                 search-based software engineering community.
                 Additionally, there were four interesting workshops: on
                 social software engineering, on software evolution, on
                 software ecosystem architectures, and on software
                 development lifecycle for mobile. Keywords Software
                 engineering, discuss, attending conferences.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2013:Pb,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "6--7",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532783",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2013:WLM,
  author =       "Robert Schaefer",
  title =        "Why {Lehman} matters: mediocracy",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "8--9",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532786",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ardis:2013:SEEd,
  author =       "Mark A. Ardis and Peter B. Henderson",
  title =        "Software engineering education {(SEEd)}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "9--10",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532785",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2013:SNSf,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "11--20",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532782",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2013:RPf,
  author =       "Peter G. Neumann",
  title =        "Risks to the public",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "21--28",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532781",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Graziotin:2013:RDP,
  author =       "Daniel Graziotin and Andreas Jedlitschka",
  title =        "Recent developments in product-focused software
                 process improvement: {PROFES} 2013 conference report",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "29--34",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532789",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes the presentations and
                 discussions that happened at PROFES 2013, the 14th
                 International Conference on Product-Focused Software
                 Process Improvement, which was held June 12--14, 2013
                 in Paphos, Cyprus. The main theme of PROFES is software
                 process improvement (SPI) motivated by product,
                 process, and service quality needs. PROFES 2013
                 addressed both quality engineering and management
                 topics, divided into the areas of Decision Support in
                 Software Engineering, Empirical Software Engineering,
                 Managing Software Processes, Safety-Critical Software
                 Engineering, Software Measurement, Software Process
                 Improvement, and Software Maintenance.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2013:ISD,
  author =       "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
                 Mishra",
  title =        "Information systems in distributed environments:
                 {ISDE} 2013",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "34--35",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532790",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from a one-day fourth international
                 workshop on ``Information Systems in Distributed
                 Environments'' (ISDE), which was organized in
                 conjunction with the OnTheMove Federated Conferences \&
                 Workshops (OTM 2013) at Technical University of Graz,
                 Austria, on September 13, 2013. The main focus of this
                 workshop was to provide a venue for the discussion of
                 challenges related to the development, operation, and
                 maintenance of distributed information systems, and
                 their creation in the context of global development
                 projects. Further dissemination of research results
                 will lead to an improvement of distributed information
                 system development and deployment across the globe.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kienle:2013:BRE,
  author =       "Holger M. Kienle",
  title =        "Book Review: {{\booktitle{Effective JavaScript: 68
                 specific ways to harness the power of JavaScript}} by
                 David Herman}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "40--41",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532791",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Moreland:2013:BRP,
  author =       "Doug Moreland",
  title =        "Book Review: {{\booktitle{A practical approach to
                 large-scale agile development: how HP transformed
                 LaserJet FutureSmart firmware}} by Gary Gruver, Mike
                 Young and Pat Fulghm}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "41--42",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532792",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Payton:2013:BRD,
  author =       "Ryan Payton",
  title =        "Book Review: {{\booktitle{DevOps Troubleshooting}} by
                 Kyle Rankin}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "42--42",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2013:BRD,
  author =       "Robert Schaefer",
  title =        "Book Review: {{\booktitle{Dynamic reconfigurable
                 network-on-chip design: innovations for computational
                 processing and communication}} by Jih-Sheng Shen and
                 Pao-Ann Hsuing}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "42--43",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532794",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bangalore:2013:HFD,
  author =       "Bangalore",
  title =        "{Hadoop} Fundamentals by Doug Eadline",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "43--44",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532795",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:XML,
  author =       "Vasile G. Teodorovici",
  title =        "{OS} X mountain lion: the missing manual by {David}
                 Pogue",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "44--44",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRO,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{The object-oriented thought
                 process}}, fourth edition by Matt Weisfeld}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "44--45",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teodorovici:2013:BRA,
  author =       "Vasile G. Teodorovici",
  title =        "Book Review: {{\booktitle{Advanced programming in the
                 UNIX environment}}, third edition by W. Richard Stevens
                 and Stephen A. Rago}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "45--45",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2532798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jahns:2013:BRD,
  author =       "Veit Jahns",
  title =        "Book Review: {{\booktitle{Data insights: new ways to
                 visualize and make sense of data}} by Hunter Whitney}",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "45--46",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2544424",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tracz:2013:SEC,
  author =       "Will Tracz",
  title =        "Software engineering: the current practice by Vaclav
                 Rajlich",
  journal =      j-SIGSOFT,
  volume =       "38",
  number =       "6",
  pages =        "46--46",
  month =        nov,
  year =         "2013",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2532780.2544425",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:31 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nautiyal:2014:NAC,
  author =       "Lata Nautiyal and Neena Gupta and Sushil Chandra
                 Dimri",
  title =        "A Novel Approach to Component-Based Software Testing",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674640",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In the present era when component-based software
                 development plays an important role in the software
                 development community, testing is an important
                 activity, which should not be neglected.
                 Component-based software testing is an essential
                 activity, which supports productivity in
                 component-based software development. Past studies
                 indicate that more than fifty percent of the cost of
                 software development is dedicated to the testing
                 activity, which results in an increased cost of the
                 software. This paper describes the issues and
                 challenges of component-based systems. This paper also
                 suggests the requirement of a novel approach to testing
                 of component-based software. It also proposes a novel
                 approach to testing of component-based software while
                 considering some important factors like component
                 study, component test case design, component test
                 execution, and component test analysis and component
                 test documentation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sabharwal:2014:IIC,
  author =       "Sangeeta Sabharwal and Manuj Aggarwal",
  title =        "Identifying Interactions for Combinatorial Testing
                 using Data Flow Techniques",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674643",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Combinatorial (t-way) testing has been proved to be an
                 effective technique that identifies faults caused by
                 interactions among a small number of input parameters.
                 However, the degree of interaction to be considered for
                 testing is still an open issue. Although higher
                 strength t-way testing improves fault detection, it
                 leads to a considerable increase in number of
                 interactions to be tested and hence the test set size.
                 In this paper, an approach is proposed that attempts to
                 reduce the number of interactions to be tested. The
                 source code is transformed into a flow graph and data
                 flow analysis is applied to it to identify the
                 interactions that exist in the system. The initial
                 results suggest that the approach is able to achieve a
                 considerable reduction in the number of interactions to
                 be tested.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Zaidi:2014:PES,
  author =       "Taskeen Zaidi and Vipin Saxena",
  title =        "Performance Estimation of Static Step Topology Across
                 Distributed Networks through Simulation Tool",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "1--4",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674644",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "During the past years, distributed computing has
                 become more popular because of several advantages over
                 centralized computing. Such types of platforms offer
                 high performance computing environment at a too low
                 cost. Many of organizations have shifted their old
                 centralized based computing labs into distributed
                 computing labs that are based upon a static topological
                 structure. The present work is related to the
                 performance estimation of newly proposed step topology
                 across the distributed computing network. The
                 well-known Unified Modeling Language is used to design
                 a model for computation of performance of the topology.
                 The performance is measured in terms of transferring
                 the video and audio files that are having a large size
                 in terms for bytes. A simulation tool provides
                 transferring of packets across distributed networks
                 designed through step topology.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nautiyal:2014:MRC,
  author =       "Lata Nautiyal and Neena Gupta and Sushil Chandra
                 Dimri",
  title =        "Measurement of the Reliability of a Component-Based
                 Development using a Path-Based Approach",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674641",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Component-based systems are based on the idea of
                 assembling lots of independent and pre-defined
                 components based on discriminating designs.
                 Component-based systems provide a better reuse of
                 software components along with flexibility, scalability
                 and better quality of services to fulfill the
                 requirements of the end user. We can consider
                 component-based software engineering successful only if
                 it has the ability to select and integrate reliable
                 components. In this paper we propose an innovative
                 reliability model in terms of multiple execution paths
                 and the usage percentage of each and every component.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Parashar:2014:MCR,
  author =       "Anshu Parashar and Jitender Kumar Chhabra",
  title =        "Measuring Change-Readiness of Classes by Mining
                 Change-History",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "1--5",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674642",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The change-history of a software system records how
                 the system evolved over time. The change-history can
                 tell which components (classes) are changed together,
                 i.e. are change-coupled. In this paper, we propose two
                 metrics for quantifying change-coupling among classes
                 on the basis of their change-history and then propose
                 another measure to compute a change-readiness index of
                 the classes. The change-readiness of a class is
                 measured as how much the class is ready to change. In
                 this paper, we define change-history-based metrics,
                 demonstrate computation of these measures by example
                 and validate them theoretically. The SVNSearch
                 subversion web-based utility has been used to mine the
                 change logs of the EGit project of Eclipse. Further,
                 change-readiness is computed for the classes of EGit
                 and our findings are discussed. It has been found that
                 the metrics based on change-history can be helpful to
                 predict the future change behavior of the classes.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kaur:2014:MSI,
  author =       "Navdeep Kaur and Parminder Kaur",
  title =        "Mitigation of {SQL} Injection Attacks using Threat
                 Modeling",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674638",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Day after day, SQL Injection (SQLI) attack is
                 consistently proliferating across the globe. According
                 to Open Web Application Security Project (OWASP) Top
                 Ten Cheat Sheet-2014, SQLI is at top in the list of
                 online attacks. The cause of spread of SQLI is thought
                 to be Unsecure Software Engineering. The Software
                 Development process itself appears to look at security
                 as an add-on to be checked and deployed towards the end
                 of the software development lifecycle which leads to
                 vulnerabilities in web applications. This paper is an
                 attempt to integrate security in early stages of SDLC
                 i.e. in design phase to mitigate SQLI vulnerability.
                 How SQLI attack happens is illustrated. Threat Modeling
                 is performed to mitigate the SQLI vulnerability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2014:DLB,
  author =       "Narander Kumar and Shalini Agarwal and Taskeen Zaidi
                 and Vipin Saxena",
  title =        "A Distributed Load-balancing Scheme Based on a Complex
                 Network Model of Cloud Servers",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "1--6",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674639",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Efficient management of resources in a federation of
                 interacting computing servers and devices, for example,
                 in a cloud computing environment, requires a
                 load-balancing system that is self-regulatory and
                 oblivious in nature. Due to the increasing size of data
                 centers and their distribution across the globe,
                 centralized load-balancing approaches suffer
                 significant deficiencies in terms of communication
                 overhead caused by the need to collect state dependent
                 information. The technology of the cloud in its current
                 state runs as many as 200 virtual machines on a single
                 server, which clearly shows the importance of studying
                 distributed load-balancing systems in the cloud. In the
                 present paper, the federation of cloud servers is
                 modeled as a complex network. In a complex network the
                 structure and dynamics of the underlying system are
                 encoded in the network topology itself. A method using
                 random walks on complex networks for discovering free
                 resources in a Cloud Server Network is given. The given
                 method is used to balance the overall load on the
                 network by equalising loads on overloaded and
                 underloaded nodes without the need of a global load
                 balancer. Simulation results are obtained through
                 Network Simulator Version 2, which show that the
                 proposed load-balancing scheme performs well for a
                 large network by uniformly distributing the workload
                 among the servers in polynomial time.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2014:P,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "6--7",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674636",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2014:SNS,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "8--16",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674634",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2014:RP,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "17--22",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674635",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ralph:2014:HDG,
  author =       "Paul Ralph and Iaakov Exman and Pan-Wei Ng and Pontus
                 Johnson and Michael Goedicke and Alper Tolga Kocata and
                 Kate Liu Yan",
  title =        "How to Develop a General Theory of Software
                 Engineering: Report on the {GTSE 2014} Workshop",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "23--25",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674647",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Many academic disciplines have general theories, which
                 apply across the discipline and explain diverse
                 phenomena. General theories facilitate developing a
                 cumulative body of knowledge, increase a field's
                 resistance to fads and pseudoscience, and help us
                 respond to novel situations where old heuristics break
                 down. The goal of the SEMAT General Theory of Software
                 Engineering (GTSE) workshop is therefore to promote
                 developing and testing general theories for software
                 engineering. The Third GTSE workshop was co-located
                 with the International Conference on Software
                 Engineering (ICSE) in 2014. Participants explored
                 different types of theories and how to assemble them
                 into a framework. Participants debated how to make
                 theories practical to practitioners and agreed that
                 different types of practitioners (e.g. developers) have
                 different needs for theories.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Robles:2014:FRT,
  author =       "Gregorio Robles and Jes{\'u}s M. Gonz{\'a}lez-Barahona
                 and Dirk Riehle",
  title =        "{FLOSS Research Track at the 10th International
                 Symposium on Open Collaboration (OpenSym 2014)}",
  journal =      j-SIGSOFT,
  volume =       "39",
  number =       "6",
  pages =        "26--27",
  month =        nov,
  year =         "2014",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2674632.2674648",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:36 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from the Free/Libre/Open Source
                 (FLOSS) research track at the 10th International
                 Symposium on Open Collaboration (OpenSym 2014), which
                 took place in Berlin, Germany, August 27-29. As part of
                 a broader community interested in ``everything open'',
                 including open access, open data, open educational
                 resources, Wikipedia, wikis and open collaboration,
                 this research track was a place to discuss software
                 engineering related issues from various points of view,
                 based on a selection of research papers that was
                 considered by the programme committee. As such, we had
                 contributions on technical (such as the usefulness of
                 automatic bug reporting tools, the implementation of
                 standards, or linking various data sources),
                 community-related (integration, congruence), economic
                 (business models, or the impact of FLOSS in the growth
                 of businesses), and fundamental (such as software
                 forks) matters. We look forward to next year's OpenSym,
                 which will take place 19-21 August 2015 in San
                 Francisco, California, see http://opensym.org.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hughes:2016:BRA,
  author =       "Jeffrey Hughes and Cassandra Sparks and Alley
                 Stoughton and Rinku Parikh and Albert Reuther and
                 Suresh Jagannathan",
  title =        "{Building Resource Adaptive Software Systems (BRASS)}:
                 Objectives and System Evaluation",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853081",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As modern software systems continue inexorably to
                 increase in complexity and capability, users have
                 become accustomed to periodic cycles of updating and
                 upgrading to avoid obsolescence --- if at some cost in
                 terms of frustration. In the case of the U.S. military,
                 having access to well-functioning software systems and
                 underlying content is critical to national security,
                 but updates are no less problematic than among civilian
                 users and often demand considerable time and expense.
                 To address these challenges, DARPA has announced a new
                 four-year research project to investigate the
                 fundamental computational and algorithmic requirements
                 necessary for software systems and data to remain
                 robust and functional in excess of 100 years. The
                 Building Resource Adaptive Software Systems, or BRASS,
                 program seeks to realize foundational advances in the
                 design and implementation of long-lived software
                 systems that can dynamically adapt to changes in the
                 resources they depend upon and environments in which
                 they operate. [1] MIT Lincoln Laboratory will provide
                 the test framework and evaluation of proposed software
                 tools in support of this revolutionary vision",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bhardwaj:2016:KSM,
  author =       "Mridul Bhardwaj and Ajay Rana",
  title =        "Key Software Metrics and its Impact on each other for
                 Software Development Projects",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853087",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Every software development project is unique and
                 different from repeatable manufacturing process. Each
                 software project share different challenges related to
                 technology, people and timelines. If every project is
                 unique, how project manager can estimate project in a
                 consistent way by applying his past experience. One of
                 the major challenges faced by the project manager is to
                 identify the key software metrics to control and
                 monitor the project execution. Each software
                 development project may be unique but share some common
                 metric that can be used to control and monitor the
                 project execution. These metrics are software size,
                 effort, project duration and productivity. These
                 metrics tells project manager about what to deliver
                 (size), how it was delivered in past (productivity) and
                 how long will it take to deliver with current team
                 capability (time and effort). In this paper, we explain
                 the relationship among these key metrics and how they
                 statistically impact each other. These relationships
                 have been derived based on the data published in book
                 ``Practical Software Estimation'' by International
                 Software Benchmarking Group. This paper also explains
                 how these metrics can be used in predicting the total
                 number of defects. Study suggests that out of the four
                 key software metrics software size significantly impact
                 the other three metrics (project effort, duration and
                 productivity). Productivity does not significantly
                 depend on the software size but it represents the
                 nonlinear relationship with software size and maximum
                 team size, hence, it is recommended not to have a very
                 big team size as it might impact the overall
                 productivity. Total project duration only depends on
                 the software size and it does not depend on the maximum
                 team size. It implies that we cannot reduce project
                 duration by increasing the team size. This fact is
                 contrary to the perception that we can reduce the
                 project duration by increasing the project team size.
                 We can conclude that software size is the important
                 metrics and a significant effort must be put during
                 project initiation phases to estimate the project size.
                 As software size will help in estimating the project
                 duration and project efforts so error in estimating the
                 software size will have significant impact on the
                 accuracy of project duration and effort. All these key
                 metrics must be re-calibrated during the project
                 development life cycle",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Drori:2016:TSD,
  author =       "Offer Drori",
  title =        "Template for a System Design File Using {OODPM}
                 Version 2015",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853090",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Object Oriented Design by Prototype Methodology
                 (OODPM) integrates two known technologies: the object
                 approach and the prototype concept. Object oriented
                 methodology is used for internal system design, and
                 prototype methodology is used for external system
                 design. This document is a template for a system design
                 file using OODPM version 2015 (titles of paragraphs
                 only). For full explanations for each paragraph look at
                 [1]. This version developed after tens of projects that
                 developed and plan using version 6 in a very vast
                 projects for national information systems. This version
                 companion by ``OODPM --- Methodology for Management
                 Information Systems life Cycle'' (meanwhile only in
                 Hebrew)",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gulati:2016:SRB,
  author =       "Jayati Gulati and Priya Bhardwaj and Bharti Suri and
                 Anu Singh Lather",
  title =        "A Study of Relationship between Performance,
                 Temperament and Personality of a Software Programmer",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853089",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper focuses on finding the relationship between
                 the performance, temperament and personality of a
                 software programmer. The rationale behind conducting
                 this study is to find out if personality influences the
                 performance of software engineering students. We
                 conducted a survey of 66 students pursuing engineering
                 to find out their personality traits and its
                 relationship with their programming abilities. The
                 personality test used was Goldberg's IPIP
                 (International Personality Item Pool) and Keirsey
                 Temperament Sorter. The results showed that IPIP test
                 personality traits of extroversion, agreeableness,
                 conscientiousness, emotional stability and intellect
                 are not significantly correlated with performance of
                 the respondents. However, on temperament dimension it
                 was found that there was a significant correlation
                 between ``Guardian'' temperament and high performance
                 which indicates that these respondents had sensing and
                 judging type of temperament",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Nautiyal:2016:NAE,
  author =       "Lata Nautiyal and Preeti",
  title =        "A Novel Approach of Equivalence Class Partitioning for
                 Numerical Input",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--5",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853084",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software testing is an indispensible phase of software
                 development that supports not only productivity but
                 also quality assurance from small to large scale
                 software products. Software Systems essentially need an
                 effective way to develop a strategy for testing various
                 aspects of the system. When we are testing software the
                 first and potentially most critical step is to design
                 test cases. There are many methods which assist test
                 case design. This paper will document the approach
                 known as Equivalence class partitioning. We have
                 partitioned the input into two classes Even and Odd.
                 The proposed approach works for integer inputs only.
                 Partitioning is done on basis of assessment of input
                 conditions that serves as a set of valid as well as
                 invalid set of input values for a test case",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rathore:2016:DTR,
  author =       "Santosh Singh Rathore and Sandeep Kumar",
  title =        "A Decision Tree Regression based Approach for the
                 Number of Software Faults Prediction",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853083",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software fault prediction is an important activity to
                 make software quality assurance (SQA) process more
                 efficient, economic and targeted. Most of earlier works
                 related to software fault prediction have focused on
                 classifying software modules as faulty or non-faulty.
                 However, prediction of the number of faults in a given
                 software module is not adequately investigated. In this
                 paper, we explore the capability of decision tree
                 regression (DTR) for the number of faults prediction in
                 two different scenarios, intra-release prediction and
                 inter-releases prediction for the given software
                 system. The experimental study is performed over five
                 open-source software projects with their nineteen
                 releases collected from the PROMISE data repository.
                 The predictive accuracy of DTR is evaluated using
                 absolute error and relative error, prediction at level
                 l and goodness-of-t measure. The results show that
                 decision tree regression produced significant
                 prediction accuracy for the number of faults prediction
                 in both the considered scenarios. The relative
                 comparison of intra-release and inter-releases fault
                 prediction shows that intra-project prediction produced
                 better accuracy compared to inter-releases prediction
                 across all the datasets",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Shah:2016:ESD,
  author =       "Unnati S. Shah",
  title =        "An Excursion to Software Development Life Cycle
                 Models: an Old to Ever-growing Models",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853080",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software Engineering provides a standard way to
                 develop and maintain a complex software. Industry uses
                 software development Life Cycles (SDLC) to develop a
                 software. SDLC plays an important role as it helps to
                 define the software requirements, model the software
                 component, reduce development and maintenance cost and
                 finally provides manageable software. There exist
                 numerous SDLC models viz. Waterfall, Incremental,
                 Rapid, Agile, Hybrid etc. After a comprehensive study
                 and analysis of existing SDLC models, I observe all
                 models are complementary, not competitive. I divide all
                 models into three broad categories viz. Traditional
                 models, Agile models and Hybrid models. The main
                 objective of the paper is to give a quick review of
                 SDLC models and an effective answer to the most
                 confusing question arise in software engineering
                 practice ``how to select an efficient SDLC model for
                 practice?'' Many factors viz. nature of requirements,
                 the size of software development team, project size,
                 customer interaction etc. have an effect on selection
                 criteria. This paper presents a brief insight into each
                 model and its comparative analysis. The analysis helps
                 to understand the basic characteristics of each model
                 and its applicability. Furthermore, the analysis helps
                 software manager to select the appropriate model for
                 practice",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Baliyan:2016:HFS,
  author =       "Niyati Baliyan and Sandeep Kumar",
  title =        "A Hierarchical Fuzzy System for Quality Assessment of
                 Semantic {Web} Application as a Service",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--7",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853085",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Semantic Web enabled applications are becoming popular
                 due to the presence of their machine comprehensible
                 description, which makes them easily sharable across
                 machines. If such applications are deployed as services
                 to the user through the Cloud, they can facilitate
                 transparency and reusability. There exist no
                 attributes, metrics, or models for monitoring the
                 quality of such applications. In the current work, a
                 hierarchical fuzzy system for quality assessment of
                 Semantic Web based applications delivered as services
                 on the Cloud, is proposed. The quality attributes
                 proposed herein have been validated through the
                 standard IEEE-1061 validation framework. Experimental
                 results reveal that the proposed hierarchical fuzzy
                 system handles the multiplicity of quality attributes,
                 and can be used for the relative ranking of Semantic
                 Web applications available as services",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{kotti:2016:QSA,
  author =       "Jayasri kotti and Seetharamaiah Panchumarthy",
  title =        "The Quantitative Safety Assessment and Evaluation for
                 Safety-Critical Computer Systems",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--8",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853091",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The rapid increase in computer-related technologies
                 puts greater demands on the software-controlled
                 systems. These demands place the software in total
                 control over safety-critical systems. A fault in such a
                 Safety-Critical Computer Systems (SCCS) can result in
                 catastrophic concerns such as loss of life, harm, or
                 equipment damage. In order to detect and prevent such
                 faults, some safety standards, safety analysis and
                 fault-tolerant techniques have been developed. Still,
                 it requires adequate methodologies and frameworks to
                 complete verification of these SCCS. In this work, the
                 software safety is considered into 3 parts: Safety
                 Modeling, Safety Measurement and Safety Management,
                 with assurance lying down to develop high quality
                 software for SCCS. The proposed methodology is SM-Cube
                 (Safety Modeling, Safety Measurement and Safety
                 Management) which is the Safety-Critical Computer
                 Systems concerned. SM-Cube provides a clarified
                 differentiation for assessing and evaluating the safety
                 embedded into the software. SM-Cube consists of
                 required processes and operations for developing SCCS
                 free of faults. This proposed SM-cube has been applied
                 to safety-critical software based Railroad Crossing
                 Control System (RCCS) which is a laboratory prototype.
                 The outcomes of the prototype confirmed that all
                 critical operations have been safe and risk free. The
                 development of the software based on the proposed
                 SM-cube for RCCS have shown a simplified and improved
                 safety-critical operations of the overall system
                 performance",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ozturk:2016:IGTa,
  author =       "Muhammed Maruf {\"O}zt{\"u}rk and Ahmet Zengin",
  title =        "Improved {GUI} Testing using Task Parallel Library",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--8",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853086",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "While performing a software engineering project,
                 testing is one of the effort intensive activity
                 accounting for up to 50\% of total software development
                 cost. To reduce this cost, parallel execution of test
                 cases is a preferred way for developers. Task Parallel
                 Library (TPL) is a powerful and scalable library
                 providing a wide range of methods while facilitating
                 test harnesses. Here, we propose a novel algorithm
                 P-GUI, thereby using TPL. Results of experiment
                 designed on 10 web pages show that proposed algorithm
                 achieved a speedup of 1.4 on average",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Park:2016:SPE,
  author =       "June Sung Park and Paul E. McMahon and Barry Myburgh",
  title =        "{Scrum} Powered by Essence",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--8",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853088",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This paper shows how Scrum project management practice
                 can be described using Essence kernel and language
                 which has recently been adopted as an official Object
                 Management Group standard for creating and enacting
                 software engineering methods. Practical benefits of
                 using Essence as a common foundation for defining
                 software engineering practices are demonstrated. These
                 practical benefits include the ability to compare
                 practices, assess potential gaps, make needed practice
                 improvements, and assemble select practices into a
                 coherent method to benefit the project team. In
                 addition, by providing practical checklists, as opposed
                 to conceptual discussions, the Essence-powered practice
                 becomes something the team uses on a daily basis. This
                 is a fundamental difference from traditional
                 approaches, which tend to overemphasize method
                 description as opposed to method use",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Soujanya:2016:GFC,
  author =       "K. L. S. Soujanya and A. AnandaRao",
  title =        "A Generic Framework for Configuration Management of
                 {SPL} and Controlling Evolution of Complex Software
                 Products",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "1--10",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853082",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Efficient configuration management system is crucial
                 for the success of any software product line (SPL). Due
                 to ever changing needs of customers, SPL undergoes
                 constant changes that are to be tracked in real time.
                 In the context of customer-driven development,
                 anticipation and change management are to be given
                 paramount importance. It demands implementation of
                 software variability that drives home changed, extended
                 and customized configurations besides economy at scale.
                 Moreover, the emergence of distributed technologies,
                 the unprecedented growth of component based,
                 service-oriented systems throw ever increasing
                 challenges to software product line configuration
                 management. Derivation of a new product is a dynamic
                 process in software product line that should consider
                 functionality and quality attributes. Very few
                 approaches are found on configuration management (CM)
                 of SPL though CM is enough matured for traditional
                 products. They are tailor made and inadequate to
                 provide a general solution. Stated differently, a
                 comprehensive approach for SPL configuration management
                 and product derivation is still to be desired. In this
                 paper, we proposed a framework that guides in doing so
                 besides helping in SPL definitions in generic way. Our
                 framework facilitates SPL configuration management and
                 product derivation based on critical path analysis,
                 weight computation and feedback. We proposed two
                 algorithms namely Quality Driven Product Derivation
                 (QDPD) and Composition Analysis algorithm for
                 generating satisfied compositions and to find best
                 possible composition respectively. The usage of weights
                 and critical path analysis improves quality of product
                 derivation. The framework is extensible and flexible
                 thus it can be leveraged with variability-aware design
                 patterns and ontology. We built a prototype that
                 demonstrates the proof of concept. We tested our
                 approach with Dr. School product line. The results
                 reveal that the framework supports configuration
                 management of SPL and derivation of high quality
                 product in the product line. We evaluated results with
                 ground truth to establish significance of our
                 implementation",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2016:Pa,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "5--5",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853074",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2016:WWE,
  author =       "Robert Schaefer",
  title =        "The World Will Not End With a Bang But With {Http
                 Error 404}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "5--7",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853075",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Xie:2016:PPI,
  author =       "Tao Xie",
  title =        "The Pursuit of Practice-Impactful Research",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "7--8",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853077",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2016:SNSa,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "9--17",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853078",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2016:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "18--24",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853076",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Exman:2016:SPG,
  author =       "Iaakov Exman and Dewayne E. Perry and Balbir Barn and
                 Paul Ralph",
  title =        "Separability Principles for a General Theory of
                 Software Engineering: Report on the {GTSE 2015}
                 Workshop",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "25--27",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853093",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The four GTSE (General Theory of Software Engineering)
                 Workshops have brought awareness to, more or less
                 mature, differing approaches, candidate theories for SE
                 (Software Engineering). But one asks how to appraise
                 the generality of these theories? And in case they are
                 specialized sub-theories, are they amenable to
                 combination into more general theories? The papers of
                 the fourth GTSE Workshop addressed these questions by
                 means of what can be collectively refer to as
                 Separability Principles. In a sense, participants used
                 well known techniques applied to design software
                 systems to design SE theories. Separability is a
                 powerful tool for understanding relations among SE
                 candidate theories and guide how to assemble
                 sub-theories into a general framework. Participants
                 enthusiastically debated a series of related issues.
                 The specialized vs. general theories questions were
                 raised in diverse forms, such as, SE meaning multiple
                 things, good predictive theories for narrow problems,
                 ability of General theories to generate specific
                 theories, and last but not least, whether ``General''
                 capture the contents of the workshop itself. The 4th
                 GTSE edition was collocated with ICSE 2015
                 (International Conference of Software Engineering) in
                 Firenze, Italy",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fraser:2016:SER,
  author =       "Steven Fraser",
  title =        "{Software Engineering Research and Industrial Practice
                 IEEE ICSE 2015 Workshop Report: May 17, 2015}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "28--31",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853094",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report provides an overview of the presentations
                 and discussions of the 2nd IEEE ICSE Workshop on
                 ``Software Engineering Research and Industrial
                 Practice'' held May 17, 2015 in Florence Italy. The
                 program consisted of keynotes, paper presentations, a
                 panel, and a group dinner.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Alebrahim:2016:VQS,
  author =       "Azadeh Alebrahim and Stephan Fa{\ss}bender and Martin
                 Filipczyk and Michael Goedicke and Maritta Heisel and
                 Uwe Zdun",
  title =        "Variability for Qualities in Software Architecture",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "1",
  pages =        "32--35",
  month =        jan,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2853073.2853095",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:41 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Variability is a key factor of most systems. While
                 there are many works covering variability in
                 functionality, there is a research gap regarding
                 variability in software qualities. There is an obvious
                 imbalance between the importance of variability in the
                 context of quality attributes, and the intensity of
                 research in this area. To improve this situation, the
                 First International Workshop on VAriability for
                 QUalIties in SofTware Architecture (VAQUITA) was held
                 jointly with ECSA 2015 in Cavtat/Dubrovnik, Croatia as
                 a one-day workshop. The goal of VAQUITA was to
                 investigate and stimulate the discourse about the
                 matter of variability, qualities, and software
                 architectures. The workshop featured three research
                 paper presentations, one keynote talk, and two working
                 group discussions. In this workshop report, we
                 summarize the keynote talk and the presented papers.
                 Additionally, we present the results of the working
                 group discussions",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jie:2016:ICS,
  author =       "Jason Lee Hua Jie",
  title =        "Industrial Case Study of Transition from {V-Model}
                 into {Agile SCRUM} in Embedded Software Testing
                 Industries",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "1--3",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As the software features and technology advances,
                 delivering quality embedded software for consumer
                 products become more important and challenging than
                 ever within organizations. This is particularly vital
                 when these products are delivered as part of chips.
                 These chips or better known as system-on-chip (SoC) are
                 embedded as part of today's gadgets. They are used by
                 consumers for their everyday use, namely mobile phones
                 and tablets. In this case study, I will share several
                 significant changes which have taken place in the
                 testing embedded software industries when the
                 transition takes place from V-model methodology to
                 Agile Scrum in the organization. These changes are
                 particularly related to software testing perspectives.
                 Apart from that, I will share the challenges that have
                 been faced and how we have managed them since the
                 organization fully adopted Agile Scrum within the first
                 18 months. Finally, I will describe the way Agile Scrum
                 has evolved and keys for QA successes in ensuring
                 business wins with our major players of embedded
                 software original equipment manufacturers (OEMs).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2016:IME,
  author =       "Richa Sharma and Peeyush Aggarwal and Ashish Sureka",
  title =        "Insights from Mining Eleven Years of Scholarly Paper
                 Publications in Requirements Engineering {(RE)} Series
                 of Conferences",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "1--6",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894794",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We present insights from a bibliometric analysis and
                 scientific paper publication mining of 551 papers in
                 Requirements Engineering (RE) series of conference (11
                 years from 2005 to 2015). We study cross-disciplinary
                 and interdisciplinary nature of RE research by
                 analyzing the cited disciplines in the reference
                 section of each paper. We apply topic modeling on a
                 corpus consisting of 551 abstracts and extract topics
                 as frequently co-occurring and connected terms. We use
                 topic modeling to study the structure and composition
                 of RE research and analyze popular topics in industry
                 as well as research track. Co-authorship in papers is
                 an indicator of collaboration and interaction between
                 scientists as well as institutions and we analyze
                 co-authorship data to investigate university-industry
                 collaboration, internal and external collaborations. We
                 present results on the distribution of the number of
                 co-authors in each paper as well as distribution of
                 authors across world regions. We present our analysis
                 on the public or proprietary dataset as well as the
                 domain of the dataset used in studies published in
                 Requirements Engineering (RE) series of conferences.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ozturk:2016:IGTb,
  author =       "Muhammed Maruf {\"O}zt{\"u}rk and Ahmet Zengin",
  title =        "Improved {GUI} Testing using Task Parallel Library",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "1--8",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2936305",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "While performing a software engineering project,
                 testing is one of the effort intensive activity
                 accounting for up to 50\% of total software development
                 cost. To reduce this cost, parallel execution of test
                 cases is a preferred way for developers. Task Parallel
                 Library (TPL) is a powerful and scalable library
                 providing a wide range of methods while facilitating
                 test harnesses. Here, we propose a novel algorithm
                 P-GUI, thereby using TPL. Results of experiment
                 designed on 10 web pages show that proposed algorithm
                 achieved a speedup of 1.4 on average.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2016:GBD,
  author =       "Jagannath Singh and Subhrakanta Panda and P. M. Khilar
                 and D. P. Mohapatra",
  title =        "A Graph-Based Dynamic Slicing of Distributed
                 Aspect-Oriented Software",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "1--8",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894791",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Distributed computing has become very popular these
                 days due to its speed, accuracy and fault tolerance
                 capability. In this pa-per, we have considered the
                 distributed Aspect-Oriented Programs (AOPs) where
                 message passing and synchronization are handled by
                 Aspects. In this paper, we present a parallel dynamic
                 slicing algorithm for distributed AOPs. We introduce
                 parallelism into our slicing algorithm to make the
                 slice computation process much faster. Our algorithm is
                 implemented on our developed tool, called DDG
                 generator, to generate the required intermediate graphs
                 for distributed AOPs. The proposed slicing technique is
                 compared with one related existing technique using
                 three case studies. The experimental results show that
                 our proposed slicing algorithm generates precise slices
                 in less time as compared to the existing algorithm.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hu:2016:UUC,
  author =       "Wei-Chung Hu and Hewijin Christine Jiau",
  title =        "{UCFrame}: a Use Case Framework for Crowd-Centric
                 Requirement Acquisition",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "1--13",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894795",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "To build needed mobile applications in specific
                 domains, requirements should be collected and analyzed
                 in holistic approach. However, resource is limited for
                 small vendor groups to perform holistic requirement
                 acquisition and elicitation. The rise of crowdsourcing
                 and crowdfunding gives small vendor groups new
                 opportunities to build needed mobile applications for
                 the crowd. By finding prior stakeholders and gathering
                 requirements effectively from the crowd, mobile
                 application projects can establish sound foundation in
                 early phase of software process. Therefore, integration
                 of crowd-based requirement engineering into software
                 process is important for small vendor groups.
                 Conventional requirement acquisition and elicitation
                 methods are analyst-centric. Very little discussion is
                 in adapting requirement acquisition tools for
                 crowdcentric context. In this study, several tool
                 features of use case documentation are revised in
                 crowd-centric context. These features constitute a use
                 case-based framework, called UCFrame, for crowd-centric
                 requirement acquisition. An instantiation of UCFrame is
                 also presented to demonstrate the effectiveness of
                 UCFrame in collecting crowd requirements for building
                 two mobile applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2016:Pb,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "5--5",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894788",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2016:SNSb,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "6--15",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894790",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2016:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "16--22",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894789",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Axelsson:2016:NAS,
  author =       "Jakob Axelsson and Efi Papatheocharous and Jaana
                 Nyfjord and Martin T{\"o}rngren",
  title =        "Notes On Agile and Safety-Critical Development",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "23--26",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Agile approaches have been highly influential to the
                 software engineering practices in many organizations,
                 and are increasingly being applied in larger companies,
                 and for developing systems outside the pure software
                 domain. To understand more about the current state of
                 agile, its applications to safety-critical systems, and
                 the consequences on innovation and large organizations,
                 a seminar was organized in Stockholm in 2014. This
                 paper gives an overview of the topics discussed at that
                 seminar, a summary of the main results and suggestions
                 for future work as input to a research agenda for agile
                 development of safety-critical software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Staalhane:2016:ASA,
  author =       "Tor St{\aa}lhane and Thor Myklebust",
  title =        "Agile Safety Analysis",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "27--29",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper, we describe a method for performing
                 safety analysis based on user stories in an agile
                 setting. The chosen analysis method is a generic
                 hazards list, combined with FMEA --- both because it is
                 simple and intuitive to use and because it is
                 efficient. In order to handle failure propagation in an
                 efficient and easy-to-understand way, we have chosen to
                 use the input-Focused FMEA from the HiP-HOPS project.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doss:2016:COA,
  author =       "O. Doss and T. P. Kelly",
  title =        "Challenges and Opportunities in Agile Development in
                 Safety Critical Systems: a Survey",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "30--31",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this paper we describe the results of a recent
                 practitioner survey designed to elicit the opinions as
                 to the challenges and opportunities posed by the
                 application of agile development methods in the field
                 of safety critical systems development. In particular,
                 the survey explored the relationship between three key
                 activities in safety engineering and an agile approach
                 --- namely, safety requirements development, hazard
                 analysis, and safety case development. The results of
                 this survey are presented together with brief
                 discussion of the implications for integration.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hanssen:2016:PWA,
  author =       "Geir K. Hanssen and Thor Myklebust and Tor
                 St{\aa}lhane",
  title =        "Proceedings on the {1st Workshop on Agile Methods
                 Applied to Development and Certification of
                 Safety-critical Software}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "32--33",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The first international workshop on agile methods
                 applied to development and certification of
                 safety-critical software (ASCS) was organized as part
                 of the XP 2015 conference on May 25th 2015. The
                 workshop gathered 17 experts from industry and academia
                 to share recent industrial experience and research on
                 applications of agile methods in the safety critical
                 software domain. The workshop was organized as a series
                 of talks and discussions to share experience and ideas.
                 The workshop audience also provided guidelines for
                 future research needed to advance the field.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Torre:2016:IWU,
  author =       "Damiano Torre and Yvan Labiche and Marcela Genero and
                 Maged Elaasar and Tuhin Kanti Das and Bernhard Hoisl
                 and Matthias Kowal",
  title =        "{1st International Workshop on UML Consistency Rules
                 (WUCOR 2015)}: Post workshop report",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "34--37",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Unified Modeling Language (UML), with its 14
                 different diagram types, is the de-facto standard
                 modeling language for object-oriented software modeling
                 and documentation. Since the various UML diagrams
                 describe different views of one, and only one, software
                 system under development, they strongly depend on each
                 other in many ways. In other words, the UML diagrams
                 describing a software system must be consistent.
                 Inconsistencies among these diagrams may be a source of
                 faults during software development and analysis. It is
                 therefore paramount that these inconsistencies be
                 detected, analyzed and --- hopefully --- fixed. The
                 goal of this workshop was to gather input and feedbacks
                 on UML consistency rules from the community. This
                 workshop provided an opportunity for researchers who
                 have been working in the area of UML consistency to
                 interact with each other at a highly interactive venue,
                 improve the body of knowledge on UML consistency rules
                 and discuss ideas for further research in this area.
                 This report summarizes details of the workshop and the
                 results obtained that day.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Avgeriou:2016:TDB,
  author =       "Paris Avgeriou and Neil A. Ernst and Robert L. Nord
                 and Philippe Kruchten",
  title =        "Technical Debt: Broadening Perspectives Report on the
                 {Seventh Workshop on Managing Technical Debt (MTD
                 2015)}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "2",
  pages =        "38--41",
  month =        mar,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2894784.2894800",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:43 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Increasingly software engineers use the metaphor of
                 technical debt to communicate issues related to the
                 growing cost of change. In this article, we report on
                 the Seventh Workshop on Managing Technical Debt (MTD
                 2015), held in Bremen, Germany, on October 2, 2015,
                 collocated with the International Conference on
                 Software Maintenance and Evolution (ICSME). The 30
                 workshop participants from industry and academia
                 engaged in lively discussions, which helped clarify
                 issues, refine questions, and promote common
                 understanding about technical debt in software.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Brooks:2016:CST,
  author =       "Andrew Brooks and Laura Krebs and Brandon Paulsen",
  title =        "A Comparison of Sorting Times between {Java 8} and
                 {Parallel Colt}: an Exploratory Experiment",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2967307.2967316",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "An exploratory experiment found that sorting arrays of
                 random integers using Java 8's parallel sort required
                 only 50\%-70\% of the time taken using the parallel
                 sort of the Parallel Colt library. Factors considered
                 responsible for the performance advantage include the
                 use of a dual-pivot quicksort on locally held data at
                 certain phases of execution and work-stealing by
                 threads, a feature of the fork--join framework. The
                 default performance of Parallel Colt's parallel sort
                 was found to degrade dramatically for small array sizes
                 due to unnecessary thread creation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Honig:2016:LAS,
  author =       "William L. Honig and Natsuko Noda and Shingo Takada",
  title =        "Lack of Attention to Singular (or Atomic) Requirements
                 Despite Benefits for Quality, Metrics and Management",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "4",
  pages =        "1--5",
  month =        jul,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2967307.2967315",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "There are seemingly many advantages to being able to
                 identify, document, test, and trace single or
                 ``atomic'' requirements. Why then has there been little
                 attention to the topic and no widely used definition or
                 process on how to define atomic requirements?
                 Definitions of requirements and standards focus on user
                 needs, system capabilities or functions; some
                 definitions include making individual requirements
                 singular or without the use of conjunctions. In a few
                 cases there has been a description of atomic system
                 events or requirements. This work is surveyed here
                 although there is no well accepted and used best
                 practice for generating atomic requirements. Due to
                 their importance in software engineering, quality and
                 metrics for requirements have received considerable
                 attention. In the seminal paper on software
                 requirements quality, Davis et al. proposed specific
                 metrics including the ``unambiguous quality factor''
                 and the ``verifiable quality factor''; these and other
                 metrics work best with a clearly enumerable list of
                 single requirements. Atomic requirements are defined
                 here as a natural language statement that completely
                 describes a single system function, feature, need, or
                 capability, including all information, details, limits,
                 and characteristics. A typical user login screen is
                 used as an example of an atomic requirement which can
                 include both functional and nonfunctional requirements.
                 Individual atomic requirements are supported by a
                 system glossary, references to applicable industry
                 standards, mock ups of the user interface, etc. One way
                 to identify such atomic requirements is from use case
                 or system event analysis. This definition of atomic
                 requirements is still a work in progress and offered to
                 prompt discussion. Atomic requirements allow clear
                 naming or numbering of requirements for traceability,
                 change management, and importance ranking. Further,
                 atomic requirements defined in this manner are suitable
                 for rapid implementation approaches (implementing one
                 requirement at a time), enable good test planning
                 (testing can clearly indicate pass or fail of the whole
                 requirement), and offer other management advantages in
                 project control.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Osterweil:2016:PEM,
  author =       "Leon J. Osterweil",
  title =        "Preview: Ethical and Moral Issues for Software
                 Engineers",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "4",
  pages =        "5--5",
  month =        jul,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2967307.2967311",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2016:Pc,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "4",
  pages =        "6--7",
  month =        jul,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2967307.2967312",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Xie:2016:OTO,
  author =       "Tao Xie",
  title =        "Outward Thinking for Our Research Community",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "4",
  pages =        "7--8",
  month =        jul,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2967307.2967313",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2016:SNSc,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "4",
  pages =        "9--17",
  month =        jul,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2967307.2967314",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2016:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "4",
  pages =        "18--24",
  month =        jul,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2967307.2967310",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mishra:2016:ISD,
  author =       "Alok Mishra and J{\"u}rgen M{\"u}nch and Deepti
                 Mishra",
  title =        "Information Systems in Distributed Environments 2015",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "4",
  pages =        "25--26",
  month =        jul,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2967307.2967317",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:45 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a report from a one-day sixth international
                 workshop on ``Information Systems in Distributed
                 Environments'' (ISDE), which was organized in
                 conjunction with the OnTheMove Federated Conferences \&
                 Workshops (OTM 2015) October 26-30, 2015, Rhodes,
                 Greece. The main focus of this event was to provide a
                 venue for the discussion of challenges related to the
                 development, operation, and maintenance of distributed
                 information systems, and their creation in the context
                 of global development projects. Further dissemination
                 of research results will lead to an improvement of
                 distributed information system development and
                 deployment across the globe.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Osterweil:2016:P,
  author =       "Leon J. Osterweil",
  title =        "Be Prepared",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "5",
  pages =        "4--5",
  month =        sep,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2994205.2994210",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2016:Pd,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "5",
  pages =        "6--5",
  month =        sep,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2994205.2994211",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2016:SSS,
  author =       "Robert Schaefer",
  title =        "Science, Society, and Software Engineering. {Part 2}:
                 If science is outlawed, will only outlaws do science?",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "5",
  pages =        "7--8",
  month =        sep,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2994205.2994212",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Elbaum:2016:SI,
  author =       "Sebastian Elbaum",
  title =        "The State of {ICSE}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "5",
  pages =        "9--10",
  month =        sep,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2994205.2994213",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2016:SNSd,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "5",
  pages =        "11--18",
  month =        sep,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2994205.2994209",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2016:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "5",
  pages =        "19--26",
  month =        sep,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2994205.2994208",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kuhrmann:2016:SIC,
  author =       "Marco Kuhrmann and Rory V. O'Connor and Dewayne E.
                 Perry and David Raffo",
  title =        "Summary of the {International Conference on Software
                 and System Processes (ICSSP 2016)}: [Co-located with
                 {ICSE 2016}]",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "5",
  pages =        "27--30",
  month =        sep,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2994205.2994215",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Conference on Software and Systems
                 Process (ICSSP), continuing the success of Software
                 Process Workshop (SPW), the Software Process Modeling
                 and Simulation Workshop (ProSim) and the International
                 Conference on Software Process (ICSP) conference
                 series, has become the established premier event in the
                 field of software and systems engineering processes. It
                 provides a leading forum for the exchange of research
                 outcomes and industrial best-practices in process
                 development from software and systems disciplines.
                 ICSSP 2016 was held in Austin, Texas, from 14-15 May
                 2016, co-located with the 38th International Conference
                 on Software Engineering (ICSE). The theme of mICSSP
                 2016 was studying ``Process(es) in Action'' by
                 recognizing that the AS-Planned and AS-Practiced
                 processes can be quite different in many ways including
                 their ows, their complexity and the evolving needs of
                 stakeholders. Papers presented at ICSSP discussed this
                 issue addressing different domains, providing concepts,
                 evidence, and experiences.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2016:NYS,
  author =       "Richa Sharma and Ashish Sureka",
  title =        "A Nine Year Story of the {India} Software Engineering
                 Conference from 2008 to 2016",
  journal =      j-SIGSOFT,
  volume =       "41",
  number =       "5",
  pages =        "31--44",
  month =        sep,
  year =         "2016",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/2994205.2994214",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:46 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The India Software Engineering Conference (ISEC) is an
                 annual conference in the field of Software Engineering
                 (SE) in India. ISEC started in the year 2008 and
                 completed 9 years in 2016. The ISEC conference has
                 evolved into a high-quality academic event for SE
                 researchers from universities and industry in India
                 with considerable international participation.
                 Assessment and evaluation of ISEC conference quality,
                 status and evolution is important for the national SE
                 scientific community, ISEC steering committee, sponsors
                 and science and technology-related government bodies.
                 In this paper, we conduct scientific paper publication
                 mining and scientometric and bibliometric analysis of 9
                 years of ISEC publications and programs. We conduct an
                 in-depth multi-dimensional analysis of the conference
                 across various aspects such as a summary of 9 years of
                 ISEC programs (paper submission data, tutorials,
                 workshops, keynotes, invited talks, geographical
                 location, program and general chairs),
                 author-affiliation-based geographical contribution
                 (analysis at the international and national levels),
                 topic analysis, university and industry collaborations,
                 contributions across university types in India,
                 prolific and new authors, gender equality and
                 imbalance, program committee characteristics,
                 open-source or closed-source datasets and
                 citation-based impact. We also present our
                 recommendations for future editions of the ISEC based
                 on our comprehensive analysis study presented in this
                 paper.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sahu:2017:CDS,
  author =       "Madhusmita Sahu and Durga Prasad Mohapatra",
  title =        "Computing Dynamic Slices of Feature--Oriented Programs
                 Using Execution Trace File",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "2",
  pages =        "1--16",
  month =        apr,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3089649.3089657",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Feature-Oriented Programming (FOP) is a general
                 paradigm for synthesizing programs in software product
                 lines. A family of software systems constitutes a
                 software product line (SPL). The unique characteristics
                 of feature-oriented programs such as mixin layers,
                 refinements of classes, refinements of constructors,
                 constants, refinements, etc. pose special difficulties
                 in the slicing of these programs. This paper proposes a
                 dynamic slicing algorithm for feature-oriented
                 programs. The algorithm is named Execution Trace File
                 Based Feature-Oriented Dynamic Slicing (ETBFODS)
                 algorithm. The ETBFODS algorithm uses a dependence
                 based representation called Dynamic Feature Composition
                 Dependence Graph (DFCDG) and an execution trace file to
                 store execution history of the program for a given
                 input. The dynamic slice is computed by traversing the
                 DFCDG in breadth--first or depth-first wise and then
                 mapping the resultant traversed vertices to the program
                 statements.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Elbaum:2017:SI,
  author =       "Sebastian Elbaum",
  title =        "The State of {ICSE}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "2",
  pages =        "4--5",
  month =        apr,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3089649.3089651",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2017:Pa,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "2",
  pages =        "5--6",
  month =        apr,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3089649.3089652",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2017:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "2",
  pages =        "7--14",
  month =        apr,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3089649.3089653",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Duarte:2017:IWC,
  author =       "Carlos Henrique C. Duarte and Andreas Jedlitschka and
                 Ayse Bener",
  title =        "{4th International Workshop on Conducting Empirical
                 Studies in Industry (CESI 2016)}: Post-workshop
                 Report",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "2",
  pages =        "15--18",
  month =        apr,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3089649.3089655",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Few would deny today the importance of empirical
                 studies in the field of Software Engineering. An
                 increasing number of studies are being conducted
                 involving the software industry, but, while literature
                 abounds on idealistic empirical procedures, relatively
                 little is known about the dynamics and complexity of
                 conducting empirical studies in the software industry.
                 How research results are put into action in industrial
                 settings and how much cross company learning takes
                 place through replication of empirical studies in
                 different contexts? What are the impediments when
                 attempting to follow prescriptive procedures in the
                 organizational setting and how to best handle them?
                 These drivers underlie the organization of the fourth
                 in a series of workshops, CESI 2016, held on 17th May,
                 2016 at ICSE 2016. This report summarizes the workshop
                 details and the proceedings of the day.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bures:2017:SES,
  author =       "Tomas Bures and Danny Weyns and Bradley Schmer and
                 Eduardo Tovar and Eric Boden and Thomas Gabor and Ilias
                 Gerostathopoulos and Pragya Gupta and Eunsuk Kang and
                 Alessia Knauss and Pankesh Patel and Awais Rashid and
                 Ivan Ruchkin and Roykrong Sukkerd and Christos
                 Tsigkanos",
  title =        "Software Engineering for Smart Cyber-Physical Systems:
                 Challenges and Promising Solutions",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "2",
  pages =        "19--24",
  month =        apr,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3089649.3089656",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Smart Cyber--Physical Systems (sCPS) are modern CPS
                 systems that are engineered to seamlessly integrate a
                 large number of computation and physical components;
                 they need to control entities in their environment in a
                 smart and collective way to achieve a high degree of
                 effectiveness and efficiency. At the same time, these
                 systems are supposed to be safe and secure, deal with
                 environment dynamicity and uncertainty, cope with
                 external threats, and optimize their behavior to
                 achieve the best possible outcome. This ``smartness''
                 typically stems from highly cooperative behavior,
                 self-awareness, self-adaptation, and self-optimization.
                 Most of the ``smartness'' is implemented in software,
                 which makes the software one of the most complex and
                 most critical constituents of sCPS. As the specifics of
                 sCPS render traditional software engineering approaches
                 not directly applicable, new and innovative approaches
                 to software engineering of sCPS need to be sought. This
                 paper reports on the results of the Second
                 International Workshop on Software Engineering for
                 Smart Cyber--Physical Systems (SEsCPS 2016), which
                 specifically focuses on challenges and promising
                 solutions in the area of software engineering for
                 sCPS.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Liu:2017:PMB,
  author =       "Pan Liu and Jun Ai and Zhenning (Jimmy) Xu",
  title =        "Probability Model-Based Test Suite Reduction",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "1--6",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127371",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The paper presents a test suite reduction approach
                 based on probability models in regression testing.
                 First, we model the process of software testing by
                 using the joint probability of both test cases and
                 program faults, and propose two probability models for
                 the software's old and new versions, respectively.
                 Then, a theorem combining set operations and
                 probability models is given to implement our approach.
                 Different from the traditional coverage-based test
                 suite reduction methods, the reduced test suite
                 constructed by our approach does not need to cover all
                 test requirements, but also remains the same fault
                 detection capability of the original test suite. The
                 paper presents a test suite reduction approach based on
                 probability models in regression testing. First, we
                 model the process of software testing by using the
                 joint probability of both test cases and program
                 faults, and propose two probability models for the
                 software's old and new versions, respectively. Then, a
                 theorem combining set operations and probability models
                 is given to implement our approach. Different from the
                 traditional coverage-based test suite reduction
                 methods, the reduced test suite constructed by our
                 approach does not need to cover all test requirements,
                 but also remains the same fault detection capability of
                 the original test suite.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2017:BSA,
  author =       "Lov Kumar and Ranjan Kumar Behera and Santanu Rath and
                 Ashish Sureka",
  title =        "A Bibliometric Study of {ACM SIGSOFT} Software
                 Engineering Notes from 2007 to 2016",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "1--7",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127369",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Bibliometric analysis is a commonly used technique to
                 analyze scholarly publications to extract useful
                 insights about research and scientific papers which can
                 then be used for decision making by policy makers and
                 administrators. Bibliometric analysis helps in
                 understanding various aspects of scientific knowledge
                 creation and dissemination such as author and institute
                 productivity, impact of articles in terms of citations,
                 university and industry collaboration, geographical
                 contributions and ethnic and gender minority in
                 authorship. ACM SIGSOFT Software Engineering Notes
                 (SEN) is a non-refereed but a reputed and edited
                 publication for informal writings and reports about
                 Software Engineering (SE). ACM SIGSOFT SEN publishes
                 various types of submissions such as paper, report,
                 column, announcement and book review. These submissions
                 are published in the ACM Digital Library (DL). We
                 conduct a bibliometric analysis of articles published
                 in ACM SIGSOFT SEN during a ten year period from 2007
                 to 2016. Our objective is to provide a historical
                 overview (one decade) of ACM SIGSOFT SEN and reflect on
                 the past so that the ACM SIGSOFT community and
                 contributors can assess the strengths and shortcomings
                 of the SEN. We believe that the bibliometric analysis
                 presented in this paper can provide insights on the
                 extent to which the SEN is meeting its desired
                 objectives.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Rathee:2017:ROO,
  author =       "Amit Rathee and Jitender Kumar Chhabra",
  title =        "Restructuring of Object-Oriented Software Through
                 Cohesion Improvement Using Frequent Usage Patterns",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "1--8",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127370",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Due to wide adoption of object-oriented programming in
                 software development, there is always a requirement to
                 produce well-designed software systems, so that the
                 overall software maintenance cost is reduced and
                 reusability of the component is increased. But, due to
                 prolonged maintenance activities, the internal
                 structure of software system deteriorates. In this
                 situation, restructuring is a widely used solution to
                 improve the overall internal structure of the system
                 without changing its external behavior. As, it is known
                 that, one technique to perform restructuring is to use
                 refactoring on the existing source code to alter its
                 internal structure without modifying its external
                 functionality. However, the refactoring solely depends
                 on our ability to identify various code smells present
                 in the system. Refactoring aims at improving cohesion
                 and reducing coupling in the software system. So, in
                 this paper, a restructuring approach based on
                 refactoring is proposed through improvement in
                 cohesion. This paper focuses on improving the cohesion
                 of different classes of object-oriented software using
                 a newly proposed similarity metric based on Frequent
                 Usage Patterns (FUP). The proposed similarity metric
                 measure the relatedness among member functions of the
                 classes. The metric makes use of FUPs used by member
                 functions. The FUP consists of unordered sequences of
                 member variables accessed by member function in
                 performing its task. The usage pattern includes both
                 direct and indirect usages based on sub-function calls
                 within a member function. Based on the values of the
                 similarity metric, we performed hierarchical
                 agglomerative clustering using complete linkage
                 strategy to cluster member functions. Finally, based on
                 the clusters obtained, the source code of the software
                 is refactored using proposed refactoring algorithm. The
                 applicability of our proposed approach is tested using
                 two java projects related to different domains of real
                 life. The result obtained encourages the applicability
                 of proposed approach in the restructuring of a software
                 system.patterns, refactoring, hierarchical clustering,
                 maintainability. usage patterns, refactoring,
                 hierarchical clustering, maintainability.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Monteiro:2017:BTM,
  author =       "Felipe R. Monteiro and Francisco A. P. Janu{\'a}rio
                 and Lucas C. Cordeiro and Eddie B. de Lima Filho",
  title =        "{BMCLua}: a Translator for Model Checking {Lua}
                 Programs",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "1--10",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127367",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Lua is a programming language designed as scripting
                 language, which is fast, lightweight, and suitable for
                 embedded applications. Due to its features, Lua is
                 widely used in the development of games and interactive
                 applications for digital TV. However, during the
                 development phase of such applications, some errors may
                 be introduced, such as deadlock, arithmetic overflow,
                 and division by zero. This paper describes a novel
                 verification approach for software written in Lua,
                 using as backend the Efficient SMTBased Context-Bounded
                 Model Checker (ESBMC). Such an approach, called bounded
                 model checking --- Lua (BMCLua), consists in
                 translating Lua programs into ANSI-C source code, which
                 is then verified with ESBMC. Experimental results show
                 that the proposed verification methodology is effective
                 and efficient, when verifying safety properties in Lua
                 programs. The performed experiments have shown that
                 BMCLua produces an ANSI-C code that is more efficient
                 for verification, when compared with other existing
                 approaches. To the best of our knowledge, this work is
                 the first that applies bounded model checking to the
                 verification of Lua programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumar:2017:TLC,
  author =       "Lov Kumar and Ranjan Kumar Behera and Santanu Rath and
                 Ashish Sureka",
  title =        "Transfer Learning for Cross-Project Change-Proneness
                 Prediction in Object-Oriented Software Systems: a
                 Feasibility Analysis",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "1--11",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127368",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Change-prone classes or modules are defined as regions
                 of the source code which are more likely to change as a
                 result of a software development of maintenance
                 activity. Automatic identification of change-prone
                 classes are useful for the software development team as
                 they can focus their testing efforts on areas within
                 the source code which are more likely to change.
                 Several machine learning techniques have been proposed
                 for predicting change-prone classes based on the
                 application of source code metrics as indicators.
                 However, most of the work has focused on within-project
                 training and model building. There are several real
                 word scenario in which sufficient training dataset is
                 not available for model building such as in the case of
                 a new project. Cross-project prediction is an approach
                 which consists of training a model from dataset
                 belonging to one project and testing it on dataset
                 belonging to a different project. Cross-project
                 change-proneness prediction is relatively unexplored.
                 We propose a machine learning based approach for
                 cross-project change-proneness prediction. We conduct
                 experiments on 10 open-source Eclipse plug-ins and
                 demonstrate the effectiveness of our approach. We frame
                 several research questions comparing the performance of
                 within project and cross project prediction and also
                 propose a Genetic Algorithm (GA) based approach for
                 identifying the best set of source code metrics. We
                 conclude that for within project experimental setting,
                 Random Forest (RF) technique results in the best
                 precision. In case of cross-project change-proneness
                 prediction, our analysis reveals that the NDTF ensemble
                 method performs higher than other individual
                 classifiers (such as decision tree and logistic
                 regression) and ensemble methods in the experimental
                 dataset. We conduct a comparison of within-project,
                 cross-project without GA and cross-project with GA and
                 our analysis reveals that cross-project with GA
                 performs best followed by within-project and then
                 cross-project without GA.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Banerjee:2017:RAF,
  author =       "Shreya Banerjee and Anirban Sarkar",
  title =        "A Requirements Analysis Framework for Development of
                 Service Oriented Systems",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "1--12",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127366",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In Service Oriented Systems (SOS), implementation of
                 business processes is accomplished through services in
                 distributed, loosely coupled manner based on business
                 process requirements of the users. Consequently,
                 importance of business process requirements analysis
                 for development of SOS is strongly highlighted in both
                 academia and industry. Usually, traditional
                 requirements engineering is competent enough to specify
                 and analysis business requirements for development of
                 software systems efficiently. However, Service Oriented
                 Requirement Engineering (SORE) emerging for SOS
                 development is differed from traditional requirement
                 engineering due to complex nature of services. Yet, a
                 serious gap is still exist between early and detailed
                 specification of business process requirements in SORE
                 and further mapping towards design of SOS from set of
                 business processes. To address this issue, in this
                 paper, a requirements analysis framework is proposed
                 for development of SOS systems. The contribution of the
                 proposed work is formal representation of business
                 process requirements for SOS based on business scenario
                 and Cause-Effect-Dependency (CED) graph in dimensions
                 of six aspects of services --- What, Why, How, Who,
                 When and Where (5W1H). Both early and detailed level
                 requirements analysis in the context of SORE is
                 facilitated by the proposed approach. Beside,
                 traceability of proposed approach towards design of
                 business processes for development of SOS is also
                 exhibited in this paper. Moreover, the practical
                 utility of the proposed approach is demonstrated using
                 a suitable case study.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Osterweil:2017:R,
  author =       "Leon J. Osterweil",
  title =        "Be Responsible",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "5--8",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127361",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2017:Pb,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "9--9",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127362",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2017:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "10--17",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127363",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fontana:2017:TDA,
  author =       "Francesca Arcelli Fontana and Alexander Chatzigeorgiou
                 and Wolfgang Trumler and Clemente Izurieta and Paris
                 Avgeriou and Robert L. Nord",
  title =        "Technical Debt in Agile Development: Report on the
                 {Ninth Workshop on Managing Technical Debt (MTD
                 2017)}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "18--21",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127372",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We report on the Ninth International Workshop on
                 Managing Technical Debt, collocated with the 18th
                 International Conference on Agile Software Development
                 (XP 2017) in Cologne. The technical debt research
                 community continues to expand through collaborations of
                 industry, tool vendors, and academia. The theme of this
                 year's workshop was on technical debt in agile
                 development. Presentations and discussion centered on
                 the topics: technical debt at the code level,
                 architectural technical debt assessment, agile
                 approaches and their impact on technical debt
                 management, and selling the business case of technical
                 debt management.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gleirscher:2017:SCA,
  author =       "Mario Gleirscher and Stefan Kugele and Jonathan
                 Sprinkle",
  title =        "Safe Control of Autonomous \& Connected Vehicles
                 {(SCAV'17)}: Report from the {1st International
                 Workshop at CPSWeek 2017}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "22--23",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127373",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this report, we summarize topics, challenges, and
                 research questions discussed in the workshop
                 contributions and during the sessions of our workshop.
                 This summary has the purpose of leveraging the transfer
                 of our findings into future activities of the automatic
                 vehicle control (AVC) community.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Galster:2017:TUS,
  author =       "Matthias Galster and Damian A. Tamburri and Rick
                 Kazman",
  title =        "Towards Understanding the Social and Organizational
                 Dimensions of Software Architecting",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "3",
  pages =        "24--25",
  month =        jul,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3127360.3127374",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:47 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software architecting is about making decisions that
                 have system-wide impact and that shape software product
                 and process alike. While researchers and practitioners
                 have tried to define and scope the role of the
                 architecture, social and organizational impacts on the
                 architect and the architecting process are often
                 neglected. These impacts were the topics of the First
                 International Workshop on the Social and Organizational
                 Dimensions of Software Architecting. This report
                 summarizes the workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dabaghchian:2017:CAS,
  author =       "Maryam Dabaghchian and Zvonimir Rakamaric and Burcu K.
                 Ozkan and Erdal Mutlu and Serdar Tasiran",
  title =        "Consistency-Aware Scheduling for Weakly Consistent
                 Programs",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--5",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149493",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Modern geo-replicated data stores provide high
                 availability by relaxing the underlying consistency
                 requirements. Programs layered over such data stores
                 are called weakly consistent programs. Due to the
                 reduced consistency requirements, they exhibit highly
                 nondeterministic behaviors, some of which might violate
                 program invariants. Therefore, implementing correct
                 weakly consistent programs and reasoning about them is
                 challenging. In this paper, we present a systematic
                 scheduling approach that is aware of the underlying
                 consistency model. Our approach dynamically explores
                 all possible program behaviors allowed by the used data
                 store consistency model, and it evaluates program
                 invariants during the exploration. We implement the
                 approach in a prototype model checker for Antidote,
                 which is a causally consistent key-value data store
                 with convergent conflict handling. We evaluate our tool
                 on several benchmarks. The results show that our
                 approach is e effective in detecting buggy behaviors in
                 weakly consistent programs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Milewicz:2017:SPM,
  author =       "Reed M. Milewicz and Simon Poulding",
  title =        "Scalable Parallel Model Checking via {Monte-Carlo}
                 Tree Search",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--5",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149495",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The future of model checking lies in parallel and
                 distributed computing, but parallel graph search
                 algorithms tailored to directed model checking remains
                 an underdeveloped area of research. In this work, we
                 examine the application of parallel Monte Carlo Tree
                 Search algorithms. We demonstrate how exploratory,
                 randomly sampled rollouts of the search space,
                 coordinated through a minimally communicating
                 work-sharing protocol, can enable us to push the
                 boundaries on the scope and scale of problems amenable
                 to serial search.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Noller:2017:SSE,
  author =       "Yannic Noller and Hoang Lam Nguyen and Minxing Tang
                 and Timo Kehrer",
  title =        "Shadow Symbolic Execution with {Java PathFinder}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--5",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149492",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Regression testing ensures that a software system when
                 it evolves still performs correctly and that the
                 changes introduce no unintended side-effects. However,
                 the creation of regression test cases that show
                 divergent behavior needs a lot of effort. A solution is
                 the idea of shadow symbolic execution, originally
                 implemented based on KLEE for programs written in C,
                 which takes a unified version of the old and the new
                 program and performs symbolic execution guided by
                 concrete values to explore the changed behavior. In
                 this work, we apply the idea of shadow symbolic
                 execution to Java programs and, hence, provide an
                 extension of the Java PathFinder (JPF) project to
                 perform shadow symbolic execution on Java bytecode. The
                 extension has been applied on several subjects from the
                 JPF test classes where it successfully generated test
                 inputs that expose divergences relevant for regression
                 testing.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sharma:2017:VCS,
  author =       "Vaibhav Sharma and Michael W. Whalen and Stephen
                 McCamant and Willem Visser",
  title =        "{Veritesting} Challenges in Symbolic Execution of
                 {Java}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--5",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149491",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Scaling symbolic execution to industrial-sized
                 programs is an important open research problem.
                 Veritesting is a promising technique that improves
                 scalability by combining the advantages of static
                 symbolic execution with those of dynamic symbolic
                 execution. The goal of veritesting is to reduce the
                 number of paths to explore in symbolic execution by
                 creating formulas describing regions of code using
                 disjunctive formulas. In previous work, veritesting was
                 applied to binary-level symbolic execution. Integrating
                 veritesting with Java bytecode presents unique
                 challenges: notably, incorporating non-local control
                 jumps caused by runtime polymorphism, exceptions,
                 native calls, and dynamic class loading. If these
                 language features are not accounted for, we hypothesize
                 that the static code regions described by veritesting
                 are often small and may not lead to substantial
                 reduction in paths. We examine this hypothesis by
                 running a Soot-based static analysis on six large
                 open-source projects used in the Defects4J collection.
                 We find that while veritesting can be applied in
                 thousands of regions, allowing static symbolic
                 execution involving non-local control jumps amplifies
                 the performance improvement obtained from veritesting.
                 We hope to use these insights to support efficient
                 veritesting in Symbolic PathFinder in the near future.
                 Toward this end, we brie y address some engineering
                 challenges to add veritesting into SPF.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wang:2017:JRJ,
  author =       "Kaiyuan Wang and Sarfraz Khurshid and Milos Gligoric",
  title =        "{JPR}: Replaying {JPF} Traces Using Standard {JVM}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--5",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149494",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/multithreading.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  abstract =     "Java PathFinder (JPF) is a backtrackable Java Virtual
                 Machine (JVM), which is implemented in Java and runs on
                 a standard JVM (e.g., Oracle HotSpot). Thus, a JPF
                 developer can use off-the-shelf Java debuggers (e.g.,
                 jdb) when debugging code that makes up JPF. JPF
                 explores all non-deterministic executions of a given
                 target program and monitors for property violations. To
                 facilitate debugging of the target program, JPF can
                 capture and replay the execution trace that leads to a
                 property violation. While the deterministic replay is
                 invaluable, the replay with JPF does not allow the
                 developer to attach an off-the-shelf Java debugger to
                 the target program (e.g., step through the application
                 code, set breakpoints, etc.). We present a technique,
                 dubbed JPR, to improve the debugging experience of the
                 JPF captured traces by migrating the JPF traces to a
                 new format that can be executed using the standard JVM.
                 JPR annotates each JPF trace, during the capture phase,
                 with extra data (e.g., instruction index, instruction
                 count, etc.); the annotated trace is then used to
                 instrument Java bytecode to enforce the same execution
                 trace on a standard JVM. JPR is compatible with various
                 optimizations, e.g., state matching and partial-order
                 reduction. We evaluated JPR on all multithreaded Java
                 programs in the official JPF distribution. Our results
                 show that JPR successfully replayed all JPF traces on
                 the standard JVM with reasonable overhead during both
                 recording and replaying.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sarkar:2017:HEI,
  author =       "Santonu Sarkar and Gargi Alavani",
  title =        "How Easy it is to Write Software for Heterogeneous
                 Systems?",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--7",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149511",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Every other personal computer today is provided with a
                 coprocessor making it a heterogeneous computing
                 environment. As the heterogeneous and high-performance
                 computing (HPC) infrastructure becomes a commodity, the
                 need to improve software development productivity to
                 build efficient parallel programs for this
                 infrastructure becomes all the more crucial. While the
                 mainstream software development methodology focuses on
                 modular design, reusability, ease of understanding and
                 so on, parallel program development emphasizes on
                 performance, optimal use of a hardware resource,
                 scalability, execution correctness, and portability
                 across multiple hardware platforms. In this paper, we
                 identify a few unique software development productivity
                 requirements for heterogeneous systems. These
                 requirements are concerned with design abstraction,
                 reusability, and design verification. While these
                 requirements are applicable for a conventional software
                 as well, their implications are far reaching in the
                 context of parallel programs. Here we discuss
                 significant efforts in building tools and frameworks to
                 (i) provide powerful abstraction over the hardware,
                 (ii) build software libraries for parallel hardware
                 access and (iii) implement verification mechanisms to
                 check the correctness of a program behavior in a
                 heterogeneous runtime environment. We also identify
                 several important gaps in the existing work that needs
                 to be addressed in order to make the current body of
                 work useful in practice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Theisen:2017:SER,
  author =       "Christopher Theisen and Marcel Dunaiski and Laurie
                 Williams and Willem Visser",
  title =        "Software Engineering Research at the {International
                 Conference on Software Engineering} in 2016",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--7",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149496",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "With the goal of helping software engineering
                 researchers understand how to improve their papers,
                 Mary Shaw presented ``Writing Good Software Engineering
                 Research Papers'' in 2003. Shaw analyzed the abstracts
                 of the papers submitted to the 2002 International
                 Conference of Software Engineering (ICSE) to determine
                 trends in research question type, contribution type,
                 and validation approach. We revisit Shaw's work to see
                 how the software engineering research community has
                 evolved since 2002. The goal of this paper is to aid
                 software engineering researchers in understanding
                 trends in research question design, research question
                 type, and validation approach by analyzing the
                 abstracts of the papers submitted to ICSE 2016. We
                 implemented Shaw's recommendation for replicating her
                 study through the use of multiple coders and the
                 calculation of inter-rater reliability and demonstrate
                 that her approach can be repeated. Our results indicate
                 that reviewers have increased expectations that papers
                 have solid evaluations of the research contribution.
                 Additionally, the 2016 results include at least 17\%
                 mining software repository (MSR) papers, a category of
                 papers not seen in 2002. The advent of MSR papers has
                 increased the use of generalization/characterization
                 research questions, the production of empirical report
                 contribution, and validation by evaluation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Satish:2017:TPA,
  author =       "Preeti Satish and Peri Nikhil and Krishnan
                 Rangarajan",
  title =        "A Test Prioritization Algorithm That Cares for
                 {``Don't Care''} Values and Higher Order Combinatorial
                 Coverage",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--9",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149510",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The efficiency of prioritization algorithms depends on
                 how early the faults are detected. In this paper, we
                 present a novel prioritization algorithm for
                 combinatorial testing. Our approach takes ACTS tool
                 generated test cases with ``don't care'' values as the
                 starting point and refines them for increased
                 effectiveness without increasing the number of test
                 cases. Our algorithm maximizes the number of higher
                 order combinations tested, by filling the ``don't
                 care'' values in the test suite effectively. It also
                 orders the test cases using a cost function that
                 includes higher order coverage, thereby achieving early
                 fault detection. The effectiveness of our algorithms is
                 demonstrated by performing a comparative evaluation
                 using the metric t way Rate of Fault Detection, on 2
                 real life case studies and numerous synthetic covering
                 arrays of different sizes. The results show that our
                 algorithms perform better in terms of covering higher
                 order pairs and also faster.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Vieira:2017:CPO,
  author =       "Ianegitz Vieira and Alexandre Alvaro",
  title =        "A Centralized Platform of Open Government Data as
                 Support to Applications in the Smart Cities Context",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "1--13",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149512",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Purpose --- This article aims to present the design,
                 implementation and validation of an Open Government
                 Data Platform. Design/methodology/approach --- The
                 development of the work took place in 4 steps: survey
                 of the state of the art of literature; design of the
                 open government data platform; implementation and
                 testing of the platform; and, finally, experimental
                 validation with a group of students of a Brazilian
                 university. Findings --- Through the validations of the
                 platform can be noted advantages with respect to the
                 productivity gain for the development of solutions, in
                 the context of Smart Cities, using the proposed
                 platform. Research limitations/implications --- The
                 experiment was developed in a controlled manner in the
                 context of a Brazilian university. In addition, there
                 is a need to capture more data from other town hall to
                 store on the platform. Originality/value --- The
                 centralized storage of open government data is a tool
                 that enables the decision-making of public managers as
                 well as the beginning of the transformation of the
                 present cities to a smart city.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2017:Pc,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "5--6",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149489",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mei:2017:RSE,
  author =       "Hong Mei",
  title =        "A Review of Software Engineering Research in {China}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "6--9",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149488",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2017:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "10--17",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149490",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kuhrmann:2017:SIW,
  author =       "Marco Kuhrmann and J{\"u}rgen M{\"u}nch and Paolo Tell
                 and Philipp Diebold",
  title =        "Summary of the {1st International Workshop on Hybrid
                 Development Approaches in Software Systems
                 Development}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "18--20",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149519",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The first international HELENA workshop was held
                 co-located with the 2017 International Conference on
                 Software and Systems Process (ICSSP). The goals of this
                 workshop were to bring the HELENA team together, foster
                 general networking, discuss the current state of the
                 project, and develop a roadmap towards future
                 activities. From the 84 researchers and practitioners
                 from 25 active countries, 25 participated in this
                 workshop. The overall status report shows that the
                 HELENA survey is increasingly gaining attention, and
                 more then 300 data points have been collected so far.
                 The team agreed on a number of topics for future
                 activities, e.g., organizational transformation,
                 adaptation and evolution, and development approaches
                 for safety-critical systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chechik:2017:RWM,
  author =       "Marsha Chechik and Davide {Di Ruscio}",
  title =        "Report from the {9th Workshop on Modelling in Software
                 Engineering (MiSE 2017)}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "21--24",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149520",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "MiSE 2017 was the 9th edition of the workshop on
                 Modelling in Software Engineering, held on 21-22 May
                 2017 as a satellite event of the 39th International
                 Conference on Software Engineering (ICSE 2917), Buenos
                 Aires, Argentina. The goal of this 2-day workshop was
                 to bring together researchers and practitioners in
                 order to exchange innovative technical ideas and
                 experiences related to modeling. The 9th edition of the
                 MiSE workshop provided a forum to discuss successful
                 applications of software-modeling techniques and to
                 gain insights into challenging modeling problems,
                 including uncertainty management, model heterogeneity,
                 model reuse and evolution, testing, and the adoption of
                 models in critical application domains like
                 self-adaptive and real-time systems.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mohalik:2017:WDA,
  author =       "Swarup Kumar Mohalik and Badrinath Ramamurthy and
                 Mahesh Babu Jayaraman and Meenakshi D'Souza",
  title =        "{Workshop on Developmental aspects of Intelligent
                 Adaptive Systems (DIAS)}: Co-located with {10th
                 Innovations in Software Engineering Conference (ISEC),
                 Jaipur, India}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "25--27",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149521",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "With the proliferation of the Internet of Things and
                 the associated trend of integration of software with
                 ``things'', it is predicted that the complexity of the
                 systems-of-future will be characterized not only by
                 scale and variety of devices and software but also by
                 the constant change of the system context due to the
                 mobility of devices and M2M interactions. Consequently,
                 the current paradigm of automation will be inadequate
                 for the management and operation of these systems. The
                 dominant approach to address this issue is to design
                 and develop autonomous systems that can adapt to the
                 changes in various levels and keep delivering the
                 expected functionality. Such systems need fundamentally
                 different architectures, components and methodologies
                 incorporating new paradigms such as machine learning
                 and intelligent decision making. In this workshop, we
                 attempt to discuss the in uence of these paradigms on
                 the development life cycle of adaptive software,
                 starting from requirements, design and architecture and
                 also their verification and validation.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Borg:2017:SIW,
  author =       "Markus Borg and Elizabeth Bjarnason and Michael
                 Unterkalmsteiner and Tingting Yu and Gregory Gay and
                 Michael Felderer",
  title =        "Summary of the {4th International Workshop on
                 Requirements Engineering and Testing (RET 2017)}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "28--31",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149522",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The RET (Requirements Engineering and Testing)
                 workshop series provides a meeting point for
                 researchers and practitioners from the two separate
                 fields of Requirements Engineering (RE) and Testing.
                 The long term aim is to build a community and a body of
                 knowledge within the intersection of RE and Testing,
                 i.e., RET. The 4th workshop was co-located with the
                 25th International Requirements Engineering Conference
                 (RE'17) in Lisbon, Portugal and attracted about 20
                 participants. In line with the previous workshop
                 instances, RET 2017 offered an interactive setting with
                 a keynote, an invited talk, paper presentations, and a
                 concluding hands-on exercise.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gotz:2017:RIW,
  author =       "Sebastian G{\"o}tz and Christian Piechnick and Andreas
                 Wortmann",
  title =        "Report on the {4th International Workshop on
                 Model-driven Robot Software Engineering (MORSE)}",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "32--34",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149523",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 4th edition of the international workshop on
                 model-driven robot software engineering (MORSE) was
                 held at the International Conference on Software
                 Technologies: Applications and Foundations (STAF). The
                 workshop took place in the city of Marburg, Germany, on
                 the 21st of July 2017. The focus of this year's edition
                 of the workshop was on scenario-based development and
                 interaction modeling. In this report, we first present
                 a synopsis of the workshop sessions before we highlight
                 concerns raised in workshop's interactive discussion.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Galster:2017:VCS,
  author =       "Matthias Galster and Danny Weyns and Michael Goedicke
                 and Uwe Zdun and J{\'a}come Cunha and Jaime
                 Chavarriaga",
  title =        "Variability and Complexity in Software Design: Towards
                 Quality through Modeling and Testing",
  journal =      j-SIGSOFT,
  volume =       "42",
  number =       "4",
  pages =        "35--37",
  month =        oct,
  year =         "2017",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3149485.3149524",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:48 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Today's software systems must accommodate a wide range
                 of usage and deployment scenarios. The increasing size
                 and heterogeneity of software-intensive systems,
                 dynamic and critical operating conditions, fast moving
                 and highly competitive markets, and increasingly
                 powerful and versatile hardware makes it more and more
                 difficult to handle the additional complexity in design
                 caused by variability. This paper reports results of
                 the Second International Workshop on Variability and
                 Complexity in Software Design. It also outlines
                 directions the field might move in the future.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Adriano:2019:MSF,
  author =       "Christian Adriano",
  title =        "Microtasking Software Failure Resolution: Early
                 Results",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "36--36",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310016",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Open source software development enabled distributed
                 teams of programmers to contribute to large software
                 systems that became standards in the operation of
                 government and business. Crowdsourcing went further by
                 enabling contributions in the form of small and
                 independent tasks. This allowed teams to scale from
                 dozens to hundreds of people. While crowdsourcing
                 established as industry practice in the areas of
                 software testing, it is challenging for source code
                 related tasks, e.g., software debugging. One of the
                 reasons is that the complex dependencies in the source
                 code can make many tasks difficult to partition and
                 sequence, and later aggregate their outcomes. I am
                 investigating these problems in the context of failure
                 resolution tasks. A failure resolution task consists of
                 inspecting the source code with the objective to
                 identify and explain the root-cause of a software
                 failure. My approach partitions code inspection into
                 questions that are automatically instantiated from
                 templates. I present here my research plan and the
                 early results of experiments on the efficacy,
                 efficiency, and scalability of my approach.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2018:Pa,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--2",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178336",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mukherjee:2018:PSI,
  author =       "Debashis Mukherjee and Dibyanshu Shekhar and Rajib
                 Mall",
  title =        "Proposal for A Structural Integration Test Coverage
                 Metric for Object-Oriented Programs",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178330",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Though a large number of test coverage metrics have
                 been proposed in the context of unit and system testing
                 of object oriented programs, structural coverage
                 metrics for integration testing have scarcely been
                 reported. In this context, we propose an integration
                 test coverage metric based on the coverage of the data
                 and control dependency edges of the JSysDG (Java System
                 Dependency Graph).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Yaman:2018:UIC,
  author =       "Sezin Gizem Yaman",
  title =        "User Involvement in Continuous Experimentation",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--4",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178322",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software product and service companies need
                 capabilities to evaluate their development decisions
                 and customer and user value. Continuous
                 experimentation, as an experiment-driven development
                 approach, may reduce such development risks by
                 iteratively testing product and service assumptions
                 that are critical to the success of the software.
                 Experiment-driven development is gaining increasing
                 attention by the practitioners, yet it is a novel
                 research area to be investigated. Involving users and
                 customers in the software development process and
                 understanding their needs and behaviors are essential
                 aspects when building successful software products and
                 services. Continuous experimentation approach in
                 software development comprises user involvement by its
                 nature, however, due to novelty of the concept, there
                 is no clear understanding of the user involvement
                 practices. My doctoral project aims to investigate how
                 software development organizations can involve the
                 users in continuous experimentation. The contributions
                 of the research are to (a) find out how involve users
                 in software companies that begin to adopt continuous
                 experimentation approach, (b) identify the barriers
                 hindering involving the users in the approach, and (c)
                 investigate what kinds of strategies have been used for
                 experimentation with different software product and
                 services.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Akbarinasaji:2018:PLB,
  author =       "Shirin Akbarinasaji",
  title =        "Prioritizing lingering bugs",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178326",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As the software projects become more complex, the
                 release decision is made without resolving all the bugs
                 in the issue tracking system. Accumulation of the bugs
                 in the bug repository is similar to financial
                 obligation as we borrow time and resources to engage in
                 another activity rather than resolving the bugs.
                 Deferring the bug in the next release may have some
                 consequences. Therefore, the decision whether to
                 resolve the bug in the current release or postponing it
                 to the next release is a crucial decision. In this
                 proposal, we study the deferred bugs (lingering bugs)
                 against the nondeferred bugs (regular bugs). Our aim is
                 to develop the predictive model which can predict
                 whether the bug would linger or not. Additionally, we
                 are interested in measuring of the lingering bug in
                 terms of principal (standard time it takes to x them)
                 and risk of liability (impact). We propose to use
                 reinforcement learning for prioritization of lingering
                 bugs with respect to their impact.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Arruda:2018:REC,
  author =       "Darlan Arruda",
  title =        "Requirements Engineering in the Context of Big Data
                 Applications",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178323",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Requirements Engineering (RE) plays an essential role
                 in the software engineering process, being considered
                 as one of the most critical phases of the software
                 development life-cycle. As we might expect, then, the
                 Requirements Engineering would play a similar role in
                 the context of Big Data applications. However,
                 practicing Requirements Engineering is a challenging
                 and complex task. It involves (i) stakeholders with
                 diverse backgrounds and levels of knowledge, (ii)
                 different application domains, (iii) it is expensive
                 and error-prone, (iii) it is important to be aligned
                 with business goals, to name a few. Because it involves
                 such complex activities, a lot has to be understood in
                 order to properly address Requirements Engineering.
                 Especially, when the technology domain (e.g., Big Data)
                 is not yet well explored. In this context, this paper
                 describes a research plan on Requirements Engineering
                 involving the development of Big Data applications. The
                 high-level goal is to investigate: (i) On the technical
                 front, the Requirements Engineering activities with
                 respect to the analysis and specification of Big Data
                 requirements and, (ii) on the management side, the
                 relationship between RE and Business Goals in the
                 development of Big Data Software applications.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Cartaxo:2018:SKT,
  author =       "Bruno Cartaxo",
  title =        "Supporting Knowledge Transfer From Secondary Studies
                 to Software Engineering Practice",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178325",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Researchers have been arguing that there is a lack of
                 connection between Secondary Studies (SSs) and Software
                 Engineering (SE) practice. The medical field has faced
                 the same problem, and recently introduced the concept
                 of briefings / summaries, and Rapid Reviews as
                 alternatives to transfer knowledge to practice. Goal:
                 The overarching goal of this research is to
                 investigate, propose, and evaluate strategies to
                 support researchers to transfer knowledge from SSs to
                 SE practice. Method: First, we investigated how SSs in
                 SE cover practitioners' issues reported in
                 StackExchange, a leading Question \& Answer platform.
                 Second, we generated Evidence Briefings based on those
                 SSs in order to propose a medium to transfer knowledge
                 to practice. Third, we are planning to conduct an
                 action research, with close collaboration with
                 practitioners, in order explore and evaluate the
                 applicability of Rapid Reviews in SE practice.
                 Preliminary Results: Among 424 practitioners' issues on
                 Stack Exchange, that were considered as related to a
                 set o selected SSs, the SSs could successfully cover
                 14.1\% (60) of them. Based on a qualitative techniques,
                 we identified 45 recurrent issues spread in many SE
                 topics. Additionally, both practitioners and
                 researchers positively evaluated the content and format
                 of 12 Evidence Briefings that we created based on SSs.
                 Conclusions: Our results until now corroborate with
                 claims that SSs lack connection with practice. On the
                 other side, the good reception of the Evidence
                 Briefings shows a possible route toward an effective
                 knowledge transfer from SSs to practice.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Dwivedi:2018:TAN,
  author =       "Ashish Kumar Dwivedi and Santanu Kumar Rath",
  title =        "Transformation of Alloy Notation into a Semantic
                 Notation",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178331",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Transformation of a model based on first-order logic
                 to a model that provides semantic notations is helpful
                 necessary during the analysis phase of any proposed
                 software. The semantic notations often guide the
                 designer to develop pseudocode correctly. This study
                 focuses on facilitation of transformation of one formal
                 model, i.e., Alloy into another, i.e., OWL. The
                 proposed approach extends the concept of existing
                 techniques i.e., UML2Alloy and TwoUse to transform
                 Alloy model into OWL. UML2Alloy transforms UML model
                 into Alloy model, whereas TwoUse approach bridges the
                 gap between UML model and OWL model. Alloy2OWL is based
                 on metamodel-based transformation techniques, which
                 help to map source model, i.e., Alloy into target
                 model, i.e., OWL. For the proper explanation of this
                 study, a model transformation framework is presented,
                 which can be applied to other transformation languages.
                 The proposed approach utilizes the Model-Driven
                 Development techniques to deal with the analysis of
                 Alloy model and determines design problems within a
                 specification. In this paper, various challenges are
                 also presented which occur during the transformation of
                 Alloy to OWL.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Lee:2018:OTC,
  author =       "Amanda Lee",
  title =        "One-Time Contributors to {FLOSS}: Surveys and Data
                 Analysis",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178327",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Free/Libre Open Source Software (FLOSS) projects rely
                 on a steady influx of newcomer volunteer developers to
                 survive. As these projects, unlike traditional software
                 projects, often do not pay their contributors to work
                 on them, volunteers must be obtained instead. Once
                 obtained, a volunteer goes through a lengthy process in
                 order to join the project, including obtaining
                 sufficient knowledge of the codebase and learning the
                 rules of the community. However, some developers drop
                 out after they make a single commit to the code
                 database. These developers are knowledgeable enough to
                 commit code and make it through the onboarding process,
                 but leave the project rather than join, therefore
                 depriving the project of potential talent. We propose
                 to understand these One-Time code Contributors (OTCs)
                 through surveys and through data-mining the projects?
                 software repositories: if they are a unique
                 demographic, why they only commit once, if anything can
                 be done to assist them. Once they are determined as a
                 separate demographic, the study pivots to examine other
                 factors that might affect OTCs, including such factors
                 as project governance and project architecture.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2018:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178337",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Noorwali:2018:SCD,
  author =       "Ibtehal Noorwali",
  title =        "Stakeholder Concern-Driven Requirements Analytics",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178324",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The requirements engineering (RE) process and
                 resultant requirements usually inform and interact with
                 downstream (e.g., design and testing) and side-stream
                 (e.g., project management, quality management)
                 processes in various ways. Each of these processes
                 involves numerous internal stakeholders (e.g.,
                 managers, developers, architects, etc.) who, in turn,
                 have different concerns with regard to the impact of
                 requirements on their respective processes. In other
                 words, the various stakeholders need different types of
                 requirements information and measurements in order for
                 them to manage, control, and track their respective
                 process activities (e.g., design traceability
                 information for architects, requirements progress for
                 project managers, etc.). The burden of providing this
                 information usually falls within the realm of the
                 requirements management process. However, due to the
                 lack of identified metrics and analytical methods, the
                 process of providing the various stakeholders with the
                 information that addresses their various concerns
                 becomes cumbersome. This is further complicated by
                 large project sizes, numerous stakeholders, time
                 pressure, large numbers of requirements, other software
                 artifacts, and others. This proposal aims to address
                 this problem by proposing to provide stakeholders with
                 concern-driven requirements analytics that will address
                 their various concerns. We intend to achieve this
                 through identifying metrics and analytical methods that
                 can be readily used in the requirements management
                 process. We further propose to provide the stakeholder
                 with a dashboard that allows them to choose from the
                 various requirements analytics options along with
                 visualization techniques that would best visualize the
                 data and address their concerns.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Teixeira:2018:IQC,
  author =       "Eudis Teixeira",
  title =        "Improving the Quality of Controlled Experiments in
                 Software Engineering",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178321",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "All experimental studies are prone to risk with regard
                 to the validity of their results. After applying a
                 determined action to control a threat, during planning
                 or executing an experiment, new risks to the study
                 validity can arise. Aim. To improve the quality of
                 controlled experiments in Software Engineering (SE),
                 setting out strategies that permit researchers giving
                 priority to specific threats in causes virtue and
                 consequences (trade-offs), which exist between threats
                 to validity and possible measures for control. Method.
                 We will employ a knowledge base acquired through a
                 survey and a Systematic Literature Review to model an
                 approach for prioritizing and controlling threats to
                 validity. The proposed approach will also be evaluated
                 through experiments. Contribution. To improve the
                 control processes for threats to validity considered to
                 be critical, reducing efforts required by researchers,
                 thereby improving the quality of future controlled
                 experiments in the Software Engineering area by
                 increasing its results? validity.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wang:2018:HCW,
  author =       "Huaimin Wang",
  title =        "Harnessing the crowd wisdom for software
                 trustworthiness",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--6",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178328",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2018:PMF,
  author =       "Ritu Jain and Ugrasen Suman",
  title =        "A Project Management Framework for Global Software
                 Development",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "1",
  pages =        "1--10",
  month =        jan,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3178315.3178329",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:50 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Global software development (GSD) is a prevalent trend
                 which has fascinated most software companies. However,
                 the failure rate of GSD projects reveals the fact that
                 these types of projects are not an easy endeavor.
                 Management of GSD project is a domain where standards
                 are still lacking and companies are still struggling to
                 acquire a win-win situation. Project management body of
                 knowledge (PMBOK) provides a standard framework for
                 managing projects. However, the framework does not
                 consider the aspects of GSD. Thus, it can't be applied
                 directly for GSD projects. In this paper, we have
                 proposed a project management framework for GSD
                 projects. This framework assimilates the knowledge
                 areas of PMBOK with knowledge areas needed for
                 effective management of GSD. It would guide GSD project
                 manager about the aspects to be considered while
                 executing distributed projects. This framework would
                 also act as a baseline to researchers for further
                 investigation in GSD project management domain.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Osterweil:2018:G,
  author =       "Leon J. Osterweil",
  title =        "Be Gracious",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "4--6",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3203094.3203100",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2018:SSS,
  author =       "Robert Schaefer",
  title =        "Science, Society, and Software Engineering: {Part 3}
                 --- The Catch",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "4--6",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3041765.3041770",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2018:Pb,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "6--7",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3203094.3203101",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Osterweil:2018:YSD,
  author =       "Leon J. Osterweil",
  title =        "Your Software Dwells in the House of Tomorrow, Too",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "7--8",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3041765.3041769",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2018:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "8--11",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3203094.3203102",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2018:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "9--16",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3041765.3041771",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2018:ERW,
  author =       "Paramvir Singh and Sheikh Umar Farooq and Saurabh
                 Tiwari and Ashish Sureka",
  title =        "An Experience Report on {Workshop on Emerging Software
                 Engineering Education}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "12--23",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3203094.3203112",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Doernhoefer:2018:SNS,
  author =       "Mark Doernhoefer",
  title =        "Surfing the net for {{\booktitle{Software Engineering
                 Notes}}}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "17--25",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3041765.3041772",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gerard:2018:RIW,
  author =       "S{\'e}bastien G{\'e}rard and Dimitrios S. Kolovos and
                 Ivano Malavolta and Henry Muccini",
  title =        "Report from the {1st International Workshop on
                 Collaborative Modelling in MDE (COMMitMDE 2016)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "26--27",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3041765.3041773",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "COMMitMDE was the 1st international workshop on
                 Collaborative Modelling in MDE, held on the 4th of
                 October 2016 as a satellite event of the 19th
                 International Conference on Model Driven Engineering
                 Languages and Systems (MoDELS 2016), St. Malo, France.
                 The goal of the workshop was to bring together
                 researchers and practitioners in order to investigate
                 (i) the potential impact of collaborative software
                 engineering methods and principles into Model-Driven
                 Engineering (MDE) practices and (ii) how MDE methods
                 and techniques can support collaborative software
                 engineering activities. The 1st COMMitMDE workshop
                 provided a forum to discuss the state of research and
                 practice on collaborative MDE, to create new synergies
                 between tool vendors, researchers, and practitioners,
                 to inform the community about the new means for
                 collaborative MDE, and to reect on the needs and
                 research gaps in the collaborative MDE area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Izurieta:2018:TDR,
  author =       "Clemente Izurieta and Ipek Ozkaya and Carolyn Seaman
                 and Will Snipes",
  title =        "Technical Debt: a Research Roadmap Report on the
                 {Eighth Workshop on Managing Technical Debt (MTD
                 2016)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "28--31",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3041765.3041774",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We report here on the Eighth International Workshop on
                 Managing Technical Debt, collocated with the
                 International Conference on Software Maintenance and
                 Evolution (ICSME 2016). The technical debt research
                 community continues to expand through collaborations of
                 industry, tool vendors, and academia. The major themes
                 of discussion this year indicate convergence on a
                 common definition on technical debt and its elements
                 which drive the maturation of a research roadmap,
                 demonstrating that managing technical debt is a
                 mainstream topic in software engineering research
                 bringing empirical analysis, data science, software
                 design and architecture analysis and automation among
                 other challenges together.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Leite:2018:RIW,
  author =       "Julio C. S. P. Leite and Liping Zhao and Sylwia
                 Kopcz{\'n}ska and Sam Supakkul and Lawrence Chung",
  title =        "Report from the {6th International Workshop on
                 Requirements Patterns (RePa'16)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "2",
  pages =        "32--33",
  month =        apr,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3041765.3041775",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Aug 1 17:16:51 MDT 2018",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "RePa 2016 was part of the 24th IEEE International
                 Requirements Engineering Conference (RE'16) held in
                 Beijing. The all day program consisted in an
                 Introduction, a Keynote, Paper Presentations and
                 Discussion Sessions. All papers were presented and the
                 attendance was around 15 people.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2018:Pc,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "5--5",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229792",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Confucius'2 Analects is the oldest guide to applied
                 software engineering research and practice in
                 existence. You don't believe me? Fine. We'll use random
                 sampling to demonstrate. I have Ezra Pound's peculiar,
                 but engaging, translation to hand, and can write a
                 small program to generate five random samples easily,
                 since the Analects has twenty books, and each book has
                 approximately twenty ``items.'' I've sorted the
                 resulting samples for our convenience.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bu:2018:MBC,
  author =       "Lei Bu and Tian Zhang and Xin Chen and Linzhang Wang
                 and Jianhua Zhao and Xuandong Li",
  title =        "Model-based Construction and Verification of
                 Cyber-Physical Systems",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "6--10",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "By combining communication, computation, and control
                 (3C), Cyber-Physical Systems (CPS)0tightly couple the
                 physical world with the cyber-world, to enable more
                 applications, enhance performance, increase
                 dependability and etc. Among these goals, as CPS are
                 widely used in the safety-critical area, guaranteeing
                 the basic dependability/safety is after all the
                 prerequisite and often the top concern. However, the
                 behavior of CPS is extremely complex. First of all, due
                 to the existence of both discrete control modes
                 transition and continuous real-time behavior in CPS,
                 the behavior of CPS is a complex hybrid state space,
                 which is difficult to understand and handle. Secondly,
                 most CPS applications are working in the open
                 environment and acquiring real-time data from the
                 environment intensively to adjust their own behavior.
                 The dynamic environment makes the behavior space more
                 complex to reason. When a system is too complex to
                 analyze directly, building an abstract model of the
                 system and then conducting analysis on the model to
                 answer questions about the original system is an
                 important and widely-used method. Meanwhile, a
                 reasonable model also plays important roles in the
                 phase of specification, design, development, testing,
                 monitoring and so on. Therefore, it is an important
                 topic of investigating how model-based methods can be
                 applied in the context of CPS to increase the quality
                 and dependability of the system. During the past
                 decade, our research group at Nanjing University has
                 devoted a lot of efforts into this mission. We
                 conducted comprehensive research in a wide spectrum of
                 CPS including model-driven design, verification,
                 control, monitoring, and testing. In this paper, we
                 will make a general review of the progress we made on
                 these directions recently.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2018:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "11--16",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229791",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Benala:2018:SSD,
  author =       "Tirimula Rao Benala and Rajib Mall",
  title =        "{SEET}: Software Development Effort Estimation Using
                 Ensemble Techniques",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "17--17",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software development effort estimation (SDEE) is a
                 significant activity in project management and serves
                 as the basis for project bidding, planning, staffing,
                 resource allocation, scheduling, and cost estimation.
                 The accuracy of SDEE techniques varies from project to
                 project, which makes them rather unreliable. In this
                 backdrop, we propose a foundation centered
                 ensemble-based SDEE approach. The primary goal of this
                 approach is to design an ensemble consisting of
                 different machine learning methods for improving the
                 prediction accuracy of SDEE. In recent times, several
                 research results have been reported on machine learning
                 based ensemble design, but extreme learning machine
                 (ELM) and least square support vector regression
                 (LSSVR) have not been used to develop an ensemble. We
                 chose three machine learning techniques, namely ELM,
                 LSSVR, and multilayer perceptron (MLP) as the base
                 techniques to build an ensemble. We investigated the
                 performance of a homogeneous ensemble design using a
                 linear combination rule with standardized accuracy as a
                 weight factor. The performance of the ensemble model is
                 validated and compared with root mean square error
                 (RMSE) based weighted average ensemble model with
                 equivalent configuration. The experimental study was
                 conducted using publicly available PROMISE repository
                 test suite. We achieved promising results for SEET
                 model compared to base learners and RMSE ensemble
                 model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sitaraman:2018:STF,
  author =       "Murali Sitaraman and Bruce W. Weide",
  title =        "A Synopsis of Twenty Five Years of {RESOLVE PhD}
                 Research Efforts",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "17--17",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229794",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In 1994, ACM SIGSOFT Software Engineering Notes (SEN),
                 courtesy of Will Tracz, SEN Editor at the time,
                 published a 48-page special feature on RESOLVE: a
                 combined specification and programming language with a
                 design discipline to facilitate construction of
                 formally verified component-based software. In the
                 quarter-century since, several PhD dissertations from
                 members of the RESOLVE/Reusable Software Research Group
                 (RSRG) have explored a variety of topics in this area.
                 They range across fundamental software engineering and
                 formal methods research, practical adaptations,
                 software engineering education, and tool development.
                 This article summarizes key contributions of these
                 dissertations in a way that is accessible to
                 researchers and practitioners in software engineering.
                 The dissertations are summarized in chronological
                 order. Some of the paragraphs below are paraphrased or
                 taken nearly verbatim from abstracts of the works
                 themselves, with a few terminological updates and added
                 connections to current research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Welch:2018:FID,
  author =       "Daniel Welch",
  title =        "Formalization Integrated Development Environments: The
                 Current Landscape",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "17--17",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229795",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Development Environments (F-IDEs) for specification
                 and programming languages. Specifically we summarize
                 the toolchains for some well-known languages in this
                 category, and conclude with a summary of RESOLVESTUDIO,
                 an F-IDE for the RESOLVE language.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fowler:2018:BUP,
  author =       "Megan Fowler and Tim Schwab",
  title =        "{BeginToReason}: Understanding the Purpose of Code",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "18--18",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Computer science (CS) students often evaluate the
                 behavior of the code they write by running it on
                 specific inputs, studying the outputs, and then
                 inductively reasoning to a more general understanding
                 of the code. This is a good starting point in the
                 student's career, but successful graduates must be able
                 to reason deductively about the code they create and
                 encounter. They must be able to reason about the code
                 on all inputs, without running the code. This paper
                 describes an online system named ``BeginToReason'' that
                 is designed to introduce symbolic reasoning, and the
                 results of its use. Eighty students across six lab
                 sections completed a written assessment while working
                 with the BeginToReason System. The objective was to
                 observe student understanding of the purpose of
                 presented code both before and after completing a
                 lesson using the BeginToReason System. Keywords:
                 Symbolic reasoning, reasoning tool, online system,
                 verification engine",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kraemer:2018:RAC,
  author =       "Eileen Kraemer and Aubrey Lawson",
  title =        "Reasoning About Concurrency: Scenarios for
                 Activities",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "18--18",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In computing, concurrency refers to the notion that
                 different parts or units of a program or algorithm may
                 be executed out-of-order or in partial order, without
                 affecting the final outcome. Concurrency is
                 historically a difficult topic for students. When
                 confronted with non-deterministic systems, students are
                 challenged to refine their reasoning about sequence,
                 state, and what makes a program ``correct''. A number
                 of problems in concurrency have been posed in the form
                 of relatable examples, e.g. dining philosophers, an
                 ornamental garden, a single lane bridge. These
                 classical problems provide a ``real-world'' analogy
                 that can be used to motivate student engagement and
                 exploration. We explore the questions of whether the
                 RESOLVE framework could support the concepts and
                 operations needed to implement these classical
                 problems, what additional features in RESOLVE would be
                 required for specification and implementation and what
                 related student activities might be developed.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kraemer:2018:TDC,
  author =       "Eileen Kraemer",
  title =        "Teaching the Design-by-Contract Concept in a Software
                 Engineering Course Using {RESOLVE}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "18--18",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Design by contract (DBC) is a key concept in software
                 engineering. The RESOLVE language and environment
                 support the teaching and learning of DBC concepts.
                 However, students encounter obstacles in fully
                 achieving the desired educational outcomes. Some of
                 these obstacles are related to the complexity of the
                 content. Additional appropriate exercises can help to
                 address these obstacles. Other obstacles are related to
                 features of the environment and documentation. We
                 propose a variety of interventions to address these
                 obstacles, including potential revisions to the
                 environment, updates to the documentation, and the
                 creation of additional instructional materials.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Weide:2018:RCD,
  author =       "Alan Weide",
  title =        "Reasoning Challenges of Data Abstraction and Aliasing
                 in Concurrent Programs",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "18--18",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Substantial effort has been directed toward the
                 specification and verification of concurrent programs.
                 Separation logic is one such project and is considered
                 by many to be the state of the art int he field.
                 However, the shortcomings of separation logic in the
                 face of data abstraction cannot be overlooked. This
                 paper enumerates several variants of a concurrent
                 program for which separation logic cannot capture the
                 desired level of abstraction without compromising its
                 readability and usefulness",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sun:2018:RAR,
  author =       "Yu-Shan Sun",
  title =        "Reasoning About Reference Behavior with {RESOLVE}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "18--19",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229800",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "As an alternative to reasoning about references
                 explicitly and ACM SIGSOFT Software Engineering Notes
                 Page 18 July 2018 Volume 43 Number 3 routinely as
                 needed for Java-like programs, this paper summarizes
                 the RESOLVE approach in reasoning via reference-hiding
                 data abstractions for the majority of programs and only
                 reasoning about references when they are unavoidable.
                 Furthermore, this paper raises discussion topics for
                 reasoning about various implementation classifications
                 and to explore when there is a need to be concerned
                 about establishing the frame property",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Asim:2018:EDB,
  author =       "Saad F. Asim",
  title =        "An Exercise in Design: The Binary Decision Diagram",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "3",
  pages =        "19--19",
  month =        jul,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3229783.3229801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The Binary Decision Diagram (BDD), a data structure
                 used to efficiently represent Boolean formulas, enjoys
                 use in the field of software verification. However,
                 widely used implementations of the BDD are not
                 themselves verifiable. This paper summarizes the design
                 and implementation of a provably correct realization of
                 the BDD as detailed in the author's master's thesis.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2018:Pd,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "6--7",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282524",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Tom DeMarco and Timothy Lister's Peopleware:
                 Productive Projects and Teams (Third Edition) is a
                 fairly famous book. The first edition was published in
                 1987, and it has been widely read ever since. I
                 reviewed DeMarco and Lister's Waltzing with Bears in
                 this column before Peopleware precisely because some
                 people might not be aware of Waltzing, while I assumed
                 most people reading SEN would know of, and have read
                 Peopleware.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Glass:2018:ECH,
  author =       "Robert L. Glass and Frank Land",
  title =        "Errors in Computing History",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "7--8",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282521",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The history of computing in practice is barely 70
                 years old. The field of computing theory/academe is
                 barely 60 years old, if we start counting with the
                 advent of computer science and information systems
                 courses/degrees in the 1960s. Yet computing historians
                 have gotten a number of things dreadfully wrong in that
                 short period of time.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jin:2018:OMB,
  author =       "Zhi Jin",
  title =        "Open Models: Beyond the Open Source Software
                 Development",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "9--12",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282522",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Free/libre and open source software (FLOSS) originated
                 from ``hacker culture'' and struggled against software
                 privatization. The idea is that anyone is freely
                 licensed to use, copy, study, and change the software
                 in any way, and the source code is openly shared so
                 that people are encouraged to voluntarily improve the
                 design of the software. This is in contrast to
                 proprietary software, where the software is under
                 restrictive copyright licensing and the source code is
                 usually hidden from the users. To give the users such
                 freedom and control in their use of software, Richard
                 Stallman launched the GNU project (Stallman, 1983),
                 together with a manifesto stating that everyone will be
                 permitted to modify and redistribute GNU.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2018:RPe,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "13--20",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282523",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Edited by PGN (Risks Forum Moderator), with
                 contributions by others as indicated. Opinions are
                 individual rather than organizational, with usual
                 disclaimers implied. We address problems relating to
                 software, hardware, people, and other circumstances
                 relevant to computer systems. References (R i j) to the
                 online Risks Forum denote RISKS vol i number j. Cited
                 RISKS items generally identify contributors and
                 sources, together with URLs. Official RISKS archives
                 are available at www.risks.org, with nice html
                 formatting and search engine courtesy of Lindsay
                 Marshall at Newcastle:;
                 http://catless.ncl.ac.uk/Risks/i.j.html (also
                 ftp://www.sri.com/risks). CACM Inside Risks:
                 http://www.csl.sri.com/neumann/insiderisks.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fraser:2018:ACPa,
  author =       "Steven Fraser and Dennis Mancl",
  title =        "Agile Culture: a Panels Report from {XP 2017}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "21--23",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302395",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The culture of agile development practices and an
                 assessment of agile's ``success'' were the topics of
                 two XP2017 panel sessions. There were three primary
                 conclusions of these two panels. Agile has high brand
                 recognition in the software industry, but it isn't
                 always successfully implemented. In some cases, the
                 labels used to explain and promote agile practices can
                 get in the way of agile success. It was also recognized
                 that despite a negative perception, agile's reputation
                 as being a cult was more a reflection of a small, but
                 growing core of practitioners.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Raibulet:2018:RIWa,
  author =       "Claudia Raibulet and Mariagrazia Fugini and Khalil
                 Drira and Patrizio Pelliccione and Ilias
                 Gerostathopoulos and Christian Prehofer and Klaus
                 Moessner",
  title =        "Report of the {1st International Workshop on
                 Context-aware Autonomous and Smart Architectures
                 (CASA@ECSA 2017)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "24--27",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302396",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 2017 1st International Workshop on Context-aware,
                 Autonomous and Smart Architectures (CASA 2017) was held
                 in conjunction with the 11th European Conference on
                 Software Architecture (ECSA 2017), on September, 12th,
                 2017 in Canterbury, United Kingdom. The goal of this
                 one-day workshop was to bring together researchers and
                 practitioners from academic environment and from the
                 industry to share their solutions, ideas, visions, and
                 doubts in the design of software architectures for
                 context-aware, autonomous, and smart solutions. The
                 workshop focused on architectural aspects offering a
                 complementary vision of such solutions with respect to
                 the available application- and user-oriented
                 perspectives on context-awareness, autonomy, and
                 smartness. Furthermore, the workshop aimed to enable
                 discussions, partnerships, and collaborations among the
                 software engineers interested in these solutions.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Northrop:2018:DSSa,
  author =       "Linda Northrop and Ipek Ozkaya and George Fairbanks
                 and Michael Keeling",
  title =        "Designing the Software Systems of the Future",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "28--30",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302397",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We report here on the Future of Software
                 DesignWorkshop that was held on Jan 12-14, 2018 in
                 Pittsburgh, PA under the sponsorship of the Carnegie
                 Mellon University Software Engineering Institute. The
                 software industry is awash in modern trends that
                 involve artificial intelligence (AI), autonomy, data
                 everywhere, etc. These trends affect the structure of
                 software-intensive systems and their designs. The goal
                 of the workshop was to bring together participants from
                 diverse backgrounds to formulate ideas for software
                 design of future systems and related research
                 opportunities and challenges. In this report we
                 summarize the outcomes of the workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{vanderLinden:2018:ESWa,
  author =       "Dirk van der Linden and Awais Rashid",
  title =        "The Effect of Software Warranties on Cybersecurity",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "31--35",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302398",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This workshop focused on bringing software developers
                 and legal professionals together to understand the
                 shared challenges they face in promoting the
                 development of secure software on the one hand, and
                 software at all, on the other hand. This report
                 summarizes current scientific research on the topics
                 and challenges discussed in the workshop breakout
                 sessions. The insights from the workshop highlight a
                 number of interesting directions for further research
                 on the interplay between software warranties and
                 cybersecurity.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Borg:2018:SIWa,
  author =       "Markus Borg and Adnan Causevic and Serge Demeyer and
                 Sigrid Eldh",
  title =        "Summary of the {1st IEEE Workshop on the Next Level of
                 Test Automation (NEXTA 2018)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "36--38",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302399",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "NEXTA is a new workshop on test automation that
                 provides a meeting point for academic researchers and
                 industry practitioners. While test automation already
                 is an established practice in industry, the concept
                 needs to evolve to go beyond its current state to
                 support the ever faster release cycles of tomorrow's
                 software engineering. NEXTA implications for research
                 and practice will include test case generation,
                 automated test result analysis, test suite assessment
                 and maintenance, and infrastructure for the future of
                 test automation. The first instance of NEXTA was
                 co-located with the 11th IEEE Conference on Software
                 Testing, Verification and Validation (ICST 2018) in
                 V{\"a}ster{\aa}s, Sweden on April 9, 2018. NEXTA 2018
                 offered an interactive setting with a keynote and paper
                 presentations, stimulated by two novel awards to
                 incentivize interaction and dissemination: a Best
                 Questions Award and a Most Viral Tweet Award. The
                 workshop attracted 15 paper submissions and about 50
                 participants. Based on the positive feedback, we plan
                 to organize the workshop again next year.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fraser:2018:NSBa,
  author =       "Steven Fraser and Dennis Mancl",
  title =        "No Silver Bullet Reloaded: Report on {XP 2017} Panel
                 Session",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "39--41",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302400",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "At XP2017 in K{\~A}\P ln, a panel was convened to
                 discuss the classic 1987 IEEE Software paper by
                 Frederick P. Brooks, ``No Silver Bullet: Essence and
                 Accidents in Software Engineering.'' The ideas
                 presented in his paper have influenced several
                 generations of software developers. Brooks emphasized
                 the notions of essential complexity and accidental
                 complexity, and he offered suggestions for promising
                 approaches to software development. While his
                 approaches are linked to what we now recognize as
                 ``agile practices,'' panelists offered an implicit
                 caveat that they must be done with discipline to avoid
                 increased accidental complexity. Panelists also
                 observed that agile development itself is not a
                 ``silver bullet''.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bures:2018:SESa,
  author =       "Tomas Bures and Danny Weyns and Bradley Schmer and
                 John Fitzgerald",
  title =        "Software Engineering for Smart Cyber-Physical Systems:
                 Models, System-Environment Boundary, and Social
                 Aspects",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "42--44",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302401",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Smart Cyber-Physical Systems (sCPS) are a novel kind
                 of Cyber-Physical Systems engineered to take advantage
                 of large-scale cooperation between devices, users and
                 environment to achieve added value in face of
                 uncertainty and various situations in their
                 environment. Examples of sCPS include modern traffic
                 systems, Industry 4.0 systems, systems for
                 smart-buildings, smart energy grids, etc. The uniting
                 aspect of all these systems is that to achieve their
                 high-level of intelligence, adaptivity and ability to
                 optimize and learn, they heavily rely on software. This
                 makes them software-intensive systems, where software
                 becomes their most complex part. Engineering sCPS thus
                 becomes a recognized software engineering discipline,
                 which however, due to specifics of sCPS, can only
                 partially rely on the existing body of knowledge in
                 software engineering. In fact, it turns out that many
                 of the traditional approaches to architecture modeling
                 and software development fail to cope with the high
                 dynamicity and uncertainty of sCPS. This calls for
                 innovative approaches that jointly reflect and address
                 the specifics of such systems. This paper maps the
                 discussions and results of the Third International
                 Workshop on Software Engineering for Smart
                 Cyber-Physical Systems (SEsCPS 2017), which
                 specifically focuses on challenges and promising
                 solutions in the area of software engineering for
                 sCPS.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gleirscher:2018:SRIa,
  author =       "Mario Gleirscher and Stefan Kugele and Sven Linker",
  title =        "{SCAV'18}: Report of the {2nd International Workshop
                 on Safe Control of Autonomous Vehicles}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "45--47",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302402",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes the discussions, open issues,
                 take-away messages, and conclusions of the 2nd SCAV
                 workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kuhrmann:2018:SICa,
  author =       "Marco Kuhrmann and Rory V. O'Connor and Dan Houston
                 and Regina Hebig and David Raffo",
  title =        "Summary of the {International Conference on Software
                 and System Processes (ICSSP 2018)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "48--51",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282534",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Conference on Software and System
                 Processes (ICSSP), continuing the success of Software
                 Process Workshop (SPW), the Software Process Modeling
                 and Simulation Workshop (ProSim) and the International
                 Conference on Software Process (ICSP) conference
                 series, has become the established premier event in the
                 field of software and systems engineering processes. It
                 provides a leading forum for the exchange of research
                 outcomes and industrial best-practices in process
                 development from software and systems disciplines.
                 ICSSP 2018 was held in Gothenburg, Sweden, 26-27 May
                 2018, co-located with the 40th International Conference
                 on Software Engineering (ICSE). The theme of ICSSP 2018
                 was studying ``Demands on Processes, Processes on
                 Demand'' by recognizing the demands on processes that
                 include the need for both well-developed plans and
                 incremental deliveries (agile and hybrid processes),
                 utilization of increased automation (model-based
                 engineering and DevOps), higher degrees of customer
                 collaboration, comprehensive analysis of existing
                 products for reuse (open source and COTS), and
                 performance requirements of enterprise-level
                 architectures. Papers presented at ICSSP discussed
                 these issues across different domains, providing
                 concepts, evidence, and experiences.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fraser:2018:ACPb,
  author =       "Steven Fraser and Dennis Manci",
  title =        "Agile Culture: a Panels Report from {XP 2017}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "52--52",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282536",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The culture of agile development practices and an
                 assessment of agile's ``success'' were the topics of
                 two XP2017 panel sessions. There were three primary
                 conclusions of these two panels. Agile has high brand
                 recognition in the software industry, but it isn't
                 always successfully implemented. In some cases, the
                 labels used to explain and promote agile practices can
                 get in the way of agile success. It was also recognized
                 that despite a negative perception, agile's reputation
                 as being a cult was more a reflection of a small, but
                 growing core of practitioners.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Haider:2018:AAD,
  author =       "Umaima Haider and John D. McGregor and Rabih
                 Bashroush",
  title =        "The {ALI Architecture Description Language}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "52--52",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282545",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Architecture Description Languages (ADLs) have emerged
                 over the past two decades as a means to abstract
                 details of large-scale systems in order to enable
                 better intellectual control over the complete systems.
                 Recently, there has been an explosion in the number of
                 ADLs created in the research community. However,
                 industrial adoption of these ADLs has been rather
                 limited. This has been attributed to various reasons,
                 including the lack of support of some ADLs for:
                 variability management, requirements traceability,
                 architectural artefact reusability and multiple
                 architectural views. To overcome these limitations,
                 this paper is a report on ALI, an ADL that was designed
                 to complement existing work by adding mechanisms to
                 address the aforementioned limitations. The ALI design
                 principles, concepts, notations and formal semantics
                 are presented in this paper. The notation is
                 illustrated using two distinct case studies, one from
                 the information systems domain an Asset Management
                 System (AMS); and another from the embedded systems
                 domain --- a Wheel Brake System (WBS).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jain:2018:MDN,
  author =       "Ajay Jain and Sachin Soni",
  title =        "Multi-Directional navigation method for optimized
                 consumption of user generated content through semantic
                 mapping of features derived from the user generated
                 content",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "52--52",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282535",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Gone are the days when a buyer used to depend solely
                 on the product marketing team to know what's good about
                 a product or product features. With the advent of
                 social media, product purchase has become democratic
                 with product buyers, product users are vocal about
                 reporting back their experience about the product.
                 According to Forrester, ``buyers will spend more time
                 on web pages that have social content than those that
                 don't'' and ``user-generated content has significant
                 influence on a buyer's purchase decision.'' The
                 research doesn't lie --- User Generated Content (termed
                 as UGC) is more effective at driving purchase intent
                 and brand loyalty than any other media. To create
                 engaging, authentic customer experiences, companies
                 should weave UGC throughout their owned websites,
                 showcasing the voices that consumers trust the most:
                 their own.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Raibulet:2018:RIWb,
  author =       "Claudia Raibulet and Mariagrazia Fugini and Khalil
                 Drira and Patrizio Pelliccione and Ilias
                 Gerostathopoulos and Christian Prefoher and Klaus
                 Moessne",
  title =        "Report of the {1st International Workshop on
                 Context-aware Autonomous and Smart Architectures
                 (CASA@ECSA 2017)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "52--53",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282537",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The 2017 1st International Workshop on Context-aware,
                 Autonomous and Smart Architectures (CASA 2017) was held
                 in conjunction with the 11th European Conference on
                 Software Architecture (ECSA 2017), on September, 12th,
                 2017 in Canterbury, United Kingdom. The goal of this
                 one-day workshop was to bring together researchers and
                 practitioners from academic environment and from the
                 industry to share their solutions, ideas, visions, and
                 doubts in the design of software architectures for
                 context-aware, autonomous, and smart solutions. The
                 workshop focused on architectural aspects offering a
                 complementary vision of such solutions with respect to
                 the available application- and user-oriented
                 perspectives on context-awareness, autonomy, and
                 smartness. Furthermore, the workshop aimed to enable
                 discussions, partnerships, and collaborations among the
                 software engineers interested in these solutions",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Borg:2018:SIWb,
  author =       "Markus Borg and Adnan Causevic and Serge Demeyer and
                 Sigrid Eldh",
  title =        "Summary of the {1st IEEE Workshop on the Next Level of
                 Test Automation (NEXTA 2018)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "53--53",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282540",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "NEXTA is a new workshop on test automation that
                 provides a meeting point for academic researchers and
                 industry practitioners. While test automation already
                 is an established practice in industry, the concept
                 needs to evolve to go beyond its current state to
                 support the ever faster release cycles of tomorrow's
                 software engineering. NEXTA implications for research
                 and practice will include test case generation,
                 automated test result analysis, test suite assessment
                 and maintenance, and infrastructure for the future of
                 test automation. The first instance of NEXTA was
                 co-located with the 11th IEEE Conference on Software
                 Testing, Verification and Validation (ICST 2018) in
                 V{\"a}ster{\aa}s, Sweden on April 9, 2018. NEXTA 2018
                 offered an interactive setting with a keynote and paper
                 presentations, stimulated by two novel awards to
                 incentivize interaction and dissemination: a Best
                 Questions Award and a Most Viral Tweet Award. The
                 workshop attracted 15 paper submissions and about 50
                 participants. Based on the positive feedback, we plan
                 to organize the workshop again next year.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Fraser:2018:NSBb,
  author =       "Steven Fraser and Dennis Manci",
  title =        "No Silver Bullet Reloaded: Report on {XP 2017} Panel
                 Session",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "53--53",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282541",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "At XP2017 in Koln, a panel was convened to discuss the
                 classic 1987 IEEE Software paper by Frederick P.
                 Brooks, ``No Silver Bullet: Essence and Accidents in
                 Software Engineering.'' The ideas presented in his
                 paper have influenced several generations of software
                 developers. Brooks emphasized the notions of essential
                 complexity and accidental complexity, and he offered
                 suggestions for promising approaches to software
                 development. While his approaches are linked to what we
                 now recognize as ``agile practices,'' panelists offered
                 an implicit caveat that they must be done with
                 discipline to avoid increased accidental complexity.
                 Panelists also observed that agile development itself
                 is not a ``silver bullet''.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Northrop:2018:DSSb,
  author =       "Lina Northrop and Ipek Ozkaya and George Fairbanks and
                 Michael Keeling",
  title =        "Designing the Software Systems of the Future",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "53--53",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282538",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "We report here on the Future of Software Design
                 Workshop that was held on Jan 12-14, 2018 in
                 Pittsburgh, PA under the sponsorship of the Carnegie
                 Mellon University Software Engineering Institute. The
                 software industry is awash in modern trends that
                 involve artificial intelligence (AI), autonomy, data
                 everywhere, etc. These trends affect the structure of
                 software-intensive systems and their designs. The goal
                 of the workshop was to bring together participants from
                 diverse backgrounds to formulate ideas for software
                 design of future systems and related research
                 opportunities and challenges. In this report we
                 summarize the outcomes of the workshop",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{vanderLinden:2018:ESWb,
  author =       "Dirk van der Linden and Awais Rashid",
  title =        "The Effect of Software Warranties on Cybersecurity",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "53--53",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282539",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This workshop focused on bringing software developers
                 and legal professionals together to understand the
                 shared challenges they face in promoting the
                 development of secure software on the one hand, and
                 software at all, on the other hand. This report
                 summarizes current scientific research on the topics
                 and challenges discussed in the workshop breakout
                 sessions. The insights from the workshop highlight a
                 number of interesting directions for further research
                 on the interplay between software warranties and
                 cybersecurity.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bures:2018:SESb,
  author =       "Tomas Bures and Danny Weyns and Bradley Schmerl and
                 John Fitzgerald",
  title =        "Software Engineering for Smart Cyber-Physical Systems:
                 Models, System-Environment Boundary, and Social
                 Aspects",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "54--54",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282542",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Smart Cyber-Physical Systems (sCPS) are a novel kind
                 of Cyber-Physical Systems engineered to take advantage
                 of large-scale cooperation between devices, users and
                 environment to achieve added value in face of
                 uncertainty and various situations in their
                 environment. Examples of sCPS include modern traffic
                 systems, Industry 4.0 systems, systems for
                 smart-buildings, smart energy grids, etc. The uniting
                 aspect of all these systems is that to achieve their
                 high-level of intelligence, adaptivity and ability to
                 optimize and learn, they heavily rely on software. This
                 makes them software-intensive systems, where software
                 becomes their most complex part. Engineering sCPS thus
                 becomes a recognized software engineering discipline,
                 which however, due to specifics of sCPS, can only
                 partially rely on the existing body of knowledge in
                 software engineering. In fact, it turns out that many
                 of the traditional approaches to architecture modeling
                 and software development fail to cope with the high
                 dynamicity and uncertainty of sCPS. This calls for
                 innovative approaches that jointly reflect and address
                 the specifics of such systems. This paper maps the
                 discussions and results of the Third International
                 Workshop on Software Engineering for Smart
                 Cyber-Physical Systems (SEsCPS 2017), which
                 specifically focuses on challenges and promising
                 solutions in the area of software engineering for
                 sCPS.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gleirscher:2018:SRIb,
  author =       "Mario Gleirscher and Stefan Kugele and Sven Linker",
  title =        "{SCAV'18}: Report of the {2nd International Workshop
                 on Safe Control of Autonomous Vehicles}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "54--54",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282543",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This report summarizes the discussions, open issues,
                 take-away messages, and conclusions of the 2nd SCAV
                 workshop.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kuhrmann:2018:SICb,
  author =       "Marco Kuhrmann and Rory V. O'Connor and Dan Houston
                 and Regina Hebig and David Raffo",
  title =        "Summary of the {International Conference on Software
                 and System Processes (ICSSP 2018)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "54--54",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282534",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The International Conference on Software and System
                 Processes (ICSSP), continuing the success of Software
                 Process Workshop (SPW), the Software Process Modeling
                 and Simulation Workshop (ProSim) and the International
                 Conference on Software Process (ICSP) conference
                 series, has become the established premier event in the
                 field of software and systems engineering processes. It
                 provides a leading forum for the exchange of research
                 outcomes and industrial best-practices in process
                 development from software and systems disciplines.
                 ICSSP 2018 was held in Gothenburg, Sweden, 26-27 May
                 2018, co-located with the 40th International Conference
                 on Software Engineering (ICSE). The theme of ICSSP 2018
                 was studying ``Demands on Processes, Processes on
                 Demand'' by recognizing the demands on processes that
                 include the need for both well-developed plans and
                 incremental deliveries (agile and hybrid processes),
                 utilization of increased automation (model-based
                 engineering and DevOps), higher degrees of customer
                 collaboration, comprehensive analysis of existing
                 products for reuse (open source and COTS), and
                 performance requirements of enterprise-level
                 architectures. Papers presented at ICSSP discussed
                 these issues across different domains, providing
                 concepts, evidence, and experiences.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bultan:2018:SCA,
  author =       "Tevfik Bultan",
  title =        "Side-Channel Analysis via Symbolic Execution and Model
                 Counting",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "55--55",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302416",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "An important problem in computer security is the
                 detection of side-channel vulnerabilities. Information
                 gained by observing nonfunctional properties of program
                 executions (i.e., sidechannels such as execution time
                 or memory usage) can enable attackers to infer secrets
                 that the program accesses (such as a password). In this
                 talk, I will discuss how symbolic execution, combined
                 with a model counting constraint solver, can be used
                 for quantifying side-channel leakage in Java programs.
                 I will also discuss automata-based model counting
                 techniques. We have implemented these techniques by
                 integrating our model counting constraint solver,
                 called Automata-Based model Counter (ABC), with the
                 symbolic execution tool Symbolic Path Finder (SPF).",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Paquin:2018:AAS,
  author =       "Maria Paquin and Elena Sherman and Amit Jain",
  title =        "Assessing the Adequacy of Synthetic Programs for
                 Learning {SPF's} Configurations",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "55--55",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282526",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Static program analysis is a powerful technique that
                 reasons about a program's behavior without actually
                 executing the program. To balance between the precision
                 and the efficiency of an analyzer, developers often
                 manually tune-up analyzer's parameters for a specific
                 program. However, this task can be tedious and
                 time-consuming. To automate the search for the optimal
                 parameters for a program, researchers employ machine
                 learning (ML) techniques, that from the existing data
                 learn the relationship between the program and the
                 optimal parameters, which it encodes in an ML model.
                 The existing, or training, data set, plays an important
                 role in the correctness of an ML model. In this work we
                 investigate whether automatically generated programs
                 are adequate for training an ML model, which determines
                 SPF's configurations for a given Java method. To do
                 this, we compare the performance of a model trained on
                 real programs with that of a model trained on synthetic
                 programs. Our results indicate that while synthetic
                 programs are inadequate for training a model alone,
                 adding them to the training set of real programs
                 improves the classification power of the resulting
                 model.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Phan:2018:TIG,
  author =       "Quoc-Sang Phan",
  title =        "Test input generation using separation logic",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "55--55",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3302418",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Unit testing is the practice of testing individual
                 units of a program, where a unit can be a method or a
                 group of methods. Unit testing is important for
                 software development, and automated test case
                 generation is important for reducing the cost and
                 improving the quality of unit testing. When an input of
                 a un is a dynamically allocated data structure, such as
                 list and tree, it has unbounded domain, and strict
                 requirements over the shape or size. This makes test
                 case generation notoriously hard. In this talk, we
                 present Java StarFinder (JSF), a JPF extension for
                 testing units that manipulate data structures. JSF is a
                 symbolic execution engine that uses separation logic
                 specification to capture the constraints over the
                 input, and performs context-sensitive lazy
                 initialization to construct valid test cases.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Wang:2018:PBJ,
  author =       "Kaiyuan Wang and Hayes Converse and Milos Gligoric and
                 Sasa Misailovic and Sarfraz Khurshid",
  title =        "A Progress Bar for the {JPF} Search Using Program
                 Executions",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "55--55",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282525",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software model checkers, such as JPF, are routinely
                 used to explore executions of programs that have very
                 large state spaces. Sometimes the exploration can take
                 a significant amount of time before a bug is found or
                 the checking is complete, in which case the user must
                 patiently wait, possibly for quite some time, to learn
                 the result of checking. A progress bar that accurately
                 shows the status of the search provides the user useful
                 feedback about the time expected for the search to
                 complete. This paper introduces JPFBar, a novel
                 technique to estimate the percentage of work done by
                 the JPF search by computing weights for the execution
                 paths it explores and summing up the weights. JPFBar is
                 embodied into a listener that prints a progress bar
                 during JPF execution. An experimental evaluation using
                 a variety of Java subjects shows that JPFBar provides
                 accurate information about the search's progress and
                 fares well in comparison with a state-based progress
                 estimator that is part of the standard JPF
                 distribution.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Cordeiro:2018:BJV,
  author =       "Lucas C. Cordeiro and Daniel Kroening and Peter
                 Schrammel",
  title =        "Benchmarking of {Java} Verification Tools at the
                 {Software Verification Competition (SV-COMP)}",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "56--56",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282529",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Empirical evaluation of verification tools by
                 benchmarking is a common method in software
                 verification research. The Competition on Software
                 Verification (SV-COMP) aims at standardization and
                 reproducibility of benchmarking within the software
                 verification community in an annual basis, through
                 comparative evaluation of fully-automatic software
                 verifiers for C programs. Building upon this success,
                 we describe here how to re-use the ecosystem developed
                 around SV-COMP for benchmarking Java verification
                 tools. We provide a detailed description of the rules
                 for benchmark verification tasks, the integration of
                 new tools into SV-COMP's benchmarking framework and
                 also give experimental results of a benchmarking run on
                 three state-of-the-art Java verification tools, JPF-SE,
                 JayHorn and JBMC.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Jones:2018:MSC,
  author =       "Joseph Jones and James Wasson and Sean Brown and Seth
                 Poulsen and Peter Aldous and Eric Mercer",
  title =        "Memory safety in {C} by abstract interpretation",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "56--56",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282530",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Pointer arithmetic is a core feature of the C
                 programming language and C program analysis is
                 impossible without an understanding of its effects.
                 Many program analyses opt to be unsound in the presence
                 of pointer arithmetic or preserve soundness at the cost
                 of precision. However, the number of operations that
                 can be performed on pointers is actually quite small.
                 As was observed by Might et al., these few operations
                 can be precisely modeled with a simplified Peano
                 arithmetic. This paper presents an interpreter that
                 uses a memory model based on this arithmetic. It
                 desugars C programs to a simple imperative language
                 using standard semantics-preserving techniques to
                 simplify the interpretation. The result is a prototype
                 analysis that reasons precisely about memory safety in
                 full C programs without programmer annotations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saha:2018:ASS,
  author =       "Seemanta Saha and Ismet Burak Kadron and William Eiers
                 and Lucas Bang and Tevfik Bultan",
  title =        "Attack Synthesis for Strings using Meta-Heuristics",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "56--56",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282527",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Information leaks are a significant problem in modern
                 computer systems and string manipulation is prevalent
                 in modern software. We present techniques for automated
                 synthesis of side-channel attacks that recover secret
                 string values based on timing observations on string
                 manipulating code. Our attack synthesis techniques
                 iteratively generate inputs which, when fed to code
                 that accesses the secret, reveal partial information
                 about the secret based on the timing observations,
                 leading to recovery of the secret at the end of the
                 attack sequence. We use symbolic execution to extract
                 path constraints, automata-based model counting to
                 estimate the probability of execution paths, and
                 meta-heuristic methods to maximize information gain
                 based on entropy for synthesizing adaptive attack
                 steps.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Zheng:2018:ADS,
  author =       "Guolong Zheng and Quang Loc Le and ThanhVu Nguyen and
                 Quoc-Sang Phan",
  title =        "Automatic Data Structure Repair using Separation
                 Logic",
  journal =      j-SIGSOFT,
  volume =       "43",
  number =       "4",
  pages =        "66--66",
  month =        oct,
  year =         "2018",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3282517.3282528",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:10 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software systems are often shipped and deployed with
                 both known and unknown bugs. On-the-fly program
                 repairs, which handle runtime errors and allow programs
                 to continue successfully, can help software
                 reliability, e.g., by dealing with inconsistent or
                 corrupted data without interrupting the running
                 program. We report on our work-in-progress that repairs
                 data structure using separation logic. Our technique,
                 inspired by existing works on specification-based
                 repair, takes as input specification written in a
                 separation logic formula and a concrete data structure
                 that fails that specification, and performs on-the-fly
                 repair to make the data conforms with the
                 specification. The use of separation logic allows us to
                 compactly and precisely represent desired properties of
                 data structures and use existing analyses in separation
                 logic to detect and repair bugs in complex data
                 structures. We have developed a prototype, called
                 STARFIX, to repair invalid Java data structures
                 violating given specifications in separation logic.
                 Preliminary results show that tool can efficiently
                 detect and repair inconsistent data structures
                 including lists and trees.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2019:Pa,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "7--7",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310015",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In every larger-scale endeavor, or at least in most
                 larger-scale endeavors, there comes a time to evaluate
                 progress, solicit opinion, ask your public, survey your
                 customers --- in short, to find out if what you are
                 doing is actually worth doing. In some cases, this step
                 may be omitted, or the results ignored: it is possible
                 that if Herman Melville had shown people Moby Dick when
                 he was half-done with it, everyone except Nathaniel
                 Hawthorne would have said ``Er, we're not sure what
                 this is all about. Where's the nice adventure of Omoo?
                 Just what are you up to, Sir?'' He should not have
                 therefore ditched the manuscript and gone on to
                 something else; also, Nathaniel Hawthorne gets 50,000
                 votes. However, in general, you (and I) are not
                 Melville writing Moby Dick. Scientific projects tend to
                 publish some papers before they are ``complete'' and if
                 these are universally derided and rejected, or receive
                 no citations, it is often the case that they are doing
                 nothing of much interest. There are exceptions, but
                 they are rarer, perhaps, than we might think. Most
                 things that are ignored are ignored for a good
                 reason.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Schaefer:2019:WDW,
  author =       "Robert Schaefer",
  title =        "What Do We Mean When We Talk about Artificial
                 Intelligence?: (Part 1)",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "7--10",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310014",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This is a good time as any to address the more
                 philosophical questions of what software is and how we
                 use it, in particular software used as a replacement
                 for human intelligence-AI. My intent in this and in the
                 next few columns is to address some of the
                 fundamentals, that is, the science of AI or what should
                 be nailed-down before software engineering begins. You
                 get more traction when you design on a solid science
                 base of knowledge. A simple analogy, for example-one
                 might not choose to labor over a not-quite-working
                 perpetual-motion machine if one were aware of the
                 second law of thermodynamics. Then again, there is no
                 equivalent ``law of human intelligence,'' so people
                 keep trying.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2019:RPa,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "11--17",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310021",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Edited by PGN (Risks Forum Moderator, with
                 contributions by others as indicated. Opinions are
                 individual rather than organizational, with usual
                 disclaimers implied. We address problems relating to
                 software, hardware, people, and other circumstances
                 relevant to computer systems. References (R i j) to the
                 online Risks Forum denote RISKS vol i number j. Cited
                 RISKS items generally identify contributors and
                 sources, together with URLs. Official RISKS archives
                 are available at www.risks.org, with nice html
                 formatting and search engine courtesy of Lindsay
                 Marshall at Newcastle:;
                 http://catless.ncl.ac.uk/Risks/i.j.html (also
                 ftp://www.sri.com/risks). CACM Inside Risks:
                 http://www.csl.sri.com/neumann/insiderisks.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mascardi:2019:EMAa,
  author =       "Viviana Mascardi and Danny Weyns and Alessandro
                 Ricci",
  title =        "Engineering Multi-Agent Systems: State of Affairs and
                 the Road Ahead",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "18--28",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310035",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The continuous integration of software-intensive
                 systems together with the ever-increasing computing
                 power offer a breeding ground for intelligent agents
                 and multi-agent systems (MAS) more than ever before.
                 Over the past two decades, a wide variety of languages,
                 models, techniques and methodologies have been proposed
                 to engineer agents and MAS. Despite this substantial
                 body of knowledge and expertise, the systematic
                 engineering of large-scale and open MAS still poses
                 many challenges. Researchers and engineers still face
                 fundamental questions regarding theories,
                 architectures, languages, processes, and platforms for
                 designing, implementing, running, maintaining, and
                 evolving MAS. This paper reports on the results of the
                 6th International Workshop on Engineering Multi-Agent
                 Systems (EMAS 2018, 14th-15th of July, 2018, Stockholm,
                 Sweden), where participants discussed the issues above
                 focusing on the state of affairs and the road ahead for
                 researchers and engineers in this area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Eck:2019:PMCa,
  author =       "Stefan Eck and Hans A. Hansson",
  title =        "{PROMPT} --- Master Courses for Professional Software
                 Developers",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "29--30",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310036",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "PROMPT [1] is an educational initiative in cooperation
                 with several academic parties and leading industrial
                 companies and organizations. Together, the parties
                 offer advanced level courses in software engineering in
                 a web-based format, tailored to fit professional
                 engineers and software developers who need to be able
                 to combine full-time work and studies. The long-term
                 goal of PROMPT is to guarantee the supply of advanced
                 software competencies and innovativeness in industry.
                 The courses are free of charge within Europe, cover
                 typically 7.5 university credits and are run over a
                 whole semester, at a pace of 25\% of full-time. All
                 courses are developed in close cooperation with the
                 Swedish industry and trade organizations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Unterkalmsteiner:2019:SIW,
  author =       "Michael Unterkalmsteiner and Tingting Yu and Gregory
                 Gay and Elizabeth Bjarnason and Markus Borg and Michael
                 Felderer",
  title =        "Summary of the {5th International Workshop on
                 Requirements Engineering and Testing (RET 2018)}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "31--34",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310037",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The RET (Requirements Engineering and Testing)
                 workshop series provides a meeting point for
                 researchers and practitioners from the two separate
                 fields of Requirements Engineering (RE) and Testing.
                 The goal is to improve the connection and alignment of
                 these two areas through an exchange of ideas,
                 challenges, practices, experiences and results. The
                 long term aim is to build a community and a body of
                 knowledge within the intersection of RE and Testing,
                 i.e. RET. The 5th workshop was held in colocation with
                 ICSE 2018 in Gothenburg, Sweden. The workshop continued
                 in the same interactive vein as the predecessors. We
                 introduced a new format for the presentations in which
                 the paper authors had the opportunity to interact
                 extensively with the audience. Each author was
                 supported by a member of the organization committee to
                 prepare either an extensive demo, collect more data in
                 form of a questionnaire or perform a hands-on tutorial.
                 We named this new format ``X-ray session''. In order to
                 create an RET knowledge base, this cross-cutting area
                 elicits contributions from both RE and Testing, and
                 from both researchers and practitioners. A range of
                 papers were presented from short positions papers to
                 full research papers that cover connections between the
                 two fields. The workshop attracted 27 participants and
                 the positive feedback on the new format encourages us
                 to organize the workshop the next year again.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Eck:2019:PMCb,
  author =       "Stefan Eck and Hans A. Hansson",
  title =        "{PROMPT} --- Master Courses for Professional Software
                 Developers",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "35--35",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310036",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "PROMPT [1] is an educational initiative in cooperation
                 with several academic parties and leading industrial
                 companies and organizations. Together, the parties
                 offer advanced level courses in software engineering in
                 a web-based format, tailored to fit professional
                 engineers and software developers who need to be able
                 to combine full-time work and studies. The long-term
                 goal of PROMPT is to guarantee the supply of advanced
                 software competencies and innovativeness in industry.
                 The courses are free of charge within Europe, cover
                 typically 7.5 university credits and are run over a
                 whole semester, at a pace of 25\% of full-time. All
                 courses are developed in close cooperation with the
                 Swedish industry and trade organizations.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kumari:2019:EGP,
  author =       "Neha Kumari and Rajeev Kumar",
  title =        "Evolution of Generic Programming in {OOPLs}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "35--35",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310033",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Generic Programming enables program constructs to be
                 reused in a variety of situations. In programming
                 languages, idea of generic programming is being opted
                 through a variety of generic mechanisms. Generic
                 mechanisms are either directly applied to pre-existing
                 language constructs or it provides its own components
                 for generic implementation. In this paper, we present
                 such generic mechanisms in an organized way such that
                 it appears as ``one mechanism intensify other''. Our
                 aim is to exhibit generic evolution among mainstream
                 object oriented programming languages (OOPLs). Hence,
                 we analyze such approaches for better expressiveness
                 and type-safety of generic programming as they evolved
                 in OOPLs. This brief review article will help
                 developers and researchers to precisely understand the
                 generic mechanism in mainstream OOPLs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Mascardi:2019:EMAb,
  author =       "Viviana Mascardi and Danny Weyns and Alessandro
                 Ricci",
  title =        "Engineering Multi-Agent Systems: State of Affairs and
                 the Road Ahead",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "35--35",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310035",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "The continuous integration of software-intensive
                 systems together with the ever-increasing computing
                 power offer a breeding ground for intelligent agents
                 and multi-agent systems (MAS) more than ever before.
                 Over the past two decades, a wide variety of languages,
                 models, techniques and methodologies have been proposed
                 to engineer agents and MAS. Despite this substantial
                 body of knowledge and expertise, the systematic
                 engineering of large-scale and open MAS still poses
                 many challenges. Researchers and engineers still face
                 fundamental questions regarding theories,
                 architectures, languages, processes, and platforms for
                 designing, implementing, running, maintaining, and
                 evolving MAS. This paper reports on the results of the
                 6th International Workshop on Engineering Multi-Agent
                 Systems (EMAS 2018, 14th-15th of July, 2018, Stockholm,
                 Sweden), where participants discussed the issues above
                 focusing on the state of affairs and the road ahead for
                 researchers and engineers in this area.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Roy:2019:EIC,
  author =       "Subhajit Roy",
  title =        "Envisioning an Intelligent Collaborative Integrated
                 Development Environment",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "35--35",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310034",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Abstract Programming editors have evolved over the
                 years. However, we still lack an environment that can
                 allow on-the-fly collaboration between multiple
                 programmers. We envision Incide, an integrated
                 development environment that allows a synergistic
                 collaboration environment by using program synthesis
                 technology to combine partial solutions from multiple
                 programmers attempting to solve the (same) problem into
                 one concrete solution. This solution is then
                 communicated to the editor of each programmer as
                 patches along with personalization on syntactic
                 elements like choice of programming language constructs
                 and variable names. We believe that such editors will
                 improve productivity on complex solutions by bringing a
                 discipline into combining the intuition and intellect
                 of multiple programmers.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Muna:2019:APL,
  author =       "Altherwi Muna",
  title =        "Assessing Programming Language Impact on Software
                 Development Productivity Based on Mining {OSS}
                 Repositories",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "36--37",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310017",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "This study is to investigate the impact of high-level,
                 general-purpose, programming languages on software
                 development productivity and quality. In particular, a
                 comparison is to be made between scripting languages
                 and traditionally compiled, system programming ones to
                 examine differences, if any. The data obtained for the
                 research is from open source repositories gathered from
                 Github. The results are going to be based on the
                 analysis of possibly the largest open source dataset
                 through examining a population of 15,000 projects and
                 by including a sample of 4349 projects, where a main
                 language can be identified. The investigation, so far,
                 has revealed considerable differences in productivity
                 between the two language groups.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Singh:2019:UNL,
  author =       "Maninder Singh",
  title =        "Using Natural Language Processing and Graph Mining to
                 Explore Inter-Related Requirements in Software
                 Artefacts",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "37--37",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310018",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Software development is prone to software faults due
                 to the involvement of multiple stakeholders especially
                 during the fuzzy phases (requirements and design).
                 Software inspections are commonly used in industry to
                 detect and fix problems in requirements and design
                 artifacts thereby mitigating the fault propagation to
                 later phases. The requirements documented in natural
                 language (NL) are prone to contain faults because of
                 different vocabularies among stakeholders. This
                 research employs various NL processing with semantic
                 analysis (SA) and mining solutions from graph theory to
                 NL requirements to develop inter-related requirements
                 (IRRs) that can help identify requirements that may
                 need similar fixes. Additionally, our approach aims at
                 aiding requirements' engineers with fault-prone regions
                 both pre and post inspection. Pre-inspection, our
                 approach using IRRs help removing redundant and
                 extraneous faults within related requirements while
                 post-inspection, it aids engineers analyse the impact
                 of a change in one requirement on another related
                 requirements. So, this research aims at developing a
                 graph of inter-related requirements using natural
                 language processing and semantic analysis approaches on
                 a given requirements document that can be used to aid
                 various decisions pre and post-inspections.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Turlea:2019:MLT,
  author =       "Ana Turlea",
  title =        "Model-in-the-Loop Testing for Cyber Physical Systems",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "1",
  pages =        "37--37",
  month =        jan,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3310013.3310019",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Sat Oct 19 18:11:11 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Context: Nowadays, there is of high interest to use
                 automated testing, not only because it optimizes the
                 manual testing by reducing the needed time and cost,
                 but also because manual testing is more likely to
                 produce errors. Increasing the safety of software
                 controlled complex systems, that use many distributed
                 electronic controlled units, requires extensive
                 testing. In model based testing, the test specification
                 is derived from the system requirements and a model
                 that describes selected functional and nonfunctional
                 aspects of the system under test.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2019:Pb,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "2",
  pages =        "3--4",
  month =        apr,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3325642.3325644",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Mon Oct 21 05:42:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Gerald M. Weinberg's The Psychology of Computer
                 Programming: Silver Anniversary Edition is this month's
                 Passages selection. Weinberg died last August, but this
                 book alone makes him immortal in the world of software
                 engineering. The Psychology is one of my favorite
                 software engineering classics, and one of the books
                 that originally motivated this column. Tim Budd gave me
                 my first copy, when I was a young and ignorant
                 professor at Oregon State, when he retired (the
                 opposite of the usual retirement gifting procedure) and
                 I read it with great pleasure and attention for the
                 first time, not long after, and began to form the idea
                 of Passages not long after that. Why did I not write
                 about it before this?",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Elbaum:2019:SI,
  author =       "Sebastian Elbaum",
  title =        "The State of {ICSE}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "2",
  pages =        "4--5",
  month =        apr,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3325642.3325645",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Mon Oct 21 05:42:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "In this state of the conference I want to share a
                 short reflection about my four years as steering
                 committee chair, some highlights of the upcoming ICSE
                 operational guidelines, and a quick update on the next
                 ICSEs.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2019:RPb,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "2",
  pages =        "6--12",
  month =        apr,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3325642.3325643",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Mon Oct 21 05:42:17 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  abstract =     "Edited by PGN (Risks Forum Moderator, with
                 contributions by others as indicated. Opinions are
                 individual rather than organizational, with usual
                 disclaimers implied. We address problems relating to
                 software, hardware, people, and other circumstances
                 relevant to computer systems. References (R i j) to the
                 online Risks Forum denote RISKS vol i number j. Cited
                 RISKS items generally identify contributors and
                 sources, together with URLs. Official RISKS archives
                 are available at www.risks.org, with nice html
                 formatting and search engine courtesy of Lindsay
                 Marshall at Newcastle:;
                 http://catless.ncl.ac.uk/Risks/i.j.html (also
                 ftp://www.sri.com/risks). CACM Inside Risks:
                 http://www.csl.sri.com/neumann/insiderisks.html",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Groce:2019:P,
  author =       "Alex Groce",
  title =        "Passages",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "10--11",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356775",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356775",
  abstract =     "Gerald M. Weinberg's An Introduction to General
                 Systems Thinking is this month's Passages selection.
                 Weinberg's Psychology of Computer Programming was last
                 month's Passages selection. I believe that many more
                 software engineers have read last month's \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Soldani:2019:GLS,
  author =       "Jacopo Soldani",
  title =        "Grey Literature: a Safe Bridge Between Academy and
                 Industry?",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "11--12",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356776",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356776",
  abstract =     "With ``grey literature'' we identify materials and
                 research produced outside of the traditional academic
                 publishing and distribution channels. Currently
                 available grey literature spans from industrial
                 whitepapers and technical reports to blog post and
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Arumugam:2019:SCA,
  author =       "Lakshmanan Arumugam and Vikram N. Subramanian and
                 Meiyappan Nagappan",
  title =        "{SEGarage}: a Curated Archive for Software Engineering
                 Research Tools",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "13--13",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356777",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356777",
  abstract =     "SEGarage is a curated archive for software engineering
                 tools developed through software engineering research.
                 This service aims to ease the effort of finding and
                 downloading tools from past research.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2019:RPc,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "16--21",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3372312",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3372312",
  abstract =     "Discussion of the two 737 Max fatal losses has
                 persisted (noted in R 31 11 to R 31 27), and is still
                 ongoing. The desired use of lighter engines altered the
                 nose-lift behavior, and resulted in an automated system
                 that attempted to compensate for the \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Pastor:2019:DSP,
  author =       "Oscar Pastor",
  title =        "Design Science for {PhD} Research in the Software
                 Engineering Domain",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "22--22",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3372314",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3372314",
  abstract =     "The keynote introduced the principles of Design
                 Science with the perspective developed by Prof. Roel
                 Wieringa in his book ``Design Science'', clearly
                 distinguishing between questions of knowledge and
                 engineering problems, and introducing the research
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Aldaeej:2019:TET,
  author =       "Abdullah Aldaeej",
  title =        "Towards Effective Technical Debt Decision Making in
                 Software Startups",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "22--22",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356793",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356793",
  abstract =     "Context: Technical Debt (TD) is a metaphor used to
                 describe outstanding software maintenance tasks or
                 shortcuts made in the software development to achieve
                 short-term benefits (i.e. time to market), but
                 negatively impact the software quality in the long
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Matsubara:2019:DSE,
  author =       "Patr{\'\i}cia Gomes Fernandes Matsubara",
  title =        "Dealing with software estimates distortions from the
                 perspective of negotiation theories",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "22--22",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356794",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356794",
  abstract =     "Software estimation is a critical task in software
                 projects, and the accuracy of software estimates has
                 been a concern for researchers and practitioners.
                 Researchers have already identified some factors that
                 impact estimates accuracy, like cognitive \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Motta:2019:EBF,
  author =       "Rebeca C. Motta",
  title =        "An Evidence-Based Framework for Supporting the
                 Engineering of {IoT} Software Systems",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "22--23",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356795",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356795",
  abstract =     "Internet of Things represents a promising paradigm for
                 the development of systems that have been largely
                 explored in the academy and industry. One of the
                 recognized features of IoT is its large
                 multidisciplinarity by the integration of different
                 devices \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neto:2019:SSR,
  author =       "Amadeu Anderlin Neto",
  title =        "A Strategy to Support Replications of Controlled
                 Experiments in Software Engineering",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "23--23",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356796",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356796",
  abstract =     "Replication is essential to build knowledge in
                 empirical science. Experiment replications reported in
                 the software engineering context present variabilities
                 on their experiment elements, e.g., variables,
                 materials. Further understanding these \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kamei:2019:UGL,
  author =       "Fernando Kenji Kamei",
  title =        "The Use of Grey Literature Review as Evidence for
                 Practitioners",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "23--23",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356797",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356797",
  abstract =     "Context: In the last years, diverse research areas
                 increased their interest in Grey Literature (GL). In
                 Software Engineering (SE), SE practitioners became
                 heavy consumers of GL, by way of contrast to
                 traditional research papers. Problem: This is
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Kreitz:2019:SDS,
  author =       "Mark Kreitz",
  title =        "Security by Design in Software Engineering",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "23--23",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356798",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356798",
  abstract =     "Security is a non-functional requirement
                 difficult-to-handle during software development.
                 However, it appears to be common in software
                 engineering, that security is taken care of during the
                 design- and test-phase only. If security is neglected
                 during \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saarimaki:2019:MIO,
  author =       "Nyyti Saarim{\"a}ki",
  title =        "Methodological Issues in Observational Studies",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "24--24",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356799",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356799",
  abstract =     "Background: Starting from the 1960s, practitioners and
                 researchers have looked for ways to empirically
                 investigate new technologies such as inspecting the
                 effectiveness of new methods, tools, or practices. With
                 this purpose, the empirical software \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Langdon:2019:SFG,
  author =       "William B. Langdon and Westley Weimer and Christopher
                 Timperley and Oliver Krauss and Zhen Yu Ding and Yiwei
                 Lyu and Nicolas Chausseau and Eric Schulte and Shin
                 Hwei Tan and Kevin Leach and Yu Huang and Gabin An",
  title =        "The State and Future of Genetic Improvement",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "25--29",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356801",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356801",
  abstract =     "We report the discussion session at the sixth
                 international Genetic Improvement workshop, GI-2019 @
                 ICSE, which was held as part of the 41st ACM/IEEE
                 International Conference on Software Engineering on
                 Tuesday 28th May 2019. Topics included GI \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Calefato:2019:SIC,
  author =       "Fabio Calefato and Paolo Tell and Alpana Dubey",
  title =        "Summary of the {14th International Conference on
                 Global Software Engineering (ICGSE)}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "30--33",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356802",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356802",
  abstract =     "The International Conference on Global Software
                 Engineering, in its 14th iteration, continues to
                 provide researchers and practitioners with a leading
                 forum to share their research findings, experiences,
                 and new ideas on diverse topics related to global
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Sutton:2019:SIC,
  author =       "Stanley M. Sutton and Ove Armbrust and Regina Hebig
                 and Paul Clarke",
  title =        "Summary of the {2019 International Conference on
                 Software and System Processes (ICSSP 2019)}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "34--37",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356803",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356803",
  abstract =     "The 2019 International Conference on Software and
                 System Processes (ICSSP 2019) was held in conjunction
                 with the 41st International Conference on Software
                 Engineering (ICSE 2019) in Montreal, Canada, May 25-26,
                 2019. ICSSP is a leading international \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Ciccozzi:2019:RIW,
  author =       "Federico Ciccozzi and Nico Hochgeschwender and Ivano
                 Malavolta and Andreas Wortmann",
  title =        "Report on the {2nd International Workshop on Robotics
                 Software Engineering (RoSE'19)}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "38--40",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356804",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356804",
  abstract =     "The 2nd edition of the 2nd International Workshop on
                 Robotics Software Engineering (RoSE) was held at the
                 International Conference on Software Engineering (ICSE)
                 in the city of Montreal, Canada, on the 27th of May
                 2019. The focus of this edition of the \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Karre:2019:RSE,
  author =       "Sai Anirudh Karre and Lalit Mohan and Y. Raghu Raghu
                 Reddy and K. V. Raghavan and R. D. Naik and Rahul
                 Purandare and Amey Karkare",
  title =        "A report on {1st Software Engineering Research in
                 India Update Meeting (SERI 2019)}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "41--42",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356805",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356805",
  abstract =     "Software Engineering Researchers in India from both
                 academia and industry are widely contributing to
                 various research problems. In this report, we brie y
                 summarize the key insights from 1st Software
                 Engineering Research in India Update Meeting (SERI
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Steghofer:2019:SSS,
  author =       "Jan-Philipp Stegh{\"o}fer and Nan Niu and Jin L. C.
                 Guo and Anas Mahmoud",
  title =        "{SST'19} --- Software and Systems Traceability:
                 Summary of the {10th International Workshop at the 41st
                 International Conference on Software Engineering
                 (ICSE), May 27, 2019}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "43--47",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356806",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356806",
  abstract =     "Traceability is the ability to relate different
                 artifacts during the development and operation of a
                 system to each other. It enables program comprehension,
                 change impact analysis, and facilitates the cooperation
                 of engineers from different disciplines. \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Tonelli:2019:WSI,
  author =       "Roberto Tonelli and Marco Ortu and Stephane Ducasse
                 and Michele Marchesi",
  title =        "Workshop Summary: {2019 IEEE \slash {ACM} Second
                 International Workshop on Emerging Trends in Software
                 Engineering for Blockchain (WETSEB 2019)}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "48--52",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356807",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356807",
  abstract =     "The second Workshop on Emerging Trends in Software
                 Engineering for Blockchain (WETSEB 2019) intends to
                 pursue the experience of WETSEB 2018 which inherited
                 from the past eight editions of WETSoM (Workshop on
                 Emerging Trends on Software Metrics) the \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Choi:2019:SEI,
  author =       "Byoungju Choi and Mar{\'\i}a-Jos{\'e} Escalona and Kim
                 Herzig",
  title =        "Summary of the {14th edition of the {IEEE\slash} ACM
                 Workshop on Automation of Software Test (AST)}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "53--53",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356808",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356808",
  abstract =     "Effective and efficient testing with reduced costs and
                 a high fault detection capability is the desirable goal
                 in industry which can be achieved only through
                 automation of all parts of the testing process. In the
                 past decades, a great amount of research \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Siegmund:2019:SSE,
  author =       "Janet Siegmund and Andrew Begel and Norman Peitek",
  title =        "Summary of the {Sixth Edition of the International
                 Workshop on Eye Movements in Programming}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "54--55",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356809",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356809",
  abstract =     "The study of eye gaze data has great potential for
                 research in computer programming, computing education,
                 and software engineering practice. To highlight its
                 role for the software engineering community, the Sixth
                 Edition of the International Workshop on \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Xie:2019:WSI,
  author =       "Xiaoyuan Xie and Pak-Lok Poon and Laura L. Pullum",
  title =        "Workshop Summary: {2019 IEEE \slash {ACM} Fourth
                 International Workshop on Metamorphic Testing (MET
                 2019)}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "56--59",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356810",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356810",
  abstract =     "MET is a relatively new workshop on metamorphic
                 testing for academic researchers and industry
                 practitioners. The first international workshop on MET
                 (MET 2016) was co-located with the 38th International
                 Conference on Software Engineering (ICSE 2016) in
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Gerostathopoulos:2019:CDD,
  author =       "Ilias Gerostathopoulos and Marco Konersmann and
                 Stephan Krusche and David I. Mattos and Jan Bosch and
                 Tomas Bures and Brian Fitzgerald and Michael Goedicke
                 and Henry Muccini and Helena H. Olsson and Thomas Brand
                 and Robert Chatley and Nikolaos Diamantopoulos and Arik
                 Friedman and Miguel Jim{\'e}nez and Jan Ole Johanssen
                 and Putra Manggala and Masumi Koseki and Jorge Melegati
                 and Nuthan Munaiah and Gabriel Tamura and Vasileios
                 Theodorou and Jeffrey Wong and Iris Figalist",
  title =        "Continuous Data-driven Software Engineering ---
                 Towards a Research Agenda: Report on the {Joint 5th
                 International Workshop on Rapid Continuous Software
                 Engineering (RCoSE 2019) and 1st International Works}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "60--64",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356811",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356811",
  abstract =     "The rapid pace with which software needs to be built,
                 together with the increasing need to evaluate changes
                 for end users both quantitatively and qualitatively
                 calls for novel software engineering approaches that
                 focus on short release cycles, \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Marijan:2019:GPA,
  author =       "Dusica Marijan and Sagar Sen",
  title =        "Good Practices in Aligning Software Engineering
                 Research and Industry Practice",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "65--67",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356812",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356812",
  abstract =     "There is a long-standing challenge to narrow the gap
                 between software engineering research and industry
                 practice, to align their interests and realize true
                 synergies between the two communities. Some
                 difficulties to this challenge include mismatched
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Marijan:2019:IRA,
  author =       "Dusica Marijan and Weiyi Shang and Rakesh Shukla",
  title =        "Implications of Resurgence in Artificial Intelligence
                 for Research Collaborations in Software Engineering",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "3",
  pages =        "68--70",
  month =        nov,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3356773.3356813",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:38 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3356773.3356813",
  abstract =     "Challenges of implementing successful research
                 collaborations between industry and academia in
                 software engineering are varied and many. Differing
                 timelines, metrics, expectations, and perceptions of
                 these two communities are some common obstacles,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Neumann:2019:RPd,
  author =       "Peter G. Neumann",
  title =        "Risks to the Public",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "5--10",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.3364453",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.3364453",
  abstract =     "RISKS items seem to be burgeoning, making it very
                 difficult to devote detailed accounts in the six pages
                 that our recent SEN sections are occupying. We try to
                 emphasize those items here that have the most content
                 relating to software engineer- ing and \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Bures:2019:SES,
  author =       "Tomas Bures and Danny Weyns and Bradley Schmerl and
                 John Fitzgerald and Adina Aniculaesei and Christian
                 Berger and Jo{\~a}o Cambeiro and Jan Carlson and
                 Shafiul Azam Chowdhury and Marian Daun and Nianyu Li
                 and Matthias Markthaler and Claudio Menghi and Birgit
                 Penzenstadler and Aedan Pettit and Robert Pettit and
                 Luca Sabatucci and Christos Tranoris and Hans
                 Vangheluwe and Sebastian Voss and Edith Zavala",
  title =        "Software Engineering for Smart Cyber-Physical Systems
                 {(SEsCPS} 2018) --- Workshop Report",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "11--13",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.3364465",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.3364465",
  abstract =     "Smart Cyber-Physical Systems (sCPS) are a novel kind
                 of Cyber- Physical System engineered to take advantage
                 of large-scale cooperation between devices, users and
                 environment to achieve added value in the face of
                 uncertainty and changing environments. \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Le:2019:SAG,
  author =       "Xuan-Bach D. Le and Corina Pasareanu and Rohan Padhye
                 and David Lo and Willem Visser and Koushik Sen",
  title =        "Saffron: Adaptive Grammar-based Fuzzing for Worst-Case
                 Analysis",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "14--14",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.3364455",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.3364455",
  abstract =     "Fuzz testing has been gaining ground recently with
                 substantial efforts devoted to the area. Typically,
                 fuzzers take a set of seed inputs and leverage random
                 mutations to continually improve the inputs with
                 respect to a cost, e.g. program code coverage,
                 \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Almaawi:2019:QEK,
  author =       "Alyas Almaawi and Hayes Converse and Milos Gligoric
                 and Sasa Misailovic and Sarfraz Khurshid",
  title =        "Quantifying the Exploration of the {Korat} Solver for
                 Imperative Constraints",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "15--15",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.3364456",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.3364456",
  abstract =     "Tools that explore very large state spaces to nd bugs,
                 e.g., when model checking, or to nd solutions, e.g.,
                 when constraint solving, can take a considerable amount
                 of time before the search terminates, and the user may
                 not get useful feedback on the \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Storey:2019:SDP,
  author =       "Kyle Storey and Eric Mercer and Pavel Parizek",
  title =        "A Sound Dynamic Partial Order Reduction Engine for
                 {Java Pathfinder}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "15--15",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.3364457",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.3364457",
  abstract =     "When model checking a multi-threaded program, it is
                 often necessary to enumerate the possible ordering of
                 concurrent events to evaluate the behavior of the
                 program. However, enumerating every possible order of
                 events quickly leads to state-space \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Noller:2019:CSS,
  author =       "Yannic Noller and Hoang Lam Nguyen and Minxing Tang
                 and Timo Kehrer and Lars Grunske",
  title =        "Complete Shadow Symbolic Execution with {Java
                 PathFinder}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "15--16",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.33644558",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.33644558",
  abstract =     "Regression testing ensures the correctness of the
                 software during its evolution, with special attention
                 on the absence of unintended side-effects that might be
                 introduced by changes. However, the manual creation of
                 regression test cases, which expose \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Saha:2019:IAS,
  author =       "Seemanta Saha and William Eiers and Ismet Burak Kadron
                 and Lucas Bang and Tevfik Bultan",
  title =        "Incremental Attack Synthesis",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "16--16",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.336445759",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.336445759",
  abstract =     "Information leakage is a significant problem in modern
                 software systems. Information leaks due to side
                 channels are especially hard to detect and analyze. In
                 recent years, techniques have been developed for
                 automated synthesis of adaptive side-channel \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Berglund:2019:MSJ,
  author =       "Lasse Berglund and Cyrille Artho",
  title =        "Method summaries for {JPF}",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "16--16",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.33644560",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.33644560",
  abstract =     "Java Pathfinder (JPF) is a virtual machine executing
                 Java byte-code that is able to perform model checking
                 using backtracking execution. Due to backtracking,
                 parts of a program may be executed multiple times
                 during model checking. Hence, we explore \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Chen:2019:SVR,
  author =       "Zhenbang Chen and Hengbiao Yu and Ji Wang and Wei
                 Dong",
  title =        "Symbolic Verification of Regular Properties for {Java}
                 Programs",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "17--17",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.33644561",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.33644561",
  abstract =     "Verifying the regular properties of a program is
                 challenging. In this extended abstract, we report our
                 recent progress of verifying regular properties based
                 on dynamic symbolic execution (DSE). We propose two
                 algorithms for DSE to improve the \ldots{}",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Namakonov:2019:SDR,
  author =       "Egor Namakonov and Eric Mercer and Pavel Parizek and
                 Kyle Storey",
  title =        "Symbolic data race detection for {Habanero} programs",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "18--18",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.33644562",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.33644562",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}

@Article{Hooker:2019:JHT,
  author =       "Joshua Hooker and Peter Aldous and Eric Mercer and
                 Benjamin Ogles and Kyle Storey and S. Jacob Powell",
  title =        "{JPF-HJ}: a Tool for Task Parallel Program Analysis",
  journal =      j-SIGSOFT,
  volume =       "44",
  number =       "4",
  pages =        "19--19",
  month =        dec,
  year =         "2019",
  CODEN =        "SFENDP",
  DOI =          "https://doi.org/10.1145/3364452.33644563",
  ISSN =         "0163-5948 (print), 1943-5843 (electronic)",
  ISSN-L =       "0163-5948",
  bibdate =      "Wed Mar 24 14:07:40 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/java2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/sigsoft2010.bib",
  URL =          "https://dl.acm.org/doi/10.1145/3364452.33644563",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM SIGSOFT Software Engineering Notes",
  journal-URL =  "https://dl.acm.org/loi/sigsoft",
}