Table of contents for issues of ACM SIGSOFT Software Engineering Notes

Last update: Thu Aug 1 11:56:30 MDT 2019                Valid HTML 3.2!

Volume 25, Number 1, January, 2000
Volume 25, Number 2, March, 2000
Volume 25, Number 3, May, 2000
Volume 25, Number 4, July, 2000
Volume 25, Number 5, September, 2000
Volume 25, Number 6, November, 2000
Volume 26, Number 1, January, 2001
Volume 26, Number 2, March, 2001
Volume 26, Number 3, May, 2001
Volume 26, Number 4, July, 2001
Volume 26, Number 5, September, 2001
Volume 26, Number 6, November, 2001
Volume 27, Number 1, January, 2002
Volume 27, Number 2, March, 2002
Volume 27, Number 3, May, 2002
Volume 27, Number 4, July, 2002
Volume 27, Number 5, September, 2002
Volume 27, Number 6, November, 2002
Volume 28, Number 1, January, 2003
Volume 28, Number 3, May, 2003
Volume 29, Number 2, March, 2004
Volume 29, Number 3, May, 2004
Volume 29, Number 4, July, 2004
Volume 29, Number 5, September, 2004
Volume 29, Number 6, November, 2004
Volume 30, Number 1, January, 2005
Volume 30, Number 2, March, 2005
Volume 30, Number 3, May, 2005
Volume 30, Number 4, July, 2005
Volume 30, Number 5, September, 2005
Volume 30, Number 6, November, 2005
Volume 31, Number 1, January, 2006
Volume 31, Number 2, March, 2006
Volume 31, Number 3, May, 2006
Volume 31, Number 4, July, 2006
Volume 31, Number 5, September, 2006
Volume 31, Number 6, November, 2006
Volume 32, Number 1, January, 2007
Volume 32, Number 2, March, 2007
Volume 32, Number 3, May, 2007
Volume 32, Number 4, July, 2007
Volume 32, Number 5, September, 2007
Volume 32, Number 6, November, 2007
Volume 33, Number 1, January, 2008
Volume 33, Number 2, March, 2008
Volume 33, Number 3, May, 2008
Volume 33, Number 4, July, 2008
Volume 33, Number 5, September, 2008
Volume 33, Number 6, November, 2008
Volume 34, Number 1, January, 2009
Volume 34, Number 2, March, 2009
Volume 34, Number 3, May, 2009
Volume 34, Number 4, July, 2009
Volume 34, Number 5, September, 2009
Volume 34, Number 6, November, 2009


ACM SIGSOFT Software Engineering Notes
Volume 25, Number 1, January, 2000

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 22--26
              Serge Demeyer and   
                    Harald Gall   Workshop on Object-Oriented
                                  Reengineering (WOOR'99)  . . . . . . . . 27
              V. T. Rajlich and   
                    S. Rank and   
                   N. Wilde and   
                  K. H. Bennett   Report on a workshop on software change
                                  and evolution  . . . . . . . . . . . . . 28--29
             Michael Evangelist   The NSF information technology research
                                  program  . . . . . . . . . . . . . . . . 30
                 Will Tracz and   
                 Wayne Stidolph   NSF software engineering and language
                                  program summaries  . . . . . . . . . . . 30--32
                    Rajeev Alur   Computer-aided verification of reactive
                                  systems  . . . . . . . . . . . . . . . . 32--33
                    Paul Ammann   System testing via mutation analysis of
                                  model checking specifications  . . . . . 33
                  Paul C. Attie   Efficient formal methods for the
                                  synthesis of concurrent programs . . . . 34
              Farokh B. Bastani   Relational programs  . . . . . . . . . . 34--35
                  David Binkley   Reducing the cost of regression testing  35--36
                     Bob Boothe   A fully capable bidirectional debugger   36--37
                  Tevfik Bultan   A composite model checking toolset for
                                  analyzing software systems . . . . . . . 37--38
            Margaret M. Burnett   NYI award: visual programming languages  38
               Larry Carter and   
                Jeanne Ferrante   CROPS: coordinated restructuring of
                                  programs and storage . . . . . . . . . . 38--39
              Richard H. Carver   Specification-based testing of
                                  concurrent programs  . . . . . . . . . . 39--40
              Betty H. C. Cheng   Integrating object-oriented analysis and
                                  formal specifications  . . . . . . . . . 40--41
               Edmund M. Clarke   Automatic verification of hardware and
                                  software systems . . . . . . . . . . . . 41--42
               Rance Cleaveland   Specification formalisms for
                                  component-based concurrent systems . . . 42--43
           Rance Cleaveland and   
            Philip M. Lewis and   
                Scott A. Smolka   Practical techniques for the design,
                                  specification, verification, and
                                  implementation of concurrent systems . . 43--44
               Jonathan E. Cook   Software process analysis: integrating
                                  models and data  . . . . . . . . . . . . 44
              Premkumar Devanbu   Framework for debugging domain-specific
                                  languages  . . . . . . . . . . . . . . . 45
                Laura K. Dillon   Automated support for testing and
                                  debugging of real-time programs using
                                  oracles  . . . . . . . . . . . . . . . . 45--46
           Matthew B. Dwyer and   
                  John Hatcliff   Adapting programming languages
                                  technologies for finite-state
                                  verification . . . . . . . . . . . . . . 46--49
               E. Allen Emerson   Automated formal methods: model checking
                                  and beyond . . . . . . . . . . . . . . . 49
             Matthias Felleisen   Components and program analyses  . . . . 49--50
                      Anonymous   Assessing and enhancing software testing
                                  effectiveness  . . . . . . . . . . . . . 50--51
                  Joseph Goguen   Hidden algebra and concurrent
                                  distributed software . . . . . . . . . . 51--52
               Deepak Goyal and   
                   Y. Annie Liu   Automated development of software for
                                  program analysis and transformation  . . 52--53
                 Carl A. Gunter   Automated analysis of standard ML  . . . 53
             Carl A. Gunter and   
             Elsa L. Gunter and   
                    Pamela Zave   Formal software engineering  . . . . . . 54
                    Gopal Gupta   Parallel implementation of Prolog: the
                                  ACE project  . . . . . . . . . . . . . . 54--55
             George T. Heineman   A model for designing adaptable software
                                  components . . . . . . . . . . . . . . . 55--56
            Thomas A. Henzinger   New directions in computer-aided
                                  verification . . . . . . . . . . . . . . 56--57
                   Michael Hind   NPIC --- New Paltz interprocedural
                                  compiler . . . . . . . . . . . . . . . . 57--58
                  Susan Horwitz   Debugging via run-time type checking . . 58
                     Paul Hudak   Principles of functional reactive
                                  programming  . . . . . . . . . . . . . . 59
              R. Jagadeesan and   
             K. Läufer and   
                       V. Gupta   The Triveni project  . . . . . . . . . . 59
               Bharat Jayaraman   Research on sets, constraints, and
                                  preferences  . . . . . . . . . . . . . . 60
                Patricia Johann   Testing and enhancing a prototype
                                  program fusion engine  . . . . . . . . . 60--61
              Philip M. Johnson   Project LEAP: lightweight, empirical,
                                  anti-measurement dysfunction, and
                                  portable software developer improvement  61
                   A. J. Kfoury   Type theory and rewriting theory for
                                  expressive, efficient and reliable
                                  programming languages  . . . . . . . . . 61--62
                Gary T. Leavens   Formal methods for multimethod software
                                  components . . . . . . . . . . . . . . . 62--63
                  Harry Mairson   Programming language foundations of
                                  computation theory . . . . . . . . . . . 63
              Spiros Mancoridis   Toward a design environment for
                                  recovering and maintaining the structure
                                  of software systems  . . . . . . . . . . 63--64
      José Mesenguer and   
                Carolyn Talcott   Semantic interoperation of open systems  64--65
              Naftaly H. Minsky   Towards architectural invariants of
                                  evolving systems . . . . . . . . . . . . 65
             Michael W. Mislove   Semantic models for concurrency  . . . . 65--66
               Gopalan Nadathur   A framework for realizing derivation
                                  systems  . . . . . . . . . . . . . . . . 66--67
           George C. Necula and   
                    Shree Rahul   A logic-based approach to software
                                  system safety and security . . . . . . . 67--68
                    Jeff Offutt   Software testing and analysis of
                                  object-oriented software . . . . . . . . 68
               Ronald A. Olsson   Concurrent programming language support
                                  for invocation handling: design and
                                  implementation . . . . . . . . . . . . . 68--69
             Benjamin C. Pierce   The essence of objects . . . . . . . . . 69--71
                Enrico Pontelli   Parallel and distributed execution of
                                  constraint programs  . . . . . . . . . . 71--72
          Václav Rajlich   A model and a tool for change
                                  propagation in software  . . . . . . . . 72
             C. R. Ramakrishnan   Tabled logic programming for
                                  verification and program analysis  . . . 73
         C. R. Ramakrishnan and   
         I. V. Ramakrishnan and   
            Scott A. Smolka and   
                David S. Warren   Specification and evaluation of
                                  logic-based model checking . . . . . . . 73--74
              David F. Redmiles   Improving the design of interactive
                                  software . . . . . . . . . . . . . . . . 74--75
               John C. Reynolds   The design, definition and
                                  implementation of programming languages  75
                    D. Rine and   
                        N. Nada   Public case-base and tool kit using a
                                  validated RRM  . . . . . . . . . . . . . 76
        Gruia-Catalin Roman and   
               Delbert Hart and   
                 Eileen Kraemer   Exploratory visualization  . . . . . . . 76--77
        Gruia-Catalin Roman and   
                  Amy L. Murphy   Rapid development of dependable
                                  applications over Ad hoc networks  . . . 77--78
             David S. Rosenblum   CAREER: mechanisms for ensuring the
                                  integrity of distributed object systems  78--79
                Gregg Rothermel   Testing and maintaining evolving
                                  software systems . . . . . . . . . . . . 79--80
            Spencer Rugaber and   
                    Linda Wills   Software evolution and interleaving  . . 80
                  Andre Scedrov   A language-based security analysis . . . 80--81
                  David Schmidt   Abstract interpretation and program
                                  modelling  . . . . . . . . . . . . . . . 81--82
                     Zhong Shao   Typed common intermediate format . . . . 82
              Forrest Shull and   
           Victor R. Basili and   
               Marvin Zelkowitz   The experimental validation and
                                  packaging of software technologies . . . 82--83
               A. Prasad Sistla   Formal methods in concurrent and
                                  distributed systems  . . . . . . . . . . 84
                Carol S. Smidts   An approach to the automatic generation
                                  of software functional architecture  . . 84--85
             Geoffrey Smith and   
                 Dennis Volpano   Basic research in information privacy    86
               David B. Stewart   Automated analysis and fine-tuning of
                                  timing properties in embedded real-time
                                  systems  . . . . . . . . . . . . . . . . 86--87
                 Terrance Swift   Principles, practice, and applications
                                  of tabled logic programming  . . . . . . 87--88
                      K. C. Tai   Analysis and testing of concurrent
                                  object-oriented software . . . . . . . . 88
                      Jeff Tian   Early measurement and improvement of
                                  software reliability . . . . . . . . . . 89
          Pascal Van Hentenryck   Constraint programming . . . . . . . . . 89--90
       Bradley T. Vander Zanden   New visualization and debugging
                                  technology for one-way dataflow
                                  constraints  . . . . . . . . . . . . . . 90--91
                  Mitchell Wand   Analysis-based program transformations   91--92
              Mitchell Wand and   
             William D. Clinger   Optimizing memory usage in higher-order
                                  programming languages: theoretical and
                                  experimental studies . . . . . . . . . . 92
             Elizabeth L. White   General strategies for dynamic
                                  reconfiguration  . . . . . . . . . . . . 93
                 Steven J. Zeil   Reliability growth modeling from fault
                                  failure rates  . . . . . . . . . . . . . 94
                 Wayne Stidolph   Evolutionary Design of Complex Software
                                  (EDCS) demonstration days 1999 . . . . . 95
                      Anonymous   Acme and AcmeStudio  . . . . . . . . . . 96
            William L. Scherlis   Adaptation and commitment technology
                                  (ACT)  . . . . . . . . . . . . . . . . . 96
             Richard Taylor and   
                 David Redmiles   Arabica  . . . . . . . . . . . . . . . . 96
             Victoria Stavridou   Architectural analysis of
                                  component-based systems  . . . . . . . . 96--97
                      Anonymous   ARGUS-1: ``All-Seeing'' architectural
                                  analysis . . . . . . . . . . . . . . . . 97
             Richard Taylor and   
                 David Redmiles   ArchStudio . . . . . . . . . . . . . . . 97
             Richard Taylor and   
                 David Redmiles   Argo/UML . . . . . . . . . . . . . . . . 97
                  Garry Brannum   Capability packages for avionics
                                  software (CPAS)  . . . . . . . . . . . . 98
               Bill Carlson and   
                  Chris Garrity   Ewatch . . . . . . . . . . . . . . . . . 98
                 Gail E. Kaiser   Internet-based information management
                                  technology . . . . . . . . . . . . . . . 98
             Richard Taylor and   
                 David Redmiles   Chimera  . . . . . . . . . . . . . . . . 98
          Dennis Heimbigner and   
              Alexander L. Wolf   Distributed software engineering . . . . 99
                  David Luckham   Complex event processing (CEP) . . . . . 99
                 Tim Teitelbaum   CodeSurfer . . . . . . . . . . . . . . . 99
             Gio Wiederhold and   
          Dorothea Beringer and   
                Neal Sample and   
               Laurence Melloul   Composition of multi-site software
                                  (CHAIMS) . . . . . . . . . . . . . . . . 99--100
                     Bob Blazer   A COTS-based design editor for user
                                  specified domains  . . . . . . . . . . . 100
               Debra Richardson   DAS-BOOT: design-, architecture- and
                                  specification-based approaches to
                                  object-oriented testing  . . . . . . . . 100
             Karl J. Lieberherr   Demeter/adaptive programming . . . . . . 100--101
                Spencer Rugaber   Esprit de Corps Suite  . . . . . . . . . 101
             Richard Taylor and   
                 David Redmiles   Endeavors  . . . . . . . . . . . . . . . 101
             Richard Taylor and   
                 David Redmiles   Expectation-driven event monitoring  . . 101
                   Steve Vestal   DoME . . . . . . . . . . . . . . . . . . 101
             Leon Osterweil and   
                 Lori A. Clarke   FLAVERS  . . . . . . . . . . . . . . . . 101--102
              Sidney Bailin and   
                  Dean Allemang   Formal alternative management
                                  integrating logical inference and
                                  rationals (FAMILIAR) . . . . . . . . . . 102
                   Steve Vestal   Incremental constraint engine  . . . . . 102--103
                 Gail E. Kaiser   Internet-based information management
                                  technology . . . . . . . . . . . . . . . 103
                  John Lehoczky   INSERT --- Incremental Software
                                  Evolution for Real-Time Systems  . . . . 103
                     Don Batory   Jakarta Tool Suite (JTS) . . . . . . . . 103--104
              Jose Meseguer and   
                Carolyn Talcott   Maude  . . . . . . . . . . . . . . . . . 104
             Leon Osterweil and   
                 Lori A. Clarke   Little-JIL . . . . . . . . . . . . . . . 104
             Richard Taylor and   
                 David Redmiles   Knowledge depot  . . . . . . . . . . . . 104
                Barry Boehm and   
                Neno Medvidovic   Model-based (systems) architecting and
                                  software engineering (MBASE) . . . . . . 104--105
              Lewis Johnson and   
                 Stacy Marsella   MediaDoc: automated generation of
                                  multimedia explanatory presentations . . 105
                   Gabor Karsai   Model integrated computing (MIC) . . . . 105
                   Steve Vestal   MetaH  . . . . . . . . . . . . . . . . . 105
                Daniel Reed and   
                   Simon Kaplan   ORBIT/VIRTUE --- collaboration and
                                  visualization support for complex
                                  systems evolution  . . . . . . . . . . . 105--106
                Barry Boehm and   
                Neno Medvidovic   Software architecture, analysis,
                                  generation, and evolution (SAAGE)  . . . 106
                   Michal Young   High assurance technologies  . . . . . . 106
                     Bob Balzer   Securely wrapping COTS products  . . . . 106--107
               Debra Richardson   Siddhartha --- automated test
                                  driver-oracle synthesis  . . . . . . . . 106--107
                   Jim McDonald   Specware . . . . . . . . . . . . . . . . 107
               Debra Richardson   SoBelt: structural and behavioral
                                  execution instrumentation tool . . . . . 107
                Alexander Egyed   UML/Analyzer --- a system for defining
                                  and analyzing the conceptual integrity
                                  of UML models  . . . . . . . . . . . . . 108
               Debra Richardson   TestTalk: software test description
                                  language . . . . . . . . . . . . . . . . 108
             Richard Taylor and   
                 David Redmiles   WebDAV . . . . . . . . . . . . . . . . . 108
               L. B. S. Raccoon   A whole new kind of engineering  . . . . 109--113
              Vincent Traas and   
          Jos van Hillegersberg   The software component market on the
                                  Internet: current status and conditions
                                  for growth . . . . . . . . . . . . . . . 114

ACM SIGSOFT Software Engineering Notes
Volume 25, Number 2, March, 2000

            William G. Griswold   Guilds or virtual countries? the future
                                  of software professionals  . . . . . . . 2--2
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 8--16
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 17--21
     Elke Pulvermüller and   
                  Andreas Speck   Towards generative components  . . . . . 22--24
                Ethan V. Munson   Representations, tools, and services for
                                  the complete integration of software
                                  development documents  . . . . . . . . . 25--25
               Salvatore Mamone   Documentation testing  . . . . . . . . . 26--29
                      Tom Adams   The God of inspection  . . . . . . . . . 30--30
             Rakesh Agarwal and   
            Arup Ratan Raha and   
                  Bhaskar Ghosh   Our experience and learning in ERP
                                  implementation . . . . . . . . . . . . . 31--34
            Matjaz B. Juric and   
                Ivan Rozman and   
             Marjan Hericko and   
                 Tomaz Domajnko   Integrating legacy systems in
                                  distributed object architecture  . . . . 35--39
                       Hong Mei   A complementary approach to requirements
                                  engineering---software architecture
                                  orientation  . . . . . . . . . . . . . . 40--45
Miren Begoña Albizuri-Romero   A retrospective view of CASE tools
                                  adoption . . . . . . . . . . . . . . . . 46--50
             Ramkumar Ramaswamy   Latency in distributed, sequential
                                  application designs  . . . . . . . . . . 51--55
              Xiaodong Yuan and   
                      Ying Feng   The optimization of class hierarchy in
                                  object-oriented design . . . . . . . . . 56--59
                    Yan Han and   
                Xu Chun-Gen and   
            Zhang Gong-Xuan and   
                    Liu Feng-Yu   Constraint specification for object
                                  model of access control based on role    60--63
                    Yan Han and   
                 Liu Fengyu and   
                     Zhang Hong   An object-oriented model of access
                                  control based on role  . . . . . . . . . 64--68

ACM SIGSOFT Software Engineering Notes
Volume 25, Number 3, May, 2000

                   David Notkin   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 5--10
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 15--23
                 Reidar Conradi   Summary from 7th European Software
                                  Process Workshop (EWSPT'7), Kaprun near
                                  Salzburg, 21--25 Feb. 2000 . . . . . . . 23--23
           Bharath M. Kumar and   
        R. Lakshminarayanan and   
                  Y. N. Srikant   A study of automatic migration of
                                  programs across the Java event models    24--29
           Anu Singh Lather and   
               Shakti Kumar and   
                   Yogesh Singh   Suitability assessment of software
                                  developers: a fuzzy approach . . . . . . 30--31
                  Wang Chen and   
                  Zhou Ying and   
                     Zhang Defu   An efficient method for expressing
                                  active object in C++ . . . . . . . . . . 32--35
          Zhou Yonglin PanYunhe   Agent-oriented analysis and modeling . . 36--40
                Peter Kokol and   
            Vili Podgorelec and   
         Ana Isabel Cardoso and   
                   Francis Dion   Assessing the state of the software
                                  process development using the chaos
                                  theory . . . . . . . . . . . . . . . . . 41--43
                Peter Kokol and   
            Vili Podgorelec and   
               Francis Dion and   
                  Rich de Loach   Intellectual energy in software design   44--45
                 Dragan Milicev   Customizable output generation in
                                  modeling environments using pipelined
                                  domains  . . . . . . . . . . . . . . . . 46--50
         Sakib Abdul Mondal and   
             Kingshuk Das Gupta   Choosing a middleware for
                                  web-integration of a legacy application  50--53
                 Luyin Zhao and   
               Sebastian Elbaum   A survey on quality related activities
                                  in open source . . . . . . . . . . . . . 54--57
           Parasuram Anantharam   Modelling systems  . . . . . . . . . . . 58--58
                   Tom Anderson   The distributed Smalltalk survival guide 58--58
              Luigi Benedicenti   Rethinking smart objects: building
                                  artificial intelligence with objects . . 59--59
          Kenneth W. Boyer, Jr.   Test process improvement: a practical
                                  step-by-step guide to structured testing 59--60
                    Claude Caci   Testing object-oriented systems  . . . . 60--61
                 Peter Claussen   Theories of programming languages  . . . 61--62
                 Peter Claussen   Concurrent programming in ML . . . . . . 62--63
                   Ron Dinishak   The optimal implementation of functional
                                  programming languages  . . . . . . . . . 63--63
                      Chang Liu   Term rewriting and all that  . . . . . . 63--63
              Srinivas Nedunuri   The functional approach to programming   63--65
                 Tathagat Varma   Automated software testing:
                                  introduction, management and performance 65--65
             Debora Weber-Wulff   Object-oriented software engineering:
                                  conquering complex and changing systems  65--66
               Bradley S. Green   Software test automation . . . . . . . . 66--66

ACM SIGSOFT Software Engineering Notes
Volume 25, Number 4, July, 2000

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 7--11
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 12--20
      Andreas Schmietendorf and   
               Reiner Dumke and   
                    Erik Foltin   Metrics based asset assessment . . . . . 51--55
               Dragan Bojic and   
                Dusan Velasevic   Reverse Engineering of Use Case
                                  Realizations in UML  . . . . . . . . . . 56--61
           Sorana C\^\impan and   
                 Flavio Oquendo   OMEGA: a language and system for on-line
                                  monitoring of software-intensive
                                  processes  . . . . . . . . . . . . . . . 62--68
               Dragos Manolescu   Book Review: \booktitleProduction
                                  Workflow-Concepts and Techniques by
                                  Frank Leymann and Dieter Roller
                                  (Prentice Hall PTR, 2000, ISBN
                                  0-13-02175-0, 479 pp.) . . . . . . . . . 69

ACM SIGSOFT Software Engineering Notes
Volume 25, Number 5, September, 2000

                     Jon Pincus   Analysis is necessary, but far from
                                  sufficient (abstract only): Experiences
                                  building and deploying successful tools
                                  for developers and testers . . . . . . . 1--1
      Karthikeyan Bhargavan and   
             Carl A. Gunter and   
                Moonjoo Kim and   
                  Insup Lee and   
            Davor Obradovic and   
              Oleg Sokolsky and   
             Mahesh Viswanathan   Verisim: Formal analysis of network
                                  simulations  . . . . . . . . . . . . . . 2--13
             Daniel Jackson and   
                 Mandana Vaziri   Finding bugs with a constraint solver    14--25
                Tal Lev-Ami and   
                Thomas Reps and   
                Mooly Sagiv and   
               Reinhard Wilhelm   Putting static analysis to work for
                                  verification: a case study . . . . . . . 26--38
                    Ugo Buy and   
            Alessandro Orso and   
                    Mauro Pezze   Automated Testing of Classes . . . . . . 39--48
             Amie L. Souter and   
                Lori L. Pollock   OMEN: a strategy for testing
                                  object-oriented software . . . . . . . . 49--59
              Jean Hartmann and   
         Claudio Imoberdorf and   
              Michael Meisinger   UML-Based integration testing  . . . . . 60--70
                    Dick Hamlet   On subdomains: Testing, profiles, and
                                  components . . . . . . . . . . . . . . . 71--76
           Dennis K. Peters and   
                David L. Parnas   Requirements-based monitors for
                                  real-time systems  . . . . . . . . . . . 77--85
             Paul Z. Kolano and   
            Richard A. Demmerer   Classification schemes to aid in the
                                  analysis of real-time systems  . . . . . 86--95
       Jamieson M. Cobleigh and   
              Lori A. Clark and   
              Leon J. Osterweil   Verifying properties of process
                                  definitions  . . . . . . . . . . . . . . 96--101
           Sebastian Elbaum and   
      Alexey G. Malishevsky and   
                Gregg Rothermel   Prioritizing test cases for regression
                                  testing  . . . . . . . . . . . . . . . . 102--112
               Michael Hind and   
                  Anthony Pioli   Which pointer analysis should I use? . . 113--123
          Phyllis G. Frankl and   
                   Yuetang Deng   Comparison of delivered reliability of
                                  branch, data flow and operational
                                  testing: a case study  . . . . . . . . . 124--134
           Ralf Hildebrandt and   
                 Andreas Zeller   Simplifying failure-inducing input . . . 135--145
                 Lori A. Clarke   Finite state verification (abstract
                                  only): an emerging technology for
                                  validating software systems  . . . . . . 146--146
                David Chays and   
                 Saikat Dan and   
          Phyllis G. Frankl and   
        Filippos I. Vokolos and   
              Elaine J. Weyuker   A framework for testing database
                                  applications . . . . . . . . . . . . . . 147--157
                John Steven and   
             Pravir Chandra and   
                  Bob Fleck and   
                 Andy Podgurski   jRapture: a Capture/Replay tool for
                                  observation-based testing  . . . . . . . 158--167
         Martin R. Woodward and   
          Zuhoor A. Al-Khanjari   Testability, fault size and the
                                  domain-to-range ratio: an eternal
                                  triangle . . . . . . . . . . . . . . . . 168--172
       Patrick J. Schroeder and   
                   Bogdan Korel   Black-box test reduction using
                                  input-output analysis  . . . . . . . . . 173--177
            Craig H. Wittenberg   Progress in testing component-based
                                  software (abstract only) . . . . . . . . 178
                     David Dill   Model checking Java programs (abstract
                                  only)  . . . . . . . . . . . . . . . . . 179
        Mangala Gowri Nanda and   
                      S. Ramesh   Slicing concurrent programs  . . . . . . 180--190
          Stephen F. Siegel and   
              George S. Avrunin   Improving the precision of INCA by
                                  preventing spurious cycles . . . . . . . 191--200
              Daniel Schulz and   
                  Frank Mueller   A thread-aware debugger with an open
                                  interface  . . . . . . . . . . . . . . . 201--211

ACM SIGSOFT Software Engineering Notes
Volume 25, Number 6, November, 2000

             Richard A. DeMillo   Software development for next generation
                                  communication networks . . . . . . . . . 1
        Martin P. Robillard and   
                 Gail C. Murphy   Designing robust Java programs with
                                  exceptions . . . . . . . . . . . . . . . 2--10
    Joseph E. Hollingsworth and   
           Lori Blankenship and   
                 Bruce W. Weide   Experience report: using RESOLVE/C++ for
                                  commercial software  . . . . . . . . . . 11--19
            Reimer Behrends and   
           R. E. Kurt Stirewalt   The universe model: an approach for
                                  improving the modularity and reliability
                                  of concurrent programs . . . . . . . . . 20--29
              Atif M. Memon and   
          Martha E. Pollack and   
                 Mary Lou Soffa   Automated test oracles for GUIs  . . . . 30--39
          Patrice Godefroid and   
       Lalita J. Jagadeesan and   
           Radha Jagadeesan and   
         Konstantin Läufer   Automated systematic testing for
                                  constraint-based interactive services    40--49
           Sergey Butkevich and   
               Marco Renedo and   
         Gerald Baumgartner and   
                   Michal Young   Compiler and tool support for debugging
                                  object protocols . . . . . . . . . . . . 50--59
                  Yunwen Ye and   
            Gerhard Fischer and   
                   Brent Reeves   Integrating active information delivery
                                  and reuse repository systems . . . . . . 60--68
           Robert J. Walker and   
                 Gail C. Murphy   Implicit context: easing software
                                  evolution and reuse  . . . . . . . . . . 69--78
              Richard D. Pethia   Bugs in the programs . . . . . . . . . . 79
            Tetsuo Yamamoto and   
          Makoto Matsushita and   
                  Katsuro Inoue   Accumulative versioning file system
                                  Moraine and its application to metrics
                                  environment MAME . . . . . . . . . . . . 80--87
        Mark C. Chu-Carroll and   
                  Sara Sprenkle   Coven: brewing better collaboration
                                  through software configuration
                                  management . . . . . . . . . . . . . . . 88--97
           Peter F. Sweeney and   
                      Frank Tip   Extracting library-based object-oriented
                                  applications . . . . . . . . . . . . . . 98--107
          Leon J. Osterweil and   
             Lori A. Clarke and   
         Michael Evangelist and   
             Jeffrey Kramer and   
             Dieter Rombach and   
              Alexander L. Wolf   The impact project (panel session):
                                  determining the impact of software
                                  engineering research upon practice . . . 108--109
            Jonathan D. Hay and   
                Joanne M. Atlee   Composing features and resolving
                                  interactions . . . . . . . . . . . . . . 110--119
        Gerald Lüttgen and   
      Michael von der Beeck and   
               Rance Cleaveland   A compositional approach to statecharts
                                  semantics  . . . . . . . . . . . . . . . 120--129
                 Daniel Jackson   Automating first-order relational logic  130--139
             Marco Bernardo and   
           Paolo Ciancarini and   
             Lorenzo Donatiello   On the formalization of architectural
                                  types with process algebras  . . . . . . 140--148
             Daniel Jackson and   
                 Kevin Sullivan   COM revisited: tool-assisted modelling
                                  of an architectural framework  . . . . . 149--158
             Gleb Naumovich and   
                 Lori A. Clarke   Classifying properties: an alternative
                                  to the safety-liveness classification    159--168
              Richard F. Rashid   The shape of things to come? . . . . . . 169


ACM SIGSOFT Software Engineering Notes
Volume 26, Number 1, January, 2001

               Donald J. Bagert   FASE: a software engineering, education,
                                  training and professional issues
                                  publication  . . . . . . . . . . . . . . 6--6
                    Tope Omitol   ACM Fellow profile: Roger Needham  . . . 7--10
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 11--13
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 14--38
           José Meseguer   Report on ETAPS 2000 . . . . . . . . . . 39--39
                 John Penix and   
               Nigel Tracey and   
                  Willem Visser   The First International Workshop on
                                  Automated Program Analysis, Testing and
                                  Verification . . . . . . . . . . . . . . 40--40
             Jens H. Jahnke and   
               Joerg P. Wadsack   ISE3: the Third International Workshop
                                  on Intelligent Software Engineering open
                                  issues, new techniques, challenge
                                  problems in software engineering . . . . 43--43
           Susan Elliot Sim and   
                 Rainer Koschke   WoSEF: Workshop on Standard Exchange
                                  Format . . . . . . . . . . . . . . . . . 44--49
             Michael W. Godfrey   Practical data exchange for reverse
                                  engineering frameworks: some
                                  requirements, some experience, some
                                  headaches  . . . . . . . . . . . . . . . 50--52
  Sébastien Lapierre and   
           Bruno Laguë and   
                  Charles Leduc   Datrix \TM source code model and its
                                  interchange format: lessons learned and
                                  considerations for future work . . . . . 53--56
               Holger M. Kienle   Exchange format bibliography . . . . . . 56--60
                  John Dean and   
         Patricia Oberndorf and   
                Mark Vigder and   
                 Chris Abts and   
             Hakan Erdogmus and   
                Neil Maiden and   
             Michael Looney and   
            George Heineman and   
          Michael Guntersdorfer   COTS workshop: continuing collaborations
                                  for successful COTS development  . . . . 61--73
          Philippe Palanque and   
                Fabio Patern\`o   Design, specification, and verification
                                  of interactive systems . . . . . . . . . 74--75
           Yogesh Deshpande and   
                  San Murugesan   Summary of the Second ICSE workshop on
                                  Web Engineering  . . . . . . . . . . . . 76--77
                  Peri Tarr and   
           William Harrison and   
              Harold Ossher and   
       Anthony Finkelsteiin and   
            Bashar Nuseibeh and   
                  Dewayne Perry   Workshop on Multi-Dimensional Separation
                                  of Concerns in Software Engineering  . . 78--81
               L. B. S. Raccoon   Definitions and demographics . . . . . . 82--91
               L. B. S. Raccoon   A conversation with Erwin Goodhack . . . 92--92
                  Alan Abrahams   Planning for real time event response
                                  management . . . . . . . . . . . . . . . 93--94
         Mordechai Ben-Menachem   Writing effective use cases  . . . . . . 94--95
          Kenneth W. Boyer, Jr.   More C++ gems  . . . . . . . . . . . . . 95--95
                     Ken Frazer   Accelerated C++: practical programming
                                  by example . . . . . . . . . . . . . . . 95--96
                     Andy Huber   Creating high performance software
                                  development teams  . . . . . . . . . . . 96--97
               Albert L. Larsen   Java programming: from the beginning . . 97--98
                        Jim Law   Selected papers on analysis of
                                  algorithms . . . . . . . . . . . . . . . 98--99
         Victor M. Madrigal III   Fundamentals of OOP and data structures
                                  in Java  . . . . . . . . . . . . . . . . 99--99
               Dragos Manolescu   Production workflow: concepts and
                                  techniques . . . . . . . . . . . . . . . 99--100
                Daryl Kulak and   
                  Eamonn Guiney   Use cases: requirements in context . . . 101--101

ACM SIGSOFT Software Engineering Notes
Volume 26, Number 2, March, 2001

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 5--11
                    Greg Cooper   ACM Fellow profile: Frank L. Friedman    12--13
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 14--23
           Tarja Systä and   
           Rudolf K. Keller and   
                  Kai Koskimies   Summary report of the OOPSLA 2000
                                  Workshop on Scenario-Based Round-Trip
                                  Engineering  . . . . . . . . . . . . . . 24--28
              Peter Knauber and   
                Giancarlo Succi   Perspectives on software product lines:
                                  report on First International Workshop
                                  on Software Product Lines: Economics,
                                  Architectures, and Implications Workshop
                                  #15 at 22nd International Conference on
                                  Software Engineering (ICSE)  . . . . . . 29--33
         Lawrence Bernstein and   
                David Klappholz   Teaching old software dogs, old tricks   33--34
        Miguel Angel Laguna and   
José Manuel Marqués and   
Francisco José García   A user requirements elicitation tool . . 35--37
          Zorica Mihajlovic and   
                Dusan Velasevic   Tracking software projects with the
                                  integrated version control in SMIT . . . 38--43
                   Lu Zhang and   
                    Dan Xie and   
                        Wei Zou   Viewing use cases as active objects  . . 44--48
                  Wang Shaofeng   The role of Java RMI in designing
                                  workflow management system . . . . . . . 49--52
                   Hong Mei and   
                   Lu Zhang and   
                    Fuqing Yang   A software configuration management
                                  model for supporting component-based
                                  software development . . . . . . . . . . 53--58
              Jacob Sukhodolsky   Optimizing software process control  . . 59--63
                 Colin Bird and   
                  Andrew Sermon   An XML-based approach to automated
                                  software testing . . . . . . . . . . . . 64--65
           Alexander Romanovsky   Coordinated atomic actions: how to
                                  remain ACID in the modern world  . . . . 66--68
              Jonathan P. Bowen   Experience teaching Z with tool and web
                                  support  . . . . . . . . . . . . . . . . 69--75
           Parasuram Anantharam   Essentials of the Java programming
                                  language: a hands-on guide . . . . . . . 76--76
               Isaac Pentinmaki   Standard C++ IOStreams and locales:
                                  advanced programmer's guide and
                                  reference  . . . . . . . . . . . . . . . 76--77
                   Meyer Tanuan   Building application servers . . . . . . 77--77

ACM SIGSOFT Software Engineering Notes
Volume 26, Number 3, May, 2001

           Murali Sitaraman and   
             Greg Kulczycki and   
                 Joan Krone and   
           William F. Ogden and   
                 A. L. N. Reddy   Performance specification of software
                                  components . . . . . . . . . . . . . . . 3--10
               Marija Rakic and   
               Nenad Medvidovic   Increasing the confidence in
                                  off-the-shelf components: a software
                                  connector-based approach . . . . . . . . 11--18
         Regina M. M. Braga and   
              Marta Mattoso and   
    Cláudia M. L. Werner   The use of mediation and ontology
                                  technologies for software component
                                  information retrieval  . . . . . . . . . 19--28
             Katsuhisa Maruyama   Automated method-extraction refactoring
                                  by using block-based slicing . . . . . . 31--40
        Margaretha W. Price and   
          Donald M. Needham and   
       Steven A. Demurjian, Sr.   Producing reusable object-oriented
                                  components: a
                                  domain-and-organization-specific
                                  perspective  . . . . . . . . . . . . . . 41--50
                Greg Butler and   
                      Lugang Xu   Cascaded refactoring for framework . . . 51--57
                  Jun-Jang Jang   An approach to designing reusable
                                  service frameworks via virtual service
                                  machine  . . . . . . . . . . . . . . . . 58--66
               Hassan Gomaa and   
   Daniel A. Menascé and   
                Michael E. Shin   Reusable component interconnection
                                  patterns for distributed software
                                  architectures  . . . . . . . . . . . . . 69--77
            Yasuyuki Tahara and   
           Nobukazu Toshiba and   
             Akihiko Ohsuga and   
               Shinichi Honiden   Secure and efficient mobile agent
                                  application reuse using patterns . . . . 78--85
       R. E. Kurt Stirewalt and   
                Laura K. Dillon   Generation of visitor components that
                                  implement program transformations  . . . 86--94
       Roland T. Mittermeir and   
             Andreas Bollin and   
           Heinz Pozewaunig and   
      Dominik Rauner-Reithmayer   Goal-driven combination of software
                                  comprehension approaches for component
                                  based development  . . . . . . . . . . . 95--102
              Critina Gacek and   
        Michalis Anastasopoules   Implementing product line variabilities  109--117
          Eila Niemelä and   
                    Tuomas Ihme   Product line software engineering of
                                  embedded systems . . . . . . . . . . . . 118--125
             Felix Bachmann and   
                       Len Bass   Managing variability in software
                                  architectures  . . . . . . . . . . . . . 126--132
            Juha Savolainen and   
                   Juha Kuusela   Violatility analysis framework for
                                  product lines  . . . . . . . . . . . . . 133--141
             Silke Eckstein and   
            Peter Ahlbrecht and   
                   Karl Neumann   Techniques and language constructs for
                                  developing generic informations systems:
                                  a case study . . . . . . . . . . . . . . 145--154
                    Maya Daneva   Evaluating the value-added benefits of
                                  using requirements reuse metrics in ERP
                                  projects . . . . . . . . . . . . . . . . 155--163
                   Tak Wong and   
              Stan Jarzabek and   
               Soe Myat Swe and   
                    Ru Shen and   
                   Hongyu Zhang   XML implementation of frame processor    164--172
               Manzour Zand and   
               Paul Bassett and   
Rubén Prieto-Díaz   Closing panel (panel session): where are
                                  we standing? can we say ``reuse is dead,
                                  long live reuse'' or is it too soon? . . 173--175
        Rajagopalan Desikan and   
                Doug Burger and   
             Stephen W. Keckler   Measuring experimental error in
                                  microprocessor simulation  . . . . . . . 266--277

ACM SIGSOFT Software Engineering Notes
Volume 26, Number 4, July, 2001

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 3--12
                    Greg Cooper   ACM Fellow profile: Eugene H. Spafford   13--16
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 17--26
                   Tom Mens and   
             Michel Wermelinger   Formal Foundations of Software
                                  Evolution: workshop report . . . . . . . 27--29
                      Anonymous   Limits to software estimation  . . . . . 54--59
                      Anonymous   Estimating software projects . . . . . . 60--67
                      John Long   Software reuse antipatterns  . . . . . . 68--76
        Krishnan Rangarajan and   
             N. Swaminathan and   
                Vishu Hegde and   
                    Jacob Jacob   Product quality framework: a vehicle for
                                  focusing on product quality goals  . . . 77--82
                      Anonymous   An automated oracle for verifying GUI
                                  objects  . . . . . . . . . . . . . . . . 83--88
           Parasuram Anantharam   Programming ruby . . . . . . . . . . . . 89--89
          Kenneth W. Boyer, Jr.   Function point analysis: measurement
                                  practices for successful software
                                  projects . . . . . . . . . . . . . . . . 90--90
                    Jim Horning   Book Review: \booktitleSoftware
                                  fundamentals: collected papers by David
                                  L. Parnas  . . . . . . . . . . . . . . . 91--91
                        Jim Law   Quantum computation and quantum
                                  information  . . . . . . . . . . . . . . 91--91

ACM SIGSOFT Software Engineering Notes
Volume 26, Number 5, September, 2001

                David Rosenblum   Taming architectural evolution . . . . . 1--10
         Yoshitomi Morisawa and   
                     Koji Torii   An architectural style of product lines
                                  for distributed processing systems, and
                                  practical selection method . . . . . . . 11--20
         Michel Wermelinger and   
       Antónia Lopes and   
      José Luiz Fiadeiro   A graph based architectural
                                  (Re)configuration language . . . . . . . 21--32
          Timothy J. Sliski and   
        Matthew P. Billmers and   
             Lori A. Clarke and   
              Leon J. Osterweil   An architecture for flexible, evolvable
                                  process-driven user-guidance
                                  environments . . . . . . . . . . . . . . 33--43
                 Nima Kaveh and   
              Wolfgang Emmerich   Deadlock detection in distribution
                                  object systems . . . . . . . . . . . . . 44--51
         Ramesh Jagannathan and   
          Paolo A. G. Sivilotti   Increasing client-side confidence in
                                  remote component implementations . . . . 52--61
             Daniel Jackson and   
            Ilya Shlyakhter and   
                 Manu Sridharan   A micromodularity mechanism  . . . . . . 62--73
          Sebastian Uchitel and   
                Jeff Kramer and   
                     Jeff Magee   Detecting implied scenarios in message
                                  sequence chart specifications  . . . . . 74--82
                 Peter Wendorff   A formal approach to the assessment and
                                  improvement of terminological models
                                  used in information systems engineering  83--87
               Yvonne Coady and   
            Gregor Kiczales and   
                Mike Feeley and   
                    Greg Smolyn   Using aspectC to improve the modularity
                                  of path-specific customization in
                                  operating system code  . . . . . . . . . 88--98
          Kevin J. Sullivan and   
        William G. Griswold and   
               Yuanfang Cai and   
                     Ben Hallen   The structure and value of modularity in
                                  software design  . . . . . . . . . . . . 99--108
             Luca de Alfaro and   
            Thomas A. Henzinger   Interface automata . . . . . . . . . . . 109--120
            Paola Inverardi and   
                 Massimo Tivoli   Automatic synthesis of deadlock free
                                  connectors for COM/DCOM applications . . 121--131
                   L. Davis and   
                  R. Gamble and   
                  J. Payton and   
G. Jónsdóttir and   
                   D. Underwood   A notation for problematic architecture
                                  interactions . . . . . . . . . . . . . . 132--141
      Alberto Coen-Porisini and   
            Giovanni Denaro and   
               Carlo Ghezzi and   
             Mauro Pezzé   Using symbolic execution for verifying
                                  safety-critical systems  . . . . . . . . 142--151
               Kathi Fisler and   
          Shriram Krishnamurthi   Modular verification of
                                  collaboration-based software designs . . 152--163
                 Yunja Choi and   
          Sanjai Rayadurgam and   
            Mats P. E. Heimdahl   Automatic abstraction for model checking
                                  software systems with interrelated
                                  numeric constraints  . . . . . . . . . . 164--174
              Norman Ramsey and   
                 El\Hod Csirmaz   An algebraic approach to file
                                  synchronization  . . . . . . . . . . . . 175--185
              Gregor Engels and   
      Jochem M. Küster and   
               Reiko Heckel and   
               Luuk Groenewegen   A methodology for specifying and
                                  analyzing consistency of object-oriented
                                  behavioral models  . . . . . . . . . . . 186--195
              Luigi Lavazza and   
           Gabriele Quaroni and   
              Matteo Venturelli   Combining UML and formal notations for
                                  modelling real-time systems  . . . . . . 196--206
            Chris Lüer and   
             David S. Rosenblum   WREN --- an environment for
                                  component-based development  . . . . . . 207--217
                 Jens H. Jahnke   Engineering component-based net-centric
                                  systems for embedded applications  . . . 218--228
       Robert Bruce Findler and   
          Mario Latendresse and   
             Matthias Felleisen   Behavioral contracts and behavioral
                                  subtyping  . . . . . . . . . . . . . . . 229--236
             Jon Edvardsson and   
                  Mariam Kamkar   Analysis of the constraint solver in UNA
                                  based test data generation . . . . . . . 237--245
          William Dickinson and   
                 David Leon and   
                 Andy Podgurski   Pursuing failure: the distribution of
                                  program failures in a profile space  . . 246--255
              Atif M. Memon and   
             Mary Lou Soffa and   
              Martha E. Pollack   Coverage criteria for GUI testing  . . . 256--267
             Reidar Conradi and   
                Tore Dybå   An empirical study on the utility of
                                  formal routines to transfer knowledge
                                  and experience . . . . . . . . . . . . . 268--276
              Bernd Freimut and   
           Susanne Hartkopf and   
               Peter Kaiser and   
               Jyrki Kontio and   
               Werner Kobitzsch   An industrial case study of implementing
                                  software risk management . . . . . . . . 277--287
              Forrest Shull and   
             Jeffrey Carver and   
         Guilherme H. Travassos   An empirical methodology for introducing
                                  software processes . . . . . . . . . . . 288--296
                P\vremysl Brada   Component revision identification based
                                  on IDL/ADL component specification . . . 297--298
               J. Estublier and   
                  H. Verjus and   
                    P. Y. Cunin   Modelling and managing software
                                  federations  . . . . . . . . . . . . . . 299--300
              Duncan Clarke and   
       Thierry Jéron and   
                  Vlad Rusu and   
                Elena Zinovieva   STG: a tool for generating symbolic test
                                  programs and oracles from operational
                                  specifications . . . . . . . . . . . . . 301--302
                David Basin and   
            Frank Rittinger and   
                  Luca Vigan\`o   A formal data-model of the CORBA
                                  security service . . . . . . . . . . . . 303--304
           Vugranam C. Sreedhar   York: programming software components    305--306
          Vincenzo Ambriola and   
              R. Mark Greenwood   8th European Workshop on Software
                                  Process Technology: report and future
                                  directions . . . . . . . . . . . . . . . 307--308
             Robert L. Nord and   
          Daniel J. Paulish and   
         Robert W. Schwanke and   
                     Dilip Soni   Software architecture in a changing
                                  world: developing design strategies that
                                  anticipate change  . . . . . . . . . . . 309--310
          Wolfgang Emmerich and   
                     Nima Kaveh   Component technologies: Java Beans, COM,
                                  CORBA, RMI, EJB and the CORBA Component
                                  Model  . . . . . . . . . . . . . . . . . 311--312
            Gregor Kiczales and   
                  Erik Hilsdale   Aspect-oriented programming  . . . . . . 313
               Kurt Wallnau and   
               Scott Hissam and   
              Robert C. Seacord   Half day tutorial in methods of
                                  component-based software engineering
                                  essential concepts and classroom
                                  experience . . . . . . . . . . . . . . . 314--315
             Martin Lippert and   
                   Stefan Roock   Adapting XP to complex application
                                  domains  . . . . . . . . . . . . . . . . 316--317
                    Engin Kirda   Engineering of Web services with XML and
                                  XSL  . . . . . . . . . . . . . . . . . . 318--319
       Paul Grünbacher and   
                    Barry Boehm   EasyWinWin: a groupware-supported
                                  methodology for requirements negotiation 320--321
               Mike Mannion and   
                 Hermann Kaindl   Requirements-based product line
                                  engineering  . . . . . . . . . . . . . . 322--323
            Albert Zündorf   From use cases to code --- rigorous
                                  software development with UML  . . . . . 324--325
                Karl Aberer and   
              Manfred Hauswirth   Peer-to-peer information systems:
                                  concepts and models, state-of-the-art,
                                  and future systems . . . . . . . . . . . 326--327
                  Alexander Ran   Fundamental concepts for practical
                                  software architecture  . . . . . . . . . 328--329

ACM SIGSOFT Software Engineering Notes
Volume 26, Number 6, November, 2001

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 6--15
    Shari Lawrence Pfleeger and   
          Barbara A. Kitchenham   Principles of survey research: part 1:
                                  turning lemons into lemonade . . . . . . 16--18
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 19--28
               Frank Maurer and   
                 Carmen Zannier   4th ICSE workshop on ``Software
                                  Engineering over the Internet''  . . . . 29--31
            Pierre F. Tiako and   
              Tim Lindquist and   
                   Volker Gruhn   Process Support for Distributed
                                  Team-Based Software Development Workshop 31--33
             Ivica Crnkovic and   
              Heinz Schmidt and   
            Judith Stafford and   
                   Kurt Wallnau   4th ICSE Workshop on Component-Based
                                  Software Engineering: Component
                                  Certification and System Prediction  . . 33--40
             J. Barrie Thompson   ICSE2001 workshop to consider global
                                  aspects of software engineering
                                  professionalism  . . . . . . . . . . . . 40--44
             Jaelson Castro and   
                    Jeff Kramer   From software requirements to
                                  architectures (STRAW01)  . . . . . . . . 49--51
              Joseph Feller and   
           Brian Fitzgerald and   
      André van der Hoek   Making sense of the bazaar: 1st Workshop
                                  on Open Source Software Engineering  . . 51--52
        Annabella Loconsole and   
           Daniel Rodriguez and   
  Jürgen Börstler and   
                Rachel Harrison   Report on metrics 2001: the science and
                                  practice of software metrics conference  52--57
      André van der Hoek   International Workshop on Software
                                  Configuration Management (SCM-10): new
                                  practices, new challenges, and new
                                  boundaries . . . . . . . . . . . . . . . 57--58
               W. J. Hansen and   
              J. T. Foreman and   
               C. C. Albert and   
                E. Axelband and   
           L. L. Brownsword and   
                E. C. Forrester   Spiral development and evolutionary
                                  acquisition: the SEI-CSE workshop  . . . 59--59
            Cecilia Mascolo and   
          Wolfgang Emmerich and   
           Anthony Finkelsteiin   First ICSE 2001 Workshop on XML
                                  Technologies and Software Engineering    59--61
                Mark Harman and   
                 Bryan F. Jones   The SEMINAL workshop: reformulating
                                  software engineering as a metaheuristic
                                  search problem . . . . . . . . . . . . . 62--66
        Gruia-Catalin Roman and   
              Gian Pietro Picco   Workshop on Software Engineering and
                                  Mobility . . . . . . . . . . . . . . . . 67--70
               Arie van Deursen   Customer involvement in extreme
                                  programming: XP2001 workshop report  . . 70--73
                    Greg Butler   Generative techniques for product lines  74--76
          Steve Easterbrook and   
                 Marsha Chechik   2nd International Workshop on Living
                                  with Inconsistency (IWLWI01) . . . . . . 76--78
          Philippe Kruchten and   
         Wojtek Kozaczynski and   
                     Bran Selic   ICSE 2001 Workshop on Describing
                                  Software Architecture with UML . . . . . 78--79
              Srinath Srinivasa   Connotations of problem solving  . . . . 80--82
          Ashiss Kumar Dash and   
                 Rakesh Agarwal   Dimensional modeling for a data
                                  warehouse  . . . . . . . . . . . . . . . 83--84
                   Mark Stalica   Mobile commerce: opportunities,
                                  applications, and technologies of
                                  wireless business  . . . . . . . . . . . 85--85


ACM SIGSOFT Software Engineering Notes
Volume 27, Number 1, January, 2002

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 7--17
      Barbara A. Kitchenham and   
        Shari Lawrence Pfleeger   Principles of survey research part 2:
                                  designing a survey . . . . . . . . . . . 18--20
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 21--29
                    Hyoseob Kim   Visit report: 2nd European COTS User
                                  Working Group Workshop (ECUA2001)  . . . 30--30
          Luciana d'Adderio and   
                 Rick Dewar and   
               Ashley Lloyd and   
                Perdita Stevens   Has the pattern emperor any clothes?: a
                                  controversy in three acts  . . . . . . . 31--35
Francisco José García and   
        Juan-Antonio Barras and   
 Miguel Ángel Laguna and   
   Jos\'e Manuel Marqués   Product line variability support by FORM
                                  and Mecano model integration . . . . . . 35--38
        Amador Durán and   
               Antonio Ruiz and   
   Beatriz Bernárdez and   
                    Miguel Toro   Verifying software requirements with
                                  XSLT . . . . . . . . . . . . . . . . . . 39--44
           Bharath Kumar M. and   
              Y. N. Srikant and   
            Lakshminarayanan R.   On the use of connector libraries in
                                  distributed software architectures . . . 45--52
                Xu Xiaochun and   
                Xu Guanghui and   
                     Xu Yongsen   Architectural issues in network-centric
                                  computing  . . . . . . . . . . . . . . . 53--57
                     Gao Bo and   
                     Fei Qi and   
                  Chen Xueguang   Exploiting object-oriented methodologies
                                  to model MAS on organizations  . . . . . 58--62
             K. K. Aggarwal and   
               Yogesh Singh and   
         Jitender Kumar Chhabra   Computing program weakness using module
                                  coupling . . . . . . . . . . . . . . . . 63--65
              Luigi Benedicenti   Software Configuration Management
                                  Strategies and Rational ClearCase(r) . . 67--67

ACM SIGSOFT Software Engineering Notes
Volume 27, Number 2, March, 2002

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 5--19
      Barbara A. Kitchenham and   
        Shari Lawrence Pfleeger   Principles of survey research: part 3:
                                  constructing a survey instrument . . . . 20--24
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 25--34
Camille Ben Achour-Salinesi and   
             Andreas Opdahl and   
                    Matti Rossi   REFSQ '2001 workshop summary: Seventh
                                  International Workshop on Requirements
                                  Engineering: Foundations for Software
                                  Quality  . . . . . . . . . . . . . . . . 35--49
              Peter Knauber and   
                Giancarlo Succi   Perspectives on Software Product Lines:
                                  report on Second International Workshop
                                  on Software Product Lines: Economics,
                                  Architectures, and Implications Workshop
                                  at 23rd International Conference on
                                  Software Engineering (ICSE)  . . . . . . 40--45
               L. B. S. Raccoon   Practitioners do good work . . . . . . . 46--52
               David A. Workman   A class and method taxonomy for
                                  object-oriented programs . . . . . . . . 53--58
       Mehdi Sagheb-Tehrani and   
                 Arbi Ghazarian   Software development process: strategies
                                  for handling business rules and
                                  requirements . . . . . . . . . . . . . . 58--62
                 Christian Vogt   Intractable ERP: a comprehensive
                                  analysis of failed
                                  enterprise-resource-planning projects    62--68
           Parasuram Anantharam   Practical WAP: developing applications
                                  for the wireless web . . . . . . . . . . 69--69
  Mária Bieliková   Wireless Web: a manager's guide  . . . . 69--70
          Kenneth W. Boyer, Jr.   CMMI distilled . . . . . . . . . . . . . 70--70
          Kenneth W. Boyer, Jr.   Advanced use case modeling: software
                                  systems  . . . . . . . . . . . . . . . . 71--71
                     Ken Frazer   Building secure software: how to avoid
                                  security problems the right way  . . . . 71--72
                     Andy Huber   Peer reviews in software: a practical
                                  guide  . . . . . . . . . . . . . . . . . 72--73
               Isaac Pentinmaki   Mastering ENVY/Developer . . . . . . . . 73--73
                    Maha Shakir   Technology acquisition: buying the
                                  future of your business  . . . . . . . . 73--74

ACM SIGSOFT Software Engineering Notes
Volume 27, Number 3, May, 2002

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 5--19
         Barbara Kitchenham and   
        Shari Lawrence Pfleeger   Principles of survey research part 4:
                                  questionnaire evaluation . . . . . . . . 20--23
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 24--33
                Tony Lawrie and   
                 Cristina Gacek   Issues of dependability in open source
                                  software development . . . . . . . . . . 34--37
                Paola Inverardi   The SALADIN project: summary report  . . 38--43
                  Chang Liu and   
            Debra J. Richardson   Research directions in RAIC  . . . . . . 43--46
             Ivica Crnkovic and   
               Stig Larsson and   
                Judith Stafford   Component-based software engineering:
                                  building systems from components at 9th
                                  IEEE Conference and Workshops on
                                  Engineering of Computer-Based Systems    47--50
                 Christian Vogt   Admission control and resource
                                  reservation on the internet  . . . . . . 80--87
                   Hong Han and   
                     Jun Lu and   
                   Xianliang Lu   Virtual Interface Machine: a design
                                  pattern to solve the problem of coupling
                                  and efficiency in software design  . . . 88--92
                      James Law   Mechatronics and the design of
                                  intelligent machines and systems . . . . 93--93
                       Joe Saur   Effective requirements practices . . . . 93--94
                   Meyer Tanuan   Leading a software development team  . . 94--94
             Debora Weber-Wulff   Human-computer interaction in the new
                                  millennium . . . . . . . . . . . . . . . 94--95

ACM SIGSOFT Software Engineering Notes
Volume 27, Number 4, July, 2002

               Ana Milanova and   
             Atanas Rountev and   
               Barbara G. Ryder   Parameterized object sensitivity for
                                  points-to and side-effect analyses for
                                  Java . . . . . . . . . . . . . . . . . . 1--11
                 Alex Groce and   
                  Willem Visser   Model checking Java programs using
                                  structural heuristics  . . . . . . . . . 12--21
              Donglin Liang and   
            Maikel Pennings and   
              Mary Jean Harrold   Evaluating the precision of static
                                  reference analysis using profiling . . . 22--32
                 Gleb Naumovich   A conservative algorithm for computing
                                  the flow of permissions in Java programs 33--43
               Scott D. Stoller   Domain partitioning for open reactive
                                  systems  . . . . . . . . . . . . . . . . 44--54
          Thomas J. Ostrand and   
              Elaine J. Weyuker   The distribution of faults in a large
                                  industrial software system . . . . . . . 55--64
            Alessandro Orso and   
              Donglin Liang and   
          Mary Jean Harrold and   
                 Richard Lipton   Gamma system: continuous evolution of
                                  software after deployment  . . . . . . . 65--69
               L. C. Briand and   
                 Y. Labiche and   
                         H. Sun   Investigating the use of analysis
                                  contracts to support fault isolation in
                                  object oriented code . . . . . . . . . . 70--80
              Martin Hiller and   
              Arshad Jhumka and   
                    Neeraj Suri   PROPANE: an environment for examining
                                  the propagation of errors in software    81--85
           Mustafa M. Tikir and   
       Jeffrey K. Hollingsworth   Efficient instrumentation for code
                                  coverage testing . . . . . . . . . . . . 86--96
         Amitabh Srivastava and   
                Jay Thiagarajan   Effectively prioritizing tests in
                                  development environment  . . . . . . . . 97--106
             Boris Vaysburg and   
              Luay H. Tahat and   
                   Bogdan Korel   Dependence analysis in reduction of
                                  requirement based test suites  . . . . . 107--111
         Wolfgang Grieskamp and   
              Yuri Gurevich and   
            Wolfram Schulte and   
                  Margus Veanes   Generating finite state machines from
                                  abstract state machines  . . . . . . . . 112--122
     Chandrasekhar Boyapati and   
           Sarfraz Khurshid and   
                  Darko Marinov   Korat: automated testing based on Java
                                  predicates . . . . . . . . . . . . . . . 123--133
                G. Friedman and   
                 A. Hartman and   
                   K. Nagin and   
                      T. Shiran   Projected state machine coverage for
                                  software testing . . . . . . . . . . . . 134--143
              Diego Latella and   
                  Mieke Massink   On testing and conformance relations for
                                  UML statechart diagrams behaviours . . . 144--153
                  Tim Moors and   
      Malathi Veeraraghavan and   
                Zhifeng Tao and   
                 Xuan Zheng and   
                   Ramesh Badri   Experiences in automating the testing of
                                  SS7 signalling transfer points . . . . . 154--158
          Rachel Cardell-Oliver   Conformance test experiments for
                                  distributed real-time systems  . . . . . 159--163
                 Yung-Pin Cheng   Refactoring design models for inductive
                                  verification . . . . . . . . . . . . . . 164--168
         Tuba Yavuz-Kahveci and   
                  Tevfik Bultan   Specification, verification, and
                                  synthesis of concurrency control
                                  components . . . . . . . . . . . . . . . 169--179
                Peter G. Bishop   Rescaling reliability bounds for a new
                                  operational profile  . . . . . . . . . . 180--190
                 T. Y. Chen and   
                  T. H. Tse and   
                   Zhiquan Zhou   Semi-proving: an integrated method based
                                  on global symbolic evaluation and
                                  metamorphic testing  . . . . . . . . . . 191--195
                    Dick Hamlet   Continuity in software systems . . . . . 196--200
              Antonia Bertolino   ISSTA 2002 panel: is ISSTA research
                                  relevant to industrial users?  . . . . . 201--202
               Vincent Encontre   Is ISSTA research relevant to industrial
                                  users? Panel --- ISSTA 2002: empowering
                                  the developer to be a tester too!  . . . 203--204
                     A. Hartman   Is ISSTA research relevant to industry?  205--206
                 Emilia Peciola   Ericsson lab Italy: is ISSTA research
                                  relevant to industrial users?  . . . . . 207--207
                Ashok Sreenivas   Panel discussion: is ISSTA testing
                                  research relevant to industrial users?   208--209
             Jong-Deok Choi and   
                 Andreas Zeller   Isolating failure-inducing thread
                                  schedules  . . . . . . . . . . . . . . . 210--220
                John Whaley and   
          Michael C. Martin and   
                  Monica S. Lam   Automatic extraction of object-oriented
                                  component interfaces . . . . . . . . . . 218--228
           Jeremy W. Nimmer and   
               Michael D. Ernst   Automatic generation of program
                                  specifications . . . . . . . . . . . . . 229--239

ACM SIGSOFT Software Engineering Notes
Volume 27, Number 5, September, 2002

               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 6--16
         Barbara Kitchenham and   
        Shari Lawrence Pfleeger   Principles of survey research: part 5:
                                  populations and samples  . . . . . . . . 17--20
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 21--30
            Jacky Estublier and   
              David Leblang and   
                Geoff Clemm and   
             Reidar Conradi and   
               Walter Tichy and   
  André van der Hoek and   
             Darcy Wiborg-Weber   Impact of the research community on the
                                  field of software configuration
                                  management: summary of an impact project
                                  report . . . . . . . . . . . . . . . . . 31--39
                Donna H. Rhodes   Systems engineering: an essential
                                  discipline for the 21st century  . . . . 40--45
                 Chad Davis and   
                  Coskun Bayrak   Open source development and the World
                                  Wide Web: a certain tension  . . . . . . 93--97
                       Bixin Li   Analyzing information-flow in Java
                                  program based on slicing technique . . . 98--103
                Larry Alexander   Decision support systems in the 21st
                                  century  . . . . . . . . . . . . . . . . 104--104
                     Ken Frazer   C++ in action: industrial-strength
                                  programming techniques . . . . . . . . . 104--105
                   Meyer Tanuan   Testing it: an off-the-shelf software
                                  testing process  . . . . . . . . . . . . 105--105
                     Will Tracz   Roundtable on technical leadership: a
                                  SHAPE forum dialog . . . . . . . . . . . 106--107

ACM SIGSOFT Software Engineering Notes
Volume 27, Number 6, November, 2002

                 Andreas Zeller   Isolating cause-effect chains from
                                  computer programs  . . . . . . . . . . . 1--10
           Jeremy W. Nimmer and   
               Michael D. Ernst   Invariant inference for static checking:
                                  an empirical evaluation  . . . . . . . . 11--20
           Christine Julien and   
            Gruia Catalin Roman   Egocentric context-aware programming in
                                  ad hoc mobile environments . . . . . . . 21--30
                Licia Capra and   
          Wolfgang Emmerich and   
                Cecilia Mascolo   A micro-economic approach to conflict
                                  resolution in mobile computing . . . . . 31--40
       Antónia Lopes and   
  José Luiz Fiadeiro and   
             Michel Wermelinger   Architectural primitives for
                                  distribution and mobility  . . . . . . . 41--50
                 Yichen Xie and   
                  Dawson Engler   Using redundancies to find errors  . . . 51--60
                Glenn Bruns and   
                 Satish Chandra   Searching for points-to analysis . . . . 61--70
                Markus Mock and   
         Darren C. Atkinson and   
             Craig Chambers and   
                Susan J. Eggers   Improving program slicing with dynamic
                                  points-to data . . . . . . . . . . . . . 71--80
             Gerard J. Holzmann   The logic of bugs  . . . . . . . . . . . 81--87
                   Harry Li and   
      Shriram Krishnamurthi and   
                   Kathi Fisler   Verifying cross-cutting features as open
                                  systems  . . . . . . . . . . . . . . . . 89--98
        Mark C. Chu-Carroll and   
               James Wright and   
                  David Shields   Supporting aggregation in fine grained
                                  software configuration management  . . . 99--108
          Sebastian Uchitel and   
                Jeff Kramer and   
                     Jeff Magee   Negative scenarios for implied scenario
                                  elicitation  . . . . . . . . . . . . . . 109--118
            Emmanuel Letier and   
            Axel van Lamsweerde   Deriving operational software
                                  specifications from system goals . . . . 119--128
          Monika Vetterling and   
               Guido Wimmel and   
         Alexander Wisspeintner   Secure systems development based on the
                                  common criteria: the PalME project . . . 129--138
             Arie Gurfinkel and   
             Benet Devereux and   
                 Marsha Chechik   Model exploration with temporal logic
                                  query checking . . . . . . . . . . . . . 139--148
                Jianwei Niu and   
            Joanne M. Atlee and   
                   Nancy A. Day   Composable semantics for model-based
                                  notations  . . . . . . . . . . . . . . . 149--158
       Jamieson M. Cobleigh and   
          Leon J. Osterweil and   
             Alexander Wise and   
          Barbara Staudt Lerner   Containment units: a hierarchically
                                  composable architecture for adaptive
                                  systems  . . . . . . . . . . . . . . . . 159--165
            Bikram Sengupta and   
               Rance Cleaveland   Triggered message sequence charts  . . . 167--176


ACM SIGSOFT Software Engineering Notes
Volume 28, Number 1, January, 2003

                   David Notkin   Longitudinal program analysis  . . . . . 1--1
                Jim Bowring and   
            Alessandro Orso and   
              Mary Jean Harrold   Monitoring deployed software using
                                  software tomography  . . . . . . . . . . 2--9
           Mustafa M. Tikir and   
   Jeffrey K. Hollingsworth and   
                 Guei-Yuan Lueh   Recompilation for debugging support in a
                                  JIT-compiler . . . . . . . . . . . . . . 10--17
               Tankut Akgul and   
          Vincent J. Mooney III   Instruction-level reverse execution for
                                  debugging  . . . . . . . . . . . . . . . 18--25
                 Greg Morrisett   Analysis issues for cyclone  . . . . . . 26--26
               Rhodes Brown and   
              Karel Driesen and   
                  David Eng and   
             Laurie Hendren and   
             John Jorgensen and   
            Clark Verbrugge and   
                       Qin Wang   STEP: a framework for the efficient
                                  encoding of general trace data . . . . . 27--34
    Taweesup Apiwattanapong and   
              Mary Jean Harrold   Selective path profiling . . . . . . . . 35--42
                      David Eng   Combining static and dynamic data in
                                  code visualization . . . . . . . . . . . 43--50
             Benjamin Chelf and   
              Dawson Engler and   
                    Seth Hallem   How to write system-specific, static
                                  checkers in metal  . . . . . . . . . . . 51--60
                 Gleb Naumovich   Using the observer design pattern for
                                  implementation of data flow analyses . . 61--68
       John Fiskio-Lasseter and   
                   Michal Young   Flow equations as a generic programming
                                  tool for manipulation of attributed
                                  graphs . . . . . . . . . . . . . . . . . 69--76
         Dean F. Sutherland and   
           Aaron Greenhouse and   
            William L. Scherlis   The code of many colors: relating
                                  threads to code and shared state . . . . 77--83

ACM SIGSOFT Software Engineering Notes
Volume 28, Number 3, May, 2003

             Rakesh Agarwal and   
               Ajit Sarangi and   
                      Swati Das   Reengineering of database intensive
                                  application  . . . . . . . . . . . . . . 1--1
                     Will Tracz   Front matter (letters and notices) . . . 1--8
              Coskun Bayrak and   
                     Chad Davis   The liquid architecture: a non-linear
                                  peer-to-peer distributed architecture
                                  with polymorphic message passing . . . . 2--2
              Edward A. Billard   Language-Dependent performance of design
                                  patterns . . . . . . . . . . . . . . . . 3--3
               Paul Brebner and   
                 Jeffrey Gosper   How scalable is J2EE technology? . . . . 4--4
Jorge Enrique Pérez-Martínez   Heavyweight extensions to the UML
                                  metamodel to describe the C3
                                  architectural style  . . . . . . . . . . 5--5
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 5--9
                    Jan Heering   Quantification of structural
                                  information: on a question raised by
                                  Brooks . . . . . . . . . . . . . . . . . 6--6
             Peter B. Henderson   Software engineering education (SEEd)    11--12
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 13--21
ACM SIGSOFT Software Engineering Notes Staff   Back matter  . . . . . . . . . . . . . . 22--37
         Mordechai Ben-Menachem   Software for your head . . . . . . . . . 24--24
               Isaac Pentinmaki   Object modeling and user interface
                                  design designing interactive systems . . 24--24
               Isaac Pentinmaki   IT measurement: practical advice from
                                  the experts  . . . . . . . . . . . . . . 25--25


ACM SIGSOFT Software Engineering Notes
Volume 29, Number 2, March, 2004

                     Will Tracz   Front matter (letters and notices) . . . 0--6
             Rakesh Agarwal and   
                 Amrita Deo and   
                      Swati Das   Intelligent agents in E-learning . . . . 1--1
                 C. M. Wyss and   
                   A. James and   
             W. Hasselbring and   
                  S. Conrad and   
             Hagen Höpfner   Report on the Engineering Federated
                                  Information Systems 2003 workshop (EFIS
                                  2003)  . . . . . . . . . . . . . . . . . 1--3
           Vincenzo Gervasi and   
               Didar Zowghi and   
          Steve Easterbrook and   
              Susan Elliott Sim   Report on the First International
                                  Workshop on Comparative Evaluation in
                                  Requirements Engineering . . . . . . . . 1--4
          Andrew Walenstein and   
              Arun Lakhotia and   
                 Rainer Koschke   The Second International Workshop on
                                  Detection of Software Clones: workshop
                                  report . . . . . . . . . . . . . . . . . 1--5
         Ana Isabel Cardoso and   
         Rui Gustavo Crespo and   
                    Peter Kokol   Assessing software structure by entropy
                                  and information density  . . . . . . . . 2--2
                  Leona F. Fass   Approximations, anomalies and ``the
                                  proof of correctness wars''  . . . . . . 3--3
              Nasib S. Gill and   
                   P. S. Grover   Few important considerations for
                                  deriving interface complexity metric for
                                  component-based systems  . . . . . . . . 4--4
                   Bing Guo and   
                   Yan Shen and   
                    Jun Xie and   
                  Yong Wang and   
                 Guang-Ze Xiong   A kind of new ToolBus model research and
                                  implementation . . . . . . . . . . . . . 5--5
                Talha Javed and   
           Manzil-e-Maqsood and   
              Qaiser S. Durrani   A survey to examine the effect of team
                                  communication on job satisfaction in
                                  software industry  . . . . . . . . . . . 6--6
             Peter B. Henderson   Software engineering education (SEEd)    6--8
                 S. Kanmani and   
      V. Rhymend Uthariaraj and   
        V. Sankaranarayanan and   
                 P. Thambidurai   Investigation into the exploitation of
                                  Object-Oriented features . . . . . . . . 7--7
                        Jian Lu   Some research on componentware
                                  frameworks based on mobile agent
                                  technology . . . . . . . . . . . . . . . 8--8
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 8--16
                    Clive Rosen   Non-directive software engineering . . . 9--9
                Takao Shimomura   A page-transition framework for
                                  image-oriented Web programming . . . . . 10--10
             Andrey A. Terekhov   Dealing with architectural issues: a
                                  case study . . . . . . . . . . . . . . . 11--11
           Antti Tevanlinna and   
                 Juha Taina and   
                Raine Kauppinen   Product family testing: a survey . . . . 12--12
                Yuming Zhou and   
                Jiangtao Lu and   
           Hongmin Lu Baowen Xu   A comparative study of graph
                                  theory-based class cohesion measures . . 13--13
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 17--26
ACM SIGSOFT Software Engineering Notes Staff   Back matter (abstracts and calendar) . . 27--62
         Mordechai Ben-Menachem   Review of \booktitleIT project
                                  estimation: a practical guide to the
                                  costing of software by Paul Coombs.
                                  Cambridge University Press 2003  . . . . 31--31
              Gregory H. Harris   Review of \booktitleAbstract state
                                  machines: a method for high-level system
                                  design and analysis by Egon Börger and
                                  Robert Stärk. Springer-Verlag 2003  . . . 31--32
                      James Law   Review of \booktitleThe description
                                  logic handbook by Franz Bader, Diego
                                  Calvanese, Deborah L. McGuinness,
                                  Daniele Nardi, Peter Patel-Schneider.
                                  Cambridge University Press 2003  . . . . 32--33
                      James Law   Review of \booktitleTerm rewriting
                                  systems by Mark Bezem, Jan Willem Klop,
                                  and Roel de Vrijer. Cambridge University
                                  Press 2003 . . . . . . . . . . . . . . . 33--33
               Isaac Pentinmaki   Review of \booktitleLean software
                                  development: an agile tookit by Mary and
                                  Tom Poppendieck. Addison Wesley 2003 . . 33--33

ACM SIGSOFT Software Engineering Notes
Volume 29, Number 3, May, 2004

                     Will Tracz   Frontmatter (letters and notices)  . . . 0--4
         Muthu Ramachandran and   
                Domenic Mangano   Knowledge based reasoning for software
                                  architectural design strategies  . . . . 1--4
            Daniel M. Berry and   
                Rick Kazman and   
                  Roel Wieringa   Second International Workshop on From
                                  SofTware Requirements to Architectures
                                  (STRAW'03) . . . . . . . . . . . . . . . 1--5
             K. K. Aggarwal and   
               Yogesh Singh and   
                    A. Kaur and   
                  O. P. Sangwan   A neural net based approach to Test
                                  Oracle . . . . . . . . . . . . . . . . . 1--6
             Ivica Crnkovic and   
              Heinz Schmidt and   
            Judith Stafford and   
                   Kurt Wallnau   6th ICSE Workshop on Component-Based
                                  Software Engineering: automated
                                  reasoning and prediction . . . . . . . . 1--7
                Talha Javed and   
           Manzil e Maqsood and   
              Qaiser S. Durrani   A study to investigate the impact of
                                  requirements instability on software
                                  defects  . . . . . . . . . . . . . . . . 1--7
         Emerson F. A. Lima and   
Patrícia D. L. Machado and   
  Fláavio R. Sampaio and   
         Jorge C. A. Figueiredo   An approach to modelling and applying
                                  mobile agent design patterns . . . . . . 1--8
              D. Janaki Ram and   
   P. Jithendra Kumar Reddy and   
                 M. S. Rajasree   Pattern hybridization: breeding new
                                  designs out of pattern interactions  . . 1--10
                 Flavio Oquendo   $ \pi $-ADL: an Architecture Description
                                  Language based on the higher-order typed
                                  $ \pi $-calculus for specifying dynamic
                                  and mobile software architectures  . . . 1--14
             Peter B. Henderson   Software engineering education (SEEd)    5--6
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 7--14
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 15--24
                  Russell Ovans   The programmer life-cycle  . . . . . . . 25--26
                 Joseph M. Saur   Review of \booktitleSoftware by numbers:
                                  low-risk, high-return development by
                                  Mark Denne and Jane Cleland-Huang.
                                  Prentice Hall 2004 . . . . . . . . . . . 29--30
                 Joseph M. Saur   Review of \booktitleCritical testing
                                  processes: plan, prepare, perform,
                                  perfect by Rex Black. Addison-Wesley
                                  2004 . . . . . . . . . . . . . . . . . . 30--30
                 Joseph M. Saur   Review of \booktitleSoftware engineering
                                  measurement by John C. Munson. Auerbach
                                  Publications 2003  . . . . . . . . . . . 30--30
ACM SIGSOFT Software Engineering Notes Staff   Backmatter (abstracts and calendar)  . . 31--37

ACM SIGSOFT Software Engineering Notes
Volume 29, Number 4, July, 2004

             Atanas Rountev and   
                Scott Kagan and   
                  Michael Gibas   Static and dynamic analysis of call
                                  chains in Java . . . . . . . . . . . . . 1--11
                  Nurit Dor and   
              Stephen Adams and   
                Manuvir Das and   
                       Zhe Yang   Software validation via scalable
                                  path-sensitive value flow analysis . . . 12--22
                    Chen Fu and   
           Barbara G. Ryder and   
               Ana Milanova and   
                David Wonnacott   Testing of Java web services for
                                  robustness . . . . . . . . . . . . . . . 23--34
       Mihai Christodorescu and   
                     Somesh Jha   Testing malware detectors  . . . . . . . 34--44
               Cemal Yilmaz and   
              Myra B. Cohen and   
                    Adam Porter   Covering arrays for efficient fault
                                  characterization in complex
                                  configuration spaces . . . . . . . . . . 45--54
             Lev Nachmanson and   
              Margus Veanes and   
            Wolfram Schulte and   
           Nikolai Tillmann and   
             Wolfgang Grieskamp   Optimal strategies for testing
                                  nondeterministic systems . . . . . . . . 55--64
           Sebastian Elbaum and   
               Madeline Hardojo   An empirical study of profiling
                                  strategies for released software and
                                  their impact on testing activities . . . 65--75
                 David Saff and   
               Michael D. Ernst   An experimental evaluation of continuous
                                  testing during development . . . . . . . 76--85
          Thomas J. Ostrand and   
          Elaine J. Weyuker and   
                 Robert M. Bell   Where the bugs are . . . . . . . . . . . 86--96
              Willem Visser and   
    Corina S. P\uas\uareanu and   
               Sarfraz Khurshid   Test input generation with Java
                                  PathFinder . . . . . . . . . . . . . . . 97--107
       André Baresel and   
              David Binkley and   
                Mark Harman and   
                   Bogdan Korel   Evolutionary testing in the presence of
                                  loop-assigned flags: a testability
                                  transformation approach  . . . . . . . . 108--118
                  Paolo Tonella   Evolutionary testing of classes  . . . . 119--128
                 A. Hartman and   
                       K. Nagin   The AGEDIS tools for model based testing 129--132
             Kevin Sullivan and   
                Jinlin Yang and   
               David Coppit and   
           Sarfraz Khurshid and   
                 Daniel Jackson   Software assurance by bounded exhaustive
                                  testing  . . . . . . . . . . . . . . . . 133--142
                    Karl Meinke   Automated black-box testing of
                                  functional correctness using function
                                  approximation  . . . . . . . . . . . . . 143--153
             Sandro Morasca and   
        Stefano Serra-Capizzano   On the analytical comparison of testing
                                  techniques . . . . . . . . . . . . . . . 154--164
                Greg Dennis and   
              Robert Seater and   
              Derek Rayside and   
                 Daniel Jackson   Automating commutativity analysis at the
                                  design level . . . . . . . . . . . . . . 165--174
César A. Muñoz and   
               Gilles Dowek and   
   Víctor Carreño   Modeling and verification of an air
                                  traffic concept of operations  . . . . . 175--182
                    James Ezick   An optimizing compiler for batches of
                                  temporal logic formulas  . . . . . . . . 183--194
           James F. Bowring and   
              James M. Rehg and   
              Mary Jean Harrold   Active learning for automatic
                                  classification of software behavior  . . 195--205
                    Lee Lin and   
               Michael D. Ernst   Improving the adaptability of multi-mode
                                  systems via program steering . . . . . . 206--216
                  S. Ramesh and   
                A. Kulkarni and   
                       V. Kamat   Slicing tools for synchronous reactive
                                  programs . . . . . . . . . . . . . . . . 217--220
            Cormac Flanagan and   
          Stephen N. Freund and   
                    Shaz Qadeer   Exploiting purity for atomicity  . . . . 221--231
           Jonathan Edwards and   
             Daniel Jackson and   
               Emina Torlak and   
                  Vincent Yeung   Faster constraint solving with subtypes  232--242
             Darrell Reimer and   
            Edith Schonberg and   
           Kavitha Srinivas and   
          Harini Srinivasan and   
               Bowen Alpern and   
          Robert D. Johnson and   
          Aaron Kershenbaum and   
                    Larry Koved   SABER: smart analysis based error
                                  reduction  . . . . . . . . . . . . . . . 243--251
                   Xiang Fu and   
              Tevfik Bultan and   
                     Jianwen Su   Model checking XML manipulating software 252--262
               Matteo Rossi and   
                 Dino Mandrioli   A formal approach for modeling and
                                  verification of RTCORBA-based
                                  applications . . . . . . . . . . . . . . 263--273
          Barbara Staudt Lerner   Verifying process models built using
                                  parameterized state machines . . . . . . 274--284

ACM SIGSOFT Software Engineering Notes
Volume 29, Number 5, September, 2004

                     Will Tracz   Frontmatter (TOC, Letters, Frank David
                                  Anger, ACM Fellow Profile, ICSE 2005,
                                  Praise and Criticism, Some Thoughts on
                                  Software Reliability, Latest DoD Effort
                                  to Achieve Quality in Software, Software
                                  Engineering Education) . . . . . . . . . 0
                    Johann Rost   Is ``Factory Method'' really a pattern?  1--1
                David Evans and   
          Raimondas Lencevicius   ICSE 2004 workshop summary Second
                                  International Workshop on Dynamic
                                  Analysis (WODA 2004) . . . . . . . . . . 1--2
                      Brad Long   Sorting non-key fields in the
                                  distributed result set iterator pattern  1--2
       Alexander Pretschner and   
         Christian Salzmann and   
                 Thomas Stauner   Software engineering for automotive
                                  systems at ICSE 2004 workshop summary    1--2
              Lionel Briand and   
                   Yvan Labiche   Empirical studies of software testing
                                  techniques: challenges, practical
                                  strategies, and future research  . . . . 1--3
                   Karl Cox and   
                Jon G. Hall and   
                Lucia Rapanotti   1st International Workshop on Advances
                                  and Applications of Problem Frames ---
                                  summary  . . . . . . . . . . . . . . . . 1--3
                Eric Dubois and   
                  Xavier Franch   International Workshop on Models and
                                  Processes for the Evaluation of COTS
                                  Components (MPEC'04) . . . . . . . . . . 1--3
                John Grundy and   
                Ray Welland and   
               Hermann Stoeckle   Workshop on Directions in Software
                                  Engineering Environments (WoDiSEE) . . . 1--3
                  R. M. Hierons   A flexible environment to evaluate
                                  state-based test techniques  . . . . . . 1--3
          B. Lindström and   
                 M. Grindal and   
                      J. Offutt   Using an existing suite of test objects:
                                  experience from a testing experiment . . 1--3
                  Pat McGee and   
                      Cem Kaner   Experiments with high volume test
                                  automation . . . . . . . . . . . . . . . 1--3
                Jeff Offutt and   
                  Yuan Yang and   
             Jane Huffman Hayes   SEEWeb: making experimental artifacts
                                  available  . . . . . . . . . . . . . . . 1--3
             K. K. Aggrawal and   
               Yogesh Singh and   
                        A. Kaur   Code coverage based technique for
                                  prioritizing test cases for regression
                                  testing  . . . . . . . . . . . . . . . . 1--4
         Roger T. Alexander and   
            James M. Bieman and   
               Robert B. France   A software engineering research
                                  repository . . . . . . . . . . . . . . . 1--4
               James H. Andrews   Relevant empirical testing research:
                                  challenges and responses . . . . . . . . 1--4
              Antonia Bertolino   The (Im)maturity level of software
                                  testing  . . . . . . . . . . . . . . . . 1--4
                Anil Chawla and   
                Alessandro Orso   A generic instrumentation framework for
                                  collecting dynamic information . . . . . 1--4
                Hyunsook Do and   
           Sebastian Elbaum and   
                Gregg Rothermel   Building an infrastructure to support
                                  experimentation with software testing
                                  techniques . . . . . . . . . . . . . . . 1--4
              Nasib S. Gill and   
                   P. S. Grover   Software size prediction before coding   1--4
           Mechelle Gittens and   
             Hanan Lutfiyya and   
                     Mike Bauer   Continuous evolutionary one-step-ahead
                                  testing  . . . . . . . . . . . . . . . . 1--4
                 N. Juristo and   
               A. M. Moreno and   
                       S. Vegas   Towards building a solid empirical body
                                  of knowledge in testing techniques . . . 1--4
                Jeff Offutt and   
                Yu-Seung Ma and   
                  Yong-Rae Kwon   An experimental mutation system for Java 1--4
            Roy Patrick Tan and   
             Stephen H. Edwards   Experiences evaluating the effectiveness
                                  of JML-JUnit testing . . . . . . . . . . 1--4
                Laurie Williams   On the need for a process for making
                                  reliable quality comparisons with
                                  industrial data  . . . . . . . . . . . . 1--4
               Pankaj Bhatt and   
              Gautam Shroff and   
                  Arun K. Misra   Dynamics of software maintenance . . . . 1--5
       Elizabeth Hargreaves and   
             Daniela Damian and   
           Filippo Lanubile and   
                   James Chisan   Global software development: building a
                                  research community . . . . . . . . . . . 1--5
                 Fangjun Wu and   
                        Tong Yi   Measuring Z specifications . . . . . . . 1--5
                 S. Kanmani and   
      V. Rhymend Uthariaraj and   
        V. Sankaranarayanan and   
                 P. Thambidurai   Object oriented software quality
                                  prediction using general regression
                                  neural networks  . . . . . . . . . . . . 1--6
              Dietmar Pfahl and   
                David Raffo and   
                  Ioana Rus and   
                   Paul Wernick   Report on ProSim'04: the 5th
                                  International Workshop on Software
                                  Process Simulation and Modeling  . . . . 1--6
                  Guido Rotondi   Assessment methodologies for public
                                  contractors  . . . . . . . . . . . . . . 1--6
                    Tong Yi and   
                 Fangjun Wu and   
                   Chengzhi Gan   A comparison of metrics for UML class
                                  diagrams . . . . . . . . . . . . . . . . 1--6
                    Tong Yi and   
                     Fangjun Wu   Empirical analysis of entropy distance
                                  metric for UML class diagrams  . . . . . 1--6
             Ricardo Choren and   
          Alessandro Garcia and   
              Carlos Lucena and   
               Martin Griss and   
                 David Kung and   
             Naftaly Minsky and   
       Alexander Romanovsky and   
             Jaelson Castro and   
    Rogério de Lemos and   
                    Danny Weyns   Software engineering for large-scale
                                  multi-agent systems --- SELMAS 2004:
                                  workshop report  . . . . . . . . . . . . 1--10
               Yuetang Deng and   
             Phyllis Frankl and   
                     Jiong Wang   Testing web database applications  . . . 1--10
            Mariya Koshkina and   
             Franck van Breugel   Modelling and verifying web service
                                  orchestration by means of the
                                  concurrency workbench  . . . . . . . . . 1--10
             Gleb Naumovich and   
               Paolina Centonze   Static analysis of role-based access
                                  control in J2EE applications . . . . . . 1--10
                Jeff Offutt and   
                       Wuzhi Xu   Generating test cases for web services
                                  using data perturbation  . . . . . . . . 1--10
             Robert J. Hall and   
                  Andrea Zisman   Model interchange and integration for
                                  web services . . . . . . . . . . . . . . 1--11
                 Guoqing Xu and   
              Zongyuan Yang and   
                   Haitao Huang   A basic model for components
                                  implementation of software architecture  1--11
                    Jason Aiken   Technical and human perspectives on pair
                                  programming  . . . . . . . . . . . . . . 1--14
                 Flavio Oquendo   $ \pi $-ARL: an architecture refinement
                                  language for formally modelling the
                                  stepwise refinement of software
                                  architectures  . . . . . . . . . . . . . 1--20
                 Flavio Oquendo   Formally refining software architectures
                                  with $ \pi $-ARL: a case study . . . . . 1--26
             Peter B. Henderson   Software engineering education (SEEd)    12--13
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 13--18
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 20--28
                Charles Beasley   Review of \booktitleBuilding operational
                                  excellence: IT people and best practices
                                  by Bruce Allen and Dale Kutnic. Intel
                                  Press and Addison-Wesley 2001 and 2002   35--35
                     Ken Frazer   Review of \booktitleManaging software
                                  requirements, a use case approach by
                                  Dean Leffingwell and Don Widrig.
                                  Addison-Wesley 2003  . . . . . . . . . . 36--36
                     Ken Frazer   Review of \booktitleUse cases,
                                  requirements in context by Daryl Kulak
                                  and Eamon Guiney. Addison-Wesley 2004    36--37
                   Brian Lawler   Review of \booktitleModernizing legacy
                                  systems: software technologies,
                                  engineering processes and business
                                  practices by Robert C. Seacord, Daniel
                                  Plakosh and Grace A. Lewis. Addison
                                  Wesley 2003  . . . . . . . . . . . . . . 37--37
         Mordechai Ben-Menachem   Review of \booktitleCMMI: guidelines for
                                  process integration and product
                                  improvement by Mary Beth Chrissis, Mike
                                  Konrad and Sandy Shrum. Addison Wesley
                                  2003 . . . . . . . . . . . . . . . . . . 37--38
         Mordechai Ben-Menachem   Review of \booktitleSoftware metrics: a
                                  guide to planning, analysis and
                                  application by C. Ravindranath Pandian.
                                  Auerbach Publications, CRC Press 2004    38--39
                       Joe Saur   Review of \booktitleSAS\`O for Monte
                                  Carlo studies: a guide for quantitative
                                  researchers by Xitao Fan, Ákos Felsvlyi,
                                  Stephen A. Sivo, and Sean C. Keenan. SAS
                                  Institute, Inc. 2002 . . . . . . . . . . 39--39
                       Joe Saur   Review of \booktitleVisualizing
                                  categorical data by Michael Friendly.
                                  SAS Institute, Inc. 2000 . . . . . . . . 39--40
             Debora Weber-Wulff   Review of \booktitleRequirements by
                                  collaboration --- workshops for defining
                                  needs by Ellen Gottesdiener
                                  Addison--Wesley 2002 . . . . . . . . . . 40--40
             Debora Weber-Wulff   Review of \booktitleUML by example by
                                  Ghinwa Jalloul. Cambridge University
                                  Press 2004 . . . . . . . . . . . . . . . 40--40
                     Will Tracz   Review of \booktitleManaging software
                                  for growth: without fear, control, and
                                  the manufacturing mindset by Roy Miller.
                                  Addison-Wesley 2003  . . . . . . . . . . 40--41
                     Will Tracz   Review of \booktitleArchitecting
                                  enterprise solutions: patterns for
                                  high-capability Internet based systems
                                  by Paul Dyson and Andy Longshaw. John
                                  Wiley and Sons, Ltd. 2004  . . . . . . . 41--41
                     Will Tracz   Review of \booktitleIT project
                                  estimation: a practical guide to costing
                                  of software by Paul Coombs. Cambridge
                                  University Press 2003  . . . . . . . . . 41--41
ACM SIGSOFT Software Engineering Notes Staff   Backmatter (Report abstracts, Paper
                                  abstracts, Calendar of Future Events,
                                  Call for Participation, Keynotes,
                                  Workshops, Tutorials)  . . . . . . . . . 42

ACM SIGSOFT Software Engineering Notes
Volume 29, Number 6, November, 2004

ACM SIGSOFT Software Engineering Notes Staff   Frontmatter (cover, title page,
                                  copyright, foreword, contents,
                                  organization)  . . . . . . . . . . . . . 0
              Alexander L. Wolf   Is security engineering really just good
                                  software engineering?  . . . . . . . . . 1--1
                Alexander Egyed   Resolving uncertainties during trace
                                  analysis . . . . . . . . . . . . . . . . 3--12
             Juergen Dingel and   
                  Hongzhi Liang   Automating comprehensive safety analysis
                                  of concurrent programs using Verisoft
                                  and TXL  . . . . . . . . . . . . . . . . 13--22
            Jeff H. Perkins and   
               Michael D. Ernst   Efficient incremental algorithms for
                                  dynamic detection of likely invariants   23--32
          Sebastian Uchitel and   
             Robert Chatley and   
                Jeff Kramer and   
                     Jeff Magee   System architecture: the context for
                                  scenario-based model synthesis . . . . . 33--42
          Sebastian Uchitel and   
                 Marsha Chechik   Merging partial behavioural models . . . 43--52
            Emmanuel Letier and   
            Axel van Lamsweerde   Reasoning about partial goal
                                  satisfaction for requirements and design
                                  engineering  . . . . . . . . . . . . . . 53--62
             Roman Manevich and   
             Manu Sridharan and   
              Stephen Adams and   
                Manuvir Das and   
                       Zhe Yang   PSE: explaining program failures via
                                  postmortem static analysis . . . . . . . 63--72
                Sagar Chaki and   
                 Alex Groce and   
                 Ofer Strichman   Explaining abstract counterexamples  . . 73--82
               Ted Kremenek and   
               Ken Ashcraft and   
               Junfeng Yang and   
                  Dawson Engler   Correlation exploitation in error
                                  ranking  . . . . . . . . . . . . . . . . 83--93
                      Joe Marks   The usability problem for home
                                  appliances: engineers caused it,
                                  engineers can fix it!  . . . . . . . . . 95--95
               Misha Zitser and   
           Richard Lippmann and   
                       Tim Leek   Testing static analysis tools using
                                  exploitable buffer overflows from open
                                  source code  . . . . . . . . . . . . . . 97--106
                    Licia Capra   Engineering human trust in mobile system
                                  collaborations . . . . . . . . . . . . . 107--116
                     Wei Xu and   
         Daniel C. DuVarney and   
                       R. Sekar   An efficient and backwards-compatible
                                  transformation to ensure memory safety
                                  of C programs  . . . . . . . . . . . . . 117--126
                Mira Mezini and   
                Klaus Ostermann   Variability management with
                                  feature-oriented programming and aspects 127--136
      Shriram Krishnamurthi and   
               Kathi Fisler and   
              Michael Greenberg   Verifying aspect advice modularly  . . . 137--146
              Martin Rinard and   
         Alexandru Salcianu and   
                 Suhabe Bugrara   A classification system and analysis for
                                  aspect-oriented programs . . . . . . . . 147--158
           Robert J. Walker and   
                  Kevin Viggers   Implementing protocols via declarative
                                  event patterns . . . . . . . . . . . . . 159--169
           Nancy G. Leveson and   
             Kathryn Anne Weiss   Making embedded software reuse practical
                                  and safe . . . . . . . . . . . . . . . . 171--178
               Holger Giese and   
             Sven Burmester and   
       Wilhelm Schäfer and   
              Oliver Oberschelp   Modular design and verification of
                                  component-based mechatronic systems with
                                  online-reconfiguration . . . . . . . . . 179--188
           Jonathan Edwards and   
             Daniel Jackson and   
                   Emina Torlak   A type system for object models  . . . . 189--199
                Jianbin Tan and   
          George S. Avrunin and   
             Lori A. Clarke and   
         Shlomo Zilberstein and   
                    Stefan Leue   Heuristic-guided counterexample search
                                  in FLAVERS . . . . . . . . . . . . . . . 201--210
                   Ying Pan and   
                   Lei Wang and   
                   Lu Zhang and   
                   Bing Xie and   
                    Fuqing Yang   Relevancy based semantic interoperation
                                  of reuse repositories  . . . . . . . . . 211--220
    Cleidson R. B. de Souza and   
             David Redmiles and   
                Li-Te Cheng and   
               David Millen and   
                 John Patterson   How a good software practice thwarts
                                  collaboration: the multiple roles of
                                  APIs in software development . . . . . . 221--230
             Xiaofang Zhang and   
               Michal Young and   
         John H. E. F. Lasseter   Refining code-design mapping with flow
                                  analysis . . . . . . . . . . . . . . . . 231--240
            Alessandro Orso and   
                Nanjuan Shi and   
              Mary Jean Harrold   Scaling regression testing to large
                                  software systems . . . . . . . . . . . . 241--251
María José Suárez-Cabal and   
                    Javier Tuya   Using an SQL coverage measurement for
                                  testing database applications  . . . . . 253--262
                Paul Luo Li and   
                  Mary Shaw and   
               Jim Herbsleb and   
                 Bonnie Ray and   
                   P. Santhanam   Empirical evaluation of defect
                                  projection models for widely-deployed
                                  production software systems  . . . . . . 263--272
ACM SIGSOFT Software Engineering Notes Staff   Backmatter (author index)  . . . . . . . 273


ACM SIGSOFT Software Engineering Notes
Volume 30, Number 1, January, 2005

ACM SIGSOFT Software Engineering Notes Staff   Frontmatter (TOC, Letters, ICSE news,
                                  ICSM, RODIN) . . . . . . . . . . . . . . 0
                 P. V. Bhansali   Complexity measurement of data and
                                  control flow . . . . . . . . . . . . . . 1
            Shang-Wen Cheng and   
             Robert L. Nord and   
             Judith A. Stafford   WICSA Wiki WAN Party: capturing
                                  experience in software architecture best
                                  practices  . . . . . . . . . . . . . . . 1
                 P. V. Bhansali   Software dissimilarity debate revisited  2
               Holger Giese and   
             Ingolf Krüger   A summary of the ICSE 2004 Workshop on
                                  ``Scenarios and State Machines: Models,
                                  Algorithms, and Tools''  . . . . . . . . 2
                 P. V. Bhansali   Software safety: current status and
                                  future direction . . . . . . . . . . . . 3
    Rogério de Lemos and   
             Cristina Gacek and   
           Alexander Romanovsky   ICSE 2004 Workshop on Architecting
                                  Dependable Systems . . . . . . . . . . . 3
            Ahmed E. Hassan and   
            Richard C. Holt and   
                  Audris Mockus   Report on MSR 2004: International
                                  Workshop on Mining Software Repositories 4
               D. Janakiram and   
                 M. S. Rajasree   ReQuEst: Requirements-driven quality
                                  estimator  . . . . . . . . . . . . . . . 4
                Larry Bernstein   Trustworthy software systems . . . . . . 4--5
      Shriram Krishnamurthi and   
                  Tevfik Bultan   Discussion summary: characteristics of
                                  web services and their impact on
                                  testing, analysis and verification . . . 5
               Ralph Kuehne and   
            Cornelius Wille and   
                   Reiner Dumke   Software agents using simulation for
                                  decision-making  . . . . . . . . . . . . 5
                Robert Schaefer   Systems of systems and coordinated
                                  atomic actions . . . . . . . . . . . . . 6
                   Michael Wing   Towards a National Academy of Software
                                  Engineering  . . . . . . . . . . . . . . 6--7
          Alexander Stuckenholz   Component evolution and versioning state
                                  of the art . . . . . . . . . . . . . . . 7
                 Qianxiang Wang   Towards a rule model for self-adaptive
                                  software . . . . . . . . . . . . . . . . 8
             Peter B. Henderson   Software Engineering Education (SEEd)    8--9
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 9
               Peter G. Neumann   Risks to the public in computers and
                                  related systems  . . . . . . . . . . . . 9--18
                     Lei Xu and   
                  Baowen Xu and   
                  Jixiang Jiang   Testing web applications focusing on
                                  their specialties  . . . . . . . . . . . 10
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 19--27
         Mordechai Ben-Menachem   Review of \booktitleInterpreting the
                                  CMMI: a Process Improvement Approach by
                                  Margaret K. Kulpa and Kent A. Johnson.
                                  Auerbach Publications 2003 . . . . . . . 33--34
         Mordechai Ben-Menachem   Review of \booktitleSix Sigma Software
                                  Development by Christine B. Tayntor.
                                  Auerbach Publications, 2003  . . . . . . 34--34
                    Haoyang Che   Review of \booktitleThe Object Primer,
                                  2nd Edition by Scott W. Ambler.
                                  Cambridge University Press: Cambridge,
                                  2001, 0-521-785197 (paperback) . . . . . 35--35
                    Haoyang Che   Review of \booktitleThe Object Primer,
                                  3rd Edition by Scott W. Ambler.
                                  Cambridge University Press: Cambridge,
                                  2004, 0-521-54018-6 (paperback)  . . . . 35--36
                    Haoyang Che   Review of \booktitleEclipse: Building
                                  Commercial Quality Plug-ins by Eric
                                  Clayberg and Dan Rubel. Addison Wesley,
                                  2004, 0-321-22847-2 (paperback)  . . . . 36--36
                     Ken Frazer   Review of \booktitleMemory as a
                                  Programming Concept in C and C++ by
                                  Frantisek Franek. Cambridge University
                                  Press, 2004, (paperback), 0-521-52043-6  36--37
                   Brian Lawler   Review of \booktitleCMMI Distilled: a
                                  Practical Introduction to Integrated
                                  Process Improvement, Second Edition by
                                  Dennis M. Ahern, Aaron Clouse and
                                  Richard Turner. Addison Wesley, 2004,
                                  paperback, ISBN 0-321-18613-3  . . . . . 37--38
                       Joe Saur   Review of \booktitleSoftware Development
                                  for Small Teams: a RUP-Centric Approach
                                  by Gary Pollice, Liz Augustine, Chris
                                  Lowe, and Jas Madhur. Addison-Wesley,
                                  2004, paperback, ISBN 0-321-19950-2  . . 38--38
                       Joe Saur   Review of \booktitleSoftware Reliability
                                  Engineering: More Reliable Software
                                  Faster and Cheaper --- 2nd Edition by
                                  John Musa. AuthorHouse, Inc., 2004,
                                  Hardback, ISBN 1-4184-9388-0, Paperback,
                                  ISBN 1-4184-9387-2 . . . . . . . . . . . 38--39
ACM SIGSOFT Software Engineering Notes Staff   Backmatter (Report abstracts, Paper
                                  abstracts, Book Reviews, Calendar of
                                  Future Events) . . . . . . . . . . . . . 40

ACM SIGSOFT Software Engineering Notes
Volume 30, Number 2, March, 2005

ACM SIGSOFT Software Engineering Notes Staff   Frontmatter (TOC, Letters, Open Source
                                  Software (OSS) Patent Search Engine,
                                  Calendar of Events, Workshop and
                                  Conference Information)  . . . . . . . . 0
                  Nasib S. Gill   Factors affecting effective software
                                  quality management revisited . . . . . . 1--4
            Shahid Nazir Bhatti   Why quality?: ISO 9126 software quality
                                  metrics (Functionality) support by UML
                                  suite  . . . . . . . . . . . . . . . . . 1--5
               Keith A. Roberts   Generic methodology for open source
                                  software development . . . . . . . . . . 1--5
           Mehdi Sagheb-Tehrani   Expert systems development: some issues
                                  of design process  . . . . . . . . . . . 1--5
                  Michael Breen   Combinatorial completion by rule
                                  definition with interactive value
                                  colouring  . . . . . . . . . . . . . . . 1--6
                  Baowen Xu and   
                    Ju Qian and   
             Xiaofang Zhang and   
              Zhongqiang Wu and   
                       Lin Chen   A brief survey of program slicing  . . . 1--36
             Peter B. Henderson   Software engineering education (SEEd)    3--3
                 John C. Knight   Focusing software education on
                                  engineering  . . . . . . . . . . . . . . 3--5
                   Michael Wing   It's our job to care for SE  . . . . . . 6--8
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 9--16
               Peter G. Neumann   Risks to the Public  . . . . . . . . . . 17--25
                Charles Beasley   Review of \booktitleBalancing Agility
                                  and Discipline: a Guide for the
                                  Perplexed by Barry Boehm and Richard
                                  Turner; Addison Wesley, 2004, ISBN
                                  0-321-18612-5  . . . . . . . . . . . . . 28--28
                    Haoyang Che   Review of \booktitleObject Thinking by
                                  David West; Microsoft Press: Microsoft,
                                  2004, 0-7356-1965-4  . . . . . . . . . . 28--29
                    Haoyang Che   Review of \booktitleThe Elements of C++
                                  Style by Trevor Misfeldt, Gregory
                                  Bumgardner, and Andrew Gray; Cambridge
                                  University Press: Cambridge, 2004,
                                  0-521-89308-9  . . . . . . . . . . . . . 29--29
                    Haoyang Che   Review of \booktitleObject-Oriented
                                  Programming with Visual Basic.NET by
                                  Michael McMillan; Cambridge University
                                  Press: Cambridge, 2004, 0-521-53983-8    29--30
         Mordechai Ben-Menachem   Review of \booktitleTesting Embedded
                                  Software by Bart Broekman and Edwin
                                  Notenboom; Addison Wesley.; 2003 . . . . 30--30
                       Joe Saur   Review of \booktitleFind the Bug: a Book
                                  of Incorrect Programs by Adam Barr;
                                  Pearson Education, 2004, ISBN
                                  0-321-22391-8  . . . . . . . . . . . . . 30--31

ACM SIGSOFT Software Engineering Notes
Volume 30, Number 3, May, 2005

                     Will Tracz   Frontmatter (TOC, Letters, Preaching to
                                  the Choir!, Interviewers Needed, Time to
                                  Vote!, New Resource on SW Engineering,
                                  Calendar of Events, Workshop and
                                  Conference Information)  . . . . . . . . 0
              Joseph Feller and   
           Brian Fitzgerald and   
               Scott Hissam and   
                  Karim Lakhani   Collaboration, conflict and control:
                                  report on the 4th Workshop on Open
                                  Source Software Engineering  . . . . . . 1--2
           Ananth Kendapadi and   
              Matt Gandolfo and   
                 Amitosh Shukla   BatchFlow: a method and notation to
                                  visualize RDBMS batch jobs . . . . . . . 1--5
                Chia-Chu Chiang   Implicit heterogeneous and parallel
                                  programming  . . . . . . . . . . . . . . 1--6
             Muthu Ramachandran   Software reuse guidelines  . . . . . . . 1--8
             Ivica Crnkovic and   
              Ralf Reussner and   
              Heinz Schmidt and   
               Kevin Simons and   
            Judith Stafford and   
                   Kurt Wallnau   Report of the International Symposium on
                                  Component-Based Software Engineering . . 1--9
               Donald J. Reifer   Educating software engineers: an
                                  industry viewpoint . . . . . . . . . . . 8--9
                   Michael Wing   Toward a great and enduring profession   9--11
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 12--21
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 22--37
         Mordechai Ben-Menachem   Review of \booktitleReturn on Software
                                  by Steve Tockey; Addison Wesley, 2005    39--40
             Debora Weber-Wulff   Review of \booktitleOfficial eclipse 3.0
                                  FAQs by John Arthorne and Chris Laffra;
                                  Addison-Wesley, 2004, ISBN 0-321-26838-5 40--40
             Debora Weber-Wulff   Review of \booktitleContributing to
                                  eclipse: Principles, Patterns, and
                                  Plug-Ins by Erich Gamma and Kent Beck,
                                  Addison-Wesley, 2004, ISBN 0-321-20575-8 40--41

ACM SIGSOFT Software Engineering Notes
Volume 30, Number 4, July, 2005

                      Anonymous   Frontmatter (TOC, Letters, Election
                                  results, Software Reliability
                                  Resources!, Computing Curricula 2004 and
                                  the Software Engineering Volume SE2004,
                                  Software Reuse Research, ICSE 2005
                                  Forward) . . . . . . . . . . . . . . . . 0
           Robert V. Binder and   
                James E. Hanlon   The advanced mobile application testing
                                  environment  . . . . . . . . . . . . . . 1--1
             Hans-Dieter Ehrich   Harmonizing intra- and inter-object
                                  specification and verification: a
                                  multi-object logics approach . . . . . . 1--1
               David Garlan and   
               Marin Litoiu and   
       Hausi A. Müller and   
            John Mylopoulos and   
            Dennis B. Smith and   
                     Kenny Wong   DEAS 2005: workshop on the Design and
                                  Evolution of Autonomic Application
                                  Software . . . . . . . . . . . . . . . . 1--1
        Brian Henderson-Sellers   Agent-oriented methodologies: method
                                  engineering and metamodelling  . . . . . 1--1
                 Naftaly Minsky   Law-governed multi-agent systems: from
                                  anarchy to order . . . . . . . . . . . . 1--1
             Danilo Bruschi and   
                Bart De Win and   
                   Mattia Monga   Software engineering for secure systems  1--2
          Alessandro Garcia and   
             Ricardo Choren and   
              Carlos Lucena and   
       Alexander Romanovsky and   
                Tom Holvoet and   
                 Paolo Giorgini   Software engineering for large-scale
                                  multi-agent systems --- SELMAS'05  . . . 1--2
               Lori Pollock and   
                  James Andrews   ICSE 2005 workshop summary Third
                                  International Workshop on Dynamic
                                  Analysis (WODA 2005) . . . . . . . . . . 1--2
       Alexander Pretschner and   
         Christian Salzmann and   
                 Thomas Stauner   2nd Intl. ICSE Workshop on Software
                                  Engineering for Automotive Systems . . . 1--2
                     Jai Asundi   The need for effort estimation models
                                  for open source software projects  . . . 1--3
 Sushil Krishna Bajracharya and   
              Trung Chi Ngo and   
         Cristina Videira Lopes   On using Net Options Value as a value
                                  based design framework . . . . . . . . . 1--3
          Marcus Ciolkowski and   
         Jürgen Münch   Accumulation and presentation of
                                  empirical evidence: problems and
                                  challenges . . . . . . . . . . . . . . . 1--3
            Yvonne Dittrich and   
      Kari Rönkkö and   
             Olle Lindeberg and   
          Jeanette Erickson and   
              Christina Hansson   Co-Operative Method Development
                                  revisited  . . . . . . . . . . . . . . . 1--3
         Barbara Kitchenham and   
               David Budgen and   
             Pearl Brereton and   
               Step Hen Linkman   Realising evidence-based software
                                  engineering  . . . . . . . . . . . . . . 1--3
         A. Günes Koru and   
                A. Ant Ozok and   
              Anthony F. Norcio   The effect of human memory organization
                                  on code reviews under different single
                                  and pair code reviewing scenarios  . . . 1--3
                  Russell Ovans   All we really need to know about
                                  software engineering is in the film
                                  office space . . . . . . . . . . . . . . 1--3
             Michael M. Pickard   Old issues, new eyes . . . . . . . . . . 1--3
        Martin P. Robillard and   
                 Gail C. Murphy   Just-in-time concern modeling  . . . . . 1--3
            Martin P. Robillard   Workshop on the Modeling and Analysis of
                                  Concerns in Software (MACS 2005) . . . . 1--3
               Dennis Smith and   
               Edwin Morris and   
                   David Carney   Interoperability issues affecting
                                  autonomic computing  . . . . . . . . . . 1--3
             Susan L. Spraragen   The challenges in creating tools for
                                  improving the software development
                                  lifecycle  . . . . . . . . . . . . . . . 1--3
              Hema Srikanth and   
                Laurie Williams   On the economics of requirements-based
                                  test case prioritization . . . . . . . . 1--3
                      Grace Tai   A communication architecture from rapid
                                  prototyping  . . . . . . . . . . . . . . 1--3
                 Paul Adams and   
         Cornelia Boldyreff and   
               David Nutter and   
                   Stephen Rank   Adaptive reuse of libre software systems
                                  for supporting on-line collaboration . . 1--4
             K. K. Aggarwal and   
               Yogesh Singh and   
             Pravin Chandra and   
                  Manimala Puri   Evaluation of various training
                                  algorithms in a neural network model for
                                  software engineering applications  . . . 1--4
             K. K. Aggarwal and   
               Yogesh Singh and   
             Pravin Chandra and   
                  Manimala Puri   Sensitivity analysis of fuzzy and neural
                                  network models . . . . . . . . . . . . . 1--4
             Tariq Al-Naeem and   
                 Ian Gorton and   
                Fethi Rabhi and   
             Boualem Benatallah   Tool support for optimization-based
                                  architectural evaluation . . . . . . . . 1--4
              Muhammad Raza Ali   Why teach reverse engineering? . . . . . 1--4
               Yuanfang Cai and   
              Kevin J. Sullivan   A value-oriented theory of modularity in
                                  design . . . . . . . . . . . . . . . . . 1--4
                 Brenda Chawner   F/OSS in the library world: an
                                  exploration  . . . . . . . . . . . . . . 1--4
              Wesley Coelho and   
                 Gail C. Murphy   ActiveAspect: presenting crosscutting
                                  structure  . . . . . . . . . . . . . . . 1--4
              Kendra Cooper and   
                 Lawrence Chung   Managing change in an OTS-aware
                                  requirements engineering approach  . . . 1--4
    Rogério de Lemos and   
           Alexander Romanovsky   ICSE 2005 Workshop on Architecting
                                  Dependable Systems (WADS 2005) . . . . . 1--4
                  Jing Dong and   
                 Sheng Yang and   
             Lawrence Chung and   
              Paulo Alencar and   
                   Donald Cowan   A COTS architectural component
                                  specification stencil for selection and
                                  reasoning  . . . . . . . . . . . . . . . 1--4
              Xavier Franch and   
                Marco Torchiano   Towards a reference framework for
                                  COTS-based development: a proposal . . . 1--4
               M. T. Gamble and   
                  R. Gamble and   
                      M. Hepner   Understanding solution architecture
                                  concerns . . . . . . . . . . . . . . . . 1--4
       B. Henderson-Sellers and   
          C. Gonzalez-Perez and   
               M. K. Serour and   
                D. G. Firesmith   Method engineering and COTS evaluation   1--4
               Yoshiki Higo and   
           Toshihiro Kamiya and   
            Shinji Kusumoto and   
                  Katsuro Inoue   ARIES: refactoring support tool for code
                                  clone  . . . . . . . . . . . . . . . . . 1--4
                LiGuo Huang and   
                    Barry Boehm   Using iDAVE to determine availability
                                  requirements . . . . . . . . . . . . . . 1--4
             Piotr Kaminski and   
           Priyanka Agrawal and   
              Holger Kienle and   
              Hausi Müller   $ < {\rm username} > $, I need you!:
                                  initiative and interaction in autonomic
                                  systems  . . . . . . . . . . . . . . . . 1--4
               Andrew J. Ko and   
                  Brad A. Myers   Human factors affecting dependability in
                                  end-user programming . . . . . . . . . . 1--4
               Jyrki Kontio and   
         Jani-Pekka Jokinen and   
 Markus M. Mäkelä and   
                    Virve Leino   Current practices and research
                                  opportunities in software business
                                  models . . . . . . . . . . . . . . . . . 1--4
                 Jingyue Li and   
             Reidar Conradi and   
    Odd Petter N. Slyngstad and   
            Christian Bunse and   
                 Umair Khan and   
           Maurizio Morisio and   
                Marco Torchiano   Barriers to disseminating off-the-shelf
                                  based development theories to IT
                                  industry . . . . . . . . . . . . . . . . 1--4
                    Xing Li and   
               Ramesh Nagarajan   Modeling for image processing system
                                  validation, verification and testing . . 1--4
            Herwig Mannaert and   
                       Kris Ven   The use of open source software
                                  platforms by Independent Software
                                  Vendors: issues and opportunities  . . . 1--4
           Abdallah Mohamed and   
              Guenther Ruhe and   
                 Armin Eberlein   Decision support for customization of
                                  the COTS selection process . . . . . . . 1--4
        Mohammad A. Munawar and   
                Paul A. S. Ward   Better performance or better
                                  manageability? . . . . . . . . . . . . . 1--4
              Fidel Nkwocha and   
               Sebastian Elbaum   Fault patterns in Matlab . . . . . . . . 1--4
               Anna Persson and   
          Henrik Gustavsson and   
                Brian Lings and   
         Björn Lundell and   
            Anders Mattsson and   
                 Ulf Ärlig   OSS tools in a heterogeneous environment
                                  for embedded systems modelling: an
                                  analysis of adoptions of XMI . . . . . . 1--4
              Vahe Poladian and   
          João Sousa and   
              Frank Padberg and   
                      Mary Shaw   Anticipatory configuration of
                                  resource-aware applications  . . . . . . 1--4
              Lutz Prechelt and   
               Daniel J. Hutzel   Market forces and end-user programming
                                  for mission-critical systems . . . . . . 1--4
                   Yang Qun and   
             Yang Xian-Chun and   
                      Xu Man-Wu   A framework for dynamic software
                                  architecture-based self-healing  . . . . 1--4
                  Uzma Raja and   
                   Evelyn Barry   Investigating quality in large-scale
                                  Open Source Software . . . . . . . . . . 1--4
Annya Réquilé-Romanczuk and   
          Alejandra Cechich and   
      Anne Dourgnon-Hanoune and   
        Jean-Christophe Mielnik   Towards a knowledge-based framework for
                                  COTS component identification  . . . . . 1--4
               Judith Segal and   
             Antony Grinyer and   
                    Helen Sharp   The type of evidence produced by
                                  empirical software engineers . . . . . . 1--4
             Alistair Sutcliffe   Evaluating the costs and benefits of
                                  end-user development . . . . . . . . . . 1--4
     Jarno Vähäniitty   A tentative framework for connecting
                                  long-term business and product planning
                                  with iterative and incremental software
                                  product development  . . . . . . . . . . 1--4
           Michael VanHilst and   
             Pankaj K. Garg and   
                 Christopher Lo   Repository mining and Six Sigma for
                                  process improvement  . . . . . . . . . . 1--4
           Annie T. T. Ying and   
            James L. Wright and   
                  Steven Abrams   An exploration of how comments are used
                                  for marking related code fragments . . . 1--4
                Jiang Zheng and   
             Brian Robinson and   
            Laurie Williams and   
                   Karen Smiley   A process for identifying changes when
                                  source code is not available . . . . . . 1--4
              Robin Abraham and   
                   Martin Erwig   How to communicate unit error messages
                                  in spreadsheets  . . . . . . . . . . . . 1--5
         Thomas A. Alspaugh and   
        Debra J. Richardson and   
             Thomas A. Standish   Scenarios, state machines and
                                  purpose-driven testing . . . . . . . . . 1--5
          Giuliano Antoniol and   
       Vincenzo Fabio Rollo and   
               Gabriele Venturi   Linear predictive coding and cepstrum
                                  coefficients for mining time variant
                                  information from software repositories   1--5
            Ahilton Barreto and   
       Márcio Barros and   
          Cláudia Werner   Staffing a software project: a
                                  constraint satisfaction approach . . . . 1--5
            Ghassan Beydoun and   
       Cesar Gonzalez-Perez and   
                 Graham Low and   
        Brian Henderson-Sellers   Synthesis of a generic MAS metamodel . . 1--5
              Michael Bolin and   
               Robert C. Miller   Naming page elements in end-user web
                                  automation . . . . . . . . . . . . . . . 1--5
                 T. Y. Chen and   
                  F.-C. Kuo and   
                  Zhi Quan Zhou   An effective testing method for end-user
                                  programmers  . . . . . . . . . . . . . . 1--5
              Megan Conklin and   
              James Howison and   
                 Kevin Crowston   Collaboration using OSSmole: a
                                  repository of FLOSS data and analyses    1--5
      Hélio R. Costa and   
        Marcio de O. Barros and   
         Guilherme H. Travassos   A risk based economical approach for
                                  evaluating software project portfolios   1--5
           Kevin C. Desouza and   
                   Yukika Awazu   Managing radical software engineers:
                                  between order and chaos  . . . . . . . . 1--5
            Michael Fischer and   
         Johann Oberleitner and   
            Jacek Ratzinger and   
                    Harald Gall   Mining evolution data of a product
                                  family . . . . . . . . . . . . . . . . . 1--5
                Marc Fisher and   
                Gregg Rothermel   The EUSES spreadsheet corpus: a shared
                                  resource for supporting experimentation
                                  with spreadsheet dependability
                                  mechanisms . . . . . . . . . . . . . . . 1--5
           Daniel M. German and   
           Davor Cubrani\'c and   
        Margaret-Anne D. Storey   A framework for describing and
                                  understanding mining tools in software
                                  development  . . . . . . . . . . . . . . 1--5
               Holger Giese and   
             Ekkart Kindler and   
              Florian Klein and   
                  Robert Wagner   Reconciling scenario-centered controller
                                  design with state-based system models    1--5
          Carsten Görg and   
         Peter Weißgerber   Error detection by refactoring
                                  reconstruction . . . . . . . . . . . . . 1--5
          Sherif A. Gurguis and   
                      Amir Zeid   Towards autonomic web services:
                                  achieving self-healing using web
                                  services . . . . . . . . . . . . . . . . 1--5
               Haitham S. Hamza   Separation of concerns for evolving
                                  systems: a stability-driven approach . . 1--5
           William Harrison and   
              Harold Ossher and   
             Stanley Sutton and   
                      Peri Tarr   Concern modeling in the concern
                                  manipulation environment . . . . . . . . 1--5
         Jane Huffman Hayes and   
              Alex Dekhtyar and   
               Senthil Sundaram   Text mining for software engineering:
                                  how analyst feedback impacts final
                                  results  . . . . . . . . . . . . . . . . 1--5
 Francisco Hernández and   
      Purushotham Bangalore and   
                   Kevin Reilly   End-user tools for grid computing  . . . 1--5
               Abram Hindle and   
               Daniel M. German   SCQL: a formal model and a query
                                  language for source control repositories 1--5
                LiGuo Huang and   
                    Barry Boehm   Determining how much software assurance
                                  is enough?: a value-based approach . . . 1--5
             Shih-Kun Huang and   
                   Kang-min Liu   Mining version histories to verify the
                                  learning process of Legitimate
                                  Peripheral Participants  . . . . . . . . 1--5
                Apurva Jain and   
                    Barry Boehm   Developing a theory of value-based
                                  software engineering . . . . . . . . . . 1--5
           Vladimir Jakobac and   
           Nenad Medvidovic and   
                Alexander Egyed   Separating architectural concerns to
                                  ease program understanding . . . . . . . 1--5
                 Bonnie E. John   Evidence-based practice in
                                  human-computer interaction and evidence
                                  maps . . . . . . . . . . . . . . . . . . 1--5
               Huzefa Kagdi and   
         Michael L. Collard and   
            Jonathan I. Maletic   Towards a taxonomy of approaches for
                                  mining of source code repositories . . . 1--5
                   Patrick Keil   Principal agent theory and its
                                  application to analyze outsourcing of
                                  software development . . . . . . . . . . 1--5
         Sebastian Kiebusch and   
            Bogdan Franczyk and   
                  Andreas Speck   Metrics for software system families . . 1--5
                Sunghun Kim and   
         E. James Whitehead and   
                 Jennifer Bevan   Analysis of signature change patterns    1--5
                Miryung Kim and   
                   David Notkin   Using a clone genealogy extractor for
                                  understanding and supporting evolution
                                  of code clones . . . . . . . . . . . . . 1--5
               Timo Koponen and   
                    Virpi Hotti   Open source software maintenance process
                                  framework  . . . . . . . . . . . . . . . 1--5
         A. Günes Koru and   
                   Hongfang Liu   An investigation of the effect of module
                                  size on defect prediction using static
                                  measures . . . . . . . . . . . . . . . . 1--5
             Zarrin Langari and   
             Anne Banks Pidduck   Quality, cleanroom and formal methods    1--5
                    Amy Law and   
                Raylene Charron   Effects of agile practices on social
                                  factors  . . . . . . . . . . . . . . . . 1--5
           Jing (Janet) Liu and   
              Robyn R. Lutz and   
            Jeffrey M. Thompson   Mapping concern space to software
                                  architecture: a connector-based approach 1--5
              Eve MacGregor and   
               Yvonne Hsieh and   
              Philippe Kruchten   Cultural patterns in software process
                                  mishaps: incidents in global projects    1--5
               Marius Marin and   
                Leon Moonen and   
               Arie van Deursen   An approach to aspect refactoring based
                                  on crosscutting concern types  . . . . . 1--5
                    Bart Massey   Longitudinal analysis of long-timescale
                                  open source repository data  . . . . . . 1--5
                   Juri Memmert   Concern patterns and analysis  . . . . . 1--5
                Keir Mierle and   
                Kevin Laven and   
                 Sam Roweis and   
                    Greg Wilson   Mining student CVS repositories for
                                  performance indicators . . . . . . . . . 1--5
            Jennifer Morris and   
                 Philip Koopman   Representing design tradeoffs in
                                  safety-critical systems  . . . . . . . . 1--5
             Iulian Neamtiu and   
          Jeffrey S. Foster and   
                  Michael Hicks   Understanding source code evolution
                                  using abstract syntax tree matching  . . 1--5
            Thomas Neubauer and   
              Markus Klemen and   
                   Stefan Biffl   Business process-based valuation of
                                  IT-security  . . . . . . . . . . . . . . 1--5
                Masaru Ohba and   
               Katsuhiko Gondow   Toward mining ``concept keywords'' from
                                  identifiers in large software projects   1--5
                Masao Ohira and   
               Naoki Ohsugi and   
              Tetsuya Ohoka and   
             Ken-ichi Matsumoto   Accelerating cross-project knowledge
                                  collaboration using collaborative
                                  filtering and social networks  . . . . . 1--5
          Robert R. Painter and   
                   David Coppit   A model for software plans . . . . . . . 1--5
 José J. Pazos-Arias and   
  Jorge García-Duque and   
Martín López-Nores   Eliciting requirements and scenarios
                                  using the SCTL-MUS methodology: the
                                  shuttle system case study  . . . . . . . 1--5
 José J. Pazos-Arias and   
  Jorge García-Duque and   
Martín López-Nores   Locating crosscutting concerns in the
                                  formal specification of distributed
                                  reactive systems . . . . . . . . . . . . 1--5
              Austen Rainer and   
           Dorota Jagielska and   
                     Tracy Hall   Software engineering practice versus
                                  evidence-based software engineering
                                  research . . . . . . . . . . . . . . . . 1--5
            Jacek Ratzinger and   
            Michael Fischer and   
                    Harald Gall   Improving evolvability through
                                  refactoring  . . . . . . . . . . . . . . 1--5
            Gregorio Robles and   
     Jesus M. Gonzalez-Barahona   Developer identification methods for
                                  integrated data from various sources . . 1--5
Genaína N. Rodrigues and   
         David S. Rosenblum and   
              Sebastian Uchitel   Sensitivity analysis for a
                                  scenario-based reliability prediction
                                  model  . . . . . . . . . . . . . . . . . 1--5
             Cristina Rossi and   
              Andrea Bonaccorsi   Why profit-oriented companies enter the
                                  OS field?: intrinsic vs. extrinsic
                                  incentives . . . . . . . . . . . . . . . 1--5
                Mazen Saleh and   
                   Hassan Gomaa   Separation of concerns in software
                                  product line engineering . . . . . . . . 1--5
                     Kirk Sayre   Usage model-based automated testing of
                                  C++ templates  . . . . . . . . . . . . . 1--5
                   Walt Scacchi   OpenEC/B: electronic commerce and
                                  free/open source software development    1--5
       Christopher Scaffidi and   
                  Mary Shaw and   
                     Brad Myers   An approach for categorizing end user
                                  programmers to guide software
                                  engineering research . . . . . . . . . . 1--5
             Chris Scaffidi and   
               Ashish Arora and   
               Shawn Butler and   
                      Mary Shaw   A value-based approach to predicting
                                  system properties from design  . . . . . 1--5
           Albert Schilling and   
              Kelma Madeira and   
              Paula Donegan and   
          Kênia Sousa and   
          Elizabeth Furtado and   
                  Vasco Furtado   An integrated method for designing user
                                  interfaces based on tests  . . . . . . . 1--5
                   Judith Segal   Two principles of end-user software
                                  engineering research . . . . . . . . . . 1--5
                Maha Shaikh and   
                  Tony Cornford   Learning/organizing in Linux: a study of
                                  the `spaces in between'  . . . . . . . . 1--5
            Bradley Simmons and   
                 Hanan Lutfiyya   Policies, grids and autonomic computing  1--5
          Jacek \'Sliwerski and   
          Thomas Zimmermann and   
                 Andreas Zeller   When do changes induce fixes?  . . . . . 1--5
               Jaime Spacco and   
            Jaymie Strecker and   
            David Hovemeyer and   
                   William Pugh   Software repository mining with
                                  Marmoset: an automated programming
                                  project snapshot and testing system  . . 1--5
       Katherine J. Stewart and   
             David P. Darcy and   
               Sherae L. Daniel   Observations on patterns of development
                                  in open source software projects . . . . 1--5
           Naoyasu Ubayashi and   
                   Tetsuo Tamai   Concern management for constructing
                                  model compilers  . . . . . . . . . . . . 1--5
        Carol A. Wellington and   
              Thomas Briggs and   
               C. Dudley Girard   Examining team cohesion as an effect of
                                  software engineering methodology . . . . 1--5
            Laurie Williams and   
               Lucas Layman and   
              Pekka Abrahamsson   On establishing the essential components
                                  of a technology-dependent framework: a
                                  strawman framework for industrial case
                                  study-based research . . . . . . . . . . 1--5
          Chadd C. Williams and   
       Jeffrey K. Hollingsworth   Recovering system specific rules from
                                  software repositories  . . . . . . . . . 1--5
                Xiaoqing Wu and   
          Barrett R. Bryant and   
                  Jeff Gray and   
                  Marjan Mernik   Pattern transformation for
                                  two-dimensional separation of concerns   1--5
           Annie T. T. Ying and   
            James L. Wright and   
                  Steven Abrams   Source code that talks: an exploration
                                  of Eclipse task comments and their
                                  implication to repository mining . . . . 1--5
                 Jing Zhang and   
                  Jeff Gray and   
                     Yuehua Lin   A model-driven approach to enforce
                                  crosscutting assertion checking  . . . . 1--5
              Naveed Arshad and   
          Dennis Heimbigner and   
              Alexander L. Wolf   Dealing with failures during failure
                                  recovery of distributed systems  . . . . 1--6
           Mikhail Auguston and   
         James Bret Michael and   
                  Man-Tak Shing   Environment behavior models for scenario
                                  generation and testing automation  . . . 1--6
              Pablo Barrera and   
            Gregorio Robles and   
José M. Cañas and   
    Francisco Martín and   
        Vicente Matellán   Impact of libre software tools and
                                  methods in the robotics field  . . . . . 1--6
                    Barry Boehm   Value-based quality processes and
                                  results  . . . . . . . . . . . . . . . . 1--6
             Gary D. Boetticher   Nearest neighbor sampling for better
                                  defect prediction  . . . . . . . . . . . 1--6
            J. Botaschanjan and   
                     L. Kof and   
             C. Kühnel and   
                   M. Spichkova   Towards verified automotive software . . 1--6
            Gerardo Canfora and   
                Piero Corte and   
           Antonio De Nigro and   
            Debora Desideri and   
      Massimiliano Di Penta and   
          Raffaele Esposito and   
             Amedeo Falanga and   
               Gloria Renna and   
          Rita Scognamiglio and   
          Francesco Torelli and   
        Maria Luisa Villani and   
               Paolo Zampognaro   The C-Cube framework: developing
                                  autonomic applications through web
                                  services . . . . . . . . . . . . . . . . 1--6
                Zhihao Chen and   
                Tim Menzies and   
                   Dan Port and   
                    Barry Boehm   Feature subset selection can improve
                                  software cost estimation accuracy  . . . 1--6
                Markus Clermont   Heuristics for the automatic
                                  identification of irregularities in
                                  spreadsheets . . . . . . . . . . . . . . 1--6
            Giovanni Denaro and   
         Mauro Pezzé and   
                    Davide Tosi   Adaptive integration of third-party web
                                  services . . . . . . . . . . . . . . . . 1--6
               Ulrik Eklund and   
        Örjan Askerdal and   
             Johan Granholm and   
            Anders Alminger and   
                 Jakob Axelsson   Experience of introducing reference
                                  architectures in the development of
                                  automotive electronic systems  . . . . . 1--6
        Joakim Fröberg and   
    Kristian Sandström and   
         Christer Norström   Business situation reflected in
                                  automotive electronic architectures:
                                  analysis of four commercial cases  . . . 1--6
                Leif Geiger and   
            Albert Zündorf   Story driven testing --- SDT . . . . . . 1--6
            John C. Georgas and   
  André van der Hoek and   
              Richard N. Taylor   Architectural runtime configuration
                                  management in support of dependable
                                  self-adaptive software . . . . . . . . . 1--6
            John C. Georgas and   
         Michael M. Gorlick and   
              Richard N. Taylor   Raging incrementalism: harnessing change
                                  with open-source software  . . . . . . . 1--6
             Simon Giesecke and   
                 Timo Warns and   
            Wilhelm Hasselbring   Availability simulation of peer-to-peer
                                  architectural styles . . . . . . . . . . 1--6
            Paul S. Grisham and   
               Dewayne E. Perry   Customer relationships and Extreme
                                  Programming  . . . . . . . . . . . . . . 1--6
             Zahia Guessoum and   
                  Nora Faci and   
              Jean-Pierre Briot   Adaptive replication of large-scale
                                  multi-agent systems: towards a
                                  fault-tolerant multi-agent platform  . . 1--6
           Vijay K. Gurbani and   
              Anita Garvert and   
              James D. Herbsleb   A case study of open source tools and
                                  practices in a commercial setting  . . . 1--6
             Israel Herraiz and   
            Gregorio Robles and   
     Jesus M. Gonzalez-Barahona   Towards predictor models for large libre
                                  software projects  . . . . . . . . . . . 1--6
               Michael John and   
               Frank Maurer and   
          Bjòrnar Tessem   Human and Social Factors of Software
                                  Engineering: workshop summary  . . . . . 1--6
         Sebastian Kiebusch and   
            Bogdan Franczyk and   
                  Andreas Speck   A real time measure of software system
                                  families . . . . . . . . . . . . . . . . 1--6
      Ingolf H. Krüger and   
               Reena Mathew and   
              Michael Meisinger   From scenarios to aspects: exploring
                                  product lines  . . . . . . . . . . . . . 1--6
       Xiaoqing (Frank) Liu and   
                    Yan Sun and   
                Gautam Kane and   
                 Yuji Kyoya and   
                  Kunio Noguchi   QFD application in software process
                                  management and improvement based on CMM  1--6
               Carolyn Mair and   
            Martin Shepperd and   
         Magne Jòrgensen   An analysis of data sets used to train
                                  and validate cost prediction systems . . 1--6
                Tim Menzies and   
                   Dan Port and   
                Zhihao Chen and   
                    Jairus Hihn   Simple software cost analysis: safe or
                                  unsafe?  . . . . . . . . . . . . . . . . 1--6
               Joost Noppen and   
          Pim van den Broek and   
                   Mehmet Aksit   Dealing with imprecise quality factors
                                  in software design . . . . . . . . . . . 1--6
         Fredrik Pettersson and   
            Martin Ivarsson and   
               Peter Öhman   Automotive use case standard for
                                  embedded systems . . . . . . . . . . . . 1--6
      Monvorath Phongpaibul and   
                    Barry Boehm   Improving quality through software
                                  process improvement in Thailand: initial
                                  analysis . . . . . . . . . . . . . . . . 1--6
                Steven P. Reiss   Dynamic detection and visualization of
                                  software phases  . . . . . . . . . . . . 1--6
         Joseph R. Ruthruff and   
               Margaret Burnett   Six challenges in supporting end-user
                                  debugging  . . . . . . . . . . . . . . . 1--6
                Robert Schaefer   Deeper questions: the metaproblem of
                                  large organizations developing complex
                                  systems and the limits of process  . . . 1--6
                Helen Sharp and   
                  Hugh Robinson   Some social factors of software
                                  engineering: the maverick, community and
                                  technical practices  . . . . . . . . . . 1--6
             David Shepherd and   
               Lori Pollock and   
              Tom Tourwé   Using language clues to discover
                                  crosscutting concerns  . . . . . . . . . 1--6
              Mark Sherriff and   
        Nachiappan Nagappan and   
            Laurie Williams and   
                    Mladen Vouk   Early estimation of defect density using
                                  an in-process Haskell metrics model  . . 1--6
          Ingo Stürmer and   
           Daniela Weinberg and   
                   Mirko Conrad   Overview of existing safeguarding
                                  techniques for automatically generated
                                  code . . . . . . . . . . . . . . . . . . 1--6
Senthil Karthikeyan Sundaram and   
         Jane Huffman Hayes and   
             Alexander Dekhtyar   Baselines in requirements tracing  . . . 1--6
             Alistair Sutcliffe   Applying small group theory to analysis
                                  and design of CSCW systems . . . . . . . 1--6
               Medha Umarji and   
                 Carolyn Seaman   Predicting acceptance of Software
                                  Process Improvement  . . . . . . . . . . 1--6
               V. Vipindeep and   
                  Pankaj Jalote   Efficient static analysis with path
                                  pruning using coverage data  . . . . . . 1--6
              Stefan Wagner and   
                 Tilman Seifert   Software quality economics for
                                  defect-detection techniques using
                                  failure prediction . . . . . . . . . . . 1--6
             Bruce W. Weide and   
                Paolo Bucci and   
              Wayne D. Heym and   
           Murali Sitaraman and   
                Giorgio Rizzoni   Issues in performance certification for
                                  high-level automotive control software   1--6
                   Lihua Xu and   
                  Hadar Ziv and   
           Debra Richardson and   
             Thomas A. Alspaugh   An architectural pattern for
                                  non-functional dependability
                                  requirements . . . . . . . . . . . . . . 1--6
                  Ying Zhou and   
                   Joseph Davis   Open source software reliability model:
                                  an empirical approach  . . . . . . . . . 1--6
             Wolfgang Zuser and   
                Stefan Heil and   
               Thomas Grechenig   Software quality development and
                                  assurance in RUP, MSF and XP: a
                                  comparative study  . . . . . . . . . . . 1--6
          Marwan Abi-Antoun and   
           Jonathan Aldrich and   
               David Garlan and   
            Bradley Schmerl and   
                 Nagi Nahas and   
                     Tony Tseng   Improving system dependability by
                                  enforcing architectural intent . . . . . 1--7
                  Chintan Amrit   Coordination in software development:
                                  the problem of task allocation . . . . . 1--7
    Dharini Balasubramaniam and   
               Ron Morrison and   
               Graham Kirby and   
                Kath Mickan and   
              Brian Warboys and   
              Ian Robertson and   
                Bob Snowdon and   
          R. Mark Greenwood and   
                    Wykeen Seet   A software architecture approach for
                                  structuring autonomic systems  . . . . . 1--7
              Somo Banerjee and   
          Chris A. Mattmann and   
           Nenad Medvidovic and   
                Leana Golubchik   Leveraging architectural models to
                                  inject trust into software systems . . . 1--7
          Christian Bartelt and   
             Thomas Fischer and   
               Dirk Niebuhr and   
             Andreas Rausch and   
                Franz Seidl and   
                   Marcus Trapp   Dynamic integration of heterogeneous
                                  mobile devices . . . . . . . . . . . . . 1--7
         Lucia R. D. Bastos and   
           Jaelson F. B. Castro   From requirements to multi-agent
                                  architecture using organisational
                                  concepts . . . . . . . . . . . . . . . . 1--7
               Thomas Bauer and   
              Jens Herrmann and   
          Peter Liggesmeyer and   
   Christopher Robinson-Mallett   A flexible integration strategy for
                                  in-car telematics systems  . . . . . . . 1--7
           Georgine Beranek and   
             Wolfgang Zuser and   
               Thomas Grechenig   Functional group roles in software
                                  engineering teams  . . . . . . . . . . . 1--7
            Karun N. Biyani and   
            Sandeep S. Kulkarni   Building component families to support
                                  adaptation . . . . . . . . . . . . . . . 1--7
                 S. Boroday and   
                A. Petrenko and   
                   J. Singh and   
                      H. Hallal   Dynamic analysis of Java applications
                                  for multithreaded antipatterns . . . . . 1--7
                 F. Bouquet and   
                 E. Jaffuel and   
                 B. Legeard and   
                 F. Peureux and   
                      M. Utting   Requirements traceability in automated
                                  test generation: application to smart
                                  card software validation . . . . . . . . 1--7
             Robert W. Bowdidge   Refactoring gcc using structure field
                                  access traces and concept analysis . . . 1--7
                 Ben Breech and   
                   Lori Pollock   A framework for testing security
                                  mechanisms for program-based attacks . . 1--7
      Renée C. Bryce and   
            Charles J. Colbourn   Test prioritization for pairwise
                                  interaction coverage . . . . . . . . . . 1--7
                    Xia Cai and   
                 Michael R. Lyu   The effect of code coverage on fault
                                  detection under different testing
                                  profiles . . . . . . . . . . . . . . . . 1--7
            Markus Clermont and   
                   David Parnas   Using information about functions in
                                  selecting test cases . . . . . . . . . . 1--7
           Marcelo d'Amorim and   
                 Klaus Havelund   Event-based runtime verification of Java
                                  programs . . . . . . . . . . . . . . . . 1--7
             Josh Dehlinger and   
                  Robyn R. Lutz   A product-line requirements approach to
                                  safe reuse in multi-agent systems  . . . 1--7
                      Uri Dekel   Supporting distributed software design
                                  meetings: what can we learn from
                                  co-located meetings? . . . . . . . . . . 1--7
               Scott A. DeLoach   Multiagent systems engineering of
                                  organization-based multiagent systems    1--7
           Omer Erdem Demir and   
               Prem Devanbu and   
           Nenad Medvidovic and   
               Eric Wohlstadter   DISCOA: architectural adaptations for
                                  security and QoS . . . . . . . . . . . . 1--7
               Zaid Dwaikat and   
      Francesco Parisi-Presicce   Risky trust: risk-based analysis of
                                  software systems . . . . . . . . . . . . 1--7
              Emilia Farcas and   
             Claudiu Farcas and   
              Wolfgang Pree and   
                    Josef Templ   Real-time component integration based on
                                  transparent distribution . . . . . . . . 1--7
      Fernando Castor Filho and   
        Patrick H. S. Brito and   
  Cecília Mary F. Rubira   A framework for analyzing exception flow
                                  in software architectures  . . . . . . . 1--7
           Scott D. Fleming and   
          Betty H. C. Cheng and   
       R. E. Kurt Stirewalt and   
             Philip K. McKinley   An approach to implementing dynamic
                                  adaptation in C++  . . . . . . . . . . . 1--7
              Ashraf Gaffar and   
               Ahmed Seffah and   
           John A. Van der Poll   HCI pattern semantics in XML: a
                                  pragmatic approach . . . . . . . . . . . 1--7
             Michael Gegick and   
                Laurie Williams   Matching attack patterns to security
                                  vulnerabilities in software-intensive
                                  system designs . . . . . . . . . . . . . 1--7
              Rean Griffith and   
                    Gail Kaiser   Manipulating managed execution runtimes
                                  to support self-healing systems  . . . . 1--7
          David Mc Guinness and   
                    Liam Murphy   A simulation model of a multi-server EJB
                                  system . . . . . . . . . . . . . . . . . 1--7
      William G. J. Halfond and   
                Alessandro Orso   Combining static analysis and runtime
                                  monitoring to counter SQL-injection
                                  attacks  . . . . . . . . . . . . . . . . 1--7
                Mike Jochen and   
      Anteneh Addis Anteneh and   
            Lori L. Pollock and   
                 Lisa M. Marvel   Enabling control over adaptive program
                                  transformation for dynamically evolving
                                  mobile software validation . . . . . . . 1--7
               Alan F. Karr and   
                 Adam A. Porter   Distributed performance testing using
                                  statistical modeling . . . . . . . . . . 1--7
               Minseong Kim and   
               Jaemin Jeong and   
                   Sooyong Park   From product lines to self-managed
                                  systems: an architecture-based runtime
                                  reconfiguration framework  . . . . . . . 1--7
                 Peter B. Lakey   Model-based specification and testing
                                  applied to the Ground-Based Midcourse
                                  Defense (GMD) system: an industry report 1--7
         Alexei Lapouchnian and   
           Sotirios Liaskos and   
            John Mylopoulos and   
                       Yijun Yu   Towards requirements-driven autonomic
                                  systems design . . . . . . . . . . . . . 1--7
               Seok Won Lee and   
            Robin A. Gandhi and   
                  Gail-Joon Ahn   Establishing trustworthiness in services
                                  of the critical infrastructure through
                                  certification and accreditation  . . . . 1--7
               Marin Litoiu and   
            Murray Woodside and   
                      Tao Zheng   Hierarchical model-based autonomic
                                  control of software systems  . . . . . . 1--7
                WenQian Liu and   
            Charles L. Chen and   
     Vidya Lakshminarayanan and   
               Dewayne E. Perry   A design for evidence --- based soft
                                  research . . . . . . . . . . . . . . . . 1--7
                    C. Lott and   
                    A. Jain and   
                       S. Dalal   Modeling requirements for combinatorial
                                  software testing . . . . . . . . . . . . 1--7
               Esperanza Marcos   Software engineering research versus
                                  software development . . . . . . . . . . 1--7
                  Wes Masri and   
                 Andy Podgurski   Using dynamic information flow analysis
                                  to detect attacks against applications   1--7
              Nancy R. Mead and   
                    Ted Stehney   Security quality requirements
                                  engineering (SQUARE) methodology . . . . 1--7
        Michael G. Merideth and   
               Priya Narasimhan   Retrofitting networked applications to
                                  add autonomic reconfiguration  . . . . . 1--7
              Henry Muccini and   
             Marcio S. Dias and   
            Debra J. Richardson   Towards software architecture-based
                                  regression testing . . . . . . . . . . . 1--7
        Nachiappan Nagappan and   
            Laurie Williams and   
                Mladen Vouk and   
                  Jason Osborne   Early estimation of software quality
                                  using in-process testing metrics: a
                                  controlled case study  . . . . . . . . . 1--7
         Erika Mir Olimpiew and   
                   Hassan Gomaa   Model-based testing for applications
                                  derived from software product lines  . . 1--7
          Toacy C. Oliveira and   
              Paulo Alencar and   
                  Don Cowan and   
                  Carlos Lucena   xTAO: enabling a declarative approach to
                                  the specification of multi-agent systems 1--7
            Alessandro Orso and   
                  Bryan Kennedy   Selective capture and replay of program
                                  executions . . . . . . . . . . . . . . . 1--7
             Mayur Palankar and   
               Jonathan E. Cook   Merging traces of hardware-assisted data
                                  breakpoints  . . . . . . . . . . . . . . 1--7
                  Amit Paradkar   Case studies on fault detection
                                  effectiveness of model based test
                                  generation techniques  . . . . . . . . . 1--7
              Niklas Pettersson   Measuring precision for static and
                                  dynamic design pattern recognition as a
                                  function of coverage . . . . . . . . . . 1--7
        Osamah A. Rawashdeh and   
        Garrett D. Chandler and   
                 James E. Lumpp   A UAU test and development environment
                                  based on dynamic system reconfiguration  1--7
                    Jie Ren and   
             Richard Taylor and   
               Paul Dourish and   
                 David Redmiles   Towards an architectural treatment of
                                  software security: a connector-centric
                                  approach . . . . . . . . . . . . . . . . 1--7
               Maarten Rits and   
            Benjamin De Boe and   
                 Andreas Schaad   XacT: a bridge between resource
                                  management and access control in
                                  multi-layered applications . . . . . . . 1--7
Christopher Robinson-Mallett and   
          Peter Liggesmeyer and   
            Tilo Mücke and   
                   Ursula Goltz   Generating optimal distinguishing
                                  sequences with a model checker . . . . . 1--7
          S. Masoud Sadjadi and   
         Philip K. McKinley and   
              Betty H. C. Cheng   Transparent shaping of existing software
                                  to support pervasive and autonomic
                                  computing  . . . . . . . . . . . . . . . 1--7
            Mazeiar Salehie and   
               Ladan Tahvildari   Autonomic computing: emerging trends and
                                  open problems  . . . . . . . . . . . . . 1--7
           Sreedevi Sampath and   
              Sara Sprenkle and   
               Emily Gibson and   
               Lori Pollock and   
                    Amie Souter   Analyzing clusters of web application
                                  user sessions  . . . . . . . . . . . . . 1--7
               Jessica Sant and   
                Amie Souter and   
                Lloyd Greenwald   An exploration of statistical models for
                                  automated test case generation . . . . . 1--7
                  Rohan Sen and   
           Gregory Hackmann and   
        Gruia-Catalin Roman and   
               Christopher Gill   Opportunistic exploitation of knowledge
                                  to increase predictability of agent
                                  interactions in MANETs . . . . . . . . . 1--7
            Michael E. Shin and   
                   Daniel Cooke   Connector-based self-healing mechanism
                                  for components of a reliable system  . . 1--7
               Karsten Sohr and   
              Gail-Joon Ahn and   
                     Lars Migge   Articulating and enforcing authorisation
                                  policies with UML and OCL  . . . . . . . 1--7
          Deepti Srivastava and   
               Priya Narasimhan   Architectural support for mode-driven
                                  fault tolerance in distributed
                                  applications . . . . . . . . . . . . . . 1--7
            Miroslaw Staron and   
            Ludwik Kuzniarz and   
                Christian Thurn   An empirical assessment of using
                                  stereotypes to improve reading
                                  techniques in software inspections . . . 1--7
             Anand Tripathi and   
          Devdatta Kulkarni and   
                   Tanvir Ahmed   Policy-driven configuration and
                                  management of agent based distributed
                                  systems  . . . . . . . . . . . . . . . . 1--7
           Tine Verhanneman and   
             Frank Piessens and   
                Bart De Win and   
                  Wouter Joosen   Requirements traceability to support
                                  evolution of access control  . . . . . . 1--7
                     John Viega   Building security requirements with
                                  CLASP  . . . . . . . . . . . . . . . . . 1--7
                 Rob Weaver and   
          Georgios Despotou and   
                  Tim Kelly and   
                  John McDermid   Combining software evidence: arguments
                                  and assurance  . . . . . . . . . . . . . 1--7
                  Sam Weber and   
             Paul A. Karger and   
                  Amit Paradkar   A software flaw taxonomy: aiming tools
                                  at security  . . . . . . . . . . . . . . 1--7
                Danny Weyns and   
           Kurt Schelfthout and   
                    Tom Holvoet   Architectural design of a distributed
                                  application with autonomic quality
                                  requirements . . . . . . . . . . . . . . 1--7
                Bart De Win and   
             Frank Piessens and   
                  Jan Smans and   
                  Wouter Joosen   Towards a unifying view on security
                                  contracts  . . . . . . . . . . . . . . . 1--7
                 Weihang Wu and   
                      Tim Kelly   Failure modelling in software
                                  architecture design for safety . . . . . 1--7
          S. Michelle Young and   
           Helen M. Edwards and   
            Sharon McDonald and   
             J. Barrie Thompson   Personality characteristics in an XP
                                  team: a repertory grid study . . . . . . 1--7
             Carmen Zannier and   
                   Frank Maurer   A qualitative empirical evaluation of
                                  design decisions . . . . . . . . . . . . 1--7
                   Ji Zhang and   
              Betty H. C. Cheng   Specifying adaptation semantics  . . . . 1--7
             Michael Dinkel and   
                 Uwe Baumgarten   Modeling nonfunctional requirements: a
                                  basis for dynamic systems management . . 1--8
          Alessandro Garcia and   
             Ricardo Choren and   
              Carlos Lucena and   
       Alexander Romanovsky and   
               Holger Giese and   
                Danny Weyns and   
                Tom Holvoet and   
                 Paolo Giorgini   Software Engineering for Large-Scale
                                  Multi-Agent Systems --- SELMAS 2005:
                                  workshop report  . . . . . . . . . . . . 1--8
              Nadeem Jamali and   
                  Shangping Ren   A layered architecture for real-time
                                  distributed multi-agent systems  . . . . 1--8
              Florian Klein and   
                   Holger Giese   Analysis and design of physical and
                                  social contexts in multi-agent systems
                                  using UML  . . . . . . . . . . . . . . . 1--8
           Koenraad Mertens and   
                Tom Holvoet and   
                Yolande Berbers   A case for adaptation of the distributed
                                  environment layout in multiagent
                                  applications . . . . . . . . . . . . . . 1--8
           Kurt Schelfthout and   
                Tom Holvoet and   
                Yolande Berbers   Views: customizable abstractions for
                                  contextaware applications in MANETs  . . 1--8
             Peter B. Henderson   Software Engineering Education (SEEd)    6--6
               David Parnas and   
            Lillian Chik-Parnas   Goals for software engineering student
                                  education  . . . . . . . . . . . . . . . 6--8
             Matthias Tichy and   
               Holger Giese and   
          Daniela Schilling and   
                 Wladimir Pauls   Computing optimal self-repair actions:
                                  damage minimization versus repair time   1--6
                       Joe Saur   Project management: here we go again!    8--8
                   Michael Wing   In praise of SE Geeks  . . . . . . . . . 8--9
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 10--18
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 19--35
          Mordechai Ben-anachem   Review of \booktitleSoftware Endgames:
                                  Eliminating Defects, Controlling Change,
                                  and the Countdown to On-Time Delivery by
                                  Robert Galen, Dorset House, ISBN:
                                  0-932633-62-5, 2005  . . . . . . . . . . 82--83
                    Haoyang Che   Review of \booktitleAgile Modeling:
                                  Effective Practice for eXtreme
                                  Programming and the Unified Process by
                                  Scott W. Ambler, John Wiley and Sons,
                                  Inc, 2002, 0-471-20282-7 . . . . . . . . 83--83
                  G. S. Marliss   Review of \booktitleSystems Modeling and
                                  Requirements Specification Using ECSAM:
                                  an Analysis Method for Embedded and
                                  Computer-Based Systems by Jonah Z. Lavi
                                  and Joseph Kudish, Dorset House
                                  Publishing Co. Inc., 2005, ISBN
                                  0-932633-45-5  . . . . . . . . . . . . . 83--84

ACM SIGSOFT Software Engineering Notes
Volume 30, Number 5, September, 2005

                      Anonymous   Frontmatter (TOC, Letters, Philosophy of
                                  computer science, Interviewers needed,
                                  Taking software requirements creation
                                  from folklore to analysis, SW components
                                  and product lines: from business to
                                  systems and technology, Software
                                  engineering survey)  . . . . . . . . . . 0--0
             Lawrence Chung and   
              Xavier Franch and   
                    Neil Maiden   Second International Workshop on Models
                                  and Processes for the Evaluation of
                                  Off-the-Shelf Components (MPEC'05) . . . 1--3
        Siddhartha R. Dalal and   
                Ashish Jain and   
                    Jesse Poore   Advances in model-based software testing
                                  (A-MOST) . . . . . . . . . . . . . . . . 1--3
              Stephan Diehl and   
            Ahmed E. Hassan and   
                Richard C. Holt   Report on MSR 2005: International
                                  Workshop on Mining Software Repositories 1--3
                Robert Schaefer   The risks of large organizations in
                                  developing complex systems . . . . . . . 1--3
             K. K. Aggarwal and   
               Yogesh Singh and   
             Pravin Chandra and   
                  Manimala Puri   An expert committee model to estimate
                                  lines of code  . . . . . . . . . . . . . 1--4
                 P. V. Bhansali   Universal software safety standard . . . 1--4
              Yves Bontemps and   
                Alexander Egyed   Scenarios and State Machines: Models,
                                  Algorithms, and Tools: a summary of the
                                  4th workshop . . . . . . . . . . . . . . 1--4
              Manuj Darbari and   
                   Vipin Saxena   Modeling biological systems: a unified
                                  approach . . . . . . . . . . . . . . . . 1--4
               David Budgen and   
             Barbara Kitchenham   Realising evidence-based software
                                  engineering: a report from the workshop
                                  held at ICSE 2005  . . . . . . . . . . . 1--5
                 G. Zayaraz and   
             P. Thambidurai and   
           Madhu Srinivasan and   
                 Paul Rodrigues   Software quality assurance through
                                  COSMIC FFP . . . . . . . . . . . . . . . 1--5
                  Leona F. Fass   Some agent theory for the semantic web   1--6
                 Richard Riehle   Engineering on the surprise continuum:
                                  as applied to software practice  . . . . 1--6
           Oscar Nierstrasz and   
    Stéphane Ducasse and   
           Tudor G\uìrba   The story of \sc Moose: an agile
                                  reengineering environment  . . . . . . . 1--10
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 8--15
            Martin P. Robillard   Automatic generation of suggestions for
                                  program investigation  . . . . . . . . . 11--20
             Bill McCloskey and   
                    Eric Brewer   ASTEC: a new approach to refactoring C   21--30
        Thomas A. Henzinger and   
               Ranjit Jhala and   
                 Rupak Majumdar   Permissive interfaces  . . . . . . . . . 31--40
            Emmanuel Letier and   
                Jeff Kramer and   
                 Jeff Magee and   
              Sebastian Uchitel   Fluent temporal logic for discrete-time
                                  event-based models . . . . . . . . . . . 70--79
               Junrong Shen and   
                     Xi Sun and   
                 Gang Huang and   
                Wenpin Jiao and   
                Yanchun Sun and   
                       Hong Mei   Towards a unified formal model for
                                  supporting mechanisms of dynamic
                                  component update . . . . . . . . . . . . 80--89
             Manos Renieris and   
        Shashank Ramaprasad and   
                Steven P. Reiss   Arithmetic program paths . . . . . . . . 90--98
    Stéphane Ducasse and   
             Tudor G\^\irba and   
               Oscar Nierstrasz   Moose: an agile reengineering
                                  environment  . . . . . . . . . . . . . . 99--102
            Bradley Schmerl and   
               David Garlan and   
                       Hong Yan   Dynamically discovering architectures
                                  with DiscoTect . . . . . . . . . . . . . 103--106
          Jacek \'Sliwerski and   
          Thomas Zimmermann and   
                 Andreas Zeller   HATARI: raising risk awareness . . . . . 107--110
            Paola Inverardi and   
              Henry Muccini and   
           Patrizio Pelliccione   CHARMY: an extensible tool for
                                  architectural analysis . . . . . . . . . 111--114
                 Yichen Xie and   
                     Alex Aiken   Context- and path-sensitive memory leak
                                  detection  . . . . . . . . . . . . . . . 115--125
                   Edu Metz and   
      Raimondas Lencevicius and   
            Teofilo F. Gonzalez   Performance data collection using a
                                  hybrid approach  . . . . . . . . . . . . 126--135
           Kavitha Srinivas and   
              Harini Srinivasan   Summarizing application performance from
                                  a components perspective . . . . . . . . 136--145
               Murali Haran and   
                  Alan Karr and   
            Alessandro Orso and   
                Adam Porter and   
                   Ashish Sanil   Applying classification techniques to
                                  remotely-collected program execution
                                  data . . . . . . . . . . . . . . . . . . 146--155
          Hamid Abdul Basit and   
                  Stan Jarzabek   Detecting higher-level similarity
                                  patterns in programs . . . . . . . . . . 156--165
             Kevin Sullivan and   
        William G. Griswold and   
              Yuanyuan Song and   
               Yuanfang Cai and   
             Macneil Shonle and   
              Nishit Tewari and   
                  Hridesh Rajan   Information hiding interfaces for
                                  aspect-oriented design . . . . . . . . . 166--175
       António S. Camara   Innovations in pervasive computing . . . 176--176
             Jennifer Bevan and   
    E. James Whitehead, Jr. and   
                Sunghun Kim and   
                Michael Godfrey   Facilitating software evolution research
                                  with kenyon  . . . . . . . . . . . . . . 177--186
                Miryung Kim and   
              Vibha Sazawal and   
               David Notkin and   
                    Gail Murphy   An empirical study of code clone
                                  genealogies  . . . . . . . . . . . . . . 187--196
              Xiangyu Zhang and   
                    Rajiv Gupta   Matching execution histories of program
                                  versions . . . . . . . . . . . . . . . . 197--206
              Viktor Kuncak and   
                 Daniel Jackson   Relational analysis of algebraic
                                  datatypes  . . . . . . . . . . . . . . . 207--216
             Kevin Bierhoff and   
               Jonathan Aldrich   Lightweight object specification with
                                  typestates . . . . . . . . . . . . . . . 217--226
            Jeffrey Fischer and   
               Ranjit Jhala and   
                 Rupak Majumdar   Joining dataflow with predicates . . . . 227--236
                Reid Holmes and   
           Robert J. Walker and   
                 Gail C. Murphy   Strathcona example recommendation tool   237--240
           Nikolai Tillmann and   
                Wolfram Schulte   Parameterized unit tests with Unit
                                  Meister  . . . . . . . . . . . . . . . . 241--244
             Robert Chatley and   
                  Thomas Timbul   KenyaEclipse: learning to program in
                                  eclipse  . . . . . . . . . . . . . . . . 245--248
           Pavel Grigorenko and   
                Ando Saabas and   
                      Enn Tyugu   Visual tool for generative programming   249--252
           Nikolai Tillmann and   
                Wolfram Schulte   Parameterized unit tests . . . . . . . . 253--262
                Koushik Sen and   
              Darko Marinov and   
                       Gul Agha   CUTE: a concolic unit testing engine for
                                  C  . . . . . . . . . . . . . . . . . . . 263--272
              Margus Veanes and   
             Colin Campbell and   
            Wolfram Schulte and   
               Nikolai Tillmann   Online testing with model programs . . . 273--282
                Jeff Kramer and   
                     Jeff Magee   Engineering distributed software: a
                                  structural discipline  . . . . . . . . . 283--285
                   Chao Liu and   
                 Xifeng Yan and   
                   Long Fei and   
                 Jiawei Han and   
              Samuel P. Midkiff   SOBER: statistical model-based bug
                                  localization . . . . . . . . . . . . . . 286--295
          Benjamin Livshits and   
              Thomas Zimmermann   DynaMine: finding common error patterns
                                  by mining software revision histories    296--305
                 Zhenmin Li and   
                  Yuanyuan Zhou   PR-Miner: automatically extracting
                                  implicit programming rules and detecting
                                  violations in large software code  . . . 306--315
            Jacky Estublier and   
                    German Vega   Reuse and variability in large software
                                  applications . . . . . . . . . . . . . . 316--325
             Ulf Pettersson and   
                  Stan Jarzabek   Industrial experience with building a
                                  web portal product line using a
                                  lightweight, reactive approach . . . . . 326--335
                   Chang Xu and   
                   S. C. Cheung   Inconsistency detection and resolution
                                  for context-aware middleware support . . 336--345
               Jorge Aranda and   
              Steve Easterbrook   Anchoring and adjustment in software
                                  estimation . . . . . . . . . . . . . . . 346--355
            Lorin Hochstein and   
           Victor R. Basili and   
        Marvin V. Zelkowitz and   
   Jeffrey K. Hollingsworth and   
                    Jeff Carver   Combining self-reported and automatic
                                  data to improve programming effort
                                  measurement  . . . . . . . . . . . . . . 356--365
      Aline Lúcia Baroni   Quantitative assessment of UML dynamic
                                  models . . . . . . . . . . . . . . . . . 366--369
             Andrew Le Gear and   
                    Jim Buckley   Reengineering towards components using
                                  ``Reconn-exion'' . . . . . . . . . . . . 370--373
             Ivonne Erfurth and   
                 Wilhelm Rossak   UPEX: user participation by example  . . 374--376
          Marco Antonio Barbosa   A refinement calculus for software
                                  components and architectures . . . . . . 377--380
                  Mark Sherriff   Utilizing verification and validation
                                  certificates to estimate software defect
                                  density  . . . . . . . . . . . . . . . . 381--384
              Wiebe Hordijk and   
                  Roel Wieringa   Surveying the factors that influence
                                  maintainability: research design . . . . 385--388

ACM SIGSOFT Software Engineering Notes
Volume 30, Number 6, November, 2005

ACM SIGSOFT Software Engineering Notes Staff   Frontmatter (TOC, Letter from the
                                  vice-chair, Letters to the editor,
                                  Programmer productivity, Software
                                  assurance, Workshop and conference
                                  summaries, Calendar of events) . . . . . 0--0
              Joseph Feller and   
           Brian Fitzgerald and   
               Scott Hissam and   
              Karim Lakhani and   
                   Walt Scacchi   Open Source Application Spaces: 5th
                                  Workshop on Open Source Software
                                  Engineering  . . . . . . . . . . . . . . 1--2
          Nitin V. Kanaskar and   
             Umit Topaloglu and   
                  Coskun Bayrak   Globus security model for grid
                                  environment  . . . . . . . . . . . . . . 1--9
             Peter B. Henderson   Software engineering education (SEEd)    3--4
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 5--13
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 14--25


ACM SIGSOFT Software Engineering Notes
Volume 31, Number 1, January, 2006

ACM SIGSOFT Software Engineering Notes Staff   Frontmatter (TOC, Letter from the chair,
                                  Letter from the editor, Letters to the
                                  editor, ACM policy and procedures on
                                  plagiarism, PASTE abstracts, Calendar of
                                  future events, Workshop and conference
                                  information) . . . . . . . . . . . . . . 0--0
                    Manuvir Das   PASTE at Microsoft . . . . . . . . . . . 1--1
                  Nasib S. Gill   Importance of software component
                                  characterization for better software
                                  reusability  . . . . . . . . . . . . . . 1--3
  Dharmender Singh Kushwaha and   
                    A. K. Misra   A modified cognitive information
                                  complexity measure of software . . . . . 1--4
                  Givon Zirkind   How data inspection and consideration,
                                  provides for index compression and
                                  record access optimization of genetic
                                  databases  . . . . . . . . . . . . . . . 1--4
                 Richard Riehle   Linguistic continuity in software
                                  engineering  . . . . . . . . . . . . . . 1--5
                  Yuan Wang and   
                    Feng Xu and   
                   Jian Lü   Establishing recommendation trust
                                  relationships for internetwares  . . . . 1--5
            Rosario Girardi and   
          Alisson Neres Lindoso   An ontology-based knowledge base for the
                                  representation and reuse of software
                                  patterns . . . . . . . . . . . . . . . . 1--6
  Dharmender Singh Kushwaha and   
                    A. K. Misra   Robustness analysis of cognitive
                                  information complexity measure using
                                  Weyuker properties . . . . . . . . . . . 1--6
     Manousaridis Zacharias and   
       Sagheb-Tehrani Mehdi and   
            Mamaloukas Christos   Practical aspects of DSS design for
                                  commodities transportation during
                                  special events . . . . . . . . . . . . . 1--6
                 Flavio Oquendo   Formally modelling software
                                  architectures with the UML 2.0 profile
                                  for $ \pi $-ADL  . . . . . . . . . . . . 1--13
         Jeremy S. Bradbury and   
             James R. Cordy and   
                 Juergen Dingel   An empirical framework for comparing
                                  effectiveness of testing and
                                  property-based formal analysis . . . . . 2--5
                   Michael Wing   Reminiscences  . . . . . . . . . . . . . 4--4
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 5--13
              Donglin Liang and   
            Maikel Pennings and   
              Mary Jean Harrold   Evaluating the impact of
                                  context-sensitivity on Andersen's
                                  algorithm for Java programs  . . . . . . 6--12
            David Hovemeyer and   
               Jaime Spacco and   
                   William Pugh   Evaluating and tuning a static analysis
                                  to find null pointer bugs  . . . . . . . 13--19
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 14--19
                Jean Privat and   
               Roland Ducournau   Link-time static analysis for efficient
                                  separate compilation of object-oriented
                                  languages  . . . . . . . . . . . . . . . 20--27
         Mordechai Ben-Menachem   Review of \booktitleTrustworthy Systems
                                  Through Quantitative Software
                                  Engineering by Lawrence Bernstein and C.
                                  M. Yuhas, IEEE Computer Society Press,
                                  2005 . . . . . . . . . . . . . . . . . . 27--28
                Larry Bernstein   Review of \booktitleCompetitive
                                  Engineering by Tom Gilb, Elsevier, 2005.
                                  ISBN: 0-7506-6507-6  . . . . . . . . . . 28--28
               Naveen Kumar and   
          Bruce R. Childers and   
                 Mary Lou Soffa   Low overhead program monitoring and
                                  profiling  . . . . . . . . . . . . . . . 28--34
            Sriraman Tallam and   
                   Neelam Gupta   A concept analysis inspired greedy
                                  algorithm for test suite minimization    35--42
              Jonathan Cook and   
                Alessandro Orso   MonDe: safe updating through monitored
                                  deployment of new component versions . . 43--46
                   Andrew Myers   Making distributed systems secure with
                                  program analysis and transformation  . . 47--47
                    Dick Hamlet   Invariants and state in testing and
                                  formal methods . . . . . . . . . . . . . 48--51
            Hari Hampapuram and   
                   Yue Yang and   
                    Manuvir Das   Symbolic path simulation in
                                  path-sensitive dataflow analysis . . . . 52--58
  Christopher J. F. Pickett and   
                Clark Verbrugge   SableSpMT: a software framework for
                                  analysing speculative multithreading in
                                  Java . . . . . . . . . . . . . . . . . . 59--66
      Michelle Mills Strout and   
        John Mellor-Crummey and   
                   Paul Hovland   Representation-independent program
                                  analysis . . . . . . . . . . . . . . . . 67--74
               Ludo Van Put and   
            Bjorn De Sutter and   
               Matias Madou and   
               Bruno De Bus and   
           Dominique Chanet and   
              Kristof Smits and   
              Koen De Bosschere   LANCET: a nifty code editing tool  . . . 75--81
               Mike Barnett and   
             K. Rustan M. Leino   Weakest-precondition of unstructured
                                  programs . . . . . . . . . . . . . . . . 82--87
       Mihai Christodorescu and   
              Nicholas Kidd and   
                    Wen-Han Goh   String analysis for x86 binaries . . . . 88--95
             Atanas Rountev and   
                Olga Volgin and   
                 Miriam Reddoch   Static control-flow analysis for reverse
                                  engineering of UML sequence diagrams . . 96--102
           Sarfraz Khurshid and   
                   Yuk Lai Suen   Generalizing symbolic execution to
                                  library classes  . . . . . . . . . . . . 103--110
                Jeff H. Perkins   Automatically generating refactorings to
                                  support API evolution  . . . . . . . . . 111--114

ACM SIGSOFT Software Engineering Notes
Volume 31, Number 2, March, 2006

             Colin Blundell and   
     Dimitra Giannakopoulou and   
        Corina S. P\uas\uareanu   Assume-guarantee testing . . . . . . . . 1:1--1:??
            Michael Collins and   
           Charles Reynolds and   
               Christine Le and   
                Cihan Varol and   
                  Coskun Bayrak   Automated data verification in a
                                  format-free environment  . . . . . . . . 1--4
  Dharmender Singh Kushwaha and   
                    A. K. Misra   Cognitive complexity metrics and its
                                  impact on software reliability based on
                                  cognitive software development model . . 1--6
                    Sergey Diev   Software estimation in the maintenance
                                  context  . . . . . . . . . . . . . . . . 1--8
          Vojislav B. Mi\vsi\'c   Perceptions of extreme programming: an
                                  exploratory study  . . . . . . . . . . . 1--8
              Radu Mateescu and   
                 Flavio Oquendo   $ \pi $-AAL: an architecture analysis
                                  language for formally specifying and
                                  verifying structural and behavioural
                                  properties of software architectures . . 1--19
                Robert Schaefer   A rational theory of system-making
                                  systems  . . . . . . . . . . . . . . . . 1--20
          Philippe Bidinger and   
          Matthieu Leclercq and   
        Vivien Quéma and   
               Alan Schmitt and   
           Jean-Bernard Stefani   Dream types: a domain specific type
                                  system for component-based
                                  message-oriented middleware  . . . . . . 2:1--2:??
            Gabriel Ciobanu and   
                   Dorel Lucanu   A specification language for coordinated
                                  objects  . . . . . . . . . . . . . . . . 3:1--3:??
             Peter B. Henderson   Software engineering education (SEEd)    3--3
               Jeremy T. Lanman   Industrial software engineering:
                                  developing software systems  . . . . . . 3--5
               Lubo\vs Brim and   
       Ivana \vCerná and   
Pavlína Va\vreková and   
              Barbora Zimmerova   Component-interaction automata as a
                                  verification-oriented component-based
                                  system specification . . . . . . . . . . 4:1--4:??
                   Michael Wing   Lonesome hacker blues  . . . . . . . . . 5--5
                    Jing Xu and   
        Alexandre Oufimtsev and   
            Murray Woodside and   
                    Liam Murphy   Performance modeling and prediction of
                                  enterprise JavaBeans with layered
                                  queuing network templates  . . . . . . . 5:1--5:??
               Markus Lumpe and   
             Jean-Guy Schneider   Classboxes: an experiment in modeling
                                  compositional abstractions using
                                  explicit contexts  . . . . . . . . . . . 6:1--6:??
               James E. Tomayko   Professor James E. Tomayko . . . . . . . 6--6
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 6--16
          Gregory Kulczycki and   
           Murali Sitaraman and   
             Bruce W. Weide and   
                 Atanas Rountev   A specification-based approach to
                                  reasoning about pointers . . . . . . . . 7:1--7:??
        Nguyen Truong Thang and   
                Takuya Katayama   Specification and verification of
                                  inter-component constraints in CTL . . . 8:1--8:??
             Patrice Chalin and   
   Frédéric Rioux   Non-null references by default in the
                                  Java modeling language . . . . . . . . . 9:1--9:??
Pedro L. Pérez-Serrano and   
  Marisol Sánchez-Alonso   Specification and design of
                                  component-based coordination systems by
                                  integrating coordination patterns  . . . 10:1--10:??
            Rafael Ceballos and   
      Rafael Martinez Gasca and   
                  Diana Borrego   Constraint satisfaction techniques for
                                  diagnosing errors in design by contract
                                  software . . . . . . . . . . . . . . . . 11:1--11:??
Francisco Heron de Carvalho Junior and   
             Rafael Dueire Lins   A categorical characterization for the
                                  compositional features of the #
                                  component model  . . . . . . . . . . . . 12:1--12:??
        Montse Ereño and   
                 Uxue Landa and   
           Dra. Rebeca Cortazar   Software product lines structuring based
                                  upon market demands  . . . . . . . . . . 13:1--13:??
        Abdelaziz Guerrouat and   
                 Harald Richter   A component-based specification approach
                                  for embedded systems using FDTs  . . . . 14:1--14:??
              Konstantin Chekin   Theory of infinite streams and objects   15:1--15:??
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 17--25
                        Yu Feng   Review of \booktitleThe Build Master:
                                  Microsoft's Software Configuration
                                  Management Best Practices by Vincent
                                  Maraia, Addison-Wesley, 2005,
                                  0-321-33205-9  . . . . . . . . . . . . . 32--32
                       Joe Saur   Review of \booktitleSystem Testing with
                                  an Attitude: an Approach That Nurtures
                                  Front-Loaded (Designed and built in
                                  \ldots not tested in!) Software Quality
                                  by Nathan Petschenik, Dorset House
                                  Publishing, 2005, ISBN 0-932633-46-3 . . 32--33
                       Joe Saur   Review of \booktitleJust Enough
                                  Requirements Management: Where Software
                                  Development Meets Marketing by Alan M.
                                  Davis, Dorset House Publishing, 2005,
                                  ISBN 0-932633-64-1 . . . . . . . . . . . 33--33
                Robert Schaefer   Review of \booktitleHiring The Best
                                  Knowledge Workers, Techies and Nerds by
                                  Johanna Rothman, Dorset House, 2004,
                                  0-932633-59-5  . . . . . . . . . . . . . 34--34
                Robert Schaefer   Review of \booktitleMobile Wireless
                                  Communications by Mischa Schwarz,
                                  Cambridge University Press, 2005,
                                  0-521-84347-2  . . . . . . . . . . . . . 34--34
                     Will Tracz   Review of \booktitleProcess Improvement
                                  in Practice --- A Handbook for IT
                                  Companies by Tore Dybä, Torgeir Dingsòyr,
                                  and Nils Brede Moe, Kluwer Academic
                                  Publishers, 2004, ISBN 1-4020-7869-2 . . 35--35

ACM SIGSOFT Software Engineering Notes
Volume 31, Number 3, May, 2006

               Nonika Bajaj and   
                 Alok Tyagi and   
                 Rakesh Agarwal   Software estimation: a fuzzy approach    1--5
           Justin M. Beaver and   
               Guy A. Schiavone   The effects of development team skill on
                                  software product quality . . . . . . . . 1--5
               Pankaj Bhatt and   
                Williams K. and   
              Gautam Shroff and   
                  Arun K. Misra   Influencing factors in outsourced
                                  software maintenance . . . . . . . . . . 1--6
             Prabhat Ranjan and   
                    A. K. Misra   A hybrid model for agent based system
                                  requirements analysis  . . . . . . . . . 1--7
              Guido Rotondi and   
             Gianpiero Guerrera   A consistent history authentication
                                  protocol . . . . . . . . . . . . . . . . 1--7
                   Qun Yang and   
              Xianchun Yang and   
                       Manwu Xu   A mobile agent approach to dynamic
                                  architecture-based software adaptation   1--7
                 Flavio Oquendo   $ \pi $-Method: a model-driven formal
                                  method for architecture-centric software
                                  engineering  . . . . . . . . . . . . . . 1--13
             Zhong-Jie Wang and   
               De-Chen Zhan and   
                    Xiao-Fei Xu   STCIM: a dynamic granularity oriented
                                  and stability based component
                                  identification method  . . . . . . . . . 1--14
            Leonardo Amorim and   
               Paulo Maciel and   
             Meuse Nogueira and   
           Raimundo Barreto and   
                Eduardo Tavares   Mapping live sequence chart to coloured
                                  Petri nets for analysis and verification
                                  of embedded systems  . . . . . . . . . . 1--25
            Gary T. Leavens and   
            Albert L. Baker and   
                     Clyde Ruby   Preliminary design of JML: a behavioral
                                  interface specification language for
                                  Java . . . . . . . . . . . . . . . . . . 1--38
             Peter B. Henderson   Software engineering education (SEEd)    5--5
              Dennis J. Frailey   What math is relevant for a CS or SE
                                  student?: an employer's perspective  . . 6--7
                   Michael Wing   Be here now  . . . . . . . . . . . . . . 7--7
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 8--16
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 17--24
             Lori A. Clarke and   
             David S. Rosenblum   A historical perspective on runtime
                                  assertion checking in software
                                  development  . . . . . . . . . . . . . . 25--37
                Larry Bernstein   Review of \booktitlePractical Support
                                  for CMMI-SW Software Project
                                  Documentation Using IEEE Software
                                  Engineering Standards by Susan K. Lan
                                  and John W. Walz, IEEE Computer Society
                                  Wiley Interscience, 2006, ISBN:
                                  0-471-73849-2  . . . . . . . . . . . . . 41--41
                Larry Bernstein   Review of \booktitleMobile Computing
                                  Principles by Reza B'Far, Cambridge
                                  University Press, 2005, ISBN:
                                  0-521-81733-1  . . . . . . . . . . . . . 41--42
                   Andrew Petro   Review of \booktitleMore Java Gems by
                                  Dwight Deugo, Cambridge University
                                  Press, 2000, ISBN: 0-521-77477-2 . . . . 42--42
                Amr Elssamadisy   Review of \booktitleHibernate: a J2EE
                                  Developer's Guide by Will Iverson,
                                  Pearson Education Inc., 2005, ISBN:
                                  0-471-20282-7  . . . . . . . . . . . . . 42--43
                Amr Elssamadisy   Review of \booktitleFit for Developing
                                  Software: Framework for Integrated Tests
                                  by Rick Mugridge and Ward Cunningham,
                                  Pearson Education Inc., 2005, ISBN:
                                  0-321-26934-9  . . . . . . . . . . . . . 43--44
                Robert L. Glass   Review of \booktitleCOBOL Programmers
                                  Swing With Java by E. Reed Doke, Bill C.
                                  Hardgrave and Richard A. Johnson,
                                  Cambridge University Press, 2005 . . . . 44--45

ACM SIGSOFT Software Engineering Notes
Volume 31, Number 4, July, 2006

              Muhammad Raza Ali   Imparting effective software engineering
                                  education  . . . . . . . . . . . . . . . 1--3
               Mario Garzia and   
              John Hudepohl and   
                Will Snipes and   
                Michael Lyu and   
                  John Musa and   
               Carol Smidts and   
                Laurie Williams   How should software reliability
                                  engineering (SRE) be taught? . . . . . . 1--5
  Dharmender Singh Kushwaha and   
                R. K. Singh and   
                    A. K. Misra   Cognitive web based software development
                                  process: towards a more reliable
                                  approach . . . . . . . . . . . . . . . . 1--6
                Robert Schaefer   A critical programmer searches for
                                  professionalism  . . . . . . . . . . . . 1--17
              Fiona Darroch and   
                   Mark Toleman   ACM Fellow profile: Bob Glass  . . . . . 2--6
             Peter B. Henderson   Software engineering education (SEEd)    8--8
          Timothy C. Lethbridge   Reflections on CSEE&T 2006  . . . . . . . 8--9
                   Michael Wing   Growing up is painful  . . . . . . . . . 9--9
               L. B. S. Raccoon   A leadership primer for software
                                  engineers  . . . . . . . . . . . . . . . 10--15
               Mark Doernhoefer   JavaScript . . . . . . . . . . . . . . . 16--24
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 25--37
                    Silvia Breu   Review of \booktitleEclipse --- Building
                                  Commercial-Quality Plug-Ins by Eric
                                  Clayberg and Dan Rubel, Addison-Wesley,
                                  2004, 0-321-22847-2  . . . . . . . . . . 39--39
                      James Law   Review of \booktitleMigrating to IPv6 by
                                  Marc Blanchet, John Wiley and Sons,
                                  Ltd., 2006, 0-471-49892-0  . . . . . . . 39--40
                     Will Tracz   Review of \booktitleWeinberg on Writing:
                                  The Fieldstone Method by Gerald M.
                                  Weinberg, Dorsett House, 2006  . . . . . 40--40

ACM SIGSOFT Software Engineering Notes
Volume 31, Number 5, September, 2006

               Remco C. de Boer   Architectural knowledge discovery: why
                                  and how? . . . . . . . . . . . . . . . . 1:1--1:??
              Deepak Dahiya and   
           Rajinder K. Sachdeva   Approaches to aspect oriented design: a
                                  study  . . . . . . . . . . . . . . . . . 1--4
            Jeffrey Rekoske and   
           Hamid Ghasemiyeh and   
                    Ahmed Salem   A practical extension to the VORD model  1--5
                R. K. Singh and   
             Pravin Chandra and   
                   Yogesh Singh   An evaluation of Boolean expression
                                  testing techniques . . . . . . . . . . . 1--6
  Dharmender Singh Kushwaha and   
                    A. K. Misra   Improved cognitive information
                                  complexity measure: a metric that
                                  establishes program comprehension effort 1--7
             Steve Counsell and   
              Stephen Swift and   
               Allan Tucker and   
                  Emilia Mendes   Object-oriented cohesion subjectivity
                                  amongst experienced and novice
                                  developers: an empirical study . . . . . 1--10
             Davide Falessi and   
              Martin Becker and   
               Giovanni Cantone   Design decision rationale: experiences
                                  and steps ahead towards systematic use   2:1--2:??
                 Rik Farenhorst   Tailoring knowledge sharing to the
                                  architecting process . . . . . . . . . . 3:1--3:??
             Rafael Capilla and   
             Francisco Nava and   
        Sandra Pérez and   
          Juan C. Dueñas   A web-based tool for managing
                                  architectural design decisions . . . . . 4:1--4:??
                   Michael Wing   Roller coaster . . . . . . . . . . . . . 4--4
                Fernando Berzal   A crossword on programming languages . . 5--5
              Marco Sinnema and   
   Jan Salvador van der Ven and   
                Sybren Deelstra   Using variability modeling principles to
                                  capture architectural knowledge  . . . . 5:1--5:??
          Alessandro Garcia and   
              Thais Batista and   
               Awais Rashid and   
              Claudio Sant'Anna   Driving and managing architectural
                                  decisions with aspects . . . . . . . . . 6:1--6:??
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 6--15
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 16--21
               Martin Rappl and   
       Alexander Pretschner and   
         Christian Salzmann and   
                 Thomas Stauner   3rd Intl. ICSE Workshop on Software
                                  Engineering for Automotive Systems . . . 22--23
          Alessandro Garcia and   
               Holger Giese and   
       Alexander Romanovsky and   
             Ricardo Choren and   
              Ho-fung Leung and   
              Carlos Lucena and   
              Florian Klein and   
                    Eric Platon   Software engineering for large-scale
                                  multi-agent systems --- SELMAS 2006:
                                  workshop report  . . . . . . . . . . . . 24--32
              Patricia Lago and   
                 Paris Avgeriou   First Workshop on Sharing and Reusing
                                  Architectural Knowledge  . . . . . . . . 32--36
        Elisabetta Di Nitto and   
             Robert J. Hall and   
                    Jun Han and   
                  Yanbo Han and   
              Andrea Polini and   
              Kurt Sandkuhl and   
                  Andrea Zisman   Report on the International Workshop on
                                  Service Oriented Software Engineering
                                  (IW-SOSE06)  . . . . . . . . . . . . . . 36--38
                Jon Whittle and   
                Leif Geiger and   
              Michael Meisinger   5th Intl. Workshop on Scenarios and
                                  State Machines: Models --- Algorithms
                                  --- and Tools (SCESM)  . . . . . . . . . 39--40

ACM SIGSOFT Software Engineering Notes
Volume 31, Number 6, November, 2006

ACM SIGSOFT Software Engineering Notes Staff   Frontmatter (TOC, Miscellaneous
                                  material)  . . . . . . . . . . . . . . . 0--0
         Prasanth Anbalagan and   
                        Tao Xie   Clamp: automated joinpoint clustering
                                  and pointcut mining in aspect-oriented
                                  refactoring  . . . . . . . . . . . . . . 1--2
            Edin Arnautovic and   
             Hermann Kaindl and   
               Jürgen Falb   An architecture for gradual transition
                                  towards self-managed software systems    1--2
                  Danny Dig and   
             Kashif Manzoor and   
             Tien N. Nguyen and   
                  Ralph Johnson   Refactoring-aware software merging and
                                  configuration management . . . . . . . . 1--2
                Robert Dyer and   
         Harish Narayanappa and   
                  Hridesh Rajan   Nu: preserving design modularity in
                                  object code  . . . . . . . . . . . . . . 1--2
              Youssef Hanna and   
                  Hridesh Rajan   SLEDE: event-based specification of
                                  sensor network security protocols  . . . 1--2
           Joseph R. Kiniry and   
             Alan E. Morkan and   
             Dermot Cochran and   
           Martijn Oostdijk and   
              Engelbert Hubbers   Formal techniques in a remote voting
                                  system . . . . . . . . . . . . . . . . . 1--2
                Yasser Kotb and   
                Takuya Katayama   Improving software documentation using
                                  textual entailment . . . . . . . . . . . 1--2
                    Eric Larson   SUDS: an infrastructure for dynamic
                                  software bug detection using static
                                  analysis . . . . . . . . . . . . . . . . 1--2
               Juri Memmert and   
                  Hridesh Rajan   Osiris: generating concern models from
                                  source code  . . . . . . . . . . . . . . 1--2
                   Ajitha Rajan   Automated requirements-based test case
                                  generation . . . . . . . . . . . . . . . 1--2
         Mehrdad Sabetzadeh and   
               Shiva Nejati and   
          Steve Easterbrook and   
                 Marsha Chechik   A relationship-driven approach to view
                                  merging  . . . . . . . . . . . . . . . . 1--2
       Adrian Schröter and   
          Thomas Zimmermann and   
              Rahul Premraj and   
                 Andreas Zeller   Where do bugs come from? . . . . . . . . 1--2
            Engin Uzuncaova and   
               Sarfraz Khurshid   Program slicing for declarative models   1--2
               Sanjay Misra and   
                 Hurevren Kilic   Measurement theory and validation
                                  criteria for software complexity
                                  measures . . . . . . . . . . . . . . . . 1--3
                    Sergey Diev   Use cases modeling and software
                                  estimation: applying use case points . . 1--4
             Prabhat Ranjan and   
                    A. K. Misra   Agent based system development: a
                                  domain-specific goal approach  . . . . . 1--6
              Myra B. Cohen and   
              Joshua Snyder and   
                Gregg Rothermel   Testing across configurations:
                                  implications for combinatorial testing   1--9
André L. L. de Figueiredo and   
       Wilkerson L. Andrade and   
  Patrícia D. L. Machado   Generating interaction test cases for
                                  mobile phone systems from use case
                                  specifications . . . . . . . . . . . . . 1--10
              Gordon Fraser and   
                   Franz Wotawa   Property relevant software testing with
                                  model-checkers . . . . . . . . . . . . . 1--10
Christopher Robinson-Mallett and   
          Robert M. Hierons and   
              Peter Liggesmeyer   Achieving communication coverage in
                                  testing  . . . . . . . . . . . . . . . . 1--10
                    Andy Brooks   Software process improvement uncut:
                                  interviews . . . . . . . . . . . . . . . 1--11
             Steffen Becker and   
        Wilhelm Hasselbring and   
             Alexandra Paul and   
             Marko Boskovic and   
             Heiko Koziolek and   
                 Jan Ploski and   
             Abhishek Dhama and   
            Henrik Lipskoch and   
              Matthias Rohr and   
            Daniel Winteler and   
             Simon Giesecke and   
               Roland Meyer and   
           Mani Swaminathan and   
                 Jens Happe and   
            Margarete Muhle and   
                     Timo Warns   Trustworthy software systems: a
                                  discussion of basic concepts and
                                  terminology  . . . . . . . . . . . . . . 1--18
             Peter B. Henderson   Software Engineering Education (SEEd)    9--9
                   Michael Wing   Burt add numbers: a tale of software . . 10--10
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 11--20
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 21--37
                Jeff Kramer and   
                    Orit Hazzan   The Role of Abstraction in Software
                                  Engineering  . . . . . . . . . . . . . . 38--39
                       Joe Saur   Review of \booktitleIEEE Computer
                                  Society Real-World Software Engineering
                                  Problems: a Self-Study Guide for Today's
                                  Software Professional by J. Fernando
                                  Naveda and Stephen B. Seidman, Prentice
                                  Hall, 2006, ISBN 0-471-71051-2 . . . . . 58--58
                Robert Schaefer   Review of \booktitleDesign For
                                  Trustworthy Software by Bijay K.
                                  Jayaswal and Peter C. Patton, Prentice
                                  Hall, 2007, ISBN 0-13-187250-8 . . . . . 58--59
                Bijay Jayaswall   Response from authors of ``Design For
                                  Trustworthy Software'' . . . . . . . . . 59--59
                Robert Schaefer   Review of \booktitleCatastrophe
                                  Disentanglement by E. M. Bennatan,
                                  Addison Wesley, 2006, ISBN 0-321-33662-0 59--60
             Debora Weber-Wulff   Review of \booktitleFascicle 4:
                                  Generating All Trees --- History of
                                  Combinatorial Generation by Donald E.
                                  Knuth, Addison-Wesley, 2006, ISBN
                                  0-321-33570-8  . . . . . . . . . . . . . 60--60


ACM SIGSOFT Software Engineering Notes
Volume 32, Number 1, January, 2007

                      Anonymous   Frontmatter (TOC, Letters, Calendar,
                                  Calls) . . . . . . . . . . . . . . . . . 0--0
                   David Notkin   FAQs and figures . . . . . . . . . . . . 3--3
                    Heidi Ellis   Software engineering: effective teaching
                                  and learning approaches and practices    4--4
             Peter B. Henderson   Software engineering education (SEEd)    4--4
                   Michael Wing   Hacking with love  . . . . . . . . . . . 4--5
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 6--14
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 15--20
          Wolfgang Emmerich and   
               Mikio Aoyama and   
                    Joe Sventek   The impact of research on middleware
                                  technology . . . . . . . . . . . . . . . 21--46
         Mordechai Ben-Menachem   Review of \booktitleSoftware Measurement
                                  and Estimation: a Practical Approach by
                                  Linda M. Laird and M. Carol Brennan,
                                  Wiley-Interscience, 2006 . . . . . . . . 47--47
                        Yu Feng   Review of \booktitleThe Cognitive
                                  Dynamics of Computer Science:
                                  Cost-Effective Large Scale Software
                                  Development by Szabolcs Michael de
                                  Gyurky, Wiley-IEEE Computer Society,
                                  2006, 0-471-97047-6  . . . . . . . . . . 47--48
                  Peter Neumann   Session details: Risks to the public . . ??

ACM SIGSOFT Software Engineering Notes
Volume 32, Number 2, March, 2007

                 Jörg Rech   Discovering trends in software
                                  engineering with Google Trend  . . . . . 1--2
                 Jörg Rech   Podcasts about software engineering  . . 1--2
                    Sergey Diev   Requirements development as a modeling
                                  activity . . . . . . . . . . . . . . . . 1--3
                Orit Hazzan and   
                  Yael Dubinsky   Why software engineering programs should
                                  teach agile software development . . . . 1--3
               Sanjay Misra and   
                 Hurevren Kilic   Measurement theory and validation
                                  criteria for software complexity
                                  measures . . . . . . . . . . . . . . . . 1--3
             Jörg Rech and   
          Waldemar Schäfer   Visual support of software engineers
                                  during development and maintenance . . . 1--3
                  Leona F. Fass   Fostering web use in some real
                                  environments . . . . . . . . . . . . . . 1--4
              Nasib S. Gill and   
                  Pradeep Tomar   CBS testing requirements and test case
                                  process documentation revisited  . . . . 1--4
                      Liu Jiufu   Integration of statechart and B method
                                  based analysis and verification for
                                  flight control software of unmanned
                                  aerial vehicle . . . . . . . . . . . . . 1--4
           Alexander Romanovsky   A looming fault tolerance software
                                  crisis?  . . . . . . . . . . . . . . . . 1--4
                    Sergey Diev   Structuring complex requirements . . . . 1--5
               Sanjay Misra and   
                    A. K. Misra   Evaluation and comparison of cognitive
                                  complexity measure . . . . . . . . . . . 1--5
            Vili Podgorelec and   
               Marjan Heri\vcko   Estimating software complexity from UML
                                  models . . . . . . . . . . . . . . . . . 1--5
         Mohammad Reza Nami and   
       Mehdi Sagheb Tehrani and   
                 Mohsen Sharifi   Applying domain engineering using RAISE
                                  into a particular banking domain . . . . 1--6
          Nelson Souto Rosa and   
     Paulo Roberto Freire Cunha   A formal framework for middleware
                                  behavioural specification  . . . . . . . 1--7
            Eduardo Tavares and   
           Raimundo Barreto and   
               Paulo Maciel and   
        Meuse Oliveira, Jr. and   
            Leonardo Amorim and   
             Fernando Rocha and   
                   Ricardo Lima   Software synthesis for hard real-time
                                  embedded systems with multiple
                                  processors . . . . . . . . . . . . . . . 1--10
                 Behzad Bastani   A requirements analysis framework for
                                  open systems requirements engineering    1--19
                   David Notkin   FAQs and figures . . . . . . . . . . . . 6--7
                   Michael Wing   Cocoa Krispies . . . . . . . . . . . . . 7--7
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes: solving the software
                                  quality problem  . . . . . . . . . . . . 8--17
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 18--23
                      Anonymous   Review of \booktitleManaging the Testing
                                  Process by Rex Black, Wiley 2002 . . . . 28--32
                      Anonymous   Review of \booktitleProductive Software
                                  Test Management by Michael W. Evans,
                                  Wiley 1984 . . . . . . . . . . . . . . . 32--32
                      Anonymous   Review of \booktitleSoftware Testing
                                  Management by Thomas C. Royer, P-H 1993  32--33
                      Anonymous   Review of \booktitleChange-based Test
                                  Management by Jon Sistowicz and Ray
                                  Arell, Intel Press 2001  . . . . . . . . 33--34

ACM SIGSOFT Software Engineering Notes
Volume 32, Number 3, May, 2007

                 P. V. Bhansali   The MCDC paradox . . . . . . . . . . . . 1--4
                   Sanjay Misra   Validating modified cognitive complexity
                                  measure  . . . . . . . . . . . . . . . . 1--5
                    Ping Yu and   
                Xiaoxing Ma and   
                        Jian Lu   Expectation, experiment and reflection
                                  on Internet software evolution . . . . . 1--5
             Oscar Pedreira and   
             Mario Piattini and   
           Miguel R. Luaces and   
             Nieves R. Brisaboa   A systematic review of software process
                                  tailoring  . . . . . . . . . . . . . . . 1--6
                R. Krishnan and   
          S. Murali Krishna and   
                P. Siva Nandhan   Combinatorial testing: learnings from
                                  our experience . . . . . . . . . . . . . 1--8
                   David Notkin   ACM TOSEM: FAQs and figures  . . . . . . 6
             Peter B. Henderson   Software engineering education: (SEEd)   6--7
                    Orit Hazzan   The influence of software intangibility
                                  on computer science and software
                                  engineering education  . . . . . . . . . 7--8
                   Michael Wing   Software traumatica  . . . . . . . . . . 8--9
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 10--19
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 20--24
                      Ray Arell   Wonderful Jupiter?: (A Rebuttal) . . . . 26

ACM SIGSOFT Software Engineering Notes
Volume 32, Number 4, July, 2007

           Jayasri Banerjee and   
   Anup Kumar Bandyopadhyay and   
              Ajit Kumar Mandal   Ordering of events in two-process
                                  concurrent system  . . . . . . . . . . . 1:1--1:??
           Jayasri Banerjee and   
   Anup Kumar Bandyopadhyay and   
              Ajit Kumar Mandal   Application of Dijkstra's weakest
                                  precondition calculus to Dining
                                  Philosophers problem . . . . . . . . . . 2:1--2:??
                Ayaz Farooq and   
                Reiner R. Dumke   Research directions in verification and
                                  validation process improvement . . . . . 3:1--3:??
           Sofien Khemakhem and   
               Khalil Drira and   
                 Mohamed Jmaiel   SEC+: an enhanced search engine for
                                  component-based software development . . 4:1--4:??
                R. Krishnan and   
          S. Murali Krishna and   
                 Nishil Bharill   Code quality tools: learning from our
                                  experience . . . . . . . . . . . . . . . 5:1--5:??
Fernando Antônio Aires Lins and   
José Carlos dos Santos Júnior and   
              Nelson Souto Rosa   Adaptive web service composition . . . . 6:1--6:??
                 Richard Riehle   Designing software components to
                                  tolerances . . . . . . . . . . . . . . . 7:1--7:??
                   David Notkin   ACM TOSEM: FAQs and figures  . . . . . . 8--8
                Robert Schaefer   The Grand Theory of Everything: what
                                  man-made systems are, and why they fail  8:1--8:??
                 R. Senthil and   
             D. S. Kushwaha and   
                    A. K. Misra   An improved component model for
                                  component based software engineering . . 9:1--9:??
                   Michael Wing   Superhack  . . . . . . . . . . . . . . . 9--9
               Yogesh Singh and   
                     Bindu Goel   A step towards software preventive
                                  maintenance  . . . . . . . . . . . . . . 10:1--10:??
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 10--19
                Fathi Taibi and   
            Jacob K. Daniel and   
           Fouad Mohammed Abbou   On checking the consistency of Object-Z
                                  classes  . . . . . . . . . . . . . . . . 11:1--11:??
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 20--29
              Paul Clements and   
                David Emery and   
              Rich Hilliard and   
              Philippe Kruchten   Aspects in Architectural Description:
                                  report on a first workshop at AOSD 2007  33--35
               David Budgen and   
                 Pearl Brereton   Realising Evidence-Based Software
                                  Engineering (REBSE-2): a report from the
                                  workshop held at ICSE 2007 . . . . . . . 36--39
       Alexander Pretschner and   
         Christian Salzmann and   
       Bernhard Schätz and   
                 Thomas Stauner   4th Intl. ICSE Workshop on Software
                                  Engineering for Automotive Systems . . . 40--40
             Paris Avgeriou and   
          Philippe Kruchten and   
              Patricia Lago and   
               Paul Grisham and   
                  Dewayne Perry   Architectural knowledge and rationale:
                                  issues, trends, challenges . . . . . . . 41--46
                Pete Sawyer and   
              Barbara Paech and   
                Patrick Heymans   Working conference on requirements
                                  engineering: foundation for software
                                  quality (REFSQ'07) . . . . . . . . . . . 47--53
         Mordechai Ben-Menachem   Review of \booktitleTSP: Coaching
                                  Development Teams by Watts S. Humphrey,
                                  Addison-Wesley, 2006 . . . . . . . . . . 53--53

ACM SIGSOFT Software Engineering Notes
Volume 32, Number 5, September, 2007

                  Nenad Marovac   UML based embedded documentation for
                                  semi-automatic software development  . . 1--3
                 Richard Riehle   Failure-driven software safety . . . . . 1--4
               P. S. Grover and   
               Rajesh Kumar and   
                    Arun Sharma   Few useful considerations for
                                  maintaining software components and
                                  component-based systems  . . . . . . . . 1--5
                     Gang Huang   Post-development software architecture   1--9
                   David Notkin   ACM TOSEM: FAQs and figures  . . . . . . 5--6
             Peter B. Henderson   Software engineering education: (SEEd)   6--6
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 7--16
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 17--25
          Alessandro Garcia and   
             Phil Greenwood and   
            George Heineman and   
              Robert Walker and   
               Yuanfang Cai and   
              Hong Yul Yang and   
            Elisa Baniassad and   
     Cristina Videira Lopes and   
       Christa Schwanninger and   
                   Jianjun Zhao   Assessment of Contemporary
                                  Modularization Techniques --- ACoM'07:
                                  workshop report  . . . . . . . . . . . . 31--37
                 Jeffrey Carver   Post-workshop report for the Third
                                  International Workshop on Software
                                  Engineering for High Performance
                                  Computing Applications (SE-HPC 07) . . . 38--43

ACM SIGSOFT Software Engineering Notes
Volume 32, Number 6, November, 2007

           Jayasri Banerjee and   
   Anup Kumar Bandyopadhyay and   
              Ajit Kumar Mandal   On the correctness issues in two-process
                                  mutual exclusion algorithms  . . . . . . 1:1--1:??
       Anup Kumar Bandyopadhyay   Modeling fairness and starvation in
                                  concurrent systems . . . . . . . . . . . 2:1--2:??
             Behzad Bastani and   
                   Hoda Bastani   High-level open evolvable systems design
                                  by process-oriented modeling:
                                  application to DNA replication mechanism 3:1--3:??
             Lucas Cordeiro and   
           Raimundo Barreto and   
            Rafael Barcelos and   
             Meuse Oliveira and   
             Vicente Lucena and   
                   Paulo Maciel   TXM: an agile HW/SW development
                                  methodology for building medical devices 4:1--4:??
                 Richard Riehle   Institutional memory and risk management 5:1--5:??
                 Jan Ploski and   
              Matthias Rohr and   
        Peter Schwenkenberg and   
            Wilhelm Hasselbring   Research issues in software fault
                                  categorization . . . . . . . . . . . . . 6:1--6:??
                    Yi Wang and   
                 Defeng Guo and   
                     Huihui Shi   Measuring the evolution of open source
                                  software systems with their communities  7:1--7:??
                  Givon Zirkind   AFIS data compression: an example of how
                                  domain specific compression algorithms
                                  can produce very high compression ratios 8:1--8:??
                   Michael Wing   On the economics of software . . . . . . 8--9
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 10--19
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 20--27


ACM SIGSOFT Software Engineering Notes
Volume 33, Number 1, January, 2008

                   Michael Wing   The human element  . . . . . . . . . . . 1:1--1:??
             Peter B. Henderson   Software Engineering Education: SEEd . . 2:1--2:??
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 3:1--3:??
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 4:1--4:??
             Lucas Cordeiro and   
                 Carlos Mar and   
           Eduardo Valentin and   
               Fabiano Cruz and   
             Daniel Patrick and   
           Raimundo Barreto and   
                 Vicente Lucena   An agile development methodology applied
                                  to embedded control software under
                                  stringent hardware constraints . . . . . 5:1--5:??
                  Leona F. Fass   An ethnocentric look at the law and
                                  technology interface . . . . . . . . . . 6:1--6:??
                Robert Schaefer   A systems analysis of systems
                                  integration  . . . . . . . . . . . . . . 7:1--7:??
                Javier Tuya and   
              Javier Dolado and   
       Ma Jose Suarez-Cabal and   
             Claudio de la Riva   A controlled experiment on white-box
                                  database testing . . . . . . . . . . . . 8:1--8:??
                     Will Tracz   Review of \booktitleGeekonomics: The
                                  Real Cost of Insecure Software by David
                                  Rice, Addison-Wesley, 2008, 362 pp.,
                                  0-321-47789-8 (hardback), \$29.99} . . . 9:1--9:??

ACM SIGSOFT Software Engineering Notes
Volume 33, Number 2, March, 2008

          Rüdiger Foos and   
            Christian Bunse and   
         Hagen Höpfner and   
             Torsten Zimmermann   TML: an XML-based test modeling language 1:1--1:??
       Anup Kumar Bandyopadhyay   Weakest precondition based verification
                                  tool that models spatial ordering  . . . 2:1--2:??
              Nasib S. Gill and   
                      Balkishan   Dependency and interaction oriented
                                  complexity metrics of component-based
                                  systems  . . . . . . . . . . . . . . . . 3:1--3:??
               Latika Kharb and   
                 Rajender Singh   Complexity metrics for
                                  component-oriented software systems  . . 4:1--4:??
                    Dirk Riehle   JUnit 3.8 documented using
                                  collaborations . . . . . . . . . . . . . 5:1--5:??
                   David Notkin   ACM TOSEM FAQs and figures . . . . . . . 5--6
             Peter B. Henderson   Software Engineering Education: SEEd . . 6--6
      Praveen R. Srivastava and   
              Deepak Pareek and   
               Kailash Sati and   
           Dinesh C. Pujari and   
                   G. Raghurama   Non homogeneous Poisson process based
                                  cumulative priority model for
                                  determining optimal software testing
                                  period . . . . . . . . . . . . . . . . . 6:1--6:??
                   Wang Wei and   
                        Li Tong   Component behavior relativity analysis   7:1--7:??
                 Jiankun Wu and   
              Linpeng Huang and   
                     Dejun Wang   ASM-based model of dynamic service
                                  update in OSGi . . . . . . . . . . . . . 8:1--8:??
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 8--17
                   Liguo Yu and   
                Srini Ramaswamy   Improving modularity by refactoring code
                                  clones: a feasibility study on Linux . . 9:1--9:??
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 18--28
              Tony Gorschek and   
             Samuel Fricker and   
                Robert Felt and   
               Claes Wohlin and   
               Michael Mattsson   1st International Global Requirements
                                  Engineering Workshop --- GREW'07 . . . . 29--32

ACM SIGSOFT Software Engineering Notes
Volume 33, Number 3, May, 2008

                 Behzad Bastani   Process-oriented abstraction of the
                                  complex evolvable systems: problem model
                                  construction . . . . . . . . . . . . . . 1:1--1:??
   Beatriz Terezinha Borsoi and   
       Jorge Luis Risco Becerra   Definition and modeling of process using
                                  object orientation . . . . . . . . . . . 2:1--2:??
           Sofien Khemakhem and   
               Khalil Drira and   
             Emna Khemakhem and   
                 Mohamed Jmaiel   An experimental evaluation of SEC+, an
                                  enhanced search engine for
                                  component-based software development . . 3:1--3:??
 Jaiprakash T. Lallchandani and   
                        R. Mall   Slicing UML architectural models . . . . 4:1--4:??
             Peter B. Henderson   Software engineering education (SEEd)    5--5
                Robert Schaefer   Debugging debugged, a metaphysical
                                  manifesto of systems integration . . . . 5:1--5:??
  Dharmender Singh Kushwaha and   
                    A. K. Misra   Software test effort estimation  . . . . 6:1--6:??
                   Michael Wing   Hell's software nightmares . . . . . . . 6--6
                       Joe Saur   Review of \booktitleSecure Coding in C
                                  and C++ by Robert C. Seacord, Addison
                                  Wesley, 2006, paperback, ISBN
                                  0-321-33572-4, 341 pp., \$39.99} . . . . 7:1--7:??
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 7--16
         Mordechai Ben-Menachem   Review of \booktitleModal Logic for
                                  Philosophers by James W. Garson,
                                  Cambridge University Press, 2006, pp.
                                  471  . . . . . . . . . . . . . . . . . . 8:1--8:??
         Mordechai Ben-Menachem   Review of \booktitlePractical Support
                                  for ISO 9001 Software Project
                                  Documentation by Susan K. Land and John
                                  W. Walz, IEEE Computer Society and
                                  Wiley-Interscience, 2006 (by IEEE CS),
                                  ISBN-13 978-0-471-76867-8, pp. 432 . . . 9:1--9:??
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 17--28

ACM SIGSOFT Software Engineering Notes
Volume 33, Number 4, July, 2008

               Doug Serfass and   
        Kalyan S. Thiparthi and   
                  Coskun Bayrak   Search, sort, pagination, association
                                  and (other) CRUD: a comparison of
                                  ActiveScaffold and MyFaces tomahawk  . . 1:1--1:??
                Craig Henderson   Managing software defects: defect
                                  analysis and traceability  . . . . . . . 2:1--2:??
           Sofien Khemakhem and   
               Khalil Drira and   
             Emna Khemakhem and   
                 Mohamed Jmaiel   An experimental evaluation of SEC+, an
                                  enhanced search engine for
                                  component-based software development . . 3:1--3:??
             Parminder Kaur and   
                  Hardeep Singh   Certification process of software
                                  components . . . . . . . . . . . . . . . 4:1--4:??
                Dilek Basci and   
                   Sanjay Misra   Entropy metric for XML DTD documents . . 5:1--5:??
             Mohammad Reza Nami   A comparison of object-oriented
                                  languages in software engineering  . . . 6:1--6:??
                   David Notkin   ACM TOSEM: FAQs and figures  . . . . . . 6--6
   Praveen Ranjan Srivastva and   
              Krishan Kumar and   
                   G. Raghurama   Test case prioritization based on
                                  requirements and risk factors  . . . . . 7:1--7:??
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 7--16
      Julia F. Varnell-Sarjeant   Managing a man-rated software
                                  development program via risk mitigation  8:1--8:??
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 17--26
                   Len Bass and   
                Brian Berenbach   Leadership and Management in Software
                                  Architecture (LMSA'08): a report on an
                                  ICSE workshop  . . . . . . . . . . . . . 27--29
                Gerhard Chroust   History of computers can raise student's
                                  interest . . . . . . . . . . . . . . . . 29--29

ACM SIGSOFT Software Engineering Notes
Volume 33, Number 5, September, 2008

               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 1:1--1:??
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 2:1--2:??
              Barbara Paech and   
            Patrick Heymans and   
                   Anne Persson   Report working conference on
                                  requirements engineering: foundation for
                                  software quality (REFSQ'08)  . . . . . . 3:1--3:??
                Chitra Babu and   
               R. Vijayalakshmi   Metrics-based design selection tool for
                                  aspect oriented software development . . 4:1--4:??
              Deepti Mishra and   
                    Alok Mishra   Some observations on staff estimation
                                  metrics for object: oriented software
                                  engineering  . . . . . . . . . . . . . . 5:1--5:??
              Deepti Mishra and   
                    Alok Mishra   Design issues in client-server software
                                  maintenance  . . . . . . . . . . . . . . 6:1--6:??
                 Richard Riehle   Playscript for use cases . . . . . . . . 7:1--7:??
        Andre L. C. Tavares and   
            Marco Tulio Valente   A gentle introduction to OSGi  . . . . . 8:1--8:??
                     Vinita and   
                 Amita Jain and   
              Devendra K. Tayal   On reverse engineering an
                                  object-oriented code into UML class
                                  diagrams incorporating extensible
                                  mechanisms . . . . . . . . . . . . . . . 9:1--9:??
                   Feng Xia and   
                 Longhua Ma and   
                       Zhe Peng   Programming Scilab in ARM Linux  . . . . 10:1--10:??
                Grady Booch and   
       Robert A. Maksimchuk and   
           Michael W. Engle and   
             Bobbi J. Young and   
              Jim Connallen and   
               Kelli A. Houston   Object-oriented analysis and design with
                                  applications, third edition  . . . . . . 11:1--11:??
                   Scott Berkun   The art of project management  . . . . . 12:1--12:??

ACM SIGSOFT Software Engineering Notes
Volume 33, Number 6, November, 2008

           Alexander Romanovsky   DEPLOY: industrial deployment of
                                  advanced system engineering methods for
                                  high productivity and dependability  . . 1--3
               P. S. Grover and   
               Rajesh Kumar and   
                 Avadhesh Kumar   Measuring changeability for generic
                                  aspect-oriented systems  . . . . . . . . 1--5
             Paramvir Singh and   
                  Hardeep Singh   DynaMetrics: a runtime metric-based
                                  analysis tool for object-oriented
                                  software systems . . . . . . . . . . . . 1--6
        Sivamuni Kalaimagal and   
      Rengaramanujam Srinivasan   A retrospective on software component
                                  quality models . . . . . . . . . . . . . 1--10
                Arun Sharma and   
               Rajesh Kumar and   
                   P. S. Grover   Estimation of quality for software
                                  components: an empirical approach  . . . 1--10
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 5--14
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 15--24
                 Richard Riehle   The GSwERC initiative  . . . . . . . . . 25--25
             Dieter Rombach and   
          Marcus Ciolkowski and   
               Ross Jeffery and   
        Oliver Laitenberger and   
              Frank McGarry and   
                  Forrest Shull   Impact of research on practice in the
                                  field of inspections, reviews and
                                  walkthroughs: learning from successful
                                  industrial uses  . . . . . . . . . . . . 26--35


ACM SIGSOFT Software Engineering Notes
Volume 34, Number 1, January, 2009

                       Tony Lee   Peer review assessment standard for
                                  object oriented analysis and design  . . 1--3
         Kuljit Kaur Chahal and   
                  Hardeep Singh   Metrics to study symptoms of bad
                                  software designs . . . . . . . . . . . . 1--4
                   R. K. Pandey   Managing software design complexity:
                                  facade vs role-based design  . . . . . . 1--4
               Yogesh Singh and   
       Pradeep Kumar Bhatia and   
              Omprakash Sangwan   ANN model for predicting software
                                  function point metric  . . . . . . . . . 1--4
                Chitra Babu and   
      Harshini Ramnath Krishnan   Fault model and test-case generation for
                                  the composition of aspects . . . . . . . 1--6
               Yogesh Singh and   
              Arvinder Kaur and   
               Ruchika Malhotra   Application of support vector machine to
                                  predict fault prone classes  . . . . . . 1--6
                    Sergey Diev   Querying complex requirements  . . . . . 1--7
         Rajiv Ranjan Suman and   
                     Rajib Mall   State model extraction of a software
                                  component by observing its behavior  . . 1--7
                Karsten Richter   Causal-based networks supporting process
                                  improvement  . . . . . . . . . . . . . . 1--9
     Hewijin Christine Jiau and   
              Jinghong Cox Chen   Test code differencing for test-driven
                                  refactoring automation . . . . . . . . . 1--10
                Robert Schaefer   Software maturity: design as dark art    1--36
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 7--16
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 17--26
              John Daughtry and   
                Janet Burge and   
            John M. Carroll and   
                    Colin Potts   Creativity and rationale in software
                                  design . . . . . . . . . . . . . . . . . 27--29

ACM SIGSOFT Software Engineering Notes
Volume 34, Number 2, March, 2009

                   R. K. Pandey   Relativity in software engineering
                                  measurements . . . . . . . . . . . . . . 1--3
                Tapan P. Bagchi   Models for software defects and testing
                                  strategies . . . . . . . . . . . . . . . 1--4
             Stephen Nelson and   
                Co\cskun Bayrak   Categorizing web queries . . . . . . . . 1--4
               Vipin Saxena and   
             Manish Shrivastava   Performance of function point analysis
                                  through UML modeling . . . . . . . . . . 1--4
  Praveen Ranjan Srivastava and   
              Parshad Patel and   
             Siddharth Chatrola   Cause effect graph to decision table
                                  generation . . . . . . . . . . . . . . . 1--4
  Praveen Ranjan Srivastava and   
             Priyanka Gupta and   
           Yogita Arrawatia and   
                    Suman Yadav   Use of genetic algorithm in generation
                                  of feasible test data  . . . . . . . . . 1--4
             Dinesh Kumar Saini   Testing polymorphism in object oriented
                                  systems for improving software quality   1--5
               Vipin Saxena and   
                   Deepak Arora   Performance evaluation for object
                                  oriented software systems  . . . . . . . 1--5
                 R. A. Khan and   
                     K. Mustafa   Metric based testability model for
                                  object oriented design (MTMOOD)  . . . . 1--6
                  Chengying Mao   Software faults prediction based on grey
                                  system theory  . . . . . . . . . . . . . 1--6
                Arun Sharma and   
               P. S. Grover and   
                   Rajesh Kumar   Reusability assessment for software
                                  components . . . . . . . . . . . . . . . 1--6
            Naveen Aggarwal and   
              Nupur Prakash and   
                  Sanjeev Sofat   Web hypermedia content management system
                                  effort estimation model  . . . . . . . . 1--7
       Anup Kumar Bandyopadhyay   Fairness and conspiracy concepts in
                                  concurrent systems . . . . . . . . . . . 1--8
            ESF Najumudheen and   
                 Rajib Mall and   
                Debasis Samanta   A dependence graph-based representation
                                  for test coverage analysis of
                                  object-oriented programs . . . . . . . . 1--8
       Ben Swarup Medikonda and   
    Seetha Ramaiah Panchumarthy   A framework for software safety in
                                  safety-critical systems  . . . . . . . . 1--9
            Ashalatha Nayak and   
                Debasis Samanta   Model-based test cases synthesis using
                                  UML interaction diagrams . . . . . . . . 1--10
         Gertrude Neuman Levine   Defining defects, errors, and service
                                  degradations . . . . . . . . . . . . . . 1--14
             Peter B. Henderson   Software engineering education (SEEd)    3--4
                   Michael Wing   On technology and cultural change  . . . 4--4
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 5--14
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 15--24
         Michel Wermelinger and   
               Paul Wernick and   
            Ciarán Bryce   Report on the 4th International ERCIM
                                  Workshop on Software Evolution and
                                  Evolvability (Evol '08)  . . . . . . . . 25--27
             Paris Avgeriou and   
              Patricia Lago and   
              Philippe Kruchten   Towards using architectural knowledge    27--30
             Richard Torkar and   
              Tony Gorschek and   
                   Robert Feldt   Eighth Conference on Software
                                  Engineering Research and Practice in
                                  Sweden (SERPS'08)  . . . . . . . . . . . 31--33

ACM SIGSOFT Software Engineering Notes
Volume 34, Number 3, May, 2009

         Mohammad Reza Nami and   
                Fatemeh Hassani   A comparative evaluation of the Z, CSP,
                                  RSL, and VDM languages . . . . . . . . . 1--4
        Shahid Nazir Bhatti and   
            Asif Muhammad Malik   An XML-based framework for bidirectional
                                  transformation in model-driven
                                  architecture (MDA) . . . . . . . . . . . 1--5
     Jitender Kumar Chhabra and   
                    Varun Gupta   Evaluation of object-oriented spatial
                                  complexity measures  . . . . . . . . . . 1--5
              Harish Mittal and   
                 Pradeep Bhatia   Software maintainability assessment
                                  based on fuzzy logic technique . . . . . 1--5
         Dinesh Kumar Saini and   
            Jabar H. Yousif and   
                   Wail M. Omar   Enhanced inquiry method for malicious
                                  object identification  . . . . . . . . . 1--5
                 Frank Tsui and   
                  Andy Wang and   
                       Kai Qian   A discussion on security typing and
                                  measurement for SOA  . . . . . . . . . . 1--5
                   Qun Yang and   
                  Man-Wu Xu and   
                    De-Chang Pi   Delegation: a language facility for
                                  dynamic software adaptation  . . . . . . 1--5
             Avadhesh Kumar and   
               Rajesh Kumar and   
                   P. S. Grover   Generalized coupling measure for
                                  aspect-oriented systems  . . . . . . . . 1--6
            Shahid Nazir Bhatti   Deducing the complexity to quality of a
                                  system using UML . . . . . . . . . . . . 1--7
      Lakshmi Sunil Prakash and   
         Dinesh Kumar Saini and   
                    N. S. Kutti   Integrating EduLearn learning content
                                  management system (LCMS) with
                                  cooperating learning object repositories
                                  (LORs) in a peer to peer (P2P)
                                  architectural framework  . . . . . . . . 1--7
             Peter B. Henderson   Software engineering education (SEEd)    4--5
                   Ewan Tempero   Software engineering and computer
                                  sciences: two worlds . . . . . . . . . . 6--6
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 6--15
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 16--29

ACM SIGSOFT Software Engineering Notes
Volume 34, Number 4, July, 2009

                Kuljit Kaur and   
                  Hardeep Singh   Evaluating an evolving software
                                  component: case of internal design . . . 1--4
                Alok Mishra and   
                  Deepti Mishra   Some issues on scheduling estimation
                                  model for object-oriented software
                                  projects . . . . . . . . . . . . . . . . 1--4
         Mohammad Reza Nami and   
               Hamid Razavi and   
               Milad Saeedi and   
                  Navid Shahidi   Investigating a new formal model for a
                                  library system using B method  . . . . . 1--4
                 A. Agrawal and   
                     R. A. Khan   Impact of inheritance on vulnerability
                                  propagation at design phase  . . . . . . 1--5
             Sheng-bing Ren and   
                  Xi-e Wang and   
                Zhi-gang Hu and   
                      Ge Hu and   
                   Guo-jun Wang   Graph transformation based reduction
                                  analysis of PID  . . . . . . . . . . . . 1--5
                   A. Yadav and   
                     R. A. Khan   Measuring design complexity: an
                                  inherited method perspective . . . . . . 1--5
              Deepak Dahiya and   
                     Usha Batra   Distributed middleware framework using
                                  aspects  . . . . . . . . . . . . . . . . 1--6
                Leilei Kong and   
                       Tao Yuan   Use case modeling approach for early
                                  aspect acquisition . . . . . . . . . . . 1--6
               Bo Sandén   Inspired software design early Jackson
                                  methods to thread architectures  . . . . 1--6
                Arun Sharma and   
               P. S. Grover and   
                   Rajesh Kumar   Dependency analysis for component-based
                                  software systems . . . . . . . . . . . . 1--6
               Yogesh Singh and   
       Pradeep Kumar Bhatia and   
              Omprakash Sangwan   Predicting software maintenance using
                                  fuzzy model  . . . . . . . . . . . . . . 1--6
             K. Reddy Reddy and   
                  A. Ananda Rao   Dependency oriented complexity metrics
                                  to detect rippling related design
                                  defects  . . . . . . . . . . . . . . . . 1--7
           Swarnendu Biswas and   
                 Rajib Mall and   
        Manoranjan Satpathy and   
              Srihari Sukumaran   A model-based regression test selection
                                  approach for embedded applications . . . 1--9
             Parminder Kaur and   
                  Hardeep Singh   Version management and composition of
                                  software components in different phases
                                  of software development life cycle . . . 1--9
                Arun Mishra and   
                    A. K. Misra   Component assessment and proactive model
                                  for support of dynamic integration in
                                  self adaptive system . . . . . . . . . . 1--9
Jose A. Calvo-Manzano Villalón and   
Gonzalo Cuevas Agustín and   
       Gloria Gasca Hurtado and   
Tomás San Feliu Gilabert   State of the art for risk management in
                                  software acquisition . . . . . . . . . . 1--10
             Behzad Bastani and   
                  David Greaves   Complex open-system design by
                                  quasi-agents: process-oriented modeling
                                  in agent-based systems . . . . . . . . . 1--14
                   David Notkin   FAQs and figures . . . . . . . . . . . . 6--6
                   Michael Wing   On quality . . . . . . . . . . . . . . . 7--8
              Mark A. Ardis and   
             Peter B. Henderson   Software engineering education (SEEd)    8--8
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 9--16
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 17--24
                   Len Bass and   
                Brian Berenbach   Leadership and Management in Software
                                  Architecture Workshop 2009 report  . . . 25--27
           John M. Daughtry and   
                Umer Farooq and   
              Brad A. Myers and   
                 Jeffrey Stylos   API usability: report on special
                                  interest group at CHI  . . . . . . . . . 27--29
          Victor Pankratius and   
                Adam Porter and   
                    Larry Votta   Advances in multicore software
                                  engineering  . . . . . . . . . . . . . . 30--31
          Dimitris Dranidis and   
       Stephen P. Masticola and   
                  Paul Strooper   Challenges in practice: 4th
                                  International Workshop on the Automation
                                  of Software Test report  . . . . . . . . 32--34
         Robert Baillargeon and   
              Robert France and   
           Steffen Zschaler and   
             Bernhard Rumpe and   
         Steven Völkel and   
                     Geri Georg   Workshop on Modeling in Software
                                  Engineering at ICSE 2009 . . . . . . . . 34--37
              Jürgen Ebert   Book review: \booktitleCollaborative and
                                  Distributed Chemical Engineering From
                                  Understanding to Substantial Design
                                  Process Support, Edited by Manfred Nagl,
                                  Wolfgang Marquardt (Springer Verlag,
                                  Berlin, 2008), as Lecture Note in
                                  Computer Science 4970, ISBN
                                  3-540-70551-1, 849 pp. . . . . . . . . . 42--43

ACM SIGSOFT Software Engineering Notes
Volume 34, Number 5, September, 2009

   Jorge L. Díaz-Herrera   The ``engineering'' of software, a
                                  different kind of engineering  . . . . . 1--3
               Vipin Saxena and   
               Deepak Arora and   
             Manish Shrivastava   Performance evaluation of network system
                                  through UML  . . . . . . . . . . . . . . 1--3
           P. Eugene Xavier and   
               E. R. Naganathan   Productivity improvement in software
                                  projects using 2-dimensional
                                  probabilistic software stability model
                                  (PSSM) . . . . . . . . . . . . . . . . . 1--3
        Sivamuni Kalaimagal and   
      Rengaramanujam Srinivasan   The need for transforming the COTS
                                  component quality evaluation standard
                                  mirage to reality  . . . . . . . . . . . 1--4
                Manoj Kumar and   
              Anjana Gosain and   
                   Yogesh Singh   Agent oriented requirements engineering
                                  for a data warehouse . . . . . . . . . . 1--4
               J. P. Mittal and   
             Pradeep Bhatia and   
                  Harish Mittal   Software maintenance productivity
                                  assessment using fuzzy logic . . . . . . 1--4
              Deepti Mishra and   
                    Alok Mishra   A discussion on design factors of
                                  client-server software testability . . . 1--5
             Avadhesh Kumar and   
               P. S. Grover and   
                   Rajesh Kumar   A quantitative evaluation of
                                  aspect-oriented software quality model
                                  (AOSQUAMO) . . . . . . . . . . . . . . . 1--9
               Mikhail Auguston   Software architecture built from
                                  behavior models  . . . . . . . . . . . . 1--15
            Larry Bernstein and   
Hákon Ágústsson   Pithy software engineering quotes new
                                  ``TBD'' column . . . . . . . . . . . . . 6--6
                   Michael Wing   Evolution and great apps . . . . . . . . 6--7
              Mark A. Ardis and   
             Peter B. Henderson   Software engineering education (SEEd)    7--7
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 8--17
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 18--24
               Yaser Ghanam and   
               Frank Maurer and   
          Pekka Abrahamsson and   
                  Kendra Cooper   A report on the XP Workshop on Agile
                                  Product Line Engineering . . . . . . . . 25--27
              Xiaofeng Wang and   
               Michael Lane and   
              Kieran Conboy and   
              Minna Pikkarainen   Where agile research goes: starting from
                                  a 7-year retrospective (report on agile
                                  research workshop at XP2009) . . . . . . 28--30
          Ruzanna Chitchyan and   
               Monica Pinto and   
            Safoora Shakil Khan   Report on early aspects at ICSE 2009:
                                  Workshop on Aspect-Oriented Requirements
                                  Engineering and Architecture Design  . . 30--35
               Alberto Sillitti   Designing empirical studies: assessing
                                  the effectiveness of agile methods . . . 35--37
   João M. Fernandes and   
               Luis C. Lamb and   
         Ricardo J. Machado and   
        Flávio R. Wagner   Recent advances in model-based
                                  methodologies for pervasive and embedded
                                  software . . . . . . . . . . . . . . . . 37--39
               Martin Glinz and   
            Patrick Heymans and   
               Anne Persson and   
             Guttorm Sindre and   
          Aybüke Aurum and   
             Nazim Madhavji and   
              Barbara Paech and   
                  Gil Regev and   
                  Roel Wieringa   Report on the working conference on
                                  requirements engineering: foundation for
                                  software quality (REFSQ'09)  . . . . . . 40--45
              Yael Dubinsky and   
              Philippe Kruchten   Software development governance (SDG):
                                  report on 2nd workshop . . . . . . . . . 46--47
              Jeffrey C. Carver   Report from the Second International
                                  Workshop on Software Engineering for
                                  Computational Science and Engineering
                                  (SE-CSE 09)  . . . . . . . . . . . . . . 48--51
                Grace Lewis and   
               Dennis Smith and   
                   Len Bass and   
                     Brad Myers   Report of the Workshop on Software
                                  Engineering Foundations for End-User
                                  Programming  . . . . . . . . . . . . . . 51--54
                       Joe Saur   Book Review: \booktitleC Programming: a
                                  Modern Approach (2nd Edit.) written by
                                  K. N. King, and published by W. W.
                                  Norton and Company, paperback, ISBN
                                  978-0-393-97950-3, 832 pp. . . . . . . . 57--58
                       Joe Saur   Book review: \booktitleMathematical
                                  Modeling and Simulation: Introduction
                                  for Scientists and Engineers by Kai
                                  Velten, and published by Wiley-VCH,
                                  2009, paperback, ISBN 978-3-527-40758-3,
                                  348 pp.  . . . . . . . . . . . . . . . . 58--58
              Steven Chodkowski   Book Review: \booktitleResearch Methods
                                  for Human-Computer Interaction edited by
                                  Paul Cairns and Anna L. Cox, and
                                  published by Cambridge University Press,
                                  2008, paperback (also available in Hard
                                  Cover), ISBN: 978-0-521-69031-7, 242
                                  pp., (987-0-521-87012-2 hardcover) . . . 59--59
         Mordechai Ben-Menachem   Book review: \booktitleSoftware
                                  Maintenance Management by Alain April
                                  and Alain Abran, and published by Wiley
                                  Interscience (John Wiley and Sons,
                                  Inc.), 2008, (paperback), ISBN
                                  978-0470-14707-8, pp. 334  . . . . . . . 59--60
            Peter Farrell-Vinay   Book review: \booktitleModel-based
                                  software testing and analysis in C# by
                                  Jonathan Jacky, Margus Veanes, Colin
                                  Campbell, and Wolfram Schulte, and
                                  published by CUP, 2008, (paperback)
                                  ISB-10: 0-521-68761-6, 349 pp. . . . . . 60--60
            Peter Farrell-Vinay   Book review: \booktitleIntroduction to
                                  Software Testing, by Paul Amman and Jeff
                                  Offutt, published by CUP, 2008,
                                  978-0-521-88038 322 pp., 0-471-20282-7   60--61

ACM SIGSOFT Software Engineering Notes
Volume 34, Number 6, November, 2009

            Larry Bernstein and   
Hákon Ágústsson   Pithy Software Engineering Quotes New
                                  Column . . . . . . . . . . . . . . . . . 1
                        Yu Feng   Finding flows in software development    1--3
              Nasib S. Gill and   
                      Balkishan   Component adaptation process and
                                  adaptability viewpoints  . . . . . . . . 1--3
                    Sim Hui Tee   Eliminating method redundancy for the
                                  improvement of inner class design  . . . 1--3
                  Cagatay Catal   Barriers to the adoption of software
                                  product line engineering . . . . . . . . 1--4
                    Offer Drori   Template for a system design file using
                                  OODPM version 2010 . . . . . . . . . . . 1--4
     Indrajit Bhattacharyya and   
  Anup Kumar Bandypopadhyay and   
              Bhaskar Gupta and   
     Aloknath Chattopadhyay and   
    Rajeswari Chattopadhyay and   
             Kiyotoshi Yasumoto   Vector GA: a novel enhancement of
                                  genetic algorithms for efficient
                                  multi-variable or multi-dimensional
                                  search . . . . . . . . . . . . . . . . . 1--5
         Mohammad Reza Nami and   
      Bahareh Sheikh-Abbasi and   
            Marjaneh Khoshandam   A comparative introduction to CSP and
                                  ACT-ONE formal languages . . . . . . . . 1--5
                  S. Rehman and   
                     K. Mustafa   Research on software design level
                                  security vulnerabilities . . . . . . . . 1--5
             Parminder Kaur and   
                  Hardeep Singh   A layered structure for uniform version
                                  management in component based systems    1--7
                   R. K. Pandey   Exploiting web resources for
                                  teaching/learning best software design
                                  tips . . . . . . . . . . . . . . . . . . 1--7
               Ranjit Singh and   
              Shakti Mishra and   
                 D. S. Kushwaha   An efficient asynchronous mobile web
                                  service framework  . . . . . . . . . . . 1--7
              Philip Samuel and   
                     Rajib Mall   Slicing-based test case generation from
                                  UML activity diagrams  . . . . . . . . . 1--14
              Mark A. Ardis and   
             Peter B. Henderson   Software engineering education (SEEd)    5--8
                Robert Schaefer   The epistemology of computer security    8--10
               Mark Doernhoefer   Surfing the net for \booktitleSoftware
                                  Engineering Notes  . . . . . . . . . . . 11--20
               Peter G. Neumann   Risks to the public  . . . . . . . . . . 21--24
                  Thomas Heiman   Book Review: \booktitlePattern
                                  Recognition and Neural Networks by Brian
                                  D. Ripley, and published by Cambridge
                                  University Press, 2007, Paperback, ISBN
                                  978-0521-71770-0, pp. 403  . . . . . . . 28--28
                  Thomas Heiman   Book Review: \booktitleSimulation-Based
                                  Engineering of Complex Systems, Second
                                  Edition is written by John R. Clymer,
                                  and published by Wiley-Interscience,
                                  2009, ISBN 978-00470-40129-3, pp. 503    28--29
                Robert Schaefer   Book Review: \booktitleDesign,
                                  Measurement and Management of
                                  Large-Scale IP Networks by Antonio Nucci
                                  and Konstantina Papagiannaki, and
                                  published by Cambridge University Press,
                                  2009, 978-0-521-88069-5, 394 pp. . . . . 29--29
                Robert Schaefer   Book Review: \booktitleScientific
                                  Software: a Guide to Good Style by Suely
                                  Oliveira and David Stewart, and
                                  published by Cambridge University Press,
                                  2006, (paperback), 0-521-67595-2, 303
                                  pp.  . . . . . . . . . . . . . . . . . . 30--30
                Craig Henderson   Book Review: \booktitleComputing for
                                  Numerical Methods using Visual C++ by
                                  Shaharuddin Salleh, Albert Y. Zomaya,
                                  Sakhinah Abu Bakar, and published by
                                  Wiley-Interscience (December 14, 2007),
                                  2007, 0-470-12795-3, 448 pp. . . . . . . 30--31
                     Igor Gvero   Book Review: \booktitlePractical Text
                                  Mining With Perl, by Roger Bilisoly, and
                                  published by Wiley, 2009,
                                  978-0-470-1763-6, 295pp. . . . . . . . . 31--31
                     Igor Gvero   Book Review: \booktitlePython for
                                  Software Design by Allen B. Downey, and
                                  published by Cambridge University Press,
                                  2009, 978-0-521-72596-5, 251pp.  . . . . 31--32