Last update:
Thu Aug 1 11:55:23 MDT 2019
G. J. Holzmann The model checker SPIN . . . . . . . . . 279--295
T. L. Roberts and
M. L. Gibson and
K. T. Fields and
R. K. Rainer Factors that impact implementing a
system development methodology . . . . . 640--649
J. Rushby Systematic formal verification for
fault-tolerant time-triggered algorithms 651--660
C. Sauer and
D. R. Jeffery and
L. Land and
P. Yetton The effectiveness of software
development technical reviews: a
behaviorally motivated program of
research . . . . . . . . . . . . . . . . 1--14
N. G. Leveson Intent specifications: an approach to
building human-centered specifications 15--35
A. Bobbio and
A. Puliafito and
M. Tekel A modeling framework to implement
preemption policies in non-Markovian
SPNs . . . . . . . . . . . . . . . . . . 36--54
S. Antoy and
D. Hamlet Automatically checking an implementation
against its formal specification . . . . 55--69
N. Medvidovic and
R. N. Taylor A classification and comparison
framework for software architecture
description languages . . . . . . . . . 70--93
Anonymous 1999 reviewers list . . . . . . . . . . 94--96
J. Ropponen and
K. Lyytinen Components of software development risk:
how to address them? A project manager
survey . . . . . . . . . . . . . . . . . 98--112
I. Lee and
R. K. Iyer Diagnosing rediscovered software
problems using symptoms . . . . . . . . 113--127
P. S. Pietro and
A. Morzenti and
S. Morasca Generation of execution sequences for
modular time critical systems . . . . . 128--149
B. Mahony and
Jin Song Dong Timed Communicating Object Z . . . . . . 150--177
P. T. Devanbu and
S. G. Stubblebine Cryptographic verification of test
coverage claims . . . . . . . . . . . . 178--192
D. Talia and
P. K. Srimani and
M. Jazayeri Guest Editors' introduction: special
issues on architecture-independent
languages and software tools for
parallel processing . . . . . . . . . . 193--196
B. L. Chamberlain and
Sung-Eun Choi and
C. Lewis and
C. Lin and
L. Snyder and
W. D. Weathersby ZPL: a machine independent programming
language for parallel computers . . . . 197--211
S. B. Baden and
S. J. Fink A programming methodology for dual-tier
multicomputers . . . . . . . . . . . . . 212--226
T. Braunl Parallaxis-III: architecture-independent
data parallel processing . . . . . . . . 227--243
Junjie Gu and
Zhiyuan Li Efficient interprocedural array
data-flow analysis for automatic program
parallelization . . . . . . . . . . . . 244--261
A. Marongiu and
P. Palazzari Automatic mapping of system of
$N$-dimensional affine recurrence
equations (SARE) onto distributed memory
parallel systems . . . . . . . . . . . . 262--275
S. Gorlatch Toward formally-based design of message
passing programs . . . . . . . . . . . . 276--288
D. Talia and
P. K. Srimani and
M. Jazayeri Guest Editors' introduction: special
issues on architecture-independent
languages and software tools for
parallel processing . . . . . . . . . . 289--292
L. S. Nyland and
J. F. Prins and
A. Goldberg and
P. H. Mills A design methodology for data-parallel
applications . . . . . . . . . . . . . . 293--314
T. Rauber and
G. Runger A transformation approach to derive
efficient parallel implementations . . . 315--339
D. Kadamuddi and
J. J. P. Tsai Clustering algorithm for parallelizing
software systems in multiprocessors
environment . . . . . . . . . . . . . . 340--361
Ying Chen and
M. Winslett Automated tuning of parallel I/O
systems: an approach to portable I/O
performance for scientific applications 362--383
S. Prakash and
E. Deelman and
R. Bagrodia Asynchronous parallel simulation of
parallel programs . . . . . . . . . . . 385--400
M. D. Grammatikakis and
S. Liesche Priority queues and sorting methods for
parallel simulation . . . . . . . . . . 401--422
P. T. Devanbu and
D. E. Perry and
J. S. Poulin Guest Editors introduction: next
generation software reuse . . . . . . . 423--424
K. Maruyama and
K. I. Shima An automatic class generation mechanism
by using method integration . . . . . . 425--440
D. Batory and
Gang Chen and
E. Robertson and
Tao Wang Design wizards and visual programming
environments for GenVoca generators . . 441--452
I. Kang and
I. Lee and
Young-Si Kim An efficient state space generation for
the analysis of real-time systems . . . 453--477
T. Bergin Sloan research project . . . . . . . . . 478--478
M. G. Mendonca and
V. R. Basili Validation of an approach for improving
existing measurement frameworks . . . . 484--499
S. A. DeLoach and
T. C. Hartrum A theory-based representation for
object-oriented domain models . . . . . 500--517
L. C. Briand and
K. El Emam and
B. G. Freimut and
O. Laitenberger A comprehensive evaluation of
capture-recapture models for estimating
software defect content . . . . . . . . 518--540
K. El Emam and
A. Birk Validating the ISO/IEC 15504 measure of
software requirements analysis process
capability . . . . . . . . . . . . . . . 541--566
Miyoung Shin and
A. L. Goel Empirical data modeling in software
engineering using radial basis functions 567--576
H. Bowman and
J. Derrick and
E. Brinksma Selected papers from the second IFIP
Int'l conference on formal methods for
open object based distributed systems,
1997 . . . . . . . . . . . . . . . . . . 577--578
J. M. Wing and
J. Ockerbloom Respectful type converters . . . . . . . 579--593
T. Bolognesi Toward constraint-object-oriented
development . . . . . . . . . . . . . . 594--616
P. di Blasio and
K. Fisher and
C. Talcott A control-flow analysis for a calculus
of concurrent objects . . . . . . . . . 617--634
D. Buchs and
N. Guelfi A formal specification framework for
object-oriented distributed systems . . 635--652
T. L. Graves and
A. F. Karr and
J. S. Marron and
H. Siy Predicting fault incidence using
software change history . . . . . . . . 653--661
R. Boute Supertotal function definition in
mathematics and software engineering . . 662--672
J. M. Wing and
J. Woodcock Special issues for FM '99: the First
World Congress on Formal Methods in the
Development of Computing Systems . . . . 673--674
S. King and
J. Hammond and
R. Chapman and
A. Pryor Is proof more cost-effective than
testing? . . . . . . . . . . . . . . . . 675--686
A. E. Haxthausen and
J. Peleska Formal development and verification of a
distributed railway control system . . . 687--701
V. Lotz and
V. Kessler and
G. H. Walter A formal security model for
microprocessor hardware . . . . . . . . 702--712
A. Cavalcanti and
D. A. Naumann A weakest precondition semantics for
refinement of object-oriented programs 713--728
H. Marchand and
M. Samaan Incremental design of a power
transformer station controller using a
controller synthesis methodology . . . . 729--741
M. Peleg and
D. Dori The model multiplicity problem:
experimenting with real-time
specification methods . . . . . . . . . 742--759
F. Casati and
S. Castano and
M. Fugini and
I. Mirbel and
B. Pernici Using patterns to design rules in
workflows . . . . . . . . . . . . . . . 760--785
M. Cartwright and
M. Shepperd An empirical investigation of an
object-oriented software system . . . . 786--796
N. E. Fenton and
N. Ohlsson Quantitative analysis of faults and
failures in a complex software system 797--814
D. E. Perry and
A. Romanovsky and
A. Tripathi Current trends in exception handling . . 817--819
P. A. Buhr and
W. Y. R. Mok Advanced exception handling mechanisms 820--836
P. Koopman and
J. DeVale The exception handling effectiveness of
POSIX operating systems . . . . . . . . 837--848
S. Sinha and
M. J. Harrold Analysis and testing of programs with
exception handling constructs . . . . . 849--871
E. Borger and
W. Schulte A practical method for specification and
analysis of exception handling --- a
Java/JVM case study . . . . . . . . . . 872--887
R. A. Maxion and
R. T. Olszewski Eliminating exception handling errors
with dependability cases: a comparative,
empirical study . . . . . . . . . . . . 888--906
T. Chavez A decision-analytic stopping rule for
validation of commercial software
systems . . . . . . . . . . . . . . . . 907--918
D. E. Perry and
A. Romanovsky and
A. Tripathi Current trends in exception handling . . 921--922
M. Burnett and
A. Agrawal and
P. van Zee Exception handling in the spreadsheet
paradigm . . . . . . . . . . . . . . . . 923--942
C. Hagen and
G. Alonso Exception handling in workflow
management systems . . . . . . . . . . . 943--958
T. Murata and
A. Borgida Handling of irregularities in human
centered systems: a unified framework
for data and processes . . . . . . . . . 959--977
A. van Lamsweerde and
E. Letier Handling obstacles in goal-oriented
requirements engineering . . . . . . . . 978--1005
J. J. Dolado A validation of the component-based
method for software size estimation . . 1006--1021
B. Littlewood The use of proof in diversity arguments 1022--1023
A. M. K. Cheng and
P. Clements and
M. Woodside Guest Editors' introduction: workshop on
software and performance . . . . . . . . 1025--1026
Vikram S. Adve and
Rajive L. Bagrodia and
James C. Browne and
Ewa Deelman and
Aditya Dube and
Elias N. Houstis and
John R. Rice and
Rizos Sakellariou and
David J. Sundaram-Stukel and
Patricia J. Teller and
Mary K. Vernon POEMS: End-to-End Performance Design of
Large Parallel Adaptive Computational
Systems . . . . . . . . . . . . . . . . 1027--1048
D. Petriu and
C. Shousha and
A. Jalnapurkar Architecture-based performance analysis
applied to a telecommunication system 1049--1065
D. A. Menasce and
H. Gomaa A method for design and performance
modeling of client/server systems . . . 1066--1085
Sridhar Ramesh and
H. G. Perros A multilayer client-server queueing
network model with synchronous and
asynchronous messages . . . . . . . . . 1086--1100
F. Shull and
F. Lanubile and
V. R. Basili Investigating reading techniques for
object-oriented framework learning . . . 1101--1118
A. M. K. Cheng and
P. Clements and
M. Woodside Workshop on software and performance
[Guest Editors' Introduction] . . . . . 1121--1121
B. A. Nixon Management of performance requirements
for information systems . . . . . . . . 1122--1146
E. J. Weyuker and
F. I. Vokolos Experience with performance testing of
software systems: issues, an approach,
and case study . . . . . . . . . . . . . 1147--1156
B. Littlewood and
P. T. Popov and
L. Strigini and
N. Shryane Modeling the effects of combining
diverse software fault detection
techniques . . . . . . . . . . . . . . . 1157--1167
M. Litoiu and
J. Rolia and
G. Serazzi Designing process replication and
activation: a quantitative approach . . 1168--1178
C. G. Drummond and
D. Ionescu and
R. C. Holte A learning agent that assists the
browsing of software libraries . . . . . 1179--1196
D. Malkhi and
M. K. Reiter Secure execution of Java applets using a
remote playground . . . . . . . . . . . 1197--1209
S. G. Eick and
T. L. Graves and
A. F. Karr and
J. S. Marron and
A. Mockus Does code decay? Assessing the evidence
from change management data . . . . . . 1--12
D. Makaroff and
G. Neufeld and
N. Hutchinson Design and implementation of a VBR
continuous media file server . . . . . . 13--28
R. Guerraoui and
A. Schiper The generic consensus service . . . . . 29--41
M. Broy Toward a mathematical foundation of
software engineering methods . . . . . . 42--57
B. Ramesh and
M. Jarke Toward reference models for requirements
traceability . . . . . . . . . . . . . . 58--93
Anonymous 2000 reviewers list . . . . . . . . . . 94--96
J. Kramer and
D. Garlan and
D. S. Rosenblum Guest Editors' introduction: 1999
international conference on software
engineering . . . . . . . . . . . . . . 97--98
M. D. Ernst and
J. Cockrell and
W. G. Griswold and
D. Notkin Dynamically discovering likely program
invariants to support program evolution 99--123
R. DeLine Avoiding packaging mismatch with
flexible packaging . . . . . . . . . . . 124--143
A. M. Memon and
M. E. Pollack and
M. L. Soffa Hierarchical GUI test case generation
using automated planning . . . . . . . . 144--155
D. Jackson and
A. Waingold Lightweight extraction of object models
from bytecode . . . . . . . . . . . . . 156--169
W. Chan and
R. J. Anderson and
P. Beame and
D. H. Jones and
D. Notkin and
W. E. Warner Optimizing symbolic model checking for
statecharts . . . . . . . . . . . . . . 170--190
I-Ling Yen and
F. B. Bastani and
D. J. Taylor Design of multi-invariant data
structures for robust shared accesses in
multiprocessor systems . . . . . . . . . 193--207
R. Mattolini and
P. Nesi An interval logic for real-time system
specification . . . . . . . . . . . . . 208--227
M. E. Delamaro and
J. C. Maidonado and
A. P. Mathur Interface Mutation: an approach for
integration testing . . . . . . . . . . 228--247
M. J. Harrold and
D. Rosenblum and
G. Rothermel and
E. Weyuker Empirical studies of a prediction model
for regression test selection . . . . . 248--263
R. K. Smith and
J. E. Hale and
A. S. Parrish An empirical study using task assignment
patterns to improve the accuracy of
software effort estimation . . . . . . . 264--271
L. J. Camp An atomicity-generating protocol for
anonymous currencies . . . . . . . . . . 272--278
S. B. Yadav and
N. G. Shaw and
L. Webb and
C. Sutcu and
T. L. Roberts and
M. L. Gibson and
R. K. Rainer and
K. T. Fields Comments on ``Factors that impact
implementing a system development
methodology'' [with reply] . . . . . . . 279--286
T. L. Roberts and
M. L. Gibson and
R. K. Rainer and
K. T. Fields Response to ``Comments on factors that
impact the implementation of a systems
development methodology'' . . . . . . . 282--286
K. Zhang and
D. Q. Zhang and
J. Cao Design, construction, and application of
a generic visual language generation
environment . . . . . . . . . . . . . . 289--307
O. Babaoglu and
R. Davoli and
A. Montresor Group communication in partitionable
systems: specification and algorithms 308--336
T. E. Hastings and
A. S. M. Sajeev A vector-based approach to software size
measurement and effort estimation . . . 337--350
P. Tonella Concept analysis for module
restructuring . . . . . . . . . . . . . 351--363
G. C. Murphy and
D. Notkin and
K. J. Sullivan Software reflexion models: bridging the
gap between design and implementation 364--380
Gursaran and
G. Roy On the applicability of Weyuker Property
9 to object-oriented structural
inheritance complexity metrics . . . . . 381--384
A. A. Andrews Editorial . . . . . . . . . . . . . . . 385--386
O. Laitenberger and
K. El Emam and
T. G. Harbich An internally replicated
quasi-experimental comparison of
checklist and perspective based reading
of code documents . . . . . . . . . . . 387--421
E. Y. T. Juan and
J. J. P. Tsai and
T. Murata and
Yi Zhou Reduction methods for real-time systems
using Delay Time Petri Nets . . . . . . 422--448
S. Gilmore and
J. Hillston and
M. Ribaudo An efficient algorithm for aggregating
PEPA models . . . . . . . . . . . . . . 449--464
L. Prechelt and
B. Unger An experiment measuring the effects of
personal software process (PSP) training 465--472
G. Succi and
L. Benedicenti and
T. Vernazza Analysis of the effects of software
reuse on customer satisfaction in an RPG
environment . . . . . . . . . . . . . . 473--479
R. Chatterjee and
B. G. Ryder and
W. A. Landi Complexity of points-to analysis of Java
in the presence of exceptions . . . . . 481--512
L. C. Briand and
C. Bunse and
J. W. Daly A controlled experiment for evaluating
quality guidelines on the
maintainability of object-oriented
designs . . . . . . . . . . . . . . . . 513--530
D. M. Silva and
K. Schwan and
G. Eisenhauer CTK: configurable object abstractions
for multiprocessors . . . . . . . . . . 531--549
P. Diaz and
I. Aedo and
F. Panetsos Modeling the dynamic behavior of
hypermedia applications . . . . . . . . 550--572
Ki-Seok Bang and
Jin-Young Choi and
Chuck Yoo Comments on ``The Model Checker SPIN'' 573--576
R. DeLine Corrections to ``Avoiding packaging
mismatch with flexible packaging'' . . . 577--577
R. Janicki and
E. Sekerinski Foundations of the trace assertion
method of module interface specification 577--598
D. A. Stuart and
M. Brockmeyer and
A. K. Mok and
F. Jahanian Simulation-verification: biting at the
state explosion problem . . . . . . . . 599--617
Hyeonsang Eom and
J. K. Hollingsworth A tool to help tune where computation is
performed . . . . . . . . . . . . . . . 618--629
K. El Emam and
S. Benlarbi and
N. Goel and
S. N. Rai The confounding effect of class size on
the validity of object-oriented metrics 630--650
M. Chechik and
J. Gannon Automatic analysis of consistency
between requirements and designs . . . . 651--672
L. L. Jilani and
J. Desharnais and
A. Mili Defining and applying measures of
distance between specifications . . . . 673--703
S. Alagar and
S. Venkatesan Techniques to tackle state explosion in
global predicate detection . . . . . . . 704--714
Shyh-Kwei Chen and
W. K. Fuchs and
Jen-Yao Chung Reversible debugging using program
instrumentation . . . . . . . . . . . . 715--727
E. Vicario Static analysis and dynamic steering of
time-dependent systems . . . . . . . . . 728--748
K. Havelund and
M. Lowry and
J. Penix Formal analysis of a space-craft
controller using SPIN . . . . . . . . . 749--765
P. Diaz and
I. Aedo and
F. Panetsos Call for papers . . . . . . . . . . . . 766--767
I. Ben-Shaul and
O. Holder and
B. Lavva Dynamic adaptation and deployment of
distributed components in Hadas . . . . 769--787
B. A. Kitchenham and
R. T. Hughes and
S. G. Linkman Modeling software measurement data . . . 788--804
Chang-Gun Lee and
Kwangpo Lee and
Joosun Hahn and
Yang-Min Seo and
Sang Lyul Min and
Rhan Ha and
Seongsoo Hong and
Chang Yun Park and
Minsuk Lee and
Chong Sang Kim Bounding cache-related preemption delay
for real-time systems . . . . . . . . . 805--826
G. Cugola and
E. Di Nitto and
A. Fuggetta The JEDI event-based infrastructure and
its application to the development of
the OPSS WFMS . . . . . . . . . . . . . 827--850
K. El Emam and
O. Laitenberger Evaluating capture-recapture models with
two inspectors . . . . . . . . . . . . . 851--864
C. Nottegar and
C. Priami and
P. Degano Performance evaluation of mobile
processes via abstract machines . . . . 867--889
K. Strike and
K. El Emam and
N. Madhavji Software cost estimation with incomplete
data . . . . . . . . . . . . . . . . . . 890--908
K. M. Zuberi and
K. G. Shin EMERALDS: a small-memory real-time
microkernel . . . . . . . . . . . . . . 909--928
G. Rothermel and
R. H. Untch and
Chengyun Chu and
M. J. Harrold Prioritizing test cases for regression
testing . . . . . . . . . . . . . . . . 929--948
S. C. Ntafos On comparisons of random, partition, and
proportional partition testing . . . . . 949--960
C. Wohlin Guest Editor's introduction: Seventh
International Software Metrics Symposium 961--962
L. C. Briand and
J. Wust Modeling development effort in
object-oriented systems using design
properties . . . . . . . . . . . . . . . 963--986
M. Shepperd and
M. Cartwright Predicting with sparse data . . . . . . 987--998
I. Myrtveit and
E. Stensrud and
U. H. Olsson Analyzing data sets with missing data:
an empirical evaluation of imputation
methods and likelihood-based methods . . 999--1013
M. Shepperd and
G. Kadoda Comparing software prediction techniques
using simulation . . . . . . . . . . . . 1014--1022
C. Kallepalli and
J. Tian Measuring and modeling usage and
reliability for statistical Web testing 1023--1036
S. Iyer and
S. Ramesh Apportioning: a technique for efficient
reachability analysis of concurrent
object-oriented programs . . . . . . . . 1037--1056
N. E. Rallis and
Z. F. Lansdowne Reliability estimation for a software
system with sequential independent
reviews . . . . . . . . . . . . . . . . 1057--1061
F. Fioravanti and
P. Nesi Estimation and prediction metrics for
adaptive maintenance effort of
object-oriented systems . . . . . . . . 1062--1084
C. C. Michael and
G. McGraw and
M. A. Schatz Generating software test data by
evolution . . . . . . . . . . . . . . . 1085--1110
B. Westfechtel and
B. P. Munch and
R. Conradi A layered architecture for uniform
version management . . . . . . . . . . . 1111--1133
L. Prechelt and
B. Unger and
W. F. Tichy and
P. Brossler and
L. G. Votta A controlled experiment in maintenance:
comparing design patterns to simpler
solutions . . . . . . . . . . . . . . . 1134--1144
Anonymous Author index . . . . . . . . . . . . . . 1145--1147
Anonymous Subject index . . . . . . . . . . . . . 1147--1151
A. A. Andrews Editorial: New EIC Introduction . . . . 1--1
J. Knight Editorial . . . . . . . . . . . . . . . 3--3
J. Bansiya and
C. G. Davis A hierarchical model for object-oriented
design quality assessment . . . . . . . 4--17
Hui Wu and
Wei-Ngan Chin and
J. Jaffar An efficient distributed deadlock
avoidance algorithm for the AND model 18--29
B. Ravindran Engineering dynamic real-time
distributed systems: architecture,
system description language, and
middleware . . . . . . . . . . . . . . . 30--57
P. Frey and
R. Radhakrishnan and
H. W. Carter and
P. A. Wilsey and
P. Alexander A formal specification and verification
framework for Time Warp-based parallel
simulation . . . . . . . . . . . . . . . 58--78
A. van der Hoek and
A. Carzaniga and
D. Heimbigner and
A. L. Wolf A testbed for configuration management
policy programming . . . . . . . . . . . 79--99
P. T. Devanbu and
S. G. Stubblebine Stack and queue integrity on hostile
platforms . . . . . . . . . . . . . . . 100--108
Kuo-Chung Tai and
Yu Lei A test generation strategy for pairwise
testing . . . . . . . . . . . . . . . . 109--111
M. J. Harrold and
A. Bertolino Guest Editors' Introduction: 2000
International Symposium on Software
Testing and Analysis . . . . . . . . . . 113--114
S. F. Siegel and
G. S. Avrunin Improving the precision of INCA by
eliminating solutions with spurious
cycles . . . . . . . . . . . . . . . . . 115--128
K. Bhargavan and
C. A. Gunter and
Moonjoo Kim and
Insup Lee and
D. Obradovic and
O. Sokolsky and
M. Viswanathan Verisim: formal analysis of network
simulations . . . . . . . . . . . . . . 129--145
D. K. Peters and
D. L. Parnas Requirements-based monitors for
real-time systems . . . . . . . . . . . 146--158
S. Elbaum and
A. G. Malishevsky and
G. Rothermel Test case prioritization: a family of
empirical studies . . . . . . . . . . . 159--182
A. Zeller and
R. Hildebrandt Simplifying and isolating
failure-inducing input . . . . . . . . . 183--200
M. G. Gouda Multiphase stabilization . . . . . . . . 201--208
Wuu Yang A classification of noncircular
attribute grammars based on the
look-ahead behavior . . . . . . . . . . 210--227
K. L. Mills and
H. Gomaa Knowledge-based automation of a design
method for concurrent systems . . . . . 228--255
S. G. Stubblebine and
R. N. Wright An authentication logic with formal
semantics supporting synchronization,
revocation, and recency . . . . . . . . 256--285
E. Rosti and
G. Serazzi and
E. Smirni and
M. S. Squillante Models of parallel applications with
large computation and I/O requirements 286--307
A. E. K. Sobel and
M. R. Clarkson Formal methods application: an empirical
tale of software development . . . . . . 308--320
C. E. Hrischuk and
C. M. Woodside Logical clock requirements for reverse
engineering scenarios from a distributed
system . . . . . . . . . . . . . . . . . 321--339
M. Morisio and
M. Ezran and
C. Tully Success and failure factors in software
reuse . . . . . . . . . . . . . . . . . 340--357
J. Rajgopal and
M. Mazumdar Modular operational test plans for
inferences on software reliability based
on a Markov model . . . . . . . . . . . 358--363
G. J. Holzmann and
M. H. Smith An automated verification method for
distributed systems software based on
model extraction . . . . . . . . . . . . 364--377
S. Frolund and
R. Guerraoui e-Transactions: end-to-end reliability
for three-tier architectures . . . . . . 378--395
S. G. Eick and
T. L. Graves and
A. F. Karr and
A. Mockus and
P. Schuster Visualizing software changes . . . . . . 396--412
D. Milicev Automatic model transformations using
extended UML object diagrams in modeling
environments . . . . . . . . . . . . . . 413--431
J. Offutt and
J. Jezequel Call for papers . . . . . . . . . . . . 432--432
A. L. Murphy and
G. C. Roman and
G. Varghese Tracking mobile units for dependable
message delivery . . . . . . . . . . . . 433--448
T. Mens A state-of-the-art survey on software
merging . . . . . . . . . . . . . . . . 449--462
D. Hendrix and
J. H. Cross and
S. Maghsoodloo The effectiveness of control structure
diagrams in source code comprehension
activities . . . . . . . . . . . . . . . 463--477
N. Stankovic and
Kang Zhang A distributed parallel programming
framework . . . . . . . . . . . . . . . 478--493
K. El Emam and
S. Benlarbi and
N. Goel and
W. Melo and
H. Lounis and
S. N. Rai The optimal class size for
object-oriented software . . . . . . . . 494--509
D. A. Wooff and
M. Goldstein and
F. P. A. Coolen Bayesian graphical models for software
testing . . . . . . . . . . . . . . . . 510--525
Lu Zhang and
Dan Xie Comments on ``On the applicability of
Weyuker property 9 to object-oriented
structural inheritance complexity
metrics'' . . . . . . . . . . . . . . . 526--527
S. M. Yacoub and
H. H. Ammar A methodology for architecture-level
reliability risk analysis . . . . . . . 529--547
P. S. C. Alencar and
D. D. Cowan and
C. J. P. Lucena A logical theory of interfaces and
objects . . . . . . . . . . . . . . . . 548--575
M. Burnett and
A. Sheretov and
Bing Ren and
G. Rothermel Testing homogeneous spreadsheet grids
with the ``what you see is what you
test'' methodology . . . . . . . . . . . 576--594
L. Prechelt and
B. Unger-Lamprecht and
M. Philippsen and
W. F. Tichy Two controlled experiments assessing the
usefulness of design pattern
documentation in program maintenance . . 595--606
P. V. Koppol and
R. H. Carver and
Kuo-Chung Tai Incremental integration testing of
concurrent programs . . . . . . . . . . 607--623
D. Hendrix and
J. H. Cross and
S. Maghsoodloo Corrections to ``The effectiveness of
control structure diagrams in source
code comprehension activities'' . . . . 624--624
D. L. Atkins and
T. Ball and
T. L. Graves and
A. Mockus Using version control data to evaluate
the impact of software tools: a case
study of the Version Editor . . . . . . 625--637
L. Dobrica and
E. Niemela A survey on software architecture
analysis methods . . . . . . . . . . . . 638--653
T. Kamiya and
S. Kusumoto and
K. Inoue CCFinder: a multilinguistic token-based
code clone detection system for large
scale source code . . . . . . . . . . . 654--670
S. D. Teasley and
L. A. Covi and
M. S. Krishnan and
J. S. Olson Rapid software development through team
collocation . . . . . . . . . . . . . . 671--683
V. S. Mookerjee and
I. R. Chiang A dynamic coordination policy for
software system construction . . . . . . 684--694
D. E. Perry and
A. Porter and
M. W. Wade and
L. G. Votta and
J. Perpich Reducing inspection interval in
large-scale software development . . . . 695--705
L. C. Briand and
W. L. Melo and
J. Wust Assessing the applicability of
fault-proneness models across
object-oriented software projects . . . 706--720
B. A. Kitchenham and
S. L. Pfleeger and
L. M. Pickard and
P. W. Jones and
D. C. Hoaglin and
K. El Emam and
J. Rosenberg Preliminary guidelines for empirical
research in software engineering . . . . 721--734
C. S. Collberg and
C. Thomborson Watermarking, tamper-proofing, and
obfuscation --- tools for software
protection . . . . . . . . . . . . . . . 735--746
B. H. C. Cheng and
E. Y. Wang Formalizing and integrating the dynamic
model for object-oriented modeling . . . 747--762
C. A. Healy and
D. B. Whalley Automatic detection and exploitation of
branch constraints for timing analysis 763--781
J. W. Cangussu and
R. A. DeCarlo and
A. P. Mathur A formal model of the software test
process . . . . . . . . . . . . . . . . 782--796
G. Mori and
F. Paterno and
C. Santoro CTTE: support for developing and
analyzing task models for interactive
system design . . . . . . . . . . . . . 797--813
W. M. Turski The reference model for smooth growth of
software systems revisited . . . . . . . 814--815
F. Kordon and
Luqi An introduction to rapid system
prototyping . . . . . . . . . . . . . . 817--821
A. Baghdadi and
N. E. Zergainoh and
W. O. Cesario and
A. A. Jerraya Combining a performance estimation
methodology with a hardware/software
codesign flow supporting multiprocessor
systems . . . . . . . . . . . . . . . . 822--831
R. S. Janka and
L. M. Wills and
L. B. Baumstark Virtual benchmarking and model
continuity in prototyping embedded
multiprocessor signal processing systems 832--846
F. Barat and
R. Lauwereins and
G. Deconinck Reconfigurable instruction set
processors from a hardware/software
perspective . . . . . . . . . . . . . . 847--862
A. Gopal and
M. S. Krishnan and
T. Mukhopadhyay and
D. R. Goldenson Measurement programs in software
development: determinants of success . . 863--875
M. Morisio and
D. Romano and
I. Stamelos Quality, productivity, and learning in
framework-based development: an
exploratory case study . . . . . . . . . 876--888
D. Harel and
O. Kupferman On object systems and behavioral
inheritance . . . . . . . . . . . . . . 889--903
D. E. Neumann An enhanced neural network technique for
software risk analysis . . . . . . . . . 904--912
G. Ciardo and
R. German and
B. R. Haverkort Introduction to the special section on
Petri nets and performance models . . . 913--914
G. Balbo and
S. C. Bruell and
M. Sereno Product form solution for generalized
stochastic Petri nets . . . . . . . . . 915--932
A. Horvath and
M. Telek Time domain analysis of non-Markovian
stochastic Petri nets with PRI
transitions . . . . . . . . . . . . . . 933--943
M. Gribaudo and
A. Horvath Fluid stochastic Petri nets augmented
with flush-out arcs: a transient
analysis technique . . . . . . . . . . . 944--955
D. D. Deavours and
G. Clark and
T. Courtney and
D. Daly and
S. Derisavi and
J. M. Doyle and
W. H. Sanders and
P. G. Webster The Mobius framework and its
implementation . . . . . . . . . . . . . 956--969
G. Antoniol and
G. Canfora and
G. Casazza and
A. De Lucia and
E. Merlo Recovering traceability links between
code and documentation . . . . . . . . . 970--983
Dianxiang Xu and
Xudong He and
Yi Deng Compositional schedulability analysis of
real-time systems using time Petri nets 984--996
J. Tian Better reliability assessment and
prediction through data clustering . . . 997--1007
Jongmoon Baik and
B. Boehm and
B. M. Steece Disaggregating and calibrating the CASE
tool variable in COCOMO II . . . . . . . 1009--1022
A. En-Nouaary and
R. Dssouli and
F. Khendek Timed Wp-method: testing real-time
systems . . . . . . . . . . . . . . . . 1023--1038
G. Cabri and
L. Leonardi and
F. Zambonelli Engineering mobile agent applications
via context-dependent coordination . . . 1039--1055
F. Plasil and
S. Visnovsky Behavior protocols for software
components . . . . . . . . . . . . . . . 1056--1076
Loon-Been Chen and
I-Chen Wu An efficient distributed online
algorithm to detect strong conjunctive
predicates . . . . . . . . . . . . . . . 1077--1084
A. Khoumsi A temporal approach for testing
distributed systems . . . . . . . . . . 1085--1103
Anonymous Author index . . . . . . . . . . . . . . 1194--1196
Anonymous Subject index . . . . . . . . . . . . . 1196--1200
L. C. Briand and
S. Morasca and
V. R. Basili An operational process for goal-driven
definition of measures . . . . . . . . . 1106--1125
P. Jalote and
A. Saxena Optimum control limits for employing
statistical process control in software
process . . . . . . . . . . . . . . . . 1126--1134
C. K. Riemenschneider and
B. C. Hardgrave and
F. D. Davis Explaining software developer acceptance
of methodologies: a comparison of five
theoretical models . . . . . . . . . . . 1135--1145
M. D. Ernst and
G. J. Badros and
D. Notkin An empirical analysis of c preprocessor
use . . . . . . . . . . . . . . . . . . 1146--1170
J. Singer and
N. G. Vinson Ethical issues in empirical studies of
software engineering . . . . . . . . . . 1171--1180
L. Bratthall and
C. Wohlin Is it possible to decorate graphical
software design and architecture models
with qualitative information? --- An
experiment . . . . . . . . . . . . . . . 1181--1193
Anonymous Author index . . . . . . . . . . . . . . 1194--1196
Anonymous Subject index . . . . . . . . . . . . . 1196--1200
Fan Zhang and
To-yat Cheung Optimal transfer trees and
distinguishing trees for testing
observable nondeterministic finite-state
machines . . . . . . . . . . . . . . . . 1--14
Haiping Xu and
S. M. Shatz A framework for model-based design of
agent-oriented software . . . . . . . . 15--30
Dianxiang Xu and
Jianwen Yin and
Yi Deng and
Junhua Ding A formal architectural model for logical
agent mobility . . . . . . . . . . . . . 31--45
R. Lai and
Sun-Jen Huang A model for estimating the size of a
formal communication protocol
specification and its implementation . . 46--62
Ping-Yu Hsu and
Yuan-Bin Chang and
Yen-Liang Chen STRPN: a Petri-net approach for modeling
spatial-temporal relations between
moving multimedia objects . . . . . . . 63--76
R. K. Bandi and
V. K. Vaishnavi and
D. E. Turk Predicting maintenance performance using
object-oriented design complexity
metrics . . . . . . . . . . . . . . . . 77--87
P. J. Boland and
H. Singh and
B. Cukic Comparing partition and random testing
via majorization and Schur functions . . 88--94
Anonymous Reviewers list . . . . . . . . . . . . . 95--96
M. J. Harrold and
W. Schafer Guest Editors' introduction: 2001
international conference on software
engineering . . . . . . . . . . . . . . 97--98
S. Uchitel and
J. Kramer and
J. Magee Synthesis of behavioral models from
scenarios . . . . . . . . . . . . . . . 99--115
A. Egyed A scenario-driven approach to trace
dependency analysis . . . . . . . . . . 116--132
L. K. Dillon and
R. E. K. Stirewalt Inference graphs: a computational
structure supporting generation of
customizable and correct analysis
components . . . . . . . . . . . . . . . 133--150
A. I. Anton and
C. Potts Functional paleontology: the evolution
of user-visible system services . . . . 151--166
P. Vitharana and
K. Ramamurthy Computer-mediated group support,
anonymity, and the software inspection
process: an empirical investigation . . 167--180
L. V. Manzoni and
R. T. Price Identifying extensions required by RUP
(rational unified process) to comply
with CMM (capability maturity model)
levels 2 and 3 . . . . . . . . . . . . . 181--192
G. Canfora and
A. A. Andrews Guest Editors' introduction: 2001
international conference on software
maintenance . . . . . . . . . . . . . . 193--194
J. A. Jones and
M. J. Harrold Test-suite reduction and prioritization
for modified condition/decision coverage 195--209
T. Eisenbarth and
R. Koschke and
D. Simon Locating features in source code . . . . 210--224
A. Bianchi and
D. Caivano and
V. Marengo and
G. Visaggio Iterative reengineering of legacy
systems . . . . . . . . . . . . . . . . 225--241
C. Canal and
L. Fuentes and
E. Pimentel and
J. M. Troya and
A. Vallecillo Adding roles to CORBA objects . . . . . 242--260
Chin-Yu Huang and
M. R. Lyu and
Sy-Yen Kuo A unified scheme of some nonhomogeneous
Poisson process models for software
reliability estimation . . . . . . . . . 261--269
A. Bobbio and
G. Franceschinis and
R. Gaeta and
L. Portinale Parametric fault tree for the
dependability analysis of redundant
systems and its high-level Petri net
semantics . . . . . . . . . . . . . . . 270--287
Chia Hung Kao Comments on ``Quality, productivity, and
learning in framework-based development:
an exploratory case study'' . . . . . . 288--288
R. G. Little and
M. L. Gibson Perceived influences on implementing
data warehousing . . . . . . . . . . . . 290--296
R. Subramanyam and
M. S. Krishnan Empirical analysis of CK metrics for
object-oriented design complexity:
implications for software defects . . . 297--310
D. B. Stewart and
G. Arora A tool for analyzing and fine tuning the
real-time properties of an embedded
system . . . . . . . . . . . . . . . . . 311--326
Sun-Jen Huang and
R. Lai Measuring the maintainability of a
communication protocol based on its
formal specification . . . . . . . . . . 327--344
P. Popov and
L. Strigini and
J. May and
S. Kuball Estimating bounds on the reliability of
diverse systems . . . . . . . . . . . . 345--359
Songwen Xu and
Yam San Chee Transformation-based diagnosis of
student programs for programming
tutoring systems . . . . . . . . . . . . 360--384
S. Biffl and
M. Halling Investigating the defect detection
effectiveness and cost benefit of
nominal inspection teams . . . . . . . . 385--397
E. Stensrud and
I. Myrtveit Identifying high performance ERP
projects . . . . . . . . . . . . . . . . 398--416
S. J. Prowell and
J. H. Poore Foundations of sequence-based software
specification . . . . . . . . . . . . . 417--429
J. W. Cangussu and
R. A. DeCarlo and
A. P. Mathur Using sensitivity analysis to validate a
state variable model of the software
test process . . . . . . . . . . . . . . 430--443
A. T. Sherman and
D. A. McGrew Key establishment in large dynamic
groups using one-way function trees . . 444--458
F. Barbier and
B. Henderson-Sellers and
A. Le Parc-Lacayrelle and
J. M. Bruel Formalization of the Whole-Part
relationship in the Unified Modeling
Language . . . . . . . . . . . . . . . . 459--470
Min Xie and
Bo Yang A study of the effect of imperfect
debugging on software development cost 471--473
T. Menzies and
J. S. Di Stefano More success and failure factors in
software reuse . . . . . . . . . . . . . 474--477
M. Morisio and
M. Ezran and
C. Tully Comments on ``More success and failure
factors in software reuse'' . . . . . . 478
J. D. Herbsleb and
A. Mockus An empirical study of speed and
communication in globally distributed
software development . . . . . . . . . . 481--494
P. Tonella Using a concept lattice of decomposition
slices for program understanding and
impact analysis . . . . . . . . . . . . 495--509
A. Santone Heuristic search + local model checking
in selective mu-calculus . . . . . . . . 510--523
C. Baier and
B. Haverkort and
H. Hermanns and
J. P. Katoen Model-checking algorithms for
continuous-time Markov chains . . . . . 524--541
B. Kitchenham and
L. M. Pickard and
S. Linkman and
P. W. Jones Modeling software bidding risks . . . . 542--554
B. Long and
D. Hoffman and
P. Strooper Tool support for testing concurrent Java
components . . . . . . . . . . . . . . . 555--566
D. M. Berry and
W. F. Tichy Comments on ``Formal methods
application: an empirical tale of
software development'' . . . . . . . . . 567--571
A. E. K. Sobel and
M. R. Clarkson Response to ``Comments on `Formal
methods application: an empirical tale
of software development'' . . . . . . . 572--575
J. C. Chen and
H. C. Jiau Comments on ``On object systems and
behavioral inheritance'' . . . . . . . . 576
T. Y. Chen and
Pak-Lok Poon and
T. H. Tse A choice relation framework for
supporting category-partition test case
generation . . . . . . . . . . . . . . . 577--593
L. C. Briand and
Y. Labiche and
Yihong Wang An investigation of graph-based class
integration test order strategies . . . 594--607
J. Villadangos and
F. Farina and
J. R. Gonzalez de Mendivil and
J. R. Garitagoitia and
A. Cordoba A safe algorithm for resolving OR
deadlocks . . . . . . . . . . . . . . . 608--622
R. Alur and
K. Etessami and
M. Yannakakis Inference of message sequence charts . . 623--633
J. H. Andrews and
Yingjun Zhang General test result checking with log
file analysis . . . . . . . . . . . . . 634--648
P. Vitharana and
F. M. Zahedi and
H. Jain Knowledge-based repository scheme for
storing and retrieving business
components: a theoretical design and an
empirical analysis . . . . . . . . . . . 649--664
J. J. Dolado and
M. Harman and
M. C. Otero and
L. Hu An empirical investigation of the
influence of a type of side effects on
program comprehension . . . . . . . . . 665--670
W. M. Evanco Comments on ``The confounding effect of
class size on the validity of
object-oriented metrics'' . . . . . . . 670--672
D. L. Parnas and
M. Lawford The role of inspection in software
quality assurance . . . . . . . . . . . 674--676
A. Dunsmore and
M. Roper and
M. Wood The development and evaluation of three
diverse techniques for object-oriented
code inspection . . . . . . . . . . . . 677--686
T. Thelin and
P. Runeson and
C. Wohlin An experimental comparison of
usage-based and checklist-based reading 687--704
J. Xu On inspection and verification of
software with timing requirements . . . 705--720
P. Anderson and
T. Reps and
T. Teitelbaum Design and implementation of a
fine-grained software inspection tool 721--733
Tei-Wei Kuo and
Li-Pin Chang and
Yu-Hua Liu and
Kwei-Jay Lin Efficient online schedulability tests
for real-time systems . . . . . . . . . 734--751
D. Mosse and
R. Melhem and
Sunondo Ghosh A nonpreemptive real-time scheduler with
recovery from transient faults and its
implementation . . . . . . . . . . . . . 752--767
T. Berling and
P. Runeson Efficient evaluation of multifactor
dependent system performance using
fractional factorial design . . . . . . 769--781
M. Lanza and
S. Ducasse Polymetric views --- a lightweight
visual approach to reverse engineering 782--795
J. Cleland-Huang and
C. K. Chang and
M. Christensen Event-based traceability for managing
evolutionary change . . . . . . . . . . 796--810
Ming Li and
C. S. Smidts A ranking of software engineering
measures based on expert opinion . . . . 811--824
M. A. Rothenberger and
K. J. Dooley and
U. R. Kulkarni and
N. Nada Strategies for software reuse: a
principal component analysis of reuse
practices . . . . . . . . . . . . . . . 825--837
C. B. Seaman and
M. G. Mendonca and
V. R. Basili and
Y. M. Kim User interface evaluation and
empirically-based evolution of a
prototype experience management tool . . 838--850
S. C. Shaw and
M. Goldstein and
M. Munro and
E. Burd Moral dominance relations for program
comprehension . . . . . . . . . . . . . 851--863
Anonymous Special Section --- On the International
Conference on the Foundations of
Software Engineering . . . . . . . . . . 0:1--0:2
W. G. Griswold Guest Editor's introduction: 2002
Conference on the Foundations of
Software Engineering . . . . . . . . . . 865--865
Jianwei Niu and
J. M. Atlee and
N. A. Day Template semantics for model-based
notations . . . . . . . . . . . . . . . 866--882
G. Bruns and
S. Chandra Searching for points-to analysis . . . . 883--897
A. Gurfinkel and
M. Chechik and
B. Devereux Temporal logic query checking: a tool
for model exploration . . . . . . . . . 898--914
Yichen Xie and
D. Engler Using redundancies to find errors . . . 915--928
L. Capra and
W. Emmerich and
C. Mascolo CARISMA: context-aware reflective
middleware system for mobile
applications . . . . . . . . . . . . . . 929--945
K. Goseva-Popstojanova and
A. Hassan and
A. Guedem and
W. Abdelmoez and
D. E. M. Nassar and
H. Ammar and
A. Mili Architectural-level risk analysis using
UML . . . . . . . . . . . . . . . . . . 946--960
J. Knight Editorial: New AEIC introduction and AE
farewell . . . . . . . . . . . . . . . . 961--961
E. Teruel and
G. Franceschinis and
M. De Pierro Well-defined generalized stochastic
Petri nets: a net-level method to
specify priorities . . . . . . . . . . . 962--973
M. Marre and
A. Bertolino Using spanning sets for coverage testing 974--984
T. Foss and
E. Stensrud and
B. Kitchenham and
I. Myrtveit A simulation study of the model
evaluation criterion MMRE . . . . . . . 985--995
Skylar Lei and
M. R. Smith Evaluation of several nonparametric
bootstrap methods to estimate confidence
intervals for software metrics . . . . . 996--1004
A. L. Souter and
L. L. Pollock The construction of contextual def-use
associations for object-oriented systems 1005--1018
D. Spinellis Global analysis and transformations in
preprocessed languages . . . . . . . . . 1019--1030
M. W. Bailey and
J. W. Davidson Automatic detection and diagnosis of
faults in generated code for procedure
calls . . . . . . . . . . . . . . . . . 1031--1042
M. Alshayeb and
Wei Li An empirical validation of
object-oriented metrics in two different
iterative software processes . . . . . . 1043--1049
A. Chatzigeorgiou Mathematical assessment of
object-oriented design quality . . . . . 1050--1053
Hee Beng Kuan Tan and
Lun Hao and
Yong Yang On formalization of the whole-part
relationship in the Unified Modeling
Language . . . . . . . . . . . . . . . . 1054--1055
F. Barbier and
B. Henderson-Sellers Controversies about the black and white
diamonds . . . . . . . . . . . . . . . . 1056
M. Morisio and
M. Oivo Guest Editors' introduction: software
engineering for the wireless Internet 1057--1058
M. Caporuscio and
A. Carzaniga and
A. L. Wolf Design and evaluation of a support
service for mobile, wireless
publish/subscribe applications . . . . . 1059--1071
A. T. S. Chan and
Siu-Nam Chuang MobiPADS: a reflective middleware for
context-aware mobile computing . . . . . 1072--1085
P. Bellavista and
A. Corradi and
R. Montanari and
C. Stefanelli Context-aware middleware for resource
management in the wireless Internet . . 1086--1099
Wai Yip Lum and
F. C. M. Lau User-centric content negotiation for
effective adaptation service in mobile
computing . . . . . . . . . . . . . . . 1100--1111
I. Satoh A testing framework for mobile computing
software . . . . . . . . . . . . . . . . 1112--1121
A. Ocampo and
D. Boggio and
J. Munch and
G. Palladino Toward a reference process for
developing wireless Internet services 1122--1134
Anonymous Author index . . . . . . . . . . . . . . 1135--1137
Anonymous Subject index . . . . . . . . . . . . . 1137--1142
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Staff List . . . . . . . 0:2--0:2
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of Contents . . . 0:1--0:1
T. Ball and
M. Chechik and
D. Hoffman Editorial: AE introduction . . . . . . . 1--2
M. Harman and
L. Hu and
R. Hierons and
J. Wegener and
H. Sthamer and
A. Baresel and
M. Roper Testability transformation . . . . . . . 3--16
F. Padberg and
T. Ragg and
R. Schoknecht Using machine learning for estimating
the defect content after an inspection 17--28
A. Petrenko and
S. Boroday and
R. Groz Confirming configurations in EFSM
testing . . . . . . . . . . . . . . . . 29--42
G. Antoniol and
A. Cimitile and
G. A. Di Lucca and
M. Di Penta Assessing staffing needs for a software
maintenance project through queuing
simulation . . . . . . . . . . . . . . . 43--58
Gwan-Hwan Hwang and
Sheng-Jen Chang and
Huey-Der Chu Technology for testing nondeterministic
client/server database applications . . 59--77
Anonymous 2003 Reviewers list . . . . . . . . . . 78--80
Anonymous TSE: Information for authors . . . . . . 81--81
Anonymous IEEE Computer Society Information . . . 82--82
J. Knight Editorial: the state of TSE . . . . . . 81--81
B. C. Hungerford and
A. R. Hevner and
R. W. Collins Reviewing software diagrams: a cognitive
study . . . . . . . . . . . . . . . . . 82--96
G. Bucci and
A. Fedeli and
L. Sassoli and
E. Vicario Timed state space analysis of real-time
preemptive systems . . . . . . . . . . . 97--111
Y. H. Lee and
A. M. K. Cheng Optimizing real-time equational
rule-based systems . . . . . . . . . . . 112--125
T. Mens and
T. Tourwe A survey of software refactoring . . . . 126--139
D. Bojic and
T. Eisenbarth and
R. Koschke and
D. Simon and
D. Velasevic Addendum to ``Locating features in
source code'' . . . . . . . . . . . . . 140
Anonymous Information for authors . . . . . . . . 141--141
Anonymous IEEE Computer Society Information to
Authors . . . . . . . . . . . . . . . . 142--142
Anonymous \booktitleIEEE Transactions on Software
Engineering --- Table of contents . . . C1--C1
Anonymous \booktitleIEEE Transactions on Software
Engineering . . . . . . . . . . . . . . C2--C2
Anonymous IEEE Computer Society Staff List . . . . 0:2--0:2
Anonymous \booktitleIEEE Transactions on Software
Engineering . . . . . . . . . . . . . . 0:1--0:1
T. C. Oliveira and
I. M. Filho and
C. J. P. de Lucena and
P. S. C. Alencar and
D. D. Cowan Software process representation and
analysis for framework instantiation . . 145--159
H. Muccini and
P. Inverardi and
A. Bertolino Using software architecture for code
testing . . . . . . . . . . . . . . . . 160--171
R. R. Lutz and
I. C. Mikulski Empirical analysis of safety-critical
anomalies during operations . . . . . . 172--180
C. Kirkegaard and
A. Moller and
M. I. Schwartzbach Static Analysis of XML Transformations
in Java . . . . . . . . . . . . . . . . 181--192
R. B. France and
D. K. Kim and
Sudipto Ghosh and
E. Song A UML-based pattern specification
technique . . . . . . . . . . . . . . . 193--206
Anonymous Information for authors . . . . . . . . 207--207
Anonymous IEEE Computer Society Information . . . 208--208
Anonymous IEEE Computer Society's --- Staff List 0:2--0:2
Anonymous \booktitleIEEE Transactions on Software
Engineering . . . . . . . . . . . . . . 0:1--0:1
M. Jorgensen Realism in assessment of effort
estimation uncertainty: it matters how
you ask . . . . . . . . . . . . . . . . 209--217
Sung Kim and
F. B. Bastani and
I-Ling Yen and
I. R. Chen Systematic reliability analysis of a
class of application-specific embedded
software framework . . . . . . . . . . . 218--230
F. Zhang and
E. H. D'Hollander Using hammock graphs to structure
programs . . . . . . . . . . . . . . . . 231--245
J. W. Paulson and
G. Succi and
A. Eberlein An empirical study of open-source and
closed-source software products . . . . 246--256
K. Whisnant and
R. K. Iyer and
Z. T. Kalbarczyk and
P. H. Jones and
D. A. Rennels and
R. Some The Effects of an ARMOR-based SIFT
environment on the performance and
dependability of user applications . . . 257--277
Gwan-Hwan Hwang and
Sheng-Jen Chang and
Huey-Der Chu Correction to ``Technology for testing
nondeterministic client/server database
applications'' . . . . . . . . . . . . . 278--278
Anonymous TSE: Information for authors . . . . . . 279--279
Anonymous IEEE Computer Society --- Information 280--280
J. Knight Editorial: AE Farewell . . . . . . . . . 281--281
J. Andrade and
J. Ares and
R. Garcia and
J. Pazos and
S. Rodriguez and
A. Silva A methodological framework for
viewpoint-oriented conceptual modeling 282--294
S. Balsamo and
A. Di Marco and
P. Inverardi and
M. Simeoni Model-based performance prediction in
software development: a survey . . . . . 295--310
Liangzhao Zeng and
B. Benatallah and
A. H. H. Ngu and
M. Dumas and
J. Kalagnanam and
H. Chang QoS-aware middleware for Web services
composition . . . . . . . . . . . . . . 311--327
L. M. Cysneiros and
J. C. S. do Prado Leite Nonfunctional requirements: from
elicitation to conceptual models . . . . 328--350
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
L. K. Dillon and
W. F. Tichy Guest Editors' Introduction: 2003
International Conference on Software
Engineering . . . . . . . . . . . . . . 353--354
D. Batory and
J. N. Sarvela and
A. Rauschmayer Scaling step-wise refinement . . . . . . 355--371
A. Rountev and
A. Milanova and
B. G. Ryder Fragment Class Analysis for Testing of
Polymorphism in Java Software . . . . . 372--387
S. Chaki and
E. M. Clarke and
A. Groce and
S. Jha and
H. Veith Modular verification of software
components in C . . . . . . . . . . . . 388--402
Farn Wang and
K. Schmidt and
Fang Yu and
Geng-Dian Huang and
Bow-Yaw Wang BDD-based safety-analysis of concurrent
software with pointer data structures
using graph automorphism symmetry
reduction . . . . . . . . . . . . . . . 403--417
D. R. Kuhn and
D. R. Wallace and
A. M. Gallo Software fault interactions and
implications for software testing . . . 418--421
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
K. El-Fakih and
N. Yevtushenko and
G. Bochmann FSM-based incremental conformance
testing methods . . . . . . . . . . . . 425--436
R. Eshuis and
R. Wieringa Tool support for verifying UML activity
diagrams . . . . . . . . . . . . . . . . 437--447
J. A. Kang and
A. M. K. Cheng Shortening matching time in OPS5
production systems . . . . . . . . . . . 448--457
U. Glasser and
Y. Gurevich and
M. Veanes Abstract communication model for
distributed systems . . . . . . . . . . 458--472
L. Apvrille and
J. P. Courtiat and
C. Lohr and
P. de Saqui-Sannes TURTLE: a real-time UML profile
supported by a formal validation toolkit 473--487
Anonymous Call for Papers . . . . . . . . . . . . 488--488
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: AE Introduction . . . . . . . 489--490
E. Arisholm and
L. C. Briand and
A. Foyen Dynamic coupling measurement for
object-oriented software . . . . . . . . 491--506
G. Mori and
F. Paterno and
C. Santoro Design and development of multidevice
user interfaces through multiple logical
descriptions . . . . . . . . . . . . . . 507--520
E. Arisholm and
Dag I. K. Sjòberg Evaluating the effect of a delegated
versus centralized control style on the
maintainability of object-oriented
software . . . . . . . . . . . . . . . . 521--534
B. B. Bederson and
J. Grosjean and
J. Meyer Toolkit design for interactive
structured graphics . . . . . . . . . . 535--546
C. Fetzer and
P. Felber and
K. Hogstedt Automatic detection and masking of
nonatomic exception handling . . . . . . 547--560
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
Soojung Lee Fast, centralized detection and
resolution of distributed deadlocks in
the generalized model . . . . . . . . . 561--573
A. T. T. Ying and
G. C. Murphy and
R. Ng and
M. C. Chu-Carroll Predicting source code changes by mining
change history . . . . . . . . . . . . . 574--586
B. Morel and
P. Alexander SPARTACAS: automating component reuse
and adaptation . . . . . . . . . . . . . 587--600
A. Tomer and
L. Goldin and
T. Kuflik and
E. Kimchi and
S. R. Schach Evaluating software reuse alternatives:
a model and its application to an
industrial case study . . . . . . . . . 601--612
P. Li and
Binoy Ravindran and
S. Suhaib and
S. Feizabadi A formally verified application-level
framework for real-time scheduling on
POSIX real-time operating systems . . . 613--629
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: AE Introduction and Farewell 633--633
D. Brylow and
J. Palsberg Deadline analysis of interrupt-driven
software . . . . . . . . . . . . . . . . 634--655
Pao-Ann Hsiung and
Shang-Wei Lin and
Chih-Hao Tseng and
Trong-Yen Lee and
Jin-Ming Fu and
Win-Bin See VERTAF: an application framework for the
design and verification of embedded
real-time software . . . . . . . . . . . 656--674
H. Volzer and
A. MacDonald and
B. Atchison and
A. Hanlon and
P. Lindsay and
P. Strooper SubCM: a tool for improved visibility of
software change in an industrial setting 675--693
L. Yu and
S. R. Schach and
K. Chen and
J. Offutt Categorization of common coupling and
its application to the maintainability
of the Linux kernel . . . . . . . . . . 694--706
H. C. Jiau and
Chia Hung Kao and
Kuo-Feng Ssu Comments on ``Software process
representation and analysis for
framework instantiation'' . . . . . . . 707
T. C. Oliveira and
P. S. C. Alencar and
I. M. Filho and
C. J. P. de Lucena and
D. D. Cowan Response to Jiau et al.'s comments . . . 708
Anonymous [Advertisement] . . . . . . . . . . . . 709--709
Anonymous [Advertisement] . . . . . . . . . . . . 710--710
Anonymous [Advertisement] . . . . . . . . . . . . 711--711
Anonymous Call for Papers for the \booktitleIEEE
Transactions on Software Engineering
Special Issue on Mining Software
Repositories . . . . . . . . . . . . . . 712--712
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
Anonymous Editorial: New AE Introduction . . . . . 713--714
D. Binkley and
M. Harman Analysis and visualization of predicate
dependence on formal parameters and
global variables . . . . . . . . . . . . 715--735
I. Traore and
D. B. Aredo Enhancing structured review with
model-based verification . . . . . . . . 736--753
J. Tian and
S. Rudraraju and
Zhao Li Evaluating Web software reliability
based on workload and failure data
extracted from server logs . . . . . . . 754--769
L. C. Briand and
M. Di Penta and
Y. Labiche Assessing and improving state-based
class testing: a series of experiments 770--793
S. H. Edwards and
M. Sitaraman and
B. W. Weide and
E. Hollingsworth Contract-checking wrappers for C++
classes . . . . . . . . . . . . . . . . 794--810
J. Miller and
Zhichao Yin A cognitive-based mechanism for
constructing software inspection teams 811--825
Heung Seok Chae and
Yong Rae Kwon and
Doo Hwan Bae Improving cohesion metrics for classes
by considering dependent instance
variables . . . . . . . . . . . . . . . 826--832
Anonymous [Advertisement] . . . . . . . . . . . . 833--833
Anonymous [Advertisement] . . . . . . . . . . . . 834--834
Anonymous [Advertisement] . . . . . . . . . . . . 835--835
Anonymous [Advertisement] . . . . . . . . . . . . 836--836
Anonymous [Advertisement] . . . . . . . . . . . . 837--837
Anonymous [Advertisement] . . . . . . . . . . . . 838--838
Anonymous [Advertisement] . . . . . . . . . . . . 839--839
Anonymous [Advertisement] . . . . . . . . . . . . 840--840
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
A. K. Mok and
P. Konana and
Guangtian Liu and
Chan-Gun Lee and
Honguk Woo Specifying timing constraints and
composite events: an application in the
design of electronic brokerages . . . . 841--858
N. Delgado and
A. Q. Gates and
S. Roach A taxonomy and catalog of runtime
software-fault monitoring tools . . . . 859--872
J. Parsons and
C. Saunders Cognitive heuristics in software
engineering applying and extending
anchoring and adjustment to artifact
reuse . . . . . . . . . . . . . . . . . 873--888
M. P. Robillard and
W. Coelho and
G. C. Murphy How effective developers investigate
source code: an exploratory study . . . 889--903
M. Vokac Defect frequency and design patterns: an
empirical study of industrial code . . . 904--917
E. Y. C. Wong and
A. T. S. Chan and
Hong Va Leong Xstream: a middleware for streaming XML
contents over wireless environments . . 918--935
Luqi and
L. Zhang and
V. Berzins and
Y. Qiao Documentation driven development for
complex real-time systems . . . . . . . 936--952
M. Jorgensen and
G. J. Carelius An empirical study of software project
bidding . . . . . . . . . . . . . . . . 953--969
S. Konrad and
B. H. C. Cheng and
L. A. Campbell Object analysis patterns for embedded
systems . . . . . . . . . . . . . . . . 970--992
M. Jorgensen and
K. Molokken-Ostvold Reasons for software effort estimation
error: impact of respondent role,
information collection approach, and
data analysis method . . . . . . . . . . 993--1007
R. Miller and
A. Tripathi The guardian model and primitives for
exception handling in distributed
systems . . . . . . . . . . . . . . . . 1008--1022
B. Kitchenham and
E. Mendes Software productivity measurement using
multiple size measures . . . . . . . . . 1023--1035
T. J. Biggerstaff A new architecture for
transformation-based generators . . . . 1036--1054
R. Forax and
E. Duris and
G. Roussel A reflective implementation of Java
multi-methods . . . . . . . . . . . . . 1055--1071
A. Avritzer and
E. J. Weyuker The role of modeling in the performance
testing of e-commerce applications . . . 1072--1083
Anonymous Annual Index . . . . . . . . . . . . . . 1084--1096
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
Anonymous Editorial: State of the Journal Address 1--1
Anonymous Editorial: Associate Editor Introduction
and Farewell . . . . . . . . . . . . . . 2--2
V. Cortellessa and
K. Goseva-Popstojanova and
Kalaivani Appukkutty and
A. R. Guedem and
A. Hassan and
R. Elnaggar and
W. Abdelmoez and
H. H. Ammar Model-based performance risk analysis 3--20
J. Evermann and
Y. Wand Toward formalizing domain modeling
semantics in language syntax . . . . . . 21--37
Farn Wang Symbolic parametric safety analysis of
linear hybrid systems with BDD-like
data-structures . . . . . . . . . . . . 38--51
G. Costagliola and
F. Ferrucci and
G. Tortora and
G. Vitiello Class point: an approach for the size
estimation of object-oriented systems 52--74
S. Ducasse and
M. Lanza The class blueprint: visually supporting
the understanding of glasses . . . . . . 75--90
Anonymous 2004 Reviewers list . . . . . . . . . . 91--93
Anonymous Call For Papers . . . . . . . . . . . . 94--94
Anonymous [Advertisement] . . . . . . . . . . . . 95--95
Anonymous [Advertisement] . . . . . . . . . . . . 96--96
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
A. van Deursen and
E. Stroulia Guest Editor's Introduction: 10th
Working Conference on Reverse
Engineering . . . . . . . . . . . . . . 97--98
N. Snavely and
S. Debray and
G. R. Andrews Unpredication, unscheduling,
unspeculation: reverse engineering
Itanium executables . . . . . . . . . . 99--115
L. B. Baumstark and
L. M. Wills Retargeting sequential image-processing
programs for data parallel execution . . 116--136
D. Beyer and
A. Noack and
C. Lewerentz Efficient relational calculation for
software analysis . . . . . . . . . . . 137--149
P. Andritsos and
V. Tzerpos Information-theoretic software
clustering . . . . . . . . . . . . . . . 150--165
M. W. Godfrey and
L. Zou Using origin analysis to detect merging
and splitting of source code entities 166--181
Anonymous [Advertisement] . . . . . . . . . . . . 182--182
Anonymous [Advertisement] . . . . . . . . . . . . 183--183
Anonymous [Advertisement] . . . . . . . . . . . . 184--184
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: New Associate Editors
Introduction . . . . . . . . . . . . . . 185--186
S. Elbaum and
G. Rothermel and
S. Karre and
M. Fisher II Leveraging user-session data to support
Web application testing . . . . . . . . 187--202
N. E. Gold and
A. M. Mohan and
P. J. Layzell Spatial complexity metrics: an
investigation of utility . . . . . . . . 203--212
K. Inoue and
R. Yokomori and
T. Yamamoto and
M. Matsushita and
S. Kusumoto Ranking significance of software
components based on use relations . . . 213--225
H. Erdogmus and
M. Morisio and
M. Torchiano On the effectiveness of the test-first
approach to programming . . . . . . . . 226--237
Y. Tan and
V. S. Mookerjee Comparing uniform and flexible policies
for software maintenance and replacement 238--255
S. Malek and
M. Mikic-Rakic and
N. Medvidovic A style-aware architectural middleware
for resource-constrained, distributed
systems . . . . . . . . . . . . . . . . 256--272
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
G. Rothermel Guest Editor's Introduction: 2004 IEEE
International Symposium on Software
Testing and Analysis . . . . . . . . . . 273--274
C. Flanagan and
S. N. Freund and
S. Qadeer Exploiting purity for atomicity . . . . 275--291
C. Fu and
A. Milanova and
B. G. Ryder and
D. G. Wonnacott Robustness testing of Java server
applications . . . . . . . . . . . . . . 292--311
S. Elbaum and
M. Diep Profiling deployed software: assessing
strategies and testing opportunities . . 312--327
D. Coppit and
Jinlin Yang and
S. Khurshid and
Wei Le and
K. Sullivan Software assurance by bounded exhaustive
testing . . . . . . . . . . . . . . . . 328--339
T. J. Ostrand and
E. J. Weyuker and
R. M. Bell Predicting the location and number of
faults in large software systems . . . . 340--355
Anonymous [Advertisement] . . . . . . . . . . . . 356--358
Anonymous [Advertisement] . . . . . . . . . . . . 359--359
Anonymous [Advertisement] . . . . . . . . . . . . 360--360
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
E. Niemela and
J. Kalaoja and
P. Lago Toward an architectural knowledge base
for wireless service engineering . . . . 361--379
I. Myrtveit and
E. Stensrud and
M. Shepperd Reliability and validity in comparative
studies of software prediction models 380--391
A. Gregoriades and
A. Sutcliffe Scenario-based assessment of
nonfunctional requirements . . . . . . . 392--409
T. Dyba An empirical investigation of the key
factors for success in software process
improvement . . . . . . . . . . . . . . 410--424
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: New Associate Editor
Introduction . . . . . . . . . . . . . . 425--425
A. E. Hassan and
A. Mockus and
R. C. Holt and
P. M. Johnson Guest Editor's Introduction: Special
Issue on Mining Software Repositories 426--428
T. Zimmermann and
A. Zeller and
P. Weissgerber and
S. Diehl Mining version histories to guide
software changes . . . . . . . . . . . . 429--445
D. Cubranic and
G. C. Murphy and
J. Singer and
K. S. Booth Hipikat: a project memory for software
development . . . . . . . . . . . . . . 446--465
C. C. Williams and
J. K. Hollingsworth Automatic mining of source code
repositories to improve bug finding
techniques . . . . . . . . . . . . . . . 466--480
T. T. Dinh-Trong and
J. M. Bieman The FreeBSD project: a replication case
study of open source development . . . . 481--494
R. W. Selby Enabling reuse-based software
development of large-scale systems . . . 495--510
R. Purushothaman and
D. E. Perry Toward understanding the rhetoric of
small source code changes . . . . . . . 511--526
Anonymous [Advertisement] . . . . . . . . . . . . 527--527
Anonymous [Advertisement] . . . . . . . . . . . . 528--528
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
W. B. Frakes and
Kyo Kang Software reuse research: status and
future . . . . . . . . . . . . . . . . . 529--536
R. van Ommering Software reuse in product populations 537--550
Mikyeong Moon and
Keunhyuk Yeom and
Heung Seok Chae An approach to developing domain
requirements as a core asset based on
commonality and variability analysis in
a product line . . . . . . . . . . . . . 551--569
S. Weber and
H. Chan and
L. Degenaro and
J. Diament and
A. Fokoue-Nkoutche and
I. Rouvellou Fusion: a system for business users to
manage program variability . . . . . . . 570--587
M. de Jonge Build-level components . . . . . . . . . 588--600
N. Tsantalis and
A. Chatzigeorgiou and
G. Stephanides Predicting the probability of change in
object-oriented systems . . . . . . . . 601--614
P. C. Pendharkar and
G. H. Subramanian and
J. A. Rodger A probabilistic model for predicting
software development effort . . . . . . 615--624
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
A. G. Koru and
J. Tian Comparing high-change modules and
modules with the highest measurement
values in two large-scale open-source
products . . . . . . . . . . . . . . . . 625--642
S. S. Gokhale and
Michael Rung-Tsong Lyu A simulation approach to structure-based
software reliability analysis . . . . . 643--656
M. Mock and
D. C. Atkinson and
C. Chambers and
S. J. Eggers Program slicing with dynamic points-to
sets . . . . . . . . . . . . . . . . . . 657--678
A. Gopal and
T. Mukhopadhyay and
M. S. Krishnan The impact of institutional forces on
software metrics programs . . . . . . . 679--694
T. Verdickt and
B. Dhoedt and
F. Gielen and
P. Demeester Automatic inclusion of middleware
performance attributes into
architectural UML software models . . . 695--711
Anonymous [Advertisement] . . . . . . . . . . . . 712--712
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
D. Wang and
F. B. Bastani and
L. I. Yen Automated aspect-oriented decomposition
of process-control systems for
ultra-high dependability assurance . . . 713--732
Dag I. K. Sjòberg and
J. E. Hannay and
O. Hansen and
V. B. Kampenes and
A. Karahasanovic and
N. K. Liborg and
A. C. Rekdal A survey of controlled experiments in
software engineering . . . . . . . . . . 733--753
K. Molokken-Ostvold and
M. Jorgensen A comparison of software project
overruns --- flexible versus sequential
development models . . . . . . . . . . . 754--766
B. Mitchell Resolving race conditions in
asynchronous partial order scenarios . . 767--784
Y. Shinjo and
C. Pu Achieving efficiency and portability in
systems software: a case study on
POSIX-compliant multithreaded programs 785--800
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
M. Harman and
B. Korel and
P. K. Linos Guest Editorial: Special Issue on
Software Maintenance and Evolution . . . 801--803
M. Bruntink and
A. van Deursen and
R. van Engelen and
T. Tourwe On the use of clone detection for
identifying crosscutting concern code 804--818
P. Tonella and
M. Ceccato Refactoring the aspectizable interfaces:
an empirical assessment . . . . . . . . 819--832
L. C. Briand and
Y. Labiche and
M. Di Penta and
H. Yan-Bondoc An experimental investigation of
formality in UML-based development . . . 833--849
Z. Xing and
E. Stroulia Analyzing the evolutionary history of
the logical design of object-oriented
software . . . . . . . . . . . . . . . . 850--868
T. Xie and
D. Notkin Checking inside the black box:
regression testing by comparing value
spectra . . . . . . . . . . . . . . . . 869--883
A. M. Memon and
Q. Xie Studying the fault-detection
effectiveness of GUI test cases for
rapidly evolving software . . . . . . . 884--896
T. Gyimothy and
R. Ferenc and
I. Siket Empirical validation of object-oriented
metrics on open source software for
fault prediction . . . . . . . . . . . . 897--910
R. J. Botting Small Errors in ``Toward Formalizing
Domain Modeling Semantics in Language
Syntax'' . . . . . . . . . . . . . . . . 911--911
Anonymous [Advertisement] . . . . . . . . . . . . 912--912
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
G. Bucci and
L. Sassoli and
E. Vicario Correctness verification and performance
analysis of real-time systems using
stochastic preemptive time Petri nets 913--927
Y. Liu and
I. Gorton and
A. Fekete Design-level performance prediction of
component-based applications . . . . . . 928--941
M. Jorgensen Evidence-based guidelines for assessment
of software development cost uncertainty 942--954
Arun Lakhotia and
Eric Uday Kumar and
M. Venable A method for detecting obfuscated calls
in malicious binaries . . . . . . . . . 955--968
P. Sawyer and
P. Rayson and
K. Cosh Shallow knowledge as an aid to deep
understanding in early phase
requirements engineering . . . . . . . . 969--981
D. P. Darcy and
C. F. Kemerer and
S. A. Slaughter and
J. E. Tomayko The structural complexity of software an
experimental test . . . . . . . . . . . 982--995
Anonymous [Advertisement] . . . . . . . . . . . . 996--996
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
S. Uchitel and
M. Broy and
I. H. Kruger and
J. Whittle Guest Editorial: Special Section on
Interaction and State-Based Modeling . . 997--998
Y. Bontemps and
P. Heymans and
P. Y. Schobbens From live sequence charts to state
machines and back: a guided tour . . . . 999--1014
N. Desai and
A. U. Mallya and
A. K. Chopra and
M. P. Singh Interaction protocols as design
abstractions for business processes . . 1015--1027
V. Braberman and
N. Kicillof and
A. Olivero A scenario-matching approach to the
description and model checking of
real-time properties . . . . . . . . . . 1028--1041
X. Fu and
T. Bultan and
J. Su Synchronizability of conversations among
Web services . . . . . . . . . . . . . . 1042--1055
C. Damas and
B. Lambeau and
P. Dupont and
A. van Lamsweerde Generating annotated behavior models
from end-user scenarios . . . . . . . . 1056--1073
B. Freimut and
L. C. Briand and
F. Vollei Determining inspection
cost-effectiveness by combining project
data and expert opinion . . . . . . . . 1074--1092
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: A New Editor-in-Chief and the
State of TSE . . . . . . . . . . . . . . 1--1
J. Kramer Editorial: A Message from the New
Editor-in-Chief . . . . . . . . . . . . 2--3
J. H. Hayes and
A. Dekhtyar and
S. K. Sundaram Advancing candidate link generation for
requirements tracing: the study of
methods . . . . . . . . . . . . . . . . 4--19
C. Yilmaz and
M. B. Cohen and
A. A. Porter Covering arrays for efficient fault
characterization in complex
configuration spaces . . . . . . . . . . 20--34
Y. Zheng and
A. T. S. Chan MobiGATE: a mobile computing middleware
for the active deployment of transport
services . . . . . . . . . . . . . . . . 35--50
Anonymous 2005 Reviewers List . . . . . . . . . . 51--53
Anonymous 2005 Annual Index . . . . . . . . . . . 54--64
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
Qinbao Song and
M. Shepperd and
M. Cartwright and
C. Mair Software defect association mining and
defect correction effort prediction . . 69--82
M. Auer and
A. Trendowicz and
B. Graser and
E. Haunschmid and
S. Biffl Optimal project feature weights in
analogy-based cost estimation:
improvement and limitations . . . . . . 83--92
L. Wang and
S. D. Stoller Runtime analysis of atomicity for
multithreaded programs . . . . . . . . . 93--110
H. B. K. Tan and
Y. Yang and
L. Bian Systematic transformation of functional
analysis model into OO design and
implementation . . . . . . . . . . . . . 111--135
Anonymous [Advertisement] . . . . . . . . . . . . 136--136
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editors
Introduction . . . . . . . . . . . . . . 137--139
C. Nebut and
F. Fleurey and
Y. Le Traon and
J. M. Jezequel Automatic test generation: a use case
driven approach . . . . . . . . . . . . 140--155
G. Costagliola and
V. Deufemia and
F. Ferrucci and
C. Gravino Constructing meta-CASE workbenches by
exploiting visual language generators 156--175
Z. Li and
S. Lu and
S. Myagmar and
Y. Zhou CP-Miner: finding copy-paste and related
bugs in large-scale software code . . . 176--192
B. S. Mitchell and
S. Mancoridis On the automatic modularization of
software systems using the Bunch tool 193--208
Naveen Sharma and
Padmaja Joshi and
R. K. Joshi Applicability of Weyuker's Property 9 to
object oriented metrics . . . . . . . . 209--211
Anonymous IEEE Computer Society celebrates two
60-year anniversaries . . . . . . . . . 212--212
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. R. Ruthruff and
M. Burnett and
G. Rothermel Interactive fault localization
techniques in a spreadsheet environment 213--239
J. Zheng and
L. Williams and
N. Nagappan and
W. Snipes and
J. P. Hudepohl and
M. A. Vouk On the value of static analysis for
fault detection in software . . . . . . 240--253
S. Wang and
K. G. Shin Task construction for model-based design
of embedded control software . . . . . . 254--264
D. Xu and
K. E. Nygard Threat-driven modeling and verification
of secure software using aspect-oriented
Petri nets . . . . . . . . . . . . . . . 265--278
Hewijin Christine Jiau and
Dung-Feng Yu Comments on ``Automatic analysis of
consistency between requirements and
designs'' . . . . . . . . . . . . . . . 279--280
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
C. Julien and
G. C. Roman EgoSpaces: facilitating rapid
development of context-aware mobile
applications . . . . . . . . . . . . . . 281--298
A. Egyed and
D. S. Wile Support for managing design-time
decisions . . . . . . . . . . . . . . . 299--314
D. Kelly A study of design characteristics in
evolving software using stability as a
criterion . . . . . . . . . . . . . . . 315--329
R. Bhatti and
E. Bertino and
A. Ghafoor X-FEDERATE: a policy engineering
framework for federated access
management . . . . . . . . . . . . . . . 330--346
L. Pike A note on inconsistent axioms in
Rushby's ``Systematic formal
verification for fault-tolerant
time-triggered algorithms'' . . . . . . 347--348
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Sun and
J. S. Dong Design synthesis from interaction and
state-based specifications . . . . . . . 349--364
E. Arisholm and
L. C. Briand and
S. E. Hove and
Y. Labiche The impact of UML documentation on
software maintenance: an experimental
evaluation . . . . . . . . . . . . . . . 365--381
Y. Lei and
R. H. Carver Reachability testing of concurrent
programs . . . . . . . . . . . . . . . . 382--403
D. Hou and
H. J. Hoover Using SCL to specify and check design
intent in source code . . . . . . . . . 404--423
C. A. Furia and
A. Morzenti and
M. Pradella and
M. G. Rossi Comments on ``An Interval Logic for
Real-Time System Specification'' . . . . 424--427
P. Bellini and
P. Nesi and
D. Rogai Reply to comments on ``An Interval Logic
for Real-Time System Specification'' . . 428--431
Anonymous The IEEE Computer Society celebrates two
60-Year Anniversaries . . . . . . . . . 432--432
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
D. Damian and
J. Chisan An Empirical Study of the Complex
Relationships between Requirements
Engineering Processes and Other
Processes that Lead to Payoffs in
Productivity, Quality, and Risk
Management . . . . . . . . . . . . . . . 433--453
B. Schmerl and
J. Aldrich and
D. Garlan and
R. Kazman and
Hong Yan Discovering Architectures from Running
Systems . . . . . . . . . . . . . . . . 454--466
D. Barak and
D. Harel and
R. Marelly InterPlay: Horizontal Scale-Up and
Transition to Design in Scenario-Based
Programming . . . . . . . . . . . . . . 467--485
S. Kounev Performance Modeling and Evaluation of
Distributed Component-Based Systems
Using Queueing Petri Nets . . . . . . . 486--502
K. Chari and
A. Hevner System Test Planning of Software: An
Optimization Approach . . . . . . . . . 503--509
Farn Wang and
Geng-Dian Huang and
Fang Yu TCTL Inevitability Analysis of
Dense-Time Systems: From Theory to
Engineering . . . . . . . . . . . . . . 510--526
Anonymous The IEEE Computer Society Celebrates Two
60-Year Anniversaries . . . . . . . . . 527--527
Anonymous Join the IEEE Computer Society! . . . . 528--528
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
G. Franceschinis and
J. P. Katoen and
M. Woodside Guest Editors' Introduction to the
Special Section on the First
International Conference on the
Quantitative Evaluation of SysTems
(QEST) . . . . . . . . . . . . . . . . . 529--530
J. Sproston and
S. Donatelli Backward Bisimulation in Markov Chain
Model Checking . . . . . . . . . . . . . 531--546
A. P. A. van Moorsel and
K. Wolter Analysis of Restart Mechanisms in
Software Systems . . . . . . . . . . . . 547--558
A. S. Miner Saturation for a General Class of Models 559--570
Y. Le Traon and
B. Baudry and
J. M. Jezequel Design by Contract to Improve Software
Vigilance . . . . . . . . . . . . . . . 571--586
B. Sengupta and
R. Cleaveland Triggered Message Sequence Charts . . . 587--607
J. H. Andrews and
L. C. Briand and
Y. Labiche and
A. S. Namin Using Mutation Analysis for Assessing
and Comparing Testing Coverage Criteria 608--624
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
T. Gyimothy and
V. Rajlich Guest Editors' Introduction to the
Special Issue on the International
Conference on Software Maintenance and
Evolution . . . . . . . . . . . . . . . 625--626
G. Antoniol and
Y. G. Guéhéneuc Feature Identification: An
Epidemiological Metaphor . . . . . . . . 627--641
L. C. Briand and
Y. Labiche and
J. Leduc Toward the Reverse Engineering of UML
Sequence Diagrams for Distributed Java
Software . . . . . . . . . . . . . . . . 642--663
M. Sharp and
A. Rountev Static Analysis of Object References in
RMI-Based Java Software . . . . . . . . 664--681
S. P. Reiss Incremental Maintenance of Software
Artifacts . . . . . . . . . . . . . . . 682--697
D. Binkley and
M. Ceccato and
M. Harman and
F. Ricca and
P. Tonella Tool-Supported Refactoring of Existing
Object-Oriented Code into Aspects . . . 698--717
Xiaoxia Ren and
O. C. Chesley and
B. G. Ryder Identifying Failure Causes in Java
Programs: An Application of Change
Impact Analysis . . . . . . . . . . . . 718--732
Hyunsook Do and
G. Rothermel On the Use of Mutation Faults in
Empirical Assessments of Test Case
Prioritization Techniques . . . . . . . 733--752
T. Schafer and
M. Eichberg and
M. Haupt and
M. Mezini The SEXTANT Software Exploration Tool 753--768
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editors
Introduction . . . . . . . . . . . . . . 769--770
Yuming Zhou and
Hareton Leung Empirical Analysis of Object-Oriented
Design Metrics for Predicting High and
Low Severity Faults . . . . . . . . . . 771--789
D. Conte de Leon and
J. Alves-Foss Hidden Implementation Dependencies in
High Assurance and Critical Computing
Systems . . . . . . . . . . . . . . . . 790--811
H. Bohnenkamp and
P. R. D'Argenio and
H. Hermanns and
J. P. Katoen MODEST: A Compositional Modeling
Formalism for Hard and Softly Timed
Systems . . . . . . . . . . . . . . . . 812--830
Chao Liu and
Long Fei and
Xifeng Yan and
Jiawei Han and
S. P. Midkiff Statistical Debugging: A Hypothesis
Testing-Based Approach . . . . . . . . . 831--848
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. A. Duraes and
H. S. Madeira Emulation of Software Faults: A Field
Data Study and a Practical Approach . . 849--867
D. Krishnamurthy and
J. A. Rolia and
S. Majumdar A Synthetic Workload Generation
Technique for Stress Testing
Session-Based Systems . . . . . . . . . 868--882
T. Menzies and
Z. Chen and
J. Hihn and
K. Lum Selecting Best Practices for Effort
Estimation . . . . . . . . . . . . . . . 883--895
N. Tsantalis and
A. Chatzigeorgiou and
G. Stephanides and
S. T. Halkidis Design Pattern Detection Using
Similarity Scoring . . . . . . . . . . . 896--909
S. Zachariadis and
C. Mascolo and
W. Emmerich The SATIN Component System --- a
Metamodel for Engineering Adaptable
Mobile Systems . . . . . . . . . . . . . 910--927
Anonymous In this issue . . . . . . . . . . . . . 928--928
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
W. G. Griswold and
B. Nuseibeh Guest Editors' Introduction to the
Special Section on the International
Conference on Software Engineering . . . 929--930
B. Demsky and
M. C. Rinard Goal-Directed Reasoning for
Specification-Based Data Structure
Repair . . . . . . . . . . . . . . . . . 931--951
R. Holmes and
R. J. Walker and
G. C. Murphy Approximate Structural Context Matching:
An Approach to Recommend Relevant
Examples . . . . . . . . . . . . . . . . 952--970
A. J. Ko and
B. A. Myers and
M. J. Coblenz and
H. H. Aung An Exploratory Study of How Developers
Seek, Relate, and Collect Relevant
Information during Software Maintenance
Tasks . . . . . . . . . . . . . . . . . 971--987
V. Kuncak and
P. Lam and
K. Zee and
M. C. Rinard Modular Pluggable Analyses for Data
Structure Consistency . . . . . . . . . 988--1005
Anonymous Join the IEEE Computer Society . . . . . 1006--1008
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: State of the Journal . . . . 1--1
T. Menzies and
J. Greenwald and
A. Frank Data Mining Static Code Attributes to
Learn Defect Predictors . . . . . . . . 2--13
S. Sarkar and
G. M. Rama and
A. C. Kak API-Based and Information-Theoretic
Metrics for Measuring the Quality of
Software Modularization . . . . . . . . 14--32
M. Jorgensen and
M. Shepperd A Systematic Review of Software
Development Cost Estimation Studies . . 33--53
Anonymous 2006 Reviewers List . . . . . . . . . . 54--56
Anonymous 2006 Annual Index . . . . . . . . . . . 57--63
Anonymous In this issue . . . . . . . . . . . . . 64--64
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
E. Arisholm and
H. Gallis and
T. Dyba and
Dag I. K. Sjòberg Evaluating Pair Programming with Respect
to System Complexity and Programmer
Expertise . . . . . . . . . . . . . . . 65--86
J. E. Hannay and
Dag I. K. Sjòberg and
T. Dyba A Systematic Review of Theory Use in
Software Engineering Experiments . . . . 87--107
D. Jeffrey and
N. Gupta Improving Fault Detection Capability by
Selectively Retaining Test Cases during
Test Suite Reduction . . . . . . . . . . 108--123
C. Yilmaz and
A. Porter and
A. S. Krishna and
A. M. Memon and
D. C. Schmidt and
A. S. Gokhale and
B. Natarajan Reliable Effects Screening: A
Distributed Continuous Quality Assurance
Process for Monitoring Performance
Degradation in Evolving Software Systems 124--141
Anonymous Join the IEEE Computer Society! . . . . 142--144
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
M. Agrawal and
K. Chari Software Effort, Quality, and Cycle
Time: A Study of CMM Level 5 Projects 145--156
C. Attiogbe and
P. Poizat and
G. Salaun A Formal and Tool-Equipped Approach for
the Integration of State Diagrams and
Formal Datatypes . . . . . . . . . . . . 157--170
H. Cavusoglu and
H. Cavusoglu and
S. Raghunathan Efficiency of Vulnerability Disclosure
Mechanisms to Disseminate Vulnerability
Knowledge . . . . . . . . . . . . . . . 171--185
G. Lodi and
F. Panzieri and
D. Rossi and
E. Turrini SLA-Driven Clustering of QoS-Aware
Application Servers . . . . . . . . . . 186--197
S. P. Wilson and
F. J. Samaniego Nonparametric Analysis of the
Order-Statistic Model in Software
Reliability . . . . . . . . . . . . . . 198--208
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
C. Baier and
L. Cloth and
B. R. Haverkort and
M. Kuntz and
M. Siegle Model Checking Markov Chains with
Actions and State Labels . . . . . . . . 209--224
Z. Li and
M. Harman and
R. M. Hierons Search Algorithms for Regression Test
Case Prioritization . . . . . . . . . . 225--237
D. Milicev On the Semantics of Associations and
Association Ends in UML . . . . . . . . 238--251
S. Pickin and
C. Jard and
T. Jeron and
J. M. Jezequel and
Y. Le Traon Test Synthesis from UML Models of
Distributed Software . . . . . . . . . . 252--269
Anonymous In this issue --- Technically . . . . . 269--269
Anonymous Join the IEEE Computer Society . . . . . 270--272
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
C. Andersson and
P. Runeson A Replicated Quantitative Analysis of
Fault Distributions in Complex Software
Systems . . . . . . . . . . . . . . . . 273--286
M. Haran and
A. Karr and
M. Last and
A. Orso and
A. A. Porter and
A. Sanil and
S. Fouche Techniques for Classifying Executions of
Deployed Software to Support Software
Engineering Tasks . . . . . . . . . . . 287--304
M. Murtojarvi and
J. Jarvinen and
M. Johnsson and
T. Leipala and
O. S. Nevalainen Determining the Proper Number and Price
of Software Licenses . . . . . . . . . . 305--315
B. A. Kitchenham and
E. Mendes and
G. H. Travassos Cross versus Within-Company Cost
Estimation Studies: A Systematic Review 316--329
A. Kshemkalyani and
B. Wu Detecting Arbitrary Stable Properties
Using Efficient Snapshots . . . . . . . 330--346
B. Littlewood and
D. Wright The Use of Multilegged Arguments to
Increase Confidence in Safety Claims for
Software-Based Systems: A Study Based on
a BBN Analysis of an Idealized Example 347--365
Anonymous Join the IEEE Computer Society! . . . . 366--368
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
D. Ardagna and
B. Pernici Adaptive Service Composition in Flexible
Processes . . . . . . . . . . . . . . . 369--384
V. Cortellessa and
P. Pierini and
D. Rossi Integrating Software Models and Platform
Models for Performance Analysis . . . . 385--401
H. M. Olague and
L. H. Etzkorn and
S. Gholston and
S. Quattlebaum Empirical Validation of Three Software
Metrics Suites to Predict
Fault-Proneness of Object-Oriented
Classes Developed Using Highly Iterative
or Agile Software Development Processes 402--419
D. Poshyvanyk and
Y. G. Guéhéneuc and
A. Marcus and
G. Antoniol and
V. Rajlich Feature Location Using Probabilistic
Ranking of Methods Based on Execution
Scenarios and Information Retrieval . . 420--432
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Dong and
S. Yang and
K. Zhang Visualizing Design Patterns in Their
Applications and Compositions . . . . . 433--453
W. Masri and
A. Podgurski and
D. Leon An Empirical Study of Test Case
Filtering Techniques Based on Exercising
Information Flows . . . . . . . . . . . 454--477
D. Saougkos and
G. Manis and
K. Blekas and
A. V. Zarras Revisiting Java Bytecode Compression for
Embedded and Mobile Computing
Environments . . . . . . . . . . . . . . 478--495
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
L. Mangeruca and
M. Baleani and
A. Ferrari and
A. Sangiovanni-Vincentelli Semantics-Preserving Design of Embedded
Control Software from Synchronous Models 497--509
A. Porter and
C. Yilmaz and
A. M. Memon and
D. C. Schmidt and
B. Natarajan Skoll: A Process and Infrastructure for
Distributed Continuous Quality Assurance 510--525
J. Henkel and
C. Reichenbach and
A. Diwan Discovering Documentation for Java
Container Classes . . . . . . . . . . . 526--543
R. Telang and
S. Wattal An Empirical Analysis of the Impact of
Software Vulnerability Announcements on
Firm Stock Price . . . . . . . . . . . . 544--557
C. Constant and
T. Jéron and
H. Marchand and
V. Rusu Integrating formal verification and
conformance testing for reactive systems 558--574
Anonymous 180,000 aritlces in the IEEE Computer
Society Digital Library [advertisement] 575--575
Anonymous Join the IEEE Computer Society . . . . . 576--576
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
S. Bellon and
R. Koschke and
G. Antoniol and
J. Krinke and
E. Merlo Comparison and Evaluation of Clone
Detection Tools . . . . . . . . . . . . 577--591
D. Strein and
R. Lincke and
J. Lundberg and
W. Löwe An Extensible Meta-Model for Program
Analysis . . . . . . . . . . . . . . . . 592--607
B. S. Baker Finding Clones with Dup: Analysis of an
Experiment . . . . . . . . . . . . . . . 608--621
I. Stuermer and
M. Conrad and
H. Doerr and
P. Pepper Systematic Testing of Model-Based Code
Generators . . . . . . . . . . . . . . . 622--634
H. Zhang and
X. Zhang Comments on ``Data Mining Static Code
Attributes to Learn Defect Predictors'' 635--637
T. Menzies and
A. Dekhtyar and
J. Distefano and
J. Greenwald Problems with Precision: A Response to
``Comments on `Data Mining Static Code
Attributes to Learn Defect
Predictors'\,'' . . . . . . . . . . . . 637--640
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
Anonymous Editorial: New Associate Editors
Introduction . . . . . . . . . . . . . . 641--642
S. Sampath and
S. Sprenkle and
E. Gibson and
L. Pollock and
A. Souter Greenwald Applying Concept Analysis to
User-Session-Based Testing of Web
Applications . . . . . . . . . . . . . . 643--658
G. J. Holzmann and
D. Bosnacki The Design of a Multicore Extension of
the SPIN Model Checker . . . . . . . . . 659--674
G. J. Pai and
J. Bechta Dugan Empirical Analysis of Software Fault
Content and Fault Proneness Using
Bayesian Methods . . . . . . . . . . . . 675--686
G. Concas and
M. Marchesi and
S. Pinna and
N. Serra Power-Laws in a Large Object-Oriented
Software System . . . . . . . . . . . . 687--708
K. K. Lau and
Z. Wang Software Component Models . . . . . . . 709--724
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Fluri and
M. Wuersch and
M. Pinzger and
H. Gall Change Distilling: Tree Differencing for
Fine-Grained Source Code Change
Extraction . . . . . . . . . . . . . . . 725--743
N. Juristo and
A. Moreno and
M. I. Sanchez-Segura Guidelines for Eliciting Usability
Functionalities . . . . . . . . . . . . 744--758
O. Maqbool and
H. Babri Hierarchical Clustering for Software
Architecture Recovery . . . . . . . . . 759--780
Y. S. Dai and
M. Xie and
Q. Long and
S. H. Ng Uncertainty Analysis in Software
Reliability Modeling by Bayesian
Analysis with Maximum-Entropy Principle 781--795
Anonymous 180,000 aritlces in the IEEE Computer
Society Digital Library [advertisement] 796--796
Anonymous [Back cover] . . . . . . . . . . . . . .
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
D. Binkley and
R. Koschke and
S. Mancoridis Guest Editors' Introduction to the
Special Section from the International
Conference on Software Maintenance and
Evolution . . . . . . . . . . . . . . . 797--798
D. Strein and
R. Lincke and
J. Lundberg and
W. Löwe An Extensible Metamodel for Program
Analysis (abstract only) . . . . . . . . 799--799
B. Van Rompaey and
B. Du Bois and
S. Demeyer and
M. Rieger On The Detection of Test Smells: A
Metrics-Based Approach for General
Fixture and Eager Test . . . . . . . . . 800--817
Z. Xing and
E. Stroulia API-Evolution Support with Diff--CatchUp 818--836
Y. Zou and
Q. Zhang and
X. Zhao Improving the Usability of E-Commerce
Applications using Business Processes 837--855
Y. Vandewoude and
P. Ebraert and
Y. Berbers and
T. D'Hondt Tranquility: A Low Disruptive
Alternative to Quiescence for Ensuring
Safe Dynamic Updates . . . . . . . . . . 856--868
Y. Zhou and
H. Leung and
P. Winoto MNav: A Markov Model-Based Web Site
Navigability Measure . . . . . . . . . . 869--890
Anonymous Call-for-Papers: Special Issue on
Software Language Engineering . . . . . 891--891
Anonymous Join the IEEE Computer Society . . . . . 892--892
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer State of the Journal address . . . . . . 1--2
P. McDaniel and
B. Nuseibeh Guest Editors' Introduction: Special
Section on Software Engineering for
Secure Systems . . . . . . . . . . . . . 3--4
T. Breaux and
A. Antón Analyzing Regulatory Rules for Privacy
and Security Requirements . . . . . . . 5--20
W. Weimer and
N. Mishra Privately Finding Specifications . . . . 21--32
M. Bartoletti and
P. Degano and
G. L. Ferrari and
R. Zunino Semantics-Based Design for Secure Web
Services . . . . . . . . . . . . . . . . 33--49
L. Desmet and
P. Verbaeten and
W. Joosen and
F. Piessens Provable Protection against Web
Application Vulnerabilities Related to
Session Data Dependencies . . . . . . . 50--64
W. Halfond and
A. Orso and
P. Manolios WASP: Protecting Web Applications Using
Positive Tainting and Syntax-Aware
Evaluation . . . . . . . . . . . . . . . 65--81
C. Heitmeyer and
M. Archer and
E. Leonard and
J. McLean Applying Formal Methods to a Certifiably
Secure Software System . . . . . . . . . 82--98
S. McMaster and
A. Memon Call-Stack Coverage for GUI Test Suite
Reduction . . . . . . . . . . . . . . . 99--115
D. Damian and
F. Lanubile and
T. Mallardo On the Need for Mixed Media in
Distributed Requirements Negotiations 116--132
C. Haley and
R. Laney and
J. Moffett and
B. Nuseibeh Security Requirements Engineering: A
Framework for Representation and
Analysis . . . . . . . . . . . . . . . . 133--153
Anonymous 2007 Reviewer's List . . . . . . . . . . 154--156
Anonymous In this issue --- Technically . . . . . 157--157
Anonymous In this issue --- Technically . . . . . 158--158
Anonymous In this issue --- Technically . . . . . 159--159
Anonymous Society Journals Seek Editors in Chief
for 2009-2010 Terms . . . . . . . . . . 160--160
Anonymous 2007 Annual Index . . . . . . . . . . . not in print--not in print
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editor
Introduction . . . . . . . . . . . . . . 161--161
S. Apel and
T. Leich and
G. Saake Aspectual Feature Modules . . . . . . . 162--180
S. Kim and
E. J. Whitehead, Jr. and
Y. Zhang Classifying Software Changes: Clean or
Buggy? . . . . . . . . . . . . . . . . . 181--196
K. M. Lui and
K. C. C. Chan and
J. Nosek The Effect of Pairs in Program Design
Tasks . . . . . . . . . . . . . . . . . 197--211
T. Dingsoyr and
N. B. Moe The Impact of Employee Participation on
the Use of an Electronic Process Guide:
A Longitudinal Case Study . . . . . . . 212--225
J. Hall and
L. Rapanotti and
M. Jackson Problem Oriented Software Engineering:
Solving the Package Router Control
Problem . . . . . . . . . . . . . . . . 226--241
J. Hannay and
M. Jòrgensen The Role of Deliberate Artificial Design
Elements in Software Engineering
Experiments . . . . . . . . . . . . . . 242--259
K. Gallagher and
A. Hatch and
M. Munro Software Architecture Visualization: An
Evaluation Framework and Its Application 260--270
J. Li and
R. Conradi and
O. P. Slyngstad and
M. Torchiano and
M. Morisio and
C. Bunse A State-of-the-Practice Survey of Risk
Management in Development with
Off-the-Shelf Software Components . . . 271--286
A. Marcus and
D. Poshyvanyk and
R. Ferenc Using the Conceptual Cohesion of Classes
for Fault Prediction in Object-Oriented
Systems . . . . . . . . . . . . . . . . 287--300
H. Zhang On the Distribution of Software Faults 301--302
J. Henkel and
C. Reichenbach and
A. Diwan Errata for ``Discovering Documentation
for Java Container Classes'' [Aug 07
526--543] . . . . . . . . . . . . . . . 303--303
Anonymous Call for Papers: Search-Based
Optimization for Software Engineering 304--304
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Mitchell Characterizing Communication Channel
Deadlocks in Sequence Diagrams . . . . . 305--320
D. Dig and
K. Manzoor and
R. E. Johnson and
T. N. Nguyen Effective Software Merging in the
Presence of Object-Oriented Refactorings 321--335
S. W. Haider and
J. W. Cangussu and
K. M. L. Cooper and
R. Dantu and
S. Haider Estimation of Defects Based on Defect
Decay Model: ED$^3$M . . . . . . . . . . 336--356
S. Srivastava and
M. Hicks and
J. S. Foster and
P. Jenkins Modular Information Hiding and Type-Safe
Linking for C . . . . . . . . . . . . . 357--376
M. J. Escalona and
G. Aragón NDT. A Model-Driven Approach for Web
Requirements . . . . . . . . . . . . . . 377--390
T. Zheng and
C. M. Woodside and
M. Litoiu Performance Model Estimation and
Tracking Using Optimal Filters . . . . . 391--406
W. J. Dzidek and
E. Arisholm and
L. C. Briand A Realistic Empirical Evaluation of the
Costs and Benefits of UML in Software
Maintenance . . . . . . . . . . . . . . 407--432
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
P. Devanbu and
M. Young Introduction to the Special Section on
the ACM SIGSOFT Foundations of Software
Engineering Conference . . . . . . . . . 433--433
J. Sillito and
G. C. Murphy and
K. De Volder Asking and Answering Questions during a
Programming Change Task . . . . . . . . 434--451
M. J. Rutherford and
A. Carzaniga and
A. L. Wolf Evaluating Test Suites and Adequacy
Criteria Using Simulation-Based Models
of Distributed Systems . . . . . . . . . 452--470
J. W. Keung and
B. A. Kitchenham and
D. R. Jeffery Analogy-X: Providing Statistical
Inference to Analogy-Based Software Cost
Estimation . . . . . . . . . . . . . . . 471--484
S. Lessmann and
B. Baesens and
C. Mues and
S. Pietsch Benchmarking Classification Models for
Software Defect Prediction: A Proposed
Framework and Novel Findings . . . . . . 485--496
M. Eaddy and
T. Zimmermann and
K. D. Sherwood and
V. Garg and
G. C. Murphy and
N. Nagappan and
A. V. Aho Do Crosscutting Concerns Cause Defects? 497--515
P. Rovegård and
L. Angelis and
C. Wohlin An Empirical Study on Views of
Importance of Change Impact Analysis
Issues . . . . . . . . . . . . . . . . . 516--530
A. I. Kistijantoro and
G. Morgan and
S. K. Shrivastava and
M. C. Little Enhancing an Application Server to
Support Available Components . . . . . . 531--545
C. Canal and
P. Poizat and
G. Salaún Model-Based Adaptation of Behavioral
Mismatching Components . . . . . . . . . 546--563
S. Dolev and
R. Yagel Towards Self-Stabilizing Operating
Systems . . . . . . . . . . . . . . . . 564--576
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
S. Elbaum and
D. S. Rosenblum Guest Editors' Introduction:
International Symposium on Software
Testing and Analysis . . . . . . . . . . 577--578
R. Y. Chang and
A. Podgurski and
J. Yang Discovering Neglected Conditions in
Software by Mining Dependence Graphs . . 579--596
M. d'Amorim and
S. Lauterburg and
D. Marinov Delta Execution for Efficient
State-Space Exploration of
Object-Oriented Programs . . . . . . . . 597--613
G. Hughes and
T. Bultan Interface Grammars for Modular Software
Model Checking . . . . . . . . . . . . . 614--632
M. B. Cohen and
M. B. Dwyer and
J. Shi Constructing Interaction Test Suites for
Highly-Configurable Systems in the
Presence of Constraints: A Greedy
Approach . . . . . . . . . . . . . . . . 633--650
S. Shoham and
E. Yahav and
S. J. Fink and
M. Pistoia Static Specification Mining Using
Automata-Based Abstractions . . . . . . 651--666
Y. G. Guéhéneuc and
G. Antoniol DeMIMA: A Multilayered Approach for
Design Pattern Identification . . . . . 667--684
J. Cleland-Huang and
W. Marrero and
B. Berenbach Goal-Centric Traceability: Using Virtual
Plumblines to Maintain Critical Systemic
Qualities . . . . . . . . . . . . . . . 685--699
S. Sarkar and
A. C. Kak and
G. M. Rama Metrics for Measuring the Quality of
Modularization of Large-Scale
Object-Oriented Software . . . . . . . . 700--720
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editors
Introduction . . . . . . . . . . . . . . 721--722
E. Mendes and
N. Mosley Bayesian Network Models for Web Effort
Prediction: A Comparative Study . . . . 723--737
S. N. Chuang and
A. T. S. Chan Dynamic QoS Adaptation for Mobile
Middleware . . . . . . . . . . . . . . . 738--752
M. J. P. van der Meulen and
M. A. Revilla The Effectiveness of Software Diversity
in a Large Population of Programs . . . 753--764
E. Capra and
C. Francalanci and
F. Merlo An Empirical Study on the Relationship
Between Software Design Quality,
Development Effort and Governance in
Open Source Projects . . . . . . . . . . 765--782
T. Parsons and
A. Mos and
M. Trofin and
T. Gschwind and
J. Murphy Extracting Interactions in
Component-Based Systems . . . . . . . . 783--799
J. C. Carver and
N. Nagappan and
A. Page The Impact of Educational Background on
the Effectiveness of Requirements
Inspections: An Empirical Study . . . . 800--812
B. Yang and
H. Hu and
L. Jia A Study of Uncertainty in Software Cost
and Its Impact on Optimal Software
Release Time . . . . . . . . . . . . . . 813--825
C. Liu and
X. Zhang and
J. Han A Systematic Study of Failure Proximity 826--843
J. S. Dong and
P. Hao and
S. Qin and
J. Sun and
W. Yi Timed Automata Patterns . . . . . . . . 844--859
Anonymous IEEE Computer Society 2009 Membership
Application . . . . . . . . . . . . . . 860--862
Anonymous IEEE Computer Society Career Center . . 863--863
Anonymous IEEE Computer Society CSDP
[advertisement] . . . . . . . . . . . . 864--864
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: State of the Journal Address 1--1
C. Ye and
S. C. Cheung and
W. K. Chan and
C. Xu Atomicity Analysis of Service
Composition across Organizations . . . . 2--28
S. Elbaum and
H. N. Chin and
M. B. Dwyer and
M. Jorde Carving and Replaying Differential Unit
Test Cases from System Test Cases . . . 29--45
P. Zave and
E. Cheung Compositional Control of IP Media . . . 46--66
S. Spiekermann and
L. F. Cranor Engineering Privacy . . . . . . . . . . 67--82
A. Mattsson and
B. Lundell and
B. Lings and
B. Fitzgerald Linking Model-Driven Development and
Software Architecture: A Case Study . . 83--93
R. Abraham and
M. Erwig Mutation Operators for Spreadsheets . . 94--108
A. Ngo-The and
G. Ruhe Optimized Resource Allocation for
Software Release Planning . . . . . . . 109--123
P. Hearty and
N. Fenton and
D. Marquez and
M. Neil Predicting Project Velocity in XP Using
a Learning Dynamic Bayesian Network
Model . . . . . . . . . . . . . . . . . 124--137
Anonymous 2008 Reviewers List . . . . . . . . . . 138--141
Anonymous IEEE Computer Society 2009 Membership
Application . . . . . . . . . . . . . . 142--144
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Hillston and
M. Kwiatkowska and
M. Telek Guest Editors' Introduction to the
Special Issue on Quantitative Evaluation
of Computer Systems . . . . . . . . . . 145--147
G. Franks and
T. Al-Omari and
M. Woodside and
O. Das and
S. Derisavi Enhanced Modeling and Solution of
Layered Queueing Networks . . . . . . . 148--161
G. Casale CoMoM: Efficient Class-Oriented
Evaluation of Multiclass Performance
Models . . . . . . . . . . . . . . . . . 162--177
L. Carnevali and
L. Grassi and
E. Vicario State-Density Functions over DBM Domains
in the Analysis of Non-Markovian Models 178--194
P. Kemper and
C. Tepper Automated Trace Analysis of
Discrete-Event System Models . . . . . . 195--208
G. Norman and
C. Palamidessi and
D. Parker and
P. Wu Model Checking Probabilistic and
Stochastic Extensions of the $ \pi
$-Calculus . . . . . . . . . . . . . . . 209--223
S. Donatelli and
S. Haddad and
J. Sproston Model Checking Timed and Stochastic
Properties with CSL$^{\rm TA}$ . . . . . 224--240
T. Han and
J. P. Katoen and
D. Berteun Counterexample Generation in
Probabilistic Model Checking . . . . . . 241--257
L. de Alfaro and
M. Faella and
M. Stoelinga Linear and Branching System Metrics . . 258--273
E. Bode and
M. Herbstritt and
H. Hermanns and
S. Johr and
T. Peikenkamp and
R. Pulungan and
J. Rakow and
R. Wimmer and
B. Becker Compositional Dependability Evaluation
for STATEMATE . . . . . . . . . . . . . 274--292
A. G. Koru and
D. Zhang and
K. El Emam and
H. Liu An Investigation into the Functional
Form of the Size-Defect Relationship for
Software Modules . . . . . . . . . . . . 293--304
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
B. Demsky and
M. Rinard Automatic Extraction of Heap Reference
Properties in Object-Oriented Programs 305--324
P. Pelliccione and
P. Inverardi and
H. Muccini CHARMY: A Framework for Designing and
Verifying Architectural Specifications 325--346
N. Tsantalis and
A. Chatzigeorgiou Identification of Move Method
Refactoring Opportunities . . . . . . . 347--367
M. Jòrgensen and
T. M. Gruschke The Impact of Lessons-Learned Sessions
on Effort Estimation and Uncertainty
Assessments . . . . . . . . . . . . . . 368--383
S. Uchitel and
G. Brunet and
M. Chechik Synthesis of Partial Behavior Models
from Properties and Scenarios . . . . . 384--406
B. C. D. Anda and
Dag I. K. Sjòberg and
A. Mockus Variability and Reproducibility in
Software Engineering: A Study of Four
Companies that Developed the Same System 407--429
M. V. Mäntylä and
C. Lassenius What Types of Defects Are Really
Discovered in Code Reviews? . . . . . . 430--448
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editors
Introduction . . . . . . . . . . . . . . 449--449
G. Canfora and
L. Tahvildari and
H. A. Muller Guest Editors' Introduction to the
Special Section from the International
Conference on Software Maintenance . . . 450--451
P. K. Chittimalli and
M. J. Harrold Recomputing Coverage Information to
Assist Regression Testing . . . . . . . 452--469
M. A. Storey and
J. Ryall and
J. Singer and
D. Myers and
L. T. Cheng and
M. Muller How Software Developers Use Tagging to
Support Reminding and Refinding . . . . 470--483
M. Hamill and
K. Goseva-Popstojanova Common Trends in Software Fault and
Failure Data . . . . . . . . . . . . . . 484--496
H. A. Basit and
S. Jarzabek A Data Mining Approach for Detecting
Higher-Level Clones in Software . . . . 497--514
W. Shen and
K. Wang and
A. Egyed An Efficient and Scalable Approach to
Correct Class Model Refinement . . . . . 515--533
C. F. Kemerer and
M. C. Paulk The Impact of Design and Code Reviews on
Software Quality: An Empirical Study
Based on PSP Data . . . . . . . . . . . 534--550
S. Vegas and
N. Juristo and
V. R. Basili Maturing Software Engineering Knowledge
through Classifications: A Case Study on
Unit Testing Techniques . . . . . . . . 551--565
L. Hatton Power-Law Distributions of Component
Size in General Software Systems . . . . 566--572
S. Ducasse and
D. Pollet Software Architecture Reconstruction: A
Process-Oriented Taxonomy . . . . . . . 573--591
Anonymous Call for Papers for Special Issue on
Software Services and Service-Based
Systems . . . . . . . . . . . . . . . . 592--592
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
N. P. Napier and
L. Mathiassen and
R. D. Johnson Combining Perceptions and Prescriptions
in Requirements Engineering Process
Assessment: An Industrial Case Study . . 593--606
Y. Zhou and
H. Leung and
B. Xu Examining the Potentially Confounding
Effect of Class Size on the Associations
between Object-Oriented Metrics and
Change-Proneness . . . . . . . . . . . . 607--623
N. Nan and
D. E. Harter Impact of Budget and Schedule Pressure
on Software Development Cycle Time and
Effort . . . . . . . . . . . . . . . . . 624--637
M. Benaroch and
J. Goldstein An Integrative Economic Optimization
Approach to Systems Development Risk
Management . . . . . . . . . . . . . . . 638--653
A. Masood and
R. Bhatti and
A. Ghafoor and
A. P. Mathur Scalable and Effective Test Generation
for Role-Based Access Control Systems 654--668
S. Halle and
R. Villemaire and
O. Cherkaoui Specifying and Validating Data-Aware
Temporal Web Service Properties . . . . 669--683
B. Cornelissen and
A. Zaidman and
A. van Deursen and
L. Moonen and
R. Koschke A Systematic Survey of Program
Comprehension through Dynamic Analysis 684--702
E. Vicario and
L. Sassoli and
L. Carnevali Using Stochastic State Classes in
Quantitative Evaluation of Dense-Time
Reactive Systems . . . . . . . . . . . . 703--719
M. D'Ambros and
M. Lanza and
M. Lungu Visualizing Co-Change Information with
the Evolution Radar . . . . . . . . . . 720--735
Anonymous Call for Papers: Special Issue on
Software Services and Service-Based
Systems . . . . . . . . . . . . . . . . 736--736
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3
J. M. Favre and
D. Gasevi\'c and
R. Lammel and
A. Winter Guest Editors' Introduction to the
Special Section on Software Language
Engineering . . . . . . . . . . . . . . 737--741
C. Atkinson and
M. Gutheil and
B. Kennel A Flexible Infrastructure for Multilevel
Language Engineering . . . . . . . . . . 742--755
D. Moody The ``Physics'' of Notations: Toward a
Scientific Basis for Constructing Visual
Notations in Software Engineering . . . 756--779
N. A. Kraft and
E. B. Duffy and
B. A. Malloy Grammar Recovery from Parse Trees and
Metrics-Guided Grammar Refactoring . . . 780--794
M. Antkiewicz and
K. Czarnecki and
M. Stephan Engineering of Framework-Specific
Modeling Languages . . . . . . . . . . . 795--824
J. Sanchez Cuadrado and
J. G. Molina A Model-Based Approach to Families of
Embedded Domain-Specific Languages . . . 825--840
G. Beydoun and
G. Low and
B. Henderson-Sellers and
H. Mouratidis and
J. J. Gomez-Sanz and
J. Pavon and
C. Gonzalez-Perez FAML: A Generic Metamodel for MAS
Development . . . . . . . . . . . . . . 841--863
M. Cataldo and
A. Mockus and
J. A. Roberts and
J. D. Herbsleb Software Dependencies, Work
Dependencies, and Their Impact on
Failures . . . . . . . . . . . . . . . . 864--878
Anonymous Call for Papers for New \booktitleIEEE
Transactions on Affective Computing . . 879--879
Anonymous 7 Great Reasons for Joining the IEEE
Computer Society [advertisement] . . . . 880--880
Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4
Anonymous [Front cover] . . . . . . . . . . . . . c1--c1
Anonymous [Inside front cover] . . . . . . . . . . c2--c2
Anonymous TSE Information for authors . . . . . . c3--c3