


default search action
12th SIGSOFT FSE 2004: Newport Beach, California, USA
- Richard N. Taylor, Matthew B. Dwyer:

Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, Newport Beach, CA, USA, October 31 - November 6, 2004. ACM 2004, ISBN 1-58113-855-5
Program analysis
- Alexander L. Wolf:

Is security engineering really just good software engineering? 1 - Alexander Egyed:

Resolving uncertainties during trace analysis. 3-12 - Jürgen Dingel, Hongzhi Liang:

Automating comprehensive safety analysis of concurrent programs using verisoft and TXL. 13-22 - Jeff H. Perkins, Michael D. Ernst:

Efficient incremental algorithms for dynamic detection of likely invariants. 23-32
Modeling and requirements
- Sebastián Uchitel, Robert Chatley, Jeff Kramer, Jeff Magee:

System architecture: the context for scenario-based model synthesis. 33-42 - Sebastián Uchitel, Marsha Chechik:

Merging partial behavioural models. 43-52 - Emmanuel Letier, Axel van Lamsweerde:

Reasoning about partial goal satisfaction for requirements and design engineering. 53-62
Error explanation
- Roman Manevich, Manu Sridharan, Stephen Adams, Manuvir Das, Zhe Yang:

PSE: explaining program failures via postmortem static analysis. 63-72 - Sagar Chaki, Alex Groce, Ofer Strichman

:
Explaining abstract counterexamples. 73-82 - Ted Kremenek, Ken Ashcraft, Junfeng Yang, Dawson R. Engler:

Correlation exploitation in error ranking. 83-93 - Joe Marks:

The usability problem for home appliances: engineers caused it, engineers can fix it! 95
Safety and security
- Misha Zitser, Richard Lippmann, Tim Leek:

Testing static analysis tools using exploitable buffer overflows from open source code. 97-106 - Licia Capra:

Engineering human trust in mobile system collaborations. 107-116 - Wei Xu, Daniel C. DuVarney, R. Sekar:

An efficient and backwards-compatible transformation to ensure memory safety of C programs. 117-126
Aspects
- Mira Mezini, Klaus Ostermann:

Variability management with feature-oriented programming and aspects. 127-136 - Shriram Krishnamurthi, Kathi Fisler, Michael Greenberg

:
Verifying aspect advice modularly. 137-146 - Martin C. Rinard, Alexandru Salcianu, Suhabe Bugrara:

A classification system and analysis for aspect-oriented programs. 147-158 - Robert J. Walker, Kevin Viggers:

Implementing protocols via declarative event patterns. 159-169 - Nancy G. Leveson, Kathryn Anne Weiss:

Making embedded software reuse practical and safe. 171-178
Verification
- Holger Giese, Sven Burmester, Wilhelm Schäfer, Oliver Oberschelp:

Modular design and verification of component-based mechatronic systems with online-reconfiguration. 179-188 - Jonathan Edwards, Daniel Jackson, Emina Torlak:

A type system for object models. 189-199 - Jianbin Tan, George S. Avrunin, Lori A. Clarke, Shlomo Zilberstein, Stefan Leue:

Heuristic-guided counterexample search in FLAVERS. 201-210
Development support
- Ying Pan, Lei Wang, Lu Zhang, Bing Xie, Fuqing Yang:

Relevancy based semantic interoperation of reuse repositories. 211-220 - Cleidson R. B. de Souza, David F. Redmiles, Li-Te Cheng, David R. Millen, John F. Patterson:

How a good software practice thwarts collaboration: the multiple roles of APIs in software development. 221-230 - Xiaofang Zhang, Michal Young, John Howard Eli Fiskio-Lasseter:

Refining code-design mapping with flow analysis. 231-240
Testing and reliability
- Alessandro Orso, Nanjuan Shi, Mary Jean Harrold:

Scaling regression testing to large software systems. 241-251 - María José Suárez-Cabal, Javier Tuya:

Using an SQL coverage measurement for testing database applications. 253-262 - Paul Luo Li, Mary Shaw, James D. Herbsleb, Bonnie K. Ray, Peter Santhanam:

Empirical evaluation of defect projection models for widely-deployed production software systems. 263-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














