


default search action
Information & Software Technology, Volume 51
Volume 51, Number 1, January 2009
- Claes Wohlin

:
Introduction to section most cited journal articles in Software Engineering. 1 - Claes Wohlin

:
An analysis of the most cited articles in software engineering journals - 2002. 2-6 - Barbara A. Kitchenham

, Pearl Brereton, David Budgen
, Mark Turner, John Bailey, Stephen G. Linkman:
Systematic literature reviews in software engineering - A systematic literature review. 7-15 - Lionel C. Briand, Yvan Labiche

, S. He:
Automating regression test selection based on UML designs. 16-30 - Jan Kofron

, Frantisek Plásil
, Ondrej Sery:
Modes in component behavior specification via EBP and their application in product lines. 31-41 - Marcos Dias de Assunção

, Rajkumar Buyya:
Performance analysis of allocation policies for interGrid resource provisioning. 42-55 - Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend, Michael Stepp:

More on graph theoretic software watermarks: Implementation, analysis, and attacks. 56-67 - Robert L. Glass, Iris Vessey, Venkataraman Ramesh:

RESRES: The story behind the paper "Research in software engineering: An analysis of the literature". 68-70
- Vigdis By Kampenes, Tore Dybå, Jo Erskine Hannay, Dag I. K. Sjøberg:

A systematic review of quasi-experiments in software engineering. 71-82 - Li Qin, Vijayalakshmi Atluri

:
Evaluating the validity of data instances against ontology evolution over the Semantic Web. 83-97 - Jan Chmiel, Tadeusz Morzy, Robert Wrembel

:
Multiversion join index for multiversion data warehouse. 98-108 - Liang Xiao, Des Greer:

Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model-Driven Architecture. 109-137 - Marcelo Nassau Malta, Marco Túlio de Oliveira Valente

:
Object-oriented transformations for extracting aspects. 138-149 - Finn Olav Bjørnson, Alf Inge Wang, Erik Arisholm:

Improving the effectiveness of root cause analysis in post mortem analysis: A controlled experiment. 150-161 - KeungSik Choi, Doo-Hwan Bae:

Dynamic project performance estimation by combining static estimation models with system dynamics. 162-172 - Li-Wei Chen, Sun-Jen Huang:

Accuracy and efficiency comparisons of single- and multi-cycled software classification models. 173-181 - Liang Huang, Mike Holcombe:

Empirical investigation towards the effectiveness of Test First programming. 182-194 - Sybren Deelstra, Marco Sinnema, Jan Bosch:

Variability assessment in software product families. 195-218 - Helen Sharp

, Nathan Baddoo, Sarah Beecham, Tracy Hall
, Hugh Robinson:
Models of motivation in software engineering. 219-233
Volume 51, Number 2, February 2009
- Panagiotis Katsaros

:
A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach. 235-257 - Michiel Koning, Chang-Ai Sun, Marco Sinnema, Paris Avgeriou

:
VxBPEL: Supporting variability for Web services in BPEL. 258-269 - Filippo Ricca, Marco Torchiano

, Massimiliano Di Penta
, Mariano Ceccato
, Paolo Tonella
:
Using acceptance tests as a support for clarifying requirements: A series of experiments. 270-283 - Ping Sun, Changjun Jiang:

Analysis of workflow dynamic changes based on Petri net. 284-292 - Alf Inge Wang, Erik Arisholm:

The effect of task order on the maintainability of object-oriented software. 293-305 - Amparo Navasa Martínez, Miguel Ángel Pérez-Toledano

, Juan Manuel Murillo
:
An ADL dealing with aspects at software architecture stage. 306-324 - Costas Vassilakis

, Giorgos Lepouras, Akrivi Katifori:
A heuristics-based approach to reverse engineering of electronic services. 325-336 - Paolo Guarda, Nicola Zannone

:
Towards the development of privacy-aware systems. 337-350 - Ho-Won Jung, Dennis R. Goldenson:

Evaluating the relationship between process improvement and schedule deviation in software maintenance. 351-361 - Abdelghani Benharref, Rachida Dssouli, Mohamed Adel Serhani, Roch H. Glitho

:
Efficient traces' collection mechanisms for passive testing of Web Services. 362-374 - Ching-Pao Chang, Chih-Ping Chu, Yu-Fang Yeh:

Integrating in-process software defect prediction with association mining to discover defect pattern. 375-384 - Wes Masri, Andy Podgurski:

Algorithms and tool support for dynamic information flow analysis. 385-404 - Gyun Woo, Heung Seok Chae, Jian Feng Cui, Jeong-Hoon Ji:

Revising cohesion measures by considering the impact of write interactions between class members. 405-417 - Monalisa Sarma, Rajib Mall:

Automatic generation of test specifications for coverage of system state transitions. 418-432 - Massimo Colosimo, Andrea De Lucia

, Giuseppe Scanniello
, Genoveffa Tortora:
Evaluating legacy system migration technologies through empirical studies. 433-447 - Gisèle Douta, Haydar Talib, Oscar Nierstrasz

, Frank Langlotz:
CompAS: A new approach to commonality and variability analysis with applications in computer assisted orthopaedic surgery. 448-459 - Lihua Ran, Curtis E. Dyreson

, Anneliese Amschler Andrews, Renée C. Bryce, Christopher J. Mallery:
Building test cases and oracles to automate the testing of web database applications. 460-477 - Aneesh Krishna

, Sergiy A. Vilkomir, Aditya K. Ghose:
Consistency preserving co-evolution of formal specifications and agent-oriented conceptual models. 478-496 - Ilir Gashi

, Peter T. Popov
, Vladimir Stankovic
:
Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach. 497-511 - Lionel C. Briand, Yvan Labiche

, Tao Yue:
Automated traceability analysis for UML model refinements. 512-527 - Damjan Vavpotic

, Marko Bajec:
An approach for concurrent evaluation of technical and social aspects of software development methodologies. 528-545 - Hui Liu, Hee Beng Kuan Tan:

Covering code behavior on input validation in functional testing. 546-553
Volume 51, Number 3, March 2009
- Anil S. Jadhav, Rajendra M. Sonar

:
Evaluating and selecting software packages: A review. 555-563 - Pablo Moreno-Ger

, Rubén Fuentes-Fernández
, José Luis Sierra-Rodríguez
, Baltasar Fernández-Manjón
:
Model-checking for adventure videogames. 564-580 - Douwe Postmus

, Jacob Wijngaard, Hans Wortmann
:
An economic model to compare the profitability of pay-per-use and fixed-fee licensing. 581-588 - Stephen Thomas, Laurie A. Williams, Tao Xie:

On automated prepared statement generation to remove SQL injection vulnerabilities. 589-598 - Behshid Behkamal

, Mohsen Kahani
, Mohammad Kazem Akbari:
Customizing ISO 9126 quality model for evaluation of B2B applications. 599-609 - Kristian Bisgaard Lassen, Wil M. P. van der Aalst

:
Complexity metrics for Workflow nets. 610-626 - Silvia Teresita Acuña, Marta Gómez, Natalia Juristo Juzgado:

How do personality, team processes and task characteristics relate to job satisfaction and software quality? 627-639 - Moataz A. Ahmed

, Zeeshan Muzaffar:
Handling imprecision and uncertainty in software development effort prediction: A type-2 fuzzy logic based framework. 640-654 - LeMai Nguyen

, Graeme G. Shanks
:
A framework for understanding creativity in requirements engineering. 655-662 - Katja Karhu

, Ossi Taipale, Kari Smolander
:
Investigating the relationship between schedules and knowledge transfer in software testing. 663-677
Volume 51, Number 4, April 2009
- Jun-Wei Lin, Chin-Yu Huang:

Analysis of test suite reduction with enhanced tie-breaking techniques. 679-690 - Hyun-Goo Kang, Taisook Han:

A bottom-up pointer analysis using the update history. 691-707 - Raquel Blanco, Javier Tuya

, Belarmino Adenso-Díaz
:
Automated test data generation using a scatter search approach. 708-720 - Miroslaw Staron

, Wilhelm Meding, Christer Nilsson:
A framework for developing measurement systems and its industrial evaluation. 721-737 - Stanislav Berlin, Tzvi Raz, Chanan Glezer

, Moshe Zviran:
Comparison of estimation methods of cost and duration in IT projects. 738-748 - Pedro Valderas

, Vicente Pelechano
:
Introducing requirements traceability support in model-driven development of web applications. 749-768 - Esther Guerra

, Juan de Lara, Alessio Malizia
, Paloma Díaz
:
Supporting user-oriented analysis for multi-view domain-specific visual languages. 769-784 - Helen M. Edwards, Sharon McDonald, S. Michelle Young:

The repertory grid technique: Its place in empirical software engineering research. 785-798 - R. Krishnamoorthi, S. A. Sahaaya Arul Mary

:
Factor oriented requirement coverage based system test case prioritization of new and regression test cases. 799-808
Volume 51, Number 5, May 2009
- Eduardo Fernández-Medina

, Jan Jürjens, Juan Trujillo
, Sushil Jajodia:
Model-Driven Development for secure information systems. 809-814
- David A. Basin, Manuel Clavel, Jürgen Doser, Marina Egea:

Automated analysis of security-design models. 815-831 - Ghassan Beydoun

, Graham Low, Haralambos Mouratidis
, Brian Henderson-Sellers:
A security-aware metamodel for multi-agent systems (MAS). 832-845 - Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee, Siv Hilde Houmb:

An aspect-oriented methodology for designing secure applications. 846-864 - Zhi Jian Zhu, Mohammad Zulkernine:

A model-based aspect-oriented framework for building intrusion-aware software systems. 865-875 - Howard Chivers, Richard F. Paige:

XRound: A reversible template language and its application in model-based security analysis. 876-893 - Sergio Pozo Hidalgo

, Rafael Ceballos
, Rafael Martinez Gasca
:
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies. 894-915 - Andreas L. Opdahl

, Guttorm Sindre
:
Experimental comparison of attack trees and misuse cases for security threat identification. 916-932 - Liang Xiao:

An adaptive security model using agent-oriented MDA. 933-955
Volume 51, Number 6, June 2009
- Wasif Afzal

, Richard Torkar
, Robert Feldt
:
A systematic review of search-based testing for non-functional system properties. 957-976 - José Jacobo Zubcoff, Jesús Pardillo, Juan Trujillo

:
A UML profile for the conceptual modelling of data-mining with time-series in data warehouses. 977-992 - Qingfeng He, Annie I. Antón:

Requirements-based Access Control Analysis and Policy Specification (ReCAPS). 993-1009 - Moe Thandar Wynn

, H. M. W. Verbeek
, Wil M. P. van der Aalst
, Arthur H. M. ter Hofstede
, David Edmond:
Reduction rules for YAWL workflows with cancellation regions and OR-joins. 1010-1020 - Anna Perini, Filippo Ricca, Angelo Susi:

Tool-supported requirements prioritization: Comparing the AHP and CBRank methods. 1021-1032 - Juan Trujillo

, Emilio Soler
, Eduardo Fernández-Medina
, Mario Piattini
:
An engineering process for developing Secure Data Warehouses. 1033-1051 - Mercedes Amor

, Lidia Fuentes
:
Malaca: A component and aspect-oriented agent architecture. 1052-1065 - Stig Larsson, Petri Myllyperkiö, Fredrik Ekdahl, Ivica Crnkovic

:
Software product integration: A case study-based synthesis of reference models. 1066-1080 - Jacques Wainer

, Claudia Galindo Novoa Barsottini
, Danilo Lacerda, Leandro Rodrigues Magalhães de Marco:
Empirical evaluation in Computer Science research published by ACM. 1081-1085
Volume 51, Number 7, July 2009
- Gursimran Singh Walia, Jeffrey C. Carver:

A systematic literature review to identify and classify software requirement errors. 1087-1109 - Jo Erskine Hannay, Tore Dybå, Erik Arisholm, Dag I. K. Sjøberg:

The effectiveness of pair programming: A meta-analysis. 1110-1122
- Robert M. Hierons

:
Using status messages in the distributed test architecture. 1123-1130 - Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha, Doo-Hwan Bae:

A data flow-based structural testing technique for FBD programs. 1131-1139 - You-min Ha, Sanghyun Park, Sang-Wook Kim, Jung-Im Won

, Jeehee Yoon:
A stock recommendation system exploiting rule discovery in stock databases. 1140-1149
- Seok-Won Lee, Mattia Monga

:
Special section on Software Engineering for Secure Systems (SESS '07). 1150-1151 - Bart De Win, Riccardo Scandariato, Koen Buyens, Johan Grégoire, Wouter Joosen:

On the secure software development process: CLASP, SDL and Touchpoints compared. 1152-1171 - Dries Vanoverberghe, Frank Piessens:

Security enforcement aware software development. 1172-1185
Volume 51, Number 8, August 2009
- Petia Wohed

, Nick Russell, Arthur H. M. ter Hofstede
, Birger Andersson, Wil M. P. van der Aalst
:
Patterns-based evaluation of open source BPM systems: The cases of jBPM, OpenWFE, and Enhydra Shark. 1187-1216 - Iván García-Magariño

, Rubén Fuentes-Fernández
, Jorge J. Gómez-Sanz
:
Guideline for the definition of EMF metamodels using an Entity-Relationship approach. 1217-1230 - Mahmood Niazi

, Muhammad Ali Babar:
Identifying high perceived value practices of CMMI level 2: An empirical study. 1231-1243 - Georgia M. Kapitsaki

, Dimitrios A. Kateros, George N. Prezerakos, Iakovos S. Venieris:
Model-driven development of composite context-aware web applications. 1244-1260 - Matjaz B. Juric, Ana Sasa, Ivan Rozman:

WS-BPEL Extensions for Versioning. 1261-1274 - Iris Reinhartz-Berger, Arnon Sturm

:
Utilizing domain models for application design and validation. 1275-1289
Volume 51, Number 9, September 2009
- Joaquín Nicolás, José Ambrosio Toval Álvarez:

On the generation of requirements specifications from software engineering models: A systematic literature review. 1291-1307
- Ing-Long Wu, Ching-Yi Hung:

A strategy-based process for effectively determining system requirements in eCRM development. 1308-1318 - Mohammad R. Alshayeb

:
Empirical investigation of refactoring effect on software quality. 1319-1326 - Eduardo Miranda, Pierre Bourque, Alain Abran

:
Sizing user stories using paired comparisons. 1327-1337 - Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Han:

A method for detecting the theft of Java programs through analysis of the control flow information. 1338-1350 - Tihana Galinac

:
Empirical evaluation of selected best practices in implementation of software process improvement. 1351-1364 - Danielle Azar

, Haidar M. Harmanani
, Rita Korkmaz:
A hybrid heuristic approach to optimize rule-based software quality estimation models. 1365-1376
Volume 51, Number 10, October 2009
- James R. Cordy, Lu Zhang:

Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008. 1377-1378
- Yue Jia, Mark Harman

:
Higher Order Mutation Testing. 1379-1393 - Daniel M. Germán, Ahmed E. Hassan, Gregorio Robles

:
Change impact graphs: Determining the impact of prior codechanges. 1394-1408 - Miguel Gómez-Zamalloa

, Elvira Albert, Germán Puebla:
Decompilation of Java bytecode to Prolog by partial evaluation. 1409-1427 - Jonas Lundberg, Tobias Gutzmann, Marcus Edvinsson, Welf Löwe:

Fast and precise points-to analysis. 1428-1439 - Andrew Stone, Michelle Strout, Shweta Behere:

May/must analysis and the DFAGen data-flow analysis generator. 1440-1453 - Mariano Ceccato

, Thomas Roy Dean, Paolo Tonella
:
Recovering structured data types from a legacy data model with overlays. 1454-1468 - Massimiliano Di Penta

, Luigi Cerulo
, Lerina Aversano
:
The life and death of statically detected vulnerabilities: An empirical study. 1469-1484
Volume 51, Number 11, November 2009
- Hong Zhu, Fevzi Belli:

Advancing test automation technology to meet the challenges of model-based software testing - Guest editors' introduction to the special section of the Third IEEE International Workshop on Automation of Software Test (AST 2008). 1485-1486 - Arilo Claudio Dias Neto, Guilherme Horta Travassos

:
Model-based testing approaches selection for software projects. 1487-1504 - W. Eric Wong, Andy Restrepo, Byoungju Choi:

Validation of SDL specifications using EFSM-based test generation. 1505-1519 - Junhua Ding, Peter J. Clarke

, Gonzalo Argote-Garcia, Xudong He:
A methodology for evaluating test coverage criteria of high levelPetri nets. 1520-1533 - José Carlos Bregieiro Ribeiro

, Mário Zenha Rela
, Francisco Fernández de Vega:
Test Case Evaluation and Input Domain Reduction strategies for the Evolutionary Testing of Object-Oriented software. 1534-1548
- Hong Zhu:

Engineering quality software - Guest editor's introduction to the special section of the Eighth International Conference on Quality Software (QSIC 2008). 1549-1550 - Lionel C. Briand, Yvan Labiche

, Zaheer Bawar, Nadia Traldi Spido:
Using machine learning to refine Category-Partition test specifications and test suites. 1551-1564 - Shaoying Liu:

Integrating top-down and scenario-based methods for constructing software specifications. 1565-1572 - Zhenyu Zhang, W. K. Chan

, T. H. Tse
, Peifeng Hu, Xinming Wang:
Is non-parametric hypothesis testing model robust for statistical fault localization? 1573-1585 - Dharmalingam Ganesan, Thorsten Keuler, Yutaro Nishimura:

Architecture compliance checking at run-time. 1586-1600 - Martin Weiglhofer, Gordon Fraser, Franz Wotawa

:
Using coverage to automate and improve test purpose based testing. 1601-1617 - Mohamed F. Ahmed, Swapna S. Gokhale:

Linux bugs: Life cycle, resolution and architectural analysis. 1618-1627
Volume 51, Number 12, December 2009
- Marcela Genero

, Mario Piattini
, Michel R. V. Chaudron
:
Quality of UML models. 1629-1630
- Francisco J. Lucas, Fernando Molina, José Ambrosio Toval Álvarez:

A systematic review of UML model consistency management. 1631-1645 - Parastoo Mohagheghi, Vegard Dehlen, Tor Neple:

Definitions and approaches to model quality in model-based software development - A review of literature. 1646-1669 - Ariadi Nugroho

:
Level of detail in UML models and its impact on model comprehension: A controlled experiment. 1670-1685 - Holger Eichelberger, Klaus Schmid

:
Guidelines on the aesthetic quality of UML class diagrams. 1686-1698 - Bente Anda, Kai Hansen, Gunhild Sand:

An investigation of use case quality in a large safety-critical software development project. 1699-1711
- Carlos Gutiérrez, David Garcia Rosado

, Eduardo Fernández-Medina
:
The practical application of a process for eliciting and designing security in web service systems. 1712-1738 - Claus Pahl

, Simon Giesecke, Wilhelm Hasselbring
:
Ontology-based modelling of architectural styles. 1739-1749

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














