


default search action
Information & Software Technology, Volume 58
Volume 58, February 2015
- Mario Cortes Cornax

, Alexandru Matei
, Sophie Dupuy-Chessa, Dominique Rieu, Nadine Mandran, Emmanuel Letier:
Using intentional fragments to bridge the gap between organizational and intentional levels. 1-19 - Fernando Selleri Silva

, Felipe Santana Furtado Soares, Angela Lima Peres
, Ivanildo Monteiro de Azevedo
, Ana Paula L. F. Vasconcelos
, Fernando Kenji Kamei
, Silvio Romero de Lemos Meira:
Using CMMI together with agile software development: A systematic review. 20-43 - Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina

, Haralambos Mouratidis
:
Empirical evaluation of a cloud computing information security governance framework. 44-57 - Wen Zhang, Ye Yang, Qing Wang:

Using Bayesian regression and EM algorithm with missing handling for software effort prediction. 58-70 - Nicolás Cardozo, Sebastián González, Kim Mens

, Ragnhild Van Der Straeten, Jorge Vallejos, Theo D'Hondt:
Semantics for consistent activation in context-oriented systems. 71-94 - David Insa, Josep Silva

:
Automatic transformation of iterative loops into recursive methods. 95-109 - Jakub Jurkiewicz, Jerzy R. Nawrocki:

Automated events identification in use cases. 110-122 - Vahid Garousi-Yusifoglu

, Yasaman Amannejad, Aysu Betin Can
:
Software test-code engineering: A systematic mapping. 123-147 - Muneera Bano

, Didar Zowghi
:
A systematic review on the relationship between user involvement and system success. 148-169 - Isatou Hydara, Abu Bakar Md Sultan

, Hazura Zulzalil
, Novia Admodisastro
:
Current state of research on cross-site scripting (XSS) - A systematic literature review. 170-186 - Isel Moreno-Montes de Oca, Monique Snoeck

, Hajo A. Reijers, Abel Rodríguez-Morffi
:
A systematic literature review of studies on business process modeling quality. 187-205 - Ali Idri

, Fatima Azzahra Amazal, Alain Abran
:
Analogy-based software development effort estimation: A systematic mapping and review. 206-230 - Jehad Al-Dallal

:
Identifying refactoring opportunities in object-oriented code: A systematic literature review. 231-249 - Tihana Galinac Grbac

, Darko Huljenic:
On the probability distribution of faults in complex software systems. 250-258 - Sasa Stojanovic, Zaharije Radivojevic, Milos Cvetanovic:

Approach for estimating similarity between procedures in differently compiled binaries. 259-271 - Pawel Janczarek, Janusz Sosnowski

:
Investigating software testing and maintenance reports: Case study. 272-288 - André Luís Andrade Menolli, Maria Alexandra Cunha, Sheila S. Reinehr

, Andreia Malucelli:
"Old" theories, "New" technologies: Understanding knowledge sharing and learning in Brazilian software development companies. 289-303 - Hannes Holm

, Matus Korman, Mathias Ekstedt:
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits. 304-318 - Leandro Souza de Oliveira, Pádraig O'Leary, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:

Product derivation in practice. 319-337 - José Ignacio Panach

, Natalia Juristo Juzgado, Francisco Valverde
, Oscar Pastor
:
A framework to identify primitives that represent usability within Model-Driven Development methods. 338-354 - Antonia Bertolino

, Said Daoudagh
, Donia El Kateb, Christopher Henard, Yves Le Traon
, Francesca Lonetti
, Eda Marchetti
, Tejeddine Mouelhi, Mike Papadakis
:
Similarity testing for access control. 355-372 - Suprika Vasudeva Shrivastava, Urvashi Rathod

:
Categorization of risk factors for distributed agile projects. 373-387 - Issam H. Laradji, Mohammad R. Alshayeb

, Lahouari Ghouti
:
Software defect prediction using ensemble learning on selected features. 388-402 - Mickaël Delahaye, Bernard Botella, Arnaud Gotlieb:

Infeasible path generalization in dynamic symbolic execution. 403-418 - Javier Ferrer

, Peter M. Kruse, Francisco Chicano
, Enrique Alba
:
Search based algorithms for test sequence generation in functional testing. 419-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














