callback( { "result":{ "query":":facetid:toc:\"db/journals/tosem/tosem18.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"202.14" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"15", "@dc":"15", "@oc":"15", "@id":"43488714", "text":":facetid:toc:db/journals/tosem/tosem18.bht" } }, "hits":{ "@total":"15", "@computed":"15", "@sent":"15", "@first":"0", "hit":[{ "@score":"1", "@id":"5090888", "info":{"authors":{"author":[{"@pid":"32/3440","text":"Lujo Bauer"},{"@pid":"l/JayLigatti","text":"Jay Ligatti"},{"@pid":"53/5714","text":"David Walker"}]},"title":"Composing expressive runtime security policies.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"3","pages":"9:1-9:43","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tosem/BauerLW09","doi":"10.1145/1525880.1525882","ee":"https://doi.org/10.1145/1525880.1525882","url":"https://dblp.org/rec/journals/tosem/BauerLW09"}, "url":"URL#5090888" }, { "@score":"1", "@id":"5090890", "info":{"authors":{"author":[{"@pid":"23/651","text":"Ankit Goel"},{"@pid":"04/5884","text":"Abhik Roychoudhury"},{"@pid":"t/PSThiagarajan","text":"P. S. Thiagarajan"}]},"title":"Interacting process classes.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"4","pages":"13:1-13:47","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tosem/GoelRT09","doi":"10.1145/1538942.1538943","ee":"https://doi.org/10.1145/1538942.1538943","url":"https://dblp.org/rec/journals/tosem/GoelRT09"}, "url":"URL#5090890" }, { "@score":"1", "@id":"5090891", "info":{"authors":{"author":[{"@pid":"69/3214","text":"Tracy Hall"},{"@pid":"66/2636","text":"Nathan Baddoo"},{"@pid":"91/4078","text":"Sarah Beecham"},{"@pid":"41/3189","text":"Hugh Robinson"},{"@pid":"s/HelenSharp","text":"Helen Sharp"}]},"title":"A systematic review of theory use in studies investigating the motivations of software engineers.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"3","pages":"10:1-10:29","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tosem/HallBBRS09","doi":"10.1145/1525880.1525883","ee":"https://doi.org/10.1145/1525880.1525883","url":"https://dblp.org/rec/journals/tosem/HallBBRS09"}, "url":"URL#5090891" }, { "@score":"1", "@id":"5090892", "info":{"authors":{"author":{"@pid":"98/6064","text":"Dick Hamlet"}},"title":"Tools and experiments supporting a testing-based theory of component composition.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"3","pages":"12:1-12:41","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tosem/Hamlet09","doi":"10.1145/1525880.1525885","ee":"https://doi.org/10.1145/1525880.1525885","url":"https://dblp.org/rec/journals/tosem/Hamlet09"}, "url":"URL#5090892" }, { "@score":"1", "@id":"5090893", "info":{"authors":{"author":{"@pid":"h/RobertMHierons","text":"Robert M. Hierons"}},"title":"Verdict functions in testing with a fault domain or test hypotheses.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"4","pages":"14:1-14:19","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tosem/Hierons09","doi":"10.1145/1538942.1538944","ee":"https://doi.org/10.1145/1538942.1538944","url":"https://dblp.org/rec/journals/tosem/Hierons09"}, "url":"URL#5090893" }, { "@score":"1", "@id":"5090894", "info":{"authors":{"author":[{"@pid":"90/6532","text":"Marco Mamei"},{"@pid":"54/3140","text":"Franco Zambonelli"}]},"title":"Programming pervasive and mobile computing applications: The TOTA approach.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"4","pages":"15:1-15:56","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tosem/MameiZ09","doi":"10.1145/1538942.1538945","ee":"https://doi.org/10.1145/1538942.1538945","url":"https://dblp.org/rec/journals/tosem/MameiZ09"}, "url":"URL#5090894" }, { "@score":"1", "@id":"5090896", "info":{"authors":{"author":[{"@pid":"33/13","text":"Phil McMinn"},{"@pid":"b/DavidBinkley","text":"David W. Binkley"},{"@pid":"h/MarkHarman","text":"Mark Harman"}]},"title":"Empirical evaluation of a nesting testability transformation for evolutionary testing.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"3","pages":"11:1-11:27","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tosem/McMinnBH09","doi":"10.1145/1525880.1525884","ee":"https://doi.org/10.1145/1525880.1525884","url":"https://dblp.org/rec/journals/tosem/McMinnBH09"}, "url":"URL#5090896" }, { "@score":"1", "@id":"5090897", "info":{"authors":{"author":{"@pid":"n/DavidNotkin","text":"David Notkin"}},"title":"Editorial.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"3","pages":"8:1-8:2","year":"2009","type":"Journal Articles","access":"closed","key":"journals/tosem/Notkin09","doi":"10.1145/1525880.1525881","ee":"https://doi.org/10.1145/1525880.1525881","url":"https://dblp.org/rec/journals/tosem/Notkin09"}, "url":"URL#5090897" }, { "@score":"1", "@id":"5307072", "info":{"authors":{"author":[{"@pid":"62/962","text":"Travis D. Breaux"},{"@pid":"a/AnnieIAnton","text":"Annie I. Antón"},{"@pid":"d/JonDoyle","text":"Jon Doyle"}]},"title":"Semantic parameterization: A process for modeling domain descriptions.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"2","pages":"5:1-5:27","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tosem/BreauxAD08","doi":"10.1145/1416563.1416565","ee":"https://doi.org/10.1145/1416563.1416565","url":"https://dblp.org/rec/journals/tosem/BreauxAD08"}, "url":"URL#5307072" }, { "@score":"1", "@id":"5307079", "info":{"authors":{"author":[{"@pid":"40/3056","text":"Shan Shan Huang"},{"@pid":"28/1014","text":"David Zook"},{"@pid":"s/YSmaragdakis","text":"Yannis Smaragdakis"}]},"title":"Domain-specific languages and program generation with meta-AspectJ.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"2","pages":"6:1-6:32","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tosem/HuangZS08","doi":"10.1145/1416563.1416566","ee":"https://doi.org/10.1145/1416563.1416566","url":"https://dblp.org/rec/journals/tosem/HuangZS08"}, "url":"URL#5307079" }, { "@score":"1", "@id":"5307080", "info":{"authors":{"author":[{"@pid":"96/6115","text":"Marcel R. Karam"},{"@pid":"80/5268","text":"Trevor J. Smedley"},{"@pid":"d/SergiuMDascalu","text":"Sergiu M. Dascalu"}]},"title":"Unit-level test adequacy criteria for visual dataflow languages and a testing methodology.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"1","pages":"1:1-1:40","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tosem/KaramSD08","doi":"10.1145/1391984.1391985","ee":"https://doi.org/10.1145/1391984.1391985","url":"https://dblp.org/rec/journals/tosem/KaramSD08"}, "url":"URL#5307080" }, { "@score":"1", "@id":"5307081", "info":{"authors":{"author":[{"@pid":"05/469","text":"Ondrej Lhoták"},{"@pid":"h/LaurieJHendren","text":"Laurie J. Hendren"}]},"title":"Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"1","pages":"3:1-3:53","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tosem/LhotakH08","doi":"10.1145/1391984.1391987","ee":"https://doi.org/10.1145/1391984.1391987","url":"https://dblp.org/rec/journals/tosem/LhotakH08"}, "url":"URL#5307081" }, { "@score":"1", "@id":"5307082", "info":{"authors":{"author":[{"@pid":"63/5819","text":"Panagiotis Louridas"},{"@pid":"s/DiomidisSpinellis","text":"Diomidis Spinellis"},{"@pid":"04/1794","text":"Vasileios Vlachos"}]},"title":"Power laws in software.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"1","pages":"2:1-2:26","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tosem/LouridasSV08","doi":"10.1145/1391984.1391986","ee":"https://doi.org/10.1145/1391984.1391986","url":"https://dblp.org/rec/journals/tosem/LouridasSV08"}, "url":"URL#5307082" }, { "@score":"1", "@id":"5307083", "info":{"authors":{"author":{"@pid":"m/AtifMMemon","text":"Atif M. Memon"}},"title":"Automatically repairing event sequence-based GUI test suites for regression testing.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"2","pages":"4:1-4:36","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tosem/Memon08","doi":"10.1145/1416563.1416564","ee":"https://doi.org/10.1145/1416563.1416564","url":"https://dblp.org/rec/journals/tosem/Memon08"}, "url":"URL#5307083" }, { "@score":"1", "@id":"5307090", "info":{"authors":{"author":[{"@pid":"98/2931-3","text":"Qing Xie 0003"},{"@pid":"m/AtifMMemon","text":"Atif M. Memon"}]},"title":"Using a pilot study to derive a GUI model for automated testing.","venue":"ACM Trans. Softw. Eng. Methodol.","volume":"18","number":"2","pages":"7:1-7:35","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tosem/XieM08","doi":"10.1145/1416563.1416567","ee":"https://doi.org/10.1145/1416563.1416567","url":"https://dblp.org/rec/journals/tosem/XieM08"}, "url":"URL#5307090" } ] } } } )