callback( { "result":{ "query":":facetid:toc:\"db/journals/tse/tse34.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"185.82" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"56", "@dc":"56", "@oc":"56", "@id":"43489035", "text":":facetid:toc:db/journals/tse/tse34.bht" } }, "hits":{ "@total":"56", "@computed":"56", "@sent":"56", "@first":"0", "hit":[{ "@score":"1", "@id":"5307599", "info":{"authors":{"author":[{"@pid":"a/SvenApel","text":"Sven Apel"},{"@pid":"00/3032","text":"Thomas Leich"},{"@pid":"s/GunterSaake","text":"Gunter Saake"}]},"title":"Aspectual Feature Modules.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"162-180","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/ApelLS08","doi":"10.1109/TSE.2007.70770","ee":"https://doi.org/10.1109/TSE.2007.70770","url":"https://dblp.org/rec/journals/tse/ApelLS08"}, "url":"URL#5307599" }, { "@score":"1", "@id":"5307600", "info":{"authors":{"author":[{"@pid":"58/6881","text":"Massimo Bartoletti"},{"@pid":"90/1344","text":"Pierpaolo Degano"},{"@pid":"f/GianLuigiFerrari","text":"Gian-Luigi Ferrari 0002"},{"@pid":"99/2362","text":"Roberto Zunino"}]},"title":"Semantics-Based Design for Secure Web Services.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"33-49","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/BartolettiDFZ08","doi":"10.1109/TSE.2007.70740","ee":"https://doi.org/10.1109/TSE.2007.70740","url":"https://dblp.org/rec/journals/tse/BartolettiDFZ08"}, "url":"URL#5307600" }, { "@score":"1", "@id":"5307601", "info":{"authors":{"author":[{"@pid":"62/962","text":"Travis D. Breaux"},{"@pid":"a/AnnieIAnton","text":"Annie I. Antón"}]},"title":"Analyzing Regulatory Rules for Privacy and Security Requirements.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"5-20","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/BreauxA08","doi":"10.1109/TSE.2007.70746","ee":"https://doi.org/10.1109/TSE.2007.70746","url":"https://dblp.org/rec/journals/tse/BreauxA08"}, "url":"URL#5307601" }, { "@score":"1", "@id":"5307602", "info":{"authors":{"author":[{"@pid":"c/CarlosCanal","text":"Carlos Canal"},{"@pid":"p/PascalPoizat","text":"Pascal Poizat"},{"@pid":"86/2766","text":"Gwen Salaün"}]},"title":"Model-Based Adaptation of Behavioral Mismatching Components.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"546-563","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/CanalPS08","doi":"10.1109/TSE.2008.31","ee":"https://doi.org/10.1109/TSE.2008.31","url":"https://dblp.org/rec/journals/tse/CanalPS08"}, "url":"URL#5307602" }, { "@score":"1", "@id":"5307603", "info":{"authors":{"author":[{"@pid":"92/4331","text":"Eugenio Capra"},{"@pid":"48/2485","text":"Chiara Francalanci"},{"@pid":"44/3831","text":"Francesco Merlo"}]},"title":"An Empirical Study on the Relationship Between Software Design Quality, Development Effort and Governance in Open Source Projects.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"765-782","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/CapraFM08","doi":"10.1109/TSE.2008.68","ee":"https://doi.org/10.1109/TSE.2008.68","url":"https://dblp.org/rec/journals/tse/CapraFM08"}, "url":"URL#5307603" }, { "@score":"1", "@id":"5307604", "info":{"authors":{"author":[{"@pid":"c/JeffreyCCarver","text":"Jeffrey C. Carver"},{"@pid":"91/1758","text":"Nachiappan Nagappan"},{"@pid":"07/145","text":"Alan Page"}]},"title":"The Impact of Educational Background on the Effectiveness of Requirements Inspections: An Empirical Study.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"800-812","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/CarverNP08","doi":"10.1109/TSE.2008.49","ee":"https://doi.org/10.1109/TSE.2008.49","url":"https://dblp.org/rec/journals/tse/CarverNP08"}, "url":"URL#5307604" }, { "@score":"1", "@id":"5307605", "info":{"authors":{"author":[{"@pid":"77/6705","text":"Ray-Yaung Chang"},{"@pid":"86/795","text":"Andy Podgurski"},{"@pid":"64/5141-1","text":"Jiong Yang 0001"}]},"title":"Discovering Neglected Conditions in Software by Mining Dependence Graphs.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"5","pages":"579-596","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/ChangPY08","doi":"10.1109/TSE.2008.24","ee":"https://doi.org/10.1109/TSE.2008.24","url":"https://dblp.org/rec/journals/tse/ChangPY08"}, "url":"URL#5307605" }, { "@score":"1", "@id":"5307606", "info":{"authors":{"author":[{"@pid":"97/3884","text":"Siu Nam Chuang"},{"@pid":"42/10459","text":"Alvin T. S. Chan"}]},"title":"Dynamic QoS Adaptation for Mobile Middleware.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"738-752","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/ChuangC08","doi":"10.1109/TSE.2008.44","ee":"https://doi.org/10.1109/TSE.2008.44","url":"https://dblp.org/rec/journals/tse/ChuangC08"}, "url":"URL#5307606" }, { "@score":"1", "@id":"5307607", "info":{"authors":{"author":[{"@pid":"c/JaneClelandHuang","text":"Jane Cleland-Huang"},{"@pid":"21/6638","text":"Will Marrero"},{"@pid":"27/4591","text":"Brian Berenbach"}]},"title":"Goal-Centric Traceability: Using Virtual Plumblines to Maintain Critical Systemic Qualities.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"5","pages":"685-699","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/Cleland-HuangMB08","doi":"10.1109/TSE.2008.45","ee":"https://doi.org/10.1109/TSE.2008.45","url":"https://dblp.org/rec/journals/tse/Cleland-HuangMB08"}, "url":"URL#5307607" }, { "@score":"1", "@id":"5307608", "info":{"authors":{"author":[{"@pid":"79/5975","text":"Myra B. Cohen"},{"@pid":"d/MatthewBDwyer","text":"Matthew B. Dwyer"},{"@pid":"50/3826","text":"Jiangfan Shi"}]},"title":"Constructing Interaction Test Suites for Highly-Configurable Systems in the Presence of Constraints: A Greedy Approach.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"5","pages":"633-650","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/CohenDS08","doi":"10.1109/TSE.2008.50","ee":"https://doi.org/10.1109/TSE.2008.50","url":"https://dblp.org/rec/journals/tse/CohenDS08"}, "url":"URL#5307608" }, { "@score":"1", "@id":"5307609", "info":{"authors":{"author":[{"@pid":"d/DanielaEDamian","text":"Daniela E. Damian"},{"@pid":"29/4646","text":"Filippo Lanubile"},{"@pid":"33/3044","text":"Teresa Mallardo"}]},"title":"On the Need for Mixed Media in Distributed Requirements Negotiations.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"116-132","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/DamianLM08","doi":"10.1109/TSE.2007.70758","ee":"https://doi.org/10.1109/TSE.2007.70758","url":"https://dblp.org/rec/journals/tse/DamianLM08"}, "url":"URL#5307609" }, { "@score":"1", "@id":"5307610", "info":{"authors":{"author":[{"@pid":"51/1256","text":"Lieven Desmet"},{"@pid":"89/2314","text":"Pierre Verbaeten"},{"@pid":"13/86","text":"Wouter Joosen"},{"@pid":"85/6647","text":"Frank Piessens"}]},"title":"Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"50-64","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/DesmetVJP08","doi":"10.1109/TSE.2007.70742","ee":"https://doi.org/10.1109/TSE.2007.70742","url":"https://dblp.org/rec/journals/tse/DesmetVJP08"}, "url":"URL#5307610" }, { "@score":"1", "@id":"5307611", "info":{"authors":{"author":[{"@pid":"36/5445","text":"Danny Dig"},{"@pid":"33/6149","text":"Kashif Manzoor"},{"@pid":"j/RalphEJohnson","text":"Ralph E. Johnson"},{"@pid":"56/6902","text":"Tien N. Nguyen"}]},"title":"Effective Software Merging in the Presence of Object-Oriented Refactorings.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"3","pages":"321-335","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/DigMJN08","doi":"10.1109/TSE.2008.29","ee":"https://doi.org/10.1109/TSE.2008.29","url":"https://dblp.org/rec/journals/tse/DigMJN08"}, "url":"URL#5307611" }, { "@score":"1", "@id":"5307612", "info":{"authors":{"author":[{"@pid":"02/82","text":"Torgeir Dingsøyr"},{"@pid":"26/6303","text":"Nils Brede Moe"}]},"title":"The Impact of Employee Participation on the Use of an Electronic Process Guide: A Longitudinal Case Study.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"212-225","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/DingsoyrM08","doi":"10.1109/TSE.2007.70767","ee":"https://doi.org/10.1109/TSE.2007.70767","url":"https://dblp.org/rec/journals/tse/DingsoyrM08"}, "url":"URL#5307612" }, { "@score":"1", "@id":"5307613", "info":{"authors":{"author":[{"@pid":"d/ShlomiDolev","text":"Shlomi Dolev"},{"@pid":"40/3537","text":"Reuven Yagel"}]},"title":"Towards Self-Stabilizing Operating Systems.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"564-576","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/DolevY08","doi":"10.1109/TSE.2008.46","ee":"https://doi.org/10.1109/TSE.2008.46","url":"https://dblp.org/rec/journals/tse/DolevY08"}, "url":"URL#5307613" }, { "@score":"1", "@id":"5307614", "info":{"authors":{"author":[{"@pid":"33/6517","text":"Jin Song Dong"},{"@pid":"64/5","text":"Ping Hao"},{"@pid":"q/ShengchaoQin","text":"Shengchao Qin"},{"@pid":"s/JunSun1","text":"Jun Sun 0001"},{"@pid":"y/WangYi","text":"Wang Yi 0001"}]},"title":"Timed Automata Patterns.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"844-859","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/DongHQSY08","doi":"10.1109/TSE.2008.52","ee":"https://doi.org/10.1109/TSE.2008.52","url":"https://dblp.org/rec/journals/tse/DongHQSY08"}, "url":"URL#5307614" }, { "@score":"1", "@id":"5307615", "info":{"authors":{"author":[{"@pid":"27/1827","text":"Wojciech J. Dzidek"},{"@pid":"27/5178","text":"Erik Arisholm"},{"@pid":"93/1501","text":"Lionel C. Briand"}]},"title":"A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"3","pages":"407-432","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/DzidekAB08","doi":"10.1109/TSE.2008.15","ee":"https://doi.org/10.1109/TSE.2008.15","url":"https://dblp.org/rec/journals/tse/DzidekAB08"}, "url":"URL#5307615" }, { "@score":"1", "@id":"5307616", "info":{"authors":{"author":[{"@pid":"56/2170","text":"Marc Eaddy"},{"@pid":"19/3622-1","text":"Thomas Zimmermann 0001"},{"@pid":"87/6192","text":"Kaitin D. Sherwood"},{"@pid":"11/5033","text":"Vibhav Garg"},{"@pid":"95/712","text":"Gail C. Murphy"},{"@pid":"91/1758","text":"Nachiappan Nagappan"},{"@pid":"a/AVAho","text":"Alfred V. Aho"}]},"title":"Do Crosscutting Concerns Cause Defects?","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"497-515","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/EaddyZSGMNA08","doi":"10.1109/TSE.2008.36","ee":"https://doi.org/10.1109/TSE.2008.36","url":"https://dblp.org/rec/journals/tse/EaddyZSGMNA08"}, "url":"URL#5307616" }, { "@score":"1", "@id":"5307617", "info":{"authors":{"author":[{"@pid":"e/MJEscalonaCuaresma","text":"María José Escalona Cuaresma"},{"@pid":"26/60","text":"Gustavo Aragón"}]},"title":"NDT. A Model-Driven Approach for Web Requirements.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"3","pages":"377-390","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/EscalonaA08","doi":"10.1109/TSE.2008.27","ee":"https://doi.org/10.1109/TSE.2008.27","url":"https://dblp.org/rec/journals/tse/EscalonaA08"}, "url":"URL#5307617" }, { "@score":"1", "@id":"5307618", "info":{"authors":{"author":[{"@pid":"g/KBGallagher","text":"Keith B. Gallagher"},{"@pid":"16/694","text":"Andrew Hatch"},{"@pid":"m/MalcolmMunro","text":"Malcolm Munro"}]},"title":"Software Architecture Visualization: An Evaluation Framework and Its Application.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"260-270","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/GallagherHM08","doi":"10.1109/TSE.2007.70757","ee":"https://doi.org/10.1109/TSE.2007.70757","url":"https://dblp.org/rec/journals/tse/GallagherHM08"}, "url":"URL#5307618" }, { "@score":"1", "@id":"5307619", "info":{"authors":{"author":[{"@pid":"20/6995","text":"Yann-Gaël Guéhéneuc"},{"@pid":"73/3515","text":"Giuliano Antoniol"}]},"title":"DeMIMA: A Multilayered Approach for Design Pattern Identification.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"5","pages":"667-684","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/GueheneucA08","doi":"10.1109/TSE.2008.48","ee":"https://doi.org/10.1109/TSE.2008.48","url":"https://dblp.org/rec/journals/tse/GueheneucA08"}, "url":"URL#5307619" }, { "@score":"1", "@id":"5307620", "info":{"authors":{"author":[{"@pid":"64/239","text":"Syed Waseem Haider"},{"@pid":"00/2250","text":"João W. Cangussu"},{"@pid":"85/5392","text":"Kendra M. L. Cooper"},{"@pid":"82/5236","text":"Ram Dantu"},{"@pid":"87/1410","text":"Syed Haider"}]},"title":"Estimation of Defects Based on Defect Decay Model: ED{3}M.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"3","pages":"336-356","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/HaiderCCDH08","doi":"10.1109/TSE.2008.23","ee":"https://doi.org/10.1109/TSE.2008.23","url":"https://dblp.org/rec/journals/tse/HaiderCCDH08"}, "url":"URL#5307620" }, { "@score":"1", "@id":"5307621", "info":{"authors":{"author":[{"@pid":"11/6595","text":"Charles B. Haley"},{"@pid":"06/5607","text":"Robin C. Laney"},{"@pid":"54/1657","text":"Jonathan D. Moffett"},{"@pid":"26/1319","text":"Bashar Nuseibeh"}]},"title":"Security Requirements Engineering: A Framework for Representation and Analysis.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"133-153","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/HaleyLMN08","doi":"10.1109/TSE.2007.70754","ee":"https://doi.org/10.1109/TSE.2007.70754","url":"https://dblp.org/rec/journals/tse/HaleyLMN08"}, "url":"URL#5307621" }, { "@score":"1", "@id":"5307622", "info":{"authors":{"author":[{"@pid":"04/4583","text":"William G. J. Halfond"},{"@pid":"35/805","text":"Alessandro Orso"},{"@pid":"40/4888","text":"Pete Manolios"}]},"title":"WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"65-81","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/HalfondOM08","doi":"10.1109/TSE.2007.70748","ee":"https://doi.org/10.1109/TSE.2007.70748","url":"https://dblp.org/rec/journals/tse/HalfondOM08"}, "url":"URL#5307622" }, { "@score":"1", "@id":"5307623", "info":{"authors":{"author":[{"@pid":"68/4817","text":"Jon G. Hall"},{"@pid":"89/3806","text":"Lucia Rapanotti"},{"@pid":"92/1629-1","text":"Michael Jackson 0001"}]},"title":"Problem Oriented Software Engineering: Solving the Package Router Control Problem.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"226-241","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/HallRJ08","doi":"10.1109/TSE.2007.70769","ee":"https://doi.org/10.1109/TSE.2007.70769","url":"https://dblp.org/rec/journals/tse/HallRJ08"}, "url":"URL#5307623" }, { "@score":"1", "@id":"5307624", "info":{"authors":{"author":[{"@pid":"58/3223","text":"Jo Erskine Hannay"},{"@pid":"26/5690","text":"Magne Jørgensen"}]},"title":"The Role of Deliberate Artificial Design Elements in Software Engineering Experiments.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"242-259","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/HannayJ08","doi":"10.1109/TSE.2008.13","ee":"https://doi.org/10.1109/TSE.2008.13","url":"https://dblp.org/rec/journals/tse/HannayJ08"}, "url":"URL#5307624" }, { "@score":"1", "@id":"5307625", "info":{"authors":{"author":[{"@pid":"h/ConstanceLHeitmeyer","text":"Constance L. Heitmeyer"},{"@pid":"15/4421","text":"Myla Archer"},{"@pid":"99/5383","text":"Elizabeth I. Leonard"},{"@pid":"55/1754","text":"John McLean"}]},"title":"Applying Formal Methods to a Certifiably Secure Software System.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"82-98","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/HeitmeyerALM08","doi":"10.1109/TSE.2007.70772","ee":"https://doi.org/10.1109/TSE.2007.70772","url":"https://dblp.org/rec/journals/tse/HeitmeyerALM08"}, "url":"URL#5307625" }, { "@score":"1", "@id":"5307626", "info":{"authors":{"author":[{"@pid":"h/JohannesHenkel","text":"Johannes Henkel"},{"@pid":"98/4527","text":"Christoph Reichenbach"},{"@pid":"d/AmerDiwan","text":"Amer Diwan"}]},"title":"Errata for "Discovering Documentation for Java Container Classes".","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"303","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/HenkelRD08","doi":"10.1109/TSE.2008.22","ee":"https://doi.org/10.1109/TSE.2008.22","url":"https://dblp.org/rec/journals/tse/HenkelRD08"}, "url":"URL#5307626" }, { "@score":"1", "@id":"5307627", "info":{"authors":{"author":[{"@pid":"52/3183","text":"Graham Hughes"},{"@pid":"07/3368","text":"Tevfik Bultan"}]},"title":"Interface Grammars for Modular Software Model Checking.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"5","pages":"614-632","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/HughesB08","doi":"10.1109/TSE.2008.72","ee":"https://doi.org/10.1109/TSE.2008.72","url":"https://dblp.org/rec/journals/tse/HughesB08"}, "url":"URL#5307627" }, { "@score":"1", "@id":"5307628", "info":{"authors":{"author":[{"@pid":"86/7853","text":"Jacky Keung"},{"@pid":"k/BarbaraAKitchenham","text":"Barbara A. Kitchenham"},{"@pid":"99/2957","text":"D. Ross Jeffery"}]},"title":"Analogy-X: Providing Statistical Inference to Analogy-Based Software Cost Estimation.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"471-484","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/KeungKJ08","doi":"10.1109/TSE.2008.34","ee":"https://doi.org/10.1109/TSE.2008.34","url":"https://dblp.org/rec/journals/tse/KeungKJ08"}, "url":"URL#5307628" }, { "@score":"1", "@id":"5307629", "info":{"authors":{"author":[{"@pid":"k/SunghunKim","text":"Sunghun Kim 0001"},{"@pid":"w/EJWhiteheadJr","text":"E. James Whitehead Jr."},{"@pid":"64/6544-1","text":"Yi Zhang 0001"}]},"title":"Classifying Software Changes: Clean or Buggy?","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"181-196","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/KimWZ08","doi":"10.1109/TSE.2007.70773","ee":"https://doi.org/10.1109/TSE.2007.70773","url":"https://dblp.org/rec/journals/tse/KimWZ08"}, "url":"URL#5307629" }, { "@score":"1", "@id":"5307630", "info":{"authors":{"author":[{"@pid":"72/4278","text":"Achmad I. Kistijantoro"},{"@pid":"71/4301","text":"Graham Morgan"},{"@pid":"37/5945","text":"Santosh K. Shrivastava"},{"@pid":"77/210","text":"Mark C. Little"}]},"title":"Enhancing an Application Server to Support Available Components.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"531-545","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/KistijantoroMSL08","doi":"10.1109/TSE.2008.38","ee":"https://doi.org/10.1109/TSE.2008.38","url":"https://dblp.org/rec/journals/tse/KistijantoroMSL08"}, "url":"URL#5307630" }, { "@score":"1", "@id":"5307631", "info":{"authors":{"author":{"@pid":"k/JeffKramer","text":"Jeff Kramer"}},"title":"State of the Journal Address.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"1-2","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/Kramer08","doi":"10.1109/TSE.2008.12","ee":"https://doi.org/10.1109/TSE.2008.12","url":"https://dblp.org/rec/journals/tse/Kramer08"}, "url":"URL#5307631" }, { "@score":"1", "@id":"5307632", "info":{"authors":{"author":{"@pid":"k/JeffKramer","text":"Jeff Kramer"}},"title":"Editorial: New Associate Editor Introduction.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"161","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/Kramer08a","doi":"10.1109/TSE.2008.21","ee":"https://doi.org/10.1109/TSE.2008.21","url":"https://dblp.org/rec/journals/tse/Kramer08a"}, "url":"URL#5307632" }, { "@score":"1", "@id":"5307633", "info":{"authors":{"author":[{"@pid":"07/3592","text":"Stefan Lessmann"},{"@pid":"43/4264","text":"Bart Baesens"},{"@pid":"69/5663","text":"Christophe Mues"},{"@pid":"16/2605","text":"Swantje Pietsch"}]},"title":"Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"485-496","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/LessmannBMP08","doi":"10.1109/TSE.2008.35","ee":"https://doi.org/10.1109/TSE.2008.35","url":"https://dblp.org/rec/journals/tse/LessmannBMP08"}, "url":"URL#5307633" }, { "@score":"1", "@id":"5307634", "info":{"authors":{"author":[{"@pid":"47/3099","text":"Jingyue Li"},{"@pid":"c/ReidarConradi","text":"Reidar Conradi"},{"@pid":"02/1626","text":"Odd Petter N. Slyngstad"},{"@pid":"63/2259","text":"Marco Torchiano"},{"@pid":"m/MaurizioMorisio","text":"Maurizio Morisio"},{"@pid":"12/6986","text":"Christian Bunse"}]},"title":"A State-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Components.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"271-286","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/LiCSTMB08","doi":"10.1109/TSE.2008.14","ee":"https://doi.org/10.1109/TSE.2008.14","url":"https://dblp.org/rec/journals/tse/LiCSTMB08"}, "url":"URL#5307634" }, { "@score":"1", "@id":"5307635", "info":{"authors":{"author":[{"@pid":"15/5923-1","text":"Chao Liu 0001"},{"@pid":"95/3760-1","text":"Xiangyu Zhang 0001"},{"@pid":"h/JiaweiHan","text":"Jiawei Han 0001"}]},"title":"A Systematic Study of Failure Proximity.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"826-843","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/LiuZH08","doi":"10.1109/TSE.2008.66","ee":"https://doi.org/10.1109/TSE.2008.66","url":"https://dblp.org/rec/journals/tse/LiuZH08"}, "url":"URL#5307635" }, { "@score":"1", "@id":"5307636", "info":{"authors":{"author":[{"@pid":"38/6989","text":"Kim Man Lui"},{"@pid":"71/6513","text":"Keith C. C. Chan"},{"@pid":"29/1815","text":"John T. Nosek"}]},"title":"The Effect of Pairs in Program Design Tasks.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"197-211","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/LuiCN08","doi":"10.1109/TSE.2007.70755","ee":"https://doi.org/10.1109/TSE.2007.70755","url":"https://dblp.org/rec/journals/tse/LuiCN08"}, "url":"URL#5307636" }, { "@score":"1", "@id":"5307637", "info":{"authors":{"author":[{"@pid":"m/AndrianMarcus","text":"Andrian Marcus"},{"@pid":"02/320","text":"Denys Poshyvanyk"},{"@pid":"f/RudolfFerenc","text":"Rudolf Ferenc"}]},"title":"Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"287-300","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/MarcusPF08","doi":"10.1109/TSE.2007.70768","ee":"https://doi.org/10.1109/TSE.2007.70768","url":"https://dblp.org/rec/journals/tse/MarcusPF08"}, "url":"URL#5307637" }, { "@score":"1", "@id":"5307638", "info":{"authors":{"author":[{"@pid":"m/PatrickDrewMcDaniel","text":"Patrick D. McDaniel"},{"@pid":"26/1319","text":"Bashar Nuseibeh"}]},"title":"Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"3-4","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/McDanielN08","doi":"10.1109/TSE.2008.10","ee":"https://doi.org/10.1109/TSE.2008.10","url":"https://dblp.org/rec/journals/tse/McDanielN08"}, "url":"URL#5307638" }, { "@score":"1", "@id":"5307639", "info":{"authors":{"author":[{"@pid":"67/112","text":"Scott McMaster"},{"@pid":"m/AtifMMemon","text":"Atif M. Memon"}]},"title":"Call-Stack Coverage for GUI Test Suite Reduction.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"99-115","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/McMasterM08","doi":"10.1109/TSE.2007.70756","ee":"https://doi.org/10.1109/TSE.2007.70756","url":"https://dblp.org/rec/journals/tse/McMasterM08"}, "url":"URL#5307639" }, { "@score":"1", "@id":"5307640", "info":{"authors":{"author":[{"@pid":"m/EMendes","text":"Emilia Mendes"},{"@pid":"43/1246","text":"Nile Mosley"}]},"title":"Bayesian Network Models for Web Effort Prediction: A Comparative Study.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"723-737","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/MendesM08","doi":"10.1109/TSE.2008.64","ee":"https://doi.org/10.1109/TSE.2008.64","url":"https://dblp.org/rec/journals/tse/MendesM08"}, "url":"URL#5307640" }, { "@score":"1", "@id":"5307641", "info":{"authors":{"author":[{"@pid":"18/2967","text":"Meine van der Meulen"},{"@pid":"75/6170","text":"Miguel A. Revilla"}]},"title":"The Effectiveness of Software Diversity in a Large Population of Programs.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"753-764","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/MeulenR08","doi":"10.1109/TSE.2008.70","ee":"https://doi.org/10.1109/TSE.2008.70","url":"https://dblp.org/rec/journals/tse/MeulenR08"}, "url":"URL#5307641" }, { "@score":"1", "@id":"5307642", "info":{"authors":{"author":{"@pid":"34/2678","text":"Bill Mitchell"}},"title":"Characterizing Communication Channel Deadlocks in Sequence Diagrams.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"3","pages":"305-320","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/Mitchell08","doi":"10.1109/TSE.2008.28","ee":"https://doi.org/10.1109/TSE.2008.28","url":"https://dblp.org/rec/journals/tse/Mitchell08"}, "url":"URL#5307642" }, { "@score":"1", "@id":"5307643", "info":{"authors":{"author":[{"@pid":"09/884","text":"Trevor Parsons"},{"@pid":"16/6077","text":"Adrian Mos"},{"@pid":"26/7039","text":"Mircea Trofin"},{"@pid":"83/2798","text":"Thomas Gschwind"},{"@pid":"87/4649-1","text":"John Murphy 0001"}]},"title":"Extracting Interactions in Component-Based Systems.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"783-799","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/ParsonsMTGM08","doi":"10.1109/TSE.2008.67","ee":"https://doi.org/10.1109/TSE.2008.67","url":"https://dblp.org/rec/journals/tse/ParsonsMTGM08"}, "url":"URL#5307643" }, { "@score":"1", "@id":"5307644", "info":{"authors":{"author":[{"@pid":"65/1450","text":"Per Rovegard"},{"@pid":"16/4783","text":"Lefteris Angelis"},{"@pid":"w/ClaesWohlin","text":"Claes Wohlin"}]},"title":"An Empirical Study on Views of Importance of Change Impact Analysis Issues.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"516-530","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/RovegardAW08","doi":"10.1109/TSE.2008.32","ee":"https://doi.org/10.1109/TSE.2008.32","url":"https://dblp.org/rec/journals/tse/RovegardAW08"}, "url":"URL#5307644" }, { "@score":"1", "@id":"5307645", "info":{"authors":{"author":[{"@pid":"67/3321","text":"Matthew J. Rutherford"},{"@pid":"53/4439","text":"Antonio Carzaniga"},{"@pid":"w/AlexanderLWolf","text":"Alexander L. Wolf"}]},"title":"Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"452-470","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/RutherfordCW08","doi":"10.1109/TSE.2008.33","ee":"https://doi.org/10.1109/TSE.2008.33","url":"https://dblp.org/rec/journals/tse/RutherfordCW08"}, "url":"URL#5307645" }, { "@score":"1", "@id":"5307646", "info":{"authors":{"author":[{"@pid":"00/1826","text":"Santonu Sarkar"},{"@pid":"k/AKak","text":"Avinash C. Kak"},{"@pid":"53/6847","text":"Girish Maskeri Rama"}]},"title":"Metrics for Measuring the Quality of Modularization of Large-Scale Object-Oriented Software.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"5","pages":"700-720","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/SarkarKR08","doi":"10.1109/TSE.2008.43","ee":"https://doi.org/10.1109/TSE.2008.43","url":"https://dblp.org/rec/journals/tse/SarkarKR08"}, "url":"URL#5307646" }, { "@score":"1", "@id":"5307647", "info":{"authors":{"author":[{"@pid":"92/128","text":"Sharon Shoham"},{"@pid":"54/5133","text":"Eran Yahav"},{"@pid":"f/StephenFink","text":"Stephen J. Fink"},{"@pid":"p/MarcoPistoia","text":"Marco Pistoia"}]},"title":"Static Specification Mining Using Automata-Based Abstractions.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"5","pages":"651-666","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/ShohamYFP08","doi":"10.1109/TSE.2008.63","ee":"https://doi.org/10.1109/TSE.2008.63","url":"https://dblp.org/rec/journals/tse/ShohamYFP08"}, "url":"URL#5307647" }, { "@score":"1", "@id":"5307648", "info":{"authors":{"author":[{"@pid":"78/6446","text":"Jonathan Sillito"},{"@pid":"95/712","text":"Gail C. Murphy"},{"@pid":"89/840","text":"Kris De Volder"}]},"title":"Asking and Answering Questions during a Programming Change Task.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"4","pages":"434-451","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/SillitoMV08","doi":"10.1109/TSE.2008.26","ee":"https://doi.org/10.1109/TSE.2008.26","url":"https://dblp.org/rec/journals/tse/SillitoMV08"}, "url":"URL#5307648" }, { "@score":"1", "@id":"5307649", "info":{"authors":{"author":[{"@pid":"s/SaurabhSrivastava","text":"Saurabh Srivastava 0001"},{"@pid":"h/MichaelWHicks","text":"Michael Hicks 0001"},{"@pid":"18/2050","text":"Jeffrey S. Foster"},{"@pid":"11/6928","text":"Patrick Jenkins"}]},"title":"Modular Information Hiding and Type-Safe Linking for C.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"3","pages":"357-376","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/SrivastavaHFJ08","doi":"10.1109/TSE.2008.25","ee":"https://doi.org/10.1109/TSE.2008.25","url":"https://dblp.org/rec/journals/tse/SrivastavaHFJ08"}, "url":"URL#5307649" }, { "@score":"1", "@id":"5307650", "info":{"authors":{"author":[{"@pid":"05/4127","text":"Westley Weimer"},{"@pid":"55/693","text":"Nina Mishra"}]},"title":"Privately Finding Specifications.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"1","pages":"21-32","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/WeimerM08","doi":"10.1109/TSE.2007.70744","ee":"https://doi.org/10.1109/TSE.2007.70744","url":"https://dblp.org/rec/journals/tse/WeimerM08"}, "url":"URL#5307650" }, { "@score":"1", "@id":"5307651", "info":{"authors":{"author":[{"@pid":"46/999-11","text":"Bo Yang 0011"},{"@pid":"05/779","text":"Huajun Hu"},{"@pid":"13/408","text":"Lixin Jia"}]},"title":"A Study of Uncertainty in Software Cost and Its Impact on Optimal Software Release Time.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"6","pages":"813-825","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/YangHJ08","doi":"10.1109/TSE.2008.47","ee":"https://doi.org/10.1109/TSE.2008.47","url":"https://dblp.org/rec/journals/tse/YangHJ08"}, "url":"URL#5307651" }, { "@score":"1", "@id":"5307652", "info":{"authors":{"author":{"@pid":"29/2726-2","text":"Hongyu Zhang 0002"}},"title":"On the Distribution of Software Faults.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"2","pages":"301-302","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/Zhang08","doi":"10.1109/TSE.2007.70771","ee":"https://doi.org/10.1109/TSE.2007.70771","url":"https://dblp.org/rec/journals/tse/Zhang08"}, "url":"URL#5307652" }, { "@score":"1", "@id":"5307653", "info":{"authors":{"author":[{"@pid":"76/5177","text":"Tao Zheng"},{"@pid":"w/CMurrayWoodside","text":"C. Murray Woodside"},{"@pid":"55/887","text":"Marin Litoiu"}]},"title":"Performance Model Estimation and Tracking Using Optimal Filters.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"3","pages":"391-406","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/ZhengWL08","doi":"10.1109/TSE.2008.30","ee":"https://doi.org/10.1109/TSE.2008.30","url":"https://dblp.org/rec/journals/tse/ZhengWL08"}, "url":"URL#5307653" }, { "@score":"1", "@id":"5307654", "info":{"authors":{"author":[{"@pid":"16/608","text":"Marcelo d'Amorim"},{"@pid":"93/2152","text":"Steven Lauterburg"},{"@pid":"48/3911","text":"Darko Marinov"}]},"title":"Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs.","venue":"IEEE Trans. Software Eng.","volume":"34","number":"5","pages":"597-613","year":"2008","type":"Journal Articles","access":"closed","key":"journals/tse/dAmorimLM08","doi":"10.1109/TSE.2008.37","ee":"https://doi.org/10.1109/TSE.2008.37","url":"https://dblp.org/rec/journals/tse/dAmorimLM08"}, "url":"URL#5307654" } ] } } } )