default search action
IJSEKE, Volume 17
Volume 17, Number 1, February 2007
- Guest Editors' Introduction. 1-2
- Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi:
Specification and Verification of Workflows with Rbac Mechanism and Sod Constraints. 3-32 - Tegegne Marew, Jungyoon Kim, Doo-Hwan Bae:
Systematic Functional Decomposition in a Product Line Using Aspect-oriented Software Development: a Case Study. 33-56 - Yean-Ru Chen, Pao-Ann Hsiung:
Automatic Failure Analysis Using Safecharts. 57-78 - Xavier Franch, Gemma Grau, Enric Mayol, Carme Quer, Claudia P. Ayala, Carlos Cares, Fredy Navarrete, Mariela Haya, Pere Botella:
Systematic Construction of I* Strategic Dependency Models for Socio-technical Systems. 79-106 - Oscar Mondragon, Ann Q. Gates, Steve Roach, Humberto Mendoza, Oleg Sokolsky:
Generating Properties for Runtime Monitoring from Software Specification Patterns. 107-126 - Sumanth Yenduri, S. Sitharama Iyengar:
Performance Evaluation of Imputation Methods for Incomplete Datasets. 127-152 - Gregor Stiglic, Matej Mertik, Peter Kokol, Maurizio Pighin:
Detecting Fault Modules Using Bioinformatics Techniques. 153
Volume 17, Number 2, April 2007
- Kang Zhang, George Spanoudakis, Giuseppe Visaggio:
Guest Editors: Introduction. 167-169 - David Garlan, Bradley R. Schmerl:
The Radar Architecture for Personal Cognitive Assistance. 171-190 - Xin Li, Shi-Kuo Chang:
User Profiling in the Chronobot/Virtual Classroom System. 191-206 - Beata Sarna-Starosta, R. E. Kurt Stirewalt, Laura K. Dillon:
A Model-Based Design-for-Verification Approach to Checking for Deadlock in Multi-Threaded Applications. 207-230 - Marco Scotto, Alberto Sillitti, Giancarlo Succi:
An Empirical Analysis of the Open Source Development Process Based on Mining of Source Code Repositories. 231-247 - Wei Sun, Xin Zhang, Ying Liu, Zhong Tian:
Abstract Logic Tree Based Framework for Component Based Solution Composition Design and Execution. 249-263 - Fabio Massacci, John Mylopoulos, Nicola Zannone:
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. 265-284 - Haralambos Mouratidis, Paolo Giorgini:
Secure Tropos: a Security-Oriented Extension of the Tropos Methodology. 285-309
Volume 17, Number 3, June 2007
- Jerry Gao, Sami Beydeda:
Guest Editors' Introduction. 311-313 - Stephen H. Edwards, Westley Haggard:
A Flexible Strategy for Embedding and Configuring Run-Time Contract Checks in .Net Components. 315-338 - Daniel L. Barbosa, Helton S. Lima, Patrícia D. L. Machado, Jorge C. A. de Figueiredo, Makelli A. Jucá, Wilkerson de L. Andrade:
Automating Functional Testing of Components from UML Specifications. 339-358 - Mats Skoglund, Per Runeson:
Improving Class Firewall Regression Test Selection by Removing the Class Firewall. 359-378 - Rakesh Shukla, Paul A. Strooper, David A. Carrington:
A Framework for Statistical Testing of Software Components. 379-405 - Javier Garzás, Mario Piattini:
An Ontology for Understanding and Applying Object-Oriented Design Knowledge. 407-421 - E. Ramaraj, S. Duraisamy:
Design Optimization Metrics for UML Based Object-Oriented Systems. 423-448
Volume 17, Number 4, August 2007
- Angela Guercio, Timothy Arndt:
Guest Editors' Introduction. 449 - J. R. Parker, Brad Behm:
Composite Algorithms in Image Content Searches. 451-463 - Pål Halvorsen, Tom Anders Dalseng, Carsten Griwodz:
Assessment of Linux' Data Path Implementations for Download and Streaming. 465-481 - Ronggong Song, Larry Korba, George Yee, Ying-Chieh Chen:
Protect Virtual Property in Online Gaming System. 483-496 - Andrea F. Abate, Michele Nappi, Daniel Riccio, Genoveffa Tortora:
Rbs: a Robust Bimodal System for Face Recognition. 497-513 - Eelke Folmer, Jan Bosch:
A Pattern Framework for Software Quality Assessment and Tradeoff Analysis. 515-538 - Simon Lucas Winberg, Stephen R. Schach:
A Pilot Study of Productive versus Nonproductive Knowledge Acquisition in Embedded Software Development. 539-556
Volume 17, Number 5, October 2007
- Shi-Kuo Chang, Perry Rajnovic, Mark Zalar:
Ic Card: Visual Specification for Rapid Prototyping of Time-Critical Applications. 557-573 - Jianguo Lu, Ju Wang, Shengrui Wang:
Xml Schema Matching. 575-597 - Chung-Horng Lung, Xia Xu, Marzia Zaman:
Software Architecture Decomposition Using Attributes. 599-613 - Vincent Hilaire, Pablo Gruer, Abder Koukam, Olivier Simonin:
Formal Specification Approach of Role Dynamics in Agent Organisations: Application to the Satisfaction-Altruism Model. 615-641 - Thanasis Hadzilacos, Dimitris Kalles, Maria Pouliopoulou:
On the Software and Knowledge Engineering Aspects of the Educational Process. 643-662 - Ron Hira, Óscar Dieste Tubío, George Spanoudakis, Giuseppe Visaggio, Guido Wirtz, S. K. Chang:
It-Outsourcing and IT-Offshoring: Trends and Impacts on SE/KE Curricula. 663-685
Volume 17, Number 6, December 2007
- Hong Mei, T. H. Tse:
Guest Editors' Introduction. 687-688 - Victor K. Y. Chan, W. Eric Wong, Tianfa Xie:
A Statistical Methodology to Simplify Software Metric Models Constructed Using Incomplete Data Samples. 689-707 - Yujian Fu, Zhijiang Dong, Xudong He:
A Translator of Software Architecture Design from SAM to Java. 709-755 - Ralph Guderlei, Johannes Mayer:
Towards Automatic Testing of Imaging Software by Means of Random and Metamorphic Testing. 757-781 - Masahiro Nakano, Kazuhiro Ogata, Masaki Nakamura, Kokichi Futatsugi:
CrÈme: an Automatic Invariant Prover of Behavioral Specifications. 783-804 - Tsong Yueh Chen, Fei-Ching Kuo, Zhiquan Zhou:
On Favourable Conditions for Adaptive Random Testing. 805-825 - Päivi Parviainen, Maarit Tihinen:
A Survey of Existing Requirements Engineering Technologies and their Coverage. 827-850
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.