


default search action
IEEE Transactions on Software Engineering (TSE), Volume 34
Volume 34, Number 1, January 2008
- Jeff Kramer:

State of the Journal Address. 1-2 - Patrick D. McDaniel, Bashar Nuseibeh:

Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems. 3-4 - Travis D. Breaux

, Annie I. Antón:
Analyzing Regulatory Rules for Privacy and Security Requirements. 5-20 - Westley Weimer, Nina Mishra:

Privately Finding Specifications. 21-32 - Massimo Bartoletti

, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Semantics-Based Design for Secure Web Services. 33-49 - Lieven Desmet

, Pierre Verbaeten, Wouter Joosen, Frank Piessens:
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies. 50-64 - William G. J. Halfond, Alessandro Orso, Pete Manolios

:
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation. 65-81 - Constance L. Heitmeyer

, Myla Archer, Elizabeth I. Leonard, John McLean:
Applying Formal Methods to a Certifiably Secure Software System. 82-98 - Scott McMaster, Atif M. Memon:

Call-Stack Coverage for GUI Test Suite Reduction. 99-115 - Daniela E. Damian, Filippo Lanubile

, Teresa Mallardo:
On the Need for Mixed Media in Distributed Requirements Negotiations. 116-132 - Charles B. Haley, Robin C. Laney

, Jonathan D. Moffett, Bashar Nuseibeh
:
Security Requirements Engineering: A Framework for Representation and Analysis. 133-153
Volume 34, Number 2, March/April 2008
- Jeff Kramer:

Editorial: New Associate Editor Introduction. 161 - Sven Apel

, Thomas Leich, Gunter Saake:
Aspectual Feature Modules. 162-180 - Sunghun Kim, E. James Whitehead Jr., Yi Zhang

:
Classifying Software Changes: Clean or Buggy? 181-196 - Kim Man Lui, Keith C. C. Chan

, John T. Nosek:
The Effect of Pairs in Program Design Tasks. 197-211 - Torgeir Dingsøyr

, Nils Brede Moe
:
The Impact of Employee Participation on the Use of an Electronic Process Guide: A Longitudinal Case Study. 212-225 - Jon G. Hall

, Lucia Rapanotti, Michael Jackson:
Problem Oriented Software Engineering: Solving the Package Router Control Problem. 226-241 - Jo Erskine Hannay, Magne Jørgensen:

The Role of Deliberate Artificial Design Elements in Software Engineering Experiments. 242-259 - Keith B. Gallagher

, Andrew Hatch, Malcolm Munro:
Software Architecture Visualization: An Evaluation Framework and Its Application. 260-270 - Jingyue Li

, Reidar Conradi, Odd Petter N. Slyngstad, Marco Torchiano
, Maurizio Morisio, Christian Bunse:
A State-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Components. 271-286 - Andrian Marcus

, Denys Poshyvanyk
, Rudolf Ferenc
:
Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems. 287-300 - Hongyu Zhang

:
On the Distribution of Software Faults. 301-302 - Johannes Henkel, Christoph Reichenbach

, Amer Diwan:
Errata for "Discovering Documentation for Java Container Classes". 303
Volume 34, Number 3, May/June 2008
- Bill Mitchell:

Characterizing Communication Channel Deadlocks in Sequence Diagrams. 305-320 - Danny Dig, Kashif Manzoor, Ralph E. Johnson, Tien N. Nguyen:

Effective Software Merging in the Presence of Object-Oriented Refactorings. 321-335 - Syed Waseem Haider, João W. Cangussu, Kendra M. L. Cooper, Ram Dantu, Syed Haider:

Estimation of Defects Based on Defect Decay Model: ED^{3}M. 336-356 - Saurabh Srivastava, Michael Hicks, Jeffrey S. Foster, Patrick Jenkins:

Modular Information Hiding and Type-Safe Linking for C. 357-376 - María José Escalona Cuaresma

, Gustavo Aragón:
NDT. A Model-Driven Approach for Web Requirements. 377-390 - Tao Zheng, C. Murray Woodside, Marin Litoiu

:
Performance Model Estimation and Tracking Using Optimal Filters. 391-406 - Wojciech J. Dzidek, Erik Arisholm, Lionel C. Briand:

A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance. 407-432
Volume 34, Number 4, July-August 2008
- Jonathan Sillito, Gail C. Murphy, Kris De Volder:

Asking and Answering Questions during a Programming Change Task. 434-451 - Matthew J. Rutherford, Antonio Carzaniga

, Alexander L. Wolf:
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems. 452-470 - Jacky Keung

, Barbara A. Kitchenham
, D. Ross Jeffery:
Analogy-X: Providing Statistical Inference to Analogy-Based Software Cost Estimation. 471-484 - Stefan Lessmann

, Bart Baesens, Christophe Mues
, Swantje Pietsch:
Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings. 485-496 - Marc Eaddy, Thomas Zimmermann, Kaitin D. Sherwood, Vibhav Garg, Gail C. Murphy, Nachiappan Nagappan, Alfred V. Aho:

Do Crosscutting Concerns Cause Defects? 497-515 - Per Rovegard, Lefteris Angelis, Claes Wohlin

:
An Empirical Study on Views of Importance of Change Impact Analysis Issues. 516-530 - Achmad I. Kistijantoro

, Graham Morgan
, Santosh K. Shrivastava, Mark C. Little:
Enhancing an Application Server to Support Available Components. 531-545 - Carlos Canal

, Pascal Poizat
, Gwen Salaün:
Model-Based Adaptation of Behavioral Mismatching Components. 546-563 - Shlomi Dolev

, Reuven Yagel:
Towards Self-Stabilizing Operating Systems. 564-576
Volume 34, Number 5, September-October 2008
- Ray-Yaung Chang, Andy Podgurski, Jiong Yang:

Discovering Neglected Conditions in Software by Mining Dependence Graphs. 579-596 - Marcelo d'Amorim

, Steven Lauterburg, Darko Marinov:
Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs. 597-613 - Graham Hughes, Tevfik Bultan:

Interface Grammars for Modular Software Model Checking. 614-632 - Myra B. Cohen, Matthew B. Dwyer

, Jiangfan Shi:
Constructing Interaction Test Suites for Highly-Configurable Systems in the Presence of Constraints: A Greedy Approach. 633-650 - Sharon Shoham

, Eran Yahav, Stephen J. Fink, Marco Pistoia:
Static Specification Mining Using Automata-Based Abstractions. 651-666 - Yann-Gaël Guéhéneuc, Giuliano Antoniol:

DeMIMA: A Multilayered Approach for Design Pattern Identification. 667-684 - Jane Cleland-Huang, Will Marrero, Brian Berenbach:

Goal-Centric Traceability: Using Virtual Plumblines to Maintain Critical Systemic Qualities. 685-699 - Santonu Sarkar

, Avinash C. Kak, Girish Maskeri Rama:
Metrics for Measuring the Quality of Modularization of Large-Scale Object-Oriented Software. 700-720
Volume 34, Number 6, November-December 2008
- Emilia Mendes, Nile Mosley:

Bayesian Network Models for Web Effort Prediction: A Comparative Study. 723-737 - Siu Nam Chuang, Alvin T. S. Chan:

Dynamic QoS Adaptation for Mobile Middleware. 738-752 - Meine van der Meulen, Miguel A. Revilla:

The Effectiveness of Software Diversity in a Large Population of Programs. 753-764 - Eugenio Capra, Chiara Francalanci, Francesco Merlo:

An Empirical Study on the Relationship Between Software Design Quality, Development Effort and Governance in Open Source Projects. 765-782 - Trevor Parsons, Adrian Mos

, Mircea Trofin, Thomas Gschwind, John Murphy:
Extracting Interactions in Component-Based Systems. 783-799 - Jeffrey C. Carver, Nachiappan Nagappan, Alan Page:

The Impact of Educational Background on the Effectiveness of Requirements Inspections: An Empirical Study. 800-812 - Bo Yang

, Huajun Hu, Lixin Jia:
A Study of Uncertainty in Software Cost and Its Impact on Optimal Software Release Time. 813-825 - Chao Liu, Xiangyu Zhang, Jiawei Han:

A Systematic Study of Failure Proximity. 826-843 - Jin Song Dong, Ping Hao, Shengchao Qin

, Jun Sun
, Wang Yi:
Timed Automata Patterns. 844-859

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














