default search action
9th ESEC / 11th SIGSOFT FSE 2003: Helsinki, Finland
- Jukka Paakki, Paola Inverardi:
Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, ESEC/FSE 2003, Helsinki, Finland, September 1-5, 2003. ACM 2003, ISBN 978-1-58113-743-9 - Giuseppe Longo:
Computer modelling and natural phenomena. 1-5 - Leon J. Osterweil:
Understanding process and the quest for deeper questions in software engineering research. 6-14 - Ari Jaaksi:
Assessing software projects: tools for business owners. 15-18
Requirements engineering and design
- Sebastián Uchitel, Jeff Kramer, Jeff Magee:
Behaviour model elaboration using partial labelled transition systems. 19-27 - Ralph D. Jeffords, Constance L. Heitmeyer:
A strategy for efficiently verifying requirements. 28-37 - Holger Giese, Matthias Tichy, Sven Burmester, Stephan Flake:
Towards the compositional verification of real-time UML designs. 38-47 - Don S. Batory, Jia Liu, Jacob Neal Sarvela:
Refinements and multi-dimensional separation of concerns. 48-57
Software architectures, patterns, and frameworks
- Petri Selonen, Jianli Xu:
Validating UML models against architectural profiles. 58-67 - Luciano Baresi, Reiko Heckel, Sebastian Thöne, Dániel Varró:
Modeling and validation of service-oriented architectures: application vs. style. 68-77 - Jeremy S. Bradbury, Jürgen Dingel:
Evaluating and improving the automatic analysis of implicit invocation systems. 78-87 - Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems. 88-97
Testing and test tools
- Gregory M. Kapfhammer, Mary Lou Soffa:
A family of test adequacy criteria for database-driven applications. 98-107 - Nguyen Tran Sy, Yves Deville:
Consistency techniques for interprocedural test data generation. 108-117 - Atif M. Memon, Mary Lou Soffa:
Regression testing of GUIs. 118-127 - Alessandro Orso, Taweesup Apiwattanapong, Mary Jean Harrold:
Leveraging field data for impact analysis and regression testing. 128-137
Software process and workflow
- James D. Herbsleb, Audris Mockus:
Formulation and preliminary test of an empirical theory of coordination in software engineering. 138-137 - Tore Dybå:
Factors of software process improvement success in small and large organizations: an empirical study in the scandinavian context. 148-157 - João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur:
Monitoring the software test process using statistical process control: a logarithmic approach. 158-167 - Matthias M. Müller, Frank Padberg:
On the economic evaluation of XP projects. 168-177
Validation and verification
- Jens Krinke:
Context-sensitive slicing of concurrent programs. 178-187 - Oksana Tkachuk, Matthew B. Dwyer:
Adapting side effects analysis for modular program model checking. 188-197 - Dennis Brylow, Jens Palsberg:
Deadline analysis of interrupt-driven software. 198-207 - Claus Pahl, Michael Casey:
Ontology support for web service processes. 208-216
Software reuse and evolution
- Jukka Viljamaa:
Reverse engineering framework reuse interfaces. 217-226 - Dirk Ohst, Michael Welle, Udo Kelter:
Differences between versions of UML diagrams. 227-236
Software analysis and model checking
- Stan Jarzabek, Shubiao Li:
Eliminating redundancies with a "composition with adaptation" meta-programming technique. 237-246 - Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia-Yi Pan:
Towards scalable compositional analysis by refactoring design models. 247-256 - Dimitra Giannakopoulou, Jeff Magee:
Fluent model checking for event-based systems. 257-266 - Robby, Matthew B. Dwyer, John Hatcliff:
Bogor: an extensible and highly-modular software model checking framework. 267-276
Component-based software engineering
- Fei Xie, James C. Browne:
Verified systems by composition from verified components. 277-286 - Stephen McCamant, Michael D. Ernst:
Predicting problems caused by component upgrades. 287-296 - Hridesh Rajan, Kevin J. Sullivan:
Eos: instance-level aspects for integrated system design. 291-306
Safety and security
- Suan Hsi Yong, Susan Horwitz:
Protecting C programs from attacks via invalid pointer dereferences. 307-316 - V. Benjamin Livshits, Monica S. Lam:
Tracking pointers with path and context sensitivity for bug detection in C programs. 317-326 - Yichen Xie, Andy Chou, Dawson R. Engler:
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. 327-336 - Koushik Sen, Grigore Rosu, Gul Agha:
Runtime safety analysis of multithreaded programs. 337-346
Poster Session
- Nikunj R. Mehta, Nenad Medvidovic:
Composing architectural styles from architectural primitives. 347-350 - Kleanthis Thramboulidis:
Towards an engineering tool for implementing reusable distributed control systems. 351-354 - Antonia Bertolino, Stefania Gnesi:
Use case-based testing of product lines. 355-358 - Rik Eshuis, Pierre Brimont, Eric Dubois, Bertrand Grégoire, Sophie Ramel:
EFFICIENT: a tool set for supporting the modelling and validation of ebXML. 359-362 - Simonetta Balsamo, Moreno Marzolla:
A simulation-based approach to software performance modeling. 363-366 - Alexander Ran, Raimondas Lencevicius:
Making sense of runtime architecture for mobile phone software. 367-370 - Eunyoung Lee, Andrew W. Appel:
Policy-enforced linking of untrusted components. 371-374 - Paulo Asterio de Castro Guerra, Cecília M. F. Rubira, Alexander B. Romanovsky, Rogério de Lemos:
A fault-tolerant software architecture for COTS-based software systems. 375-378 - Richard S. Hall, Humberto Cervantes:
Gravity: supporting dynamically available services in client-side applications. 379-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.