


default search action
IJSEKE, Volume 17
Volume 17, Number 1, February 2007
- Guest Editors' Introduction. 1-2

- Weiqiang Kong, Kazuhiro Ogata, Kokichi Futatsugi:

Specification and Verification of Workflows with Rbac Mechanism and Sod Constraints. 3-32 - Tegegne Marew, Jungyoon Kim, Doo-Hwan Bae:

Systematic Functional Decomposition in a Product Line Using Aspect-oriented Software Development: a Case Study. 33-56 - Yean-Ru Chen, Pao-Ann Hsiung

:
Automatic Failure Analysis Using Safecharts. 57-78 - Xavier Franch

, Gemma Grau, Enric Mayol, Carme Quer
, Claudia P. Ayala, Carlos Cares
, Fredy Navarrete, Mariela Haya, Pere Botella:
Systematic Construction of I* Strategic Dependency Models for Socio-technical Systems. 79-106 - Oscar Mondragon, Ann Q. Gates, Steve Roach, Humberto Mendoza, Oleg Sokolsky

:
Generating Properties for Runtime Monitoring from Software Specification Patterns. 107-126 - Sumanth Yenduri, S. Sitharama Iyengar:

Performance Evaluation of Imputation Methods for Incomplete Datasets. 127-152 - Gregor Stiglic

, Matej Mertik, Peter Kokol
, Maurizio Pighin
:
Detecting Fault Modules Using Bioinformatics Techniques. 153
Volume 17, Number 2, April 2007
- Kang Zhang, George Spanoudakis, Giuseppe Visaggio

:
Guest Editors: Introduction. 167-169 - David Garlan, Bradley R. Schmerl:

The Radar Architecture for Personal Cognitive Assistance. 171-190 - Xin Li, Shi-Kuo Chang:

User Profiling in the Chronobot/Virtual Classroom System. 191-206 - Beata Sarna-Starosta, R. E. Kurt Stirewalt, Laura K. Dillon:

A Model-Based Design-for-Verification Approach to Checking for Deadlock in Multi-Threaded Applications. 207-230 - Marco Scotto, Alberto Sillitti, Giancarlo Succi

:
An Empirical Analysis of the Open Source Development Process Based on Mining of Source Code Repositories. 231-247 - Wei Sun, Xin Zhang, Ying Liu, Zhong Tian:

Abstract Logic Tree Based Framework for Component Based Solution Composition Design and Execution. 249-263 - Fabio Massacci

, John Mylopoulos, Nicola Zannone
:
From Hippocratic Databases to Secure Tropos: a Computer-Aided Re-Engineering Approach. 265-284 - Haralambos Mouratidis

, Paolo Giorgini
:
Secure Tropos: a Security-Oriented Extension of the Tropos Methodology. 285-309
Volume 17, Number 3, June 2007
- Jerry Gao, Sami Beydeda:

Guest Editors' Introduction. 311-313 - Stephen H. Edwards, Westley Haggard:

A Flexible Strategy for Embedding and Configuring Run-Time Contract Checks in .Net Components. 315-338 - Daniel L. Barbosa, Helton S. Lima, Patrícia D. L. Machado, Jorge C. A. de Figueiredo, Makelli A. Jucá, Wilkerson de L. Andrade

:
Automating Functional Testing of Components from UML Specifications. 339-358 - Mats Skoglund, Per Runeson

:
Improving Class Firewall Regression Test Selection by Removing the Class Firewall. 359-378 - Rakesh Shukla, Paul A. Strooper

, David A. Carrington:
A Framework for Statistical Testing of Software Components. 379-405 - Javier Garzás, Mario Piattini

:
An Ontology for Understanding and Applying Object-Oriented Design Knowledge. 407-421 - E. Ramaraj, S. Duraisamy:

Design Optimization Metrics for UML Based Object-Oriented Systems. 423-448
Volume 17, Number 4, August 2007
- Angela Guercio, Timothy Arndt

:
Guest Editors' Introduction. 449 - J. R. Parker, Brad Behm:

Composite Algorithms in Image Content Searches. 451-463 - Pål Halvorsen, Tom Anders Dalseng, Carsten Griwodz:

Assessment of Linux' Data Path Implementations for Download and Streaming. 465-481 - Ronggong Song, Larry Korba, George Yee, Ying-Chieh Chen:

Protect Virtual Property in Online Gaming System. 483-496 - Andrea F. Abate

, Michele Nappi
, Daniel Riccio
, Genoveffa Tortora:
Rbs: a Robust Bimodal System for Face Recognition. 497-513 - Eelke Folmer, Jan Bosch:

A Pattern Framework for Software Quality Assessment and Tradeoff Analysis. 515-538 - Simon Lucas Winberg, Stephen R. Schach:

A Pilot Study of Productive versus Nonproductive Knowledge Acquisition in Embedded Software Development. 539-556
Volume 17, Number 5, October 2007
- Shi-Kuo Chang, Perry Rajnovic, Mark Zalar:

Ic Card: Visual Specification for Rapid Prototyping of Time-Critical Applications. 557-573 - Jianguo Lu, Ju Wang, Shengrui Wang:

Xml Schema Matching. 575-597 - Chung-Horng Lung, Xia Xu, Marzia Zaman:

Software Architecture Decomposition Using Attributes. 599-613 - Vincent Hilaire

, Pablo Gruer, Abder Koukam
, Olivier Simonin:
Formal Specification Approach of Role Dynamics in Agent Organisations: Application to the Satisfaction-Altruism Model. 615-641 - Thanasis Hadzilacos, Dimitris Kalles

, Maria Pouliopoulou:
On the Software and Knowledge Engineering Aspects of the Educational Process. 643-662 - Ron Hira, Óscar Dieste Tubío

, George Spanoudakis, Giuseppe Visaggio, Guido Wirtz, S. K. Chang:
It-Outsourcing and IT-Offshoring: Trends and Impacts on SE/KE Curricula. 663-685
Volume 17, Number 6, December 2007
- Hong Mei, T. H. Tse

:
Guest Editors' Introduction. 687-688 - Victor K. Y. Chan, W. Eric Wong, Tianfa Xie:

A Statistical Methodology to Simplify Software Metric Models Constructed Using Incomplete Data Samples. 689-707 - Yujian Fu, Zhijiang Dong, Xudong He:

A Translator of Software Architecture Design from SAM to Java. 709-755 - Ralph Guderlei, Johannes Mayer:

Towards Automatic Testing of Imaging Software by Means of Random and Metamorphic Testing. 757-781 - Masahiro Nakano, Kazuhiro Ogata, Masaki Nakamura, Kokichi Futatsugi:

CrÈme: an Automatic Invariant Prover of Behavioral Specifications. 783-804 - Tsong Yueh Chen

, Fei-Ching Kuo, Zhi Quan Zhou
:
On Favourable Conditions for Adaptive Random Testing. 805-825 - Päivi Parviainen, Maarit Tihinen

:
A Survey of Existing Requirements Engineering Technologies and their Coverage. 827-850

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














