


default search action
Information & Software Technology, Volume 44
Volume 44, Number 1, January 2002
- M. Elizabeth C. Hull, Philip S. Taylor, J. R. Paul Hanna, Richard J. Millar:

Software development processes - an assessment. 1-12 - Barbara A. Kitchenham

:
The question of scale economies in software - why cannot researchers agree? 13-24 - Ioannis Vakalis, F. Andritsos:

The architecture of an information tool for de-mining: mine identification core module (MICM). 25-40 - Joseph Fong:

Translating object-oriented database transactions into relational transactions. 41-51 - J. Drew Procaccino, June M. Verner, Scott P. Overmyer

, Marvin E. Darter:
Case study: factors for early prediction of software development success. 53-62
Volume 44, Number 2, February 2002
- Michael Dyer, Martin J. Shepperd, Claes Wohlin

:
Editorial. 63 - Jesús Manuel Almendros-Jiménez

, Luis González-Jiménez:
Bases for the development of LAST: a formal method for business software requirements specification. 65-75 - Steven M. Schorling, David C. Rine:

A methodology for designing toolkits for specification level verification of interval-constrained information systems requirements. 77-90 - Minghu Jiang, Xiaoyan Zhu, Georges G. E. Gielen

, Elliott Drábek, Ying Xia, Gang Tan
, Ta Bao:
Braille to print translations for Chinese. 91-100 - Mark d'Inverno, Paul Howells, Michael J. Hu, Michael Luck

:
Soft-link hypertext for information retrieval. 101-112 - Noritaka Kobayashi, Tatsuhiro Tsuchiya

, Tohru Kikuno:
Non-specification-based approaches to logic testing for software. 113-121 - Ganga Bishnu Mund, Rajib Mall, Sudeshna Sarkar

:
An efficient dynamic program slicing technique. 123-132
Volume 44, Number 3, March 2002
- Girish Keshav Palshikar:

Temporal fault trees. 137-150 - Craig Standing:

Methodologies for developing Web applications. 151-159 - Jesús García Molina, María-José Ortín-Ibáñez, Ginés García-Mateos

:
Extending the ODMG standard with views. 161-173 - Janche Sang, Gregory J. Follen, Chan M. Kim, Isaac Lopez:

Development of CORBA-based engineering applications from legacy Fortran programs. 175-184 - Colette Rolland:

L'E-Lyee: coupling L'Ecritoire and LyeeALL. 185-194
Volume 44, Number 4, March 2002
- Akmal B. Chaudhri:

Objects, XML and databases - Preface. 195-196 - Vassilis Papadimos, David Maier:

Mutant Query Plans. 197-206 - Suad Alagic:

Institutions: Integrating Objects, XML and Databases. 207-216 - Fabio Simeoni, Paolo Manghi

, David Lievens, Richard C. H. Connor, Steve Neely:
An Approach to High-Level Language Bindings to XML. 217-228 - Martin Kempa, Volker Linnemann:

V-DOM and P-XML - Towards a Valid Programming of XML-Based Applications. 229-236 - David Buttler

, Terence Critchlow:
Using Meta-Data to Automatically Wrap BioInformatics Sources. 237-239 - Ronaldo dos Santos Mello, Silvana Castano

, Carlos A. Heuser:
A Method for the Unification of XML Schemata. 241-249 - Samuel Robert Collins, Shamkant B. Navathe, Leo Mark:

XML Schema Mappings for Heterogeneous Database Access. 251-257 - Matt Holgate, Will Partain:

ARK: An Object(ive) view of eXtensible Minimal Languages for System Configuration. 259-268 - Thomas Kudrass:

Management of XML Documents Without Schema in Relational Database Systems. 269-275
Volume 44, Number 5, 1 April 2002
- Rachida Dssouli:

Preface. 277-278 - Theodore Chiasson, Kirstie Hawkey, Michael McAllister, Jacob Slonim:

An architecture in support of universal access to electronic commerce. 279-289 - Houssein Benameur, Brahim Chaib-draa

, Peter G. Kropf
:
Multi-item auctions for automatic negotiation. 291-301 - Kassem Saleh:

Documenting electronic commerce systems and software using the unified modeling language. 303-311 - Charles Hélou, Rachida Dssouli, Teodor Gabriel Crainic

:
Performance testing of a negotiation platform. 313-330
Volume 44, Number 6, 15 April 2002
- Kjetil Nørvåg

:
Signature caching in parallel object database systems. 331-341 - C. D. Lai, Min Xie

, Kim-Leng Poh, Yuan-Shun Dai, P. Yang:
A model for availability analysis of distributed software/hardware systems. 343-350 - Kevin McArthur, Hossein Saiedian

, Mansour Zand:
An evaluation of the impact of component-based architectures on software reusability. 351-359 - Jonathan Lee, Kuo-Hsun Hsu

:
Modeling software architectures with goals in virtual university environment. 361-380 - Mark John Taylor, J. McWilliam, H. Forsyth, Stephen J. Wade:

Methodologies and website development: a survey of practice. 381-391 - Jesús Manuel Almendros-Jiménez

, Luis González-Jiménez:
Erratum to "Bases for the development of LAST: a formal method for business software requirements specification" [Information and Software Technology, 44 (2002) 65-75]. 393
Volume 44, Number 7, 15 May 2002
- Prabhaharan Kumarakulasingam, Hossein Saiedian

:
A framework for evaluating the effectiveness of real-time object-oriented models. 395-404 - Duk-Ho Chang, Jin Hyun Son, Myoung-Ho Kim:

Critical path identification in the context of a workflow. 405-417 - Ju-Won Song, Kyu-Young Whang, Young-Koo Lee, Min-Jae Lee

, Wook-Shin Han, Byung-Kwon Park:
The clustering property of corner transformation for spatial database applications. 419-429 - Nashat Mansour, Rami Bahsoon:

Reduction-based methods and metrics for selective regression testing. 431-443
Volume 44, Number 8, 1 June 2002
- Hai Zhuge:

A process matching approach for flexible workflow process reuse. 445-450 - Nabil M. Hewahi

:
A general rule structure. 451-457 - Yoshitomi Morisawa, Katsuro Inoue, Koji Torii:

Architectural styles for distributed processing systems and practical selection method. 459-472 - Hong Zhu, Xudong He:

A methodology of testing high-level Petri nets. 473-489 - Robert L. Glass, Iris Vessey, Venkataraman Ramesh:

Research in software engineering: an analysis of the literature. 491-506
Volume 44, Number 9, 15 June 2002
- Gerald P. Marquis:

Application of traditional system design techniques to web site design. 507-512 - Sourav S. Bhowmick

, Wee Keong Ng
, Sanjay Madria, Ee-Peng Lim
:
Anatomy of the coupling query in a web warehouse. 513-539 - Lanfranco Lopriore:

Access privilege management in protection systems. 541-549 - Wonjun Lee, Jaideep Srivastava

, Hojung Cha:
QoS-adaptive bandwidth scheduling in continuous media streaming. 551-563
Volume 44, Number 10, 1 July 2002
- Tarja Systä, Kai Koskimies, Erkki Mäkinen

:
Automated compression of state machines using UML statechart diagram notation. 565-578 - Paul Beynon-Davies, Steve Holmes:

Design breakdowns, scenarios and rapid application development. 579-592 - Gabriele Manduchi, C. Taliercio:

Measuring software evolution at a nuclear fusion experiment site: a test case for the applicability of OO and reuse metrics in software characterization. 593-600 - Louise Scott, Lucila Carvalho

, D. Ross Jeffery, John D'Ambra
, Ulrike Becker-Kornstaedt:
Understanding the use of an electronic process guide. 601-616
Volume 44, Number 11, 15 August 2002
- Jan A. Bergstra:

Molecule-oriented programming in Java. 617-638 - Patrick d'Astous, Pierre N. Robillard:

Empirical study of exchange patterns during software peer review meetings. 639-648 - Gail-Joon Ahn

, Seng-Phil Hong, Michael E. Shin:
Reconstructing a formal security model. 649-657 - Emilio Insfrán

, Vicente Pelechano
, Oscar Pastor
:
Conceptual Modeling in the eXtreme. 659-669
Volume 44, Number 12, 1 September 2002
- Loe M. G. Feijs, Frans A. C. Meijs, Jean R. Moonen, Jos van Wamel:

Automatic generation of MPEG test streams from high-level grammars. 671-682 - Thomas Thelin, Per Runeson

:
Confidence intervals for capture-recapture estimations in software inspections. 683-702 - Karl R. P. H. Leung, Hareton K. N. Leung

:
On the efficiency of domain-based COTS product selection method. 703-715
Volume 44, Number 13, 1 October 2002
- Mark Harman

, Malcolm Munro, Lin Hu, Xingyuan Zhang:
Source code analysis and manipulation. 717-720 - Amie L. Souter, Lori L. Pollock:

Characterization and automatic identification of type infeasible call chains. 721-732 - Zhenqiang Chen, Baowen Xu

, Hongji Yang, Jianjun Zhao:
Concurrent Ada dead statements detection. 733-741 - Paul Anderson, David W. Binkley, Genevieve Rosay, Tim Teitelbaum:

Flow insensitive points-to sets. 743-754 - Giuliano Antoniol, Umberto Villano, Ettore Merlo, Massimiliano Di Penta

:
Analyzing cloning evolution in the Linux kernel. 755-765 - Michael L. Van de Vanter:

The documentary structure of source code. 767-782 - Sandro Bartolini, Cosimo Antonio Prete:

A cache-aware program transformation technique suitable for embedded systems. 783-795 - Sibylle Schupp, Douglas P. Gregor, David R. Musser, Shin-Ming Liu:

Semantic and behavioral library transformations. 797-810 - Filippo Ricca, Paolo Tonella

, Ira D. Baxter:
Web application transformations based on rewrite rules. 811-825 - James R. Cordy, Thomas R. Dean, Andrew J. Malton, Kevin A. Schneider

:
Source transformation in software engineering using the TXL transformation system. 827-837
Volume 44, Number 14, 1 November 2002
- Tsong Yueh Chen

, T. H. Tse
, Yuen-Tak Yu:
Special Issue for the Second Asia-Pacific Conference on Quality Software. 839-840 - Kai-Yuan Cai:

Optimal software testing and adaptive software testing in the context of software cybernetics. 841-855 - Carsten Sinz, Thomas Lumpp, Jürgen M. Schneider, Wolfgang Küchlin:

Detection of dynamic execution errors in IBM system automation's rule-based expert system. 857-873 - Xu Wang, Shing-Chi Cheung

, Jun Wei:
A CSP and Z combined modeling of document exchange processes in e-commerce protocols. 875-889 - Volker Gruhn, Lothar Schöpe:

Software processes for the development of electronic commerce systems. 891-901
Volume 44, Number 15, 1 December 2002
- Reishi Yokomori, Fumiaki Ohata, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue:

An information-leak analysis system based on program slicing. 903-910 - Abbas Heiat:

Comparison of artificial neural network and regression models for estimating software development effort. 911-922 - Macario Polo

, Juan Ángel Gómez, Mario Piattini
, Francisco Ruiz
:
Generating three-tier applications from relational databases: a formal and practical approach. 923-941

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














