


default search action
30th ICSE 2008: Leipzig, Germany
- Wilhelm Schäfer, Matthew B. Dwyer, Volker Gruhn:

30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008. ACM 2008, ISBN 978-1-60558-079-1
Software tools
- Christopher Scaffidi, Brad A. Myers, Mary Shaw

:
Topes: reusable abstractions for validating data. 1-10 - Steven P. Reiss:

Tracking source locations. 11-20 - Brian de Alwis, Gail C. Murphy:

Answering conceptual queries with Ferret. 21-30
Specification I
- Lars Grunske

:
Specification patterns for probabilistic quality properties. 31-40 - German E. Sibay, Sebastián Uchitel

, Víctor A. Braberman:
Existential live sequence charts revisited. 41-50 - Mark Gabel, Zhendong Su

:
Symbolic mining of temporal specifications. 51-60
Testing I
- Heng Lu, W. K. Chan

, T. H. Tse
:
Testing pervasive software in the presence of context inconsistency resolution services. 61-70 - Ilinca Ciupa, Andreas Leitner, Manuel Oriol, Bertrand Meyer

:
ARTOO: adaptive random testing for object-oriented software. 71-80 - Cemal Yilmaz

, Amit M. Paradkar, Clay Williams:
Time will tell: fault localization using time spectra. 81-90
Components & reuse
- Kevin J. Hoffman, Patrick Eugster:

Towards reusable components with aspects: an empirical study on modularity and obliviousness. 91-100 - Sylvain Sicard, Fabienne Boyer, Noel De Palma:

Using components for architecture-based management: the self-repair case. 101-110 - Leslie Cheung, Roshanak Roshandel, Nenad Medvidovic, Leana Golubchik:

Early prediction of software component reliability. 111-120
Specification II
- Jon Whittle, Duminda Wijesekera, Mark Hartong:

Executable misuse cases for modeling security concerns. 121-130 - Sriram Sankaranarayanan, Franjo Ivancic, Aarti Gupta

:
Mining library specifications using inductive logic programming. 131-140 - Jinjun Chen, Yun Yang:

Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems. 141-150
Testing II
- Guoqing Xu, Atanas Rountev:

Precise memory leak detection for java software using container profiling. 151-160 - Ajitha Rajan, Michael W. Whalen, Mats Per Erik Heimdahl:

The effect of program and model structure on mc/dc test adequacy coverage. 161-170 - Gary Wassermann, Zhendong Su

:
Static detection of cross-site scripting vulnerabilities. 171-180
Empirical software engineering
- Raimund Moser, Witold Pedrycz, Giancarlo Succi

:
A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction. 181-190 - Jonathan Lung, Jorge Aranda, Steve M. Easterbrook

, Gregory V. Wilson:
On the difficulty of replicating human subjects studies in software engineering. 191-200 - Yanbing Yu, James A. Jones, Mary Jean Harrold:

An empirical study of the effects of test-suite reduction on fault localization. 201-210
Program analysis
- Domagoj Babic, Alan J. Hu:

Calysto: scalable and precise extended static checking. 211-220 - Feng Chen, Traian-Florin Serbanuta, Grigore Rosu:

jPredictor: a predictive runtime analysis tool for java. 221-230 - Christian Hammer

, Julian Dolby, Mandana Vaziri, Frank Tip:
Dynamic detection of atomic-set-serializability violations. 231-240
Empirical software process
- Cleidson R. B. de Souza

, David F. Redmiles:
An empirical study of software developers' management of dependencies and changes. 241-250 - Margaret-Anne D. Storey, Jody Ryall, R. Ian Bull, Del Myers, Janice Singer:

TODO or to bug: exploring how task annotations play a role in the work practices of software developers. 251-260 - Eduardo Figueiredo, Nélio Cacho

, Cláudio Sant'Anna, Mario Monteiro, Uirá Kulesza, Alessandro Garcia, Sérgio Soares
, Fabiano Cutigi Ferrari, Safoora Shakil Khan, Fernando Castor Filho
, Francisco Dantas:
Evolving software product lines with aspects: an empirical study on design stability. 261-270
Formal analysis
- Chunqing Chen, Jin Song Dong, Jun Sun

:
A verification system for timed interval calculus. 271-280 - Christoph Csallner

, Nikolai Tillmann, Yannis Smaragdakis:
DySy: dynamic symbolic execution for invariant inference. 281-290 - Steven Lauterburg, Ahmed Sobeih, Darko Marinov, Mahesh Viswanathan:

Incremental state-space exploration for programs with dynamically allocated data. 291-300
Program comprehension
- Amy J. Ko, Brad A. Myers:

Debugging reinvented: asking and answering why and why not questions about program behavior. 301-310 - Christian Kästner

, Sven Apel
, Martin Kuhlemann:
Granularity in software product lines. 311-320 - Mark Gabel, Lingxiao Jiang

, Zhendong Su
:
Scalable detection of semantic clones. 321-330
Empirical testing & analysis
- Gursimran Singh Walia, Jeffrey C. Carver, Nachiappan Nagappan:

The effect of the number of inspectors on the defect estimates produced by capture-recapture models. 331-340 - Joseph R. Ruthruff, John Penix, J. David Morgenthaler

, Sebastian G. Elbaum, Gregg Rothermel:
Predicting accurate and actionable static analysis warnings: an experimental approach. 341-350 - Akbar Siami Namin, James H. Andrews, Duncan J. Murdoch:

Sufficient mutation operators for measuring test effectiveness. 351-360
Software process
- Filippo Ricca, Massimiliano Di Penta

, Marco Torchiano
, Paolo Tonella
, Mariano Ceccato
, Corrado Aaron Visaggio
:
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks. 361-370 - Lijun Mei, W. K. Chan

, T. H. Tse
:
Data flow testing of service-oriented workflow applications. 371-380 - Diomidis Spinellis

:
A tale of four kernels. 381-390
Architecture
- Michael Eichberg

, Sven Kloppenburg, Karl Klose, Mira Mezini:
Defining and continuous checking of structural program dependencies. 391-400 - Thomas Goldschmidt, Ralf H. Reussner

, Jochen Winzen:
A case study evaluation of maintainability and performance of persistency techniques. 401-410 - Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J. Sullivan:

Automatic modularity conformance checking. 411-420
Refactoring
- Emerson R. Murphy-Hill, Andrew P. Black

:
Breaking the barriers to successful refactoring: observations and tools for extract method. 421-430 - Hannes Kegel, Friedrich Steimann

:
Systematically refactoring inheritance to delegation in java. 431-440 - Danny Dig, Stas Negara, Vibhu Mohindra, Ralph E. Johnson:

ReBA: refactoring-aware binary adaptation of evolving libraries. 441-450
Evolution
- Andy Maule, Wolfgang Emmerich, David S. Rosenblum:

Impact analysis of database schema changes. 451-460 - Xiaoyin Wang, Lu Zhang, Tao Xie, John Anvik

, Jiasu Sun:
An approach to detecting duplicate bug reports using natural language and execution information. 461-470
Frameworks
- Thorsten Schäfer, Jan Jonas, Mira Mezini:

Mining framework usage changes from instantiation code. 471-480 - Barthélémy Dagenais, Martin P. Robillard:

Recommending adaptive changes for framework evolution. 481-490 - Yanyan Wang, Antonio Carzaniga

, Alexander L. Wolf:
Four enhancements to automateddistributed system experimentation methods. 491-500
Models
- Davide Lorenzoli, Leonardo Mariani

, Mauro Pezzè
:
Automatic generation of software behavioral models. 501-510 - Xavier Blanc, Isabelle Mounier, Alix Mougenot, Tom Mens

:
Detecting model inconsistency through operation-based model construction. 511-520
Software engineering economics
- Nachiappan Nagappan, Brendan Murphy, Victor R. Basili:

The influence of organizational structure on software quality: an empirical case study. 521-530 - Thomas Zimmermann, Nachiappan Nagappan:

Predicting defects using network analysis on dependency graphs. 531-540 - Peter C. Rigby, Daniel M. Germán, Margaret-Anne D. Storey:

Open source software peer review practices: a case study of the apache server. 541-550
Process & models
- Fergal McCaffery

, Minna Pikkarainen, Ita Richardson
:
Ahaa --agile, hybrid assessment method for automotive, safety critical smes. 551-560 - Oliver Niggemann

, Joachim Stroop:
Models for model's sake: why explicit system models are also an end to themselves. 561-570 - Serena Fritsch, Aline Senart, Douglas C. Schmidt, Siobhán Clarke

:
Time-bounded adaptation for automotive system software. 571-580
Architecture & design
- Ulrich Freund:

Mulit-level system integration based on AUTOSAR. 581-582 - Stefan Bienk:

Asam odx: syntax as semantics. 583-592
Quality assurance
- Tim Reichert, Edmund Klaus, Wolfgang Schoch, Ansgar Meroth

, Dominikus Herzberg:
A language for advanced protocol analysis in automotive networks. 593-602 - Florian Deissenboeck, Benjamin Hummel, Elmar Jürgens, Bernhard Schätz, Stefan Wagner

, Jean-Francois Girard, Stefan Teuchert:
Clone detection in automotive model-based development. 603-612 - Maurice H. ter Beek

, Stefania Gnesi
, Nora Koch
, Franco Mazzanti
:
Formal verification of an automotive scenario in service-oriented computing. 613-622
Requirements engineering
- Bin Chen, George S. Avrunin, Elizabeth A. Henneman, Lori A. Clarke, Leon J. Osterweil, Philip L. Henneman:

Analyzing medical processes. 623-632 - Barbara Paech, Thomas Wetter:

Rational quality requirements for medical software. 633-638 - Jörg Dörr, Daniel Kerkow, Dennis Landmann, Christian Graf, Christian Denger, Anne Hoffmann:

Supporting requirements engineering for medical products: early consideration of user-perceived quality. 639-648
Architecture
- Gerald Bortis:

Experiences with Mirth: an open source health care integration engine. 649-652 - Danny Ammon

, Dirk Hoffmann, Tobias Jakob, Ekkehard Finkeissen:
Developing an architecture of a knowledge-based electronic patient record. 653-660 - Holger Scherl, Stefan Hoppe, Markus Kowarschik, Joachim Hornegger:

Design and implementation of the software architecture for a 3-D reconstruction system in medical imaging. 661-668
Quality
- Marlon Vieira, Xiping Song, Gilberto Matos, Stephan Storck, Rajanikanth Tanikella, William M. Hasling:

Applying model-based testing to healthcare products: preliminary experiences. 669-672 - Liang Xiao, Paul H. Lewis, Alex Gibb:

Developing a security protocol for a distributed decision support system in a healthcare environment. 673-682
Modeling & Architecture
- Jan Jürjens, Jörg Schreck, Peter Bartmann:

Model-based security analysis for mobile communications. 683-692 - Barry Long, Jürgen Dingel, T. C. Nicholas Graham:

Experience applying the SPIN model checker to an industrial telecommunications system. 693-702 - Andreas Scholz, Christian Buckl, Alfons Kemper, Alois C. Knoll

, Jörg Heuer, Martin Winter:
WS-AMUSE - web service architecture for multimedia services. 703-712
Quality
- Audris Mockus

, David M. Weiss:
Interval quality: relating customer-perceived quality to process quality. 723-732 - Clauirton de Siebra, Paulo H. R. Costa, Andre Luís de Medeiros Santos

, Fabio Q. B. da Silva
:
Improving the handsets network test process via DMAIC concepts. 733-740
Extending the frontiers in SE education
- Bartosz Michalik, Jerzy R. Nawrocki, Miroslaw Ochodek

:
3-step knowledge transition: a case study on architecture evaluation. 741-748 - Jordi Cabot

, Francisco Durán
, Nathalie Moreno, Antonio Vallecillo
, José Raúl Romero
:
From programming to modeling: our experience with a distributed software engineering course. 749-758 - Scott D. Fleming, Eileen T. Kraemer, R. E. Kurt Stirewalt, Shaohua Xie, Laura K. Dillon:

A study of student strategies for the corrective maintenance of concurrent software. 759-768
SE education practices
- Kai Stapel, Daniel Lübke, Eric Knauss

:
Best practices in extreme programming course design. 769-776 - Gerald C. Gannod, Janet E. Burge, Michael T. Helmick:

Using the inverted classroom to teach software engineering. 777-786 - Michele Lanza

, Amy L. Murphy, Romain Robbes
, Mircea Lungu, Paolo Bonzini:
A teamwork-based approach to programming fundamentals with scheme, smalltalk & java. 787-790
Inter- and intradisciplinary SE foundations
- Birgit R. Krogstie:

Power through brokering: open source community participation in software engineering student projects. 791-800 - Christoph Denzler, Dominik Gruntz

:
Design patterns: between programming and software design. 801-804
Innovatin in SE education
- Uwe Dumslaff:

Change management: from knowledge about innovative SE to capabilities for industrial SE projects. 805-806
Model-driven development and model analysis I
- Carsten Amelunxen, Felix Klar, Alexander Königs, Tobias Rötschke, Andy Schürr:

Metamodel-based tool integration with moflon. 807-810 - Nelly Bencomo, Paul Grace

, Carlos A. Flores-Cortés, Danny Hughes, Gordon S. Blair
:
Genie: supporting the model driven development of reflective, component-based adaptive systems. 811-814 - Mehrdad Sabetzadeh

, Shiva Nejati
, Steve M. Easterbrook
, Marsha Chechik:
Global consistency checking of distributed models with TReMer+. 815-818
Model-driven development & model analysis II
- John C. Grundy

, John G. Hosking
, Jun Huh, Karen Na-Liu Li:
Marama: an eclipse meta-toolset for generating multi-view environments. 819-822 - Tobias Reinhard, Silvio Meier, Reinhard Stoiber, Christina Cramer, Martin Glinz:

Tool support for the navigation in graphical models. 823-826 - Panuchart Bunyakiati, Anthony Finkelstein, James Skene, Clovis Chapman:

Using JULE to generate a compliance test suite for the UML standard. 827-830
Traceability
- Sven Wenzel, Udo Kelter:

Analyzing model evolution. 831-834 - Janet E. Burge, David C. Brown:

SEURAT: integrated rationale management. 835-838 - Andrea De Lucia

, Rocco Oliveto, Genoveffa Tortora:
Adams re-trace: traceability link recovery via latent semantic indexing. 839-842
Code management
- Ekwa Duala-Ekoko, Martin P. Robillard:

Clonetracker: tool support for code clone management. 843-846 - Romain Robbes

, Michele Lanza
:
SpyWare: a change-aware development toolset. 847-850 - Peng Li, Eric Wohlstadter:

Dynamic round-trip GUI maintenance. 851-854
Verification & validation
- Bassem Elkarablieh, Sarfraz Khurshid:

Juzi: a tool for repairing complex data structures. 855-858 - Muhammad Zubair Malik, Aman Pervaiz, Engin Uzuncaova, Sarfraz Khurshid:

Deryaft: a tool for generating representation invariants of structurally complex data. 859-862 - Tihomir Gvero, Milos Gligoric, Steven Lauterburg, Marcelo d'Amorim

, Darko Marinov, Sarfraz Khurshid:
State extensions for java pathfinder. 863-866
Validation
- Christopher Scaffidi, Brad A. Myers, Mary Shaw

:
Tool support for data validation by end-user programmers. 867-870 - Jin Guo, King Chun Foo, Liliane Barbour, Ying Zou:

A business process explorer: recovering and visualizing e-commerce business processes. 871-874 - Sebastian Höhn, Jan Jürjens:

Rubacon: automated support for model-based compliance engineering. 875-878

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














