Volume 51,
Number 1,
January 2009
Special section - Most cited articles in 2002
- Claes Wohlin:
Introduction to section most cited journal articles in Software Engineering.
1
- Claes Wohlin:
An analysis of the most cited articles in software engineering journals - 2002.
2-6
- Barbara Kitchenham, Pearl Brereton, David Budgen, Mark Turner, John Bailey, Stephen G. Linkman:
Systematic literature reviews in software engineering - A systematic literature review.
7-15
- Lionel C. Briand, Yvan Labiche, S. He:
Automating regression test selection based on UML designs.
16-30
- Jan Kofron, Frantisek Plasil, Ondrej Sery:
Modes in component behavior specification via EBP and their application in product lines.
31-41
- Marcos Dias de Assunção, Rajkumar Buyya:
Performance analysis of allocation policies for interGrid resource provisioning.
42-55
- Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend, Michael Stepp:
More on graph theoretic software watermarks: Implementation, analysis, and attacks.
56-67
- Robert L. Glass, Iris Vessey, Venkataraman Ramesh:
RESRES: The story behind the paper "Research in software engineering: An analysis of the literature".
68-70
Regular research papers
- Vigdis By Kampenes, Tore Dybå, Jo Erskine Hannay, Dag I. K. Sjøberg:
A systematic review of quasi-experiments in software engineering.
71-82
- Li Qin, Vijayalakshmi Atluri:
Evaluating the validity of data instances against ontology evolution over the Semantic Web.
83-97
- Jan Chmiel, Tadeusz Morzy, Robert Wrembel:
Multiversion join index for multiversion data warehouse.
98-108
- Liang Xiao, Des Greer:
Adaptive Agent Model: Software Adaptivity using an Agent-oriented Model-Driven Architecture.
109-137
- Marcelo Nassau Malta, Marco Tulio de Oliveira Valente:
Object-oriented transformations for extracting aspects.
138-149
- Finn Olav Bjørnson, Alf Inge Wang, Erik Arisholm:
Improving the effectiveness of root cause analysis in post mortem analysis: A controlled experiment.
150-161
- KeungSik Choi, Doo-Hwan Bae:
Dynamic project performance estimation by combining static estimation models with system dynamics.
162-172
- Li-Wei Chen, Sun-Jen Huang:
Accuracy and efficiency comparisons of single- and multi-cycled software classification models.
173-181
- Liang Huang, Mike Holcombe:
Empirical investigation towards the effectiveness of Test First programming.
182-194
- Sybren Deelstra, Marco Sinnema, Jan Bosch:
Variability assessment in software product families.
195-218
- Helen Sharp, Nathan Baddoo, Sarah Beecham, Tracy Hall, Hugh Robinson:
Models of motivation in software engineering.
219-233
Volume 51,
Number 2,
February 2009
- Panagiotis Katsaros:
A roadmap to electronic payment transaction guarantees and a Colored Petri Net model checking approach.
235-257
- Michiel Koning, Chang-ai Sun, Marco Sinnema, Paris Avgeriou:
VxBPEL: Supporting variability for Web services in BPEL.
258-269
- Filippo Ricca, Marco Torchiano, Massimiliano Di Penta, Mariano Ceccato, Paolo Tonella:
Using acceptance tests as a support for clarifying requirements: A series of experiments.
270-283
- Ping Sun, Changjun Jiang:
Analysis of workflow dynamic changes based on Petri net.
284-292
- Alf Inge Wang, Erik Arisholm:
The effect of task order on the maintainability of object-oriented software.
293-305
- Amparo Navasa Martínez, Miguel Ángel Pérez Toledano, Juan Manuel Murillo:
An ADL dealing with aspects at software architecture stage.
306-324
- Costas Vassilakis, Giorgos Lepouras, Akrivi Katifori:
A heuristics-based approach to reverse engineering of electronic services.
325-336
- Paolo Guarda, Nicola Zannone:
Towards the development of privacy-aware systems.
337-350
- Ho-Won Jung, Dennis Goldenson:
Evaluating the relationship between process improvement and schedule deviation in software maintenance.
351-361
- Abdelghani Benharref, Rachida Dssouli, Mohamed Adel Serhani, Roch H. Glitho:
Efficient traces' collection mechanisms for passive testing of Web Services.
362-374
- Ching-Pao Chang, Chih-Ping Chu, Yu-Fang Yeh:
Integrating in-process software defect prediction with association mining to discover defect pattern.
375-384
- Wes Masri, Andy Podgurski:
Algorithms and tool support for dynamic information flow analysis.
385-404
- Gyun Woo, Heung Seok Chae, Jian Feng Cui, Jeong-Hoon Ji:
Revising cohesion measures by considering the impact of write interactions between class members.
405-417
- Monalisa Sarma, Rajib Mall:
Automatic generation of test specifications for coverage of system state transitions.
418-432
- Massimo Colosimo, Andrea De Lucia, Giuseppe Scanniello, Genoveffa Tortora:
Evaluating legacy system migration technologies through empirical studies.
433-447
- Gisèle Douta, Haydar Talib, Oscar Nierstrasz, Frank Langlotz:
CompAS: A new approach to commonality and variability analysis with applications in computer assisted orthopaedic surgery.
448-459
- Lihua Ran, Curtis E. Dyreson, Anneliese Amschler Andrews, Renée C. Bryce, Christopher J. Mallery:
Building test cases and oracles to automate the testing of web database applications.
460-477
- Aneesh Krishna, Sergiy A. Vilkomir, Aditya K. Ghose:
Consistency preserving co-evolution of formal specifications and agent-oriented conceptual models.
478-496
- Ilir Gashi, Peter T. Popov, Vladimir Stankovic:
Uncertainty explicit assessment of off-the-shelf software: A Bayesian approach.
497-511
- Lionel C. Briand, Yvan Labiche, Tao Yue:
Automated traceability analysis for UML model refinements.
512-527
- Damjan Vavpotic, Marko Bajec:
An approach for concurrent evaluation of technical and social aspects of software development methodologies.
528-545
- Hui Liu, Hee Beng Kuan Tan:
Covering code behavior on input validation in functional testing.
546-553
Volume 51,
Number 3,
March 2009
- Anil S. Jadhav, Rajendra M. Sonar:
Evaluating and selecting software packages: A review.
555-563
- Pablo Moreno-Ger, Rubén Fuentes-Fernández, José Luis Sierra-Rodríguez, Baltasar Fernández-Manjón:
Model-checking for adventure videogames.
564-580
- Douwe Postmus, Jacob Wijngaard, Hans Wortmann:
An economic model to compare the profitability of pay-per-use and fixed-fee licensing.
581-588
- Stephen Thomas, Laurie Williams, Tao Xie:
On automated prepared statement generation to remove SQL injection vulnerabilities.
589-598
- Behshid Behkamal, Mohsen Kahani, Mohammad Kazem Akbari:
Customizing ISO 9126 quality model for evaluation of B2B applications.
599-609
- Kristian Bisgaard Lassen, Wil M. P. van der Aalst:
Complexity metrics for Workflow nets.
610-626
- Silvia Teresita Acuña, Marta Gómez, Natalia Juristo Juzgado:
How do personality, team processes and task characteristics relate to job satisfaction and software quality?
627-639
- Moataz A. Ahmed, Zeeshan Muzaffar:
Handling imprecision and uncertainty in software development effort prediction: A type-2 fuzzy logic based framework.
640-654
- LeMai Nguyen, Graeme G. Shanks:
A framework for understanding creativity in requirements engineering.
655-662
- Katja Karhu, Ossi Taipale, Kari Smolander:
Investigating the relationship between schedules and knowledge transfer in software testing.
663-677
Volume 51,
Number 4,
April 2009
- Jun-Wei Lin, Chin-Yu Huang:
Analysis of test suite reduction with enhanced tie-breaking techniques.
679-690
- Hyun-Goo Kang, Taisook Han:
A bottom-up pointer analysis using the update history.
691-707
- Raquel Blanco, Javier Tuya, Belarmino Adenso-Díaz:
Automated test data generation using a scatter search approach.
708-720
- Miroslaw Staron, Wilhelm Meding, Christer Nilsson:
A framework for developing measurement systems and its industrial evaluation.
721-737
- Stanislav Berlin, Tzvi Raz, Chanan Glezer, Moshe Zviran:
Comparison of estimation methods of cost and duration in IT projects.
738-748
- Pedro Valderas, Vicente Pelechano:
Introducing requirements traceability support in model-driven development of web applications.
749-768
- Esther Guerra, Juan de Lara, Alessio Malizia, Paloma Díaz:
Supporting user-oriented analysis for multi-view domain-specific visual languages.
769-784
- Helen M. Edwards, Sharon McDonald, S. Michelle Young:
The repertory grid technique: Its place in empirical software engineering research.
785-798
- R. Krishnamoorthi, S. A. Sahaaya Arul Mary:
Factor oriented requirement coverage based system test case prioritization of new and regression test cases.
799-808
Volume 51,
Number 5,
May 2009
Papers
- David A. Basin, Manuel Clavel, Jürgen Doser, Marina Egea:
Automated analysis of security-design models.
815-831
- Ghassan Beydoun, Graham Low, Haralambos Mouratidis, Brian Henderson-Sellers:
A security-aware metamodel for multi-agent systems (MAS).
832-845
- Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee, Siv Hilde Houmb:
An aspect-oriented methodology for designing secure applications.
846-864
- Zhi Jian Zhu, Mohammad Zulkernine:
A model-based aspect-oriented framework for building intrusion-aware software systems.
865-875
- Howard Chivers, Richard F. Paige:
XRound: A reversible template language and its application in model-based security analysis.
876-893
- Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca:
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies.
894-915
- Andreas L. Opdahl, Guttorm Sindre:
Experimental comparison of attack trees and misuse cases for security threat identification.
916-932
- Liang Xiao:
An adaptive security model using agent-oriented MDA.
933-955
Volume 51,
Number 6,
June 2009
- Wasif Afzal, Richard Torkar, Robert Feldt:
A systematic review of search-based testing for non-functional system properties.
957-976
- José Jacobo Zubcoff, Jesús Pardillo, Juan Trujillo:
A UML profile for the conceptual modelling of data-mining with time-series in data warehouses.
977-992
- Qingfeng He, Annie I. Antón:
Requirements-based Access Control Analysis and Policy Specification (ReCAPS).
993-1009
- Moe Thandar Wynn, H. M. W. (Eric) Verbeek, Wil M. P. van der Aalst, Arthur H. M. ter Hofstede, David Edmond:
Reduction rules for YAWL workflows with cancellation regions and OR-joins.
1010-1020
- Anna Perini, Filippo Ricca, Angelo Susi:
Tool-supported requirements prioritization: Comparing the AHP and CBRank methods.
1021-1032
- Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini:
An engineering process for developing Secure Data Warehouses.
1033-1051
- Mercedes Amor, Lidia Fuentes:
Malaca: A component and aspect-oriented agent architecture.
1052-1065
- Stig Larsson, Petri Myllyperkiö, Fredrik Ekdahl, Ivica Crnkovic:
Software product integration: A case study-based synthesis of reference models.
1066-1080
- Jacques Wainer, Claudia Galindo Novoa Barsottini, Danilo Lacerda, Leandro Rodrigues Magalhães de Marco:
Empirical evaluation in Computer Science research published by ACM.
1081-1085
Volume 51,
Number 7,
July 2009
Review Articles
Regular Articles
Special Section:
Software Engineering for Secure Systems
Volume 51,
Number 8,
August 2009
Regular Articles
- Petia Wohed, Nick Russell, Arthur H. M. ter Hofstede, Birger Andersson, Wil M. P. van der Aalst:
Patterns-based evaluation of open source BPM systems: The cases of jBPM, OpenWFE, and Enhydra Shark.
1187-1216
- Iván García-Magariño, Rubén Fuentes-Fernández, Jorge J. Gómez-Sanz:
Guideline for the definition of EMF metamodels using an Entity-Relationship approach.
1217-1230
- Mahmood Niazi, Muhammad Ali Babar:
Identifying high perceived value practices of CMMI level 2: An empirical study.
1231-1243
- Georgia M. Kapitsaki, Dimitrios A. Kateros, George N. Prezerakos, Iakovos S. Venieris:
Model-driven development of composite context-aware web applications.
1244-1260
- Matjaz B. Juric, Ana Sasa, Ivan Rozman:
WS-BPEL Extensions for Versioning.
1261-1274
- Iris Reinhartz-Berger, Arnon Sturm:
Utilizing domain models for application design and validation.
1275-1289
Volume 51,
Number 9,
September 2009
Review Article
Regular Articles
Volume 51,
Number 10,
October 2009
Special Issue Editorial Article
- James R. Cordy, Lu Zhang:
Guest Editorial for the Special Issue on Source Code Analysis andManipulation, SCAM 2008.
1377-1378
Special Issue Articles
- Yue Jia, Mark Harman:
Higher Order Mutation Testing.
1379-1393
- Daniel M. Germán, Ahmed E. Hassan, Gregorio Robles:
Change impact graphs: Determining the impact of prior codechanges.
1394-1408
- Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla:
Decompilation of Java bytecode to Prolog by partial evaluation.
1409-1427
- Jonas Lundberg, Tobias Gutzmann, Marcus Edvinsson, Welf Löwe:
Fast and precise points-to analysis.
1428-1439
- Andrew Stone, Michelle Strout, Shweta Behere:
May/must analysis and the DFAGen data-flow analysis generator.
1440-1453
- Mariano Ceccato, Thomas Roy Dean, Paolo Tonella:
Recovering structured data types from a legacy data model with overlays.
1454-1468
- Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano:
The life and death of statically detected vulnerabilities: An empirical study.
1469-1484
Volume 51,
Number 11,
November 2009
Special Section:
AST 2008
Special Section:
QSIC 2008
- Hong Zhu:
Engineering quality software - Guest editor's introduction to the special section of the Eighth International Conference on Quality Software (QSIC 2008).
1549-1550
- Lionel C. Briand, Yvan Labiche, Zaheer Bawar, Nadia Traldi Spido:
Using machine learning to refine Category-Partition test specifications and test suites.
1551-1564
- Shaoying Liu:
Integrating top-down and scenario-based methods for constructing software specifications.
1565-1572
- Zhenyu Zhang, W. K. Chan, T. H. Tse, Peifeng Hu, Xinming Wang:
Is non-parametric hypothesis testing model robust for statistical fault localization?
1573-1585
- Dharmalingam Ganesan, Thorsten Keuler, Yutaro Nishimura:
Architecture compliance checking at run-time.
1586-1600
- Martin Weiglhofer, Gordon Fraser, Franz Wotawa:
Using coverage to automate and improve test purpose based testing.
1601-1617
- Mohamed F. Ahmed, Swapna S. Gokhale:
Linux bugs: Life cycle, resolution and architectural analysis.
1618-1627
Volume 51,
Number 12,
December 2009
Special Section Editorial
Special Section Articles
Regular Articles
Copyright © Fri Mar 12 17:28:53 2010
by Michael Ley (ley@uni-trier.de)