


default search action
IEEE Transactions on Software Engineering (TSE), Volume 32
Volume 32, Number 1, January 2006
- John Knight:

Editorial: A New Editor-in-Chief and the State of TSE. 1 - Jeff Kramer:

Editorial: A Message from the New Editor-in-Chief. 2-3
- Jane Huffman Hayes, Alex Dekhtyar, Senthil Karthikeyan Sundaram:

Advancing Candidate Link Generation for Requirements Tracing: The Study of Methods. 4-19 - Cemal Yilmaz

, Myra B. Cohen, Adam A. Porter:
Covering Arrays for Efficient Fault Characterization in Complex Configuration Spaces. 20-34 - Yongjie Zheng, Alvin T. S. Chan:

MobiGATE: A Mobile Computing Middleware for the Active Deployment of Transport Services. 35-50
Volume 32, Number 2, February 2006
- Qinbao Song, Martin J. Shepperd

, Michelle Cartwright, Carolyn Mair:
Software Defect Association Mining and Defect Correction Effort Prediction. 69-82 - Martin Auer, Adam Trendowicz, Bernhard Graser, Ernst J. Haunschmid, Stefan Biffl:

Optimal Project Feature Weights in Analogy-Based Cost Estimation: Improvement and Limitations. 83-92 - Liqiang Wang, Scott D. Stoller:

Runtime Analysis of Atomicity for Multithreaded Programs. 93-110 - Hee Beng Kuan Tan, Yong Yang, Lei Bian:

Systematic Transformation of Functional Analysis Model into OO Design and Implementation. 111-135
Volume 32, Number 3, March 2006
- Jeff Kramer:

Editorial: New Associate Editors Introduction. 137-139 - Clémentine Nebut, Franck Fleurey, Yves Le Traon

, Jean-Marc Jézéquel
:
Automatic Test Generation: A Use Case Driven Approach. 140-155 - Gennaro Costagliola

, Vincenzo Deufemia
, Filomena Ferrucci
, Carmine Gravino
:
Constructing Meta-CASE Workbenches by Exploiting Visual Language Generators. 156-175 - Zhenmin Li, Shan Lu

, Suvda Myagmar, Yuanyuan Zhou:
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. 176-192 - Brian S. Mitchell

, Spiros Mancoridis:
On the Automatic Modularization of Software Systems Using the Bunch Tool. 193-208
- Naveen Sharma, Padmaja Joshi, Rushikesh K. Joshi:

Applicability of Weyuker's Property 9 to Object Oriented Metrics. 209-211
Volume 32, Number 4, April 2006
- Joseph R. Ruthruff, Margaret M. Burnett, Gregg Rothermel:

Interactive Fault Localization Techniques in a Spreadsheet Environment. 213-239 - Jiang Zheng, Laurie A. Williams, Nachiappan Nagappan, Will Snipes

, John P. Hudepohl, Mladen A. Vouk:
On the Value of Static Analysis for Fault Detection in Software. 240-253 - Shige Wang, Kang G. Shin:

Task Construction for Model-Based Design of Embedded Control Software. 254-264 - Dianxiang Xu, Kendall E. Nygard:

Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. 265-278
- Hewijin Christine Jiau, Dung-Feng Yu:

Comments on 'Automatic Analysis of Consistency between Requirements and Designs'. 279-280
Volume 32, Number 5, May 2006
- Christine Julien

, Gruia-Catalin Roman:
EgoSpaces: Facilitating Rapid Development of Context-Aware Mobile Applications. 281-298 - Alexander Egyed, David S. Wile:

Support for Managing Design-Time Decisions. 299-314 - Diane Kelly:

A Study of Design Characteristics in Evolving Software Using Stability as a Criterion. 315-329 - Rafae Bhatti, Elisa Bertino, Arif Ghafoor:

X-FEDERATE: A Policy Engineering Framework for Federated Access Management. 330-346
- Lee Pike:

A Note on Inconsistent Axioms in Rushby's "Systematic Formal Verification for Fault-Tolerant Time-Triggered Algorithms'. 347-348
Volume 32, Number 6, June 2006
- Jun Sun

, Jin Song Dong:
Design Synthesis from Interaction and State-Based Specifications. 349-364 - Erik Arisholm, Lionel C. Briand, Siw Elisabeth Hove, Yvan Labiche

:
The Impact of UML Documentation on Software Maintenance: An Experimental Evaluation. 365-381 - Yu Lei, Richard H. Carver:

Reachability Testing of Concurrent Programs. 382-403 - Daqing Hou, H. James Hoover:

Using SCL to Specify and Check Design Intent in Source Code. 404-423
- Carlo A. Furia, Angelo Morzenti

, Matteo Pradella
, Matteo Rossi:
Comments on "An Interval Logic for Real-Time System Specification'. 424-427 - Pierfrancesco Bellini

, Paolo Nesi
, Davide Rogai:
Reply to Comments on "An Interval Logic for Real-Time System Specification'. 428-431
Volume 32, Number 7, July 2006
- Daniela E. Damian, James Chisan:

An Empirical Study of the Complex Relationships between Requirements Engineering Processes and Other Processes that Lead to Payoffs in Productivity, Quality, and Risk Management. 433-453 - Bradley R. Schmerl, Jonathan Aldrich

, David Garlan, Rick Kazman, Hong Yan:
Discovering Architectures from Running Systems. 454-466 - Dan Barak, David Harel, Rami Marelly:

InterPlay: Horizontal Scale-Up and Transition to Design in Scenario-Based Programming. 467-485 - Samuel Kounev:

Performance Modeling and Evaluation of Distributed Component-Based Systems Using Queueing Petri Nets. 486-502 - Kaushal Chari, Alan R. Hevner:

System Test Planning of Software: An Optimization Approach. 503-509 - Farn Wang, Geng-Dian Huang, Fang Yu:

TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering. 510-526
Volume 32, Number 8, August 2006
- Giuliana Franceschinis, Joost-Pieter Katoen

, C. Murray Woodside:
Guest Editors' Introduction to the Special Section on the First International Conference on the Quantitative Evaluation of SysTems (QEST). 529-530 - Jeremy Sproston, Susanna Donatelli:

Backward Bisimulation in Markov Chain Model Checking. 531-546 - Aad P. A. van Moorsel, Katinka Wolter:

Analysis of Restart Mechanisms in Software Systems. 547-558 - Andrew S. Miner

:
Saturation for a General Class of Models. 559-570
- Yves Le Traon

, Benoit Baudry, Jean-Marc Jézéquel
:
Design by Contract to Improve Software Vigilance. 571-586 - Bikram Sengupta, Rance Cleaveland:

Triggered Message Sequence Charts. 587-607 - James H. Andrews, Lionel C. Briand, Yvan Labiche

, Akbar Siami Namin:
Using Mutation Analysis for Assessing and Comparing Testing Coverage Criteria. 608-624
Volume 32, Number 9, September 2006
- Tibor Gyimóthy

, Václav Rajlich:
Guest Editors' Introduction to the Special Issue on the International Conference on Software Maintenance and Evolution. 625-626 - Giuliano Antoniol, Yann-Gaël Guéhéneuc:

Feature Identification: An Epidemiological Metaphor. 627-641 - Lionel C. Briand, Yvan Labiche

, Johanne Leduc:
Toward the Reverse Engineering of UML Sequence Diagrams for Distributed Java Software. 642-663 - Mariana Sharp, Atanas Rountev:

Static Analysis of Object References in RMI-Based Java Software. 664-681 - Steven P. Reiss:

Incremental Maintenance of Software Artifacts. 682-697 - David W. Binkley, Mariano Ceccato

, Mark Harman
, Filippo Ricca, Paolo Tonella
:
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects. 698-717 - Xiaoxia Ren, Ophelia C. Chesley, Barbara G. Ryder:

Identifying Failure Causes in Java Programs: An Application of Change Impact Analysis. 718-732 - Hyunsook Do, Gregg Rothermel:

On the Use of Mutation Faults in Empirical Assessments of Test Case Prioritization Techniques. 733-752 - Thorsten Schäfer, Michael Eichberg

, Michael Haupt, Mira Mezini:
The SEXTANT Software Exploration Tool. 753-768
Volume 32, Number 10, October 2006
- Jeff Kramer:

Editorial: New Associate Editors Introduction. 769-770
- Yuming Zhou, Hareton Leung

:
Empirical Analysis of Object-Oriented Design Metrics for Predicting High and Low Severity Faults. 771-789 - Daniel Conte de Leon, Jim Alves-Foss:

Hidden Implementation Dependencies in High Assurance and Critical Computing Systems. 790-811 - Henrik C. Bohnenkamp, Pedro R. D'Argenio

, Holger Hermanns
, Joost-Pieter Katoen
:
MODEST: A Compositional Modeling Formalism for Hard and Softly Timed Systems. 812-830 - Chao Liu, Long Fei, Xifeng Yan, Jiawei Han, Samuel P. Midkiff

:
Statistical Debugging: A Hypothesis Testing-Based Approach. 831-848
Volume 32, Number 11, November 2006
- João Durães

, Henrique Madeira
:
Emulation of Software Faults: A Field Data Study and a Practical Approach. 849-867 - Diwakar Krishnamurthy, Jerome A. Rolia, Shikharesh Majumdar:

A Synthetic Workload Generation Technique for Stress Testing Session-Based Systems. 868-882 - Tim Menzies, Zhihao Chen, Jairus Hihn, Karen T. Lum:

Selecting Best Practices for Effort Estimation. 883-895 - Nikolaos Tsantalis

, Alexander Chatzigeorgiou, George Stephanides, Spyros T. Halkidis:
Design Pattern Detection Using Similarity Scoring. 896-909 - Stefanos Zachariadis, Cecilia Mascolo, Wolfgang Emmerich:

The SATIN Component System-A Metamodel for Engineering Adaptable Mobile Systems. 910-927
Volume 32, Number 12, December 2006
- William G. Griswold

, Bashar Nuseibeh:
Guest Editors' Introduction to the Special Section on the International Conference on Software Engineering. 929-930 - Brian Demsky, Martin C. Rinard:

Goal-Directed Reasoning for Specification-Based Data Structure Repair. 931-951 - Reid Holmes, Robert J. Walker

, Gail C. Murphy:
Approximate Structural Context Matching: An Approach to Recommend Relevant Examples. 952-970 - Amy J. Ko, Brad A. Myers, Michael J. Coblenz

, Htet Htet Aung:
An Exploratory Study of How Developers Seek, Relate, and Collect Relevant Information during Software Maintenance Tasks. 971-987
- Viktor Kuncak

, Patrick Lam, Karen Zee, Martin C. Rinard:
Modular Pluggable Analyses for Data Structure Consistency. 988-1005

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














