


default search action
Empirical Software Engineering, Volume 15
Volume 15, Number 1, February 2010
- Suresh Thummalapenta, Luigi Cerulo
, Lerina Aversano
, Massimiliano Di Penta
:
An empirical study on the maintenance of source code clones. 1-34 - Jeffrey C. Carver, Letizia Jaccheri
, Sandro Morasca
, Forrest Shull:
A checklist for integrating student empirical studies with research and teaching goals. 35-59 - Mohammad Azzeh
, Daniel Neagu
, Peter I. Cowling
:
Fuzzy grey relational analysis for software effort estimation. 60-90 - Darja Smite, Claes Wohlin
, Tony Gorschek, Robert Feldt
:
Empirical evidence in global software engineering: a systematic review. 91-118
Volume 15, Number 2, April 2010
- Xuchang Zou, Raffaella Settimi, Jane Cleland-Huang:
Improving automated requirements trace retrieval: a study of term-based enhancement methods. 119-146 - Hideaki Hata
, Osamu Mizuno
, Tohru Kikuno:
Fault-prone module detection using large-scale text features based on spam filtering. 147-165 - Hans Christian Benestad, Bente Anda, Erik Arisholm:
Understanding cost drivers of software evolution: a quantitative and qualitative investigation of change effort in two evolving software systems. 166-203 - Seiyoung Lee, Hwan-Seung Yong:
Distributed agile: project management in a global environment. 204-217
Volume 15, Number 3, June 2010
- Randy L. Hackbarth, Audris Mockus
, John Douglas Palframan, David M. Weiss:
Assessing the state of software in a large enterprise. 219-249 - Davide Falessi, Muhammad Ali Babar, Giovanni Cantone, Philippe Kruchten
:
Applying empirical software engineering to software architecture: challenges and lessons learned. 250-276 - Elaine J. Weyuker, Thomas J. Ostrand, Robert M. Bell:
Comparing the effectiveness of several modeling methods for fault prediction. 277-295 - Swapna S. Gokhale, Robert E. Mullen:
A multiplicative model of software defect repair times. 296-319
Volume 15, Number 4, August 2010
- Laurie A. Williams:
Guest editorial: Special issue on software reliability engineering. 321-322 - Zibin Zheng
, Michael R. Lyu:
An adaptive QoS-aware fault tolerance strategy for web services. 323-345 - Eduardo Cunha de Almeida
, Gerson Sunyé, Yves Le Traon
, Patrick Valduriez:
Testing peer-to-peer systems. 346-379 - Constantin Sârbu, Andréas Johansson, Neeraj Suri
, Nachiappan Nagappan:
Profiling the operational behavior of OS device drivers. 380-422 - Michael Kläs, Haruka Nakao, Frank Elberzhager, Jürgen Münch
:
Support planning and controlling of early quality assurance by combining expert judgment and defect data - a case study. 423-454
Volume 15, Number 5, October 2010
- Andrea De Lucia
, Carmine Gravino
, Rocco Oliveto, Genoveffa Tortora:
An experimental comparison of ER and UML class diagrams for data modelling. 455-492 - Gerardo Cepeda Porras, Yann-Gaël Guéhéneuc:
An empirical study on the efficiency of different design pattern representations in UML class diagrams. 493-522 - Nikolaos Mittas
, Lefteris Angelis:
LSEbA: least squares regression and estimation by analogy in a semi-parametric model for software cost estimation. 523-555 - Toan Huynh, James Miller:
An empirical investigation into open source web applications' implementation vulnerabilities. 556-576
Volume 15, Number 6, December 2010
- Günes Koru, Hongfang Liu, Dongsong Zhang, Khaled El Emam:
Testing the theory of relative defect proneness for closed-source software. 577-598 - George Michaelides
, Christopher Thomson, Stephen Wood:
Measuring fidelity to extreme programming: a psychometric approach. 599-617 - Barbara A. Kitchenham
, Pearl Brereton, Mark Turner, Mahmood Niazi
, Stephen G. Linkman, Rialette Pretorius, David Budgen
:
Refining the systematic literature review process - two participant-observer case studies. 618-653 - Kai Petersen
, Claes Wohlin
:
The effect of moving from a plan-driven to an incremental software development approach with agile practices - An industrial case study. 654-693

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.