


default search action
Information & Software Technology, Volume 58
Volume 58, February 2015
- Mario Cortes Cornax
, Alexandru Matei
, Sophie Dupuy-Chessa, Dominique Rieu, Nadine Mandran, Emmanuel Letier:
Using intentional fragments to bridge the gap between organizational and intentional levels. 1-19 - Fernando Selleri Silva
, Felipe Santana Furtado Soares, Angela Lima Peres
, Ivanildo Monteiro de Azevedo
, Ana Paula L. F. Vasconcelos
, Fernando Kenji Kamei
, Silvio Romero de Lemos Meira:
Using CMMI together with agile software development: A systematic review. 20-43 - Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina
, Haralambos Mouratidis
:
Empirical evaluation of a cloud computing information security governance framework. 44-57 - Wen Zhang, Ye Yang, Qing Wang:
Using Bayesian regression and EM algorithm with missing handling for software effort prediction. 58-70 - Nicolás Cardozo, Sebastián González, Kim Mens
, Ragnhild Van Der Straeten, Jorge Vallejos, Theo D'Hondt:
Semantics for consistent activation in context-oriented systems. 71-94 - David Insa, Josep Silva
:
Automatic transformation of iterative loops into recursive methods. 95-109 - Jakub Jurkiewicz, Jerzy R. Nawrocki:
Automated events identification in use cases. 110-122 - Vahid Garousi-Yusifoglu
, Yasaman Amannejad, Aysu Betin Can
:
Software test-code engineering: A systematic mapping. 123-147 - Muneera Bano
, Didar Zowghi
:
A systematic review on the relationship between user involvement and system success. 148-169 - Isatou Hydara, Abu Bakar Md Sultan
, Hazura Zulzalil
, Novia Admodisastro
:
Current state of research on cross-site scripting (XSS) - A systematic literature review. 170-186 - Isel Moreno-Montes de Oca, Monique Snoeck
, Hajo A. Reijers, Abel Rodríguez-Morffi
:
A systematic literature review of studies on business process modeling quality. 187-205 - Ali Idri
, Fatima Azzahra Amazal, Alain Abran
:
Analogy-based software development effort estimation: A systematic mapping and review. 206-230 - Jehad Al-Dallal
:
Identifying refactoring opportunities in object-oriented code: A systematic literature review. 231-249 - Tihana Galinac Grbac
, Darko Huljenic:
On the probability distribution of faults in complex software systems. 250-258 - Sasa Stojanovic, Zaharije Radivojevic, Milos Cvetanovic:
Approach for estimating similarity between procedures in differently compiled binaries. 259-271 - Pawel Janczarek, Janusz Sosnowski
:
Investigating software testing and maintenance reports: Case study. 272-288 - André Luís Andrade Menolli, Maria Alexandra Cunha, Sheila S. Reinehr
, Andreia Malucelli:
"Old" theories, "New" technologies: Understanding knowledge sharing and learning in Brazilian software development companies. 289-303 - Hannes Holm
, Matus Korman, Mathias Ekstedt:
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits. 304-318 - Leandro Souza de Oliveira, Pádraig O'Leary, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira:
Product derivation in practice. 319-337 - José Ignacio Panach
, Natalia Juristo Juzgado, Francisco Valverde
, Oscar Pastor
:
A framework to identify primitives that represent usability within Model-Driven Development methods. 338-354 - Antonia Bertolino
, Said Daoudagh
, Donia El Kateb, Christopher Henard, Yves Le Traon
, Francesca Lonetti
, Eda Marchetti
, Tejeddine Mouelhi, Mike Papadakis
:
Similarity testing for access control. 355-372 - Suprika Vasudeva Shrivastava, Urvashi Rathod
:
Categorization of risk factors for distributed agile projects. 373-387 - Issam H. Laradji, Mohammad R. Alshayeb
, Lahouari Ghouti
:
Software defect prediction using ensemble learning on selected features. 388-402 - Mickaël Delahaye, Bernard Botella, Arnaud Gotlieb:
Infeasible path generalization in dynamic symbolic execution. 403-418 - Javier Ferrer
, Peter M. Kruse, Francisco Chicano
, Enrique Alba
:
Search based algorithms for test sequence generation in functional testing. 419-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.