default search action
ACM Transactions on Software Engineering and Methodology, Volume 22
Volume 22, Number 1, February 2013
- David Notkin:
Editorial - looking back. 1:1-1:2 - David S. Rosenblum:
Editorial - looking forward. 2:1-2:3 - Jun Sun, Yang Liu, Jin Song Dong, Yan Liu, Ling Shi, Étienne André:
Modeling and verifying hierarchical real-time systems using stateful timed CSP. 3:1-3:29 - Brian Demsky, Patrick Lam:
Views: Synthesizing fine-grained concurrency control. 4:1-4:33 - Tao Yue, Lionel C. Briand, Yvan Labiche:
Facilitating the transition from use case models to analysis models: Approach and experiments. 5:1-5:38 - Hadi Hemmati, Andrea Arcuri, Lionel C. Briand:
Achieving scalable model-based testing through test case diversity. 6:1-6:42 - Martin Monperrus, Mira Mezini:
Detecting missing method calls as violations of the majority rule. 7:1-7:25 - Jeff Huang, Jinguo Zhou, Charles Zhang:
Scaling predictive analysis of concurrent programs by removing trace redundancy. 8:1-8:21 - Nicolás D'Ippolito, Víctor A. Braberman, Nir Piterman, Sebastián Uchitel:
Synthesizing nonanomalous event-based controllers for liveness goals. 9:1-9:36
Volume 22, Number 2, March 2013
- Wei Zhang, Chong Sun, Junghee Lim, Shan Lu, Thomas W. Reps:
ConMem: Detecting Crash-Triggering Concurrency Bugs through an Effect-Oriented Approach. 10:1-10:33 - Marcello La Rosa, Marlon Dumas, Reina Uba, Remco M. Dijkman:
Business Process Model Merging: An Approach to Business Process Consolidation. 11:1-11:42 - Zibin Zheng, Michael R. Lyu:
Personalized Reliability Prediction of Web Services. 12:1-12:25 - Neil Walkinshaw, Kirill Bogdanov:
Automated Comparison of State-Based Software Models in Terms of Their Language and Structure. 13:1-13:37 - Scott D. Fleming, Christopher Scaffidi, David Piorkowski, Margaret M. Burnett, Rachel K. E. Bellamy, Joseph Lawrance, Irwin Kwan:
An Information Foraging Theory Perspective on Tools for Debugging, Refactoring, and Reuse Tasks. 14:1-14:41 - Sagar Chaki, Christian Schallhart, Helmut Veith:
Verification across Intellectual Property Boundaries. 15:1-15:12
Volume 22, Number 3, July 2013
- David S. Rosenblum:
In memoriam: David Notkin (1955-2013). 16:1-16:2
- Guoqing Xu, Atanas Rountev:
Precise memory leak detection for java software using container profiling. 17:1-17:28 - Wei Le, Mary Lou Soffa:
Marple: Detecting faults in path segments using automatically generated analyses. 18:1-18:38 - Shin Yoo, Mark Harman, David Clark:
Fault localization prioritization: Comparing information-theoretic and coverage-based approaches. 19:1-19:29
- Matteo Pradella, Angelo Morzenti, Pierluigi San Pietro:
Bounded satisfiability checking of metric temporal logic specifications. 20:1-20:54
- Davide Falessi, Lionel C. Briand, Giovanni Cantone, Rafael Capilla, Philippe Kruchten:
The value of design rationale information. 21:1-21:32 - Kevin J. Hoffman, Patrick Eugster:
Trading obliviousness for modularity with cooperative aspect-oriented programming. 22:1-22:46 - Hong Zhu, Ian Bayley:
An algebra of design patterns. 23:1-23:35 - Mira Balaban, Azzam Maraee:
Finite satisfiability of UML class diagrams with constrained class hierarchy. 24:1-24:42 - Guido de Caso, Víctor A. Braberman, Diego Garbervetsky, Sebastián Uchitel:
Enabledness-based program abstractions for behavior validation. 25:1-25:46 - Beatriz Marín, Giovanni Giachetti, Oscar Pastor, Tanja E. J. Vos, Alain Abran:
Using a functional size measurement procedure to evaluate the quality of models in MDD environments. 26:1-26:31 - Daniel Sinnig, Patrice Chalin, Ferhat Khendek:
Use case and task models: An integrated development methodology and its formal foundation. 27:1-27:31
Volume 22, Number 4, October 2013
- Giovanni Denaro, Mauro Pezzè, Davide Tosi:
Test-and-adapt: An approach for improving service interchangeability. 28:1-28:43 - Lorenzo Martignoni, Roberto Paleari, Alessandro Reina, Giampaolo Fresi Roglia, Danilo Bruschi:
A methodology for testing CPU emulators. 29:1-29:26 - Hervé Chang, Leonardo Mariani, Mauro Pezzè:
Exception handlers for healing component-based systems. 30:1-30:40 - Xiaoyuan Xie, Tsong Yueh Chen, Fei-Ching Kuo, Baowen Xu:
A theoretical analysis of the risk evaluation formulas for spectrum-based fault localization. 31:1-31:40 - Dawei Qi, Hoang D. T. Nguyen, Abhik Roychoudhury:
Path exploration based on symbolic output. 32:1-32:41 - Takaaki Tateishi, Marco Pistoia, Omer Tripp:
Path- and index-sensitive string analysis based on monadic second-order logic. 33:1-33:33 - Jérôme Vouillon, Roberto Di Cosmo:
On software component co-installability. 34:1-34:35 - Leandro L. Minku, Xin Yao:
Software effort estimation as a multiobjective learning problem. 35:1-35:32 - David Lizcano, Fernando Alonso, Javier Soriano, Genoveva López Gómez:
A web-centred approach to end-user software engineering. 36:1-36:29 - Collin McMillan, Denys Poshyvanyk, Mark Grechanik, Qing Xie, Chen Fu:
Portfolio: Searching for relevant functions and their usages in millions of lines of code. 37:1-37:30 - Michael Würsch, Emanuel Giger, Harald C. Gall:
Evaluating a query framework for software evolution data. 38:1-38:38
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.