default search action
James D. Arthur
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j19]James B. Dabney, James D. Arthur:
Applying standard independent verification and validation techniques within an agile framework: Identifying and reconciling incompatibilities. Syst. Eng. 22(4): 348-360 (2019) - 2017
- [c34]James D. Arthur, James B. Dabney:
Applying standard independent verification and validation (IV&V) techniques within an Agile framework: Is there a compatibility issue? SysCon 2017: 1-5 - 2013
- [c33]Shvetha Soundararajan, Osman Balci, James D. Arthur:
Assessing an Organization's Capability to Effectively Implement Its Selected Agile Method(s): An Objectives, Principles, Strategies Approach. AGILE 2013: 22-31 - 2012
- [c32]Shvetha Soundararajan, James D. Arthur, Osman Balci:
A Methodology for Assessing Agile Software Development Methods. AGILE 2012: 51-54 - [c31]Shvetha Soundararajan, Amine Chigani, James D. Arthur:
Understanding the tenets of agile software engineering: lecturing, exploration and critical thinking. SIGCSE 2012: 313-318 - 2011
- [j18]Osman Balci, James D. Arthur, William F. Ormsby:
Achieving reusability and composability with a simulation conceptual model. J. Simulation 5(3): 157-165 (2011) - [c30]Shvetha Soundararajan, James D. Arthur:
A Structured Framework for Assessing the "Goodness" of Agile Methods. ECBS 2011: 14-23 - 2010
- [i16]Shvetha Soundararajan, James D. Arthur:
A Structured Framework for Assessing the "Goodness" of Agile Methods. CoRR abs/1005.4123 (2010) - [i15]Shvetha Soundararajan, James D. Arthur, Amine Chigani:
Understanding the Tenets of Agile Software Engineering: Lecturing, Exploration and Critical Thinking. CoRR abs/1005.5060 (2010)
2000 – 2009
- 2009
- [c29]Shvetha Soundararajan, James D. Arthur:
A Soft-Structured Agile Framework for Larger Scale Systems Development. ECBS 2009: 187-195 - [c28]Pardha S. Pyla, H. Rex Hartson, Manuel A. Pérez-Quiñones, James D. Arthur, Tonya L. Smith-Jackson, Deborah Hix:
"How Do I Evaluate THAT?" Experiences from a Systems-Level Evaluation Effort. HCI (10) 2009: 292-301 - 2008
- [j17]Ramya Ravichandar, James D. Arthur:
Cohesion, Coupling and Abstraction Level: Criteria for Capability Identification. J. Softw. 3(1): 1-8 (2008) - [j16]Ramya Ravichandar, James D. Arthur, Shawn A. Bohner, David P. Tegarden:
Improving change tolerance through Capabilities-based design: an empirical analysis. J. Softw. Maintenance Res. Pract. 20(2): 135-170 (2008) - [c27]Ahmed Samy Sidky, James D. Arthur:
Value-Driven Agile Adoption: Improving An Organization's Software Development Approach. SoMeT 2008: 149-164 - [c26]Osman Balci, James D. Arthur, Richard E. Nance:
Accomplishing reuse with a simulation conceptual model. WSC 2008: 959-965 - 2007
- [j15]Ahmed Samy Sidky, James D. Arthur, Shawn A. Bohner:
A disciplined approach to adopting agile practices: the agile adoption framework. Innov. Syst. Softw. Eng. 3(3): 203-216 (2007) - [j14]Shawn A. Bohner, Ramya Ravichandar, James D. Arthur:
Model-based engineering for change-tolerant systems. Innov. Syst. Softw. Eng. 3(4): 237-257 (2007) - [j13]James D. Arthur, Richard E. Nance:
Investigating the use of software requirements engineering techniques in simulation modelling. J. Simulation 1(3): 159-174 (2007) - [c25]Amine Chigani, James D. Arthur:
The implications of network-centric software systems on software architecture: a critical evaluation. ACM Southeast Regional Conference 2007: 70-75 - [c24]Ramya Ravichandar, James D. Arthur, Robert P. Broadwater:
Reconciling Synthesis and Decomposition: A Composite Approach to Capability Identification. ECBS 2007: 287-298 - [c23]Anil Bazaz, James D. Arthur:
Towards a Taxonomy of Vulnerabilities. HICSS 2007: 163 - [c22]Ramya Ravichandar, James D. Arthur, Shawn A. Bohner:
Capabilities Engineering: Constructing Change-Tolerant Systems. HICSS 2007: 278 - [c21]James D. Arthur, Anil Bazaz, Richard E. Nance, Osman Balci:
Mitigating Security Risks in Systems that Support Pervasive Services and Computing: Access-Driven Verification, Validation and Testing. ICPS 2007: 109-117 - [c20]Ahmed Samy Sidky, James D. Arthur:
Determining the Applicability of Agile Practices to Mission and Life-Critical Systems. SEW 2007: 3-12 - [c19]Amine Chigani, James D. Arthur, Shawn A. Bohner:
Architecting Network-Centric Software Systems: A Style-Based Beginning. SEW 2007: 290-299 - [i14]Ahmed Samy Sidky, James D. Arthur, Shawn A. Bohner:
A Disciplined Approach to Adopting Agile Practices: The Agile Adoption Framework. CoRR abs/0704.1294 (2007) - [i13]Ahmed Samy Sidky, James D. Arthur:
Determining the Applicability of Agile Practices to Mission and Life-critical Systems. CoRR abs/cs/0701010 (2007) - [i12]Ramya Ravichandar, James D. Arthur, Manuel A. Pérez-Quiñones:
Pre-Requirement Specification Traceability: Bridging the Complexity Gap through Capabilities. CoRR abs/cs/0703012 (2007) - 2006
- [j12]James W. Helms, James D. Arthur, Deborah Hix, H. Rex Hartson:
A field study of the Wheel - a usability engineering process model. J. Syst. Softw. 79(6): 841-858 (2006) - [c18]Anil Bazaz, James D. Arthur, Joseph G. Tront:
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. DASC 2006: 95-102 - [i11]Ramya Ravichandar, James D. Arthur, Shawn A. Bohner:
Capabilities Engineering: Constructing Change-Tolerant Systems. CoRR abs/cs/0611071 (2006) - [i10]Ramya Ravichandar, James D. Arthur, Robert P. Broadwater:
Reconciling Synthesis and Decomposition: A Composite Approach to Capability Identification. CoRR abs/cs/0611072 (2006) - [i9]Amine Chigani, James D. Arthur:
The Implications of Network-Centric Software Systems on Software Architecture: A Critical Evaluation. CoRR abs/cs/0611110 (2006) - [i8]Ahmed Samy Sidky, James D. Arthur:
Agile Adoption Process Framework. CoRR abs/cs/0612092 (2006) - [i7]Amine Chigani, James D. Arthur, Shawn A. Bohner:
Architecting Network-Centric Software Systems: A Style-Based Beginning. CoRR abs/cs/0612131 (2006) - 2005
- [j11]James D. Arthur, Markus K. Gröner:
An operational model for structuring the requirements generation process. Requir. Eng. 10(1): 45-62 (2005) - [c17]Lester O. Lobo, James D. Arthur:
Local and global analysis: complementary activities for increasing the effectiveness of requirements verification and validation. ACM Southeast Regional Conference (2) 2005: 256-261 - [c16]Lester O. Lobo, James D. Arthur:
An Objectives-Driven Process for Selecting Methods to Support Requirements Engineering Activities. SEW 2005: 118-130 - [i6]Lester O. Lobo, James D. Arthur:
Local and Global Analysis: Complementary Activities for Increasing the Effectiveness of Requirements Verification and Validation. CoRR abs/cs/0503002 (2005) - [i5]Lester O. Lobo, James D. Arthur:
An Objectives-Driven Process for Selecting Methods to Support Requirements Engineering Activities. CoRR abs/cs/0503003 (2005) - [i4]Lester O. Lobo, James D. Arthur:
Effective Requirements Generation: Synchronizing Early Verification & Validation, Methods and Method Selection Criteria. CoRR abs/cs/0503004 (2005) - [i3]Anil Bazaz, James D. Arthur:
On Vulnerabilities, Constraints and Assumptions. CoRR abs/cs/0509076 (2005) - 2004
- [j10]James D. Arthur, Markus K. Gröner:
Verification and Validation of operational software: a process and methodology critique. Softw. Process. Improv. Pract. 9(3): 157-171 (2004) - [c15]Anil Bazaz, James D. Arthur, Randy C. Marchany:
Reflections on Operating in Hostile Environments. HICSS 2004 - [i2]Pardha S. Pyla, Manuel A. Pérez-Quiñones, James D. Arthur, H. Rex Hartson:
Towards a Model-Based Framework for Integrating Usability and Software Engineering Life Cycles. CoRR cs.HC/0402036 (2004) - [i1]Pardha S. Pyla, Manuel A. Pérez-Quiñones, James D. Arthur, H. Rex Hartson:
What we should teach, but don't: Proposal for a cross pollinated HCI-SE curriculum. CoRR cs.OH/0403026 (2004) - 2003
- [c14]Ahmed Samy Sidky, James D. Arthur:
RGML: A Markup Language for Characterizing Requirements Generation Processes. SEW 2003: 29 - 2002
- [b2]Richard E. Nance, James D. Arthur:
Managing software quality - a measurement framework for assesment and prediction. Practitioner series, Springer 2002, ISBN 978-1-85233-393-5, pp. I-X, 1-121 - [c13]Wesley James Lloyd, Mary Beth Rosson, James D. Arthur:
Effectiveness of Elicitation Techniques in Distributed Requirements Engineering. RE 2002: 311-318 - [c12]Osman Balci, Richard E. Nance, James D. Arthur, William F. Ormsby:
Improving the model development process: expanding our horizons in verification, validation, and accreditation research and practice. WSC 2002: 653-663 - 2000
- [c11]James D. Arthur, Richard E. Nance:
V&A; III: verification and validation without independence: a recipe for failure. WSC 2000: 859-865
1990 – 1999
- 1999
- [j9]James D. Arthur, Markus K. Gröner, Kelly J. Hayhurst, C. Michael Holloway:
Evaluating the Effectiveness of Independendent Verification and Validation. Computer 32(10): 79-83 (1999) - [c10]James D. Arthur, Robert G. Sargent, James B. Dabney, Averill M. Law, John D. (Jack) Morrison:
Verification and validation: what impact should project size and complexity have on attendant V&V activities and supporting infrastructure? (panel). WSC 1999: 148-155 - 1997
- [c9]James D. Arthur, Richard E. Nance, Robert G. Sargent, Dolores R. Wallace, Linda H. Rosenberg, Paul R. Muessig:
Verification, Validation & Accreditation: Disciplines in Dialogue or can we Learn from the Experiences of Others? (Panel). WSC 1997: 489-496 - 1996
- [c8]James D. Arthur, Richard E. Nance:
Independent Verification and Validation: A Missing Link in Simulation Methodology? WSC 1996: 230-236 - 1995
- [j8]Kenneth D. Landry, James D. Arthur:
Instructional footprinting and semantic preservation in Linda. Concurr. Pract. Exp. 7(3): 191-207 (1995) - [j7]Patrick G. Robinson, James D. Arthur:
Distributed Process Creation within a Shared Data Space Framework. Softw. Pract. Exp. 25(2): 175-191 (1995) - [c7]Kenneth D. Landry, James D. Arthur:
Boundary Analysis in the Instructional Footprint Model: An Implementation in Linda. ACM Conference on Computer Science 1995: 56-65 - 1994
- [c6]Kenneth D. Landry, James D. Arthur:
Achieving Asynchronous Speedup While Preserving Synchronous Semantics: An Implementation of Instructional Footprinting in Linda. ICCL 1994: 55-63 - [c5]Mary Ann Flanigan Wagner, Süleyman Sevinc, Oryal Tanir, Peter L. Haigh, James D. Arthur, Richard E. Nance, Herbert D. Schwetman:
A standard simulation environment: a review of preliminary requirements. WSC 1994: 664-672 - 1993
- [j6]James D. Arthur, Richard E. Nance, Osman Balci:
Establishing software development process control: Technical objectives, operational requirements, and the foundational framework. J. Syst. Softw. 22(2): 117-128 (1993) - [c4]Edward G. Okie, James D. Arthur:
Implicit-Specification Errors and Automatic, Trace-Based Debugging. ACM Conference on Computer Science 1993: 23-29 - 1992
- [j5]James D. Arthur, K. Todd Stevens:
Document quality indicators: A framework for assessing documentation adequacy. J. Softw. Maintenance Res. Pract. 4(3): 129-142 (1992) - 1990
- [j4]James D. Arthur:
Partitioned Frame Networks for Multi-Level, Menu-Based Interaction. Int. J. Man Mach. Stud. 32(6): 663-672 (1990)
1980 – 1989
- 1989
- [c3]James D. Arthur, K. Todd Stevens:
Assessing the adequacy of documentation through document quality indicators. ICSM 1989: 40-49 - 1988
- [c2]Edward G. Okie, James D. Arthur:
The execution history approach to intelligent debugging. ACM Conference on Computer Science 1988: 273-281 - [c1]Richard E. Nance, James D. Arthur:
The methodology roles in the realization of a model development environment. WSC 1988: 220-225 - 1987
- [j3]James D. Arthur, Douglas Comer:
An Interactive Environment for Tool Selection, Specification and Composition. Int. J. Man Mach. Stud. 26(5): 581-595 (1987) - [j2]James D. Arthur:
Toward a formal specification of menu-based systems. J. Syst. Softw. 7(1): 73-82 (1987) - 1986
- [j1]James D. Arthur:
A Descriptive/Prescriptive Model for Menu-Based Interaction. Int. J. Man Mach. Stud. 25(1): 19-32 (1986) - 1983
- [b1]James D. Arthur:
An interactive environment for tool selection, specification, and composition. Purdue University, USA, 1983
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint