


default search action
23rd ASWEC 2014: Sydney, NSW, Australia
- 23rd Australian Software Engineering Conference, ASWEC 2014, Milsons Point, Sydney, NSW, Australia, April 7-10, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3149-1

- Esra Alzaghoul, Rami Bahsoon:

Evaluating Technical Debt in Cloud-Based Architectures Using Real Options. 1-10 - Lu Xiao, Hye-Young Paik

:
Supporting Complex Work in Crowdsourcing Platforms: A View from Service-Oriented Computing. 11-14 - Annabelle Klarl, Rolf Hennicker:

Design and Implementation of Dynamically Evolving Ensembles with the Helena Framework. 15-24 - Bedir Tekinerdogan

, Evren Çilden, Özgü Özköse Erdogan, Onur Aktug:
Architecture Conformance Analysis Approach within the Context of Multiple Product Line Engineering. 25-28 - Sriharsha Vathsavayi, Outi Sievi-Korte

, Kai Koskimies, Kari Systä
:
Using Constraint Satisfaction and Optimization for Pattern-Based Software Design. 29-37 - Vladimir Estivill-Castro

, René Hexel
:
Correctness by Construction with Logic-Labeled Finite-State Machines - Comparison with Event-B. 38-47 - Hussain A. Al-Mutawa, Jens Dietrich

, Stephen Marsland, Catherine McCartin:
On the Shape of Circular Dependencies in Java Programs. 48-57 - Meiru Che, Dewayne E. Perry:

Architectural Design Decisions in Open Software Development: A Transition to Software Ecosystems. 58-61 - Abdussalam Ali, Igor T. Hawryszkiewycz, Jinjun Chen:

Services for Knowledge Sharing in Dynamic Business Networks. 62-65 - Patrizio Pelliccione

:
Open Architectures and Software Evolution: The Case of Software Ecosystems. 66-69 - Adam Roughton, Ian Warren, Beryl Plimmer:

Concentus: Applying Stream Processing to Online Collective Interaction. 70-79 - Eric Gu, Mo-Hong Tzou, Rashina Hoda

:
Fill That Blank! An iOS-based Literacy Application. 80-83 - Navid Ahmadi, Mehdi Jazayeri:

Analyzing the Learning Process in Online Educational Game Design: A Case Study. 84-93 - Anneliese Amschler Andrews, Joseph Lucente:

From Incident Reports to Improvement Recommendations: Analyzing IT Help Desk Data. 94-103 - Raj P. Gopalan, Aneesh Krishna

:
Duplicate Bug Report Detection Using Clustering. 104-109 - Philippe Dugerdil, Mihnea Niculescu:

Visualizing Software Structure Understandability. 110-119 - Ashish Sureka:

Requirements Prioritization and Next-Release Problem under Non-additive Value Conditions. 120-123 - Sarunas Marciuska, Çigdem Gencel

, Pekka Abrahamsson
:
Feature Usage as a Value Indicator for Decision Making. 124-131 - Byungho Min, Vijay Varadharajan

:
A New Technique for Counteracting Web Browser Exploits. 132-141 - Anton V. Uzunov, Eduardo B. Fernández

, Katrina Falkner
:
A Comprehensive Pattern-Driven Security Methodology for Distributed Systems. 142-151 - Mohamed Almorsy, John Grundy

:
SecDSVL: A Domain-Specific Visual Language to Support Enterprise Security Modelling. 152-161 - Tom McBride:

The Role of Boundary Objects in the Fuzzy Front End of IT Development. 162-169 - Zheng Li

, Liam O'Brien, Ye Yang:
Impact of Product Complexity on Actual Effort in Software Developments: An Empirical Investigation. 170-179 - Tanjila Kanij, Robert G. Merkel, John Grundy

:
A Preliminary Survey of Factors Affecting Software Testers. 180-189 - Ahmed Gario, Anneliese Amschler Andrews:

Fail-Safe Testing of Safety-Critical Systems. 190-199 - Anneliese Amschler Andrews, Salah Boukhris, Salwa Elakeili:

Fail-Safe Testing of Web Applications. 200-209 - M. Shaban Jokhio, Gillian Dobbie, Tianming Hu, Jing Sun

:
Automated Mutation-Based Test Case Evaluation for Semantic Web Services. 210-219 - Pablo Oliveira Antonino, Thorsten Keuler, Nicolas Germann, Brian Cronauer:

A Non-invasive Approach to Trace Architecture Design, Requirements Specification and Agile Artifacts. 220-229 - Ioanna Lytra, Uwe Zdun:

Inconsistency Management between Architectural Decisions and Designs Using Constraints and Model Fixes. 230-239

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














