


default search action
3rd ESEM 2009: Lake Buena Vista, Florida, USA
- Proceedings of the Third International Symposium on Empirical Software Engineering and Measurement, ESEM 2009, October 15-16, 2009, Lake Buena Vista, Florida, USA. IEEE Computer Society 2009, ISBN 978-1-4244-4842-5

- Thomas Tan, Qi Li, Barry W. Boehm, Ye Yang, Mei He, Ramin Moazeni:

Productivity trends in incremental and iterative software development. 1-10 - Heidi J. Rognerud, Jo Erskine Hannay:

Challenges in enterprise software integration: An industrial study using repertory grids. 11-22 - Fei Dong, Mingshu Li, Juan Li, Ye Yang, Qing Wang:

Effect of staffing pattern on software project: An empirical analysis. 23-33 - Ekwa Duala-Ekoko, Martin P. Robillard:

A detailed examination of the correlation between imports and failure-proneness of software components. 34-43 - Sandro Morasca

:
A probability-based approach for measuring external attributes of software artifacts. 44-55 - Gengshen Du, Günther Ruhe:

Does explanation improve the acceptance of decision support for product release planning? 56-68 - Sebastien Jeanmart, Yann-Gaël Guéhéneuc, Houari A. Sahraoui, Naji Habra:

Impact of the visitor pattern on program comprehension and maintenance. 69-78 - Simon Denier, Houari A. Sahraoui:

Understanding the use of inheritance with visual patterns. 79-88 - Pietro Abate, Roberto Di Cosmo, Jaap Boender, Stefano Zacchiroli

:
Strong dependencies between software components. 89-99 - Luigi Lavazza

, Carla Garavaglia:
Using function points to measure and estimate real-time and embedded software: Experiences and guidelines. 100-110 - Chris Lokan, Emilia Mendes:

Applying moving windows to software effort estimation. 111-122 - Salvatore Alessandro Sarcià

, Victor R. Basili, Giovanni Cantone:
Scope error detection and handling concerning software estimation models. 123-132 - Marcus Ciolkowski

:
What do we know about perspective-based reading? An approach for quantitative aggregation in software engineering. 133-144 - Bryan Robbins, Jeffrey C. Carver:

Cognitive factors in perspective-based reading (PBR): A protocol analysis study. 145-155 - Stefan Hanenberg, Sebastian Kleinschmager, Manuel Josupeit-Walter:

Does aspect-oriented programming increase the development speed for crosscutting code? An empirical study. 156-167 - Philip Johnson, Shaoxuan Zhang:

We need more coverage, stat! classroom experience with the software ICU. 168-178 - Min Zhang, Lorin Hochstein:

Fitting a workflow model to captured development data. 179-190 - Anna Corazza

, Sergio Di Martino
, Filomena Ferrucci, Carmine Gravino
, Emilia Mendes:
Applying support vector regression for web effort estimation using a cross-company dataset. 191-202 - Thorbjorn Walle, Jo Erskine Hannay:

Personality and the nature of collaboration in pair programming. 203-213 - Norsaremah Salleh

, Emilia Mendes, John C. Grundy
, Giles St. J. Burch:
An empirical study of the effects of personality in pair programming using the five-factor model. 214-225 - Ilenia Fronza

, Alberto Sillitti, Giancarlo Succi
:
An interpretation of the results of the analysis of pair programming during novices integration in a team. 225-235 - Medha Umarji, Carolyn B. Seaman:

Gauging acceptance of software metrics: Comparing perspectives of managers and developers. 236-247 - Rahul Razdan, Steve Esposito, Jay Lawrence, Peter Conner:

Empirical results from the transformation of a large commercial technical computing environment. 248-256 - Sebastian Barney, Claes Wohlin

, Aybüke Aurum:
Balancing software product investments. 257-268 - Arilo Claudio Dias Neto, Guilherme Horta Travassos:

Evaluation of model-based testing techniques selection approaches: An external replication. 269-278 - Lucas Lima

, Juliano Iyoda, Augusto Sampaio, Eduardo Aranha:
Test case prioritization based on data reuse an experimental study. 279-290 - Audris Mockus

, Nachiappan Nagappan, Trung T. Dinh-Trong:
Test coverage and post-verification defects: A multiple case study. 291-301 - Dapeng Liu, Qing Wang, Junchao Xiao:

The role of software process simulation modeling in software risk management: A systematic review. 302-311 - Nico Zazworka

, Victor R. Basili, Forrest Shull:
Tool supported detection and judgment of nonconformance in process execution. 312-323 - Carlton A. Crabtree, Carolyn B. Seaman, Anthony F. Norcio:

Exploring language in software process elicitation: A grounded theory approach. 324-335 - Barbara A. Kitchenham

, Pearl Brereton, Mark Turner, Mahmood Niazi
, Stephen G. Linkman, Rialette Pretorius, David Budgen
:
The impact of limited search procedures for systematic literature reviews A participant-observer case study. 336-345 - Muhammad Ali Babar, He Zhang:

Systematic literature reviews in software engineering: Preliminary results from interviews with researchers. 346-355 - Natalia Juristo Juzgado, Sira Vegas

:
Using differences among replications of software engineering experiments to gain knowledge. 356-366 - Mehwish Riaz, Emilia Mendes, Ewan D. Tempero

:
A systematic review of software maintainability prediction and metrics. 367-377 - Aiko Fallas Yamashita, Hans Christian Benestad, Bente Cecilie Dahlum Anda, Per Einar Arnstad, Dag I. K. Sjøberg, Leon Moonen

:
Using concept mapping for maintainability assessments. 378-389 - Steffen M. Olbrich, Daniela S. Cruzes, Victor R. Basili, Nico Zazworka

:
The evolution and impact of code smells: A case study of two open source systems. 390-400 - Kai Petersen

, Claes Wohlin
:
Context in industrial software engineering research. 401-404 - A. César C. França

, Fabio Q. B. da Silva
:
An empirical study on software engineers motivational factors. 405-409 - Yi Wang:

Building the linkage between project managers' personality and success of software projects. 410-413 - Paulo Sérgio Medeiros dos Santos, Guilherme Horta Travassos:

Action research use in software engineering: An initial survey. 414-417 - Edzreena Edza Odzaly, Paul Sage, Des Greer:

Software risk management barriers: An empirical study. 418-421 - Gabriela Robiolo

, Cristina Badano, Ricardo Orosco
:
Transactions and paths: Two use case based metrics which improve the early effort estimation. 422-425 - Liam Feldman, Carl J. Mueller, Dan E. Tamir, Oleg V. Komogortsev:

Usability testing with total-effort metrics. 426-429 - Lulu He, Jeffrey C. Carver:

Modifiability measurement from a task complexity perspective: A feasibility study. 430-434 - Thomas Zimmermann, Nachiappan Nagappan:

Predicting defects with program dependencies. 435-438 - Md. Mainur Rahman, Günther Ruhe, Thomas Zimmermann:

Optimized assignment of developers for fixing bugs an initial evaluation for eclipse projects. 439-442 - Christoph Domann, Elmar Jürgens, Jonathan Streit

:
The curse of copy&paste Cloning in requirements specifications. 443-446 - Dan Schrimpsher, Letha H. Etzkorn:

An empirical quality model for web service ontologies to support mobile devices. 447-450 - Zhongpeng Lin, Fengdi Shu, Ye Yang, Chenyong Hu, Qing Wang:

An empirical study on bug assignment automation using Chinese bug data. 451-455 - Huijuan Wu, Yuepu Guo, Carolyn B. Seaman:

Analyzing video data: A study of programming behavior under two software engineering paradigms. 456-459 - Ana Erika Camargo Cruz, Koichiro Ochimizu:

Towards logistic regression models for predicting fault-prone code across software projects. 460-463 - Stefan Wagner

, Klaus Lochmann, Sebastian Winter, Andreas Goeb, Michael Klaes:
Quality models in practice: A preliminary analysis. 464-467 - Silvia Abrahão

, Emilio Insfrán
, Carmine Gravino
, Giuseppe Scanniello
:
On the effectiveness of dynamic modeling in UML: Results from an external replication. 468-472 - Fan Wang, Xiaohu Yang, Xiaochun Zhu, Lu Chen:

Simulation of the defect removal process with queuing theory. 473-476 - Ayse Tosun

, Ayse Basar Bener
:
Reducing false alarms in software defect prediction by decision threshold optimization. 477-480 - Prasanth Anbalagan, Mladen A. Vouk:

An empirical study of security problem reports in Linux distributions. 481-484 - Frank Elberzhager

, Marek Jawurek, Christian Jung
, Alexander Klaus:
Progress report on the experimental evaluation of security inspection guidance. 485-489 - Xiaochun Zhu, Bo Zhou, Lu Chen:

Software testing sizing in incremental development: A case study. 490-493 - Juha Itkonen

, Mika Mäntylä
, Casper Lassenius
:
How do testers do it? An exploratory study on manual testing practices. 494-497 - Martín Soto, Marcus Ciolkowski

:
The QualOSS open source assessment model measuring the performance of open source communities. 498-501 - Nelly Condori-Fernández

, Maya Daneva
, Klaas Sikkel, Roel J. Wieringa, Óscar Dieste Tubío
, Oscar Pastor
:
A systematic mapping study on empirical evaluation of software requirements specifications techniques. 502-505 - Özlem Albayrak:

An experiment to observe the impact of UML diagrams on the effectiveness of software requirements inspections. 506-510 - Susan M. Mitchell, Carolyn B. Seaman:

A comparison of software cost, duration, and quality for waterfall vs. iterative and incremental development: A systematic review. 511-515 - Karen Scarfone

, Peter Mell:
An analysis of CVSS version 2 vulnerability scoring. 516-525 - Geraldine Vache:

Vulnerability analysis for a quantitative security evaluation. 526-534 - Christian Frühwirth, Tomi Männistö

:
Improving CVSS-based vulnerability prioritization and response with context information. 535-544 - James Walden

, Maureen Doyle, Grant A. Welch, Michael Whelan:
Security of open source web applications. 545-553 - Koen Buyens, Riccardo Scandariato, Wouter Joosen:

Measuring the interplay of security principles in software architectures. 554-563 - Yolanta Beres, Marco Casassa Mont

, Jonathan Griffin, Simon Shiu:
Using security metrics coupled with predictive modeling and simulation to assess security processes. 564-573 - Hideyuki Tanaka:

Quantitative analysis of information security interdependency between industrial sectors. 574-583

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














