


default search action
9th ESEC / 11th SIGSOFT FSE 2003: Helsinki, Finland
- Jukka Paakki, Paola Inverardi:

Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, ESEC/FSE 2003, Helsinki, Finland, September 1-5, 2003. ACM 2003, ISBN 978-1-58113-743-9 - Giuseppe Longo:

Computer modelling and natural phenomena. 1-5 - Leon J. Osterweil:

Understanding process and the quest for deeper questions in software engineering research. 6-14 - Ari Jaaksi:

Assessing software projects: tools for business owners. 15-18
Requirements engineering and design
- Sebastián Uchitel

, Jeff Kramer, Jeff Magee:
Behaviour model elaboration using partial labelled transition systems. 19-27 - Ralph D. Jeffords, Constance L. Heitmeyer

:
A strategy for efficiently verifying requirements. 28-37 - Holger Giese, Matthias Tichy, Sven Burmester, Stephan Flake:

Towards the compositional verification of real-time UML designs. 38-47 - Don S. Batory, Jia Liu, Jacob Neal Sarvela:

Refinements and multi-dimensional separation of concerns. 48-57
Software architectures, patterns, and frameworks
- Petri Selonen, Jianli Xu:

Validating UML models against architectural profiles. 58-67 - Luciano Baresi

, Reiko Heckel, Sebastian Thöne, Dániel Varró
:
Modeling and validation of service-oriented architectures: application vs. style. 68-77 - Jeremy S. Bradbury

, Jürgen Dingel:
Evaluating and improving the automatic analysis of implicit invocation systems. 78-87 - Giovanni Vigna, Fredrik Valeur, Richard A. Kemmerer:

Designing and implementing a family of intrusion detection systems. 88-97
Testing and test tools
- Gregory M. Kapfhammer, Mary Lou Soffa:

A family of test adequacy criteria for database-driven applications. 98-107 - Nguyen Tran Sy, Yves Deville:

Consistency techniques for interprocedural test data generation. 108-117 - Atif M. Memon, Mary Lou Soffa:

Regression testing of GUIs. 118-127 - Alessandro Orso, Taweesup Apiwattanapong, Mary Jean Harrold:

Leveraging field data for impact analysis and regression testing. 128-137
Software process and workflow
- James D. Herbsleb, Audris Mockus

:
Formulation and preliminary test of an empirical theory of coordination in software engineering. 138-137 - Tore Dybå:

Factors of software process improvement success in small and large organizations: an empirical study in the scandinavian context. 148-157 - João W. Cangussu, Raymond A. DeCarlo, Aditya P. Mathur:

Monitoring the software test process using statistical process control: a logarithmic approach. 158-167 - Matthias M. Müller, Frank Padberg:

On the economic evaluation of XP projects. 168-177
Validation and verification
- Jens Krinke

:
Context-sensitive slicing of concurrent programs. 178-187 - Oksana Tkachuk, Matthew B. Dwyer

:
Adapting side effects analysis for modular program model checking. 188-197 - Dennis Brylow, Jens Palsberg:

Deadline analysis of interrupt-driven software. 198-207 - Claus Pahl

, Michael Casey:
Ontology support for web service processes. 208-216
Software reuse and evolution
- Jukka Viljamaa:

Reverse engineering framework reuse interfaces. 217-226 - Dirk Ohst, Michael Welle, Udo Kelter:

Differences between versions of UML diagrams. 227-236
Software analysis and model checking
- Stan Jarzabek, Shubiao Li:

Eliminating redundancies with a "composition with adaptation" meta-programming technique. 237-246 - Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia-Yi Pan:

Towards scalable compositional analysis by refactoring design models. 247-256 - Dimitra Giannakopoulou, Jeff Magee:

Fluent model checking for event-based systems. 257-266 - Robby, Matthew B. Dwyer

, John Hatcliff:
Bogor: an extensible and highly-modular software model checking framework. 267-276
Component-based software engineering
- Fei Xie, James C. Browne:

Verified systems by composition from verified components. 277-286 - Stephen McCamant, Michael D. Ernst:

Predicting problems caused by component upgrades. 287-296 - Hridesh Rajan

, Kevin J. Sullivan:
Eos: instance-level aspects for integrated system design. 291-306
Safety and security
- Suan Hsi Yong, Susan Horwitz:

Protecting C programs from attacks via invalid pointer dereferences. 307-316 - V. Benjamin Livshits, Monica S. Lam:

Tracking pointers with path and context sensitivity for bug detection in C programs. 317-326 - Yichen Xie, Andy Chou, Dawson R. Engler:

ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. 327-336 - Koushik Sen, Grigore Rosu, Gul Agha:

Runtime safety analysis of multithreaded programs. 337-346
Poster Session
- Nikunj R. Mehta, Nenad Medvidovic:

Composing architectural styles from architectural primitives. 347-350 - Kleanthis Thramboulidis

:
Towards an engineering tool for implementing reusable distributed control systems. 351-354 - Antonia Bertolino

, Stefania Gnesi
:
Use case-based testing of product lines. 355-358 - Rik Eshuis

, Pierre Brimont, Eric Dubois
, Bertrand Grégoire, Sophie Ramel:
EFFICIENT: a tool set for supporting the modelling and validation of ebXML. 359-362 - Simonetta Balsamo, Moreno Marzolla:

A simulation-based approach to software performance modeling. 363-366 - Alexander Ran, Raimondas Lencevicius:

Making sense of runtime architecture for mobile phone software. 367-370 - Eunyoung Lee, Andrew W. Appel:

Policy-enforced linking of untrusted components. 371-374 - Paulo Asterio de Castro Guerra, Cecília M. F. Rubira

, Alexander B. Romanovsky
, Rogério de Lemos
:
A fault-tolerant software architecture for COTS-based software systems. 375-378 - Richard S. Hall, Humberto Cervantes

:
Gravity: supporting dynamically available services in client-side applications. 379-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














