


default search action
16th SIGSOFT FSE 2008: Atlanta, Georgia, USA
- Mary Jean Harrold, Gail C. Murphy:

Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008, Atlanta, Georgia, USA, November 9-14, 2008. ACM 2008, ISBN 978-1-59593-995-1 
Keynote
- Carliss Baldwin:

A design-centric view of the economy: abstract. 1 
Social structures
- Martin Pinzger, Nachiappan Nagappan, Brendan Murphy:

Can developer-module networks predict failures? 2-12 - Andrew Meneely

, Laurie A. Williams, Will Snipes
, Jason A. Osborne:
Predicting failures with developer networks and social network analysis. 13-23 - Christian Bird, David S. Pattison, Raissa M. D'Souza, Vladimir Filkov, Premkumar T. Devanbu

:
Latent social structure in open source projects. 24-35 
Program analysis
- Eric Bodden

, Patrick Lam, Laurie J. Hendren:
Finding programming errors earlier by evaluating runtime monitors ahead-of-time. 36-47 - Lingxiao Jiang

, Zhendong Su
:
Profile-guided program simplification for effective testing and analysis. 48-58 - Bruno Dufour, Barbara G. Ryder, Gary Sevitsky:

A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications. 59-70 
Testing
- Hyunsook Do, Siavash Mirarab

, Ladan Tahvildari, Gregg Rothermel:
An empirical study of the effect of time constraints on the cost-benefits of regression testing. 71-82 - Zhiqiang Lin, Xiangyu Zhang:

Deriving input syntactic structure from execution. 83-93 - Zhifeng Lai, Shing-Chi Cheung

, Wing Kwong Chan
:
Inter-context control-flow and data-flow test adequacy criteria for nesC applications. 94-104 
Programming experiments and aids
- Jeffrey Stylos, Brad A. Myers:

The implications of method placement on API learnability. 105-112 - Anita Sarma

, David F. Redmiles, André van der Hoek:
Empirical evidence of the benefits of workspace awareness in software configuration management. 113-123 - Andhy Koesnandar, Sebastian G. Elbaum, Gregg Rothermel, Lorin Hochstein, Christopher Scaffidi, Kathryn T. Stolee

:
Using assertions to help end-user programmers create dependable web macros. 124-134 
Concurrency and transformation
- Chang-Seo Park, Koushik Sen:

Randomized active atomicity violation detection in concurrent programs. 135-145 - Christopher Dragert, Jürgen Dingel, Karen Rudie

:
Generation of concurrency control code using discrete-event systems theory. 146-157 - Shriram Krishnamurthi

, Kathi Fisler
, Daniel J. Dougherty, Daniel Yoo:
Alchemy: transmuting base alloy specifications into implementations. 158-169 
Web services
- Franco Raimondi

, James Skene, Wolfgang Emmerich:
Efficient online monitoring of web-service SLAs. 170-180 - William G. J. Halfond, Alessandro Orso:

Automated identification of parameter mismatches in web applications. 181-191 - Fang Yu, Chao Wang, Aarti Gupta

, Tevfik Bultan:
Modular verification of web services using efficient symbolic encoding and summarization. 192-202 
Tools and methods
- Barthélémy Dagenais, Harold Ossher:

Automatically locating framework extension examples. 203-213 - Rylan Cottrell, Robert J. Walker

, Jörg Denzinger
:
Semi-automating small-scale source code reuse via structural correspondence. 214-225 - Suzette Person, Matthew B. Dwyer

, Sebastian G. Elbaum, Corina S. Pasareanu:
Differential symbolic execution. 226-237 
ACM SIGSOFT outstanding research award
- Axel van Lamsweerde:

Requirements engineering: from craft to discipline. 238-249 
Security and fault detection
- Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia:

Effective blame for information-flow violations. 250-260 - Michele Sama, David S. Rosenblum, Zhimin Wang, Sebastian G. Elbaum:

Model-based fault detection in context-aware adaptive applications. 261-271 - Wei Le, Mary Lou Soffa:

Marple: a demand-driven path-sensitive buffer overflow detector. 272-282 
Keynote
- Gautam Shroff:

Dev 2.0: model driven development in the cloud. 283 
ACM SIGSOFT impact award
- David S. Rosenblum, Alexander L. Wolf:

ACM SIGSOFT impact paper award: reflections and prospects. 284 
Requirements
- Shiva Nejati

, Mehrdad Sabetzadeh
, Marsha Chechik, Sebastián Uchitel
, Pamela Zave:
Towards compositional synthesis of evolving systems. 285-296 - Dario Fischbein, Sebastián Uchitel

:
On correct and complete strong merging of partial behaviour models. 297-307 
Process
- Nicolas Bettenburg, Sascha Just, Adrian Schröter, Cathrin Weiss, Rahul Premraj, Thomas Zimmermann:

What makes a good bug report? 308-318 - Leon J. Osterweil, Lori A. Clarke, Aaron M. Ellison

, Rodion M. Podorozhny, Alexander E. Wise, Emery R. Boose, Julian L. Hadley:
Experience in using a process language to define scientific workflow and generate dataset provenance. 319-329 - Yigit Kultur, Burak Turhan

, Ayse Basar Bener
:
ENNA: software effort estimation using ensemble of neural networks with associative memory. 330-338 
Mining and restructuring
- Mark Gabel, Zhendong Su

:
Javert: fully automatic mining of general temporal properties from dynamic traces. 339-349 - V. Benjamin Livshits, Emre Kiciman:

Doloto: code splitting for network-bound web 2.0 applications. 350-360 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














