


default search action
Information & Software Technology, Volume 45
Volume 45, Number 1, 1 January 2003
- Tsong Yueh Chen

, T. H. Tse
, Zhi Quan Zhou
:
Fault-based testing without the need of oracles. 1-9 - Chiyoung Seo, Sang-Won Lee, Hyoung-Joo Kim:

An efficient inverted index technique for XML documents using RDBMS. 11-22 - Alexandros Nanopoulos, Maciej Zakrzewicz

, Tadeusz Morzy, Yannis Manolopoulos:
Efficient storage and querying of sequential patterns in database systems. 23-34 - Huan Zhou, Yulin Feng, Jing Li:

Probability graph based data hoarding for mobile environment. 35-41 - Hikaru Fujiwara, Shinji Kusumoto, Katsuro Inoue, Ayane Suzuki, Toshifusa Ootsubo, Katsuhiko Yuura:

Case studies to evaluate a domain specific application framework based on complexity and functionality metrics. 43-49 - Ioannis Stamelos, Lefteris Angelis, P. Dimou, Evaggelos Sakellaris:

On the use of Bayesian belief networks for the prediction of software productivity. 51-60
Volume 45, Number 2, 1 February 2003
- Selmin Nurcan, Colette Rolland:

A multi-method for defining the organizational change. 61-82 - Ying Liang:

From use cases to classes: a way of building object model with UML. 83-93 - Joan Lu

, M. Scaramuzza:
Building XML application in rich detailed genealogical information. 95-108 - Olumide Owolabi:

Empirical studies of some hashing functions. 109-112
Volume 45, Number 3, 1 March 2003
- Scott Sigman, Xiaoqing Frank Liu:

A computational argumentation methodology for capturing and analyzing design rationale arising from multiple perspectives. 113-122 - Magne Jørgensen, Dag I. K. Sjøberg:

An effort prediction interval approach based on the empirical distribution of previous estimation accuracy. 123-136 - Zakaria Maamar:

Design of a simulation environment based on software agents and the high level architecture. 137-148 - C. C. Chiang:

The use of adapters to support interoperability of components for reusability. 149-156 - Toufik Taibi, David Ngo Chek Ling:

Formal specification of design pattern combination using BPSL. 157-170
Volume 45, Number 4, 15 March 2003
- André Postma:

A method for module architecture verification and its application on a large component-based system. 171-194 - Alexander Chatzigeorgiou:

Performance and power evaluation of C++ object-oriented programming in embedded processors. 195-201 - Chang-Ryong Kim, Chin-Wan Chung:

A multi-step approach for partial similarity search in large image data using histogram intersection. 203-215 - Chris Barry, Michael Lang

:
A comparison of 'traditional' and multimedia information systems development practices. 217-227
Volume 45, Number 5, 1 April 2003
- Ignacio Aedo

, Paloma Díaz
, Susana Montero:
A methodological approach for hypermedia security modeling. 229-239 - Jongik Kim, Hyoung-Joo Kim:

Efficient processing of regular path joins using PID. 241-251 - Qingping Lin, Chor Ping Low, Jim Mee Ng, Juan Bu, Xiaohua Liu:

Multiuser collaborative work in virtual environment based CASE tool. 253-267 - Petros Kefalas

, George Eleftherakis
, Evangelos Kehris:
Communicating X-machines: a practical approach for formal and modular specification of large systems. 269-280 - Neil McBride:

A viewpoint on software engineering and information systems: integrating the disciplines. 281-287 - Christopher J. Atkinson, David E. Avison, David Wilson:

Architectural images of computer-based information systems development: A response to "A viewpoint of software engineering and information systems: integrating the disciplines". 289-291
Volume 45, Number 6, 15 April 2003
- David Ngo Chek Ling:

An expert screen design and evaluation assistant that uses knowledge-based backtracking. 293-304 - Bixin Li:

A technique to analyze information-flow in object-oriented programs. 305-314 - Yinyan Cao, Ee-Peng Lim

, Wee Keong Ng
:
Data model for warehousing historical Web information. 315-334 - Joseph Fong, Hing Kwok Wong, Z. Cheng:

Converting relational database into XML documents with DOM. 335-355 - Miguel A. Laguna

, José M. Marqués, Francisco José García-Peñalvo
:
DocFlow: workflow based requirements elicitation. 357-369
Volume 45, Number 7, 1 May 2003
- Jonathan Lee:

Introduction to software engineering with computational intelligence. 371-372 - Zhiwei Xu

, Taghi M. Khoshgoftaar, Edward B. Allen:
Application of fuzzy expert systems in assessing operational risk of software. 373-388 - Stephen G. MacDonell:

Software source code sizing using fuzzy logic modeling. 389-404 - Marek Z. Reformat

, Witold Pedrycz, Nicolino J. Pizzi:
Software quality analysis with the use of computational intelligence. 405-417 - Chris Matthews:

A formal specification for a fuzzy expert system. 419-429 - Nicolás Marín

, Juan Miguel Medina
, Olga Pons, Daniel Sánchez
, María Amparo Vila Miranda
:
Complex object comparison in a fuzzy context. 431-444 - Jonathan Lee, Yong-Yi Fanjiang:

Modeling imprecise requirements with XML. 445-460
Volume 45, Number 8, 1 June 2003
- Gerald Post, Albert Kagan:

Computer security and operating system updates. 461-467 - John Lim:

A conceptual framework on the adoption of negotiation support systems. 469-477 - Incheon Paik, Tongwon Han, Dongik Oh, Sangho Ha, Donggue Park:

An affiliated search system for an electronic commerce and software component architecture. 479-497 - Ganga Bishnu Mund, Rajib Mall, Sudeshna Sarkar

:
Computation of intraprocedural dynamic program slices. 499-512 - Wesley S. Shu, C. Sophie Lee:

Beyond productivity--productivity and the three types of efficiencies of information technology industries. 513-524 - Jane Coughlan, Mark Lycett

, Robert D. Macredie
:
Communication issues in requirements elicitation: a content analysis of stakeholder experiences. 525-537 - Jitender Kumar Chhabra

, K. K. Aggarwal, Yogesh Singh:
Code and data spatial complexity: two important software understandability measures. 539-546
Volume 45, Number 9, 15 June 2003
- Sungchae Lim, Myoung-Ho Kim:

Real-time disk scanning for timely retrieval of continuous media objects. 547-558 - Jameson Mbale, Xiaofei Xu, Shengchun Deng:

Global intelligence benevolent builder (GIBB): a system automating integration of heterogeneous classical databases and web. 559-570 - Giedre Sabaliauskaite

, Fumikazu Matsukawa, Shinji Kusumoto, Katsuro Inoue:
Further investigations of reading techniques for object-oriented design inspection. 571-585 - Subhash Bhalla

:
Evolving a model of transaction management with embedded concurrency control for mobile database systems. 587-596 - Jiang Guo:

Software reuse through re-engineering the legacy systems. 597-609 - Baomin Xu, Weimin Lian, Qiang Gao:

Migration of active objects in proactive. 611-618 - Domenico Cotroneo, Antonino Mazzeo

, Luigi Romano, Stefano Russo
:
An architecture for security-oriented perfective maintenance of legacy software. 619-631
Volume 45, Number 10, 15 July 2003
- Hafedh Mili, Estelle Ah-Ki, Robert Godin, Hamid Mcheick

:
An experiment in software component retrieval. 633-649 - Nasir Al-Darwish:

PageGen: an effective scheme for dynamic generation of web pages. 651-662 - Xudong He, William C. Chu, Hongji Yang:

A new approach to verify rule-based systems using petri net. 663-669 - Alexander Chatzigeorgiou, G. Antoniadis:

Efficient management of inspections in software development projects. 671-680 - Jan A. Bergstra, Pum Walters:

Operator programs and operator processes. 681-689 - Maozhen Li, Man Qi:

MAPBOT: a Web based map information retrieval system. 691-698
Volume 45, Number 11, August 2003
- Rachida Dssouli, Ferhat Khendek

:
Preface. 699 - Loïc Hélouët:

Distributed system requirement modeling with message sequence charts: the case of the RMTP2 protocol. 701-714 - Aziz Salah, Rachida Dssouli, Guy Lapalme:

Implicit integration of scenarios into a reduced timed automaton. 715-725 - Reinhard Gotzhein:

Consolidating and applying the SDL-pattern approach: a detailed case study. 727-741 - Vangalur S. Alagar, Ramesh Achuthan, M. Haydar, D. Muthiayen, Olga Ormandjieva, Mao Zheng:

A rigorous approach for constructing self-evolving real-time reactive systems. 743-761 - Robert L. Probert, Yanping Chen, Behrad Ghazizadeh, D. Paul Sims, Maurus Cappa:

Formal verification and validation for e-commerce: theory and best practices. 763-777 - John Mullins, Stéphane Lafrance:

Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols. 779-790
Volume 45, Number 12, 15 September 2003
- Rachida Dssouli, Ferhat Khendek

:
Preface. 791-792 - Robert M. Hierons

, Hasan Ural:
UIO sequence based checking sequences for distributed test architectures. 793-803 - Claude Jard:

Synthesis of distributed testers from true-concurrency models of reactive systems. 805-814 - M. Ümit Uyar, Mariusz A. Fecko, Ali Y. Duale, Paul D. Amer, Adarshpal S. Sethi:

Experience in developing and testing network protocol software using FDTs. 815-835 - Ana R. Cavalli, Caroline Gervy, Svetlana Prokopenko:

New approaches for passive testing using an Extended Finite State Machine specification. 837-852 - Ahmed Khoumsi:

Testing distributed real-time systems in the presence of inaccurate clock synchronizations. 853-864 - Dong Wang, Ruibing Hao, David Lee:

Fault detection in Rule-based Software systems. 865-871 - Purnendu Sinha, Da Qi Ren:

Formal verification of dependable distributed protocols. 873-888
Volume 45, Number 13, October 2003
- S. K. Lee, C. S. Hwang:

Architecture layers and engineering approach for agent-based system. 889-898 - Dawn G. Gregg

:
XDependency: maintaining relationships between XML data resources. 899-909 - Paulo Barthelmess:

Collaboration and coordination in process-centered software development environments: a review of the literature. 911-928 - Jinmin Hu, Paul W. P. J. Grefen:

Conceptual framework and architecture for service mediating workflow management. 929-939
Volume 45, Number 14, 1 November 2003
- Camille Salinesi, Björn Regnell

:
Eighth International Workshop on Requirements Engineering--Foundation for Software Quality (REFSQ'02). 941-943 - Aybüke Aurum, Claes Wohlin

:
The fundamental nature of requirements engineering activities as a decision-making process. 945-954 - Erik Kamsties, Antje von Knethen, Ralf H. Reussner

:
A controlled experiment to evaluate how styles affect the understandability of requirements specifications. 955-965 - Annie I. Antón, Julia Brande Earp, Ryan A. Carter:

Precluding incongruous behavior by aligning software requirements with security and privacy policies. 967-977 - Robert Crook, Darrel C. Ince, Bashar Nuseibeh

:
Modelling access policies using roles in requirements engineering. 979-991 - Didar Zowghi

, Vincenzo Gervasi
:
On the interplay between consistency, completeness, and correctness in requirements evolution. 993-1009
Volume 45, Number 15, 1 December 2003
- Stewart Green, Ian Beeson, Jin Sa:

Special issue on modelling organisational processes. 1011-1013 - Ann Lindsay, Denise Downs, Ken Lunn:

Business processes--attempts to find a definition. 1015-1019 - Bob Snowdon, Peter Kawalek:

Active meta-process models: a conceptual exposition. 1021-1029 - Chris Wallace:

Using Alloy in process modelling. 1031-1043 - Ken Lunn, Andrew Sixsmith, Ann Lindsay, Marja Vaarama:

Traceability in requirements through process modelling, applied to social care applications. 1045-1052 - Mohammed Odeh, Richard Kamm

:
Bridging the gap between business models and system models. 1053-1060 - Giacomo Piccinelli, Anthony Finkelstein, Tommaso Costa:

Flexible B2B processes: the answer is in the nodes. 1061-1063 - Howard Smith:

Business process management--the third wave: business process modelling language (bpml) and its pi-calculus foundations. 1065-1069 - Martyn A. Ould:

Preconditions for putting processes back in the hands of their actors. 1071-1074

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














