


default search action
Journal of Systems and Software (JSS), Volume 61
Volume 61, Number 1, 1 March 2002
- Kam-yiu Lam, Tei-Wei Kuo

, Tony S. H. Lee:
Strategies for resolving inter-class data conflicts in mixed real-time database systems. 1-14 - Quazi N. Ahmed, Susan V. Vrbsky:

Maintaining security and timeliness in real-time database system. 15-29 - Leigh A. Davis, Rose F. Gamble, Jamie Payton:

The impact of component architectures on interoperability. 31-45 - Nico H. Lassing, PerOlof Bengtsson, Hans van Vliet, Jan Bosch:

Experiences with ALMA: Architecture-Level Modifiability Analysis. 47-57 - Bonnie Brinton Anderson, Akhilesh Bajaj, Wilpen Gorr:

An estimation of the decision models of senior IS managers when evaluating the external quality of organizational software. 59-75
Volume 61, Number 2, 15 March 2002
- Yaxin Bi, M. Elizabeth C. Hull, Peter N. Nicholl:

An XML approach for legacy code reuse. 77-89 - Sangwon Park, Hyoung-Joo Kim:

SigDAQ: an enhanced XML query optimization technique. 91-103 - Jilles van Gurp, Jan Bosch:

Design erosion: problems and causes. 105-119 - Kiejin Park, Sungsoo Kim:

Availability analysis and improvement of Active/Standby cluster systems using software rejuvenation. 121-128 - Deng-Jyi Chen, Wu-Chi Chen, Krishna M. Kavi:

Visual requirement representation. 129-143 - Hong Zhu, Lingzi Jin, Dan Diaper, Ganghong Bai:

Software requirements validation via task analysis. 145-169
Volume 61, Number 3, 1 April 2002
- Hossein Saiedian

:
Best practices in software engineering. 171-172 - Marek Leszak, Dewayne E. Perry, Dieter Stoll:

Classification and evaluation of defects in a project retrospective. 173-187 - Maurizio Morisio, Carolyn B. Seaman, Victor R. Basili, Amy T. Parra, Steve E. Kraft, Steven E. Condon:

COTS-based software development: Processes and open issues. 189-199 - Ivica Crnkovic

, Magnus Larsson
:
Challenges of component-based development. 201-212 - Carol S. Smidts, Xin Huang, James C. Widmaier:

Producing reliable software: an experiment. 213-224 - Rayford B. Vaughn, Ronda R. Henning, Kevin L. Fox:

An empirical study of industrial security-engineering practices. 225-232 - David Andrews

, Paul Austin, Peter Costello, David O. LeVan
:
Interprocess communications in the AN/BSY-2 distributed computer system: a case study. 233-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














