


default search action
ACM Transactions on Software Engineering and Methodology, Volume 22
Volume 22, Number 1, February 2013
- David Notkin:

Editorial - looking back. 1:1-1:2 - David S. Rosenblum:

Editorial - looking forward. 2:1-2:3 - Jun Sun

, Yang Liu, Jin Song Dong, Yan Liu, Ling Shi
, Étienne André
:
Modeling and verifying hierarchical real-time systems using stateful timed CSP. 3:1-3:29 - Brian Demsky, Patrick Lam:

Views: Synthesizing fine-grained concurrency control. 4:1-4:33 - Tao Yue, Lionel C. Briand, Yvan Labiche

:
Facilitating the transition from use case models to analysis models: Approach and experiments. 5:1-5:38 - Hadi Hemmati, Andrea Arcuri, Lionel C. Briand:

Achieving scalable model-based testing through test case diversity. 6:1-6:42 - Martin Monperrus

, Mira Mezini:
Detecting missing method calls as violations of the majority rule. 7:1-7:25 - Jeff Huang, Jinguo Zhou, Charles Zhang:

Scaling predictive analysis of concurrent programs by removing trace redundancy. 8:1-8:21 - Nicolás D'Ippolito

, Víctor A. Braberman, Nir Piterman
, Sebastián Uchitel
:
Synthesizing nonanomalous event-based controllers for liveness goals. 9:1-9:36
Volume 22, Number 2, March 2013
- Wei Zhang, Chong Sun, Junghee Lim, Shan Lu

, Thomas W. Reps:
ConMem: Detecting Crash-Triggering Concurrency Bugs through an Effect-Oriented Approach. 10:1-10:33 - Marcello La Rosa

, Marlon Dumas
, Reina Uba, Remco M. Dijkman
:
Business Process Model Merging: An Approach to Business Process Consolidation. 11:1-11:42 - Zibin Zheng

, Michael R. Lyu:
Personalized Reliability Prediction of Web Services. 12:1-12:25 - Neil Walkinshaw

, Kirill Bogdanov:
Automated Comparison of State-Based Software Models in Terms of Their Language and Structure. 13:1-13:37 - Scott D. Fleming, Christopher Scaffidi, David Piorkowski

, Margaret M. Burnett, Rachel K. E. Bellamy
, Joseph Lawrance, Irwin Kwan:
An Information Foraging Theory Perspective on Tools for Debugging, Refactoring, and Reuse Tasks. 14:1-14:41 - Sagar Chaki, Christian Schallhart, Helmut Veith:

Verification across Intellectual Property Boundaries. 15:1-15:12
Volume 22, Number 3, July 2013
- David S. Rosenblum:

In memoriam: David Notkin (1955-2013). 16:1-16:2
- Guoqing Xu, Atanas Rountev:

Precise memory leak detection for java software using container profiling. 17:1-17:28 - Wei Le, Mary Lou Soffa:

Marple: Detecting faults in path segments using automatically generated analyses. 18:1-18:38 - Shin Yoo, Mark Harman

, David Clark
:
Fault localization prioritization: Comparing information-theoretic and coverage-based approaches. 19:1-19:29
- Matteo Pradella

, Angelo Morzenti
, Pierluigi San Pietro
:
Bounded satisfiability checking of metric temporal logic specifications. 20:1-20:54
- Davide Falessi, Lionel C. Briand, Giovanni Cantone, Rafael Capilla

, Philippe Kruchten
:
The value of design rationale information. 21:1-21:32 - Kevin J. Hoffman, Patrick Eugster:

Trading obliviousness for modularity with cooperative aspect-oriented programming. 22:1-22:46 - Hong Zhu, Ian Bayley:

An algebra of design patterns. 23:1-23:35 - Mira Balaban, Azzam Maraee:

Finite satisfiability of UML class diagrams with constrained class hierarchy. 24:1-24:42 - Guido de Caso, Víctor A. Braberman, Diego Garbervetsky

, Sebastián Uchitel
:
Enabledness-based program abstractions for behavior validation. 25:1-25:46 - Beatriz Marín

, Giovanni Giachetti
, Oscar Pastor
, Tanja E. J. Vos, Alain Abran
:
Using a functional size measurement procedure to evaluate the quality of models in MDD environments. 26:1-26:31 - Daniel Sinnig, Patrice Chalin, Ferhat Khendek

:
Use case and task models: An integrated development methodology and its formal foundation. 27:1-27:31
Volume 22, Number 4, October 2013
- Giovanni Denaro

, Mauro Pezzè
, Davide Tosi
:
Test-and-adapt: An approach for improving service interchangeability. 28:1-28:43 - Lorenzo Martignoni, Roberto Paleari, Alessandro Reina, Giampaolo Fresi Roglia, Danilo Bruschi:

A methodology for testing CPU emulators. 29:1-29:26 - Hervé Chang, Leonardo Mariani

, Mauro Pezzè
:
Exception handlers for healing component-based systems. 30:1-30:40 - Xiaoyuan Xie, Tsong Yueh Chen

, Fei-Ching Kuo, Baowen Xu
:
A theoretical analysis of the risk evaluation formulas for spectrum-based fault localization. 31:1-31:40 - Dawei Qi, Hoang D. T. Nguyen, Abhik Roychoudhury

:
Path exploration based on symbolic output. 32:1-32:41 - Takaaki Tateishi, Marco Pistoia, Omer Tripp:

Path- and index-sensitive string analysis based on monadic second-order logic. 33:1-33:33 - Jérôme Vouillon, Roberto Di Cosmo:

On software component co-installability. 34:1-34:35 - Leandro L. Minku

, Xin Yao
:
Software effort estimation as a multiobjective learning problem. 35:1-35:32 - David Lizcano

, Fernando Alonso, Javier Soriano
, Genoveva López Gómez:
A web-centred approach to end-user software engineering. 36:1-36:29 - Collin McMillan, Denys Poshyvanyk

, Mark Grechanik
, Qing Xie, Chen Fu:
Portfolio: Searching for relevant functions and their usages in millions of lines of code. 37:1-37:30 - Michael Würsch, Emanuel Giger, Harald C. Gall

:
Evaluating a query framework for software evolution data. 38:1-38:38

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














