callback( { "result":{ "query":":facetid:toc:\"db/journals/infsof/infsof70.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.51" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"17", "@dc":"17", "@oc":"17", "@id":"43448934", "text":":facetid:toc:db/journals/infsof/infsof70.bht" } }, "hits":{ "@total":"17", "@computed":"17", "@sent":"17", "@first":"0", "hit":[{ "@score":"1", "@id":"3129059", "info":{"authors":{"author":[{"@pid":"07/4261","text":"Naveed Ali"},{"@pid":"l/RichardLai-1","text":"Richard Lai 0001"}]},"title":"A method of requirements change management for global software development.","venue":"Inf. Softw. Technol.","volume":"70","pages":"49-67","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/AliL16","doi":"10.1016/J.INFSOF.2015.09.005","ee":"https://doi.org/10.1016/j.infsof.2015.09.005","url":"https://dblp.org/rec/journals/infsof/AliL16"}, "url":"URL#3129059" }, { "@score":"1", "@id":"3129060", "info":{"authors":{"author":[{"@pid":"163/7460","text":"Nicolli S. R. Alves"},{"@pid":"134/9489","text":"Thiago Souto Mendes"},{"@pid":"m/ManoelGMendonca","text":"Manoel Gomes de Mendonça Neto"},{"@pid":"69/3094","text":"Rodrigo O. Spínola"},{"@pid":"18/462","text":"Forrest Shull"},{"@pid":"s/CarolynBSeaman","text":"Carolyn B. Seaman"}]},"title":"Identification and management of technical debt: A systematic mapping study.","venue":"Inf. Softw. Technol.","volume":"70","pages":"100-121","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/AlvesMNSSS16","doi":"10.1016/J.INFSOF.2015.10.008","ee":"https://doi.org/10.1016/j.infsof.2015.10.008","url":"https://dblp.org/rec/journals/infsof/AlvesMNSSS16"}, "url":"URL#3129060" }, { "@score":"1", "@id":"3129070", "info":{"authors":{"author":[{"@pid":"22/7376","text":"Mario Barcelo-Valenzuela"},{"@pid":"173/2895","text":"Patricia Shihemy Carrillo-Villafaña"},{"@pid":"14/7374","text":"Alonso Perez-Soltero"},{"@pid":"84/7373","text":"Gerardo Sanchez-Schmitz"}]},"title":"A framework to acquire explicit knowledge stored on different versions of software.","venue":"Inf. Softw. Technol.","volume":"70","pages":"40-48","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/Barcelo-Valenzuela16","doi":"10.1016/J.INFSOF.2015.09.007","ee":"https://doi.org/10.1016/j.infsof.2015.09.007","url":"https://dblp.org/rec/journals/infsof/Barcelo-Valenzuela16"}, "url":"URL#3129070" }, { "@score":"1", "@id":"3129075", "info":{"authors":{"author":[{"@pid":"19/1459","text":"Elizabeth Bjarnason"},{"@pid":"50/6770","text":"Kari Smolander"},{"@pid":"31/2107","text":"Emelie Engström"},{"@pid":"24/24","text":"Per Runeson"}]},"title":"A theory of distances in software engineering.","venue":"Inf. Softw. Technol.","volume":"70","pages":"204-219","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/BjarnasonSER16","doi":"10.1016/J.INFSOF.2015.05.004","ee":"https://doi.org/10.1016/j.infsof.2015.05.004","url":"https://dblp.org/rec/journals/infsof/BjarnasonSER16"}, "url":"URL#3129075" }, { "@score":"1", "@id":"3129077", "info":{"authors":{"author":[{"@pid":"50/10438","text":"Kelly Blincoe"},{"@pid":"145/4040","text":"Jyoti Sheoran"},{"@pid":"74/4710","text":"Sean P. Goggins"},{"@pid":"159/9461","text":"Eva Petakovic"},{"@pid":"d/DanielaEDamian","text":"Daniela E. Damian"}]},"title":"Understanding the popular users: Following, affiliation influence and leadership on GitHub.","venue":"Inf. Softw. Technol.","volume":"70","pages":"30-39","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/BlincoeSGPD16","doi":"10.1016/J.INFSOF.2015.10.002","ee":"https://doi.org/10.1016/j.infsof.2015.10.002","url":"https://dblp.org/rec/journals/infsof/BlincoeSGPD16"}, "url":"URL#3129077" }, { "@score":"1", "@id":"3129086", "info":{"authors":{"author":{"@pid":"d/YDittrich","text":"Yvonne Dittrich"}},"title":"What does it mean to use a method? Towards a practice theory for software engineering.","venue":"Inf. Softw. Technol.","volume":"70","pages":"220-231","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/Dittrich16","doi":"10.1016/J.INFSOF.2015.07.001","ee":"https://doi.org/10.1016/j.infsof.2015.07.001","url":"https://dblp.org/rec/journals/infsof/Dittrich16"}, "url":"URL#3129086" }, { "@score":"1", "@id":"3129090", "info":{"authors":{"author":[{"@pid":"145/4174","text":"Felipe Febrero"},{"@pid":"c/CoralCalero","text":"Coral Calero"},{"@pid":"37/6645","text":"María Ángeles Moraga"}]},"title":"Software reliability modeling based on ISO/IEC SQuaRE.","venue":"Inf. Softw. Technol.","volume":"70","pages":"18-29","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/FebreroCM16","doi":"10.1016/J.INFSOF.2015.09.006","ee":"https://doi.org/10.1016/j.infsof.2015.09.006","url":"https://dblp.org/rec/journals/infsof/FebreroCM16"}, "url":"URL#3129090" }, { "@score":"1", "@id":"3129102", "info":{"authors":{"author":{"@pid":"167/0150","text":"David Haselberger"}},"title":"A literature-based framework of performance-related leadership interactions in ICT project teams.","venue":"Inf. Softw. Technol.","volume":"70","pages":"1-17","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/Haselberger16","doi":"10.1016/J.INFSOF.2015.09.003","ee":"https://doi.org/10.1016/j.infsof.2015.09.003","url":"https://dblp.org/rec/journals/infsof/Haselberger16"}, "url":"URL#3129102" }, { "@score":"1", "@id":"3129104", "info":{"authors":{"author":[{"@pid":"200/1800","text":"Edgar E. Hassler"},{"@pid":"c/JeffreyCCarver","text":"Jeffrey C. Carver"},{"@pid":"64/5348","text":"David P. Hale"},{"@pid":"173/3000","text":"Ahmed Al-Zubidy"}]},"title":"Identification of SLR tool needs - results of a community workshop.","venue":"Inf. Softw. Technol.","volume":"70","pages":"122-129","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/HasslerCHA16","doi":"10.1016/J.INFSOF.2015.10.011","ee":"https://doi.org/10.1016/j.infsof.2015.10.011","url":"https://dblp.org/rec/journals/infsof/HasslerCHA16"}, "url":"URL#3129104" }, { "@score":"1", "@id":"3129111", "info":{"authors":{"author":[{"@pid":"79/6862","text":"Pontus Johnson"},{"@pid":"23/402","text":"Mathias Ekstedt"}]},"title":"The Tarpit - A general theory of software engineering.","venue":"Inf. Softw. Technol.","volume":"70","pages":"181-203","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/JohnsonE16","doi":"10.1016/J.INFSOF.2015.06.001","ee":"https://doi.org/10.1016/j.infsof.2015.06.001","url":"https://dblp.org/rec/journals/infsof/JohnsonE16"}, "url":"URL#3129111" }, { "@score":"1", "@id":"3129113", "info":{"authors":{"author":[{"@pid":"121/3946","text":"Alessia Knauss"},{"@pid":"d/DanielaEDamian","text":"Daniela E. Damian"},{"@pid":"f/XavierFranch","text":"Xavier Franch"},{"@pid":"150/9381","text":"Angela Rook"},{"@pid":"m/HausiAMuller","text":"Hausi A. Müller"},{"@pid":"t/AlexThomo","text":"Alex Thomo"}]},"title":"ACon: A learning-based approach to deal with uncertainty in contextual requirements at runtime.","venue":"Inf. Softw. Technol.","volume":"70","pages":"85-99","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/KnaussDFRMT16","doi":"10.1016/J.INFSOF.2015.10.001","ee":"https://doi.org/10.1016/j.infsof.2015.10.001","url":"https://dblp.org/rec/journals/infsof/KnaussDFRMT16"}, "url":"URL#3129113" }, { "@score":"1", "@id":"3129137", "info":{"authors":{"author":[{"@pid":"95/9854","text":"Luisa Parody"},{"@pid":"44/1706","text":"María Teresa Gómez-López"},{"@pid":"g/RafaelMGasca","text":"Rafael M. Gasca"}]},"title":"Hybrid business process modeling for the optimization of outcome data.","venue":"Inf. Softw. Technol.","volume":"70","pages":"140-154","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/ParodyLG16","doi":"10.1016/J.INFSOF.2015.10.007","ee":"https://doi.org/10.1016/j.infsof.2015.10.007","url":"https://dblp.org/rec/journals/infsof/ParodyLG16"}, "url":"URL#3129137" }, { "@score":"1", "@id":"3129143", "info":{"authors":{"author":{"@pid":"71/2904","text":"Paul Ralph"}},"title":"Software engineering process theory: A multi-method comparison of Sensemaking-Coevolution-Implementation Theory and Function-Behavior-Structure Theory.","venue":"Inf. Softw. Technol.","volume":"70","pages":"232-250","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/Ralph16","doi":"10.1016/J.INFSOF.2015.06.010","ee":"https://doi.org/10.1016/j.infsof.2015.06.010","url":"https://dblp.org/rec/journals/infsof/Ralph16"}, "url":"URL#3129143" }, { "@score":"1", "@id":"3129144", "info":{"authors":{"author":[{"@pid":"46/7849","text":"Óscar Sánchez Ramón"},{"@pid":"32/607","text":"Jesús Sánchez Cuadrado"},{"@pid":"78/4516","text":"Jesús García Molina"},{"@pid":"v/JeanVanderdonckt","text":"Jean Vanderdonckt"}]},"title":"A layout inference algorithm for Graphical User Interfaces.","venue":"Inf. Softw. Technol.","volume":"70","pages":"155-175","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/RamonCMV16","doi":"10.1016/J.INFSOF.2015.10.005","ee":"https://doi.org/10.1016/j.infsof.2015.10.005","url":"https://dblp.org/rec/journals/infsof/RamonCMV16"}, "url":"URL#3129144" }, { "@score":"1", "@id":"3129154", "info":{"authors":{"author":[{"@pid":"08/7091","text":"Klaas-Jan Stol"},{"@pid":"63/900","text":"Michael Goedicke"},{"@pid":"62/383","text":"Ivar Jacobson"}]},"title":"Introduction to the special section - General Theories of Software Engineering: New advances and implications for research.","venue":"Inf. Softw. Technol.","volume":"70","pages":"176-180","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/StolGJ16","doi":"10.1016/J.INFSOF.2015.07.010","ee":"https://doi.org/10.1016/j.infsof.2015.07.010","url":"https://dblp.org/rec/journals/infsof/StolGJ16"}, "url":"URL#3129154" }, { "@score":"1", "@id":"3129179", "info":{"authors":{"author":[{"@pid":"32/5533","text":"Iyad Zayour"},{"@pid":"173/2711","text":"Ali Hamdar"}]},"title":"A qualitative study on debugging under an enterprise IDE.","venue":"Inf. Softw. Technol.","volume":"70","pages":"130-139","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/ZayourH16","doi":"10.1016/J.INFSOF.2015.10.010","ee":"https://doi.org/10.1016/j.infsof.2015.10.010","url":"https://dblp.org/rec/journals/infsof/ZayourH16"}, "url":"URL#3129179" }, { "@score":"1", "@id":"3129180", "info":{"authors":{"author":[{"@pid":"43/2368-1","text":"Wen Zhang 0001"},{"@pid":"62/3151-9","text":"Song Wang 0009"},{"@pid":"97/6505-1","text":"Qing Wang 0001"}]},"title":"KSAP: An approach to bug report assignment using KNN search and heterogeneous proximity.","venue":"Inf. Softw. Technol.","volume":"70","pages":"68-84","year":"2016","type":"Journal Articles","access":"closed","key":"journals/infsof/ZhangWW16","doi":"10.1016/J.INFSOF.2015.10.004","ee":"https://doi.org/10.1016/j.infsof.2015.10.004","url":"https://dblp.org/rec/journals/infsof/ZhangWW16"}, "url":"URL#3129180" } ] } } } )