default search action
10th ESEC / 13th SIGSOFT FSE 2005: Lisbon, Portugal
- Michel Wermelinger, Harald C. Gall:
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2005, Lisbon, Portugal, September 5-9, 2005. ACM 2005, ISBN 1-59593-014-0 - Oscar Nierstrasz, Stéphane Ducasse, Tudor Gîrba:
The story of moose: an agile reengineering environment. 1-10
Software change analysis
- Martin P. Robillard:
Automatic generation of suggestions for program investigation. 11-20 - Bill McCloskey, Eric A. Brewer:
ASTEC: a new approach to refactoring C. 21-30 - Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar:
Permissive interfaces. 31-40
Requirements
- Renaud De Landtsheer, Axel van Lamsweerde:
Reasoning about confidentiality at requirements engineering time. 41-49 - Paul Baker, Paul Bristow, Clive Jervis, David J. King, Robert Thomson, Bill Mitchell, Simon Burton:
Detecting and resolving semantic pathologies in UML sequence diagrams. 50-59 - Matthias Heindl, Stefan Biffl:
A case study on value-based requirements tracing. 60-69
Models and components
- Emmanuel Letier, Jeff Kramer, Jeff Magee, Sebastián Uchitel:
Fluent temporal logic for discrete-time event-based models. 70-79 - Junrong Shen, Xi Sun, Gang Huang, Wenpin Jiao, Yanchun Sun, Hong Mei:
Towards a unified formal model for supporting mechanisms of dynamic component update. 80-89 - Manos Renieris, Shashank Ramaprasad, Steven P. Reiss:
Arithmetic program paths. 90-98
Research tool demonstrations I
- Stéphane Ducasse, Tudor Gîrba, Oscar Nierstrasz:
Moose: an agile reengineering environment. 99-102 - Bradley R. Schmerl, David Garlan, Hong Yan:
Dynamically discovering architectures with DiscoTect. 103-106 - Jacek Sliwerski, Thomas Zimmermann, Andreas Zeller:
HATARI: raising risk awareness. 107-110 - Paola Inverardi, Henry Muccini, Patrizio Pelliccione:
CHARMY: an extensible tool for architectural analysis. 111-114
Application performance
- Yichen Xie, Alex Aiken:
Context- and path-sensitive memory leak detection. 115-125 - Edu Metz, Raimondas Lencevicius, Teofilo F. Gonzalez:
Performance data collection using a hybrid approach. 126-135 - Kavitha Srinivas, Harini Srinivasan:
Summarizing application performance from a components perspective. 136-145
Patterns and aspects
- Murali Haran, Alan F. Karr, Alessandro Orso, Adam A. Porter, Ashish P. Sanil:
Applying classification techniques to remotely-collected program execution data. 146-155 - Hamid Abdul Basit, Stan Jarzabek:
Detecting higher-level similarity patterns in programs. 156-165 - Kevin J. Sullivan, William G. Griswold, Yuanyuan Song, Yuanfang Cai, Macneil Shonle, Nishit Tewari, Hridesh Rajan:
Information hiding interfaces for aspect-oriented design. 166-175 - António S. Câmara:
Innovations in pervasive computing. 176
Software evolution analysis
- Jennifer Bevan, E. James Whitehead Jr., Sunghun Kim, Michael W. Godfrey:
Facilitating software evolution research with kenyon. 177-186 - Miryung Kim, Vibha Sazawal, David Notkin, Gail C. Murphy:
An empirical study of code clone genealogies. 187-196 - Xiangyu Zhang, Rajiv Gupta:
Matching execution histories of program versions. 197-206
Objects and datatypes
- Viktor Kuncak, Daniel Jackson:
Relational analysis of algebraic datatypes. 207-216 - Kevin Bierhoff, Jonathan Aldrich:
Lightweight object specification with typestates. 217-226 - Jeffrey Fischer, Ranjit Jhala, Rupak Majumdar:
Joining dataflow with predicates. 227-236
Research tool demonstrations II
- Reid Holmes, Robert J. Walker, Gail C. Murphy:
Strathcona example recommendation tool. 237-240 - Nikolai Tillmann, Wolfram Schulte:
Parameterized unit tests with unit meister. 241-244 - Robert Chatley, Thomas Timbul:
KenyaEclipse: learning to program in eclipse. 245-248 - Pavel Grigorenko, Ando Saabas, Enn Tyugu:
Visual tool for generative programming. 249-252
Testing
- Nikolai Tillmann, Wolfram Schulte:
Parameterized unit tests. 253-262 - Koushik Sen, Darko Marinov, Gul Agha:
CUTE: a concolic unit testing engine for C. 263-272 - Margus Veanes, Colin Campbell, Wolfram Schulte, Nikolai Tillmann:
Online testing with model programs. 273-282 - Jeff Kramer, Jeff Magee:
Engineering distributed software: a structural discipline. 283-285
Bug localization
- Chao Liu, Xifeng Yan, Long Fei, Jiawei Han, Samuel P. Midkiff:
SOBER: statistical model-based bug localization. 286-295 - V. Benjamin Livshits, Thomas Zimmermann:
DynaMine: finding common error patterns by mining software revision histories. 296-305 - Zhenmin Li, Yuanyuan Zhou:
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. 306-315
Product lines and middleware
- Jacky Estublier, Germán Vega:
Reuse and variability in large software applications. 316-325 - Ulf Pettersson, Stan Jarzabek:
Industrial experience with building a web portal product line using a lightweight, reactive approach. 326-335 - Chang Xu, Shing-Chi Cheung:
Inconsistency detection and resolution for context-aware middleware support. 336-345
Effort estimation
- Jorge Aranda, Steve M. Easterbrook:
Anchoring and adjustment in software estimation. 346-355 - Lorin Hochstein, Victor R. Basili, Marvin V. Zelkowitz, Jeffrey K. Hollingsworth, Jeffrey C. Carver:
Combining self-reported and automatic data to improve programming effort measurement. 356-365
Doctoral symposium
- Aline Lúcia Baroni:
Quantitative assessment of UML dynamic models. 366-369 - Andrew Le Gear, Jim Buckley:
Reengineering towards components using "Reconn-exion". 370-373 - Ivonne Erfurth, Wilhelm R. Rossak:
UPEX: user participation by example. 374-376 - Marco Antonio Barbosa:
A refinement calculus for software components and architectures. 377-380 - Mark Sherriff:
Utilizing verification and validation certificates to estimate software defect density. 381-384 - Wiebe Hordijk, Roel J. Wieringa:
Surveying the factors that influence maintainability: research design. 385-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.