We use cookies to improve your experience with our site.

Preface
Shing-Chi Cheung, Hong Mei, Jian Lv
2009, 24(2): 181-182.
Abstract
A Rigorous Architectural Approach to Adaptive Software Engineering
Jeff Kramer, Jeff Magee
2009, 24(2): 183-188.
Abstract
Software, Software Engineering and Software Engineering Research: Some Unconventional Thoughts
David Notkin
2009, 24(2): 189-197.
Abstract
Formalisms to Support the Definition of Processes
Leon J. Osterweil
2009, 24(2): 198-211.
Abstract
Architecting Fault Tolerance with Exception Handling: Verification and Validation
Patrick H. S. Brito, Rogerio de Lemos, Cecilia M. F. Rubira, Eliane Martins
2009, 24(2): 212-237.
Abstract
Global-to-Local Approach to Rigorously Developing Distributed System with Exception Handling
Chao Cai, Zong-Yan Qiu, Hong-Li Yang, Xiang-Peng Zhao
2009, 24(2): 238-249.
Abstract
QoS-Driven Self-Healing Web Service Composition Based on Performance Prediction
Yu Dai, Lei Yang, Bin Zhang
2009, 24(2): 250-261.
Abstract
Do Rules and Patterns Affect Design Maintainability?
Javier Garzas, Felix Garcia, Mario Piattini
2009, 24(2): 262-272.
Abstract
Package Coupling Measurement in Object-Oriented Software
Varun Gupta, Jitender Kumar Chhabra
2009, 24(2): 273-283.
Abstract
Test-Data Generation Guided by Static Defect Detection
Dan Hao, Lu Zhang, Ming-Hao Liu, He Li, Jia-Su Sun
2009, 24(2): 284-293.
Abstract
Runtime Monitoring Composite Web Services Through Stateful Aspect Extension
Tao Huang, Guo-Quan Wu, Jun Wei
2009, 24(2): 294-308.
Abstract
A Secure Elliptic Curve-Based RFID Protocol
Santi Marti nez, Magda Valls, Concepcio Roig, Josep M. Miret, Francesc Gine
2009, 24(2): 309-318.
Abstract
Feature-Oriented Nonfunctional Requirement Analysis for Software Product Line
Xin Peng, Seok-Won Lee, Wen-Yun Zhao
2009, 24(2): 319-338.
Abstract
Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization
Thandar Thein, Jong Sou Park
2009, 24(2): 339-346.
Abstract
Demand-Driven Memory Leak Detection Based on Flow- and Context-Sensitive Pointer Analysis
Ji Wang, Xiao-Dong Ma, Wei Dong, Hou-Feng Xu, Wan-Wei Liu
2009, 24(2): 347-356.
Abstract
QoS Requirement Generation and Algorithm Selection for Composite Service Based on Reference Vector
Bang-Yu Wu, Chi-Hung Chi, Shi-Jie Xu, Ming Gu, Jia-Guang Sun
2009, 24(2): 357-372.
Abstract
A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments
Feng Xu, Jing Pan, Wen Lu
2009, 24(2): 373-385.
Abstract
A Scalable Testing Framework for Location-Based Services
Jiang Yu, Andrew Tappenden, James Miller, Michael Smith
2009, 24(2): 386-404.
Abstract