default search action
8th ESEC / 9th SIGSOFT FSE 2001: Vienna, Austria
- A Min Tjoa, Volker Gruhn:
Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001, Vienna, Austria, September 10-14, 2001. ACM 2001, ISBN 978-1-58113-390-5
Architecture
- André van der Hoek, Marija Mikic-Rakic, Roshanak Roshandel, Nenad Medvidovic:
Taming architectural evolution. 1-10 - Yoshitomi Morisawa, Koji Torii:
An architectural style of product lines for distributed processing systems, and practical selection method. 11-20 - Michel Wermelinger, Antónia Lopes, José Luiz Fiadeiro:
A graph based architectural (Re)configuration language. 21-32 - Timothy J. Sliski, Matthew P. Billmers, Lori A. Clarke, Leon J. Osterweil:
An architecture for flexible, evolvable process-driven user-guidance environments. 33-43
Distributed systems
- Nima Kaveh, Wolfgang Emmerich:
Deadlock detection in distribution object systems. 44-51 - Ramesh Jagannathan, Paolo A. G. Sivilotti:
Increasing client-side confidence in remote component implementations. 52-61
Specification
- Daniel Jackson, Ilya Shlyakhter, Manu Sridharan:
A micromodularity mechanism. 62-73 - Sebastián Uchitel, Jeff Kramer, Jeff Magee:
Detecting implied scenarios in message sequence chart specifications. 74-82 - Peter Wendorff:
A formal approach to the assessment and improvement of terminological models used in information systems engineering. 83-87
Modularity
- Yvonne Coady, Gregor Kiczales, Michael J. Feeley, Greg Smolyn:
Using aspectC to improve the modularity of path-specific customization in operating system code. 88-98 - Kevin J. Sullivan, William G. Griswold, Yuanfang Cai, Ben Hallen:
The structure and value of modularity in software design. 99-108
Component composition
- Luca de Alfaro, Thomas A. Henzinger:
Interface automata. 109-120 - Paola Inverardi, Massimo Tivoli:
Automatic synthesis of deadlock free connectors for COM/DCOM applications. 121-131 - Leigh A. Davis, Rose F. Gamble, Jamie Payton, Gerður Jónsdóttir, Dennis J. Underwood:
A notation for problematic architecture interactions. 132-141
Verification
- Alberto Coen-Porisini, Giovanni Denaro, Carlo Ghezzi, Mauro Pezzè:
Using symbolic execution for verifying safety-critical systems. 142-151 - Kathi Fisler, Shriram Krishnamurthi:
Modular verification of collaboration-based software designs. 152-163 - Yunja Choi, Sanjai Rayadurgam, Mats Per Erik Heimdahl:
Automatic abstraction for model checking software systems with interrelated numeric constraints. 164-174 - Norman Ramsey, Elöd Csirmaz:
An algebraic approach to file synchronization. 175-185
Real time UML
- Gregor Engels, Jochen Malte Küster, Reiko Heckel, Luuk Groenewegen:
A methodology for specifying and analyzing consistency of object-oriented behavioral models. 186-195 - Luigi Lavazza, Gabriele Quaroni, Matteo Venturelli:
Combining UML and formal notations for modelling real-time systems. 196-206
Components
- Chris Lüer, David S. Rosenblum:
WREN---an environment for component-based development. 207-217 - Jens H. Jahnke:
Engineering component-based net-centric systems for embedded applications. 218-228 - Robert Bruce Findler, Mario Latendresse, Matthias Felleisen:
Behavioral contracts and behavioral subtyping. 229-236
Testing
- Jon Edvardsson, Mariam Kamkar:
Analysis of the constraint solver in UNA based test data generation. 237-245 - William Dickinson, David Leon, Andy Podgurski:
Pursuing failure: the distribution of program failures in a profile space. 246-255 - Atif M. Memon, Mary Lou Soffa, Martha E. Pollack:
Coverage criteria for GUI testing. 256-267
Experiences and case studies
- Reidar Conradi, Tore Dybå:
An empirical study on the utility of formal routines to transfer knowledge and experience. 268-276 - Bernd G. Freimut, Susanne Hartkopf, Peter Kaiser, Jyrki Kontio, Werner Kobitzsch:
An industrial case study of implementing software risk management. 277-287 - Forrest Shull, Jeffrey C. Carver, Guilherme Travassos:
An empirical methodology for introducing software processes. 288-296
Poster Presentations
- Premysl Brada:
Component revision identification based on IDL/ADL component specification. 297-298 - Jacky Estublier, Hervé Verjus, Pierre-Yves Cunin:
Modelling and managing software federations. 299-300 - Duncan Clarke, Thierry Jéron, Vlad Rusu, Elena Zinovieva:
STG: a tool for generating symbolic test programs and oracles from operational specifications. 301-302 - David A. Basin, Frank Rittinger, Luca Viganò:
A formal data-model of the CORBA security service. 303-304 - Vugranam C. Sreedhar:
York: programming software components. 305-306
EWSPT Report
- Vincenzo Ambriola, Robert Mark Greenwood:
8th European workshop on software process technology: report and future directions. 307-308
Full-day Tutorials
- Robert L. Nord, Daniel J. Paulish, Robert W. Schwanke, Dilip Soni:
Software architecture in a changing world: developing design strategies that anticipate change. 309-310 - Wolfgang Emmerich, Nima Kaveh:
Component technologies: Java Beans, COM, CORBA, RMI, EJB and the CORBA Component Model. 311-312 - Gregor Kiczales, Erik Hilsdale:
Aspect-oriented programming. 313
Half-day Tutorials
- Kurt C. Wallnau, Scott A. Hissam, Robert C. Seacord:
Half day tutorial in methods of component-based software engineering essential concepts and classroom experience. 314-315 - Martin Lippert, Stefan Roock:
Adapting XP to complex application domains. 316-317 - Engin Kirda:
Engineering of Web services with XML and XSL. 318-319 - Paul Grünbacher, Barry W. Boehm:
EasyWinWin: a groupware-supported methodology for requirements negotiation. 320-321 - Mike Mannion, Hermann Kaindl:
Requirements-based product line engineering. 322-323 - Albert Zündorf:
From use cases to code---rigorous software development with UML. 324-325 - Karl Aberer, Manfred Hauswirth:
Peer-to-peer information systems: concepts and models, state-of-the-art, and future systems. 326-327 - Alexander Ran:
Fundamental concepts for practical software architecture. 328-329
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.