


default search action
Journal of Systems and Software, Volume 106
Volume 106, August 2015
- Wei-Chao Lin, Chih-Fong Tsai, Shih-Wen Ke, Chia-Wen Hung, William Eberle:
Learning to detect representative data for large scale instance selection. 1-8 - Mauro Caporuscio
, Carlo Ghezzi:
Engineering Future Internet applications: The Prime approach. 9-27 - Aristeidis Chatzipoulidis
, Dimitrios Michalopoulos, Ioannis Mavridis
:
Information infrastructure risk prediction through platform vulnerability analysis. 28-41 - Laís Neves, Paulo Borba, Vander Alves
, Lucinéia Turnes, Leopoldo Teixeira, Demóstenes Sena, Uirá Kulesza:
Safe evolution templates for software product lines. 42-58 - Gustavo Pinto, Weslley Torres, Benito Fernandes, Fernando Castor Filho
, Roberto Souto Maior de Barros
:
A large-scale study on the usage of Java's concurrent programming constructs. 59-81 - Felipe Ebert
, Fernando Castor
, Alexander Serebrenik
:
An exploratory study on exception handling bugs in Java programs. 82-101 - Yijun Yu
, Virginia N. L. Franqueira
, Thein Than Tun, Roel J. Wieringa, Bashar Nuseibeh
:
Automated analysis of security requirements through risk-based argumentation. 102-116 - Fredrik Asplund
, Martin Törngren
:
The discourse on tool integration beyond technology, a literature survey. 117-131 - Noor Hasrina Bakar
, Zarinah Mohd Kasirun
, Norsaremah Salleh
:
Feature extraction approaches from natural language requirements for reuse in software product lines: A systematic literature review. 132-149 - Muhammad Rashid
, Muhammad Waseem Anwar
, Aamir M. Khan:
Toward the tools selection in model based system engineering for embedded systems - A systematic literature review. 150-163

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.