default search action
Information & Software Technology, Volume 45
Volume 45, Number 1, 1 January 2003
- Tsong Yueh Chen, T. H. Tse, Zhiquan Zhou:
Fault-based testing without the need of oracles. 1-9 - Chiyoung Seo, Sang-Won Lee, Hyoung-Joo Kim:
An efficient inverted index technique for XML documents using RDBMS. 11-22 - Alexandros Nanopoulos, Maciej Zakrzewicz, Tadeusz Morzy, Yannis Manolopoulos:
Efficient storage and querying of sequential patterns in database systems. 23-34 - Huan Zhou, Yulin Feng, Jing Li:
Probability graph based data hoarding for mobile environment. 35-41 - Hikaru Fujiwara, Shinji Kusumoto, Katsuro Inoue, Ayane Suzuki, Toshifusa Ootsubo, Katsuhiko Yuura:
Case studies to evaluate a domain specific application framework based on complexity and functionality metrics. 43-49 - Ioannis Stamelos, Lefteris Angelis, P. Dimou, Evaggelos Sakellaris:
On the use of Bayesian belief networks for the prediction of software productivity. 51-60
Volume 45, Number 2, 1 February 2003
- Selmin Nurcan, Colette Rolland:
A multi-method for defining the organizational change. 61-82 - Ying Liang:
From use cases to classes: a way of building object model with UML. 83-93 - Joan Lu, M. Scaramuzza:
Building XML application in rich detailed genealogical information. 95-108 - Olumide Owolabi:
Empirical studies of some hashing functions. 109-112
Volume 45, Number 3, 1 March 2003
- Scott Sigman, Xiaoqing Frank Liu:
A computational argumentation methodology for capturing and analyzing design rationale arising from multiple perspectives. 113-122 - Magne Jørgensen, Dag I. K. Sjøberg:
An effort prediction interval approach based on the empirical distribution of previous estimation accuracy. 123-136 - Zakaria Maamar:
Design of a simulation environment based on software agents and the high level architecture. 137-148 - C. C. Chiang:
The use of adapters to support interoperability of components for reusability. 149-156 - Toufik Taibi, David Ngo Chek Ling:
Formal specification of design pattern combination using BPSL. 157-170
Volume 45, Number 4, 15 March 2003
- André Postma:
A method for module architecture verification and its application on a large component-based system. 171-194 - Alexander Chatzigeorgiou:
Performance and power evaluation of C++ object-oriented programming in embedded processors. 195-201 - Chang-Ryong Kim, Chin-Wan Chung:
A multi-step approach for partial similarity search in large image data using histogram intersection. 203-215 - Chris Barry, Michael Lang:
A comparison of 'traditional' and multimedia information systems development practices. 217-227
Volume 45, Number 5, 1 April 2003
- Ignacio Aedo, Paloma Díaz, Susana Montero:
A methodological approach for hypermedia security modeling. 229-239 - Jongik Kim, Hyoung-Joo Kim:
Efficient processing of regular path joins using PID. 241-251 - Qingping Lin, Chor Ping Low, Jim Mee Ng, Juan Bu, Xiaohua Liu:
Multiuser collaborative work in virtual environment based CASE tool. 253-267 - Petros Kefalas, George Eleftherakis, Evangelos Kehris:
Communicating X-machines: a practical approach for formal and modular specification of large systems. 269-280 - Neil McBride:
A viewpoint on software engineering and information systems: integrating the disciplines. 281-287 - Christopher J. Atkinson, David E. Avison, David Wilson:
Architectural images of computer-based information systems development: A response to "A viewpoint of software engineering and information systems: integrating the disciplines". 289-291
Volume 45, Number 6, 15 April 2003
- David Ngo Chek Ling:
An expert screen design and evaluation assistant that uses knowledge-based backtracking. 293-304 - Bixin Li:
A technique to analyze information-flow in object-oriented programs. 305-314 - Yinyan Cao, Ee-Peng Lim, Wee Keong Ng:
Data model for warehousing historical Web information. 315-334 - Joseph Fong, Hing Kwok Wong, Z. Cheng:
Converting relational database into XML documents with DOM. 335-355 - Miguel A. Laguna, José M. Marqués, Francisco José García-Peñalvo:
DocFlow: workflow based requirements elicitation. 357-369
Volume 45, Number 7, 1 May 2003
- Jonathan Lee:
Introduction to software engineering with computational intelligence. 371-372 - Zhiwei Xu, Taghi M. Khoshgoftaar, Edward B. Allen:
Application of fuzzy expert systems in assessing operational risk of software. 373-388 - Stephen G. MacDonell:
Software source code sizing using fuzzy logic modeling. 389-404 - Marek Z. Reformat, Witold Pedrycz, Nicolino J. Pizzi:
Software quality analysis with the use of computational intelligence. 405-417 - Chris Matthews:
A formal specification for a fuzzy expert system. 419-429 - Nicolás Marín, Juan Miguel Medina, Olga Pons, Daniel Sánchez, María Amparo Vila Miranda:
Complex object comparison in a fuzzy context. 431-444 - Jonathan Lee, Yong-Yi Fanjiang:
Modeling imprecise requirements with XML. 445-460
Volume 45, Number 8, 1 June 2003
- Gerald Post, Albert Kagan:
Computer security and operating system updates. 461-467 - John Lim:
A conceptual framework on the adoption of negotiation support systems. 469-477 - Incheon Paik, Tongwon Han, Dongik Oh, Sangho Ha, Donggue Park:
An affiliated search system for an electronic commerce and software component architecture. 479-497 - Ganga Bishnu Mund, Rajib Mall, Sudeshna Sarkar:
Computation of intraprocedural dynamic program slices. 499-512 - Wesley S. Shu, C. Sophie Lee:
Beyond productivity--productivity and the three types of efficiencies of information technology industries. 513-524 - Jane Coughlan, Mark Lycett, Robert D. Macredie:
Communication issues in requirements elicitation: a content analysis of stakeholder experiences. 525-537 - Jitender Kumar Chhabra, K. K. Aggarwal, Yogesh Singh:
Code and data spatial complexity: two important software understandability measures. 539-546
Volume 45, Number 9, 15 June 2003
- Sungchae Lim, Myoung-Ho Kim:
Real-time disk scanning for timely retrieval of continuous media objects. 547-558 - Jameson Mbale, Xiaofei Xu, Shengchun Deng:
Global intelligence benevolent builder (GIBB): a system automating integration of heterogeneous classical databases and web. 559-570 - Giedre Sabaliauskaite, Fumikazu Matsukawa, Shinji Kusumoto, Katsuro Inoue:
Further investigations of reading techniques for object-oriented design inspection. 571-585 - Subhash Bhalla:
Evolving a model of transaction management with embedded concurrency control for mobile database systems. 587-596 - Jiang Guo:
Software reuse through re-engineering the legacy systems. 597-609 - Baomin Xu, Weimin Lian, Qiang Gao:
Migration of active objects in proactive. 611-618 - Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo:
An architecture for security-oriented perfective maintenance of legacy software. 619-631
Volume 45, Number 10, 15 July 2003
- Hafedh Mili, Estelle Ah-Ki, Robert Godin, Hamid Mcheick:
An experiment in software component retrieval. 633-649 - Nasir Al-Darwish:
PageGen: an effective scheme for dynamic generation of web pages. 651-662 - Xudong He, William C. Chu, Hongji Yang:
A new approach to verify rule-based systems using petri net. 663-669 - Alexander Chatzigeorgiou, G. Antoniadis:
Efficient management of inspections in software development projects. 671-680 - Jan A. Bergstra, Pum Walters:
Operator programs and operator processes. 681-689 - Maozhen Li, Man Qi:
MAPBOT: a Web based map information retrieval system. 691-698
Volume 45, Number 11, August 2003
- Rachida Dssouli, Ferhat Khendek:
Preface. 699 - Loïc Hélouët:
Distributed system requirement modeling with message sequence charts: the case of the RMTP2 protocol. 701-714 - Aziz Salah, Rachida Dssouli, Guy Lapalme:
Implicit integration of scenarios into a reduced timed automaton. 715-725 - Reinhard Gotzhein:
Consolidating and applying the SDL-pattern approach: a detailed case study. 727-741 - Vangalur S. Alagar, Ramesh Achuthan, M. Haydar, D. Muthiayen, Olga Ormandjieva, Mao Zheng:
A rigorous approach for constructing self-evolving real-time reactive systems. 743-761 - Robert L. Probert, Yanping Chen, Behrad Ghazizadeh, D. Paul Sims, Maurus Cappa:
Formal verification and validation for e-commerce: theory and best practices. 763-777 - John Mullins, Stéphane Lafrance:
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols. 779-790
Volume 45, Number 12, 15 September 2003
- Rachida Dssouli, Ferhat Khendek:
Preface. 791-792 - Robert M. Hierons, Hasan Ural:
UIO sequence based checking sequences for distributed test architectures. 793-803 - Claude Jard:
Synthesis of distributed testers from true-concurrency models of reactive systems. 805-814 - M. Ümit Uyar, Mariusz A. Fecko, Ali Y. Duale, Paul D. Amer, Adarshpal S. Sethi:
Experience in developing and testing network protocol software using FDTs. 815-835 - Ana R. Cavalli, Caroline Gervy, Svetlana Prokopenko:
New approaches for passive testing using an Extended Finite State Machine specification. 837-852 - Ahmed Khoumsi:
Testing distributed real-time systems in the presence of inaccurate clock synchronizations. 853-864 - Dong Wang, Ruibing Hao, David Lee:
Fault detection in Rule-based Software systems. 865-871 - Purnendu Sinha, Da Qi Ren:
Formal verification of dependable distributed protocols. 873-888
Volume 45, Number 13, October 2003
- S. K. Lee, C. S. Hwang:
Architecture layers and engineering approach for agent-based system. 889-898 - Dawn G. Gregg:
XDependency: maintaining relationships between XML data resources. 899-909 - Paulo Barthelmess:
Collaboration and coordination in process-centered software development environments: a review of the literature. 911-928 - Jinmin Hu, Paul W. P. J. Grefen:
Conceptual framework and architecture for service mediating workflow management. 929-939
Volume 45, Number 14, 1 November 2003
- Camille Salinesi, Björn Regnell:
Eighth International Workshop on Requirements Engineering--Foundation for Software Quality (REFSQ'02). 941-943 - Aybüke Aurum, Claes Wohlin:
The fundamental nature of requirements engineering activities as a decision-making process. 945-954 - Erik Kamsties, Antje von Knethen, Ralf H. Reussner:
A controlled experiment to evaluate how styles affect the understandability of requirements specifications. 955-965 - Annie I. Antón, Julia Brande Earp, Ryan A. Carter:
Precluding incongruous behavior by aligning software requirements with security and privacy policies. 967-977 - Robert Crook, Darrel C. Ince, Bashar Nuseibeh:
Modelling access policies using roles in requirements engineering. 979-991 - Didar Zowghi, Vincenzo Gervasi:
On the interplay between consistency, completeness, and correctness in requirements evolution. 993-1009
Volume 45, Number 15, 1 December 2003
- Stewart Green, Ian Beeson, Jin Sa:
Special issue on modelling organisational processes. 1011-1013 - Ann Lindsay, Denise Downs, Ken Lunn:
Business processes--attempts to find a definition. 1015-1019 - Bob Snowdon, Peter Kawalek:
Active meta-process models: a conceptual exposition. 1021-1029 - Chris Wallace:
Using Alloy in process modelling. 1031-1043 - Ken Lunn, Andrew Sixsmith, Ann Lindsay, Marja Vaarama:
Traceability in requirements through process modelling, applied to social care applications. 1045-1052 - Mohammed Odeh, Richard Kamm:
Bridging the gap between business models and system models. 1053-1060 - Giacomo Piccinelli, Anthony Finkelstein, Tommaso Costa:
Flexible B2B processes: the answer is in the nodes. 1061-1063 - Howard Smith:
Business process management--the third wave: business process modelling language (bpml) and its pi-calculus foundations. 1065-1069 - Martyn A. Ould:
Preconditions for putting processes back in the hands of their actors. 1071-1074
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.