ebook img

Information and Software Technology 2002: Vol 44 Index PDF

13 Pages·2002·3 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Information and Software Technology 2002: Vol 44 Index

INFORMATION AND SOFTWARE TECHNOLOGY Information and Software Technology 44 (2002) 943-944 www.elsevier.com/locate/infsof INFORMATION AND SOFTWARE TECHNOLOGY Author index — Volume 43/15 & Volume 44 Ahn, G.-J. 649 Dai, Y.S. 343 Inoue, K. 459, 903 Al-Dallal, J. 973 Darter, M.E. 53 Insfran, E. 659 Alagi¢, S. 207 Dean, T.R. 827 Almendros-Jiménez, J. M. 65, 393 Di Penta, M. 755 Jeffery, R. 601 Anderson, P. 743 Drabek, E. 91 Jiang, M. 91 Andritsos, F. 25 Drew Procaccino, J. 53 Jorgensen, M. 939 Antoniol,G. 755 Dssouli, R. 277, 313 Kempa, M. 229 Bahsoon, R. 431 Feijs, L.M.G. 671 Kikuno, T. 113, 123 Bao,T. 91 Follen,G. 175 Kim, C. 175 Bartolini, S. 783 Fong, J. 41 Kim, M.H. 405 Becker-Kornstaedt, U. 601 Forsyth, H. 381 Kitchenham, B. A. 13 Bemelmans, T. M. A. 959 Kobayashi, N. 113, 123 Benameur, H. 291 Garcia-Mateos, G. 161 Koskimies, K. 565 Bergstra, J. 617 Garcia-Molina, J. 161 Kropf, P. 291 Beynon-Davies, P. 579 Genero, M. 949 Kudrass, T. 269 Bhowmick, S.S. 513 Gielen, G. 91 Kuchlin, W. 857 Binkley,D. 743 Glass, R.L. 491 Kumarakulasingam, P. 395 Boujarwah, A. A. 973 Gomez, J. A. 923 Buttler, D. 237 Gonzalez-Jiménez, L. 65, 393 Lai,C.D. 343 Gregor, D. 797 Lee, J. 361 Cai,K. Y. 841 Gruhn, V. 891 Lee, M.-J. 419 Calero, C. 949 Lee, W. 551 Carvalho, L. 601 Han, W.-S. 419 Lee, Y.-K. 419 Castano, S. 241 Hanna, J.R.P. 1 Leung, H.K.N. 703 Cha, H. 551 Harman, M. 717 Leung, K.R.P.H. 703 Chaib-draa, B. 291 Hawkey, K. 279 Lievens, D. 217 Chang, D.-H. 405 He, X. 473 Lim, E.-P. 513 Chaudhri, A.B. 195 Heemstra, F. J. 959 Linnemann, V. 229 Chen, T. Y. 839 Heiat, A. 911 Liu, S.M. 797 Chen, Z. 733 Hélou, C. 313 Lopez, !. 175 Cheung, S.-C. 875 Heuser, C. A. 241 Lopriore,L. 541 Chiasson, T. 279 Hewahi, N. M. 451 Luck, M. 101 Collins, S.R. 251 Holgate, M. 259 Lumpp, T. 857 Connor, R.C.H. 217 Holmes, S. 579 Cordy, J. R. 827 Hong, S.-P. 649 Madria, S. 513 Crainic, T.-G. 313 Host, M. 921 Maier, D. 197 Critchlow, T. 237 Howells, P. 101 Makinen, E. 565 Hsu, K.-H. 361 Mall, R. 123 D’Ambra, J. 601 Fei... Fur Malton, A. J. 827 d’Astous, P. 639 Hu, M. 101 Manduchi, G. 593 d'Inverno, M. 101 Hull, M.E.C. 1 Manghi, P. 217 PII: S$0950-5849(02)00181-7 944 Author Index/ Information and Software Technology 44 (2002) 943-944 Mansour, N. 431 Prete, C. A. 783 Taylor, M. J. 381 Mark, L. 251 Taylor, P.S. 1 Marquis, G.P. 507 Ramesh, V. 491 Teitelbaum, T. 743 McAllister, M. 279 Regnell, B. 925 Thelin, T. 683, 925 McArthur, K. 351 Ricca, F. 811 Tonella, P. 811 McWilliam, J. 381 Rine, D.C. 77 Torii, K. 459 Meijs, F. A. 671 Robillard, P.N. 639 Tse, T.H. 839 Mello, R.d.S. 241 Rolland, C. 185 Tsuchiya, T. 113, 123 Merlo, E. 755 Rosay, G. 743 Millar, R. J. 1 Ruiz, F. 923 Vakalis, |. 25 Minguez, R. 649 Runeson, P. 683, 925 Van De Vanter, M.L. 767 Moonen, J. R. 671 van Montfort, K.A.G.M. 959 Morisawa, Y. 459 Saiedian, H. 351, 395 van Wamel, J. J. 671 Mund, G.B. 123 Saleh, K. 303, 973 Verner, J. M. 53 Munro, M. 717 Sang,J . 175 Vessey, 1. 491 Musser, D. 797 Sarkar, S. 123 Villano, U. 755 Schneider, J. 857 Navathe, S. 251 Schneider, K. A. 827 Wade, S. 381 Neely, S. 217 Schope, L. 891 Wang, X. 875 Ng, W.K. 513 Schorling, S.M. 77 Wei, J. 875 Norvag, K. 331 Schupp, S. 797 Whang, K.-Y. 419 Scott, L. 601 Wohlin, C. 921 Ohata, F. 903 Seki, H. 903 Ortin-Ibanez, M.-J. 161 Shin, M. E. 649 Xia, Y. 91 Overmyer, S.P. 53 Simeoni, F. 217 Xie, M. 343 Sinz, C. 8657 Xu, B. 733 Palshikar, G. K. 137 Sjoberg, D. 1. K. 939 Papadimos, V. 197 Slonim, J. 279 Yang, H. 733 Park, B.-K. 419 Son, J.H. 405 Yang, P. 343 Partain, W. 259 Song, J.-W. 419 Yokomori, R. 903 Pastor,O. 659 Souter, A.L. 721 Yu, Y. T. 839 Pelechano, V. 659 Srivastava, J. 551 Petersson, Hakan 683 Standing, C. 151 Zand, M. 351 Piattini, M. 923, 949 Systa, T. 565 Zhang, X. 717 Pijpers, G.G.M. 959 Zhao, J. 733 Poh, K.L. 343 Takata, Y. 903 Zhu, H. 473 Pollock, L.L. 721 Taliercio, C. 593 Zhu, X. 91 Polo, M. 923 Tan,G. 91 Zhuge, H. 445 INFORMATION AND SOFTWARE TECHNOLOGY ELSEVIER Information and Software Technology 44 (2002) 945-951 www.elsevier.com/locate/infsof Keyword Index — Volume 43/15 & Volume 44 Access control Buffer management Combined software/hardware Reconstructing a formal security Signature caching in parallel object A model for availability analysis of model 649 database systems 331 distributed software/hardware Access right systems 343 Access privilege management in C++ metaprogramming Comments protection systems 541 Semantic and behavioral library The documentary structure of source Active libraries transformations 797 code 767 Semantic and behavioral library Cache utilization Commercial-off-the-shelf transformations 797 A cache-aware program On the efficiency of domain-based Adaptive software testing transformation technique COTS product selection method Optimal software testing and suitable for embedded 703 adaptive software testing in the systems 783 Component-based software context of software cybernetics Call chains development 841 Characterization and automatic An evaluation of the impact of Admission control identification of type infeasible call component-based architectures on QoS-adaptive bandwidth scheduling chains 721 software reusability 351 in continuous media streaming Capture—recapture models Concept-based transformations 551 Confidence intervals for capture— Semantic and behavioral library Andersen algorithm recapture estimations in software transformations 797 Flow insensitive points-to sets 743 inspections 683 Conceptual modeling Architectural style Catalysis Conceptual Modeling in the Architectural styles for distributed Software development processes — eXtreme 659 processing systems and practical an assessment 1 Concurrency selection method 459 Clone detection Anomaly detection in concurrent Artificial neural network Analyzing cloning evolution in the Java programs using dynamic data Comparison of artificial neural Linux kernel 755 flow analysis 973 network and regression models for Ciustered system Concurrent program flow graph estimating software development A model for availability analysis of Concurrent Ada dead statements effort 911 distributed software/hardware detection 733 Automatic code generation systems 343 Concurrent systems Conceptual Modeling in the Clustering indexes A methodology of testing high-level eXtreme 659 The clustering property of corner Petrinets 473 transformation for spatial database Confidence interval Behavioral modeling applications 419 Confidence intervals for capture— Automated compression of state Code generation recapture estimations in software machines using UML statechart Generating three-tier applications inspections 683 diagram notation 565 from relational databases: a formal Configuration Behaviour observation and practical approach + 923 ARK: an object(ive) view of A methodology of testing high-level Code wrapping extensible minimal languages for Petrinets 473 Development of CORBA-based system configuration 259 Bioinformatics engineering applications from legacy Conflict misses Using meta-data to automatically Fortran programs 175 A cache-aware program wrap bioinformatics sources 237 Cognitive activity transformation technique suitable for Black-box testing Empirical study of exchange embedded systems 783 Non-specification-based patterns during software peer review Continuous media streaming approaches to logic testing for meetings 639 QoS-adaptive bandwidth scheduling software 113 Cohesion in continuous media streaming 551 Braille translation Application of traditional system Control flow graph Braille to print translations for design techniques to web site An efficient dynamic program slicing Chinese 91 design 507 technique 123 PII: S0950-5849(02)00182-9 946 Keyword Index/Information and Software Technology 44 (2002) 945-951 Controlled experiment Dead statements Effort estimation Usage-based reading—an Concurrent Ada dead statements Impact of effort estimates on experiment to guide reviewers with detection 733 software project work 939 use cases 925 Design breakdowns Electronic commerce system Controlled Markov chain Design breakdowns, scenarios Software processes for the Optimal software testing and and rapid application development development of electronic adaptive software testing in the 579 commerce systems 891 context of software cybernetics 841 Diagnosis Electronic commerce CORBA (Common Object Request Temporal fault trees 137 An architecture in support of Broker Architecture) Distributed architecture universal access to electronic Development of CORBA-based An architecture in support of commerce 279 engineering applications from legacy universal access to electronic Documenting electronic Fortran programs 175 commerce 279 commerce systems and software An evaluation of the impact of Distributed computing model using the unified modeling component-based architectures on Architectural styles for distributed language 303 software reusability 351 processing systems and practical Electronic process guide Corner transformation selection method 459 Understanding the use of an The clustering property of corner Distributed object electronic process guide 601 transformation for spatial database Development of CORBA-based Embedded systems applications 419 engineering applications from legacy A cache-aware program Coupling graph Fortran programs 175 transformation technique suitable for Anatomy of the coupling query in a Distributed processing system embedded systems 783 web warehouse 513 Architectural styles for distributed Empirical software engineering Coupling query processing systems and practical Understanding the use of an Anatomy of the coupling query ina selection method 459 electronic process guide 601 web warehouse 513 Distributed query processing Empirical study Coupling text Mutant query plans 197 Empirical study of exchange Anatomy of the coupling query ina Distributed system patterns during software peer review web warehouse 513 A model for availability analysis of meetings 639 Critical path distributed software/hardware Confidence intervals for capture— Critical path identification in the systems 343 recapture estimations in software context of a workflow 405 Document exchange process inspections 683 CSP A CSP and Z combined modeling Empirical validation A CSP and Z combined modeling of document exchange processes in Empirical validation of referential of document exchange processes in e-commerce protocols 875 integrity metrics 949 e-commerce protocols 875 Document object model Entity relationship model Customer/users involvement V-DOM and P-XML-towards a valid Bases for the development of LAST: Case study: factors for early programming of XML-based a formal method for business prediction of software development applications 229 software requirements success 53 Document type definitions specification 65 A method for the unification of XML Estimation accuracy DARPA Agent Markup Language-S schemata 241 Impact of effort estimates on Using meta-data to automatically Domain-based method software project work 939 wrap bioinformatics sources 237 On the efficiency of domain-based Expert systems Data envelopment analysis COTS product selection method A general rule structure 451 The question of scale economies in 703 Detection of dynamic execution software—why cannot researchers Dynamic data flow analysis errors in IBM system automation’s agree? 13 Anomaly detection in concurrent rule-based expert system 857 Data extraction Java programs using dynamic data Extensible compilers Using meta-data to automatically flow analysis 973 Semantic and behavioral library wrap bioinformatics sources 237 Dynamic slicing transformations 797 Data models An efficient dynamic program slicing eXtensible markup language schema Institutions: integrating objects, XML technique 123 XML schema mappings for and databases 207 heterogeneous database Database E-commerce protocols access 251 Empirical validation of referential A CSP and Z combined modeling Extensible markup language integrity metrics 949 of document exchange processes in V-DOM and P-XML-towards a valid Database reengineering e-commerce protocols 875 programming of XML-based Generating three-tier applications E-commerce applications 229 from relational databases: a formal Methodologies for developing Web A method for the unification of XML and practical approach 923 applications 151 schemata 241 Keyword Index/Information and Software Technology 44 (2002) 945-951] 947 Factor covering design Hazard analysis IT usage Non-specification-based Temporal fault trees 137 Senior executives’ use of information approaches to logic testing for Heterogeneous databases access technology 959 software 113 XML schema mappings for Fahndrich algorithra heterogeneous database Java Flow insensitive points-to sets 743 access 251 Molecule-oriented programming in Fan-out Hierarchical censored production Java 617 Application of traditional system rule design techniques to web site A general rule structure 451 L’E-Lyee design 507 High-level Petri nets L’E-Lyee: coupling L’Ecritoire and Fault tree A methodology of testing high-level LyeeALL 185 Temporal fault trees 137 Petrinets 473 L’Ecritoire Field Hypertext L’E-Lyee: coupling L’Ecritoire and Molecule-oriented programming in Soft-link hypertext for information LyeeALL 185 Java 617 retrieval 101 Large object Finite field Management of XML documents Non-specification-based IBM system automation without schema in relational approaches to logic testing for Detection of dynamic execution database systems 269 software 113 errors in IBM system automation’s Legacy software Focus rule-based expert system 857 Development of CORBA-based Molecule-oriented programming in Industrial case study engineering applications from legacy Java 617 Understanding the use of an Fortran programs 175 Formal methods electronic process guide 601 Level of analysis: profession Bases for the development of LAST: Information fusion Research in software engineering: a formal method for business The architecture of an information an analysis of the literature 491 software requirements tool for de-mining: mine identification Linguistic structure specification 65 core module (MICM) 25 The documentary structure of source Detection of dynamic execution Information systems code 767 errors in IBM system automation’s Bases for the development of LAST: LyeeALL rule-based expert system 857 a formal method for business L’E-Lyee: coupling L’Ecritoire and Formal model software requirements LyeeALL 185 Reconstructing a formal security specification 65 model 649 Information tool Maintenance toolkits Formal specification The architecture of an information A methodology for designing Soft-link hypertext for information tool for de-mining: mine identification toolkits for specification level retrieval 101 core module (MICM) 25 verification of interval-constrained A CSP and Z combined modeling Information-ieak analysis information systems of document exchange processes in An information-leak analysis system requirements 77 e-commerce protocols 875 based on program slicing 903 Management support Fortran Institutions Case study: factors for early Development of CORBA-based Institutions: integrating objects, XML prediction of software development engineering applications from legacy and databases 207 success 53 Fortran programs 175 Instrumentation Markov model Framework Anomaly detection in concurrent A model for availability analysis of ARK: an object(ive) view of Java programs using dynamic data distributed software/hardware extensible minimal languages for flow analysis 973 systems 343 system configuration 259 Integrity constraints Metaprogramming Institutions: integrating objects, XML Source transformation in software Goal and databases 207 engineering using the TXL Modeling software architectures with Intelligent information retrieval transformation system 827 goals in virtual university systems Method environment 361 Soft-link hypertext for information Software development processes — Grammar-driven testing retrieval 101 an assessment 1 Automatic generation of MPEG test internet Open Trading Protocol Methodology streams from high-level grammars A CSP and Z combined modeling Software development processes — 671 of document exchange processes in an assessment 1 Hard real-time hierarchical object- e-commerce protocols 875 Methodologies for developing Web oriented design Interoperability applications 151 A framework for evaluating the Translating object-oriented Methodologies and website effectiveness of real-time object- database transactions into relational development: a survey of oriented models 395 transactions 41 practice 381 948 Keyword Index/Information and Software Technology 44 (2002) 945—951 Metric extraction Object-oriented database Pattern formalization Analyzing cloning evolution in the Translating object-oriented Generating three-tier applications Linux kernel 755 database transactions into relational from relational databases: a formal MHP algorithm transactions 41 and practical approach 923 Concurrent Ada dead statements Object-oriented database system Peer review meeting detection 733 Extending the ODMG standard with Empirical study of exchange Microsoft’s distributed component views 161 patterns during software peer review object model Object-oriented metrics meetings 639 An evaluation of the impact Measuring software evolution Peer-to-peer of component-based at a nuclear fusion experiment An architecture in support of architectures on software site: a test case for the universal access to electronic reusability 351 applicability of OO and reuse commerce 279 Molecule metrics in software Personalization Molecule-oriented programming in characterization 593 An architecture in support of Java 617 Object-oriented programming universal access to electronic Molecule-oriented programming languages commerce 279 Molecule-oriented programming in Characterization and automatic Pointer analysis Java 617 identification of type infeasible call Flow insensitive points-to sets 743 Moving picture experts group chains 721 Procedural language Automatic generation of MPEG test Object-oriented regression testing An information-leak analysis system streams from high-level grammars Reduction-based methods and based on program slicing 903 671 metrics for selective regression Process Multi-agent systems testing 431 Software development processes — Multi-item auctions for automatic Object-oriented software an assessment 1 negotiation 291 development Process matching Multi-item auctions Automated compression of state A process matching approach for Multi-item auctions for automatic machines using UML statechart flexible workflow process negotiation 291 diagram notation 565 reuse 445 Multi-knowledge Object-relational database Process measurement Braille to print translations for Translating object-oriented Empirical study of exchange Chinese 91 database transactions into relational patterns during software peer review Multidatabase transactions 41 meetings 639 Translating object-oriented ODMG standard Process reuse database transactions into relational Extending the ODMG standard with A process matching approach for transactions 41 views 161 flexible workflow process XML schema mappings for Ontology reuse 445 heterogeneous database A process matching approach for Production functions access 251 flexible workflow process The question of scale economies in reuse 445 software—why cannot researchers N-Best search OPEN agree? 13 Braille to print translations for Software development processes — Program debugging Chinese 91 an assessment 1 An efficient dynamic program slicing n-Gram Optimal test profile technique 123 Braille to print translations for Optimal software testing and Program dependence graph Chinese 91 adaptive software testing in the An efficient dynamic program slicing Negotiations context of software cybernetics technique 123 Multi-item auctions for automatic 841 An information-leak analysis system negotiation 291 ORB framework based on program slicing 903 An approach to high-level language Program reordering Object bindings to XML 217 A cache-aware program Molecule-oriented programming in transformation technique suitable for Java 617 Parallel database systems embedded systems 783 Object database systems Signature caching in parallel object Program slice Signature caching in parallel object database systems 331 An information-leak analysis system database systems 331 Parametric extensible markup based on program slicing 903 Object-orientation language Program slicing Conceptual Modeling in the V-DOM and P-XML-towards a valid An efficient dynamic program slicing eXtreme 659 programming of XML-based technique 123 Object-oriented applications 229 Program transformation Institutions: integrating objects, XML Partial evaluation Web application transformations and databases 207 Mutant query plans 197 based on rewrite rules 811 Keyword Index/Information and Software Technology 44 (2002) 945-95] Programming Relational database Reuse metrics The documentary structure of source Translating object-oriented Measuring software evolution code 767 database transactions into relational at a nuclear fusion Project management transactions 41 experiment site: a test case Impact of effort estimates on Management of XML documents for the applicability of OO and software project work 939 without schema in relational reuse metrics in software Prolog database systems 269 characterization 593 Automatic generation of MPEG test Relational model Revocation streams from high-level grammars Bases for the development of LAST: Access privilege management in 671 a formal method for business protection systems 541 Propositional dynamic logic software requirements Rewrite rules Detection of dynamic execution specification 65 Web application transformations errors in IBM system automation’s Remote method invocation based on rewrite rules 811 rule-based expert system 857 An evaluation of the impact of Ripple down rule Protection component-based architectures on A general rule structure 451 Access privilege management in software reusability 351 Risk management protection systems 541 Rendezvous Case study: factors for early Protocol analysis Concurrent Ada dead statements prediction of software development Empirical study of exchange detection 733 success 53 patterns during software peer review Replication Role-based meetings 639 Confidence intervals for capture— Reconstructing a formal security Prototype-based language recapture estimations in software model 649 ARK: an object(ive) view of inspections 683 Rule-based system extensible minimal languages for Requirements elicitation A general rule structure 451 system configuration 259 Design breakdowns, scenarios and rapid application development Safety analysis Quality of service 579 Temporal fault trees 137 QoS-adaptive bandwidth scheduling Requirements engineering SAT checking in continuous media streaming 551 Conceptual Modeling in the Detection of dynamic execution Query processing eXtreme 659 errors in IBM system automation’s Signature caching in parallel object Requirements management rule-based expert system 857 database systems 331 Case study: factors for early Scale economies Queuing network prediction of software development The question of scale economies in Critical path identification in the success 53 software—why cannot researchers context of a workflow 405 Requirements specification agree? 13 A methodology for designing Scenario-based reading Rapid application development toolkits for specification level Usage-based reading—an Design breakdowns, scenarios and verification of interval-constrained experiment to guide reviewers with rapid application development 579 information systems use cases 925 Rational unified process requirements 77 Scenarios Software development processes — Research approach: evaluative- Design breakdowns, scenarios anassessment 1 other and rapid application development Real-time object-oriented models Research in software engineering: 579 A framework for evaluating the an analysis of the literature 491 Schema integration effectiveness of real-time object- Research method: literature A method for the unification of XML oriented models 395 analysis schemata 241 Reference discipline: not applicable Research in software engineering: XML schema mappings for Research in software engineering: an analysis of the literature 491 heterogeneous database an analysis of the literature 491 Research synthesis access 251 Referential integrity metrics The question of scale economies in Selection efficiency Empirical validation of referential software—why cannot researchers On the efficiency of domain-based integrity metrics 949 agree? 13 COTS product selection method Regression models Resource scheduling 703 Comparison of artificial neural QoS-adaptive bandwidth scheduling Selection of COTS network and regression models for in continuous media streaming On the efficiency of domain-based estimating software development 551 COTS product selection method effort 911 Reuse 703 Regression testing metrics A methodology for designing toolkits Selective regression testing Reduction-based methods and for specification level verification of Reduction-based methods and metrics for selective regression interval-constrained information metrics for selective regression testing 431 systems requirements 77 testing 431 950 Keyword Index/Information and Software Technology 44 (2002) 945-951 Senior executives Software inspection Spatial databases Senior executives’ use of information Confidence intervals for capture— The clustering property of corner technology 959 recapture estimations in software transformation for spatial database Signature files inspections 683 applications 419 Signature caching in parallel object Usage-based reading—an Specification and documentation database systems 331 experiment to guide reviewers with Documenting electronic Smoothing method use cases 925 commerce systems and software Braille to print translations for Software maintenance using the unified modeling Chinese 91 Reduction-based methods and language 303 SNAQue prototype metrics for selective regression Standards An approach to high-level language testing 431 Methodologies and website bindings to XML 217 Software operational profile development: a survey of Software architecture Optimal software testing and practice 381 An evaluation of the impact of adaptive software testing in the Statechart diagram component-based architectures on context of software cybernetics Automated compression of state software reusability 351 Software patterns machines using UML statechart Modeling software architectures with Conceptual Modeling in the diagram notation 565 goals in virtual university eXtreme 659 Static program analysis environment 361 Software process Characterization and automatic Architectural styles for distributed Software processes for the identification of type infeasible call processing systems and practical development of electronic chains 721 selection method 459 commerce systems 891 Static slicing Software cybernetics Software process improvement An efficient dynamic program slicing Optimal software testing and Understanding the use of an technique 123 adaptive software testing in the electronic process guide 601 Storing XML data context of software cybernetics Software process model Management of XML documents 841 Software processes for the without schema in relational Software development effort development of electronic database systems 269 Comparison of artificial neural commerce systems 891 Synchronization anomaly network and regression models for Software reusability Anomaly detection in concurrent estimating software development An evaluation of the impact of Java programs using dynamic data effort 911 component-based architectures on flow analysis 973 Software development success software reusability 351 System administration Case study: factors for early Software reuse ARK: an object(ive) view of prediction of software development Development of CORBA-based extensible minimal languages for success 53 engineering applications from legacy system configuration 259 Software engineering Fortran programs 175 System architecture Bases for the development of LAST: Software testing The architecture of an information a formal method for business Non-specification-based tool for de-mining: mine identification software requirements approaches to logic testing for core module (MICM) 25 specification 65 software 113 System availability Reduction-based methods and Optimal software testing and A model for availability analysis of metrics for selective regression adaptive software testing in the distributed software/hardware testing 431 context of software systems 343 Source transformation in software cybernetics 841 System structure engineering using the TXL Anomaly detection in concurrent Application of traditional system transformation system 827 Java programs using dynamic data design techniques to web site Software estimation models flow analysis 973 design 507 The question of scale economies in Software testing methods Systems design software—why cannot researchers A methodology of testing high-level Design breakdowns, scenarios and agree? 13 Petrinets 473 rapid application development 579 Software evolution Source code Measuring software evolution at a The documentary structure of source Technology acceptance model nuclear fusion experiment site: a test code 767 Senior executives’ use of information case for the applicability of OO and Source code analysis technology 959 reuse metrics in software Analyzing cloning evolution in the Temporal logic characterization 593 Linux kernel 755 Temporal fault trees 137 Software/hardware reliability Source transformation Test coverage A model for availability analysis of Source transformation in software Reduction-based methods and distributed software/hardware engineering using the TXL metrics for selective regression systems 343 transformation system 827 testing 431 Keyword Index/Information and Software Technology 44 (2002) 945-951 951 Test criteria Use case Web development requirements A methodology of testing high-level! Modeling software architectures with Methodologies for developing Web Petrinets 473 goals in virtual university applications 151 The unified modeling language environment 361 Web Site Design Automated compression of state Application of traditional system machines using UML statechart Validating document object model design techniques to web site diagram notation 565 V-DOM and P-XML-towards a valid design 507 Topic: computing research programming of XML-based Web tuples Research in software applications 229 Anatomy of the coupling query in a engineering: an analysis of the Validation web warehouse 513 literature 491 Detection of dynamic execution Web warehouse Trade-off analysis errors in IBM system automation’s Anatomy of the coupling query in a Modeling software architectures with rule-based expert system 857 web warehouse 513 goals in virtual university Variable precision logic Website development environment 361 A general rule structure 451 Methodologies and website Transaction translation Verification development: a survey of Translating object-oriented A methodology for designing practice 381 database transactions into relational toolkits for specification level Workflow transactions 41 verification of interval-constrained Critical path identification in the Transformations information systems context of a workflow 405 Institutions: integrating objects, XML requirements 77 A process matching approach for and databases 207 Detection of dynamic execution flexible workflow process errors in IBM system automation’s reuse 445 UML rule-based expert system 857 Wrappers Bases for the development of LAST: View management Using meta-data to automatically a formal method for business Extending the ODMG standard with wrap bioinformatics sources 237 software requirements views 161 specification 65 View model XML Reconstructing a formal security Extending the ODMG standard with Mutant query plans 197 model 649 views 161 Institutions: integrating objects, XML Unified modeling language Virterbi algorithm and databases 207 Documenting electronic Braille to print translations for ARK: an object(ive) view of commerce systems and software Chinese 91 extensible minimal languages for using the unified modeling Virtual university system configuration 259 language 303 Modeling software architectures with XML fragments A framework for evaluating the goals in virtual university An approach to high-level language effectiveness of real-time object- environment 361 bindings to XML 217 oriented models 395 Visual impairment XML query Unified modeling language Braille to print translations for Management of XML documents real-time Chinese 91 without schema in relational A framework for evaluating the database systems 269 effectiveness of real-time object- Web applications oriented models 395 Web application transformations y Universal accessibility based on rewrite rules 811 A CSP and Z combined modeling of An architecture in support of Web development document exchange processes in e- universal access to electronic Methodologies for developing Web commerce protocols 875 commerce 279 applications 151

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.