Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             93 results found
no title author magazine year volume issue page(s) type
1 ACCo: a novel approach to measure cohesion using hierarchical slicing of Java programs Panda, S.
2015
4 p. 243-260
article
2 A comparative analysis between two techniques for the prediction of software defects: fuzzy and statistical linear regression Valles-Barajas, Fernando
2015
4 p. 277-287
article
3 Adding flexibility to workflows through incremental planning Fernandes, Abilio
2007
4 p. 291-302
article
4 Advances in modeling, verification and testing of safety-critical software architectures Ait Wakrime, Abderrahim

4 p. 483-484
article
5 A dynamic capture–recapture model for software defect prediction Bucholz, Robert
2009
4 p. 265-270
article
6 A dynamic model for short-term prediction of stream attributes Misra, Sumit
2017
4 p. 261-269
article
7 A formal nethod (a networked formal method) Breuer, Peter T.
2010
4 p. 255-268
article
8 A framework for business process modeling by QoS-based pruning Deb, Dipankar
2017
4 p. 271-278
article
9 A generic framework: from modeling to code Méry, Dominique
2011
4 p. 227-235
article
10 Agile knowledge management: a survey of Indian perceptions Singh, Amitoj
2014
4 p. 297-315
article
11 A hybrid one-class rule learning approach based on swarm intelligence for software fault prediction Abdi, Yousef
2015
4 p. 289-301
article
12 ALF formal Perseil, Isabelle
2011
4 p. 325-326
article
13 A model-driven approach for the generation of configurations for highly available software systems Salehi, Pejman
2018
4 p. 273-307
article
14 Analysis of object-oriented software reliability model development Schneidewind, Norman F.
2009
4 p. 243-253
article
15 Applying analytical hierarchy process to system quality requirements prioritization Kassab, Mohamad
2015
4 p. 303-312
article
16 A proposal for extending UML-B to support a conceptual model Sousa, Thiago C. de
2011
4 p. 293-301
article
17 A requirements engineering process for control engineering software Valles-Barajas, Fernando
2007
4 p. 217-227
article
18 A second look at Faster, Better, Cheaper El-Rawas, Oussama
2010
4 p. 319-335
article
19 A semiautomatic approach for segmentation of carotid vasculature from patients’ CTA images Guha, Indranil
2017
4 p. 243-250
article
20 A statistical study of the relevance of lines of code measures in software projects Barb, Adrian S.
2014
4 p. 243-260
article
21 Automated classification of software issue reports using machine learning techniques: an empirical study Pandey, Nitish
2017
4 p. 279-297
article
22 Awas: AADL information flow and error propagation analysis framework Thiagarajan, Hariharan

4 p. 485-504
article
23 Bootstrap aggregation ensemble learning-based reliable approach for software defect prediction by using characterized code feature Suresh Kumar, P.

4 p. 355-379
article
24 Bridging the gap between test cases and requirements by abstract testing Merz, Florian
2015
4 p. 233-242
article
25 Code-based prioritization: a pre-testing effort to minimize post-release failures Ray, Mitrabinda
2012
4 p. 279-292
article
26 Combining UML, ASTD and B for the formal specification of an access control filter Milhau, J.
2011
4 p. 303-313
article
27 Component meets service: what does the mongrel look like? Krämer, Bernd J.
2008
4 p. 385-394
article
28 Computer-aided discovery of formal specification behavioral requirements and requirement to implementation mappings Drusinsky, Doron
2014
4 p. 271-281
article
29 Connecting research and practice: an experience report on research infusion with software architecture visualization and evaluation Lindvall, Mikael
2010
4 p. 255-277
article
30 Constrained permutation-based test scenario generation from concurrent activity diagrams Shirole, Mahesh

4 p. 343-353
article
31 Copilot: monitoring embedded systems Pike, Lee
2013
4 p. 235-255
article
32 Coupling-based transformations of Z specifications into UML diagrams Bollin, Andreas
2011
4 p. 283-292
article
33 Deliberative, search-based mitigation strategies for model-based software health management Mahadevan, Nagabhushan
2013
4 p. 293-318
article
34 Development of an automated MBT toolchain from UML/SysML models Lasalle, Jonathan
2011
4 p. 247-256
article
35 Effective identifier names for comprehension and memory Lawrie, Dawn
2007
4 p. 303-318
article
36 Enumerating message paths for interaction testing of object-oriented systems Kundu, Debasish
2015
4 p. 279-301
article
37 Eventual consensus in Synod: verification using a failure-aware actor model Paul, Saswata

4 p. 395-410
article
38 Extending interactive data language with higher-order functions Kneusel, Ronald T.
2008
4 p. 329-339
article
39 Finding the optimal parameters for a software reliability model Schneidewind, Norman F.
2007
4 p. 319-332
article
40 Formal approach to fault diagnosis in distributed discrete event systems with OBDD Xue, Fei
2007
4 p. 259-267
article
41 Formally verified bundling and appraisal of evidence for layered attestations Petz, Adam

4 p. 411-426
article
42 Formal model-driven executable DSLs Idani, Akram

4 p. 543-566
article
43 Formal object-oriented development of a voting system test oracle Gibson, J. Paul
2011
4 p. 237-245
article
44 Formal verification and validation of run-to-completion style state charts using Event-B Morris, K.

4 p. 523-541
article
45 Formal verification of components assembly based on SysML and interface automata Chouali, Samir
2011
4 p. 265-274
article
46 Formal verification of SysML diagram using case studies of real-time system Ali, Sajjad
2018
4 p. 245-262
article
47 From algebraic semantics to denotational semantics for Verilog Zhu, Huibiao
2008
4 p. 341-360
article
48 FTFL: A Fisher’s test-based approach for fault localization Dutta, Arpita

4 p. 381-405
article
49 Fully employing software inspections data Shull, Forrest
2010
4 p. 243-254
article
50 Genesys: service-oriented construction of property conform code generators Jörges, Sven
2008
4 p. 361-384
article
51 Institutionalising UML 2.0 state machines Calegari, Daniel
2011
4 p. 315-323
article
52 Integrating runtime verification into an automated UAS traffic management system Hammer, Abigail

4 p. 567-580
article
53 Introduction to special issue on ‘intelligent computing and adaptive systems’ Pathan, Al-Sakib Khan
2017
4 p. 241-242
article
54 Introduction to special issue: papers from UML&FM’2011 Perseil, I.
2011
4 p. 225-226
article
55 Linking denotational semantics with operational semantics for web services Zhu, Huibiao
2010
4 p. 283-298
article
56 Maintaining the health of software monitors Person, Suzette
2013
4 p. 257-269
article
57 Making a concolic tester achieve increased MC/DC Godboley, Sangharatna
2016
4 p. 319-332
article
58 Mapping of improvement models as a risk reduction strategy: a theoretical comparison for the aerospace industry Eito-Brun, Ricardo
2014
4 p. 283-295
article
59 Matching object catalogues Leme, Luiz André P.
2008
4 p. 315-328
article
60 Measuring and specifying combinatorial coverage of test input configurations Kuhn, D. Richard
2015
4 p. 249-261
article
61 Model-based engineering for change-tolerant systems Bohner, Shawn
2007
4 p. 237-257
article
62 Modeling and specifying formally compound MAPE pattern for self-adaptive IoT systems Hachicha, Marwa

4 p. 505-521
article
63 Multi-objective test prioritization via a genetic algorithm Ray, Mitrabinda
2014
4 p. 261-270
article
64 Online shielding for reinforcement learning Könighofer, Bettina

4 p. 379-394
article
65 Pointcuts, advice, refinements, and collaborations: similarities, differences, and synergies Apel, Sven
2007
4 p. 281-289
article
66 Product backlog rating: a case study on measuring test quality in scrum Kayes, Imrul
2016
4 p. 303-317
article
67 PTSC: probability, time and shared-variable concurrency Zhu, Huibiao
2009
4 p. 271-284
article
68 QoS-oriented design of embedded systems with specification PEARL Gumzej, Roman
2007
4 p. 269-279
article
69 Quantifying security threats and their potential impacts: a case study Aissa, Anis Ben
2010
4 p. 269-281
article
70 Reasoning about software using metrics and expert opinion Ahmad, Norita
2007
4 p. 229-235
article
71 Regularity and quantification: a new approach to verify distributed protocols Goel, Aman

4 p. 359-377
article
72 Requirements-based execution time prediction of a partitioned real-time system using I/O and SLOC estimates Prokop, Loraine E.
2012
4 p. 309-320
article
73 SCRUB: a tool for code reviews Holzmann, Gerard J.
2010
4 p. 311-318
article
74 Selected extended papers of NFM 2021 Dutle, Aaron

4 p. 337-338
article
75 Service substitutability analysis based on behavior automata Ren, Hongmin
2012
4 p. 301-308
article
76 Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map Gambhir, Gaurav

4 p. 333-342
article
77 SLDG: a metamodel for Simulink/Stateflow models and its applications Prasad, Shambhu
2015
4 p. 263-278
article
78 Small multiples Euler-time diagrams for software engineering Sathiyanarayanan, Mithileysh
2017
4 p. 299-307
article
79 Software architectural patterns in practice: an empirical study Kassab, Mohamad
2018
4 p. 263-271
article
80 Software health management Dubey, Abhishek
2013
4 p. 217
article
81 Software health management: a necessity for safety critical systems Srivastava, Ashok N.
2013
4 p. 219-233
article
82 Software health management with Bayesian networks Schumann, Johann
2013
4 p. 271-292
article
83 Software monitoring through formal specification animation Liang, Hui
2009
4 p. 231-241
article
84 Specification decomposition for reactive synthesis Finkbeiner, Bernd

4 p. 339-357
article
85 State of practice in requirements engineering: contemporary data Kassab, Mohamad
2014
4 p. 235-241
article
86 TelePatch: a middle layer for screening device fragmentation Mishra, R. K.
2017
4 p. 251-259
article
87 Test data generation for web application using a UML class diagram with OCL constraints Fujiwara, Shoichiro
2011
4 p. 275-282
article
88 The network of faults: a complex network approach to prioritize test cases for regression testing Kayes, Imrul
2015
4 p. 261-275
article
89 Transference and retrieval of voice message over low signal strength in satellite communication Khan, Muhammad Fahad
2012
4 p. 293-299
article
90 UML/SysML semantic tunings Ober, Ileana
2011
4 p. 257-264
article
91 Use of a lightweight formal method to model the static aspects of state machines Valles-Barajas, Fernando
2009
4 p. 255-264
article
92 Use of a multidimensional approach to study the evolution of software complexity Sangwan, Raghvinder S.
2010
4 p. 299-310
article
93 Using adaptive scheduling for increased resiliency in passive asynchronous replication Adams, Kevin
2007
4 p. 333-344
article
                             93 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands