Information & Software Technology, Volume 45 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 45, Number 1, 1 January 2003

Tsong Yueh Chen
, T. H. Tse
, Zhi Quan Zhou
:
Fault-based testing without the need of oracles. 1-9

Chiyoung Seo, Sang-Won Lee, Hyoung-Joo Kim:
An efficient inverted index technique for XML documents using RDBMS. 11-22

Alexandros Nanopoulos, Maciej Zakrzewicz
, Tadeusz Morzy, Yannis Manolopoulos:
Efficient storage and querying of sequential patterns in database systems. 23-34

Huan Zhou, Yulin Feng, Jing Li:
Probability graph based data hoarding for mobile environment. 35-41

Hikaru Fujiwara, Shinji Kusumoto, Katsuro Inoue, Ayane Suzuki, Toshifusa Ootsubo, Katsuhiko Yuura:
Case studies to evaluate a domain specific application framework based on complexity and functionality metrics. 43-49

Ioannis Stamelos, Lefteris Angelis, P. Dimou, Evaggelos Sakellaris:
On the use of Bayesian belief networks for the prediction of software productivity. 51-60
Volume 45, Number 2, 1 February 2003

Selmin Nurcan, Colette Rolland:
A multi-method for defining the organizational change. 61-82

Ying Liang:
From use cases to classes: a way of building object model with UML. 83-93

Joan Lu
, M. Scaramuzza:
Building XML application in rich detailed genealogical information. 95-108

Olumide Owolabi:
Empirical studies of some hashing functions. 109-112
Volume 45, Number 3, 1 March 2003

Scott Sigman, Xiaoqing Frank Liu:
A computational argumentation methodology for capturing and analyzing design rationale arising from multiple perspectives. 113-122

Magne Jørgensen, Dag I. K. Sjøberg:
An effort prediction interval approach based on the empirical distribution of previous estimation accuracy. 123-136

Zakaria Maamar:
Design of a simulation environment based on software agents and the high level architecture. 137-148

C. C. Chiang:
The use of adapters to support interoperability of components for reusability. 149-156

Toufik Taibi, David Ngo Chek Ling:
Formal specification of design pattern combination using BPSL. 157-170
Volume 45, Number 4, 15 March 2003

André Postma:
A method for module architecture verification and its application on a large component-based system. 171-194

Alexander Chatzigeorgiou:
Performance and power evaluation of C++ object-oriented programming in embedded processors. 195-201

Chang-Ryong Kim, Chin-Wan Chung:
A multi-step approach for partial similarity search in large image data using histogram intersection. 203-215

Chris Barry, Michael Lang
:
A comparison of 'traditional' and multimedia information systems development practices. 217-227
Volume 45, Number 5, 1 April 2003

Ignacio Aedo
, Paloma Díaz
, Susana Montero:
A methodological approach for hypermedia security modeling. 229-239

Jongik Kim, Hyoung-Joo Kim:
Efficient processing of regular path joins using PID. 241-251

Qingping Lin, Chor Ping Low, Jim Mee Ng, Juan Bu, Xiaohua Liu:
Multiuser collaborative work in virtual environment based CASE tool. 253-267

Petros Kefalas
, George Eleftherakis
, Evangelos Kehris:
Communicating X-machines: a practical approach for formal and modular specification of large systems. 269-280

Neil McBride:
A viewpoint on software engineering and information systems: integrating the disciplines. 281-287

Christopher J. Atkinson, David E. Avison, David Wilson:
Architectural images of computer-based information systems development: A response to "A viewpoint of software engineering and information systems: integrating the disciplines". 289-291
Volume 45, Number 6, 15 April 2003

David Ngo Chek Ling:
An expert screen design and evaluation assistant that uses knowledge-based backtracking. 293-304

Bixin Li:
A technique to analyze information-flow in object-oriented programs. 305-314

Yinyan Cao, Ee-Peng Lim
, Wee Keong Ng
:
Data model for warehousing historical Web information. 315-334

Joseph Fong, Hing Kwok Wong, Z. Cheng:
Converting relational database into XML documents with DOM. 335-355

Miguel A. Laguna
, José M. Marqués, Francisco José García-Peñalvo
:
DocFlow: workflow based requirements elicitation. 357-369
Volume 45, Number 7, 1 May 2003

Jonathan Lee:
Introduction to software engineering with computational intelligence. 371-372

Zhiwei Xu
, Taghi M. Khoshgoftaar, Edward B. Allen:
Application of fuzzy expert systems in assessing operational risk of software. 373-388

Stephen G. MacDonell:
Software source code sizing using fuzzy logic modeling. 389-404

Marek Z. Reformat
, Witold Pedrycz, Nicolino J. Pizzi:
Software quality analysis with the use of computational intelligence. 405-417

Chris Matthews:
A formal specification for a fuzzy expert system. 419-429

Nicolás Marín
, Juan Miguel Medina
, Olga Pons, Daniel Sánchez
, María Amparo Vila Miranda
:
Complex object comparison in a fuzzy context. 431-444

Jonathan Lee, Yong-Yi Fanjiang:
Modeling imprecise requirements with XML. 445-460
Volume 45, Number 8, 1 June 2003

Gerald Post, Albert Kagan:
Computer security and operating system updates. 461-467

John Lim:
A conceptual framework on the adoption of negotiation support systems. 469-477

Incheon Paik, Tongwon Han, Dongik Oh, Sangho Ha, Donggue Park:
An affiliated search system for an electronic commerce and software component architecture. 479-497

Ganga Bishnu Mund, Rajib Mall, Sudeshna Sarkar
:
Computation of intraprocedural dynamic program slices. 499-512

Wesley S. Shu, C. Sophie Lee:
Beyond productivity--productivity and the three types of efficiencies of information technology industries. 513-524

Jane Coughlan, Mark Lycett
, Robert D. Macredie
:
Communication issues in requirements elicitation: a content analysis of stakeholder experiences. 525-537

Jitender Kumar Chhabra
, K. K. Aggarwal, Yogesh Singh:
Code and data spatial complexity: two important software understandability measures. 539-546
Volume 45, Number 9, 15 June 2003

Sungchae Lim, Myoung-Ho Kim:
Real-time disk scanning for timely retrieval of continuous media objects. 547-558

Jameson Mbale, Xiaofei Xu, Shengchun Deng:
Global intelligence benevolent builder (GIBB): a system automating integration of heterogeneous classical databases and web. 559-570

Giedre Sabaliauskaite
, Fumikazu Matsukawa, Shinji Kusumoto, Katsuro Inoue:
Further investigations of reading techniques for object-oriented design inspection. 571-585

Subhash Bhalla
:
Evolving a model of transaction management with embedded concurrency control for mobile database systems. 587-596

Jiang Guo:
Software reuse through re-engineering the legacy systems. 597-609

Baomin Xu, Weimin Lian, Qiang Gao:
Migration of active objects in proactive. 611-618

Domenico Cotroneo, Antonino Mazzeo
, Luigi Romano, Stefano Russo
:
An architecture for security-oriented perfective maintenance of legacy software. 619-631
Volume 45, Number 10, 15 July 2003

Hafedh Mili, Estelle Ah-Ki, Robert Godin, Hamid Mcheick
:
An experiment in software component retrieval. 633-649

Nasir Al-Darwish:
PageGen: an effective scheme for dynamic generation of web pages. 651-662

Xudong He, William C. Chu, Hongji Yang:
A new approach to verify rule-based systems using petri net. 663-669

Alexander Chatzigeorgiou, G. Antoniadis:
Efficient management of inspections in software development projects. 671-680

Jan A. Bergstra, Pum Walters:
Operator programs and operator processes. 681-689

Maozhen Li, Man Qi:
MAPBOT: a Web based map information retrieval system. 691-698
Volume 45, Number 11, August 2003

Rachida Dssouli, Ferhat Khendek
:
Preface. 699

Loïc Hélouët:
Distributed system requirement modeling with message sequence charts: the case of the RMTP2 protocol. 701-714

Aziz Salah, Rachida Dssouli, Guy Lapalme:
Implicit integration of scenarios into a reduced timed automaton. 715-725

Reinhard Gotzhein:
Consolidating and applying the SDL-pattern approach: a detailed case study. 727-741

Vangalur S. Alagar, Ramesh Achuthan, M. Haydar, D. Muthiayen, Olga Ormandjieva, Mao Zheng:
A rigorous approach for constructing self-evolving real-time reactive systems. 743-761

Robert L. Probert, Yanping Chen, Behrad Ghazizadeh, D. Paul Sims, Maurus Cappa:
Formal verification and validation for e-commerce: theory and best practices. 763-777

John Mullins, Stéphane Lafrance:
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols. 779-790
Volume 45, Number 12, 15 September 2003

Rachida Dssouli, Ferhat Khendek
:
Preface. 791-792

Robert M. Hierons
, Hasan Ural:
UIO sequence based checking sequences for distributed test architectures. 793-803

Claude Jard:
Synthesis of distributed testers from true-concurrency models of reactive systems. 805-814

M. Ümit Uyar, Mariusz A. Fecko, Ali Y. Duale, Paul D. Amer, Adarshpal S. Sethi:
Experience in developing and testing network protocol software using FDTs. 815-835

Ana R. Cavalli, Caroline Gervy, Svetlana Prokopenko:
New approaches for passive testing using an Extended Finite State Machine specification. 837-852

Ahmed Khoumsi:
Testing distributed real-time systems in the presence of inaccurate clock synchronizations. 853-864

Dong Wang, Ruibing Hao, David Lee:
Fault detection in Rule-based Software systems. 865-871

Purnendu Sinha, Da Qi Ren:
Formal verification of dependable distributed protocols. 873-888
Volume 45, Number 13, October 2003

S. K. Lee, C. S. Hwang:
Architecture layers and engineering approach for agent-based system. 889-898

Dawn G. Gregg
:
XDependency: maintaining relationships between XML data resources. 899-909

Paulo Barthelmess:
Collaboration and coordination in process-centered software development environments: a review of the literature. 911-928

Jinmin Hu, Paul W. P. J. Grefen:
Conceptual framework and architecture for service mediating workflow management. 929-939
Volume 45, Number 14, 1 November 2003

Camille Salinesi, Björn Regnell
:
Eighth International Workshop on Requirements Engineering--Foundation for Software Quality (REFSQ'02). 941-943

Aybüke Aurum, Claes Wohlin
:
The fundamental nature of requirements engineering activities as a decision-making process. 945-954

Erik Kamsties, Antje von Knethen, Ralf H. Reussner
:
A controlled experiment to evaluate how styles affect the understandability of requirements specifications. 955-965

Annie I. Antón, Julia Brande Earp, Ryan A. Carter:
Precluding incongruous behavior by aligning software requirements with security and privacy policies. 967-977

Robert Crook, Darrel C. Ince, Bashar Nuseibeh
:
Modelling access policies using roles in requirements engineering. 979-991

Didar Zowghi
, Vincenzo Gervasi
:
On the interplay between consistency, completeness, and correctness in requirements evolution. 993-1009
Volume 45, Number 15, 1 December 2003

Stewart Green, Ian Beeson, Jin Sa:
Special issue on modelling organisational processes. 1011-1013

Ann Lindsay, Denise Downs, Ken Lunn:
Business processes--attempts to find a definition. 1015-1019

Bob Snowdon, Peter Kawalek:
Active meta-process models: a conceptual exposition. 1021-1029

Chris Wallace:
Using Alloy in process modelling. 1031-1043

Ken Lunn, Andrew Sixsmith, Ann Lindsay, Marja Vaarama:
Traceability in requirements through process modelling, applied to social care applications. 1045-1052

Mohammed Odeh, Richard Kamm
:
Bridging the gap between business models and system models. 1053-1060

Giacomo Piccinelli, Anthony Finkelstein, Tommaso Costa:
Flexible B2B processes: the answer is in the nodes. 1061-1063

Howard Smith:
Business process management--the third wave: business process modelling language (bpml) and its pi-calculus foundations. 1065-1069

Martyn A. Ould:
Preconditions for putting processes back in the hands of their actors. 1071-1074

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







