Information & Software Technology, Volume 46 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 46, Number 1, 1 January 2004

Magne Jørgensen:
Top-down and bottom-up expert estimation of software development effort. 3-16

Choongseok Lee, Woojong Suh, Heeseok Lee:
Implementing a community web site: a scenario-based methodology. 17-33

Mari Carmen Otero
, José Javier Dolado
:
Evaluation of the comprehension of the dynamic modeling in UML. 35-53

Dongshan Xing, Junyi Shen:
Efficient data mining for web navigation patterns. 55-63

Myung Ko, Kweku-Muata Osei-Bryson:
The productivity impact of information technology in the healthcare industry: an empirical study using a regression spline-based approach. 65-73

Didar Zowghi
, Vincenzo Gervasi
:
Erratum to "On the interplay between consistency, completeness, and correctness in requirements evolution" [Information and Software Technology 45 (2003) 993-1009]. 75
Volume 46, Number 2, 1 February 2004

Joon-Sang Lee, Doo-Hwan Bae:
An aspect-oriented framework for developing component-based software with the collaboration-based architectural style. 81-97

Alan C. Benander, Barbara A. Benander, Janche Sang:
Factors related to the difficulty of learning to program in Java--an empirical study of non-novice programmers. 99-107

Hee Beng Kuan Tan, Yuan Zhao:
Automated elicitation of functional dependencies from source codes of database transactions. 109-117

Abdullah Uz Tansel:
On handling time-varying data in the relational data model. 119-126

Dietmar Pfahl
, Oliver Laitenberger, Günther Ruhe, Jörg Dorsch, Tatyana Krivobokova
:
Evaluating the learning effectiveness of using simulations in software project management education: results from a twice replicated experiment. 127-147
Volume 46, Number 3, March 2004

Yacine Atif
:
A distributed and interoperable object-oriented support for safe e-commerce transactions. 149-164

Gina C. Green:
The impact of cognitive complexity on project leadership performance. 165-172

Maria Elena Bonfigli, Giacomo Cabri
, Letizia Leonardi
, Franco Zambonelli
:
Virtual visits to cultural heritage supported by web-agents. 173-184

Zhichao Yin, Alastair Dunsmore, James Miller:
Self-assessment of performance in software inspection processes. 185-194

Damir Becarevic, Mark Roantree
:
A metadata approach to multimedia database federations. 195-207
Volume 46, Number 4, 15 March 2004

Jyhjong Lin, Tsui-e Lin:
Object-oriented conceptual modeling for commitment-based collaboration management in virtual enterprises. 209-217

Kassem Saleh, Christo El-Morr
:
M-UML: an extension to UML for the modeling of mobile agent-based software systems. 219-227

Hyung-Ju Cho, Jun-Ki Min, Chin-Wan Chung:
An adaptive indexing technique using spatio-temporal query workloads. 229-241

Des Greer
, Günther Ruhe:
Software release planning: an evolutionary and iterative approach. 243-253

Kyoung-Gu Woo, Jeong-Hoon Lee, Myoung-Ho Kim, Yoon-Joon Lee:
FINDIT: a fast and intelligent subspace clustering algorithm using dimension voting. 255-271

Shivkumar Krishnan, Jeffrey K. Uhlmann:
The design of an anonymous file sharing system based on group anonymity. 273-278
Volume 46, Number 5, 15 April 2004

Herbert H. Thompson, Chia-Chu Chiang, Ibrahim K. El-Far, Stefan Gruner, Markus Montigel, James A. Whittaker:
Special Issue on Software Engineering: Applications, Practices and Tools from the ACM Symposium on Applied Computing 2003. 279-280

Issa Traoré, Demissie B. Aredo, Hong Ye:
An integrated framework for formal development of open distributed systems. 281-286

Egon Börger, Alessandra Cavarra, Elvinia Riccobene
:
On formalizing UML state machines using ASM. 287-292

Jing Dong:
Adding pattern related information in structural and behavioral diagrams. 293-300

Ana Cristina Vieira de Melo, Bruno Martins Moutinho:
On the composition of Java frameworks control-flows. 301-307

Alessandra Cavarra, Charles Crichton
, Jim Davies
:
A method for the automatic generation of test suites from object models. 309-314

Amit M. Paradkar:
Towards model-based generation of self-priming and self-checking conformance tests for interactive system. 315-322

Elaine J. Weyuker:
How to judge testing progress. 323-328

Yuen-Tak Yu, Sebastian P. Ng
, Pak-Lok Poon
, Tsong Yueh Chen
:
On the testing methods used by beginning software testers. 329-335

Boby George, Laurie A. Williams:
A structured experiment of test-driven development. 337-342

Brian Fenicle, Tim Wahls:
A secure methodology for interchangeable services. 343-349

Yasushi Shinjo, Toshiyuki Kubo, Calton Pu:
Efficient mediators with closures for handling dynamic interfaces in an imperative language. 351-357
Volume 46, Number 6, 1 May 2004

Abdulwahed M. Abbas, Edward P. K. Tsang:
Software engineering aspects of constraint-based timetabling - a case study. 359-372

Jong-Yih Kuo:
A document-driven agent-based approach for business processes management. 373-382

Shih-Chien Chou:
DPEM: a decentralized software process enactment model. 383-395

Sherali Zeadally, Liqiang Zhang, Z. Zhu, Jia Lu:
Network application programming interfaces (APIs) performance on commodity operating systems. 397-402

Jim-Min Lin, Zeng-Wei Hong
, Guo-Ming Fang, Hewijin Christine Jiau, William C. Chu:
Reengineering windows software applications into reusable CORBA objects. 403-413

H. R. Walters:
Structuring professional cooperation. 415-421

Georgios John Fakas, Bill Karakostas:
A peer to peer (P2P) architecture for dynamic workflow management. 423-431
Volume 46, Number 7, June 2004

Jyhjong Lin, Ming-Chang Lee:
An object-oriented analysis method for customer relationship management information systems. 433-443

Nadia Erdogan
, Yunus Emre Selçuk, Ozgur Koray Sahingoz
:
A distributed execution environment for shared java objects. 445-455

Maozhen Li, David W. Walker
, Omer F. Rana
, Yan Huang:
Migrating legacy codes to distributed computing environments: a CORBA approach. 457-464

Les Hatton:
Safer language subsets: an overview and a case history, MISRA C. 465-472

Ian R. McChesney, Séamus Gallagher:
Communication and co-ordination practices in software engineering projects. 473-489

Souheil Khaddaj, Abdul T. Adamu, Minur Morad:
Object versioning and information management. 491-498
Volume 46, Number 8, 15 June 2004

Fauzi M. Ali, Weichang Du:
Toward reuse of object-oriented software design models. 499-517

Tong-Seng Quah, Mie Mie Thet Thwin:
Prediction of software development faults in PL/SQL files using neural network models. 519-523

Vadim Okun, Paul E. Black, Yaacov Yesha:
Comparison of fault classes in specification-based testing. 525-533

Anne Taulavuori, Eila Niemelä
, Päivi Kallio:
Component documentation - a key issue in software product lines. 535-546

Abdelkader Telmoudi, Salem Chakhar
:
Data fusion application from evidential databases as a support for decision making. 547-555
Volume 46, Number 9, 1 July 2004

Kjetil Nørvåg
:
The design, implementation, and performance of the V2 temporal document database system. 557-574

Indrakshi Ray, Robert B. France, Na Li, Geri Georg:
An aspect-based approach to modeling access control concerns. 575-587

Jerzy Kaczmarek, Maciej Kucharski
:
Size and effort estimation for applications written in Java. 589-601

Yvonne Dittrich
, Olle Lindeberg:
How use-oriented development can take place. 603-617

Fredrik Karlsson
, Pär J. Ågerfalk:
Method configuration: adapting to situational characteristics while creating reusable assets. 619-633
Volume 46, Number 10, August 2004

Javier Andrade Garda, Juan Ares Casal
, Rafael García Vázquez
, Juan Pazos, Santiago Rodríguez Yáñez
, Andrés Silva
:
A methodological framework for generic conceptualisation: problem-sensitivity in software engineering. 635-649

Charles Iheagwara, Andrew Blyth, Timm Kevin, David Kinn:
Cost effective management frameworks: the impact of IDS deployment technique on threat mitigation. 651-664

Jan van Moll, Jef Jacobs, Rob J. Kusters
, Jos J. M. Trienekens:
Defect detection oriented lifecycle modeling in complex product development. 665-675

Letha H. Etzkorn, Sampson Gholston
, Julie Fortune, Cara Stein, Dawn R. Utley, Phillip A. Farrington, Glenn W. Cox:
A comparison of cohesion metrics for object-oriented systems. 677-687

Jitender Kumar Chhabra
, K. K. Aggarwal, Yogesh Singh:
Measurement of object-oriented software spatial complexity. 689-699
Volume 46, Number 11, 1 September 2004

Panos Kardasis, Pericles Loucopoulos
:
Expressing and organising business rules. 701-718

Gregoris Tziallas, Babis Theodoulidis
:
A controller synthesis algorithm for building self-adaptive software. 719-727

Shih-Chien Chou:
Dynamic adaptation to object state change in an information flow control model. 729-737

Ho-Hyun Park, Jun-Ki Min, Chin-Wan Chung, Tae-Gyu Chang:
Multi-way R-tree joins using indirect predicates. 739-751

Ramon Lawrence:
The space efficiency of XML. 753-759

Didar Zowghi
, Vincenzo Gervasi
:
Erratum to "On the interplay between consistency, completeness, and correctness in requirements evolution" [Information and Software Technology 45 (2003) 993-1009]. 761

Didar Zowghi
, Vincenzo Gervasi:
Erratum to "On the interplay between consistency, completeness, and correctness in requirements evolution". 763-779
Volume 46, Number 12, 15 September 2004

Ahmed M. Salem, Kamel Rekab, James A. Whittaker:
Prediction of software failures through logistic regression. 781-789

Ismael Rodríguez
, Manuel Núñez
, Fernando Rubio
:
A formal framework for analyzing reusability complexity in component-based systems. 791-804

Mikael Svahnberg:
An industrial study on building consensus around software architectures and quality attributes. 805-818

Hwagyoo Park, Woojong Suh, Heeseok Lee:
A role-driven component-oriented methodology for developing collaborative commerce systems. 819-837

Padmanabhan Krishnan:
Independent examination of software: an experiment. 847-856
Volume 46, Number 13, 1 October 2004
Volume 46, Number 14, 1 November 2004

Djamel Eddine Zegour:
Scalable distributed compact trie hashing (CTH*). 923-935

Marjo Kauppinen
, Matti Vartiainen, Jyrki Kontio, Sari Kujala
, Reijo Sulonen:
Implementing requirements engineering processes throughout organizations: success factors and challenges. 937-953

Colin F. Snook
, Rachel Harrison:
Experimental comparison of the comprehensibility of a Z specification and its implementation in Java. 955-971

Claus Pahl
:
Adaptive development and maintenance of user-centric software systems. 973-986
Volume 46, Number 15, 1 December 2004

Huimin Lin, Hans-Dieter Ehrich, T. H. Tse:
Editorial. Inf. Softw. Technol. 46(15): 987-988 (2004)

Kai-Yuan Cai, Yong-Chao Li, Ke Liu:
Optimal and adaptive testing for software reliability assessment. 989-1000

Tsong Yueh Chen
, Fei-Ching Kuo, Robert G. Merkel
, Sebastian P. Ng
:
Mirror adaptive random testing. 1001-1010

Peter Dybjer, Qiao Haiyan, Makoto Takeyama:
Verifying Haskell programs by combining testing, model checking and interactive theorem proving. 1011-1025

Wolfgang Grieskamp, Nikolai Tillmann, Margus Veanes:
Instrumenting scenarios in a model-driven development environment. 1027-1036

Bernard Wong
:
The software evaluation framework 'SEF' extended. 1037-1047

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







