ACM SIGSOFT Software Engineering Notes, Volume 23 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 23, Number 1, January 1998

Peter G. Neumann:
Risks to the public in computers and related systems. 9-15

Mark Doernhoefer:
Surfing the Net for Software Engineering Notes. 16-23

Barbara Ann Kitchenham, Lesley M. Pickard:
Evaluating software engineering methods and tools: part 9: quantitative case study methodology. 24-26

Oh Cheon Kwon:
Report from SEKE'97. 27-28

Serge Demeyer, Harald Hall:
Report: Workshop on Object-Oriented Re-engineering (WOOR'97). 28-29

Eric Dubois, Andreas L. Opdahl, Klaus Pohl:
REFSQ'97 workshop summary. 30-34

Lisa Finneran:
Report: technology challenges at SPC. 35-37

Gary T. Leavens, Oscar Nierstrasz, Murali Sitaraman:
1997 workshop on foundations of component-based systems. 38-41

João Carreira, João Gabriel Silva:
Why do some (weird) people inject faults? 42-43

Al Butkus, Barbara L. Mitchell:
A framework for encapsulating card-oriented, interactive, legacy applications. 44-46

Riri Huang:
Making active CASE tools - toward the next generation CASE tools. 47-50

Salvatore Valenti, Maurizio Panti, Alessandro Cucchiarelli:
Overcoming communication obstacles in user-analyst interaction for functional requirements elicitation. 50-55

Peter Kokol, Janez Brest, Milan Zorman, Vili Podgorelec:
Integration of complexity metrics with the use of decision trees. 56-58

Rob Law:
Generalization of leaner object-oriented slicing. 59-61

Franck Xia:
What's wrong with software engineering research methodology. 62-65

Rob Law:
Interacting with Object-Oriented Program Slicing. 66-67

Declan Martin:
Preliminary design use cases: combining use cases and event response lists for reuse and legacy system enhancement. 68-71

Rachid Anane:
Holistic design of a programming system. 72-76

Mike Mannion
, Barry Keepence:
Partnering for reuse. 77-80

Xiaodong Yuan, Jiajun Chen, Guoliang Zheng:
Two-dimensional software development model combining object-oriented method with formal method. 81-85

John Krogstie:
Integrating the understanding of quality in requirements specification and conceptual modeling. 86-91

Radmila Juric:
The UML rules. 92-97

Cyrus F. Nourani:
Software agents and intelligent object fusion. 98

Jianmin Hou, Xuandong Li, Xiaocong Fan, Guoliang Zheng:
Compositional model-checking for real-time systems. 99

Wing Lam:
Viewpoint-centred reuse: bridging the gap between reusability and the needs of the reuser. 100-103

Jonathan Lee, Nien-Lin Xue, Tai-Lin Kuei:
A note on state modeling through inheritance. 104-110

Will Tracz:
Book Reviews: The Deadline, A Novel about Project Management, Tom DeMarco. 109

Brian O'Laughlin:
Book Reviews: The Year 2000 Software Crisis: Challenge of the Century, William M. Ulrich and Ian S. Hayes. 109

Peter Raynham:
Book Reviews: Smalltalk, Objects, and Design, Chamond Liu. 110
Volume 23, Number 2, March 1998

Mary Lou Soffa, Michal Young, Will Tracz:
Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 1998, Clearwater Beach, Florida, USA, March 2-5, 1998. ACM 1998, ISBN 0-89791-971-8 [contents]
Volume 23, Number 3, May 1998

Donald J. Bagert:
Texas poised to license professional engineers in software engineering. 8-10

Gerald L. Engel, Richard J. LeBlanc, Bruce H. Barnes, Martin L. Griss
, Tony Wasserman, Laurie Werth:
Draft accreditation criteria for software engineering. 11-12

Mark Doernhoefer:
Surfing the Net for software engineering notes. 13-19

Barbara Ann Kitchenham, Lesley M. Pickard:
Evaluating software eng. methods and tools part 10: designing and running a quantitative case study. 20-22

Peter G. Neumann:
Risks to the public in computers and related systems. 23-29

Will Tracz:
Highlights from the DoD product line practice workshop product lines: bridging the gap - commercial success to DoD practice. 29-31

Edward A. Addy:
Report from the first annual workshop on software architectures in product line acquisitions. 32-39

Paul C. Clements, Nelson H. Weiderman:
Notes on the second international workshop on development and evolution of software architectures for product families. 39-43

Craig Thompson:
Workshop on compositional software architectures: workshop report. 44-63

David Lorge Parnas:
Successful software engineering research. 64-68

Bruce H. Barnes:
A history of software engineering at the National Science Foundation (a personal view). 68-69

Nenad Marovac:
Embedded documentation for semi-automatic program construction and software reuse. 70-74

Nuzhat J. Haneef:
Software documentation and readability: a proposed process improvement. 75-77

Xiaodong Yuan, Jiajun Chen, Guoliang Zheng:
Duration calculus in COOZ. 78

Xiaocong Fan, Dianxiang Xu, Jianmin Hou, Guoliang Zheng:
Reasoning about team tracking. 79-82

Jiajun Chen, Xiaodong Yuan, Guoliang Zheng:
A multi-threaded object-oriented programming model. 83-86

Hong Liu, Guangzhou Zeng, Zongkai Lin:
An agent-oriented modeling approach. 87-92

Christophe Kolski:
A "call for answers" around the proposition of an HCI-enriched model. 93-96

Ad Soloman:
A new bachelor's degree program in software engineering. 98-101

M. R. Strens, J. S. Chudge:
Using responsibility modeling to match organizational change to changes in the systems development process. 102-104

L. B. S. Raccoon:
Toward a tradition of software engineering. 105-110

L. B. S. Raccoon, Puppydog P. O. P.:
A middle-out concept of hierarchy (or the problem of feeding the animals). 111-119

Marjan Krasna, Ivan Rozman, Bruno Stiglic:
How to improve the quality of software engineering project management. 120-125

Mark Doernhoefer:
Book Reviews: Object Models Strategies, Patterns, and Applications, Peter Coad. 125

Marty Leisner:
Book Reviews: Structuring Techniques: An Introduction Using C++, Andrew C. Staugaard, Jr. 126

Jeffrey S. Poulin:
Book Reviews: High Performance Oracle8 Object-Oriented Design, David A. Anstey. 127-128

Peter Raynham:
Book Reviews: Object Oriented COBOL, Edmund C. Arranga and Frank P. Coyle. 128-129

John A. Kostecki:
Book Reviews: The Craft of Software Testing: Subsystem Testing Including Object-Based and Object-Oriented Testing, Brian Maxick. 129-130
Volume 23, Number 4, July 1998

Arnulf Mester:
ACM fellow profile: James Jay (Jim) Horning. 7-8

Greg Cooper:
ACM fellow profile: Dennis J. Frailey. 9-11

Barbara Ann Kitchenham, Lesley M. Pickard:
Evaluating software engineering methods and tools, part 11: analysing quantitative case studies. 18-20

Peter G. Neumann:
Risks to the public in computers and related systems. 21-25

David Lorge Parnas:
Who taught me about software engineering research? 26-28

Li Li, Dharma P. Agrawal:
Operating systems architecture future directions for heterogeneous communication systems. 35-37

L. G. Samaraweera, R. Harrison:
Evaluation of the functional and object-oriented programming paradigms: a replicated experiment. 38-43

Kyo Chul Kang, Gerard J. Kim, Ji Y. Lee, Hye J. Kim:
Prototype = function + behavior + form. 44-49

John Laws:
Management of complexity in software development. 50-52

Petri Vesterinen:
Using inconsistent data for software process improvement. 53-55

Partha Pratim Pal:
A flexible, applet-like software distribution mechanism for Java applications. 56-60

Yingxu Wang, Graham King, Dilip Patel, Ian Court, Geoff Staples, Margaret Ross, Shushma Patel:
On built-in tests and reuse in object-oriented programming. 60-64

Ernst Ellmer:
A learning perspective on software process technology. 65-69

Chung-Hua Wang, Feng-Jian Wang:
A language-based editing process for visual object-oriented programming. 70-75

Xiaodong Yuan, Deqiang Hu, Hao Xu, Yong Li, Guoliang Zheng:
COOZ: a complete object-oriented extension to Z. 76-81

Yogesh Singh, Pradeep Kumar Bhatia:
Module weakness: a new measure. 82

Xiaocong Fan, Guanling Chen, Guoliang Zheng:
Research on concurrent actions in multi-agent systems. 83
Volume 23, Number 5, September 1998

Donald J. Bagert:
Texas board votes to license software engineers. 7

Greg Cooper:
ACM fellow profile: Grady Booch. 8-10

Greg Cooper, Arnulf Mester:
ACM fellow profile: Meir M(Manny) Lehman. 11

Barbara Ann Kitchenham:
Evaluating software engineering methods and tools part 12: evaluating DESMET. 21-24

Peter G. Neumann:
Risks to the public in computers and related systems. 25-29

Jeffrey S. Poulin, Prem Devanbu:
5th international conference on software reuse (ICSR'5) conference summary. 30-35

Hausi A. Müller, Thomas W. Reps, Gregor Snelting:
Program comprehension and software reengineering. 36-44

Andreas L. Opdahl, Klaus Pohl:
Workshop summary: REFSQ'98. 44-50

Hyoseob Kim:
Trip report to the one-day seminar on componentware development. 50-51

D. Janaki Ram, R. A. Dwivedi, Ramakrishna Ongole:
An implemntation mechanism for design patterns. 52-56

Mingchun Zheng, Jiazhong Zhang, Yanbing Wang:
Integrating a formal specification notation with HOOD. 57-61

José Ramón Hilera, León A. González, José A. Guitiérrez, J. M. Martinez:
Software documentation as an engineering process. 61-64

V. Rajanna:
Test data generation. 65-68

John M. Favaro, Shari Lawrence Pfleeger:
Making software development investment decisions. 69-74

W. Eric Wong, Norman Wilde, Kristin Blackwell, Rendy Justice:
Understanding data-sensitive code: one piece of the year 2000 puzzle. 75-80

Yogesh Singh, Pradeep Kumar Bhatia:
Module weakness: a new measure. 81

Riri Huang:
Formalizing hierarchical object-oriented design method. 82-88
Volume 23, Number 6, November 1998

Leon J. Osterweil, William L. Scherlis:
Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, SIGSOFT 1998, Lake Buena Vista, Florida, USA, November 3-5, 1998. ACM 1998, ISBN 978-1-58113-108-6 [contents]

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







