default search action
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 15
Volume 15, Number 1, January 2006
- Rik Eshuis:
Symbolic model checking of UML activity diagrams. 1-38 - David A. Basin, Jürgen Doser, Torsten Lodderstedt:
Model driven security: From UML models to access control infrastructures. 39-91 - Colin F. Snook, Michael J. Butler:
UML-B: Formal modeling and design aided by UML. 92-122
Volume 15, Number 2, April 2006
- Steve Counsell, Stephen Swift, Jason Crampton:
The interpretation and utility of three cohesion metrics for object-oriented design. 123-149 - Marc Fisher II, Gregg Rothermel, Darren Brown, Mingming Cao, Curtis R. Cook, Margaret M. Burnett:
Integrating automated test generation into the WYSIWYT spreadsheet testing methodology. 150-194 - Wei Zhao, Lu Zhang, Yin Liu, Jiasu Sun, Fuqing Yang:
SNIAFL: Towards a static noninteractive approach to feature location. 195-226
Volume 15, Number 3, July 2006
- Robert M. Hierons:
Avoiding coincidental correctness in boundary value analysis. 227-241 - Avik Sinha, Carol S. Smidts:
HOTTest: A model-based test design technique for enhanced testing of domain-specific applications. 242-278 - Amy L. Murphy, Gian Pietro Picco, Gruia-Catalin Roman:
LIME: A coordination model and middleware supporting mobility of hosts and agents. 279-328
Volume 15, Number 4, October 2006
- Philippe Thiran, Jean-Luc Hainaut, Geert-Jan Houben, Djamal Benslimane:
Wrapper-based evolution of legacy information systems. 329-359 - Marco Brambilla, Stefano Ceri, Piero Fraternali, Ioana Manolescu:
Process modeling in Web applications. 360-409 - Gregor Snelting, Torsten Robschink, Jens Krinke:
Efficient path conditions in dependence graphs for software safety analysis. 410-457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.