


default search action
8th ESEC / 9th SIGSOFT FSE 2001: Vienna, Austria
- A Min Tjoa, Volker Gruhn:

Proceedings of the 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001, Vienna, Austria, September 10-14, 2001. ACM 2001, ISBN 978-1-58113-390-5
Architecture
- André van der Hoek, Marija Mikic-Rakic, Roshanak Roshandel, Nenad Medvidovic:

Taming architectural evolution. 1-10 - Yoshitomi Morisawa, Koji Torii:

An architectural style of product lines for distributed processing systems, and practical selection method. 11-20 - Michel Wermelinger, Antónia Lopes, José Luiz Fiadeiro:

A graph based architectural (Re)configuration language. 21-32 - Timothy J. Sliski, Matthew P. Billmers, Lori A. Clarke, Leon J. Osterweil:

An architecture for flexible, evolvable process-driven user-guidance environments. 33-43
Distributed systems
- Nima Kaveh, Wolfgang Emmerich:

Deadlock detection in distribution object systems. 44-51 - Ramesh Jagannathan, Paolo A. G. Sivilotti:

Increasing client-side confidence in remote component implementations. 52-61
Specification
- Daniel Jackson, Ilya Shlyakhter, Manu Sridharan:

A micromodularity mechanism. 62-73 - Sebastián Uchitel, Jeff Kramer, Jeff Magee:

Detecting implied scenarios in message sequence chart specifications. 74-82 - Peter Wendorff:

A formal approach to the assessment and improvement of terminological models used in information systems engineering. 83-87
Modularity
- Yvonne Coady, Gregor Kiczales, Michael J. Feeley, Greg Smolyn:

Using aspectC to improve the modularity of path-specific customization in operating system code. 88-98 - Kevin J. Sullivan

, William G. Griswold
, Yuanfang Cai, Ben Hallen:
The structure and value of modularity in software design. 99-108
Component composition
- Luca de Alfaro, Thomas A. Henzinger:

Interface automata. 109-120 - Paola Inverardi, Massimo Tivoli

:
Automatic synthesis of deadlock free connectors for COM/DCOM applications. 121-131 - Leigh A. Davis, Rose F. Gamble, Jamie Payton, Gerður Jónsdóttir, Dennis J. Underwood:

A notation for problematic architecture interactions. 132-141
Verification
- Alberto Coen-Porisini

, Giovanni Denaro, Carlo Ghezzi, Mauro Pezzè
:
Using symbolic execution for verifying safety-critical systems. 142-151 - Kathi Fisler

, Shriram Krishnamurthi
:
Modular verification of collaboration-based software designs. 152-163 - Yunja Choi, Sanjai Rayadurgam, Mats Per Erik Heimdahl:

Automatic abstraction for model checking software systems with interrelated numeric constraints. 164-174 - Norman Ramsey, Elöd Csirmaz

:
An algebraic approach to file synchronization. 175-185
Real time UML
- Gregor Engels, Jochen Malte Küster, Reiko Heckel, Luuk Groenewegen:

A methodology for specifying and analyzing consistency of object-oriented behavioral models. 186-195 - Luigi Lavazza

, Gabriele Quaroni, Matteo Venturelli:
Combining UML and formal notations for modelling real-time systems. 196-206
Components
- Chris Lüer, David S. Rosenblum:

WREN---an environment for component-based development. 207-217 - Jens H. Jahnke:

Engineering component-based net-centric systems for embedded applications. 218-228 - Robert Bruce Findler, Mario Latendresse, Matthias Felleisen:

Behavioral contracts and behavioral subtyping. 229-236
Testing
- Jon Edvardsson, Mariam Kamkar:

Analysis of the constraint solver in UNA based test data generation. 237-245 - William Dickinson, David Leon, Andy Podgurski:

Pursuing failure: the distribution of program failures in a profile space. 246-255 - Atif M. Memon, Mary Lou Soffa, Martha E. Pollack:

Coverage criteria for GUI testing. 256-267
Experiences and case studies
- Reidar Conradi, Tore Dybå:

An empirical study on the utility of formal routines to transfer knowledge and experience. 268-276 - Bernd G. Freimut, Susanne Hartkopf, Peter Kaiser, Jyrki Kontio, Werner Kobitzsch:

An industrial case study of implementing software risk management. 277-287 - Forrest Shull, Jeffrey C. Carver

, Guilherme Travassos:
An empirical methodology for introducing software processes. 288-296
Poster Presentations
- Premysl Brada:

Component revision identification based on IDL/ADL component specification. 297-298 - Jacky Estublier, Hervé Verjus, Pierre-Yves Cunin:

Modelling and managing software federations. 299-300 - Duncan Clarke, Thierry Jéron, Vlad Rusu, Elena Zinovieva:

STG: a tool for generating symbolic test programs and oracles from operational specifications. 301-302 - David A. Basin, Frank Rittinger, Luca Viganò:

A formal data-model of the CORBA security service. 303-304 - Vugranam C. Sreedhar:

York: programming software components. 305-306
EWSPT Report
- Vincenzo Ambriola, Robert Mark Greenwood:

8th European workshop on software process technology: report and future directions. 307-308
Full-day Tutorials
- Robert L. Nord, Daniel J. Paulish, Robert W. Schwanke, Dilip Soni:

Software architecture in a changing world: developing design strategies that anticipate change. 309-310 - Wolfgang Emmerich, Nima Kaveh:

Component technologies: Java Beans, COM, CORBA, RMI, EJB and the CORBA Component Model. 311-312 - Gregor Kiczales, Erik Hilsdale:

Aspect-oriented programming. 313
Half-day Tutorials
- Kurt C. Wallnau, Scott A. Hissam, Robert C. Seacord

:
Half day tutorial in methods of component-based software engineering essential concepts and classroom experience. 314-315 - Martin Lippert, Stefan Roock:

Adapting XP to complex application domains. 316-317 - Engin Kirda:

Engineering of Web services with XML and XSL. 318-319 - Paul Grünbacher, Barry W. Boehm:

EasyWinWin: a groupware-supported methodology for requirements negotiation. 320-321 - Mike Mannion

, Hermann Kaindl:
Requirements-based product line engineering. 322-323 - Albert Zündorf:

From use cases to code---rigorous software development with UML. 324-325 - Karl Aberer, Manfred Hauswirth:

Peer-to-peer information systems: concepts and models, state-of-the-art, and future systems. 326-327 - Alexander Ran:

Fundamental concepts for practical software architecture. 328-329

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














