The SCEAS System
Navigation Menu

Journals in DBLP

Information & Software Technology
2006, volume: 48, number: 7

  1. Martin R. Woodward, Michael A. Hennell
    On the relationship between two control-flow coverage criteria: all JJ-paths and MCDC. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:433-440 [Journal]
  2. Zakaria Maamar, Nanjangud C. Narendra, Subramanian Sattanathan
    Towards an ontology-based approach for specifying and securing Web services. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:441-455 [Journal]
  3. Jungwoo Ryoo, Hossein Saiedian
    A framework for classifying and developing extensible architectural views. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:456-470 [Journal]
  4. Chien-Chih Hsu, I.-Chen Wu
    An event-driven framework for inter-user communication applications. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:471-483 [Journal]
  5. Catherine Stringfellow, C. D. Amory, Dileep Potnuri, Anneliese Amschler Andrews, M. Georg
    Comparison of software architecture reverse engineering methods. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:484-497 [Journal]
  6. Apostolos Zarras
    Applying Model-Driven Architecture to achieve distribution transparencies. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:498-516 [Journal]
  7. Javier Andrade, J. Ares, R. García, Juan Pazos, Santiago Rodríguez, Andrés Silva
    Definition of a problem-sensitive conceptual modelling language: foundations and application to software engineering. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:517-531 [Journal]
  8. Jussipekka Leiwo, Lam-for Kwok, Douglas L. Maskell, Nenad Stankovic
    A technique for expressing IT security objectives. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:532-539 [Journal]
  9. Zakaria Maamar
    On coordinating personalized composite web services. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:540-548 [Journal]
  10. Mark Harman, Arun Lakhotia, David Binkley
    Theory and algorithms for slicing unstructured programs. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:549-565 [Journal]
  11. Felicia Kurniawati, D. Ross Jeffery
    The use and effects of an electronic process guide and experience repository: a longitudinal study. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:566-577 [Journal]
  12. Gábor Stikkel
    Dynamic model for the system testing process. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:578-585 [Journal]
  13. James Miller, Marek Reformat, Howard Zhang
    Automatic test data generation using genetic algorithm and program dependence graphs. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:586-605 [Journal]
  14. Joong Hyuk Chang, Won Suk Lee
    Finding frequent itemsets over online data streams. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:606-618 [Journal]
  15. Zeng-Wei Hong, Jim-Min Lin, Hewijin Christine Jiau, Guo-Ming Fang, Che Wun Chiou
    Encapsulating windows-based software applications into reusable components with design patterns. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:7, pp:619-629 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002