The SCEAS System
Navigation Menu

Journals in DBLP

IEEE Software
2000, volume: 17, number: 5

  1. Ross J. Anderson, Terry Bollinger, Doug Brown, Enrique Draier, Philip Machanick, Gary McGraw, Nancy R. Mead, Arthur B. Pyster, Howard Schmidt, Timothy J. Shimeall
    Roundtable on Information Security Policy. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  2. Steve McConnell
    From the Editor - What's in a Name? [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  3. Tim Menzies, Bojan Cukic
    When to Test Less. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  4. John R. Michener, Tolga Acar
    Security Domains: Key Management in Large-Scale Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  5. Nuno Jardim Nunes, João Falcão e Cunha
    Wisdom: A Software Engineering Method for Small Software Development Companies. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  6. Vaclav Rajlich
    Incremental Redocumentation Using the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  7. Johanna Rothman
    Culture at Work - Making Telecommuting Work. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  8. Melissa L. Russ, John D. McGregor
    A Software Development Process for Small Projects. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  9. John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten
    Statically Scanning Java Code: Finding Security Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  10. Jeffrey M. Voas
    Quality Time - Can Chaotic Methods Improve Software Quality Predictions? [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  11. John McHugh, Alan M. Christie, Julia Allen
    Defending Yourself: The Role of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  12. Gary McGraw, J. Gregory Morrisett
    Attacking Malicious Code: A Report to the Infosec Research Council. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]

  13. Bookshelf - Java Application Frameworks Use Case Driven Object, Modeling with UML: A Practical Approach, Chaos and Complexity in Software, Challenging the Industry and the New Science. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  14. Barry W. Boehm
    Manager - Safe and Simple Software Cost Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  15. Thomas F. Bowen, Mark E. Segal
    Remediation of Application-Specific Security Vulnerabilities at Runtime. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  16. Tore Dybå
    Improvisation in Small Software Organizations. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  17. Robert L. Glass
    Loyal Opposition - The Generalization of an Application Domain. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  18. Larry Graham
    Softlaw - The Legal Tortoise and the Technology Hare. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  19. Peter Knauber, Dirk Muthig, Klaus Schmid, Tanya Widen
    Applying Product Line Concepts in Small and Medium-Sized Companies. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  20. Mauri Laitinen, John Boddie
    Point/Counterpoint - Scaling Down Is Hard to Do / Do We Ever Really Scale Down? [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  21. Mauri Laitinen, Mohamed Fayad, Robert P. Ward
    Software Engineering in the Small - Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]

  22. Letters. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  23. Jeffrey M. Voas, Nancy R. Mead
    Malicious IT - Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002