All Stories

  1. Fortifying the Seams Between C/C++ and Rust: Characterizing Bugs in Interop Tools
  2. Self-Supervised Contrastive Learning for Code Retrieval and Summarization via Semantic-Preserving Transformations
  3. A Feature Table approach to decomposing monolithic applications into microservices
  4. SAR: learning cross-language API mappings with little knowledge
  5. An Empirical Study of Cohesion and Coupling: Balancing Optimization and Disruption
  6. CrowdService
  7. Locating bugs without looking back
  8. Live Blackboxes: Requirements for Tracking and Verifying Aircraft in Motion
  9. POSTER
  10. Engineering Adaptive Model-Driven User Interfaces
  11. Forensically-Sound Analysis of Security Risks of Using Local Password Managers
  12. Verifiable Limited Disclosure: Reporting and Handling Digital Evidence in Police Investigations
  13. Locating bugs without looking back
  14. Protecting Privacy in the Cloud: Current Practices, Future Directions
  15. The Aftermath of the Missing Flight MH370: What Can Engineers Do? [Point of View]
  16. Investigating naming convention adherence in Java references
  17. An Open Framework for Semantic Code Queries on Heterogeneous Repositories
  18. Automated analysis of security requirements through risk-based argumentation
  19. An Architectural Evolution Dataset
  20. A Survey of the Forms of Java Reference Names
  21. The Role of Environmental Assumptions in Failures of DNA Nanosystems
  22. Managing Security Control Assumptions Using Causal Traceability
  23. Guest editorial: Special section: Software quality and maintainability
  24. “Why can’t I do that?”: Tracing Adaptive Security Decisions
  25. Requirements-Driven Self-Optimization of Composite Services Using Feedback Control
  26. Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit
  27. Adaptive Model-Driven User Interface Development Systems
  28. Traceability for Adaptive Information Security in the Cloud
  29. Integrating adaptive user interface capabilities in enterprise applications
  30. Self-adaptation through incremental generative model transformations at runtime
  31. Uncertainty handling in goal-driven self-optimization – Limiting the negative effect on adaptation
  32. From Model-Driven Software Development Processes to Problem Diagnoses at Runtime
  33. Run-time generation, transformation, and verification of access control models for self-protection
  34. Requirements-driven mediation for collaborative security
  35. Specifying software features for composition: A tool-supported approach
  36. Resolving vulnerability identification errors using security requirements on business process models
  37. Requirements-driven adaptive digital forensics
  38. INVocD: Identifier name vocabulary dataset
  39. Developing a domain-specific plug-in for a modelling platform: The good, the bad, the ugly
  40. Improving feature location using structural similarity and iterative graph mapping
  41. Reasoning About Dynamic Aspectual Requirements
  42. Aspect Interactions: A Requirements Engineering Perspective
  43. Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies
  44. Crowdsourcing user interface adaptations for minimizing the bloat in enterprise applications
  45. RBUIS
  46. Cedar studio
  47. Self-tuning of software systems through dynamic quality tradeoff and value-based feedback control loop
  48. Analysing monitoring and switching problems for adaptive systems
  49. Stateful requirements monitoring for self-repairing socio-technical systems
  50. Privacy arguments: Analysing selective disclosure requirements for mobile applications
  51. Maintaining invariant traceability through bidirectional transformations
  52. Workshop Proposal for CSMR 2012 - SQM 2012
  53. A Tool for Managing Evolving Security Requirements
  54. EA-tracer
  55. Specifying and detecting meaningful changes in programs
  56. An evolutionary visual software analysis tool for providing insights into software evolution
  57. Mining java class naming conventions
  58. Risk and argument: A risk-based argumentation method for practical security
  59. Are your sites down? Requirements-driven self-tuning for the survivability of Web systems
  60. OpenArgue: Supporting argumentation to evolve secure software systems
  61. Analyzing evolution of variability in a software product line: From contexts and requirements to features
  62. Assessing architectural evolution: a case study
  63. PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications
  64. Iterative context-aware feature location (NIER track)
  65. The Security Twin Peaks
  66. Analysing requirements in a case study of pairing
  67. Improving the Tokenisation of Identifier Names
  68. Some Issues in the ‘Archaeology’ of Software Evolution
  69. Towards learning to detect meaningful changes in software
  70. Survivability-oriented self-tuning of web systems
  71. An Extended Ontology for Security Requirements
  72. SeCMER: A Tool to Gain Control of Security Requirements Evolution
  73. Tool support for code generation from a UMLsec property
  74. Self-Tuning of Software Systems Through Goal-based Feedback Loop Control
  75. Assure High Quality Code Using Refactoring and Obfuscation Techniques
  76. Variability Modeling for Product Line Viewpoints Integration
  77. Run-Time Security Traceability for Evolving Systems
  78. Exploring the Influence of Identifier Names on Code Quality: An Empirical Study
  79. Security Requirements Engineering for Evolving Software Systems
  80. Model-Based Argument Analysis for Evolving Security Requirements
  81. Towards a Unified Framework for Contextual Variability in Requirements
  82. Are Your Lights Off? Using Problem Frames to Diagnose System Failures
  83. AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment
  84. Relating Identifier Naming Flaws and Code Quality: An Empirical Study
  85. Using formal concept analysis to construct and visualise hierarchies of socio-technical relations
  86. Early Identification of Problem Interactions: A Tool-Supported Approach
  87. Requirements Engineering and Aspects
  88. Towards a Problem Oriented Engineering Theory of Pattern-Oriented Analysis and Design
  89. Aspects across Software Life Cycle: A Goal-Driven Approach
  90. Requirements Engineering: Foundation for Software Quality
  91. Monitoring and diagnosing software requirements
  92. Graph-Centric Tools for Understanding the Evolution and Relationships of Software Structures
  93. Supporting Requirements Model Evolution throughout the System Life-Cycle
  94. Tools for Traceability in Secure Software Development
  95. Traceability for the maintenance of secure software
  96. Design principles in architectural evolution: A case study
  97. Analyzing the evolution of eclipse plugins
  98. Configuring features with stakeholder goals
  99. Enforcing a security pattern in stakeholder goal models
  100. Tools for model-based security engineering
  101. An automated approach to monitoring and diagnosing requirements
  102. Specifying Monitoring and Switching Problems in Context
  103. Tracing and Validating Goal Aspects
  104. Blind User Requirements Engineering for Mobile Services
  105. Comparing Web Services with other Software Components
  106. On Goal-based Variability Acquisition and Analysis
  107. Visualizing non-functional requirements
  108. Requirements-driven design of autonomic application software
  109. Towards requirements-driven autonomic systems design
  110. Configuring common personal software: a requirements-driven approach
  111. Quality-Based Software Reuse
  112. Towards requirements-driven autonomic systems design
  113. Reverse engineering goal models from legacy code
  114. Improving the Build Architecture of Legacy C/C++ Software Systems
  115. Dynamically Self-Organized Service Composition in Wireless Ad Hoc Networks
  116. Making XML document markup international
  117. Reducing build time through precompilations for evolving large software
  118. Non-uniform dependences partitioned by recurrence chains
  119. Loop Parallelization using the 3D Iteration Space Visualizer
  120. A self-adaptive scheduling algorithm of on-demand broadcasts
  121. A 3D-JAVA TOOL TO VISUALIZE LOOP-CARRIED DEPENDENCES
  122. JPT: A Java Parallelization Tool
  123. Visualizing the iteration space in PEFPT
  124. Partitioning loops with variable dependence distances
  125. Security Requirements Engineering for Evolving Software Systems
  126. Performance visualizations using XML representations
  127. A Lightweight Approach to Semantic Web Service Synthesis
  128. From goals to aspects: discovering aspects from requirements goal models
  129. Requirements-Driven Design and Configuration Management of Business Processes
  130. Automated Analysis of Permission-Based Security Using UMLsec
  131. Web Service Search: Who, When, What, and How
  132. A Taxonomy of Asymmetric Requirements Aspects
  133. Web Service Composition: A Reality Check
  134. From Goals to High-Variability Software Design
  135. Security Patterns