The Community for Technology Leaders
2008 ACM/IEEE 30th International Conference on Software Engineering. ICSE'08 (2008)
Leipzig
May 10, 2008 to May 18, 2008
ISSN: 0270-5257
ISBN: 978-1-4244-4486-1
TABLE OF CONTENTS

Topes (PDF)

Christopher Scaffidi , Carnegie Mellon University, Pittsburgh, PA, USA
Brad Myers , Carnegie Mellon University, Pittsburgh, PA, USA
Mary Shaw , Carnegie Mellon University, Pittsburgh, PA, USA
pp. 1-10

Tracking source locations (PDF)

Steven Reiss , Brown University, Providence, RI, USA
pp. 11-20

Answering conceptual queries with Ferret (PDF)

Brian de Alwis , University of British Columbia, Vancouver, BC, Canada
Gail Murphy , University of British Columbia, Vancouver, BC, Canada
pp. 21-30

Specification patterns for probabilistic quality properties (PDF)

Lars Grunske , Swinburne University of Technology, Hawthorn, VIC 3122, Australia, Australia
pp. 31-40

Existential live sequence charts revisited (PDF)

German Sibay , University of Buenos Aires, Buenos Aires, Argentina
Sebastian Uchitel , University of Buenos Aires, Buenos Aires, Argentina
Victor Braberman , Univeristy of Buenos Aires, Buenos Aires, Argentina
pp. 41-50

Symbolic mining of temporal specifications (PDF)

Mark Gabel , University of California at Davis, Davis, CA, USA
Zhendong Su , University of California at Davis, Davis, CA, USA
pp. 51-60

Testing pervasive software in the presence of context inconsistency resolution services (PDF)

Heng Lu , The University of Hong Kong, Pokfulam, Hong Kong
W.K. Chan , City University of Hong Kong, Tat Chee Avenue, Hong Kong
T.H. Tse , The University of Hong Kong, Pokfulam, Hong Kong
pp. 61-70

ARTOO (PDF)

Ilinca Ciupa , Swiss Federal Institute of Technology (ETH Zurich, Zurich, Switzerland
Andreas Leitner , Swiss Federal Institute of Technology (ETH Zurich, Zurich, Switzerland
Manuel Oriol , Swiss Federal Institute of Technology (ETH Zurich, Zurich, Switzerland
Bertrand Meyer , Swiss Federal Institute of Technology (ETH Zurich, Zurich, Switzerland
pp. 71-80

Time will tell (PDF)

Cemal Yilmaz , IBM T. J. Watson Research Center, Hawthorne, NY, USA
Amit Paradkar , IBM T. J. Watson Research Center, Hawthorne, NY, USA
Clay Williams , IBM T. J. Watson Research Center, Hawthorne, NY, USA
pp. 81-90

Towards reusable components with aspects (PDF)

Kevin Hoffman , Purdue University, West Lafayette, IN, USA
Patrick Eugster , Purdue University, West Lafayette, IN, USA
pp. 91-100

Using components for architecture-based management (PDF)

Sylvain Sicard , Université Joseph Fourier, Grenoble, France
Fabienne Boyer , Université Joseph Fourier, Grenoble, France
Noel De Palma , Institut National Polytechnique de Grenoble, Grenoble, France
pp. 101-110

Early prediction of software component reliability (PDF)

Leslie Cheung , University of Southern California, Los Angeles, CA, USA
Roshanak Roshandel , Seattle University, Seattle, WA, USA
Nenad Medvidovic , University of Southern California, Los Angeles, CA, USA
Leana Golubchik , University of Southern California, Los Angeles, CA, USA
pp. 111-120

Executable misuse cases for modeling security concerns (PDF)

Jon Whittle , Lancaster University, Lancaster, Gt Britain
Duminda Wijesekera , George Mason University, Fairfax, VA, USA
Mark Hartong , Federal Railroad Administration, Washington, DC, USA
pp. 121-130

Mining library specifications using inductive logic programming (PDF)

Sriram Sankaranarayanan , NEC Labs America, Princeton, NJ, USA
Franjo Ivanci , NEC Labs America, Princeton, NJ, USA
Aarti Gupta , NEC Labs America, Princeton, NJ, USA
pp. 131-140

Temporal dependency based checkpoint selection for dynamic verification of fixed-time constraints in grid workflow systems (PDF)

Jinjun Chen , Swinburne University of Technology, Melbourne, Australia
Yun Yang , Swinburne University of Technology, Melbourne, Australia
pp. 141-150

Precise memory leak detection for java software using container profiling (PDF)

Guoqing Xu , Ohio State University, Columbus, OH, USA
Atanas Rountev , Ohio State University, Columbus, OH, USA
pp. 151-160

The effect of program and model structure on mc/dc test adequacy coverage (PDF)

Ajitha Rajan , University of Minnesota, Minneapolis, MN, USA
Michael Whalen , Rockwell Collins Inc. , Cedar Rapids, IA, USA
Mats Heimdahl , University of Minnesota, Minneapolis, MN, USA
pp. 161-170

Static detection of cross-site scripting vulnerabilities (PDF)

Gary Wassermann , University of California, Davis, Davis, CA, USA
Zhendong Su , University of California, Davis, Davis, CA, USA
pp. 171-180

A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction (PDF)

Raimund Moser , Free University of Bolzano-Bozen, Bolzano, Italy
Witold Pedrycz , University of Alberta, Edmonton, AB, Canada
Giancarlo Succi , Free University of Bolzano-Bozen, Bolzano, Italy
pp. 181-190

On the difficulty of replicating human subjects studies in software engineering (PDF)

Jonathan Lung , University of Toronto, Toronto, ON, Canada
Jorge Aranda , University of Toronto, Toronto, ON, Canada
Steve Easterbrook , University of Toronto, Toronto, ON, Canada
Gregory Wilson , University of Toronto, Toronto, ON, Canada
pp. 191-200

An empirical study of the effects of test-suite reduction on fault localization (PDF)

Yanbing Yu , Georgia Institute of Technology, Atlanta, GA, USA
James Jones , Georgia Institute of Technology, Atlanta, GA, USA
Mary Jean Harrold , Georgia Institute of Technology, Atlanta, GA, USA
pp. 201-210

Calysto (PDF)

Domagoj Babic , University of British Columbia, Vancouver, BC, Canada
Alan Hu , University of British Columbia, Vancouver, BC, Canada
pp. 211-220

jPredictor (PDF)

Feng Chen , University of Illinois, Urbana, IL, USA
Traian Serbanuta , University of Illinois, Urbana, IL, USA
Grigore Rosu , University of Illinois, Urbana, IL, USA
pp. 221-230

Dynamic detection of atomic-set-serializability violations (PDF)

Christian Hammer , Universität Karlsruhe (TH, Karlsruhe, Germany
Julian Dolby , IBM T. J. Watson Research Center, Yorktown Heights, NY, USA
Mandana Vaziri , IBM T. J. Watson Research Center, Yorktown Heights, NY, USA
Frank Tip , IBM T. J. Watson Research Center, Yorktown Heights, NY, USA
pp. 231-240

An empirical study of software developers' management of dependencies and changes (PDF)

Cleidson de Souza , Universidade Federal do Pará, Belém, Brazil
David Redmiles , University of California, Irvine, Irvine, CA, USA
pp. 241-250

TODO or to bug (PDF)

Margaret-Anne Storey , University of Victoria, Victoria, BC, Canada
Jody Ryall , University of Victoria, Victoria, BC, Canada
R. Ian Bull , University of Victoria, Victoria, BC, Canada
Del Myers , University of Victoria, Victoria, BC, Canada
Janice Singer , National Research Council, Ottawa, ON, Canada
pp. 251-260

A verification system for timed interval calculus (PDF)

Chunqing CHEN , National University of Singapore, Singapore, Singapore
Jin Song DONG , National University of Singapore, Singapore, Singapore
Jun SUN , National University of Singapore, Singapore, Singapore
pp. 271-280

DySy (PDF)

Christoph Csallner , Georgia Tech, Atlanta, GA, USA
Nikolai Tillmann , Microsoft Research, Redmond, WA, USA
Yannis Smaragdakis , University of Oregon, Eugene, OR, USA
pp. 281-290

Incremental state-space exploration for programs with dynamically allocated data (PDF)

Steven Lauterburg , University of Illinois at Urbana-Champaign, Urbana, IL, USA
Ahmed Sobeih , University of Illinois at Urbana-Champaign, Urbana, IL, USA
Darko Marinov , University of Illinois at Urbana-Champaign, Urbana, IL, USA
Mahesh Viswanathan , University of Illinois at Urbana-Champaign, Urbana, IL, USA
pp. 291-300

Debugging reinvented (PDF)

Andrew Ko , Carnegie Mellon University, Pittsburgh, PA, USA
Brad Myers , Carnegie Mellon University, Pittsburgh, PA, USA
pp. 301-310

Granularity in software product lines (PDF)

Christian Kästner , Otto-von-Guericke-Universität Magdeburg, Magdeburg, Germany
Sven Apel , University of Passau, Passau, Germany
Martin Kuhlemann , Otto-von-Guericke-Universität Magdeburg, Magdeburg, Germany
pp. 311-320

Scalable detection of semantic clones (PDF)

Mark Gabel , University of California at Davis, Davis, CA, USA
Lingxiao Jiang , University of California at Davis, Davis, CA, USA
Zhendong Su , University of California at Davis, Davis, CA, USA
pp. 321-330

The effect of the number of inspectors on the defect estimates produced by capture-recapture models (PDF)

Gursimran Walia , Mississippi State University, Starkville, MS, USA
Jeffrey Carver , Mississippi State University, Starkville, MS, USA
Nachiappan Nagappan , Microsoft Research, Redmond, VA, USA
pp. 331-340

Predicting accurate and actionable static analysis warnings (PDF)

Joseph Ruthruff , University of Nebraska-Lincoln, Lincoln, NE, USA
John Penix , Google In ., Mountain View, CA, USA
J. Morgenthaler , Google Inc., Mountain View, CA, USA
Sebastian Elbaum , University of Nebraska-Lincoln, Lincoln, NE, USA
Gregg Rothermel , University of Nebraska-Lincoln, Lincoln, NE, USA
pp. 341-350

Sufficient mutation operators for measuring test effectiveness (PDF)

Akbar Siami Namin , University of Western Ontario, London, ON, Canada
James Andrews , University of Western Ontario, London, ON, Canada
Duncan Murdoch , University of Western Ontario, London, ON, Canada
pp. 351-360

Are fit tables really talking? (PDF)

Filippo Ricca , University of Genoa, Genova, Italy
Massimiliano Di Penta , University of Sannio, Benevento, Italy
Marco Torchiano , Politecnico di Torino, Torino, Italy
Paolo Tonella , Fondazione Bruno Kessler-IRST, Trento, Italy
Mariano Ceccato , Fondazione Bruno Kessler-IRST, Trento, Italy
Corrado Aaron Visaggio , University of Sannio, Benevento, Italy
pp. 361-370

Data flow testing of service-oriented workflow applications (PDF)

Lijun Mei , The University of Hong Kong, Pokfulam, Hong Kong
W.K. Chan , City University of Hong Kong, Tat Chee Avenue, Hong Kong
T.H. Tse , The University of Hong Kong, Pokfulam, Hong Kong
pp. 371-380

A tale of four kernels (PDF)

Diomidis Spinellis , Athens University of Economics and Business, Athens, Greece
pp. 381-390

Defining and continuous checking of structural program dependencies (PDF)

Michael Eichberg , Darmstadt University of Technology, Darmstadt, Germany
Sven Kloppenburg , Darmstadt University of Technology, Darmstadt, Germany
Karl Klose , Darmstadt University of Technology, Darmstadt, Germany
Mira Mezini , Darmstadt University of Technology, Darmstadt, Germany
pp. 391-400

A case study evaluation of maintainability and performance of persistency techniques (PDF)

Thomas Goldschmidt , FZI Research Center for Information Technologies, Karlsruhe, Germany
Ralf Reussner , Universität Karlsruhe (TH, Karlsruhe, Germany
Jochen Winzen , andrena objects ag, Karlsruhe, Germany
pp. 401-410

Automatic modularity conformance checking (PDF)

Sunny Huynh , Drexel University, Philadelphia, PA, USA
Yuanfang Cai , Drexel University, Philadelphia, PA, USA
Yuanyuan Song , University of Virginia, Charlottesville, VA, USA
Kevin Sullivan , University of Virginia, Charlottesville, VA, USA
pp. 411-420

Breaking the barriers to successful refactoring (PDF)

Emerson Murphy-Hill , Portland State University, Portland, OR, USA
Andrew Black , Portland State University, Portland, OR, USA
pp. 421-430

Systematically refactoring inheritance to delegation in java (PDF)

Hannes Kegel , ej-technologies GmbH, München, Germany
Friedrich Steimann , Fernuniversität in Hagen, Hagen, Germany
pp. 431-440

ReBA (PDF)

Danny Dig , University of Illinois, Urbana-Champaign, IL, USA
Stas Negara , University of Illinois, Urbana-Champaign, IL, USA
Vibhu Mohindra , ACL Wireless Limited, Delhi, India
Ralph Johnson , University of Illinois, Urbana-Champaign, IL, USA
pp. 441-450

Impact analysis of database schema changes (PDF)

Andy Maule , University College London, London, United Kingdom
Wolfgang Emmerich , University College London, London, United Kingdom
David Rosenblum , University College London, London, United Kingdom
pp. 451-460

An approach to detecting duplicate bug reports using natural language and execution information (PDF)

Xiaoyin Wang , Peking University, Beijing, China
Lu Zhang , Peking University, Beijing, China
Tao Xie , North Carolina State University, Raleigh, NC, USA
John Anvik , University of Victoria, Victoria, BC, Canada
Jiasu Sun , Peking University, Beijing, China
pp. 461-470

Mining framework usage changes from instantiation code (PDF)

Thorsten Schäfer , Darmstadt University of Technology, Darmstadt, Germany
Jan Jonas , Darmstadt University of Technology, Darmstadt, Germany
Mira Mezini , Darmstadt University of Technology, Darmstadt, Germany
pp. 471-480

Recommending adaptive changes for framework evolution (PDF)

Barthélémy Dagenais , McGill University, Montréal, PQ, Canada
Martin Robillard , McGill University, Montréal, PQ, Canada
pp. 481-490

Four enhancements to automateddistributed system experimentation methods (PDF)

Yanyan Wang , University of Colorado, Boulder, CO, USA
Antonio Carzaniga , University of Lugano, Lugano, Switzerland
Alexander Wolf , Imperial College London, London, United Kingdom
pp. 491-500

Automatic generation of software behavioral models (PDF)

Davide Lorenzoli , University of Milano Bicocca, Milan, Italy
Leonardo Mariani , University of Milano Bicocca, Milan, Italy
Mauro Pezzè , University of Milano Bicocca, Milan, Italy
pp. 501-510

Detecting model inconsistency through operation-based model construction (PDF)

Xavier Blanc , LIP6, Paris, France
Isabelle Mounier , LIP6, Paris, France
Alix Mougenot , LIP6, Paris, France
Tom Mens , UMH, Mons, Belgium
pp. 511-520

The influence of organizational structure on software quality (PDF)

Nachiappan Nagappan , Microsoft Research, Redmond, WA, USA
Brendan Murphy , Microsoft Research, Cambridge, United Kingdom
Victor Basili , University of Maryland, College Park, MD, USA
pp. 521-530

Predicting defects using network analysis on dependency graphs (PDF)

Thomas Zimmermann , University of Calgary, Calgary, AB, Canada
Nachiappan Nagappan , Microsoft Research, Redmond, WA, USA
pp. 531-540

Open source software peer review practices (PDF)

Peter Rigby , University of Victoria, Victoria, BC, Canada
Daniel German , University of Victoria, Victoria, BC, Canada
Margaret-Anne Storey , University of Victoria, Victoria, BC, Canada
pp. 541-550

Ahaa --agile, hybrid assessment method for automotive, safety critical smes (PDF)

Fergal McCaffery , Dundalk Institute of Technology, Dundalk, Ireland
Minna Pikkarainen , Lero & VTT Technical Research Centre, Limerick & Oulu, Finland
Ita Richardson , University of Limerick, Limerick, Ireland
pp. 551-560

Models for model's sake (PDF)

Oliver Niggemann , dSPACE GmbH, Paderborn, Germany
Joachim Stroop , dSPACE GmbH, Paderborn, Germany
pp. 561-570

Time-bounded adaptation for automotive system software (PDF)

Serena Fritsch , Trinity College Dublin, Dublin, Ireland
Aline Senart , Trinity College Dublin, Dublin, Ireland
Douglas Schmidt , Vanderbilt University, Terrace Plase, USA
Siobhán Clarke , Trinity College Dublin, Dublin, Ireland
pp. 571-580

Mulit-level system integration based on AUTOSAR (Abstract)

U. Freund , ETAS GmbH, Stuttgart
pp. 581-582

Asam odx (PDF)

Stefan Bienk , University of Erlangen, Erlangen, Germany
pp. 583-592

A language for advanced protocol analysis in automotive networks (PDF)

Tim Reichert , Northumbria University, Newcastle upon Tyne, United Kingdom
Edmund Klaus , Heilbronn University, Heilbronn, Germany
Wolfgang Schoch , Heilbronn University, Heilbronn, Germany
Ansgar Meroth , Heilbronn University, Heilbronn, Germany
Dominikus Herzberg , Heilbronn University, Heilbronn, Germany
pp. 593-602

Clone detection in automotive model-based development (PDF)

Florian Deissenboeck , Technische Universität München, Garching bei München, Germany
Benjamin Hummel , Technische Universität München, Garching bei München, Germany
Elmar Jürgens , Technische Universität München, Garching bei München, Germany
Bernhard Schätz , Technische Universität München, Garching bei München, Germany
Stefan Wagner , Technische Universität München, Garching bei München, Germany
Jean-François Girard , MAN Nutzfahrzeuge AG, München, Germany
Stefan Teuchert , MAN Nutzfahrzeuge AG, München, Germany
pp. 603-612

Formal verification of an automotive scenario in service-oriented computing (PDF)

Maurice ter Beek , CNR, Pisa, Italy
Stefania Gnesi , CNR, Pisa, Italy
Nora Koch , Cirquent GmbH, Munich, Germany
Franco Mazzanti , CNR, Pisa, Italy
pp. 613-622

Analyzing medical processes (PDF)

Bin Chen , University of Massachusetts, Amherst, MA, USA
George Avrunin , University of Massachusetts, Amherst, MA, USA
Elizabeth Henneman , University of Massaschusetts, Amherst, MA, USA
Lori Clarke , University of Massachusetts, Amherst, MA, USA
Leon Osterweil , University of Massachusetts, Amherst, MA, USA
Philip Henneman , Tufts-Baystate Medical Center, Springfield, MA, USA
pp. 623-632

Rational quality requirements for medical software (PDF)

Barbara Paech , Institute for Computer Science, Heidelberg, Germany
Thomas Wetter , Institute of Medical Biometry and Medical Informati s, Heidelberg, Germany
pp. 633-638

Supporting requirements engineering for medical products (PDF)

Joerg Doerr , Fraunhofer IESE, Kaiserslautern, Germany
Daniel Kerkow , Fraunhofer IESE, Kaiserslautern, Germany
Dennis Landmann , Fraunhofer IESE, Kaiserslautern, Germany
Christian Graf , University of Hamburg, Hamburg, Germany
Christian Denger , Fraunhofer IESE, Kaiserslautern, Germany
Anne Hoffmann , Siemens AG, München, Germany
pp. 639-648

Experiences with Mirth (PDF)

Gerald Bortis , Donald Bren School of Information and Computer Sciences, Irvine, CA, USA
pp. 649-652

Developing an architecture of a knowledge-based electronic patient record (PDF)

Danny Ammon , Ilmenau Technical University, Ilmenau, Germany
Dirk Hoffmann , medrapid GmbH, Heidelberg, Germany
Tobias Jakob , medrapid GmbH, Heidelberg, Germany
Ekkehard Finkeissen , medrapid GmbH, Heidelberg, Germany
pp. 653-660

Design and implementation of the software architecture for a 3-D reconstruction system in medical imaging (PDF)

Holger Scherl , University of Erlangen-Nuremberg, Erlangen, Germany
Stefan Hoppe , University of Erlangen-Nuremberg, Erlangen, Germany
Markus Kowarschik , Siemens Medical Solutions, Erlangen, Germany
Joachim Hornegger , University of Erlangen-Nuremberg, Erlangen, Germany
pp. 661-668

Applying model-based testing to healthcare products (PDF)

Marlon Vieira , Siemens Corporate Research Inc., Princeton, NJ, USA
Xiping Song , Siemens Corporate Resear h In ., Princeton, NJ, USA
Gilberto Matos , Siemens Corporate Research Inc., Princeton, NJ, USA
Stephan Storck , Siemens Corporate Research Inc., Princeton, NJ, USA
Rajanikanth Tanikella , Siemens Corporate Research Inc., Princeton, NJ, USA
Bill Hasling , Siemens Corporate Research Inc., Princeton, NJ, USA
pp. 669-672

Developing a security protocol for a distributed decision support system in a healthcare environment (PDF)

Liang Xiao , University of Southampton, Southampton, United Kingdom
Paul Lewis , University of Southampton, Southampton, United Kingdom
Alex Gibb , University of Birmingham, Birmingham, United Kingdom
pp. 673-682

Model-based security analysis for mobile communications (PDF)

Jan Jürjens , The Open University, Milton Keynes, United Kingdom
Joerg Schreck , O2 (Germany, Munich, Germany
Peter Bartmann , University of Augsburg, Augsburg, Germany
pp. 683-692

Experience applying the SPIN model checker to an industrial telecommunications system (PDF)

Barry Long , Queens University, Kingston, Ontario, Canada
Juergen Dingel , Queens University, Kingston, Ontario, Canada
T.C. Graham , Queens University, Kingston, Ontario, Canada
pp. 693-702

WS-AMUSE - web service architecture for multimedia services (PDF)

Andreas Scholz , Technische Universität München, Garching, Germany
Christian Buckl , Technische Universität München, Garching, Germany
Alfons Kemper , Technische Universität München, Garching, Germany
Alois Knoll , Technische Universität München, Garching, Germany
Jörg Heuer , Siemens AG, München, Germany
Martin Winter , Siemens AG, München, Germany
pp. 703-712

Interval Quality: Relating Customer-Perceived Quality to Process Quality (PDF)

Audris Mockus , Avaya Research, Basking Ridge, NJ, USA
David Weiss , Avaya Research, Basking Ridge, NJ, USA
pp. 723-732

Improving the handsets network test process via DMAIC concepts (PDF)

Clauirton Siebra , CIn/Samsung - UFPE, Recife, Brazil
Paulo Costa , CIn/Samsung - UFPE, Recife, Brazil
Andre Santos , CIn/Samsung - UFPE, Recife, Brazil
Fabio Silva , CIn/Samsung - UFPE, Recife, Brazil
pp. 733-740

3-step knowledge transition (PDF)

Bartosz Michalik , Poznan University of Technology, Poznan, Poland
Jerzy Nawrocki , Poznan University of Technology, Poznan, Poland
Miroslaw Ochodek , Poznan University of Technology, Poznan, Poland
pp. 741-748

From programming to modeling (PDF)

Jordi Cabot , Open University of Catalonia, Barcelona, Spain
Francisco Durán , Universidad de Málaga, Málaga, Spain
Nathalie Moreno , Universidad de Málaga, Málaga, Spain
Antonio Vallecillo , Universidad de Málaga, Málaga, Spain
José Romero , Universidad de Córdoba, Córdoba, Spain
pp. 749-758

A study of student strategies for the corrective maintenance of concurrent software (PDF)

Scott Fleming , Michigan State University, East Lansing, MI, USA
Eileen Kraemer , University of Georgia, Athens, GA, USA
R. E. K. Stirewalt , Michigan State University, East Lansing, MI, USA
Shaohua Xie , University of Georgia, Athens, GA, USA
Laura Dillon , Michigan State University, East Lansing, MI, USA
pp. 759-768

Best practices in extreme programming course design (PDF)

Kai Stapel , Leibniz Universität Hannover, Hannover, Germany
Daniel Lübke , Leibniz Universität Hannover, Hannover, Germany
Eric Knauss , Leibniz Universität Hannover, Hannover, Germany
pp. 769-776

Using the inverted classroom to teach software engineering (PDF)

Gerald Gannod , Miami University, Oxford, OH, USA
Janet Burge , Miami University, Oxford, OH, USA
Michael Helmick , Miami University, Oxford, OH, USA
pp. 777-786

A teamwork-based approach to programming fundamentals with scheme, smalltalk & java (PDF)

Michele Lanza , University of Lugano, Lugano, Switzerland
Amy Murphy , FBK-IRST, Trento, Italy
Romain Robbes , University of Lugano, Lugano, Switzerland
Mircea Lungu , University of Lugano, Lugano, Switzerland
Paolo Bonzini , University of Lugano, Lugano, Switzerland
pp. 787-790

Power through brokering (PDF)

Birgit Krogstie , Norwegian University of Science and Technology, Trondheim, Norway
pp. 791-800

Design patterns (PDF)

Christoph Denzler , UAS Northwestern Switzerland, Windisch, Switzerland
Dominik Gruntz , UAS Northwestern Switzerland, Windisch, Switzerland
pp. 801-804

Change management (PDF)

Uwe Dumslaff , SD&M AG, Müünchen, Germany
pp. 805-806

Metamodel-based tool integration with moflon (PDF)

Carsten Amelunxen , Technische Universität Darmstadt, Darmstadt, Germany
Felix Klar , Technische Universität Darmstadt, Darmstadt, Germany
Alexander Königs , Technische Universität Darmstadt, Darmstadt, Germany
Tobias Rötschke , Technische Universität Darmstadt, Darmstadt, Germany
Andy Schürr , Technische Universität Darmstadt, Darmstadt, Germany
pp. 807-810

Genie (PDF)

Nelly Bencomo , Lancaster University, Lancaster, United Kingdom
Paul Grace , Lancaster University, Lancaster, United Kingdom
Carlos Flores , Lancaster University, Lancaster, United Kingdom
Danny Hughes , Lancaster University, Lancaster, United Kingdom
Gordon Blair , Lancaster University, Lancaster, United Kingdom
pp. 811-814

Global consistency checking of distributed models with TReMer+ (PDF)

Mehrdad Sabetzadeh , University of Toronto, Toronto, ON, Canada
Shiva Nejati , University of Toronto, Toronto, ON, Canada
Steve Easterbrook , University of Toronto, Toronto, ON, Canada
Marsha Chechik , University of Toronto, Toronto, ON, Canada
pp. 815-818

Marama (PDF)

John Grundy , University of Auckland, Auckland, New Zealand
John Hosking , University of Auckland, Auckland, New Zealand
Jun Huh , University of Auckland, Auckland, New Zealand
Karen Na-Liu Li , University of Auckland, Auckland, New Zealand
pp. 819-822

Tool support for the navigation in graphical models (PDF)

Tobias Reinhard , University of Zurich, Zurich, Switzerland
Silvio Meier , University of Zurich, Zurich, Switzerland
Reinhard Stoiber , University of Zurich, Zurich, Switzerland
Christina Cramer , University of Zurich, Zurich, Switzerland
Martin Glinz , University of Zurich, Zurich, Switzerland
pp. 823-826

Using JULE to generate a compliance test suite for the UML standard (PDF)

Panuchart Bunyakiati , UCL, London, United Kingdom
Anthony Finkelstein , UCL, London, United Kingdom
James Skene , UCL, London, United Kingdom
Clovis Chapman , UCL, London, United Kingdom
pp. 827-830

Analyzing model evolution (PDF)

Sven Wenzel , University of Siegen, Siegen, Germany
Udo Kelter , University of Siegen, Siegen, Germany
pp. 831-834

SEURAT (PDF)

Janet Burge , Miami University, Oxford, OH, USA
David Brown , Worcester Polytechnic Institute, Worcester, MA, USA
pp. 835-838

Adams re-trace (PDF)

Andrea De Lucia , University of Salerno, Fisciano (SA, Italy
Rocco Oliveto , University of Salerno, Fisciano (SA, Italy
Genoveffa Tortora , University of Salerno, Fisciano (SA, Italy
pp. 839-842

Clonetracker (PDF)

Ekwa Duala-Ekoko , McGill University, Montréal, PQ, Canada
Martin Robillard , McGill University, Montréal, PQ, Canada
pp. 843-846

SpyWare (PDF)

Romain Robbes , University of Lugano, Lugano, Switzerland
Michele Lanza , University of Lugano, Lugano, Switzerland
pp. 847-850

Dynamic round-trip GUI maintenance (PDF)

Peng Li , University of British Columbia, Vancouver, BC, Canada
Eric Wohlstadter , University of British Columbia, Vancouver, BC, Canada
pp. 851-854

Juzi (PDF)

Bassem Elkarablieh , The University of Texas at Austin, Austin, TX, USA
Sarfraz Khurshid , The University of Texas at Austin, Austin, TX, USA
pp. 855-858

Deryaft (PDF)

Muhammad Malik , University of Texas at Austin, Austin, TX, USA
Aman Pervaiz , University of Texas at Austin, Austin, TX, USA
Engin Uzuncaova , University of Texas at Austin, Austin, TX, USA
Sarfraz Khurshid , University of Texas at Austin, Austin, TX, USA
pp. 859-862

State extensions for java pathfinder (PDF)

Tihomir Gvero , University of Belgrade, Belgrade, Serbia
Milos Gligoric , University of Belgrade, Belgrade, Serbia
Steven Lauterburg , University of Illinois, Urbana, IL, USA
pp. 863-866

Tool support for data validation by end-user programmers (PDF)

Christopher Scaffidi , Carnegie Mellon University, Pittsburgh, PA, USA
Brad Myers , Carnegie Mellon University, Pittsburgh, PA, USA
Mary Shaw , Carnegie Mellon University, Pittsburgh, PA, USA
pp. 867-870

A business process explorer (PDF)

Jin Guo , Queens University, Kingston, Ontario, Canada
King Foo , Queens University, Kingston, Ontario, Canada
Liliane Barbour , Queens University, Kingston, Ontario, Canada
Ying Zou , Queens University, Kingston, Ontario, Canada
pp. 871-874

Rubacon (PDF)

Sebastian Höhn , University of Freiburg, Freiburg, Germany
Jan Jürjens , The Open University, Milton Keynes, United Kingdom
pp. 875-878
82 ms
(Ver 3.3 (11022016))