ACM DL

Software Engineering and Methodology (TOSEM)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 22 Issue 2, March 2013

ConMem: Detecting Crash-Triggering Concurrency Bugs through an Effect-Oriented Approach
Wei Zhang, Chong Sun, Junghee Lim, Shan Lu, Thomas Reps
Article No.: 10
DOI: 10.1145/2430545.2430546

Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and nondeterministic interleaving space. In reality, without the resources to...

Business Process Model Merging: An Approach to Business Process Consolidation
Marcello La Rosa, Marlon Dumas, Reina Uba, Remco Dijkman
Article No.: 11
DOI: 10.1145/2430545.2430547

This article addresses the problem of constructing consolidated business process models out of collections of process models that share common fragments. The article considers the construction of unions of multiple models (called merged...

Personalized Reliability Prediction of Web Services
Zibin Zheng, Michael R. Lyu
Article No.: 12
DOI: 10.1145/2430545.2430548

Service Oriented Architecture (SOA) is a business-centric IT architectural approach for building distributed systems. Reliability of service-oriented systems heavily depends on the remote Web services as well as the unpredictable Internet...

Automated Comparison of State-Based Software Models in Terms of Their Language and Structure
Neil Walkinshaw, Kirill Bogdanov
Article No.: 13
DOI: 10.1145/2430545.2430549

State machines capture the sequential behavior of software systems. Their intuitive visual notation, along with a range of powerful verification and testing techniques render them an important part of the model-driven software engineering process....

An Information Foraging Theory Perspective on Tools for Debugging, Refactoring, and Reuse Tasks
Scott D. Fleming, Chris Scaffidi, David Piorkowski, Margaret Burnett, Rachel Bellamy, Joseph Lawrance, Irwin Kwan
Article No.: 14
DOI: 10.1145/2430545.2430551

Theories of human behavior are an important but largely untapped resource for software engineering research. They facilitate understanding of human developers’ needs and activities, and thus can serve as a valuable resource to researchers...

Verification across Intellectual Property Boundaries
Sagar Chaki, Christian Schallhart, Helmut Veith
Article No.: 15
DOI: 10.1145/2430545.2430550

In many industries, the importance of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the...