enter search term and/or author name
Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and nondeterministic interleaving space. In reality, without the resources to...
Business Process Model Merging: An Approach to Business Process Consolidation
Marcello La Rosa, Marlon Dumas, Reina Uba, Remco Dijkman
Article No.: 11
This article addresses the problem of constructing consolidated business process models out of collections of process models that share common fragments. The article considers the construction of unions of multiple models (called merged...
Personalized Reliability Prediction of Web Services
Zibin Zheng, Michael R. Lyu
Article No.: 12
Service Oriented Architecture (SOA) is a business-centric IT architectural approach for building distributed systems. Reliability of service-oriented systems heavily depends on the remote Web services as well as the unpredictable Internet...
Automated Comparison of State-Based Software Models in Terms of Their Language and Structure
Neil Walkinshaw, Kirill Bogdanov
Article No.: 13
State machines capture the sequential behavior of software systems. Their intuitive visual notation, along with a range of powerful verification and testing techniques render them an important part of the model-driven software engineering process....
An Information Foraging Theory Perspective on Tools for Debugging, Refactoring, and Reuse Tasks
Scott D. Fleming, Chris Scaffidi, David Piorkowski, Margaret Burnett, Rachel Bellamy, Joseph Lawrance, Irwin Kwan
Article No.: 14
Theories of human behavior are an important but largely untapped resource for software engineering research. They facilitate understanding of human developers’ needs and activities, and thus can serve as a valuable resource to researchers...
Verification across Intellectual Property Boundaries
Sagar Chaki, Christian Schallhart, Helmut Veith
Article No.: 15
In many industries, the importance of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the...