Default Cover Image

2014 23rd Australian Software Engineering Conference (ASWEC)

April 7 2014 to April 10 2014

Milsons Point, NSW, Australia

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-viii
Message from the General ChairsFreely available from IEEE.pp. ix-ix
Conference OrganizationFreely available from IEEE.pp. xi-xi
Program CommitteeFreely available from IEEE.pp. xii-xii
Steering CommitteeFreely available from IEEE.pp. xiii-xiii
Addtional ReviewersFreely available from IEEE.pp. xiv-xiv
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xv-xvii
Evaluating Technical Debt in Cloud-Based Architectures Using Real OptionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Supporting Complex Work in Crowdsourcing Platforms: A View from Service-Oriented ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 11-14
Design and Implementation of Dynamically Evolving Ensembles with the Helena FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 15-24
Using Constraint Satisfaction and Optimization for Pattern-Based Software DesignFull-text access may be available. Sign in or learn about subscription options.pp. 29-37
Correctness by Construction with Logic-Labeled Finite-State Machines -- Comparison with Event-BFull-text access may be available. Sign in or learn about subscription options.pp. 38-47
On the Shape of Circular Dependencies in Java ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 48-57
Architectural Design Decisions in Open Software Development: A Transition to Software EcosystemsFull-text access may be available. Sign in or learn about subscription options.pp. 58-61
Services for Knowledge Sharing in Dynamic Business NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 62-65
Open Architectures and Software Evolution: The Case of Software EcosystemsFull-text access may be available. Sign in or learn about subscription options.pp. 66-69
Concentus: Applying Stream Processing to Online Collective InteractionFull-text access may be available. Sign in or learn about subscription options.pp. 70-79
Fill That Blank! An iOS-based Literacy ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 80-83
Analyzing the Learning Process in Online Educational Game Design: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 84-93
From Incident Reports to Improvement Recommendations: Analyzing IT Help Desk DataFull-text access may be available. Sign in or learn about subscription options.pp. 94-103
Duplicate Bug Report Detection Using ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 104-109
Visualizing Software Structure UnderstandabilityFull-text access may be available. Sign in or learn about subscription options.pp. 110-119
Requirements Prioritization and Next-Release Problem under Non-additive Value ConditionsFull-text access may be available. Sign in or learn about subscription options.pp. 120-123
Feature Usage as a Value Indicator for Decision MakingFull-text access may be available. Sign in or learn about subscription options.pp. 124-131
A New Technique for Counteracting Web Browser ExploitsFull-text access may be available. Sign in or learn about subscription options.pp. 132-141
A Comprehensive Pattern-Driven Security Methodology for Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 142-151
SecDSVL: A Domain-Specific Visual Language to Support Enterprise Security ModellingFull-text access may be available. Sign in or learn about subscription options.pp. 152-161
The Role of Boundary Objects in the Fuzzy Front End of IT DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 162-169
Impact of Product Complexity on Actual Effort in Software Developments: An Empirical InvestigationFull-text access may be available. Sign in or learn about subscription options.pp. 170-179
A Preliminary Survey of Factors Affecting Software TestersFull-text access may be available. Sign in or learn about subscription options.pp. 180-189
Fail-Safe Testing of Safety-Critical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 190-199
Fail-Safe Testing of Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 200-209
Automated Mutation-Based Test Case Evaluation for Semantic Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 210-219
Inconsistency Management between Architectural Decisions and Designs Using Constraints and Model FixesFull-text access may be available. Sign in or learn about subscription options.pp. 230-239
Author indexFreely available from IEEE.pp. 240-240
[Publisher's information]Freely available from IEEE.pp. 242-242
Showing 42 out of 42