Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ASWEC
ASWEC 2014
Generate Citations
2014 23rd Australian Software Engineering Conference (ASWEC)
April 7 2014 to April 10 2014
Milsons Point, NSW, Australia
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-viii
Message from the General Chairs
Freely available from IEEE.
pp. ix-ix
Message from the Research Programme Committee Chairs
Freely available from IEEE.
pp. x-x
Conference Organization
Freely available from IEEE.
pp. xi-xi
Program Committee
Freely available from IEEE.
pp. xii-xii
Steering Committee
Freely available from IEEE.
pp. xiii-xiii
Addtional Reviewers
Freely available from IEEE.
pp. xiv-xiv
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xv-xvii
Evaluating Technical Debt in Cloud-Based Architectures Using Real Options
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Esra Alzaghoul
,
Rami Bahsoon
Supporting Complex Work in Crowdsourcing Platforms: A View from Service-Oriented Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-14
by
Lu Xiao
,
Hye-Young Paik
Design and Implementation of Dynamically Evolving Ensembles with the Helena Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-24
by
Annabelle Klarl
,
Rolf Hennicker
Architecture Conformance Analysis Approach within the Context of Multiple Product Line Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-28
by
Bedir Tekinerdogan
,
Evren Cilden
,
Ozgu Ozkose Erdogan
,
Onur Aktug
Using Constraint Satisfaction and Optimization for Pattern-Based Software Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-37
by
Sriharsha Vathsavayi
,
Outi Sievi-Korte
,
Kai Koskimies
,
Kari Systa
Correctness by Construction with Logic-Labeled Finite-State Machines -- Comparison with Event-B
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-47
by
Vladimir Estivill-Castro
,
Rene Hexel
On the Shape of Circular Dependencies in Java Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-57
by
Hussain A. Al-Mutawa
,
Jens Dietrich
,
Stephen Marsland
,
Catherine McCartin
Architectural Design Decisions in Open Software Development: A Transition to Software Ecosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-61
by
Meiru Che
,
Dewayne E. Perry
Services for Knowledge Sharing in Dynamic Business Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-65
by
Abdussalam Ali
,
Igor Hawryszkiewycz
,
Jinjun Chen
Open Architectures and Software Evolution: The Case of Software Ecosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-69
by
Patrizio Pelliccione
Concentus: Applying Stream Processing to Online Collective Interaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-79
by
Adam Roughton
,
Ian Warren
,
Beryl Plimmer
Fill That Blank! An iOS-based Literacy Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-83
by
Eric Gu
,
Mo-Hong Tzou
,
Rashina Hoda
Analyzing the Learning Process in Online Educational Game Design: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-93
by
Navid Ahmadi
,
Mehdi Jazayeri
From Incident Reports to Improvement Recommendations: Analyzing IT Help Desk Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-103
by
Anneliese Andrews
,
Joseph Lucente
Duplicate Bug Report Detection Using Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-109
by
Raj P. Gopalan
,
Aneesh Krishna
Visualizing Software Structure Understandability
Full-text access may be available. Sign in or learn about subscription options.
pp. 110-119
by
Philippe Dugerdil
,
Mihnea Niculescu
Requirements Prioritization and Next-Release Problem under Non-additive Value Conditions
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-123
by
Ashish Sureka
Feature Usage as a Value Indicator for Decision Making
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-131
by
Sarunas Marciuska
,
Cigdem Gencel
,
Pekka Abrahamsson
A New Technique for Counteracting Web Browser Exploits
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-141
by
Byungho Min
,
Vijay Varadharajan
A Comprehensive Pattern-Driven Security Methodology for Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-151
by
Anton V. Uzunov
,
Eduardo B. Fernandez
,
Katrina Falkner
SecDSVL: A Domain-Specific Visual Language to Support Enterprise Security Modelling
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-161
by
Mohamed Almorsy
,
John Grundy
The Role of Boundary Objects in the Fuzzy Front End of IT Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-169
by
Tom McBride
Impact of Product Complexity on Actual Effort in Software Developments: An Empirical Investigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-179
by
Zheng Li
,
Liam O'Brien
,
Ye Yang
A Preliminary Survey of Factors Affecting Software Testers
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-189
by
Tanjila Kanij
,
Robert Merkel
,
John Grundy
Fail-Safe Testing of Safety-Critical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-199
by
Ahmed Gario
,
A. von Mayrhauser Andrews
Fail-Safe Testing of Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-209
by
Anneliese Andrews
,
Salah Boukhris
,
Salwa Elakeili
Automated Mutation-Based Test Case Evaluation for Semantic Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-219
by
M. Shaban Jokhio
,
Gillian Dobbie
,
Tianming Hu
,
Jing Sun
A Non-invasive Approach to Trace Architecture Design, Requirements Specification and Agile Artifacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-229
by
Pablo Oliveira Antonino
,
Thorsten Keuler
,
Nicolas Germann
,
Brian Cronauer
Inconsistency Management between Architectural Decisions and Designs Using Constraints and Model Fixes
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-239
by
Ioanna Lytra
,
Uwe Zdun
Author index
Freely available from IEEE.
pp. 240-240
[Publisher's information]
Freely available from IEEE.
pp. 242-242
Showing 42 out of 42