default search action
Journal of Systems and Software (JSS), Volume 61
Volume 61, Number 1, 1 March 2002
- Kam-yiu Lam, Tei-Wei Kuo, Tony S. H. Lee:
Strategies for resolving inter-class data conflicts in mixed real-time database systems. 1-14 - Quazi N. Ahmed, Susan V. Vrbsky:
Maintaining security and timeliness in real-time database system. 15-29 - Leigh A. Davis, Rose F. Gamble, Jamie Payton:
The impact of component architectures on interoperability. 31-45 - Nico H. Lassing, PerOlof Bengtsson, Hans van Vliet, Jan Bosch:
Experiences with ALMA: Architecture-Level Modifiability Analysis. 47-57 - Bonnie Brinton Anderson, Akhilesh Bajaj, Wilpen Gorr:
An estimation of the decision models of senior IS managers when evaluating the external quality of organizational software. 59-75
Volume 61, Number 2, 15 March 2002
- Yaxin Bi, M. Elizabeth C. Hull, Peter N. Nicholl:
An XML approach for legacy code reuse. 77-89 - Sangwon Park, Hyoung-Joo Kim:
SigDAQ: an enhanced XML query optimization technique. 91-103 - Jilles van Gurp, Jan Bosch:
Design erosion: problems and causes. 105-119 - Kiejin Park, Sungsoo Kim:
Availability analysis and improvement of Active/Standby cluster systems using software rejuvenation. 121-128 - Deng-Jyi Chen, Wu-Chi Chen, Krishna M. Kavi:
Visual requirement representation. 129-143 - Hong Zhu, Lingzi Jin, Dan Diaper, Ganghong Bai:
Software requirements validation via task analysis. 145-169
Volume 61, Number 3, 1 April 2002
- Hossein Saiedian:
Best practices in software engineering. 171-172 - Marek Leszak, Dewayne E. Perry, Dieter Stoll:
Classification and evaluation of defects in a project retrospective. 173-187 - Maurizio Morisio, Carolyn B. Seaman, Victor R. Basili, Amy T. Parra, Steve E. Kraft, Steven E. Condon:
COTS-based software development: Processes and open issues. 189-199 - Ivica Crnkovic, Magnus Larsson:
Challenges of component-based development. 201-212 - Carol S. Smidts, Xin Huang, James C. Widmaier:
Producing reliable software: an experiment. 213-224 - Rayford B. Vaughn, Ronda R. Henning, Kevin L. Fox:
An empirical study of industrial security-engineering practices. 225-232 - David Andrews, Paul Austin, Peter Costello, David O. LeVan:
Interprocess communications in the AN/BSY-2 distributed computer system: a case study. 233-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.