| 2005 | 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA David F. Redmiles, Thomas Ellman, Andrea Zisman |
| 2005 | 2nd Workshop on the state of the art in automated software engineering. Andrea Zisman, Thomas Ellman |
| 2005 | 3rd international workshop on traceability in emerging forms of software engineering (TEFSE 2005). Jonathan I. Maletic, Giuliano Antoniol, Jane Cleland-Huang, Jane Huffman Hayes |
| 2005 | A component model for internet-scale applications. Steven P. Reiss |
| 2005 | A component-based development framework for supporting functional and non-functional analysis in control system design. Johan Fredriksson, Massimo Tivoli, Ivica Crnkovic |
| 2005 | A context-sensitive structural heuristic for guided search model checking. Neha Rungta, Eric G. Mercer |
| 2005 | A generic approach to supporting diagram differencing and merging for collaborative design. Akhil Mehra, John C. Grundy, John G. Hosking |
| 2005 | A model transformation approach to automatic model construction and evolution. Yuehua Lin, Jeff Gray |
| 2005 | A parameterized interpreter for modeling different AOP mechanisms. Naoyasu Ubayashi, Genki Moriyama, Hidehiko Masuhara, Tetsuo Tamai |
| 2005 | A rigorous approach for proving model refactorings. Rohit Gheyi, Tiago Massoni, Paulo Borba |
| 2005 | A similarity-aware approach to testing based fault localization. Dan Hao, Ying Pan, Lu Zhang, Wei Zhao, Hong Mei, Jiasu Sun |
| 2005 | A strategy for efficient verification of relational specifications, based on monotonicity analysis. Marcelo F. Frias, Rodolfo Gamarra, Gabriela Steren, Lorena Bourg |
| 2005 | A threat-driven approach to modeling and verifying secure software. Dianxiang Xu, Kendall E. Nygard |
| 2005 | A tool for automatic UML model consistency checking. Jocelyn Simmonds, M. Cecilia Bastarrica |
| 2005 | A unified fitness function calculation rule for flag conditions to improve evolutionary testing. Xiyang Liu, Hehui Liu, Bin Wang, Ping Chen, Xiyao Cai |
| 2005 | A uniform deductive approach for parameterized protocol safety. Jean-François Couchot, Alain Giorgetti, Nikolai Kosmatov |
| 2005 | A visual language and environment for composing web services. Na Liu, John C. Grundy, John G. Hosking |
| 2005 | AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. William G. J. Halfond, Alessandro Orso |
| 2005 | An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software. Mark Hennessy, James F. Power |
| 2005 | Application of design for verification with concurrency controllers to air traffic control software. Aysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp |
| 2005 | Automated generation of testing tools for domain-specific languages. Hui Wu, Jeff Gray |
| 2005 | Automated path generation for software fault localization. Tao Wang, Abhik Roychoudhury |
| 2005 | Automated population of causal models for improved software risk assessment. Peter Stewart Hearty, Norman E. Fenton, Martin Neil, Patrick Cates |
| 2005 | Automated replay and failure detection for web applications. Sara Sprenkle, Emily Gibson, Sreedevi Sampath, Lori L. Pollock |
| 2005 | Automated test generation for engineering applications. Songtao Xia, Ben Di Vito, César A. Muñoz |
| 2005 | Automatic test factoring for java. David Saff, Shay Artzi, Jeff H. Perkins, Michael D. Ernst |
| 2005 | Automatic verification of design patterns in Java. Alex Blewitt, Alan Bundy, Ian Stark |
| 2005 | Automating experimentation on distributed testbeds. Yanyan Wang, Matthew J. Rutherford, Antonio Carzaniga, Alexander L. Wolf |
| 2005 | Automating the performance management of component-based enterprise systems through the use of redundancy. Ada Diaconescu, John Murphy |
| 2005 | Bamboo: an architecture modeling and code generation framework for configuration management systems. Guozheng Ge, E. James Whitehead Jr. |
| 2005 | Blowtorch: a framework for firewall test automation. Daniel Hoffman, Kevin Yoo |
| 2005 | ClassSheets: automatic generation of spreadsheet applications from object-oriented specifications. Gregor Engels, Martin Erwig |
| 2005 | Clearwater: extensible, flexible, modular code generation. Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang Yan, Younggyun Koh, Qinyi Wu, Charles Consel, Akhil Sahai, Koichi Moriyama |
| 2005 | Code security analysis with assertions. Jan Jürjens, Mark Yampolskiy |
| 2005 | Compositional reasoning for port-based distributed systems. Alma L. Juarez Dominguez, Nancy A. Day |
| 2005 | Constraint-based test data generation in the presence of stack-directed pointers. Arnaud Gotlieb, Tristan Denmat, Bernard Botella |
| 2005 | Constructing interaction test suites with greedy algorithms. Renée C. Bryce, Charles J. Colbourn |
| 2005 | Data mining and cross-checking of execution traces: a re-interpretation of Jones, Harrold and Stasko test information. Tristan Denmat, Mireille Ducassé, Olivier Ridoux |
| 2005 | Designing and implementing a family of intrusion detection systems. Richard A. Kemmerer |
| 2005 | Determining the cost-quality trade-off for automated software traceability. Alexander Egyed, Stefan Biffl, Matthias Heindl, Paul Grünbacher |
| 2005 | EA-Miner: a tool for automating aspect-oriented requirements identification. Américo Sampaio, Ruzanna Chitchyan, Paul Rayson |
| 2005 | Efficient temporal-logic query checking for presburger systems. Dezhuang Zhang, Rance Cleaveland |
| 2005 | Empirical evaluation of the tarantula automatic fault-localization technique. James A. Jones, Mary Jean Harrold |
| 2005 | Exploiting predicate structure for efficient reachability detection. Sujatha Kashyap, Vijay K. Garg |
| 2005 | Formal support for merging and negotiation. Shiva Nejati |
| 2005 | Generation of visual editors as eclipse plug-ins. Karsten Ehrig, Claudia Ermel, Stefan Hänsgen, Gabriele Taentzer |
| 2005 | Identifying traits with formal concept analysis. Adrian Lienhard, Stéphane Ducasse, Gabriela Arévalo |
| 2005 | In regression testing selection when source code is not available. Jiang Zheng |
| 2005 | Introduction to doctoral symposium. Steve M. Easterbrook, Sebastián Uchitel |
| 2005 | Lattice-based adaptive random testing. Johannes Mayer |
| 2005 | Learning to verify branching time properties. Abhay Vardhan, Mahesh Viswanathan |
| 2005 | Let's agree to disagree. Shiva Nejati, Marsha Chechik |
| 2005 | Locating faulty code using failure-inducing chops. Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gupta |
| 2005 | Model-based self-monitoring embedded programs with temporal logic specifications. Li Tan |
| 2005 | NFRs-aware architectural evolution of component-based software. Chouki Tibermacine, Régis Fleurquin, Salah Sadou |
| 2005 | On dynamic feature location. Rainer Koschke, Jochen Quante |
| 2005 | Optimized run-time race detection and atomicity checking using partial discovered types. Rahul Agarwal, Amit Sasturkar, Liqiang Wang, Scott D. Stoller |
| 2005 | Precise identification of composition relationships for UML class diagrams. Ana L. Milanova |
| 2005 | Process support to help novices design software faster and better. Aaron G. Cass, Leon J. Osterweil |
| 2005 | Properties and scopes in web model checking. May Haydar, Sergiy Boroday, Alexandre Petrenko, Houari A. Sahraoui |
| 2005 | Prufrock: a framework for constructing polytypic theorem provers. Justin Ward, Garrin Kimmell, Perry Alexander |
| 2005 | QoS-aware dynamic service composition in ambient intelligence environments. Sonia Ben Mokhtar, Jinshan Liu, Nikolaos Georgantas, Valérie Issarny |
| 2005 | Quasi-random testing. Tsong Yueh Chen, Robert G. Merkel |
| 2005 | Reasoning about real-time statecharts in the presence of semantic variations. Subash Shankar, Sinan Asa, Vladimir Sipos, Xiaowei Xu |
| 2005 | Secure sharing between untrusted users in a transparent source/binary deployment model. Eelco Dolstra |
| 2005 | Simon: modeling and analysis of design space structures. Yuanfang Cai, Kevin J. Sullivan |
| 2005 | Software certificate management (SoftCeMent'05). Ewen Denney, Bernd Fischer, Dieter Hutter, Mark Jones |
| 2005 | Software security assurance tools, techniques and metrics (SSATTM). Paul E. Black, Michael Kass |
| 2005 | Specialization and extrapolation of software cost models. Tim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn |
| 2005 | Specification and automated processing of security requirements (SAPS'05). Carsten Rudolph, Antonio Mana |
| 2005 | Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. Paola Inverardi, Leonardo Mostarda, Massimo Tivoli, Marco Autili |
| 2005 | Test input generation for red-black trees using abstraction. Willem Visser, Corina S. Pasareanu, Radek Pelánek |
| 2005 | Testing in resource constrained execution environments. Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Mossé |
| 2005 | The PLUSS toolkit - extending telelogic DOORS and IBM-rational rose to support product line use case modeling. Magnus Eriksson, Henrik Morast, Jürgen Börstler, Kjell Borg |
| 2005 | The power of software. Alfonso Fuggetta |
| 2005 | Timna: a framework for automatically combining aspect mining analyses. David C. Shepherd, Jeffrey Palm, Lori L. Pollock, Mark Chu-Carroll |
| 2005 | UMLDiff: an algorithm for object-oriented design differencing. Zhenchang Xing, Eleni Stroulia |
| 2005 | Using communicative acts in high-level specifications of user interfaces for their automated synthesis. Jürgen Falb, Roman Popp, Thomas Röck, Helmut Jelinek, Edin Arnautovic, Hermann Kaindl |
| 2005 | Verifying the correctness of hume programs: an approach combining deductive and algorithmic reasoning. Gudmund Grov |
| 2005 | Virtual humans: lessons learned in integrating a large-scale AI project. William R. Swartout |
| 2005 | Visualization-based analysis of quality for large-scale software systems. Guillaume Langelier, Houari A. Sahraoui, Pierre Poulin |
| 2005 | yagg: an easy-to-use generator for structured test inputs. David Coppit, Jiexin Lian |