| 2006 | A Calculus for Distributed Firewall Specification and Verification. Liviu Pene, Kamel Adi |
| 2006 | A Decision Procedure for Structured Cryptographic Protocols. François Gagnon, Mohamed Mejri |
| 2006 | A Formal Approach for the Forensic Analysis of Logs. Ali Reza Arasteh, Mourad Debbabi, Assaad Sakha |
| 2006 | A Formal Translation From an Imperative Language With Array to a Declarative Language. Daniel Godbout, Béchir Ktari, Mohamed Mejri |
| 2006 | A Framework for Predicting Person-Effort on Requirements Changes. Bee Bee Chua, June M. Verner, Darren Dalcher |
| 2006 | A Framework to Support Non-fragile Agile Agent-Oriented Software Development. Asif Qumer, Brian Henderson-Sellers |
| 2006 | A New Way of Automatic Design of Software (Simulating Human Intentional Activity). Zenya Koono, Hassan Abolhassani, Hui Chen |
| 2006 | Common Criteria Approach to J2ME CLDC Security Requirements. Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua |
| 2006 | Comparing Approaches in AORE through ISO/IEC 9126. Luciana de Paiva Silva, Elisa Hatsue Moriya Huzita, Tania Fatima Calvi Tait |
| 2006 | Component Interface Documentation: What do we Need and Why do we Need it? David Lorge Parnas |
| 2006 | Enforcing Security Policies on Programs. Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi |
| 2006 | Enhancing and Parallelizing Legacy Software for Medical Imaging - A Case Study. Jürgen Vörding, Maraike Schellmann, Sergei Gorlatch |
| 2006 | FOOD: An Intermediate Model for Automated Refactoring. Nicolas Juillerat, Béat Hirsbrunner |
| 2006 | How to Create the Magic Wand? - Currently Implementable Formulation of the Problem. Victor Malyshkin |
| 2006 | Improving Software Test Processes. Tanja Toroi |
| 2006 | Information Processing and the Recovery of Argument Structure Asymmetries. Anna Maria Di Sciullo |
| 2006 | New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Fifth SoMeT 2006, October 25-27, 2006, Quebec, Canada Hamido Fujita, Mohamed Mejri |
| 2006 | On specifying systems that connect to the physical world. T. S. E. Maibaum |
| 2006 | Software Profiling for Deterministic Replay Debugging of User Code. Satish Narayanasamy, Cristiano Pereira, Brad Calder |
| 2006 | Source Code Verification Tools for Software Security Bugs. Frédéric Michaud, Frédéric Painchaud |
| 2006 | Supporting Program Comprehension for Refactoring Operations with Annotations. Klaus Meffert, Ilka Philippow |
| 2006 | System Development Life-Cycle Support for Service-Oriented Applications. George Feuerlicht |
| 2006 | Theory on Software Diagnosis for Program Code Validation. Fumio Negoro, Hamido Fujita |
| 2006 | Towards Autonomic Computing: Injecting Self-Organizing and Self-Healing Properties into Java Programs. Michael J. Oudshoorn, M. Muztaba Fuad, Debzani Deb |
| 2006 | Towards Developing Adjustable Software: A Case Study with the Lyee Approach. Sergei Gorlatch, Tae Kameda, Hamido Fujita, Michiru Tanaka, Yutaka Funyu, Osamu Arai |
| 2006 | Transforming a Non-Software Company to a Software Company by Exploiting the LYEE Methodology. Rikio Maruta, Noriko Taniguchi |
| 2006 | Unified OTP Cryptosystem with Authentication and Secrecy. Osamu Atsumi, Shogo Hayashida, Rikio Maruta |
| 2006 | Verification of the Lyee requirement. Osamu Arai, Hamido Fujita |
| 2006 | Visualization Techniques for Program Comprehension - A Literature Review. François Lemieux, Martin Salois |