@article{10.1109/MS.2008.18,
author = {Brian Chess, and Konstantin (Kosta) Beznosov, },
title = {Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {10-12},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.18},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.12,
author = {Axel Uhl, },
title = {Model-Driven Development in the Enterprise},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {46-49},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.12},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.4,
author = {Rachel Rue, and Shari Lawrence Pfleeger, },
title = {Cybersecurity Economic Issues: Clearing the Path to Good Practice},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {35-42},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.4},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.27,
author = {Jongmoon Baik, and Kwangsin Han, and Sangsoo Kim, and Rick Kazman, and Hoh Peter In, },
title = {VIRE: Sailing a Blue Ocean with Value-Innovative Requirements},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {80-87},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.27},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.2,
author = {Jeff Patton, },
title = {Ambiguous Business Value Harms Software Products},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {50-51},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.2},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.13,
author = {Grady Booch, },
title = {Morality and the Software Architect},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {8-9},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.13},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.14,
author = {Steven Fraser, and Dennis Mancl, },
title = {No Silver Bullet: Software Engineering Reloaded},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {91-94},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.14},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.3,
author = {J.B. Rainsberger, and Johanna Rothman, },
title = {Are You Done Yet?},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {52-53},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.3},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.15,
author = {Diomidis Spinellis, },
title = {Rational Metaprogramming},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {78-79},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.15},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.19,
author = {Per H?kon Meland, and Inger Anne T?ndel, and Martin Gilje Jaatun, },
title = {Security Requirements for the Rest of Us: A Survey},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {20-27},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.19},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.5,
author = {David Callele, and Kevin Schneider, and Eric Neufeld, },
title = {Emotional Requirements},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {43-45},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.5},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.1,
author = {Balasubramaniam Ramesh, and Lan Cao, },
title = {Agile Requirements Engineering Practices: An Empirical Study},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {60-67},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.1},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.24,
author = {Robert C. Martin, and Grigori Melnik, },
title = {Tests and Requirements, Requirements and Tests: A M?bius Strip},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {54-59},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.24},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.7,
author = {Carolyn Seaman, and Forrest Shull, },
title = {Inspecting the History of Inspections: An Example of Evidence-Based Technology Diffusion},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {88-90},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.7},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.9,
author = {Charlie Lai, },
title = {Java Insecurity: Accounting for Subtleties That Can Compromise Code},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {13-19},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.9},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.20,
author = {Hakan Erdogmus, },
title = {So Many Languages, So Little Time},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {4-6},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.20},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.11,
author = {Rick Mugridge, },
title = {Managing Agile Project Requirements with Storytest-Driven Development},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {68-75},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.11},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.26,
author = {Rebecca J. Wirfs-Brock, },
title = {Valuing Design Repair},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {76-77},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.26},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.25,
author = {Tim Baeten, and Jeffrey A. Ingalsbe, and Nancy R. Mead, and Louis Kunimatsu, },
title = {Threat Modeling: Diving into the Deep End},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {28-34},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.25},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.8,
author = {Robert L. Glass, },
title = {Intuition's Role in Decision Making},
journal = {IEEE Software},
volume = {25},
number = {},
issn = {0740-7459},
year = {2008},
pages = {96, 95},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.8},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@article{10.1109/MS.2008.18,
author = {Konstantin Beznosov, and Brian Chess, },
title = {Security for the Rest of Us: An Industry Perspective on the Secure-Software Challenge},
journal = {IEEE Software},
volume = {25},
number = {1},
issn = {0740-7459},
year = {},
pages = {10-12},
doi = {doi.ieeecomputersociety.org/10.1109/MS.2008.18},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}