World Scientific
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.
International Journal of Software Engineering and Knowledge Engineering cover

Volume 16, Issue 01 (February 2006)

Special Issue: Best Papers from SEKE 2004; Guest Editors: Frank Maurer and Günther Ruhe
No Access
GUEST EDITORS' INTRODUCTION
  • Pages:1–3

https://doi.org/10.1142/S0218194006002732

Special Issue: Best Papers from SEKE 2004; Guest Editors: Frank Maurer and Günther Ruhe
No Access
VISUALIZING THE EVOLUTION OF SOFTWARE USING SOFTCHANGE
  • Pages:5–21

https://doi.org/10.1142/S0218194006002665

Special Issue: Best Papers from SEKE 2004; Guest Editors: Frank Maurer and Günther Ruhe
No Access
UNDERSTANDING THE EVOLUTION AND CO-EVOLUTION OF CLASSES IN OBJECT-ORIENTED SYSTEMS
  • Pages:23–51

https://doi.org/10.1142/S0218194006002707

Special Issue: Best Papers from SEKE 2004; Guest Editors: Frank Maurer and Günther Ruhe
No Access
DETECTING NOISY INSTANCES WITH THE ENSEMBLE FILTER: A STUDY IN SOFTWARE QUALITY ESTIMATION
  • Pages:53–76

https://doi.org/10.1142/S0218194006002677

Special Issue: Best Papers from SEKE 2004; Guest Editors: Frank Maurer and Günther Ruhe
No Access
ANALYSIS OF META-PROGRAMS: AN EXAMPLE
  • Pages:77–101

https://doi.org/10.1142/S0218194006002689

Special Issue: Best Papers from SEKE 2004; Guest Editors: Frank Maurer and Günther Ruhe
No Access
LEVEL-WISE CONSTRUCTION OF DECISION TREES FOR CLASSIFICATION
  • Pages:103–126

https://doi.org/10.1142/S0218194006002690

Regular Papers
No Access
A COMPARISON OF EFFORT ESTIMATION METHODS FOR 4GL PROGRAMS: EXPERIENCES WITH STATISTICS AND DATA MINING
  • Pages:127–140

https://doi.org/10.1142/S0218194006002719

Regular Papers
No Access
AN INTEGRITY CHECKING MECHANISM OF MOBILE AGENTS UNDER A CLOSED ENVIRONMENT WITH TRUSTED HOSTS
  • Pages:141–151

https://doi.org/10.1142/S0218194006002720