By Topic

Computer Software and Applications Conference, 1988. COMPSAC 88. Proceedings., Twelfth International

Date 5-7 Oct. 1988

Filter Results

Displaying Results 1 - 25 of 88
  • Proceedings COMPSAC 88: The Twelfth International Computer Software and Applications Conference (Cat. No.88CH2611-2)

    Publication Year: 1988
    Request permission for commercial reuse | PDF file iconPDF (604 KB)
    Freely Available from IEEE
  • The software process model

    Publication Year: 1988, Page(s):3 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB)

    The authors define a software process model (SPM). The SPM is a model of evolution of the full set of documents produced in a software project. It is a general model for software development using any development approach, providing a framework for measuring, analyzing, and understanding the software development process. The authors use the model to characterize formally research in software measu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study in cleanroom software engineering: the IBM COBOL Structuring Facility

    Publication Year: 1988, Page(s):10 - 17
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (582 KB)

    The IBM COBOL Structuring Facility program product was developed using cleanroom software engineering technology in a pipeline of increments with very high quality and productivity. In the cleanroom approach, programs are developed under statistical quality control and mathematical verification is used in place of unit debugging. The formal methods of specification, design, functional verification... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental analysis of SIMD recursive digital filtering on the PASM system prototype

    Publication Year: 1988, Page(s):26 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB)

    Experimental analyses of an implementation of an SIMD algorithm for recursive digital filtering using the partitionable SIMD/MIMD (PASM) parallel processing system prototype at Purdue University are presented. The algorithm used easily generalizes to use N processing elements (PEs). Timing-based analyses are made based on a four-PE version by examining the following constituent execution times: mi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rule-based compactor for VLSI/CAD mask layout

    Publication Year: 1988, Page(s):35 - 42
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    A rule-based system, to be used in place of the conventional approaches using algorithms, is proposed to explore the feasibility of using expert system technology to automate the compaction process by reasoning about the layout design using the sophisticated expert rules contained in its knowledge base. It has been demonstrated that, given a process-independent mask layout, the design rules, user ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • STATEMATE and cruise control: a case study

    Publication Year: 1988, Page(s):49 - 56
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    The STATEMATE system uses a state transition formalism embodied in activity and control charts and supported by simulation, analysis, and documentation tools. The authors describe its application to an automobile cruise control system, emphasizing the methodology lessons of the case study. It is concluded that the strength of the STATEMATE approach lies in the emergence of a set of methods that ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of software reliability measurement to instruments and calculators

    Publication Year: 1988, Page(s):58 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    Software reliability growth models have been applied to several projects at two divisions of the Hewlett-Packard Corporation. The primary model used is the basic execution time model described by J.D. Musa et al. (1987). The model has been used to: predict software quality assurance duration prior to the beginning of testing; provide updated estimates of product reliability and projected release d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editing model based on the object-oriented approach

    Publication Year: 1988, Page(s):67 - 74
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB)

    The authors propose a fundamental framework for the editing facility applicable to uniform manipulation for various kinds of data. The basic principle is to separate the object scheme and the data instance from the editing data extractively. This separation method makes it possible to specify various kinds of data under explicitly structured forms and then manipulate them with the uniform access p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Another approach to system decomposition: requirements clustering

    Publication Year: 1988, Page(s):75 - 82
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    Requirements clustering provides a new approach to system decomposition. It makes it possible to subdivide a large system into user-recognizable components where each component can be used, almost independently, to satisfy part of the user's needs. The underlying concept of requirements clustering is presented. A requirements-clustering algorithm, which is based on the concept of scenario-based pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to software requirement specification

    Publication Year: 1988, Page(s):83 - 88
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB)

    An approach to software requirement specification using a structured bipartite inheritance network is presented. A bipartite inheritance network is a network with two different kinds of basic nodes, data entity and action, which are independent of each other and structured into an inheritance hierarchy. A structured bipartite inheritance network has a substructure, which is used primarily to decom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A technique to derive the detailed time costs of parallel computations

    Publication Year: 1988, Page(s):113 - 119
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB)

    A technique for deriving the time cost of parallel computations is presented. The technique is based on reducing the given parallel computation into a sequential one and then applying one of the available techniques developed for sequential computations to derive the required time cost. The reduction process is done by replacing each parallel structure in the given computation with a single operat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing software for maintenance and performance

    Publication Year: 1988, Page(s):135 - 140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB)

    An approach to addressing the performance issues in the early stages of the design of a software system is presented. The module decomposition of the trouble-analysis subsystem is considered as an example in using this approach. Each module is characterized by its hidden information, external behaviour, and a set of performance parameters. A working system is built using these modules, and it is f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comprehensive and aggressive quality assurance program as a foundation for improving software productivity

    Publication Year: 1988, Page(s):147 - 154
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (649 KB)

    A quality assurance program was used as the foundation for improving software productivity in a real-world, software development project, i.e. the Packet Processor (Pacor). The project, which was the development of a complex real-time software system, is described in terms of its technical scope, development methodology, and development environment. The quality assurance program is described in de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic technique for developing a software sizing and effort estimation model

    Publication Year: 1988, Page(s):155 - 161
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB)

    The mini-model method for modeling software sizing for a given software development methodology is presented. The model is based on the input and output products of the life-cycle activities and can be used to predict the level of effort required to complete those activities. Issues discussed include productivity metrics and the parametric modification of mini-models. The model is applied to the U... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient method for incremental attribute evaluation by using multi-dependency

    Publication Year: 1988, Page(s):162 - 169
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB)

    As tools for specifying semantics of programming languages, attribute grammars have found wide application in developing various kinds of software tools and environments. Incremental attribute evaluation is the fundamental mechanism of generating incremental programming environments. The authors define the multi-dependency relation among attributes and propose a novel approach to incremental attri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Type management system in the Nexus distributed programming environment

    Publication Year: 1988, Page(s):170 - 177
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    Nexus is an object-oriented distributed operating system for local-area networks of heterogeneous workstations. The authors present the salient features of the Nexus design and its type management system. The Nexus design explicitly provides mechanisms for type inheritance and for simultaneously supporting different versions for a given abstract type in the network. A functional view of the type m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data model supporting system engineering

    Publication Year: 1988, Page(s):178 - 185
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (641 KB)

    The PRODAT is a nonstandard application-oriented database system which allows for the representation of design objects, supports the design process during the whole life-cycle, and permits cooperation between several designers or design tools. The data model of PRODAT is presented, with attention given to the notion of simple and structured objects and the version and configuration management faci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vishnu: an object-oriented database management system supporting software engineering

    Publication Year: 1988, Page(s):186 - 192
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB)

    Vishnu is a distributed object-oriented database designed to support software engineering activities and application execution simultaneously. Its features include active objects, multiple inheritance, dynamic schemes, distribution, a comprehensive language, and persistence control. This design supports software engineering environments using only features inherent in the database and simultaneous... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduler 1-2-3: an interactive schedulability analyzer for real-time systems

    Publication Year: 1988, Page(s):211 - 219
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (743 KB)

    Scheduler 1-2-3 is an interactive analysis tool that can perform schedulability analysis for the development of real-time computing systems. The schedulability analysis can verify whether all hard real-time tasks in a target system will be completed by their deadlines at the system design phase. Scheduler 1-2-3 is a window-based stand-alone tool that can also be used as a synthetic workload genera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding program slices for recursive procedures

    Publication Year: 1988, Page(s):220 - 227
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (605 KB)

    The development of program slicers with respect to programs containing recursive procedures, is investigated. A theoretical foundation is constructed for the computation process. A general recursive scheme is introduced as a basis of discussion. A complete slice is defined for recursive procedures to identify clearly what can be obtained through static analysis. The 'everywhere undefined function'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model for development of customizable applications

    Publication Year: 1988, Page(s):237 - 243
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (725 KB)

    A model is presented that recognizes a multilevel development paradigm with participation of system developers (vendor), application specialists (vendor or customer), and end users (customer). Within this paradigm, the authors utilize several reusability technologies but adapt them to a range of developer skill levels. This model can be used for tools that allow reusability while facilitating cust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local concurrent error detection and correction in data structures using virtual backpointers

    Publication Year: 1988, Page(s):245 - 251
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB)

    A technique that uses the concepts of the checking window and the virtual backpointer is presented. The checking window was used to define the locality in which local concurrent error detection and correction are performed, and also to state specifically the size of that locality. The virtual backpointer was used to construct two new data structures: the virtual double-linked list, which requires ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic test case generation from relational algebra queries

    Publication Year: 1988, Page(s):252 - 258
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB)

    The authors: develop mapping rules from the relational algebra to linear predicates defining relations in the (output) domain; describe how these predicates can be interpreted in the (input) domain using f/sub Q/, a specified query relation; describe a translation from these predicates to sets of systems of linear inequalities; and discuss the use of a set of systems of linear inequalities to gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability-oriented task allocation in redundant distributed systems

    Publication Year: 1988, Page(s):276 - 283
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB)

    Optimal task allocation for redundant, heterogeneous distributed computer systems is examined. It is assumed that the systems under consideration are required for execution of long-term mission applications such as space flights. A formal description of the problem is given and formal, quantitative task allocation models are derived. Both an optimal allocation algorithm and an approximating optima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executable assertion development for the distributed parallel environment

    Publication Year: 1988, Page(s):284 - 291
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (619 KB)

    The use of executable assertions is a powerful tool with which to perform program verification, provide software fault-tolerance, and provide hardware fault-tolerance via the application-oriented paradigm. The authors show that assertions commonly used in the sequential programming environment are inadequate for the distributed parallel environment. In particular, it is shown that even design-base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.