Proceedings. Conference on Software Maintenance, 1988.

24-27 Oct. 1988

Filter Results

Displaying Results 1 - 25 of 60
  • Proceedings of the Conference on Software Maintenance - 1988 (IEEE Cat. No.88CH2615-3)

    Publication Year: 1988
    Request permission for commercial reuse | |PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • CAMOTE-computer aided module testing and design environment

    Publication Year: 1988, Page(s):404 - 408
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (344 KB)

    A description is given of the software testing and developing environment CAMOTE, which supports module design and testing. The emphasis is on the unit testing. The design and test processes are automatically recorded and stored in DATHD (the design and test history database). From this database different diagrams (failure intensity, CPU time spent on testing, etc.) and parameters (McCabe metrics,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying instructional systems development to software maintenance education

    Publication Year: 1988, Page(s):396 - 401
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (532 KB)

    Instructional systems development (ISD) has proved to be effective for developing software maintenance education courses. The process of ISD involves the establishment of specific performance objectives which are addressed through classroom instruction and laboratory experience. Students graduate when they are able to pass stringent tests against the established objectives. ISD incorporates the fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining FORTRAN software by enforcing abstract data types

    Publication Year: 1988, Page(s):286 - 291
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (492 KB)

    The principles of data abstraction facilitate maintenance and enhance software reliability. However, FORTRAN includes features that undermine data abstraction. A FORTRAN preprocessor called FAD enforces data abstraction when reusing FORTRAN-callable subprograms. Using FAD, reusable software is organized as the implementation of abstract data types (ADTs). FAD users access the reusable software by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software maintenance: a profile of past empirical research

    Publication Year: 1988, Page(s):236 - 240
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB)

    The authors examine empirical software maintenance research reported from 1978 through 1987 and categorize the research according to placement, origin, and nature of research to determine what has been done in the past. A model of software maintenance is presented and used to derive classification characteristics. To aid in the investigation, an exhaustive electronic keyword search was made of abs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ada and software maintenance

    Publication Year: 1988, Page(s):152 - 158
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (636 KB)

    The author presents a brief historical background on the development of Ada and the APSE (Ada Programming Support Environment) concept and then focuses on the management activities of software development which will have an impact on software maintenance. She examines the technical development activities affecting maintenance. She discusses how Ada's contributions in the development process can af... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An audiovisual document for software maintenance

    Publication Year: 1988, Page(s):390 - 395
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (456 KB)

    Three criteria are used to determine the form and content of a proposed audiovisual document containing videotaped walkthroughs: (1) walkthroughs should be structural behavioral; (2) the maintenance programmer should be able to relate new knowledge to existing knowledge; and (3) the walkthroughs should allow the maintenance programmer to learn by example. The audiovisual document is developed by c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical software maintenance environment

    Publication Year: 1988, Page(s):45 - 51
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB)

    A research project is described, the objective of which is the development of a practical software maintenance environment. The existing functional capabilities of the environment are described as well as research currently in progress. The ripple effect is identified and the application of the analyzer discussed. A brief description is given of current research, including semantic database integr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Risk Assessment Methodology for Software Supportability (RAMSS)

    Publication Year: 1988
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (52 KB)

    Concerns the Risk Assessment Methodology for Software Supportability (RAMSS), the overall approach being tested for use by the US Air Force Operational Test and Evaluation Center. Although the RAMSS is not a mature methodology, elements of the methodology have been used since 1979. The derived baseline database of maintenance actions across 80 systems and more than 300 block releases is being furt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An advanced configuration management tool set

    Publication Year: 1988, Page(s):229 - 234
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (444 KB)

    A description is given of the US Federal Aviation Administration's Advanced Automation System (AAS), a phased-implementation, multilayer program aimed at modernizing and extending air-traffic-control automation. The authors present the design of an integrated tool set and associated unified database which address the needs of this project. They discuss their solutions to the prominent AAS configur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software development and configuration management in the Cronus distributed operating system

    Publication Year: 1988, Page(s):143 - 147
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (464 KB)

    A description is given of the authors experience with software development and configuration management during the development and use of the Cronus distributed operating system. Cronus establishes a computing environment in which it is possible to perform software development for a heterogeneous set of computers, issue periodic software upgrades for each supported type of computer, and provide su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using program decomposition to guide modifications

    Publication Year: 1988, Page(s):265 - 269
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (340 KB)

    The authors use data-flow techniques to form a notion of direct sum decomposition for programs. The decomposition yields a method and guidelines for software maintainers to use so that changes can be assured to be completely contained in the modules under consideration and that there are no undetected linkages between the modified and unmodified code. Thus, the impact of small changes can be gauge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model based on software quality factors which predicts maintainability

    Publication Year: 1988, Page(s):382 - 387
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (552 KB)

    Software quality metric were developed to measure the complexity of software systems. The authors relate the complexity of the system as measured by software metrics to the amount of maintenance necessary to that system. The authors have developed a model which uses several software quality metrics as parameters to predict maintenance activity. A description is given of three classifications of me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated software maintenance environment: bridging configuration management and quality management

    Publication Year: 1988, Page(s):40 - 44
    Cited by:  Papers (2)  |  Patents (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (404 KB)

    The authors explain an integrated support environment for software maintenance. The essential feature is bridging configuration management and quality management. The environment has been successfully applied to the development and maintenance of a family of switching systems for several years View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The introspection technique in maintenance metaprogramming

    Publication Year: 1988, Page(s):298 - 301
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (280 KB)

    Deals with a specific metaprogramming technique which is useful in the maintenance of data-driven software. Data-driven software includes programs whose algorithms are controlled by tables of data, such as table-driven parsers. A maintenance metaprogram for such software must have the ability to inspect and process both the program source code as well as the data tables developed by the software a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Production process modeling of software maintenance productivity

    Publication Year: 1988
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (80 KB)

    Reports on efforts to develop and estimate a preliminary model of the software production process using pilot data from 65 software maintenance projects recently completed by a large regional bank's data processing department. The goals are to measure factors that affect software maintenance productivity, to integrate the quality and productivity dimensions of software measurements, and to examine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PAT: a knowledge-based program analysis tool

    Publication Year: 1988, Page(s):312 - 318
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (484 KB)

    The authors address the use of knowledge-based techniques in providing high-level support for program understanding and debugging activities. An intelligent program analysis/debugging tool, called PAT, is described which is expected to provide human-expert-level assistance to programmers in general program understanding and debugging tasks. PAT is characterized by its use of a knowledge base of co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CLEMMA: the design of a practical configuration librarian

    Publication Year: 1988, Page(s):222 - 228
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (504 KB)

    A configuration management system organizes large software systems and helps maintain those systems over a long lifetime. The problems that arise in the design of such a tool include the manipulation and accurate representation of system configurations, versions and derivation histories. Access control, the large quantities of data, and the evolutionary nature of software development all help to c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Ada software for maintainability

    Publication Year: 1988, Page(s):214 - 215
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (96 KB)

    A panel discussion is presented on some of the design methods that can be used to support Ada software maintainability. It is noted that design documentation often does not accurately reflect the code, and those most familiar with the code's structure may not be available for consultation. The challenge is to overcome these common constraints with a combination of well-designed software, project d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CRUISE: using interface hierarchies to support software evolution

    Publication Year: 1988, Page(s):132 - 142
    Cited by:  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (580 KB)

    To facilitate the maintenance activity, the author proposes a representation scheme for the structural evolution of software that is based on a notion of hierarchies of interfaces. Such a notion enforces a distinction between design artifacts and implementation artifacts and allows a linkage to be maintained between the two. As the software system evolves, interface alterations can be analyzed to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rule-based approach to the construction and evolution of business information systems

    Publication Year: 1988, Page(s):258 - 264
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (636 KB)

    The authors demonstrate an approach to software development known as RUBRIC, which recognizes that a particular class of system, namely, business information systems, contain a large element of information processing which is dictated by business needs and that these needs will inevitably change. Consequently, RUBRIC separates data from procedure and business policy from operational procedure, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using configured directories to solve software maintenance problems

    Publication Year: 1988, Page(s):172 - 177
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (500 KB)

    Most software systems are maintained in a controlled baseline environment, and changes to it are typically made outside of the baseline (usually in the individual's workspace), then tested, verified and resubmitted into the baseline. This mode of operation has a set of problems associated with it. An explanation is presented of how the authors' configuration management system provides a general so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Documentation in a software maintenance environment

    Publication Year: 1988, Page(s):66 - 73
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (496 KB)

    An approach has been defined, and a system developed, to aid the maintenance programmer by producing documentation from source code input. A system called the Parser/Documenter has been developed which is designed to accept source code from a variety of third-generation languages and outputs one of several documentation tools. The authors discuss current documentation methodologies, the developmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metric of modifiability for software maintenance

    Publication Year: 1988, Page(s):374 - 381
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (716 KB)

    A model for measuring software modifiability is presented. In this model, the key to the modifiability of a program module is attributed to its localization property, which can be interpreted as indicating whether changes made to the module would have only a localized effect or not. The localization property of a module can be further broken down into intramodular localization and intermodular loc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rules to govern change in JSP-based systems

    Publication Year: 1988, Page(s):34 - 39
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (452 KB)

    The Jackson structured program (JSP) methodology as widely practiced does not directly address problems of software maintenance, but rather implies restrictions on modifications of finished program designs. An investigation is made which defines limits of permissible changes to data structures and process structures, and these changes are incorporated into rules that will govern and therefore cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.