[1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume II: Software Track

3-6 Jan. 1989

Filter Results

Displaying Results 1 - 25 of 122
  • Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Vol.II: Software Track (IEEE Cat. No.89TH0243-6)

    Publication Year: 1989
    Request permission for commercial reuse | |PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Software quality drivers and indicators

    Publication Year: 1989, Page(s):210 - 218 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (653 KB)

    The predictive part of a constructive quality model called COQUAMO is being developed using the concept of quality drivers to provide information on the development project. The monitoring part of COQUAMO aims at detecting detrimental deviations from plans through quality indicators applied to the ongoing project. The authors describe theoretical investigations of quality drivers and indicators as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The architecture of Ra: a kernel for Clouds

    Publication Year: 1989, Page(s):936 - 945 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (872 KB)

    Ra is a native, minimal kernel for the Clouds distributed operating system. Ra is a successor to the prototype Clouds kernel and reflects lessons learned from the earlier implementation effort. Ra supports the same object-thread model as the original Clouds kernel as a special case and introduces extensibility as a major goal. Ra provides three primitives, namely segments, virtual spaces, and ligh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correctness verification of concurrent systems

    Publication Year: 1989, Page(s):295 - 304 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (728 KB)

    Formal tools and computer support for correctness verification are proposed. An algebraic process description of the correctness facilitates formal tools aiding correctness proving. Two methods of correctness verification are presented: static verification, corresponding to the verification notion in system programming which is informally described by the software standard; and dynamic correction,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the verification of time-dependent protocols using timed reachability analysis

    Publication Year: 1989, Page(s):285 - 294 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB)

    An automated approach to verifying general properties of time-dependent protocols, using a formal model called time transmission grammar plus (TTG+), is introduced. The novel part of the approach is to represent the global state of the model as a pair of state and timing constraint matrices. Timed reachability analysis based on such a representation is then developed to verify various p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Mothra tool set (software testing)

    Publication Year: 1989, Page(s):275 - 284 vol.2
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (916 KB)

    Mothra is a software test environment that supports mutation-based testing of software systems. Mutation analysis is a powerful software testing technique that evaluates the adequacy of test data based on its ability to differentiate between the program under test and its mutants, where mutants are constructed by inserting single, simple errors into the program under test. This evaluation process ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A uniform mechanism to support long fields and nested relations in database management systems

    Publication Year: 1989, Page(s):569 - 577 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (608 KB)

    Two seemingly distinct features of next-generation database management systems (DBMSs): long fields and nested relations. A long field contains an uninterpreted sequence of bytes of potentially enormous length. A nested relation is a relation that has relation-valued attributes; the nesting of relations can be arbitrarily deep. By elevating the semantics of long fields from a sequence of bytes to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PSACOIN level 0 intercomparison-an international verification exercise on a hypothetical safety assessment case study

    Publication Year: 1989, Page(s):267 - 274 vol.2
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (524 KB)

    A comparison of probabilistic system assessment (PSA) codes relevant to radioactive waste disposal is reported. This level-0 intercomparison was the first of a series of planned code verification exercises and was based on a simple model describing a hypothetical disposal system. PSA codes deal with uncertainty and variability in input parameters using a Monte Carlo approach, so that the analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of technology advocate and transfer mechanism on Ada adoption

    Publication Year: 1989, Page(s):1075 - 1080 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (432 KB)

    Examines the association of various technology transfer mechanisms and technology advocates with the adoption of Ada. Preliminary analysis of data from structured interviews with 48 software developers in the defense sector supports the notion that organizations and change agents may wish to tailor transition mechanisms and choice of primary advocate to the specific stage of the adoption process, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A layered approach to very large system specification

    Publication Year: 1989, Page(s):988 - 995 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (776 KB)

    Many information system endeavors fail (in terms of cost overruns, late delivery, or absolute inability to meet real needs). This is primarily still a matter of lack of effective communication by the various participants. Some possible improvements are discussed. They include: (1) adoption of engineering practice over all concepts, such as performance and safety, in the early stages of the definit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Consistency issues in real-time database systems

    Publication Year: 1989, Page(s):654 - 661 vol.2
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (592 KB)

    A consistency model is presented of real-time database systems that distinguishes the external data consistency from the internal data consistency as maintained by traditional systems, to provide a transaction schedule to meet deadlines. External consistency requires that the data used by a transaction reflect the current physical environment; this is in contrast to internal consistency, which pre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented databases for construction data

    Publication Year: 1989, Page(s):559 - 568 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB)

    Database management system can support the various aspects of the construction process. Study of the requirements for such a database system has led the authors to the conclusion that the most appropriate abstract data model for construction data is that of object-oriented data. To study the appropriateness of this model, they have developed the specific example of a simple building with component... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Insertion of fault detection mechanisms in distributed Ada software systems

    Publication Year: 1989, Page(s):260 - 266 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (492 KB)

    A technique for automatically inserting software mechanisms to detect single event upset (SEU) in distributed Ada systems is presented. SEUs may cause information corruption, leading to a change in program flow or causing a program to execute an infinite loop. Two cooperative software mechanisms for detecting the presence of these upsets are described. Automatic insertion of these mechanisms is di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An experimental study investigating models for N-version programming

    Publication Year: 1989, Page(s):1049 - 1054 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (540 KB)

    N-version programming uses different programs, all written to the same specification, running in parallel; a majority vote on the respective outputs is taken as the correct answer. In an earlier experiment, failure counting and voting procedures for an iterative applications problem were developed. An experimental 3-version failure probability for a pool of program versions was obtained t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conceptual views of data structures as a model of output in programming languages

    Publication Year: 1989, Page(s):1064 - 1074 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (840 KB)

    Current programming languages provide sophisticated facilities for the structuring and manipulation of data within a program. Its high-level constructs, however, stop short of being able to communicate the value and structure of data to external display devices. If a programmer wishes to print out a binary tree, or maintain a display of an editor line database, complicated hand coding is necessary... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lisp extensions for multiprocessing

    Publication Year: 1989, Page(s):761 - 770 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (712 KB)

    Extensions to Common Lisp for concurrent computation on multiprocessors are discussed. Functions for process creation, communication, and synchronization are described. Process objects create multiple threads of control. Processes are lightweight so that programmers can use them to take advantage of fine-grained parallelism. Communication and synchronization are managed with mailboxes. Signals all... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Yet another software quality and productivity modeling-YAQUAPMO

    Publication Year: 1989, Page(s):978 - 987 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (704 KB)

    A modeling technique is proposed that uses weight functions to define factors of quality or productivity in terms of evaluation factors. As a result, an acyclic decomposition graph is obtained. Quality or productivity is then defined as the distance between the actual graph and a required graph. An assessment technique is proposed that permits decompositions of any reasonable depth. It is shown ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maintaining a well-structured software system

    Publication Year: 1989, Page(s):540 - 547 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (620 KB)

    It has been theorized that if a software system is developed using a rigorous methodology and is well documented and well structured, the resulting system will be more easily maintained. The author describes experiences with a large, real-time software system that successfully uses structured techniques, including an iterative life cycle during maintenance. The following advantages are found: (1) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query optimization in object-oriented databases

    Publication Year: 1989, Page(s):19 - 25 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (568 KB)

    The use of data abstraction in object-oriented databases places a burden on the ability of the system to perform query optimization. A framework for query specification and optimization is discussed that is applicable to object-oriented database systems that take a strict view of data abstraction. Techniques that preserve much of the optimization potential of relational languages by limiting the q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A concept for distributed control systems

    Publication Year: 1989, Page(s):667 - 672 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (544 KB)

    HEROS (hierarchically extendible real-time operating system), which was developed and implemented for the control and supervision of robots, is described. It allows the dynamic creation of processes and their management. The processes in HEROS have no knowledge of their mutual existence and possess no global kernel routines or variables. The interprocess communication and synchronization is accomp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-standard DBMS for support of emerging applications-requirement analysis and architectural concepts

    Publication Year: 1989, Page(s):549 - 558 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (924 KB)

    The author has analyzed the data management needs of a spectrum of applications, mainly in engineering, and has encountered both a modeling and a processing problem in today's database management systems (DBMSs). The author then attempts to explain which data model concepts and architectural decisions are necessary and why they can succeed in providing the anticipated data management support. Alth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An abstract axiomatization of pointer types

    Publication Year: 1989, Page(s):252 - 259 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (600 KB)

    Pointer (`reference' or `access') types are extremely useful in programming, but are usually considered rather intractable in the context of formal verification. The author deals with this problem using the concept of collections and access types. He gives two examples of how this can be done. One approach, using the axiomatic method of J.V. Guttag and V. Horning (1978), is too specific, resulting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A task migration algorithm for load balancing in a distributed system

    Publication Year: 1989, Page(s):1041 - 1048 vol.2
    Cited by:  Papers (5)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (496 KB)

    Task migration from heavily loaded processors to lightly loaded or idle processors is one way to balance the load across all processors and thus reduce average response time. A description is given of a dynamic task migration protocol based on proposed set strategies which is used to minimize the communication cost and reduce the processing overhead at each processor. The decision to migrate is ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design rationale and maintainability

    Publication Year: 1989, Page(s):533 - 539 vol.2
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1104 KB)

    Design decisions and assumptions that occur within and during the process of system design are not generally documented. The deliberation and much of the domain learning that went into resolving key design issues is thus wasted, increasing overall system costs. This cost is most apparent during maintenance, when a significant portion of engineer's time is spent trying to recover the lost rationale... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Qlisp: parallel processing in Lisp

    Publication Year: 1989, Page(s):751 - 760 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (756 KB)

    One of the major problems in converting serial programs to take advantage of parallel processing has been the lack of a multiprocessing language that is both powerful and understandable to programmers. The authors describe multiprocessing extensions to Common Lisp designed to be suitable for studying styles of parallel programming at the medium-grain level in a shared-memory architecture. The resu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.