[1989] Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Volume II: Software Track

3-6 Jan. 1989

Filter Results

Displaying Results 1 - 25 of 122
  • Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences. Vol.II: Software Track (IEEE Cat. No.89TH0243-6)

    Publication Year: 1989
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Software quality drivers and indicators

    Publication Year: 1989, Page(s):210 - 218 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB)

    The predictive part of a constructive quality model called COQUAMO is being developed using the concept of quality drivers to provide information on the development project. The monitoring part of COQUAMO aims at detecting detrimental deviations from plans through quality indicators applied to the ongoing project. The authors describe theoretical investigations of quality drivers and indicators as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The architecture of Ra: a kernel for Clouds

    Publication Year: 1989, Page(s):936 - 945 vol.2
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    Ra is a native, minimal kernel for the Clouds distributed operating system. Ra is a successor to the prototype Clouds kernel and reflects lessons learned from the earlier implementation effort. Ra supports the same object-thread model as the original Clouds kernel as a special case and introduces extensibility as a major goal. Ra provides three primitives, namely segments, virtual spaces, and ligh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lispflows: specification of a model for functional programs

    Publication Year: 1989, Page(s):105 - 114 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    The authors define and provide example uses of a dataflow model of functional language programs. This model, called a lispflow, represents functional programs in much the same way flowgraphs model imperative programs. The lispflow model provides insight into the fundamental structure of functional language programs. Thus it can be used to define software tools and software measures for functional ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperative framework for software engineering

    Publication Year: 1989, Page(s):189 - 199 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (916 KB)

    A formal framework for understanding the software development process is proposed, and software development as cooperative work is considered. The requirements for a framework are reviewed and set in the context of an established development paradigm. An underlying model of cooperative based on dialog is motivated and outlined. A formal scheme for expressing this model is introduced, and the basis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software measurement and analysis: a case study in collaborative research

    Publication Year: 1989, Page(s):95 - 104 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    The Alvey Programme, sponsored by the UK government in 1983, encouraged academic and industrial institutions to work together to develop leading-edge research. One of the four major themes of the program was software engineering, which was further subdivided into (a) formal methods, (b) reliability and metrics, and (c) IPSEs (Integrated Project Support Environments). The author discusses one Alvey... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software process modeling: a case study

    Publication Year: 1989, Page(s):175 - 188 vol.2
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1168 KB)

    Experiences in applying a specific modeling approach and technology to a portion of a software support process used by the US Air Force are related. The modeling approach is discussed in the context of examples drawn from the model developed. A view of the primary objectives of software process modeling, which formed the basis of the approach used, is set forth. The usefulness of the model is eval... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An abstract axiomatization of pointer types

    Publication Year: 1989, Page(s):252 - 259 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Pointer (`reference' or `access') types are extremely useful in programming, but are usually considered rather intractable in the context of formal verification. The author deals with this problem using the concept of collections and access types. He gives two examples of how this can be done. One approach, using the axiomatic method of J.V. Guttag and V. Horning (1978), is too specific, resulting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A semantically oriented program synthesis system

    Publication Year: 1989, Page(s):85 - 94 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (704 KB)

    An overview is given of SEED, an automatic program development system that transforms specifications into code using program development methodologies. It is shown that top-down, stepwise program development techniques, originally intended for use by humans, are amenable to automation. When using the Dijkstra/Gries methodology, users refine the predicate logic-based specification of a problem, acc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-paradigm parallel programming

    Publication Year: 1989, Page(s):716 - 725 vol.2
    Cited by:  Papers (3)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    A method is described for designing secure and highly efficient parallel programs that can be written simply and straightforwardly for a wide range of applications. The method is based on the Occam programming language and a set of paradigms, or program structures, which can be used individually or in combination. The concurrent behavior of the paradigms is readily understood, and the effective pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software process and product specifications: a basis for generating customized SE information bases

    Publication Year: 1989, Page(s):165 - 174 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    General requirements for software process specification languages are discussed. A first prototype software process specification language is presented, its application is demonstrated, and software-engineering-related requirements for a supporting information base are derived. Efforts aimed at implementing the information-base requirements are briefly mentioned. This work is part of the Meta Info... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating customized software engineering information bases from software process and product specifications

    Publication Year: 1989, Page(s):587 - 595 vol.2
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    The authors describe research carried out to: (i) develop a software process and product specification language that allows all the information necessary to understand, control, and improve any given software engineering process; (ii) develop a meta-information-base schema that automatically generates an information-base structure given a software process and product specification; and (iii) devel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal approach to development of critical computer applications

    Publication Year: 1989, Page(s):243 - 251 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    A formal approach to development of safety-related systems is presented. Three levels of system representation are treated within the common framework of temporal logic. The highest level is conceptual modeling, where the system is perceived from a global perspective. The conceptual model covers the part of the environment that is relevant from the safety point of view. The architectural model pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytical model for evaluating database update schemes in a centralized environment

    Publication Year: 1989, Page(s):630 - 635 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    A method is presented for evaluating the performance of database update schemes that are used to support views in a centralized system. It is based on an analytical queuing model that deals with multiple classes of customers, each class having its own arrival rate. The approach is demonstrated by using it to model two methods for supporting derived relations: the actual-results and the potential-r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A knowledge based tool for the requirements analysis

    Publication Year: 1989, Page(s):78 - 84 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    A description is given of the Analysis Assistant, a knowledge-based system aiming at helping the user to carry out the requirements analysis of a software system adhering to a given methodology and utilizing a large amount of knowledge on the particular application domain. The current prototype of the Analysis Assistant is outlined along with the language used for its implementation. The focus is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Describing real-time systems using PPA and XYZ/E

    Publication Year: 1989, Page(s):712 - 713 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    It is proposed to use the combination of PPA, a data-flow diagram system enhanced with the process port concept, and XYZ/E, a temporal-logic-based language system, for real-time system design. The capabilities of the approach are explored for the example of a cruise control system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State change architecture: a protocol for executable process models

    Publication Year: 1989, Page(s):154 - 164 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    The key concepts and requirements for a process mechanism and the state change architecture (SCA) protocols are presented. The SCA is thought to solve many of the process modeling problems associated with conventional languages and methods. It integrates object-oriented programming, a common repository for the logical view of data, and logic programming View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A normal form for sets of not-necessarily normalized relations

    Publication Year: 1989, Page(s):578 - 586 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    A normal form for sets of not-necessarily normalized relations, called NF-N3, is defined. This normal form not only removes local redundancy within each single relation but also removes global redundancy among relations. Properties pertaining to this normal form are given. The main differences between this normal form and others are discussed. Two methods for obtaining sets of not-necessarily norm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Denotational program slicing

    Publication Year: 1989, Page(s):486 - 494 vol.2
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB)

    An original, theoretical definition of denotational program slicing is presented. Program slicing is a method for automatic program decomposition that is based exclusively on control and data-flow information. Denotational slicing makes use of the functional semantics of a particular programming language and defines the various domains and appropriate mappings between them. Transformations are def... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Changing data representation in the refinement calculus

    Publication Year: 1989, Page(s):231 - 242 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (872 KB)

    It is shown how to change the data representation in programs (data refinement) systematically within refinement calculus. Data refinement in the original refinement calculus was only defined for functional data abstractions. It is shown how the method can be extended to nonfunctional data abstraction by adding `don't know' (or angelic) nondeterminism to the usual `don't care' (or demonic) nondete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance comparison of top-down recursive query evaluation strategies on Datalog benchmarks

    Publication Year: 1989, Page(s):621 - 629 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    A performance comparison is given, using Datalog benchmarks, of top-down strategies for the evaluation of recursive queries. The top-down strategies that are compared include S.W. Dietrich and D.S. Warren's extension tables (see Tech. Rep., 85-31, Dept. of Computer Science, SUNY at Stony Brook (1985)), H. Tamaki and T. Sato's multistage depth-first (see Third Int. Conf. Logic Prog., p.84-98 (1986)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ISLET: a program/proof editor to support the Vienna Development Method

    Publication Year: 1989, Page(s):68 - 77 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    ENCOMPASS is an environment that addresses the software quality problem using a combination of executable specifications, peer review, testing, and formal techniques similar to the Vienna Development Method. One of the most important tools in ENCOMPASS is ISLET, a language-oriented program/proof editor that supports the construction of formal specifications and their incremental refinement into ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The information society-the reality is now, through national computer policies

    Publication Year: 1989, Page(s):1 - 5 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    The author discusses the developing consensus for societal directions among unlike cultures resulting from the spread of computer technology. He demonstrates this for three groups: (1) those nations on the Pacific rim, in Europe, and in South America that have published formal national computer policy (NCP) position papers; (2) those nations that have not adopted formal NCP positions as yet but ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message communications in a distributed real-time system with a polled bus

    Publication Year: 1989, Page(s):703 - 711 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    High-speed message communications is addressed. Each node in the system consists of multiple processors interconnected by a broadcast bus, but the individual nodes are interconnected by an arbitrary network. The concept of a poll number is proposed to control the access to an intranode bus, minimizing the probability of real-time messages missing their deadlines. When a task generates a time-const... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A user interface design for cataloging and identifying reusable software modules: a semantic network approach

    Publication Year: 1989, Page(s):1035 - 1040 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    A knowledge representation technique for cataloging software modules is described. The software catalog is a multilevel schema that classifies modules according to function, date usage, and application users. A semantic network is used to encode the catalog and also serves as the basis for an interface design for perusing the contents of the catalog. By opening a window on the catalog, encoded kno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.