By Topic

Computer Systems and Software Engineering, 1991. Proceedings., Fifth Israel Conference on

Date 28-29 May 1991

Filter Results

Displaying Results 1 - 25 of 26
  • Proceedings. The Fifth Israel Conference on Computer Systems and Software Engineering (Cat. No.91TH0349-1)

    Publication Year: 1991
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • Maintenance of system software on a wide area network of mainframes

    Publication Year: 1991, Page(s):113 - 119
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    A method is suggested for managing and maintaining the basic software in a network from a central installation, thus offering great saving of effort, with nearly no degradation in the service level. The method is based on a small number of model systems (software), which are installed at the central installation. Each remote installation is associated with a specific model system and is called a t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metaobject-based version control mechanism in software object databases

    Publication Year: 1991, Page(s):120 - 125
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    An object model has been developed as a paradigm to specify software objects in software environment databases. Among other things, it provides a unified way to specify the software configuration management processes. The author briefly describes the object model for software environment databases. He then discusses a metaobject-based approach to the configuration management mechanism in software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A system supporting design, implementation and maintenance of object oriented programs

    Publication Year: 1991, Page(s):104 - 112
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The graphical object-oriented development system (GOODS) was designed to support the design, implementation, and maintenance of object-oriented programs. The goal was to minimize the cognitive load on the user by providing graphical views containing only the information needed. It uses novel graphical language designed to describe the structure of object-oriented programs. The system can display G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Individuality and methodology in large DP projects

    Publication Year: 1991, Page(s):64 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Aspects of methodology in correction with large DP projects are discussed. It is pointed out that methodology is a mapping of the stages of a project and/or the deliverables produced by each of these stages against time or against state of completeness. It is further noted that individual resistance to methodology on technical grounds is a positive force, and on psycho-social grounds is a natural ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A procedure for risk management with reference to software

    Publication Year: 1991, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    Risk management is examined through use of analysis disciplines. A method for risk management is presented which consists of a three-dimensional classification schema. This classification method is based on risk categories, risk danger levels, and the probabilities of the risk actually occurring. The method allows for the total management of the risk aspects of a project. The processes are for ris... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The problem of tested elements reduction in structural program testing

    Publication Year: 1991, Page(s):155 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    An approach to the tested elements reduction problem, in which a set of reduction rules is developed to detect the dominated tested elements and remove them is proposed. The dominant elements are then manifested. These reduction rules are formally proved mathematically. The physical meaning of each rule is described in detail. Their effectiveness is illustrated by examples. The proposed table-redu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating reactive systems by a deduction system

    Publication Year: 1991, Page(s):132 - 142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB)

    Simulation by deduction is a technique in which the behavior of the simulated model is deduced by a reasoning system. A simulation system that uses this technique can explain the reasons for the simulation results and thus aid the localization of bugs. Furthermore, simulation by deduction enables symbolic simulation, i.e. simulating a scenario given only a partial description of the environment an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variations on parallel control structures

    Publication Year: 1991, Page(s):173 - 178
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    The authors introduce control structures for parallel programming designed to facilitate the process of developing parallel programs. These basic control structures are listed, and are given intuitive sequential and parallel semantics. The parallel versions are then refined to display the power of the various variations that could be used. Named control structures which help synchronize the execut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel design verification using standard hardware and sequential software

    Publication Year: 1991, Page(s):143 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    A novel algorithm for parallel design verification is described. Its data model is that of the data flow computer and is based on the partitioning of the design verification cycle into independent tasks that can be run concurrently. The significance of this methodology is that, unlike other concepts that cannot use the existing sequential code and can only run on an expensive special-purpose hardw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated approach for collection of telephone call records

    Publication Year: 1991, Page(s):72 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB)

    An integrated approach for the collection of telephone call records at BEZEQ (the Israeli telephone company) exchanges, implemented by IBM, is described. The product provides a controlled network which includes modern digital exchanges and upgraded old analog exchanges. The handling of digital components within analog exchanges and the dedicated project management system are discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System safety aspects

    Publication Year: 1991, Page(s):77 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    The following definition is presented: a safe system is n-resilient at m% to faults if: there exist at least n+1 distinct configurations of its subsystems; any n faults in n of the n+1 configuration maintains a safe system; and the highest probability of any set of n faults of the n +1 configurations does not exceed m%. It is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guidelines for user interface design for military reserve computer operators

    Publication Year: 1991, Page(s):33 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    The operators of DBMSs (database management systems) at battlefield command centers in military reserve units are initially novice and then occasional users. Failure modes in using these systems are analyzed in terms of human factors. Using theories of human behavior in interactive systems, guidelines for dialog design are introduced. The guidelines were applied to the design of a utility package ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspects of the parallel program execution: work, time and the current state

    Publication Year: 1991, Page(s):162 - 172
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    The main focus in debugging and monitoring program execution is given as the notion of time. In particular, the progress of the execution, which is interpreted as useful computation, is addressed. The authors describe two interpretations, or views, of the causality graph which complement each other in the display of the propagation of the execution. The causality graph is the graph constructed fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a library for simulations

    Publication Year: 1991, Page(s):43 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    A methodology for library design is outlined and it is implemented for the domain of discrete event simulations. The top-down approach consists of five stages: state the users' needs, state the general goals for the library, derive the requirements of goals, list opposing requirements and resolve contradictions by analyzing requirements in view of users' needs and the domain, or by conducting fiel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assimilation of software engineering and CASE in the MAMRAM curriculum

    Publication Year: 1991, Page(s):57 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The computer education and training center at MAMRAM is the central academy for professional education of computer professionals and end-users in the Israeli Defence Forces. The author reviews the standard track of the MAMRAM graduates and the courses they take. He then discusses the software engineering elements within this framework, and the CASE (computer-aided software engineering) tool select... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OBJECTEXT-an object oriented hypertext model

    Publication Year: 1991, Page(s):179 - 190
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    The authors introduce OBJECTEXT, an object-oriented data model for hypertext systems, featuring an extensible set of typed, structured nodes. It is argued that the integration of object-oriented principles can give hypertexts a clearer, more formal framework and reduce the problem of user disorientation without sacrificing generality or flexibility. It is also argued that hypertexts are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creating environments for software maintenance

    Publication Year: 1991, Page(s):126 - 131
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    Finding software maintenance solutions for a real-time embedded 8611-based project can be challenging and interesting. Three crucial issues are addressed: configuration and module management, code integrity self-test and software correctness testability. Experience shows that when off-the-shelf products are not available, low-cost solutions could still be attained by using existing tools in unconv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Man-machine interfaces for legal applications software

    Publication Year: 1991, Page(s):29 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    The various possibilities for the man-machine interface of computer systems for legal applications are considered. It is shown that this interface often must reflect the coroutining of several supporting processes. It should be constructed using the so-called marketplace model as opposed to the corridor model. Other aspects of the user interface which are special to the legal domain are discussed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sublinked CSCIs at test and integration-application and its implications on development environments

    Publication Year: 1991, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The software engineering principles that lead to the decomposition of a software system to CSCIs (computer software configuration items) were applied in the software integration phase of a relatively large tightly coupled multiprocessor system. Accordingly, the integration of this nondistributed embedded software system was accelerated and the product was improved by separately linking the CSCIs. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software re-engineering using hierarchical-client-server paradigm (HCS) and BUBBLES

    Publication Year: 1991, Page(s):50 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    A software re-engineering method based on the hierarchical-client server (HCS) paradigm is presented. The re-engineering method consists of extracting cross-reference relations and transforming the data into an hierarchical set of diagrams that represent the software architecture. These diagrams provide a documentation skeleton, and may be analyzed with the BUBBLES computer-aided software engineer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The integration of CASE and a software engineering framework

    Publication Year: 1991, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    The integration of software engineering (SE) frameworks and computer-aided software engineering (CASE) tools is examined. An example of such integration is presented, along with a discussion of the general implications of such an integration. The SE framework considered is the software engineering framework (SEFR), a system of software engineering guidelines which has been adopted by the Governmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FORMAN-Program formal annotation language

    Publication Year: 1991, Page(s):149 - 154
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    The FORMAN formal annotation language is a tool for program testing, debugging, verification and documentation. It is based on a semantic model of target program execution. A sequence of events serves for this model. Assertions about data and control flows in this target program can be written in this language. Pattern matching and aggregate operations constitute the core of the language. Librarie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifying resource allocation and time-tabling problems using a rule-based language

    Publication Year: 1991, Page(s):20 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    A general language called the resource allocation problem specification (RAPS) language, for specifying resource allocation and timetabling problems is presented. The language is based on the expert-system paradigm which enables the solution of resource allocation problems by using experts' knowledge and heuristics. The language enables the specification of a problem in terms of resources, activit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Programming reactive systems with statecharts

    Publication Year: 1991, Page(s):87 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    The authors look at methods and tools for fast delivery of applications in the context of factory automation; more specifically in the field of industrial robotics and for numerical controllers of machine-tools. They introduce a scheduling language and a general framework in which both kinds of applications can be expressed. Its purpose is to generate a real-time controller, tuned for the applicat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.