By Topic

[1991] Proceedings The Fifteenth Annual International Computer Software & Applications Conference

11-13 Sept. 1991

Filter Results

Displaying Results 1 - 25 of 119
  • Proceedings of the Fifteenth Annual International Computer Software and Applications Conference (Cat. No.91CH3023-9)

    Publication Year: 1991
    Request permission for commercial reuse | PDF file iconPDF (603 KB)
    Freely Available from IEEE
  • Automated test data generation for distributed software

    Publication Year: 1991, Page(s):680 - 685
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    A novel approach to automating test data generation for distributed programs is presented. The approach is based on actual execution of the program under test, a run-time scheduler, function minimization methods, and dynamic dataflow analysis. Test data are developed for the program using actual values of the input variables. When the program is executed, the program execution flow is monitored. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On formalizing software process description: Consortium's example

    Publication Year: 1991, Page(s):388 - 389
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    The paper describes the three different tools of formality on process description for human (process guidance) and machine (automated process support). The three levels of process descriptions suggested are: process guide book, process model and process notation. The natural and direct mappings between them free the software developer from tedious and complex formal notation and benefit from the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating recursive query costs for various parallel environments

    Publication Year: 1991, Page(s):365 - 372
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    A recursive query evaluation method is introduced whose main goal is to obtain a recursive query cost estimate without performing the query. In particular, it is shown that the execution estimate of the parallel processing of recursive queries can be done by exploiting the characteristics of the database profile during the evaluation process for request optimization. As many recursive queries invo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated debugging and performance monitoring for parallel programs

    Publication Year: 1991, Page(s):317 - 318
    Cited by:  Papers (2)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Based on experiences with various debugging tools, the authors believe that the ideal tool represents several forms of integration: integration of scope from simple debugging to advanced performance monitoring; integration of techniques such as graphical and textual displays and real-time and postmortem analysis; connections between event monitoring and execution control; coordination of instrumen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reliability measurements through combination models: approaches, results, and a CASE tool

    Publication Year: 1991, Page(s):577 - 584
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    A general combination approach is proposed to address the predictive accuracy problem for software reliability modeling. Instead of relying on any single model, the authors apply several linear combinations of existing software reliability models, called component models, to form a series of linear-combination models. In an experimental investigation with industrial project data, this set of linea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algebraic specification of a reflective language

    Publication Year: 1991, Page(s):231 - 236
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A formal, algebraic specification is presented for a functional programming language, called Brown, with reflective computation mechanisms. The emphasis is put on how it is possible to specify the reflection abstractly (in the sense of abstract data types) in equational logic. The major part of the specification consists of a set of equations (axioms ) based on a denotational semantics which model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of reliable broadcast protocol for selectively partially ordering PDUs

    Publication Year: 1991, Page(s):673 - 679
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    A discussion is presented of the design of the SPO (service for selectively partially ordering PDUs) protocol which provides reliable selective broadcast services. In the SPO service, each PDU (protocol data unit) is not destined to all the entities, but only to the destinations. The SPO protocol guarantees the partial ordering of received PDUs which are destined to the entity on the MC service. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal and informal approaches for validation

    Publication Year: 1991, Page(s):534 - 535
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    The author considers applying conventional approaches to validate OOS (object-oriented systems) and then investigates new aspects caused by the properties of OOS. He also focuses on two issues, each representing a typical property of the static aspect and the dynamic aspect. The issues examined are abstraction hierarchy consistency and concurrent behavior correctness View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SODA: a security model for object-oriented database management systems

    Publication Year: 1991, Page(s):699 - 704
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    A security model for a multilevel secure object-oriented database (SODA) is described. The author demonstrates that the model satisfies the simple security condition and the *-property. Data classification is based on inheritance with the enforcement of data classification rules assured by the TCB. SODA allows the use of polyinstantiation or rigid classification as a solution to the multiparty upd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • There are no silver bullets! [software engineering]

    Publication Year: 1991, Page(s):386 - 387
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    Many organizations have attempted to improve their process for delivering application systems to their end-users. Most have not succeeded because they attempted to implement the `quick-fix' of automated tools or new techniques. The only proven approach is through an overall program to change the software management process. This process can take software development from the craft shop era to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implicit joins in the structural data model

    Publication Year: 1991, Page(s):357 - 364
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    In general, writing a relational query involving many join predicates is cumbersome and prone to errors. One approach to resolving this problem is the implicit join method. This method derives the unspecified join predicates of an incompletely specified query from the semantic dependency-a set of the pairs of semantically dependent attributes-in the database schema. Although the implicit join meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable, parallel performance environments

    Publication Year: 1991, Page(s):315 - 316
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    It is shown that new techniques are needed to analyze and present performance data from massively parallel systems. Although parallel programs contain many tasks, typically, there are only a few equivalence classes of task behavior. The author is planning to incorporate algorithms for performance data clustering and display (i.e. equivalence class identification) performance data presentation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthesizing procedural abstractions from formal specifications

    Publication Year: 1991, Page(s):149 - 154
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (484 KB)

    A description is presented of the development of the SEED system, which demonstrates that the building blocks of a large software system can be correctly synthesized from user-supplied formal specifications using techniques amenable to automation. SEED accepts a formal specification of a problem written in predicate logic and generates annotated program source code satisfying the specification. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering measurement: A modular course

    Publication Year: 1991, Page(s):571 - 576
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    A description is given of the educational package which is being produced by the ESPRIT project METKIT (metrics educational tool kit) for use within academia. METKIT is a three-year project aimed at raising awareness and increasing usage of software metrics within European industry by producing educational material aimed at both industrial and academic audiences. A brief discussion is also given o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Re-affirming support for a transformational approach to software development: theory and practice

    Publication Year: 1991, Page(s):493 - 498
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Inherent virtues, allied to proper in-the-large support, make the transformational paradigm a potent weapon for the software engineer. A taxonomic model of software transformational space is sketched. The main vertical in-the-large transformations needed for Jackson system development are described; these are provided within the CASE workbench PRESTIGE View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new control flow representation

    Publication Year: 1991, Page(s):225 - 230
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    A new control flow graph construction is described. This control flow representation is rigorous and can be fully automated. It works for any procedural language and can be used on unstructured programs. It is designed to compute number of paths, to identify breaches of structure and to define test coverage. All existing control flow metrics can be computed from this representation and new metrics... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocol validation using a pumping-based approach

    Publication Year: 1991, Page(s):339 - 344
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    Two pumping theorems are derived for a network N of CFSMs (communicating finite state machines). Each pumping theorem describes a set of conditions under which a feasible event sequence of N can be pumped to produce an infinite set of feasible event sequences of N. The authors show that if a feasible event sequence E satisfying the conditions in one pumping theo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a system for software testing and debugging for multiprocessor avionics systems

    Publication Year: 1991, Page(s):261 - 268
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    As multiprocessor software solutions find their way into critical applications such as avionics as a means of increasing performance and reliability, the need for both debugging and testing tools increases dramatically. The authors focus on the gathering of accurate run-time information providing support for both debugging and testing of embedded multiprocessor systems by using run-time identifica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing massively parallel algorithms with Parallaxis

    Publication Year: 1991, Page(s):612 - 617
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Parallaxis is a programming language for massively parallel single instruction-multiple data (SIMD) systems, based on Modula-2. There are only a small number of additional constructs to handle parallel data (vectors) and data exchange among processors or between the front-end and back-end. Parallaxis helps to solve parallel problems in a natural way and does not require special skills. The major l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant parallel matrix multiplication with one iteration fault detection latency

    Publication Year: 1991, Page(s):665 - 672
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    A new algorithm, the ID algorithm, is presented which minimizes the fault-detection latency. In the ID algorithm, a fault is detected as soon as the fault occurs instead of at problem termination. For n 2 processors, the fault-latency time of the ID algorithm is 1/n of that of the checksum algorithm with a run-time penalty of O(n log2 ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tasking deadlock detector for Ada programs

    Publication Year: 1991, Page(s):56 - 63
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    A tasking deadlock detector for Ada programs is presented. The software tool works by monitoring the tasking behavior of a target program and operating a task-wait-for graph for the program. It can detect all types of tasking deadlocks in a class of Ada programs. The authors describe the principle of detecting tasking deadlocks dynamically, present their implementation of the tool, and give a real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object-oriented methods-why we need them

    Publication Year: 1991
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    At present, in the context of object-oriented technology, most of the software development industry has centered its attention around the implementation language. If more attention is not paid to object-oriented methods regardless of language, it is likely that the technology will fall far short of most expectations. The importance of this point is discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compiler techniques to extract parallelism within a nested loop

    Publication Year: 1991, Page(s):24 - 29
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    By analyzing the dependences between instances, the authors propose a new compiler technique called cycle breaking for parallelizing nested loops. For a single dependence cycle, it extracts more parallelism than two similar techniques. Several versions of cycle braking are presented to extract parallelism within a nested loop by linearizing its multidimensional iteration space. It is observed that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data compression scheme which achieves good compression for practical use

    Publication Year: 1991, Page(s):442 - 449
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    A lossless data compression scheme is investigated with a view to improving the compression ratio for practical use. A new scheme called multidictionary compression is proposed which uses a local dictionary and a global dictionary for removing local and global redundance respectively. An implementation method for this scheme is also provided. Based on the scheme and the implementation method, a co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.