Proceedings of IEEE 18th International Conference on Software Engineering

25-30 March 1996

Filter Results

Displaying Results 1 - 25 of 55
  • Proceedings of IEEE 18th International Conference on Software Engineering

    Publication Year: 1996
    Request permission for commercial reuse | |PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1996
    Request permission for commercial reuse | |PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Experiences of software quality management using metrics through the life-cycle

    Publication Year: 1996, Page(s):179 - 188
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (740 KB)

    Many software quality metrics to objectively grasp software products and process have been proposed in the past decades. In actual projects, quality metrics has been widely applied to manage software quality. However, there are still several problems with providing effective feedback to intermediate software products and the software development process. We have proposed a software quality managem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effort estimation using analogy

    Publication Year: 1996, Page(s):170 - 178
    Cited by:  Papers (81)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (636 KB)

    The staff resources or effort required for a software project are notoriously difficult to estimate in advance. To date most work has focused upon algorithmic cost models such as COCOMO and Function Points. These can suffer from the disadvantage of the need to calibrate the model to each individual measurement environment coupled with very variable accuracy levels even after calibration. An altern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assertional reasoning about pairwise transient interactions in mobile computing

    Publication Year: 1996, Page(s):155 - 164
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (972 KB)

    Mobile computing represents a major point of departure from the traditional distributed computing paradigm. The potentially very large number of independent computing units, a decoupled computing style, frequent disconnections, continuous position changes, and the location-dependent nature of the behavior and communication patterns of the individual components present designers with unprecedented ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forcing behavioral subtyping through specification inheritance

    Publication Year: 1996, Page(s):258 - 267
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (940 KB)

    A common change to object-oriented software is to add a new type of data that is a subtype of some existing type in the program. However, due to message passing, unchanged pearls of the program may now call operations of the new type. To avoid reverification of unchanged code, such operations should have specifications that are related to the specifications of the appropriate operations in their s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements for a layered software architecture supporting cooperative multi-user interaction

    Publication Year: 1996, Page(s):408 - 417
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (996 KB)

    Layered interactive systems lend themselves to be adapted for cooperation if inter-layer communication is charged to separated connectors. Point-to-point connectors can be replaced with cooperative connectors multiplexing and demultiplexing I/O between a particular layer and multiple instances of the next lower one. For this technique to be most effective, some general guidelines should be followe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Checking subsystem safety properties in compositional reachability analysis

    Publication Year: 1996, Page(s):144 - 154
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (856 KB)

    The software architecture of a distributed program can be represented by an hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compositional reachability analysis has been proposed as a promising automated method to derive the overall behavior of a distributed program in stages, based on its architecture. The method is particularly suitable for the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing and estimating the cost of test coverage criteria

    Publication Year: 1996, Page(s):486 - 494
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (760 KB)

    Test coverage criteria define a set of entities of a program flowgraph and require that every entity is covered by some test. We first identify Ec, the set of entities to be covered according to a criterion c, for a family of widely used test coverage criteria. We then present a method to derive a minimum set of entities, called a spanning set, such that a set of test paths covering the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executable object modeling with statecharts

    Publication Year: 1996, Page(s):246 - 257
    Cited by:  Papers (53)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1216 KB)

    This paper reports on an effort to develop an integrated set of diagrammatic languages for modeling object-oriented systems, and to construct a supporting tool. The goal is for models to be intuitive and well-structured, yet fully executable and analyzable, enabling automatic synthesis of usable and efficient code in object-oriented languages such as C++. At the heart of the modeling method is the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplifying data integration: the design of the Desert software development environment

    Publication Year: 1996, Page(s):398 - 407
    Cited by:  Papers (14)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (976 KB)

    This paper describes the design and motivations behind the Desert environment. The Desert environment has been created to demonstrate that the facilities typically associated with expensive data integration can be provided inexpensively in an open framework. It uses three integration mechanisms: control integration, simple data integration based on fragments, and a common editor. It offers a varie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scene: using scenario diagrams and active text for illustrating object-oriented programs

    Publication Year: 1996, Page(s):366 - 375
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (812 KB)

    Scenario diagrams are a well-known notation for visualizing the message flow in object-oriented systems. Traditionally, they are used in the analysis and design phases of software development to prototype the expected behavior of a system. We show how they can be used in reverse for understanding and browsing existing software. We have implemented a tool called Scene (SCENario Environment) that au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Independent on-line monitoring of evolving systems

    Publication Year: 1996, Page(s):134 - 143
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (792 KB)

    We argue that the trustworthiness of evolving software systems can be significantly enhanced by a rigorous process of independent on-line monitoring. Such monitoring can prevent fraud, encourage careful maintenance, and serve as an early detector of irregularities in the state and behavior of a system. Unfortunately, there is a conflict between the concepts of on-line and independent monitoring. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scaleable, automated process for year 2000 system correction

    Publication Year: 1996, Page(s):475 - 484
    Cited by:  Papers (4)  |  Patents (33)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (796 KB)

    As the 21st century approaches, many computer programs will begin to fail. Applications that rely on dates of any kind may simply stop working or produce incorrect results. The year 2000 problem is a matter of business importance, not just software maintenance. Program failures arise from representing calendar dates (year, month, and day) in just 6 digits, a format that allows only 2 digits for th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using KIDS as a tool support for VDM

    Publication Year: 1996, Page(s):236 - 245
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (992 KB)

    KIDS/VDM is an experimental environment that supports the synthesis of executable prototypes from VDM specifications. The development proceeds as a series of correctness preserving transformations under the strict control of the tool. A by-product of this development is the proof of consistency properties of the original specification. Experiments with the tool have shown its ability to handle ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical study of static call graph extractors

    Publication Year: 1996, Page(s):90 - 99
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (756 KB)

    Informally, a call graph represents calls between entities in a given program. The call graphs that compilers compute to determine the applicability of an optimization must typically be conservative: a call may be omitted only if it can never occur an any execution of the program. Numerous software engineering tools also extract call graphs, with the expectation that they will help software engine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DYNAMITE: DYNAMIc Task nEts for software process management

    Publication Year: 1996, Page(s):331 - 341
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (920 KB)

    Managing the software development and maintenance process has been identified as a great challenge for several years. Software processes are highly dynamic and can only rarely be planned completely in advance. Dynamic task nets take this into account. They are built and modified incrementally as a software process is executed. Dynamic task nets have been designed to solve important problems of pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring compliance of a software system with its high-level design models

    Publication Year: 1996, Page(s):387 - 396
    Cited by:  Papers (43)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1104 KB)

    As a complex software system evolves, its implementation tends to diverge from the intended or documented design models. Such undesirable deviation makes the system hard to understand, modify and maintain. This paper presents a hybrid computer-assisted approach for confirming that the implementation of a system maintains its expected design models and rules. Our approach closely integrates logic-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation of software test environment architectures

    Publication Year: 1996, Page(s):353 - 364
    Cited by:  Papers (18)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1124 KB)

    Software test environments (STEs) provide a means of automating the test process and integrating testing tools to support required testing capabilities across the test process. Specifically, STEs may support test planning, test management, test measurement, test failure analysis, test development and test execution. The software architecture of an STE describes the allocation of the environment's ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented implementation of B-ISDN signalling. 2. Extendability stands the test

    Publication Year: 1996, Page(s):125 - 132
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (600 KB)

    The article discusses the extension to an existing object-oriented implementation for B-ISDN signalling. After a brief overview of the existing implementation it is shown where changes in the existing software were made to meet the new requirements (in particular, features for intelligent networks), what mechanisms were available or introduced to make this adaptation as easy as possible, and what ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding and predicting the process of software maintenance releases

    Publication Year: 1996, Page(s):464 - 474
    Cited by:  Papers (45)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (956 KB)

    One of the major concerns of any maintenance organization is to understand and estimate the cost of maintenance releases of software systems. Planning the next release so as to maximize the increase in functionality and the improvement in quality are vital to successful maintenance management. The objective of the paper is to present the results of a case study in which an incremental approach was... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience assessing an architectural approach to large-scale systematic reuse

    Publication Year: 1996, Page(s):220 - 229
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (908 KB)

    Systematic reuse of large-scale software components promises rapid, low cost development of high-quality software through the straightforward integration of existing software assets. To date this promise remains largely unrealized, owing to technical, managerial, cultural, and legal barriers, One important technical barrier is architectural mismatch. Recently, several component integration archite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A specification-based adaptive test case generation strategy for open operating system standards

    Publication Year: 1996, Page(s):81 - 89
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (808 KB)

    The paper presents a specification based adaptive test case generation (SBATCG) method for integration testing in an open operating system standards environment. In the SBATCG method, templates describing abstract state transitions are derived from a model based specification, and the templates are refined to the internal structure of each implementation. We adopt the Z notation, one of the most w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systematic survey of CMM experience and results

    Publication Year: 1996, Page(s):323 - 330
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (648 KB)

    The capability maturity model (CMM) for software has become very influential as a basis for software process improvement (SPI). Most of the evidence to date showing the results of these efforts has consisted of case studies. We present a systematic survey of organizations that have undertaken CMM-based SPI to get more representative results. We found evidence that process maturity is in fact assoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible architecture for building data flow analyzers

    Publication Year: 1996, Page(s):554 - 564
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1004 KB)

    Data flow analysis is a versatile technique that can be used to address a variety of analysis problems. Typically, data flow analyzers are hand-crafted to solve a particular analysis problem. The cost of constructing analyzers can be high and is a barrier to evaluating alternative analyzer designs. We describe an architecture that facilitates the rapid prototyping of data flow analyzers. With this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.