Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

Proceedings of IEEE 18th International Conference on Software Engineering

25-30 March 1996

Filter Results

Displaying Results 1 - 25 of 55
  • Proceedings of IEEE 18th International Conference on Software Engineering

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Forcing behavioral subtyping through specification inheritance

    Publication Year: 1996, Page(s):258 - 267
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    A common change to object-oriented software is to add a new type of data that is a subtype of some existing type in the program. However, due to message passing, unchanged pearls of the program may now call operations of the new type. To avoid reverification of unchanged code, such operations should have specifications that are related to the specifications of the appropriate operations in their s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executable object modeling with statecharts

    Publication Year: 1996, Page(s):246 - 257
    Cited by:  Papers (51)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1216 KB)

    This paper reports on an effort to develop an integrated set of diagrammatic languages for modeling object-oriented systems, and to construct a supporting tool. The goal is for models to be intuitive and well-structured, yet fully executable and analyzable, enabling automatic synthesis of usable and efficient code in object-oriented languages such as C++. At the heart of the modeling method is the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using KIDS as a tool support for VDM

    Publication Year: 1996, Page(s):236 - 245
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    KIDS/VDM is an experimental environment that supports the synthesis of executable prototypes from VDM specifications. The development proceeds as a series of correctness preserving transformations under the strict control of the tool. A by-product of this development is the proof of consistency properties of the original specification. Experiments with the tool have shown its ability to handle ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences of software quality management using metrics through the life-cycle

    Publication Year: 1996, Page(s):179 - 188
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    Many software quality metrics to objectively grasp software products and process have been proposed in the past decades. In actual projects, quality metrics has been widely applied to manage software quality. However, there are still several problems with providing effective feedback to intermediate software products and the software development process. We have proposed a software quality managem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience assessing an architectural approach to large-scale systematic reuse

    Publication Year: 1996, Page(s):220 - 229
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    Systematic reuse of large-scale software components promises rapid, low cost development of high-quality software through the straightforward integration of existing software assets. To date this promise remains largely unrealized, owing to technical, managerial, cultural, and legal barriers, One important technical barrier is architectural mismatch. Recently, several component integration archite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OPSIS: a view mechanism for software processes which supports their evolution and reuse

    Publication Year: 1996, Page(s):38 - 47
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    The paper describes Opsis, a view mechanism applied to graph based process modelling languages of type Petri net. A view is a sub model which can be mechanistically constructed from another model by application of a perspective which: identifies all parts of the original model that are contained in the submodel; identifies and transforms all parts that constitute the interface to other sub models;... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effort estimation using analogy

    Publication Year: 1996, Page(s):170 - 178
    Cited by:  Papers (75)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    The staff resources or effort required for a software project are notoriously difficult to estimate in advance. To date most work has focused upon algorithmic cost models such as COCOMO and Function Points. These can suffer from the disadvantage of the need to calibrate the model to each individual measurement environment coupled with very variable accuracy levels even after calibration. An altern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System acquisition based on software product assessment

    Publication Year: 1996, Page(s):210 - 219
    Cited by:  Papers (33)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB)

    The procurement of complex software product involves many risks. To properly assess and manage those risks, Bell Canada has developed methods and tools that combine process capability assessment with a static analysis based software product assessment. This paper describes the software product assessment process that is part of our risk management approach. The process and the tools used to conduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to identify binary relations for domain models

    Publication Year: 1996, Page(s):28 - 36
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    Many approaches to requirements engineering include building a model of the domain. Those using entity relationship modeling or deriving from it employ the concept of relations between entities, but identifying the relations is still more of an art than science or engineering. We deal with this problem primarily in the context of object oriented analysis (OOA), where relations between object class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assertional reasoning about pairwise transient interactions in mobile computing

    Publication Year: 1996, Page(s):155 - 164
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    Mobile computing represents a major point of departure from the traditional distributed computing paradigm. The potentially very large number of independent computing units, a decoupled computing style, frequent disconnections, continuous position changes, and the location-dependent nature of the behavior and communication patterns of the individual components present designers with unprecedented ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An object-oriented implementation of B-ISDN signalling. 2. Extendability stands the test

    Publication Year: 1996, Page(s):125 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    The article discusses the extension to an existing object-oriented implementation for B-ISDN signalling. After a brief overview of the existing implementation it is shown where changes in the existing software were made to meet the new requirements (in particular, features for intelligent networks), what mechanisms were available or introduced to make this adaptation as easy as possible, and what ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scaleable, automated process for year 2000 system correction

    Publication Year: 1996, Page(s):475 - 484
    Cited by:  Papers (3)  |  Patents (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (796 KB)

    As the 21st century approaches, many computer programs will begin to fail. Applications that rely on dates of any kind may simply stop working or produce incorrect results. The year 2000 problem is a matter of business importance, not just software maintenance. Program failures arise from representing calendar dates (year, month, and day) in just 6 digits, a format that allows only 2 digits for th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting the construction and evolution of component repositories

    Publication Year: 1996, Page(s):279 - 288
    Cited by:  Papers (22)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    Repositories must be designed to meet the evolving and dynamic needs of software development organizations. Current software repository methods rely heavily on classification, which exacerbates acquisition and evolution problems by requiring costly classification and domain analysis efforts before a repository can be used effectively. This paper outlines an approach in which minimal initial struct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study in applying a systematic method for COTS selection

    Publication Year: 1996, Page(s):201 - 209
    Cited by:  Papers (53)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    This paper describes a case study that used and evaluated key aspects of a method developed for systematic reusable off-the-shelf software selection. The paper presents a summary of the common problems in reusable off-the-shelf software selection, describes the method used and provides details about the case study carried out. The case study indicated that the evaluated aspects of the method are f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytic framework for specifying and analyzing imprecise requirements

    Publication Year: 1996, Page(s):60 - 69
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    There are at least three challenges with requirements analysis. First, it needs to bridge informal requirements, which are often vague and imprecise, to formal specification methods. Second, requirements often conflict with each other. Third, existing formal requirement specification methodologies are limited in supporting trade-off analysis between conflicting requirements and identifying the imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of whole-program analysis tools

    Publication Year: 1996, Page(s):16 - 27
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB)

    Building efficient tools for understanding large software systems is difficult. Many existing program understanding tools build control flow and data flow representations of the program a priori, and therefore may require prohibitive space and time when analyzing large systems. Since much of these representations may be unused during an analysis, we construct representations on demand, not in adva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Checking subsystem safety properties in compositional reachability analysis

    Publication Year: 1996, Page(s):144 - 154
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    The software architecture of a distributed program can be represented by an hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compositional reachability analysis has been proposed as a promising automated method to derive the overall behavior of a distributed program in stages, based on its architecture. The method is particularly suitable for the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A specification-based adaptive test case generation strategy for open operating system standards

    Publication Year: 1996, Page(s):81 - 89
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    The paper presents a specification based adaptive test case generation (SBATCG) method for integration testing in an open operating system standards environment. In the SBATCG method, templates describing abstract state transitions are derived from a model based specification, and the templates are refined to the internal structure of each implementation. We adopt the Z notation, one of the most w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An exact array reference analysis for data flow testing

    Publication Year: 1996, Page(s):565 - 574
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    Data-flow testing is a well-known technique, and it has proved to be better than the commercially-used branch testing. The problem with data-flow testing is that, apart from scalar variables, only approximate information is available. This paper presents an algorithm that precisely determines the definition-use pairs for arrays within a large domain. There are numerous methods addressing the array... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software engineering experiment in software component generation

    Publication Year: 1996, Page(s):542 - 552
    Cited by:  Papers (32)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB)

    The paper presents results of a software engineering experiment in which a new technology for constructing program generators from domain-specific specification languages has been compared with a reuse technology that employs sets of reusable Ada program templates. Both technologies were applied to a common problem domain, constructing message translation and validation modules for military comman... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering an `Open' client/server-platform for a distributed Austrian Alpine road-pricing system in 240 days-case study and experience report

    Publication Year: 1996, Page(s):115 - 124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1068 KB)

    The paper describes engineering a system for a distributed Austrian Alpine road-pricing environment as well as the structure and organization of the software development. The client/server-based road-pricing system, handling on average 1.2 million vehicle transitions per month, had be to operational within a mere eight months after the start of the project. Current practical and industrial problem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding and predicting the process of software maintenance releases

    Publication Year: 1996, Page(s):464 - 474
    Cited by:  Papers (43)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB)

    One of the major concerns of any maintenance organization is to understand and estimate the cost of maintenance releases of software systems. Planning the next release so as to maximize the increase in functionality and the improvement in quality are vital to successful maintenance management. The objective of the paper is to present the results of a case study in which an incremental approach was... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prototypes as assets, not toys. Why and how to extract knowledge from prototypes. (Experience report)

    Publication Year: 1996, Page(s):522 - 531
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1012 KB)

    Software prototypes are becoming more and more important, as computer applications invade new domains and as personal prototyping environments become more powerful. Although numerous approaches recommend their use, prototypes are sometimes treated like their developers' personal toys, and little effort is made to extract and share the experiences and knowledge that emerged as a by-product of build... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.