By Topic

Software Engineering Conference, 1997. Proceedings., Australian

Date Sept. 29 1997-Oct. 2 1997

Filter Results

Displaying Results 1 - 25 of 25
  • Proceedings of Australian Software Engineering Conference ASWEC 97

    Publication Year: 1997
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • Software Patents Panel

    Publication Year: 1997, Page(s):111 - 112
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Software Engineering Education - Is It Meeting Industry Needs? Can Industry Needs Be Met?

    Publication Year: 1997, Page(s):184 - 187
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 1997, Page(s): 189
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • A process modelling framework: capturing key aspects of organisational behaviour

    Publication Year: 1997, Page(s):118 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    The organisation management and social science literature are rich in descriptions of models relevant to the software development process. However, even the most prescriptive of these models are not specified with any great degree of formality. Nevertheless, key aspects of these models can be represented using more formal modelling approaches. This, in turn, allows the definition and development o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic model for fine grained configuration management including version control and traceability

    Publication Year: 1997, Page(s):27 - 36
    Cited by:  Papers (4)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (884 KB)

    This paper describes the implementation of a prototype system that supports fine-grained configuration and version management. The development has been undertaken in the context of providing trusted support for high-integrity software development. The starting point of this paper is a formal specification of the consistency and completeness criteria that our system must meet. The main issues are i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Background to software patenting in Australia

    Publication Year: 1997, Page(s):113 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    For many years, up to the late 1980s, the Australian Patent Office (APO) routinely rejected patent applications involving computer software. Since Australian practice was diverging from the more liberal practices which were emerging in other countries, particularly in the USA, in March 1986 the APO published a new set of guidelines: Guidelines for Considering the Patentability of Computer Program ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Change detection for aggregate objects with aliasing

    Publication Year: 1997, Page(s):98 - 106
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    Object oriented systems often need to detect when objects have changed. Due to aggregation and aliasing, programmers must explicitly identify changes to objects in most object oriented systems. We describe a program monitoring technique which takes account of aggregation and aliasing, and which can be used to detect changes automatically. Automatic change detection can simplify programming and des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A vector based software size measure

    Publication Year: 1997, Page(s):7 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Software size is a fundamental software product measure. Many existing software size measures do not adequately address the underlying problem complexity of systems. We propose a vector measure that incorporates both functionality and problem complexity in a balanced and harmonious manner. Algebraic specification is used as a vehicle to derive foundation formulae for measuring software size in ter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending test templates with inheritance

    Publication Year: 1997, Page(s):80 - 87
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    We are extending a framework for specification-based testing, the Test Template Framework, to include object-oriented features such as those provided in Object-Z. We report on our work extending the framework to include inheritance. In testing a subclass, the testing information for the parent class is inherited and thus reused. We have identified conditions under which testing information can be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Perspectives on safety-critical software

    Publication Year: 1997, Page(s):108 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    Software is being increasingly used in safety critical applications. These include commercial aviation, medical equipment, industrial process control, nuclear power plants, automobiles, and consumer products. Software by itself is harmless. It does not explode or electrocute its users. However, it inherits the system hazards once the system functions are allocated to software. These functions incl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting embedded system design capture, analysis and navigation

    Publication Year: 1997, Page(s):137 - 146
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    The paper presents a COTS (commercial off the shelf) oriented view of the embedded systems design space. It summarizes a set of frameworks capturing a significant portion of this design space along with a selected set of methods. These methods enable engineers to easily generate and quantitatively evaluate points within the design space. The paper also briefly discusses the design space navigation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying the CDIF standard in the construction of CASE design tools

    Publication Year: 1997, Page(s):88 - 97
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    This paper proposes a new, integrated development approach to the construction of CASE design tools using the CDIF standard for repository data interchange. The research is based on the authors' practical experience of constructing CASE tools using both RDBMS and meta-CASE technologies. An example object-based, graphical design method and notation is used to illustrate these different approaches t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validating the defect detection performance advantage of group designs for software reviews: report of a replicated experiment

    Publication Year: 1997, Page(s):17 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (980 KB)

    It is widely accepted that software development technical reviews (SDTRs) are a useful technique for finding defects in software products. The normative SDTR literature assumes that group reviews are better than individual reviews. Recent debates centre around the need for review meetings. This paper presents the findings of a replicated experiment that was conducted to investigate whether group r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualising software documents in a generic development environment

    Publication Year: 1997, Page(s):49 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    This paper describes how software visualisation can be supported in a generic environment for manipulation of software documents, using off-the-shelf graph-drawing tools. The effectiveness of the visualisation facilities achieved in a prototype implementation using the UQ* environment is illustrated by means of a call-graph visualisation case-study View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SRL-a simple retargetable loader

    Publication Year: 1997, Page(s):60 - 69
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    A loader is a systems program used by an operating system (OS) to load a binary executable file onto memory to execute it. The internal format of a binary executable file is called the binary-file format (BFF); this format is dependent on the OS and the particular computer architecture it runs on. Traditionally, when developing machine-code manipulation tools such as binary translators and disasse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reuse of software engineering assets in a production environment

    Publication Year: 1997, Page(s):3 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    The Software Engineering Laboratory (SEL) has been carrying out studies and experiments for the purpose of understanding, assessing, and improving software and software process within a production environment at the National Aeronautics and Space Administration/Goddard Space Flight Center (NASA/GSFC). The SEL has conducted experiments on approximately 125 production software projects at NASA/Godda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural properties of post-dominator trees

    Publication Year: 1997, Page(s):158 - 165
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The concepts of post dominators and post dominator trees are extensively used in code optimisation (J. Ferrante et al., 1987), program slicing (H. Agrawal and J.R. Horgan, 1990) and test suite reduction (R. Gupta and M.L. Soffa, 1093). The paper studies some characteristics of post dominator trees. These results can form the basis for the development of a more efficient construction algorithm of p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating dynamic program analysis tools

    Publication Year: 1997, Page(s):166 - 173
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Sophisticated instrumentation based systems exist for building dynamic analysis tools but to use these systems a developer must write the instrumentation and analysis code by hand. The paper describes how analysis tools can be generated automatically by specifying analysis algorithms using attribute grammars based on the static and dynamic structure of the program being analysed. Using methods sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software patents

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    Patents for software developments are now well established and have been granted in selected jurisdictions for a number of years. The status of software patents in the US, Australia, Japan and Europe is described. Patents for software developments have now expanded to an extent that they are regularly obtained for all manner of software inventions, including telecommunications protocols, encryptio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dukas: a software process task management environment

    Publication Year: 1997, Page(s):147 - 156
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (928 KB)

    Many different approaches have been taken to the problem of (partially) automating the software process. Researchers have attempted to define process models that are then represented in some formalism, such as Petri nets, that can then be enacted in a process centred software engineering environment (PSEE). Practitioners have built workflow systems that enable an artifact, typically a document, to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Utilising past event histories in a process-centred software engineering environment

    Publication Year: 1997, Page(s):127 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB)

    When working on complex software systems, it is often difficult for multiple software developers to coordinate their work, and for developers to coordinate their multiple tool and software process usage. Process centred software engineering environments attempt to help developers manage the complexities of such coordination by codifying steps in a software process, and codifying the “work co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Legacy 4GL application migration via knowledge-based software engineering technology: a case study

    Publication Year: 1997, Page(s):70 - 78
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    Most contemporary fourth-generation languages (4GL) are tightly coupled with the database, and other subsystems provided by the vendor. As a result, organisations that wish to change database vendors are typically forced to rewrite their applications using the new vendor's 4GL. The anticipated cost of this redevelopment can deter an organisation from changing vendors, hence denying it the benefits... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovery of constraints from data for information system reverse engineering

    Publication Year: 1997, Page(s):39 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (896 KB)

    The extraction of functional dependencies is a fundamental activity in the database design recovery process which is part of an overall information systems reverse engineering effort. Existing algorithms for this task are computationally expensive and appear to be infeasible if applied to large legacy database instances, e.g., their performance deteriorated when number of attributes or/and instanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative study of five regression testing algorithms

    Publication Year: 1997, Page(s):174 - 182
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB)

    We compare five regression testing algorithms that include: slicing, incremental, firewall, genetic and simulated annealing algorithms. The comparison is based on the following ten quantitative and qualitative criteria: execution time, number of selected retests, precision, inclusiveness, user parameters, handling of global variables, type of maintenance, type of testing, level of testing, and typ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.