Proceedings 12th IEEE International Conference Automated Software Engineering

1-5 Nov. 1997

Filter Results

Displaying Results 1 - 25 of 49
  • Proceedings 12th IEEE International Conference Automated Software Engineering

    Publication Year: 1997
    Request permission for commercial reuse | |PDF file iconPDF (219 KB)
    Freely Available from IEEE
  • Specification and verification of the Co/sub 4/ distributed knowledge system using LOTOS

    Publication Year: 1997, Page(s):63 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (798 KB)

    This paper relates the formal specification and verification of a consensual decision protocol based on Co/sub 4/, a computer environment dedicated to the building of a distributed knowledge base. This protocol has been specified in the ISO formal description technique LOTOS. The CADP tools from the EUCALYPTUS LOTOS toolset have been used to verify different safety and liveness properties. The ver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retrieving software components that minimize adaptation effort

    Publication Year: 1997, Page(s):255 - 262
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (591 KB)

    Given a software library whose entries are represented by formal specifications, we distinguish between two retrieval procedures: exact retrieval, whereby, given a query K, we identify all the library components that are correct with respect to K; approximate retrieval, which is invoked when exact retrieval fails, and identifies the library components that minimize adaptation effort. To this effec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 1997, Page(s): 321
    Request permission for commercial reuse | |PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Towards semantic-based object-oriented CASE tools

    Publication Year: 1997, Page(s):295 - 296
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (168 KB)

    Despite their strengths, object-oriented methods (OOMs) and their supporting CASE tools often do not produce model that are amenable to rigorous semantic analysis. This is a direct result of their loosely defined semantics. The authors outline their ongoing work on providing a semantic base for OOMs View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive component-based software development with Espresso

    Publication Year: 1997, Page(s):293 - 294
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (180 KB)

    Most component models in use today are language-independent, but also platform-dependent and not designed specifically to support a tool-based visual development paradigm. Espresso is a new component model that was designed with the goal of supporting software development through tool-based visual component composition. Being implemented in Java, Espresso components can run on any Java-enabled pla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of formal methods to the development of a software maintenance tool

    Publication Year: 1997, Page(s):162 - 171
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (968 KB)

    Partial evaluation is an optimization technique traditionally used in compilation. We have adapted this technique to the understanding of scientific application programs during their maintenance, and we have implemented a tool that analyzes Fortran 90 application programs and performs an interprocedural pointer analysis. This paper presents how we have specified this analysis with different formal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling the application domains of software engineering technologies

    Publication Year: 1997, Page(s):291 - 292
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (176 KB)

    The effectiveness of software engineering technologies depends very much on the situation in which they are applied. In order to further improve software development practices one needs to explicitly describe and utilise knowledge about application domains of software engineering technologies. The paper suggests a modelling formalism for supporting systematic reuse of software engineering technolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting objects from legacy imperative code

    Publication Year: 1997, Page(s):98 - 106
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (668 KB)

    This paper presents a methodology for extracting objects from legacy imperative code. The parameter-based object identification (PBOI) methodology is based on the thesis that object attributes manifest themselves as data items passed from subprogram to subprogram in the imperative paradigm. A taxonomy of imperative subprograms is presented and the PBOI methodology is defined. Several examples are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling software processes by using process and object ontologies

    Publication Year: 1997, Page(s):319 - 320
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (160 KB)

    In order to model software processes based on ontologies engineering techniques, this paper presents a methodology to manually construct the following ontologies: an object ontology based on constituent elements for objects, and a process ontology based on relationships between inputs and outputs, such as subsumption relationships. Next, using the constructed ontologies, software process plans are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feedback handling in dynamic task nets

    Publication Year: 1997, Page(s):301 - 302
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (196 KB)

    While a software process is being executed, many errors and problems occur which require to reconsider previously executed process steps. In order to handle feedback in a process management system, several requirements need to be addressed: adaptability, human intervention, impact analysis, change propagation, restoration of the work context, and traceability. Feedback management in DYNAMITE meets... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Augmenting abstract syntax trees for program understanding

    Publication Year: 1997, Page(s):126 - 133
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (652 KB)

    Program understanding efforts by individual maintainers are dominated by a process known as discovery, which is characterized by low-level searches through the source code and documentation to obtain information that is important to the maintenance task. Discovery is complicated by the delocalization of information in the source code, and can consume from 40-60% of a maintainer's time. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correct-schema-guided synthesis of steadfast programs

    Publication Year: 1997, Page(s):153 - 160
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (676 KB)

    It can be argued that for (semi-)automated software development, program schemas are indispensable, since they capture not only structured program design principles but also domain knowledge, both of which are of crucial importance for hierarchical program synthesis. Most researchers represent schemas purely syntactically (as higher-order expressions). This means that the knowledge captured by a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the verification of VDM specification and refinement with PVS

    Publication Year: 1997, Page(s):280 - 289
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (784 KB)

    Although the formal method VDM has been in existence since the 1970s, there are still no satisfactory tools to support verification in VDM. The paper deals with one possible means of approaching this problem by using the PVS theorem-prover. It describes a translation of a VDM-SL specification into the PVS specification language using, essentially, the very transparent translation methods described... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic high-quality reengineering of database programs by temporal abstraction

    Publication Year: 1997, Page(s):90 - 97
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (656 KB)

    The relational database model is currently the target of choice for the conversion of legacy software that uses older models (such as indexed-sequential, hierarchical or network models). The relational model makes up for its lower efficiency by a greater expressive power and by optimization of queries, using indexes and other means. However, sophisticated analysis is required in order to take adva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From formal specifications to natural language: a case study

    Publication Year: 1997, Page(s):309 - 310
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (156 KB)

    Because software specifications often serve as a formal contract between the developer and the customer, systems have been proposed that help the software client better understand specifications by automatically paraphrasing them in natural language. The REVIEW system applies natural language generation within Metaview, a metasystem that facilitates the construction of CASE environments to support... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formally specifying engineering design rationale

    Publication Year: 1997, Page(s):317 - 318
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (176 KB)

    This paper briefly describes our initial experiences in applied research of formal approaches to the generation and maintenance of software systems supporting structural engineering tasks. We describe the business context giving rise to this activity, and give an example of the type of engineering problem we have focused on. We briefly describe our approach to software generation and maintenance, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reactive system validation using automated reasoning over a fragment library

    Publication Year: 1997, Page(s):299 - 300
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (176 KB)

    While a user might be able to confidently validate a generalized fragment by inspection, since calling an off-hook user should result in a busy signal (when the system only has one line per user), more complex behavior can be impractical to validate by inspection. This is particularly true when the fragment describes an intermediate protocol step, for example, because correctness is often stated i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping software architectures to efficient implementations via partial evaluation

    Publication Year: 1997, Page(s):183 - 192
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (964 KB)

    Flexibility is recognized as a key feature in structuring software, and many architectures have been designed to that effect. However, they often come with performance and code size overhead, resulting in a flexibility vs. efficiency dilemma. The source of inefficiency in software architectures can be identified in the data and control integration of components, because flexibility is present not ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting domain-specific knowledge to refine simulation specifications

    Publication Year: 1997, Page(s):117 - 124
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1212 KB)

    Discusses our approach to the problem of refining high-level simulation specifications. Our domain is simulated combat training for tank platoon members. Our input is a high-level specification for a training scenario and our output is an executable specification for the behavior of a network-based combat simulator. Our approach combines a detailed model of the tank training domain with nonlinear ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Precise specification and automatic application of design patterns

    Publication Year: 1997, Page(s):143 - 152
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (744 KB)

    Despite vast interest in design patterns, the specification and application of patterns is generally assumed to rely on manual implementation. We describe a precise method of specifying how a design pattern is applied: by phrasing it as an algorithm in a meta-programming language. We present a prototype of a tool that supports the specification of design patterns and their realization in a given p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research directions for automated software verification: using trusted hardware

    Publication Year: 1997, Page(s):274 - 279
    Cited by:  Papers (2)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (508 KB)

    Service providers hosting software on servers at the request of content providers need assurance that the hosted software has no undesirable properties. This problem applies to browsers which host applets, networked software which can host software agents, etc. The hosted software's properties are currently verified by testing and/or verification processes by the hosting computer. This increases c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metric-based approach to detect abstract data types and state encapsulations

    Publication Year: 1997, Page(s):82 - 89
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (632 KB)

    This article presents an approach to identify abstract data types (ADT) and abstract state encapsulations (ASE, also called abstract objects) in source code. This approach groups together functions, types, and variables into ADT and ASE candidates according to the proportion of features they share. The set of features considered includes the context of these elements, the relationships to their en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Declarative specification of software architectures

    Publication Year: 1997, Page(s):201 - 208
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (632 KB)

    Scaling formal methods to large, complex systems requires methods of modeling systems at high levels of abstraction. In this paper, we describe such a method for specifying system requirements at the software architecture level. An architecture represents a way breaking down a system into a set of interconnected components. We use architecture theories to specify the behavior of a system in terms ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal automated approach for reverse engineering programs with pointers

    Publication Year: 1997, Page(s):219 - 226
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (676 KB)

    Given a program S and a precondition Q, the strongest postcondition, denoted sp(S,Q), is defined as the strongest condition that holds after the execution of S, given that S terminates. By defining the formal semantics of each of the constructs of a programming language, a formal specification of the behavior of a program written using the given programming language can be constructed. In this pap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.