14th IEEE International Conference on Automated Software Engineering

12-15 Oct. 1999

Filter Results

Displaying Results 1 - 25 of 52
  • 14th IEEE International Conference on Automated Software Engineering

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1999, Page(s):339 - 340
    Request permission for commercial reuse | PDF file iconPDF (8 KB)
    Freely Available from IEEE
  • Modular and incremental analysis of concurrent software systems

    Publication Year: 1999, Page(s):92 - 101
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    Modularization and abstraction are the keys to practical verification and analysis of large and complex systems. We present in an incremental methodology for the automatic analysis and verification of concurrent software systems. Our methodology is based on the theory of abstract interpretation. We first propose a compositional data flow analysis algorithm that computes invariants of concurrent sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separating concerns in direct manipulation user interfaces

    Publication Year: 1999, Page(s):199 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Direct-manipulation user interfaces are difficult to implement as a tapered hierarchy. Features such as drag enabling and continuous graphical feedback require frequent interaction and collaboration among a large number of objects in multiple layers. These collaborations complicate the design of the interfaces in the various layers. We present a new component-interface model called a “mode c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AML: an Architecture Meta-Language

    Publication Year: 1999, Page(s):183 - 190
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    The language AML (Architecture Meta-Language) is used to specify the semantics of architecture description languages (ADLs). It is a very primitive language, having declarations for only three constructs: elements, kinds and relationships. Each of these constructs may be constrained via predicates in temporal logic. The essence of AML is the ability to specify structure and to constrain the dynami... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to automatic code generation for safety-critical systems

    Publication Year: 1999, Page(s):315 - 318
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB)

    Automated translation, or code generation, of a formal requirements model to production code can alleviate many of the problems associated with design and implementation. In this paper, we outline the requirements of such code generation to obtain a high level of confidence in the correctness of the translation process. We then describe a translator for a state-based modeling language called RSML ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving object-oriented designs with refactorings

    Publication Year: 1999, Page(s):174 - 181
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    Refactorings are behaviour-preserving program transformations that automate design-level changes in object-oriented applications. Our previous research established that many schema transformations, design patterns and hot-spot meta-patterns are automatable. This research evaluates whether refactoring technology can be transferred to the mainstream by restructuring non-trivial C++ applications. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining fault avoidance, fault removal and fault tolerance: an integrated model

    Publication Year: 1999, Page(s):137 - 146
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    Fault avoidance, fault removal and fault tolerance represent three successive lines of defense against the contingency of faults in software systems and their impact on system reliability. Beyond the colorful discussions of the relative merits of these techniques, the law of diminishing returns advocates that they be used in concert, where each is applied whenever it is most effective. Such a prem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UNA based iterative test data generation and its evaluation

    Publication Year: 1999, Page(s):224 - 232
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    A number of approaches have been proposed to automatically generate test data to traverse a given path in a program. We present a program execution based approach to generate test data for a given path. The technique derives a desired input for a test path by iteratively refining an arbitrarily chosen input. A set of linear constraints on the increments to the input are derived to refine the input... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards discovery, specification, and verification of component usage

    Publication Year: 1999, Page(s):331 - 334
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Impediments to software quality are exacerbated when applications-under-test are developed using component-based software engineering. Component misuse is one such impediment. Component misuse occurs when a component is used in a way that differs from the component producer's expectation. This paper explores the cause of the component misuse problem and proposes a technique to discover, specify, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A metric based technique for design flaws detection and correction

    Publication Year: 1999, Page(s):307 - 310
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (40 KB)

    During the evolution of object-oriented (OO) systems, the preservation of correct design should be a permanent quest. However, for systems involving a large number of classes and which are subject to frequent modifications, the detection and correction of design flaws may be a complex and resource-consuming task. Automating the detection and correction of design flaws is a good solution to this pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automatic and optimized test generation technique applying to TCP/IP protocol

    Publication Year: 1999, Page(s):73 - 80
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    In this paper an automatic and optimized technique for test generation for communication protocol control and data portion is described, the goal is to minimize the number of tests with a guaranteed coverage. The test generation algorithm is applied to the client layer part of the TCP/IP protocol. The protocol used for the experiment is TCP-Reno, which is specified in the SDL language and is one o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a constraint-based airlift scheduler by program synthesis from formal specifications

    Publication Year: 1999, Page(s):267 - 270
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    We describe the formal specification and automated synthesis of a strategic airlift scheduler for the Air Mobility Command of the US Air Force. The program synthesis system, the Kestrel Interactive Development System, composes a formal domain theory with a formal description of a class of algorithms (global search with constraint propagation) to produce provably correct and highly efficient code t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NAVCo: negotiation-based adaptive view coordination

    Publication Year: 1999, Page(s):327 - 330
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    In mission critical applications of distributed information systems, autonomous information resources are coordinated to meet the information demands of client specific decision-support views. The current approach to view coordination relies on design-time trade-offs to select a static view coordination policy from a set of available policies. This approach is not robust and does not respond well ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ML editor based on proofs-as-programs

    Publication Year: 1999, Page(s):166 - 173
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    CYNTHIA is a novel editor for the functional programming language ML in which each function definition is represented as the proof of a simple specification. Users of CYNTHIA edit programs by applying sequences of high-level editing commands to existing programs. These commands make changes to the proof representation from which a new program is then extracted. The use of pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software test generation using refinement types

    Publication Year: 1999, Page(s):279 - 282
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    A novel approach for automatic software test generation is presented, which combines ideas from structural and functional testing as well as formal verification methods. It involves as an intermediate step, the construction of graphs and refinement types, which can be regarded as an automatically constructed semi-specification and used for formal verification. The technique is illustrated using a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integration of deductive retrieval into deductive synthesis

    Publication Year: 1999, Page(s):52 - 61
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    Deductive retrieval and deductive synthesis are two conceptually closely related software development methods which apply theorem proving techniques to support the construction of correct programs. In this paper, we describe an integration of both methods which combines their complementary benefits and alleviates some of their drawbacks. The core of our integration is an algorithm which automatica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatically detecting mismatches during component-based and model-based development

    Publication Year: 1999, Page(s):191 - 198
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    A major emphasis in software development is placed on identifying and reconciling architectural and design mismatches. These mismatches happen during software development on two levels: while composing system components (e.g. COTS or in-house developed) and while reconciling view perspectives. Composing components into a system and `composing' views (e.g. diagrams) into a system model are often se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deductive synthesis of event-based software architectures

    Publication Year: 1999, Page(s):311 - 314
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB)

    Describes the application of the Rebound (REuse Based On UNDerstanding) framework to synthesize event-based software architectures. Within Rebound, deductive techniques are used to select components and wrap them for integration. The framework guides the selection of wrappers based on the problem specification and the components that are available for reuse. The wrapper specifications are used to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal ontology for re-use of software architecture documents

    Publication Year: 1999, Page(s):259 - 262
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Software architecture has been established as a viable level of representation for reuse in practical software engineering efforts. The main reason for this is that an architectural view of software is sufficiently abstract to have many instantiations. Even with technologies such as CORBA and JavaBeans, which emphasize reuse of components, the realization of widespread reuse has been severely limi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification of picture generated code

    Publication Year: 1999, Page(s):127 - 136
    Cited by:  Papers (4)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Tools such as Simulink(R) are being used by engineers around the world to model and solve real problems about dynamical systems. In particular control systems are modelled graphically, simulated and then code is generated automatically. Code generated from such a tool is being proposed for use in safety critical control systems. The problem for certifiers is why should they trust such generated co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploration harnesses: tool-supported interactive discovery of commercial component properties

    Publication Year: 1999, Page(s):7 - 14
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    A key problem in component-based software development (CBSD) is that developers have incomplete knowledge of components. In many cases, the only available source of such information is experimentation. In this paper we argue that the provision of tool support for automated and repeatable experiments can provide significant value to designers. Such tools, which we call exploration harnesses, promis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlled natural language can replace first-order logic

    Publication Year: 1999, Page(s):295 - 298
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Many domain specialists are not familiar or comfortable with formal notations and formal tools like theorem provers or model generators. To address this problem, we developed Attempto Controlled English (ACE), a subset of English that can be unambiguously translated into first-order logic and thus can conveniently replace first-order logic as a formal notation. We describe how ACE has been used as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach to software requirements elicitation using precepts from activity theory

    Publication Year: 1999, Page(s):15 - 23
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    The goal of this work is to show that precepts from activity theory can be used in software requirements elicitation. Thus, we propose an approach to requirements elicitation using principles from this theory. Initially, we mention common problems found in requirements elicitation. Then we explain the main precepts of activity theory. Finally, we present a case study using the suggested approach t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing effective automatic cryptographic protocol analysis

    Publication Year: 1999, Page(s):319 - 322
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    A cryptographic protocol is a short series of message exchanges, usually involving encryption, intended to establish secure communication over an insecure network. A protocol fails if an active wiretapper can obtain confidential information or impersonate a legitimate user, without performing cryptanalysis, by blocking, replaying, relabeling or otherwise modifying messages. Since the number of pos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.