By Topic

Software Engineering, 1999. Proceedings of the 1999 International Conference on

Date 22-22 May 1999

Filter Results

Displaying Results 1 - 25 of 114
  • Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002)

    Publication Year: 1999
    Save to Project icon | Request Permissions | PDF file iconPDF (450 KB)  
    Freely Available from IEEE
  • Using off-the-shelf middleware to implement connectors in distributed software architectures

    Publication Year: 1999 , Page(s): 3 - 12
    Cited by:  Papers (4)  |  Patents (5)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1524 KB)  

    Software architectures promote development focused on modular building blocks and their interconnections. Since architecture-level components often contain complex functionality, it is reasonable to expect that their interactions will also be complex. Modeling and implementing software connectors thus becomes a key aspect of architecture-based development. Software interconnection and middleware t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting ADLs to specify architectural styles induced by middleware infrastructures

    Publication Year: 1999 , Page(s): 13 - 22
    Cited by:  Papers (2)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1179 KB)  

    Architecture definition languages (ADLs) enable the formalization of the architecture of software systems and the execution of preliminary analyses on them. These analyses aim at supporting the identification and solution of design problems in the early stages of software development. We have used ADLs to describe middleware-induced architectural styles. These styles describe the assumptions and c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible approach to alliances of complex applications

    Publication Year: 1999 , Page(s): 23 - 32
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1032 KB)  

    Complex distributed environments contain thousands of workstations that can run hundreds of applications. Multiple networks are used to connect the workstations to dozens of behind-the-scenes servers, all of which are necessary for the user to perform even simple tasks. Such distributed environments are difficult to design and maintain, and current software engineering practices are not well adapt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systematic approach to derive the scope of software product lines

    Publication Year: 1999 , Page(s): 34 - 43
    Cited by:  Papers (5)  |  Patents (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1337 KB)  

    Product line scoping is a critical activity because it elicits the common realms upon which the different products of a product line can be optimally engineered with respect to economies of scope. This, in turn, upper bounds the overall economic benefits that can be accrued from product line based development. Inherently, product line scoping is difficult because of the complexity of the factors t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A language and environment for architecture-based software development and evolution

    Publication Year: 1999 , Page(s): 44 - 53
    Cited by:  Papers (10)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1476 KB)  

    Software architectures have the potential to substantially improve the development and evolution of large, complex, multi-lingual, multi-platform, long-running systems. However, in order to achieve this potential, specific techniques for architecture-based modeling, analysis, and evolution must be provided. Furthermore, one cannot fully benefit from such techniques unless support for mapping an ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with performing architecture tradeoff analysis

    Publication Year: 1999 , Page(s): 54 - 63
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1146 KB)  

    Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and they may not understand the impacts of their decisions. This paper describes the use of a scenario-based and model-based analysis technique for software architectures-called ATAM-that not only analyzes a software architectur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Smalltalk modules in a customizable programming environment

    Publication Year: 1999 , Page(s): 65 - 74
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1545 KB)  

    This paper describes how we extended a module structure of the Smalltalk LearningWorks framework to provide a programming environment designed for very large scale technology transfer. The 'module' is what we have termed the LearningBook, a set of classes and persistent objects, including an HTML browser, programming and visualization tools, and microworlds. The context for this development is a d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering issues for ubiquitous computing

    Publication Year: 1999 , Page(s): 75 - 84
    Cited by:  Papers (1)  |  Patents (2)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1085 KB)  

    In the last decade, we have experienced the advent of the paradigm of ubiquitous computing, with the goal of making computational services so pervasive throughout an environment that they become transparent to the human user. Research in ubiquitous computing raises many challenging issues for computer science in general, but successful research in ubiquitous computing requires the deployment of ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Splitting the organization and integrating the code: Conway's law revisited

    Publication Year: 1999 , Page(s): 85 - 95
    Cited by:  Papers (9)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1288 KB)  

    It is widely acknowledged that coordination of large scale software development is an extremely difficult and persistent problem. Since the structure of the code mirrors the structure of the organization, one might expect that splitting the organization across time zones, cultures, and (natural) languages would make it difficult to assemble the components. This paper presents a case study of what ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Avoiding packaging mismatch with flexible packaging

    Publication Year: 1999 , Page(s): 97 - 106
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1036 KB)  

    To integrate a software component into a system, it must interact properly with the system's other components. Unfortunately, the decisions about how a component is to interact with other components are typically committed long before the moment of integration and are difficult to change. This paper introduces the flexible packaging method, which allows a component developer to defer some decision... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • N degrees of separation: multi-dimensional separation of concerns

    Publication Year: 1999 , Page(s): 107 - 119
    Cited by:  Papers (22)  |  Patents (8)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1403 KB)  

    Done well, separation of concerns can provide many software engineering benefits, including reduced complexity, improved reusability, and simpler evolution. The choice of boundaries for separate concerns depends on both requirements on the system and on the kind(s) of decomposition and composition a given formalism supports. The predominant methodologies and formalisms available, however, support ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An initial assessment of aspect-oriented programming

    Publication Year: 1999 , Page(s): 120 - 130
    Cited by:  Patents (13)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1186 KB)  

    The principle of separation of concerns (E. Dijkstra, 1976) has long been used by software engineers to manage the complexity of software system development. Programming languages help software engineers explicitly maintain the separation of some concerns in code. As another step towards increasing the scope of concerns that can be captured cleanly within the code, G. Kiczales et al. (1997) have i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using the ASTRAL model checker to analyze Mobile IP

    Publication Year: 1999 , Page(s): 132 - 141
    Cited by:  Papers (3)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (981 KB)  

    ASTRAL is a high level formal specification language for real time systems. It is provided with structuring mechanisms that allow one to build modularized specifications of complex real time systems with layering. The ASTRAL model checker checks the satisfiability of critical requirements of a specification by enumerating possible runs of transitions within a given time bound. The paper discusses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decoupling synchronization from local control for efficient symbolic model checking of statecharts

    Publication Year: 1999 , Page(s): 142 - 151
    Cited by:  Papers (1)  |  Patents (2)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1114 KB)  

    Symbolic model checking is a powerful formal verification technique for reactive systems. We address the problem of symbolic model checking for software specifications written as statecharts. We concentrate on how the synchronization of statecharts relates to the efficiency of model checking. We show that statecharts synchronized in an oblivious manner, such that the synchronization and the local ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of a scheduler for a CAD framework

    Publication Year: 1999 , Page(s): 152 - 161
    Cited by:  Patents (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (978 KB)  

    The experience report describes a case study in which a key component of a software system was modeled and analyzed to better understand a proposed algorithm prior to implementation. A Promela model of a linear scheduler for a CAD framework was developed. The Spin simulator was used to debug the model and, later, to illustrate how the algorithm works in different scenarios. Additionally, the Spin ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic layout of distributed applications in FarGo

    Publication Year: 1999 , Page(s): 163 - 173
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1342 KB)  

    The design of efficient and reliable distributed applications that operate in large networks, over links with varying capacities and loads, demands new programming abstractions and mechanisms. The conventional static design-time determination of local-remote relationships between components implies that (dynamic) environmental changes are hard if not impossible to address without reengineering. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cooperative approach to support software deployment using the Software Dock

    Publication Year: 1999 , Page(s): 174 - 183
    Cited by:  Patents (40)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1237 KB)  

    Software deployment is an evolving collection of interrelated processes such as release, install, adapt, reconfigure, update, activate, deactivate, remove, and retire. The connectivity of large networks, such as the Internet, is affecting how software deployment is performed. It is necessary to introduce new software deployment technologies that leverage this connectivity. The Software Dock framew... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information survivability control systems

    Publication Year: 1999 , Page(s): 184 - 192
    Cited by:  Papers (1)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1043 KB)  

    We address the dependence of critical infrastructures-including electric power, telecommunications, finance and transportation-on vulnerable information systems. Our approach is based on the notion of control systems. We envision hierarchical, adaptive, multiple model, discrete state distributed control systems to monitor infrastructure information systems and respond to disruptions (e.g., securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight extraction of object models from bytecode

    Publication Year: 1999 , Page(s): 194 - 202
    Cited by:  Papers (4)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (840 KB)  

    A program's object model captures the essence of its design. For some programs, no object model was developed during design; for others, an object model exists but may be out of sync with the code. The paper describes a tool that automatically extracts an object model from the class files of a Java program. Although the tool performs only a simple, heuristic analysis that is almost entirely local,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Highly reliable upgrading of components

    Publication Year: 1999 , Page(s): 203 - 212
    Cited by:  Papers (11)  |  Patents (5)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1102 KB)  

    After a system is deployed, fixes, enhancements, and modifications all occur that change the components that make up the system. Unfortunately, new versions of components can introduce new errors and break existing, depended-upon behavior. When this happens, the old component version could have provided the correct behavior, but it is no longer part of the system. We propose a framework, HERCULES,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamically discovering likely program invariants to support program evolution

    Publication Year: 1999 , Page(s): 213 - 224
    Cited by:  Papers (14)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1361 KB)  

    Explicitly stated program invariants can help programmers by identifying program properties that must be preserved when modifying code. In practice, however, these invariants are usually implicit. An alternative to expecting programmers to fully annotate code with invariants is to automatically infer invariants from the program itself. This research focuses on dynamic techniques for discovering in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pattern-based reverse-engineering of design components

    Publication Year: 1999 , Page(s): 226 - 235
    Cited by:  Papers (1)  |  Patents (3)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1374 KB)  

    Many reverse-engineering tools have been developed to derive abstract representations from source code. Yet, most of these tools completely ignore recovery of the all-important rationale behind the design decisions that have lead to its physical shape. Design patterns capture the rationale behind proven design solutions and discuss the trade-offs among their alternatives. We argue that it is these... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic method refactoring using weighted dependence graphs

    Publication Year: 1999 , Page(s): 236 - 245
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1143 KB)  

    While refactoring makes frameworks more reusable, it is complex to do by hand. This paper presents a mechanism that automatically refactors methods in object-oriented frameworks by using weighted dependence graphs, whose edges are weighted based on the modification histories of the methods. To find the appropriate boundary between frozen spots and hot spots in the methods, the value of the weight ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying objects using cluster and concept analysis

    Publication Year: 1999 , Page(s): 246 - 255
    Cited by:  Papers (19)  |  Patents (2)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1004 KB)  

    Many approaches to support (semi-automatic) identification of objects in legacy code take data structures as the starting point for candidate classes. Unfortunately, legacy data structures tend to grow over time, and may contain many unrelated fields at the time of migration. We propose a method for identifying objects by semi-automatically restructuring the legacy data structures. Issues involved... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.