By Topic

Software Engineering, 1994. Proceedings. ICSE-16., 16th International Conference on

Date 16-21 May 1994

Filter Results

Displaying Results 1 - 25 of 45
  • Proceedings of 16th International Conference on Software Engineering

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (438 KB)
    Freely Available from IEEE
  • Software architecture: practice, potential, and pitfalls

    Publication Year: 1994, Page(s):363 - 364
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Whatever the long-term impact of software architecture may turn out to be, an appropriate starting point is a concrete appraisal of the current state of the practice in the use of software architecture. It is the purpose of the article to take a step in this direction. It provides concrete examples of what is now possible when architectural principles are applied to industrial problems in systemat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • software engineering and artificial intelligence

    Publication Year: 1994, Page(s):353 - 354
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop on software engineering and computer-human interaction: joint research issues

    Publication Year: 1994, Page(s):356 - 357
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    Software engineering and computer-human interaction have much to do with each other, but their respective research communities typically have little interaction. The purpose of the article is to explore the intersections of these areas, determining what each community has to offer the other as well as to identify and address open problems of mutual interest. Topics of discussion were drawn from th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The SMART approach for software process engineering

    Publication Year: 1994, Page(s):341 - 350
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (744 KB)

    Describes a methodology for software process engineering and an environment, SMART, that supports it. SMART supports a process life-cycle that includes the modeling, analysis, and execution of software processes. SMART's process monitoring capabilities can be used to provide feedback from the process execution to the process model. SMART represents the integration of three separately developed pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated construction of testing and analysis tools

    Publication Year: 1994, Page(s):241 - 250
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (952 KB)

    Many software testing and analyse's tools manipulate graph representations of programs, such as abstract syntax trees or abstract semantics graphs. Hand-crafting such tools in conventional programming languages can be difficult, error prone, and time consuming. Our approach is to use application generators targeted for the domain of graph-representation-based testing and analysis tools. Moreover, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the inference of configuration structures from source code

    Publication Year: 1994, Page(s):49 - 57
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    We apply mathematical concept analysis to the problem of inferring configuration structures from existing source code. Concept analysis has been developed by German mathematicians over the last years; it can be seen as a discrete analogon to Fourier analysis. Based on this theory, our tool will accept source code, where configuration-specific statements are controlled by the preprocessor. The algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A process for hitting paydirt

    Publication Year: 1994, Page(s): 369
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reuse - facts and myths

    Publication Year: 1994, Page(s):267 - 268
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    The concept of systematic software reuse is simple: the idea of building and using “software preferred parts.” By building systems out of carefully designed, pre-tested components, one will save the cost of designing, writing and testing new code. The practice of reuse has not proven to be this simple however, and there are many misconceptions about how to implement and gain benefit fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reuse experience at Hewlett-Packard

    Publication Year: 1994
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    At Hewlett-Packard, we have had visible divisional software reuse efforts since the mid-1980s. In 1990, we initiated a multi-faceted corporate reuse program to gather information about reuse from within HP and from other companies. As we studied the existing reuse programs, we discovered that certain issues were poorly understood, and as a consequence, mistakes were made in starting and running ce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What small businesses and small organizations say about the CMM

    Publication Year: 1994, Page(s):331 - 340
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    The US Air Force sponsored research within the Department of Defense software development community to determine the applicability of the Software Engineering Institute's capability maturity model (CMM) for software to small businesses and small software organizations. The research found that small businesses are faced not only with a lack of resources and funds required to implement many of the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated method for effective behaviour analysis of distributed systems

    Publication Year: 1994, Page(s):309 - 320
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB)

    Behavioural analysis is a valuable aid for the design and maintenance of well-behaved distributed systems. Dataflow and reachability analyses are two orthogonal, but complementary, behavioural analysis techniques. Individually, each of these techniques may be inadequate for the analysis of large-scale distributed systems. On the one hand, dataflow analysis algorithms, while tractable, may not be s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiments on the effectiveness of dataflow- and control-flow-based test adequacy criteria

    Publication Year: 1994, Page(s):191 - 200
    Cited by:  Papers (218)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    This paper reports an experimental study investigating the effectiveness of two code-based test adequacy criteria for identifying sets of test cases that detect faults. The all-edges and all-DUs (modified all-uses) coverage criteria were applied to 130 faulty program versions derived from seven moderate size base programs by seeding realistic faults. We generated several thousand test sets for eac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A programmer performance measure based on programmer state transitions in testing and debugging process

    Publication Year: 1994, Page(s):123 - 132
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (724 KB)

    To organize and manage software development teams, it as important to evaluate the capability of each programmer based on reliable and easily collected data. We present a system which automatically monitors programmer activities, and propose a programmer debugging performance measure based on data monitored by the system. The system automatically categorizes programmer activity in real time into t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storing and retrieving software components: a refinement based system

    Publication Year: 1994, Page(s):91 - 100
    Cited by:  Papers (16)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Software reuse poses a number of challenges, ranging from managerial to technical - not least of these is the problem of storing and retrieving software components in a time efficient manner. This paper presents the design and implementation of an automated software repository, where software components can be automatically stored and retrieved. This repository is based on a formal representation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A periodic object model for real-time systems

    Publication Year: 1994, Page(s):291 - 300
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Time-sensitive objects (TSO), a data-oriented model for real-time systems, impose timing constraints on object values using validity intervals and object histories. Periodic objects, a class of objects within the TSO model, are described in detail and compared with more traditional periodic processes. Advantages of periodic objects are identified, including greater scheduling independence of proce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of testing methodologies in open systems standards

    Publication Year: 1994, Page(s):233 - 240
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    This paper describes the lifecycle role of a conformance testing research facility in the open systems standards environment. This facility, the Clemson Automated Testing System (CATS), has demonstrated the value of integrating formalized test methods within all phases of standards development. IEEE's effort to develop a standard for operating systems interfaces (POSIX) has provided a working envi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comprehension processes during large scale maintenance

    Publication Year: 1994, Page(s):39 - 48
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    We present results of observing professional maintenance engineers working with industrial code at actual maintenance tasks. Protocol analysis is used to explore how code understanding might differ for small versus large scale code. The experiment confirms that cognition processes work at all levels of abstraction simultaneously as programmers build a mental model of the code. Cognition processes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software process description using LOTOS and its enaction

    Publication Year: 1994, Page(s):169 - 178
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    Software processes can be treated as cooperative works among several engineers. In order to enact a software process in a distributed environment, the engineers must communicate with each other for exchanging data values and synchronization messages. Such communications should be described in a process description for enacting the process automatically and clarifying the engineers' work. Since the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architectures: critical success factors and cost drivers

    Publication Year: 1994
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    Some useful perspectives on the potential and the pitfalls of software architecture investments can be gained via analysis of software architecture critical success factors and their associated cost and benefit drivers. Basically, the potential of software architecture investments comes from appropriately identifying and exploiting positive cost-benefit relationships. The pitfalls come from neglec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop on the intersection between databases and software engineeering

    Publication Year: 1994, Page(s): 355
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed software engineering

    Publication Year: 1994, Page(s):253 - 263
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (980 KB)

    The term “distributed software engineering” is ambiguous. It includes both the engineering of distributed software and the process of distributed development of software, such as cooperative work. This paper concentrates on the former, giving an indication of the special needs and rewards in distributed computing. In essence, we argue that the structure of these systems as interacting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualizing software systems

    Publication Year: 1994, Page(s):59 - 67
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    There are many graphical techniques for visualizing software. Unfortunately, the current techniques do not scale to display large software systems and are largely unused. We present a method for visualizing statistics associated with code that is divided hierarchically into subsystems, directories, and files. Using this technique, we can display the relative sizes of the components in the system, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Facts and myths affecting software reuse

    Publication Year: 1994
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Discusses the three most important facts or myths affecting reuse. There is a great deal of misunderstanding about reuse in the software domain and it is difficult to pick out only three: there has been to much emphasis on the reuse of code; software reuse implies some form of modification of the artifact being reused; and software development processes do not explicitly support reuse, in fact the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reuse myths revisited

    Publication Year: 1994, Page(s):271 - 272
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    In ACM Software Engineering Notices, vol. 13, no. 1, pp. 17-21 (1988), the author published the paper “Software reuse myths”. This paper comments on these “myths” in the light of recent technology advances: (1) software reuse is a technical problem; (2) special tools are needed for software reuse; (3) reusing code results in huge increases in productivity; (4) artificial in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.