By Topic

Software, IEEE

Issue 1 • Date Jan.-Feb. 1997

Filter Results

Displaying Results 1 - 18 of 18
  • What if there were no software piracy?

    Publication Year: 1997, Page(s):20 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB)

    Software companies often perceive loss to piracy as a routine cost of doing business, but it is a huge one: in 1996, the software industry lost $15.2 billion worldwide to theft. If you are a software developer, some part of this loss is yours. If it were within your power to stop piracy, what would you gain? You must answer this question before you can make rational decisions on whether to condone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why Explore Object Mathods, Patterns, and Architectures?

    Publication Year: 1997, Page(s):27 - 29
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investing in a European Test-Tools Tome

    Publication Year: 1997, Page(s):86 - 87
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • DTV Agreement Good for Software Developers

    Publication Year: 1997, Page(s):88 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (113 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storm Offers Main Excitement at Biggest Conmdex Yet

    Publication Year: 1997, Page(s):91 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The fundamentals of information security

    Publication Year: 1997, Page(s):15 - 16, 60
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Some quality models, such as IS0 9126, fail to include computer security. The author explains why security is an essential but difficult facet of quality. As a software professional, you can take several actions to improve the security of your code: (1) learn the techniques of security; (2) when incorporating security features into a system, think like the attacker, i.e. consider each point as a p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive design of an application-independent architecture

    Publication Year: 1997, Page(s):61 - 72
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    The authors' development method focuses on a systematic process using precise specification of system components to create application-independent architectures with a high degree of automation-achieved through large-scale code generation-and broad applicability, focusing on real-time systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The use and misuse of focus groups

    Publication Year: 1997, Page(s):94 - 95
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Focus groups are a somewhat informal technique that can help you assess user needs and feeling both before interface design and long after implementation. In a focus group, you bring together six to nine users to discuss issues and concerns about the features of a user interface. The group typically lasts about two hours and is run by a moderator who maintains the group's focus. Focus groups often... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural styles, design patterns, and objects

    Publication Year: 1997, Page(s):43 - 52
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    Architectural styles, object-oriented design and design patterns all hold promise as approaches that simplify software design and reuse by capturing and exploiting system design knowledge. This article explores the capabilities and roles of the various approaches, their strengths and their limitations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in software inspection

    Publication Year: 1997, Page(s):18 - 19
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    In manufacturing, agriculture and transportation, inspections are a routine part of business, making our lives safer and more comfortable. Yet in software, we generally leave inspections to companies that are quite advanced in their process maturity. Why do most companies skip inspections when their is so much to gain? In 1991, the author began the National Software Quality Experiment, an ongoing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified object topology

    Publication Year: 1997, Page(s):31 - 35
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    To navigate the object, pattern and architecture fields, the authors have developed a unified object topology, which uses a technology's domain dependency and implementation details to organize relationships with other technologies and to identify how the system will evolve. It also supports object repositories and identifies future research directions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using patterns to improve our architectural vision

    Publication Year: 1997, Page(s):53 - 59
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Pattern languages can play an important role in furthering the use of architecture and objects in software design, but first we must understand what these terms mean. The authors use the work of Christopher Alexander (1975, 1979, 1981, 1985) to illuminate the problems and shed light on future directions in our use of pattern languages in design View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal methods: promises and problems

    Publication Year: 1997, Page(s):73 - 85
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    Successfully applying formal methods to software development promises to move us closer to a true engineering discipline. The authors offer suggestions for overcoming the problems that have hindered the use of formal methods thus far View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Idioms and patterns as architectural literature

    Publication Year: 1997, Page(s):36 - 42
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    If patterns are not about objects, and if they reach beyond software architecture, then what is a pattern? The author explores the relationships that might exist between objects, patterns and architecture, then examines their implications for software developers View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Successfully implementing configuration management

    Publication Year: 1997, Page(s):98 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (116 KB)

    To increase product quality, development efficiency, and enterprise profitability, many organizations are striving to achieve repeatable, engineered software development processes. Effective configuration management is essential to reaching this goal. CM can organize project components and streamline and control software development processes. A fully deployed and integrated CM solution consists o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Annualized software delivery

    Publication Year: 1997
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB)

    Projects in the commercial software industry are often characterized by frenzied attempts to leapfrog the competition. Companies try to deliver innovative products quickly, and in their ill-fated attempts to serve two masters, both development time and product innovation suffer. A history of the GigaCorp company describes the current situation in more detail View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Professionalism through OO and reuse

    Publication Year: 1997
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    The trend towards the reuse of software components through design patterns, class libraries, and frameworks continues and will greatly influence future software development. One expected impact of component reuse is that software will increasingly be viewed as a resource to be used rather than as something to be produced. The paper considers how the object oriented approach can contribute greatly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Superdistribution and the economics of bits

    Publication Year: 1997, Page(s):22 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Why is the engineering and distribution of software fundamentally different from the engineering and distribution of other engineered objects? The author presents a unique answer to this question-an answer that could lead to a fundamental change in the way that software professionals view their creations and software marketers sell them. The infrastructure he proposes would make it feasible to buy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org