Notice
There is currently an issue with the citation download feature. Learn more

IEEE Software

Issue 1 • Jan. 1990

Filter Results

Displaying Results 1 - 16 of 16
  • Reverse engineering and design recovery: a taxonomy

    Publication Year: 1990, Page(s):13 - 17
    Cited by:  Papers (678)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB)

    The key to applying computer-aided software engineering to the maintenance and enhancement of existing systems lies in applying reverse-engineering approaches. However, there is considerable confusion over the terminology used in both technical and marketplace discussions. The authors define and relate six terms: forward engineering, reverse engineering, redocumentation, design recovery, restructu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Viewing maintenance as reuse-oriented software development

    Publication Year: 1990, Page(s):19 - 25
    Cited by:  Papers (83)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB)

    The author presents a high-level organizational paradigm for development and maintenance in which an organization can learn from development and maintenance tasks and then apply that paradigm to several maintenance process models. Associated with the paradigm is a mechanism for setting measurable goals, making it possible to evaluate the process and the product and learn from experience. He discus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error density and size in Ada software

    Publication Year: 1990, Page(s):26 - 30
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (685 KB)

    The author and her colleagues have completed the development of a large project written in Ada. The project team kept error reports, and the many modules ranged greatly in size. They analyzed module size to see if there was a relationship with module quality. They used error density-defects per thousand lines-as an inverse measure of quality: the lower the error density, the higher the quality. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for selective revalidation

    Publication Year: 1990, Page(s):31 - 36
    Cited by:  Papers (52)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (698 KB)

    The authors address the question of how to decide which test cases to rerun after a modification. They emphasize that it is important that these tests be selected systematically, because executing an entire test suite to validate a few modifications can consume large amounts of time and computational resources and involve many people, and it is unreliable to exercise a system by selecting test cas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The book paradigm for improved maintenance

    Publication Year: 1990, Page(s):39 - 45
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    The authors propose a book paradigm of program formatting that they believe is the most appropriate typographic organization of source-code documents. The authors claim that their approach offers the following advantages: an easily recognized document paradigm; high-level organizational clues about the code; low-level organization chunks and beacons; and multiple access paths by way of the table o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognizing design decisions in programs

    Publication Year: 1990, Page(s):46 - 54
    Cited by:  Papers (34)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1190 KB)

    The authors present a characterization of design decisions that is based on the analysis of programming constructs. The characterization underlies a framework for documenting and manipulating design information to facilitate maintenance and reuse activities. They identify and describe the following categories of design decisions: composition and decomposition; encapsulation and interleaving; gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using function abstraction to understand program behavior

    Publication Year: 1990, Page(s):55 - 63
    Cited by:  Papers (52)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (776 KB)

    The authors explain how to understand programs by abstracting program function. This abstraction is made possible by the algebraic structure and mathematical properties of structured programs. They describe an abstraction algorithm that provides a basis for a tool for automatic abstraction of program functions. They also explore what the goals of a program-abstraction tool should be. A miniature C... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting and restructuring the design of large systems

    Publication Year: 1990, Page(s):66 - 71
    Cited by:  Papers (103)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    Extraction of the structural and, to a lesser degree, functional and dynamic properties of systems composed of modules and subsystems is treated. The process is equivalent to reverse engineering a system-level design description. The approach used is to map the resource exchange among modules and then derive a hierarchical design description using a system-restructuring algorithm. The medium for t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge-based program analysis

    Publication Year: 1990, Page(s):74 - 81
    Cited by:  Papers (78)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (951 KB)

    Automatic program analysis is regarded here as both the mechanized process of understanding high-level concepts from program text and the use of those concepts to guide program maintenance. A knowledge-based program analysis tool called PAT, which realizes this concept, is described. PAT uses an object-oriented framework to represent programming concepts and a heuristic-based concept-recognition m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognizing a program's design: a graph-parsing approach

    Publication Year: 1990, Page(s):82 - 89
    Cited by:  Papers (93)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (683 KB)

    Psychological experiments have shown that programmers tend to use the same structure over and over. The authors call these commonly used programming structures 'cliches'. They describe a prototype, the Recognizer, that automatically finds all occurrences of a given set of cliches in a program and builds a hierarchical description of the program in terms of the cliches it finds. The key to the Reco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse-engineering someone else's software: is it legal?

    Publication Year: 1990, Page(s):90 - 96
    Cited by:  Papers (9)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (969 KB)

    The author covers the legal issues of reverse-engineering someone else's software, explaining what reverse-engineering activities the courts have found to be acceptable and what legal applications are for the knowledge you gained from reverse engineering. She also defines 'reverse engineering' and presents two theories regarding its use: the strict-constructionist theory, which holds that reverse-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating the cost/schedule trade-off in software development

    Publication Year: 1990, Page(s):97 - 105
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1030 KB)

    The author has studied the effects of schedule compression or stretch-out on total project cost within a much broader effort to study and predict the dynamics of the entire development process. The resulting cost/schedule tradeoffs were examined. Much of this project involved developing a comprehensive system-dynamics model. He used the model to conduct three simulation experiments. (1) He investi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for distributed debugging

    Publication Year: 1990, Page(s):106 - 115
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1166 KB)

    The authors provide a general picture of current research in distributed debugging. Rather than an exhaustive survey of the area, they present a view of the issues and solutions based on a proposed framework for distributed debugging systems. They concentrate on runtime debugging. However, they stress that static debugging and runtime debugging complement each other and that neither should be over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human factors-pruning your program's unused functions

    Publication Year: 1990, Page(s):122 - 124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    The author cites a common finding of human factors research on software that about 10% of the functions account for almost 90% of the product's use. She discusses the negative effect of having many features that are seldom used, namely: the product is (usually) more expensive; programs require more memory; the product is harder to use; the documentation is more bulky, which makes it more difficult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments, with reply, on 'Structured flowcharts outperform pseudocode: an experimental comparison'

    Publication Year: 1990
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB)

    The commentor contends that the title of the above mentioned article (ibid., vol.7, no.5, p.28-36, Sept. 1989) is misleading if Fig. 2-4 give a true representation of the information given to the experiment's subjects. He states that the experiment seems to compare flowcharts to a form of poetry that has yet to become popular. The author apologizes for not fully explaining why he used the particul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software manager-the nature of change agents

    Publication Year: 1990, Page(s):125 - 126
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    The author discusses people who assume or are charged with the responsibility of transforming their environment into a more effective one. She describes what change agents do and how the gain and maintain support. The tells managers how to identify and make effective use of them. She also describes how change agents affect the corporation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org