By Topic

IEEE Software

Issue 4 • July-Aug. 1999

Filter Results

Displaying Results 1 - 20 of 20
  • Certification: reducing the hidden costs of poor quality

    Publication Year: 1999, Page(s):22 - 25
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understandable and usable OO textbook

    Publication Year: 1999, Page(s): 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decrypting the past and exploring the future

    Publication Year: 1999, Page(s):114 - 115
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software engineering - a broad picture of the discipline

    Publication Year: 1999, Page(s):115 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System insecurity in the Internet age

    Publication Year: 1999, Page(s):62 - 69
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    The general-purpose computing environment that characterizes the PC and Internet was not designed for privacy or integrity. Surveying a variety of Internet targets, the author discusses likely attackers and their techniques. He offers defense mechanisms for protecting system integrity and blocking such attacks View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing user requirements by use cases: a goal-driven approach

    Publication Year: 1999, Page(s):92 - 101
    Cited by:  Papers (64)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    The purpose of requirements engineering is to elicit and evaluate necessary and valuable user needs. Current use-case approaches to requirements acquisition inadequately support use-case formalization and nonfunctional requirements. Based on industry trends and research, the authors have developed a method to structure use-case models with goals. They use a simple meeting planner system to illustr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certifying software for high-assurance environments

    Publication Year: 1999, Page(s):48 - 54
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    It does not make sense to grant carte blanche high-assurance certificates to product that may be used across multiple platforms and in multiple environments. We should bind software certification to a product's known environment and operational profile. The author proposes three techniques for verifying high assurance: desirable-behavior testing, abnormal testing, and fault injection. Each uses th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software security in an Internet world: an executive summary

    Publication Year: 1999, Page(s):58 - 61
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    Businesses of all sizes use the Internet for sales, purchasing, and collaborations. They all need reliable systems. Faced with substantial numbers of reported security problems, Internet users must decide how much risk they are willing to take to participate in what the Internet world offers. After presenting the scope and origin of the Net's security problems, the authors outline three immediate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mastering the middleware muddle

    Publication Year: 1999, Page(s):18 - 21
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    For many software-development managers, staying abreast of the many new technologies that affect the systems we build is nearly impossible. One of the most complex and confusing technology areas is middleware-the cornerstone required to build enterprise-scale distributed systems. Within this esoteric technology domain, it's all too easy to hold up our hands and declare that the outlook is bleak fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stages of team development

    Publication Year: 1999, Page(s):90 - 91
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    Everyone wants to work with team players. Check out the advertisements for employment opportunities and you will find “must be a team player” is high on most software engineering job requirements. This is the case even though software engineering is thought of as a solitary activity that attracts a large number of introverts. Nevertheless, most software-related jobs are not solitary an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward credible IT testing and certification

    Publication Year: 1999, Page(s):39 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    Accessible, rigorous measurement and test methods are key to creating quality software and increasing IT market competition. At the US National Institute of Standards and Technology's Information Technology Laboratory, work focuses on establishing comprehensive certification capability for the IT industry. This article describes NIST's work and how it can be applied View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivable network system analysis: a case study

    Publication Year: 1999, Page(s):70 - 77
    Cited by:  Papers (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    The Survivable Network Analysis method permits assessment of survivability at the architecture level. Steps include system mission and architecture definition, essential capability definition, compromisable capability definition, and survivability analysis of architectural soft-spots that are both essential and compromisable. The article summarizes application of the method to a subsystem of a lar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using patterns to model variability in product families

    Publication Year: 1999, Page(s):102 - 108
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    A product family can generate significant savings in cost and time by permitting software component reuse. The authors have developed a simple method of product family engineering using patterns to model variability and tested it on the European Space Operations Centre new mission planning software system with positive results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Third-party testing and the quality of software components

    Publication Year: 1999, Page(s):55 - 57
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB)

    One of the greatest fears of emerging professional disciplines is that governmental actions-court decisions and third-party standards-will preempt the profession's active participation in legislative and regulatory processes. Indeed, software engineering standards, such as the Underwriters Laboratories' Standard for Safety-Related Software (UL 1998, first and second editions), have preceded the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software process improvement in Web time

    Publication Year: 1999, Page(s):78 - 86
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Process engineering is sometimes seen as a luxury relevant only to large software projects with long time frames. This article shows otherwise; the Web development group it describes tackled several aspects of project management, change control, requirements engineering, and quality practices, reaping both tangible and cultural benefits within five months View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using immersive virtual environments for certification

    Publication Year: 1999, Page(s):26 - 30
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    As virtual environments move from research laboratories to commercial use, there is a need to define the appropriate role of VEs in certifying the systems they simulate. This article describes the unique features of this developing technology, as well some key issues to consider when using VEs for certification View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global R&D: how to break barriers

    Publication Year: 1999, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    As a company grows beyond its national borders, it starts exporting its products. It first establishes foreign sales organizations, followed by manufacturing operations, which are usually driven by labor or other cost considerations. The next step is product marketing and localization, often coupled with building local product design centers. The last stage of this globalization or transnationaliz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does the Patent Office respect the software community?

    Publication Year: 1999, Page(s):87 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    The US Patent and Trademark Office (PTO) is now issuing about 20,000 new software patents every year-a tenfold increase in the last six years. Considering these inexplicable numbers, the IEEE, the ACM, and similar organizations should ask the PTO on what basis it thinks there are 20,000 novel and not obvious software inventions each year. The Japanese and European patent offices are demonstrating ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cobol: a historic past, a vital future?

    Publication Year: 1999, Page(s):120, 118 - 119
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    One of the strangest stories in the software world centers around the programming language Cobol. Academics have reviled it for decades; its demise has been predicted since the 1960s; industry gurus have suggested that programmers who know only Cobol are committing career suicide. You would think, based on all this bad press, that Cobol was not long for this software world. Yet the giant lumbers o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software safety certification: a multidomain problem

    Publication Year: 1999, Page(s):31 - 38
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB)

    Multidomain software-intensive system certification is a growing concern in international standards organizations. Certification is traditionally based on domain-specific technical and operational requirements, historical information about the reliability of the different subsystems, and historical accident data, but these may not be available for interdomain systems. There is a need for internati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org