By Topic

IEEE Transactions on Software Engineering

Issue 2 • Date Feb. 1988

Filter Results

Displaying Results 1 - 13 of 13
  • An expert database design system based on analysis of forms

    Publication Year: 1988, Page(s):242 - 253
    Cited by:  Papers (40)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1189 KB)

    A form model and an expert database system that analyzes instances of the form model to derive a conceptual schema are proposed. The form model describes the properties of form fields such as their origin, hierarchical structure, and cardinality. The expert database design system creates a conceptual schema by incrementally integrating related collections of forms. The rules of the expert systems ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A relational algebraic approach to protocol verification

    Publication Year: 1988, Page(s):184 - 193
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Communications protocols are usually modeled by a pair of finite-state machines that generate the interaction between processes. Protocol verification is a procedure to validate the logical correctness of these interaction sequences and to detect potential design errors. A relational approach is proposed to represent a finite-state machine as a transition table. On this basis, the well-established... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A taxonomy of scheduling in general-purpose distributed computing systems

    Publication Year: 1988, Page(s):141 - 154
    Cited by:  Papers (363)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1404 KB)

    One measure of the usefulness of a general-purpose distributed computing system is the system's ability to provide a level of performance commensurate to the degree of multiplicity of resources present in the system. A taxonomy of approaches to the resource management problem is presented in an attempt to provide a common terminology and classification mechanism necessary in addressing this proble... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The formal specification of a small bookshop information system

    Publication Year: 1988, Page(s):263 - 272
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    A specification, and its development, for a small bookshop information system are discussed. the specification is presented using mathematics and the scheme calculus of C. Morgan and B. Sufrin (see ibid., vol.SE-10, no.2, p.128-142, 1984). An insight is given into how the specification was developed and why a formal specification is appropriate View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algebra for data flow diagram process decomposition

    Publication Year: 1988, Page(s):169 - 183
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    Data flow diagram process decomposition, as applied in the analysis phase of software engineering, is a top-down method that takes a process, and its input and output data flows, and logically implements the process as a network of smaller processes. The decomposition is generally performed in an ad hoc manner by an analyst applying heuristics, expertise, and knowledge to the problem. An algebra t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph directed locking

    Publication Year: 1988, Page(s):133 - 140
    Cited by:  Papers (5)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB)

    A non-two-phase database concurrency control technique is introduced. The technique is deadlock-free, places no restrictions on the structure of the data, never requires data to be reread, never forces a transaction to be rolled back in order to achieve serializability, applies a type of lock conversion, and allows items to be released to subsequent transactions as soon as possible. The method int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving abstraction in concurrent programming

    Publication Year: 1988, Page(s):258 - 263
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    Recent programming languages have attempted to provide support for concurrency and for modular programming based on abstract interfaces. Building on experience of adding monitors to CLU, a language oriented towards data abstraction, it is explained how these two goals conflict. In particular, the clash between conventional views on interface abstraction and the programming style required for avoid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated software design assistant

    Publication Year: 1988, Page(s):194 - 210
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1268 KB)

    An automated software design assistant was implemented as a part of a long-term project with the objectives of applying the computer-aided technique to the tools in a software engineering environment. A set of quantitative measures are derived based on the degree to which a particular design satisfied the attributes associated with a structured software design. The measure are then used as decisio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing shadow recovery algorithms

    Publication Year: 1988, Page(s):155 - 168
    Cited by:  Papers (5)  |  Patents (188)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    Experiments conducted on a database testbed at Princeton indicate excessive page-table I/O is the major performance drawback of shadow recovery. In light of this, a method for parameterizing shadow recovery that minimize page-table I/O without sacrificing to much disk utilization is proposed. Using a simple model, the mechanism is analyzed and evaluated, comparing it to two conventional ones View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reasoning about interactive system

    Publication Year: 1988, Page(s):272 - 276
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    Interactive systems have goals and characteristics that differ from those of batch systems. These differences lead to a need for new techniques, methods, and tools for manipulating and constructing interactive systems. The difference in structure between batch and interactive systems. The difference is considered, focusing on the distinction between command decomposition and component decompositio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependence directed reasoning and learning in systems maintenance support

    Publication Year: 1988, Page(s):211 - 227
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1388 KB)

    The maintenance of large information systems involves continuous modifications in response to evolving business conditions or changing user requirements. Based on evidence from a case study, it is shown that the system maintenance activity would benefit greatly if the process knowledge reflecting the teleology of a design could be captured and used in order to reason about he consequences of chang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DEVS formalism: a framework for hierarchical model development

    Publication Year: 1988, Page(s):228 - 241
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (900 KB)

    A methodology is being developed to map hierarchical, modular discrete event models onto distributed simulator architectures. Concept developed for the first step of the methodology concerning model representation are discussed. The DEVS (Discrete Event System Specification) is extended to facilitate modular, hierarchical model specification. Procedures for top-down model development are expressed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of field service on software reliability

    Publication Year: 1988, Page(s):254 - 258
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    The reliability of a program, when many copies are run in a multisite environment with the support of a software service organization, depends on the inherent reliability of the program and certain characteristics of the service organization. Here, a small number of parameters that determine the relevant characteristics of the service organization are identified, and their effects on the reliabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org