By Topic

IEEE Software

Issue 1 • Date Jan.-Feb. 2003

Filter Results

Displaying Results 1 - 21 of 21
  • Guest editor's introduction - RE 02: a major step toward a mature requirements engineering community

    Publication Year: 2003, Page(s):14 - 15
    Cited by:  Papers (5)
    Request permission for commercial reuse | PDF file iconPDF (373 KB) | HTML iconHTML
    Freely Available from IEEE
  • Open source in the US government

    Publication Year: 2003, Page(s): 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Slack: getting past busywork, burnout, and the myth of total efficiency [Book Review]

    Publication Year: 2003, Page(s):96 - 97
    Request permission for commercial reuse | PDF file iconPDF (200 KB) | HTML iconHTML
    Freely Available from IEEE
  • Agile software development [Book Review]

    Publication Year: 2003, Page(s):97 - 98
    Request permission for commercial reuse | PDF file iconPDF (190 KB) | HTML iconHTML
    Freely Available from IEEE
  • Applied software architecture [Book Review]

    Publication Year: 2003, Page(s):98 - 99
    Request permission for commercial reuse | PDF file iconPDF (243 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reviewer thanks - Saluting our 2002 referees

    Publication Year: 2003, Page(s):100 - 102
    Request permission for commercial reuse | PDF file iconPDF (180 KB)
    Freely Available from IEEE
  • Error-free software remains extremely elusive

    Publication Year: 2003, Page(s):104 - 103
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using quality models in software package selection

    Publication Year: 2003, Page(s):34 - 41
    Cited by:  Papers (44)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    The growing importance of commercial off-the-shelf software packages requires adapting some software engineering practices, such as requirements elicitation and testing, to this emergent framework. Also, some specific new activities arise, among which selection of software packages plays a prominent role. All the methodologies that have been proposed recently for choosing software packages compare... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing requirements for medical IT products

    Publication Year: 2003, Page(s):26 - 33
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Philips Medical Systems produces products for diagnosis and treatment of patients by healthcare professionals. Our Mimit (Medical Imaging Information Technology) group is responsible for IT products within this portfolio. Examples include products for viewing, analyzing, printing, archiving, and communicating medical images. We also produce systems that control workflow and administration of patie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Aspect-oriented development with stratified frameworks

    Publication Year: 2003, Page(s):81 - 89
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2252 KB) | HTML iconHTML

    Separation-of-concerns technologies are key to improving the maintainability and adaptability of software artifacts. These technologies identify loosely coupled, modular, and reusable units of description from which developers can generate tailored software systems with minimal effort. Aspect-oriented programming provides perhaps the most explicit application of the separation-of-concerns tenet. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Internet-based intrusions: Effective security patch management

    Publication Year: 2003, Page(s):50 - 57
    Cited by:  Papers (8)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    The Software Productivity Consortium (the Consortium) has been investigating methods for improving and measuring four essential defenses against Internet-based threats: security patch management, system and application hardening, network reconnaissance and enumeration, and tools against malicious software. These defenses increasingly are critical to an organization's information security posture a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software flaws, to tell or not to tell?

    Publication Year: 2003, Page(s):70 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    In October, GreyMagic, an Israeli Web application company, warned the public of security flaws that could make Internet Explorer vulnerable to malicious hacking. While the warning itself was of some interest, even more fascinating was the software giant's response. Microsoft publicly chided the firm for divulging the bugs' existence before Microsoft could fix them. For its part, GreyMagic told the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Do you like Pina Coladas? How improved communication can improve software quality

    Publication Year: 2003, Page(s):90 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB)

    Communication, or rather lack thereof, leads to tremendous problems in the workplace and in software. To improve human intercommunication, we must first understand everyone's roles and responsibilities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Misuse cases: use cases with hostile intent

    Publication Year: 2003, Page(s):58 - 66
    Cited by:  Papers (92)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    Humans have analyzed negative scenarios ever since they first sat around Ice Age campfires debating the dangers of catching a woolly rhinoceros: "What if it turns and charges us before it falls into the pit?" A more recent scenario is "What if the hackers launch a denial-of-service attack?" Modern systems engineers can employ a misuse case, the negative form of a use case, to document and analyze ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering in automotive development: experiences and challenges

    Publication Year: 2003, Page(s):16 - 24
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    In the automotive industry, especially in the high-end market, the complexity of electronic components is increasing rapidly. Currently, about a third of all development costs in high-end models go to electric and electronic system development, and the cost continues to grow. At the same time, many slightly different variations on components are each developed in a series of prototyping phases on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C# and the .NET framework: ready for real time?

    Publication Year: 2003, Page(s):74 - 80
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Microsoft's integrated development environment, Visual Studio.NET, includes a new programming language C# (pronounced "C sharp"), which targets the .NET Framework. Both the .NET Framework and C# are fairly well-documented technologies, but the platform's appropriateness for real-time systems has not received much attention. Microsoft doesn't specifically claim that C# and NET are intended for real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seven pitfalls to avoid on the hunt for best practices

    Publication Year: 2003, Page(s):67 - 69
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    A recent US Defense Science Board study recommended the identification and implementation of best practices as a critical need for successful acquisition programs. Practices in this sense go beyond the development-related guidance of the popular Capability Maturity Models, including approaches organizations use to manage others creating software for them under contract. The study identified severa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond requirements: software making as art

    Publication Year: 2003, Page(s):93 - 95
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB)

    Quality is meeting requirements - or is it? The authors challenge this familiar metaphor for requirements and introduce a new one based on their experience in an industry that seems far from software development or is it?. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When to make a type [programming]

    Publication Year: 2003, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB)

    When I started programming computers, I began with fairly primitive languages, such as Fortran 4 and various early flavors of Basic. One of the first things you learn using such languages - indeed, even using more up-to-date languages - is which types your language supports. Being oriented toward number crunching, Fortran supported integer and real types, with the interesting rule that any variabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using split capabilities for access control

    Publication Year: 2003, Page(s):42 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    The fundamental problem of access control is to limit what a process can do to an object and when that process can do if. For example, any access control mechanism must know whether to honor a request to read or write a particular file. Unfortunately, the access control mechanisms we use when sharing resources over the Internet were designed in the days when networking computers was a rarity. Many... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The art of enbugging

    Publication Year: 2003, Page(s):10 - 11
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB)

    One of the best ways to keep future bugs out is to maintain a proper "separation of concerns", that is, design the code so that classes and modules have clear, well-defined, and isolated responsibilities and well-understood semantics. The fundamental goal is to write shy code - code that doesn't reveal too much of itself to anyone else and doesn't talk to others any more than is necessary. Shy cod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org