IEEE Software

Issue 2 • March-April 2003

Filter Results

Displaying Results 1 - 22 of 22
  • A New Kind of Science [Book Review]

    Publication Year: 2003, Page(s):80 - 81
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • Prey: A Novel [Book Review]

    Publication Year: 2003, Page(s):81 - 82
    Request permission for commercial reuse | PDF file iconPDF (195 KB)
    Freely Available from IEEE
  • The Unified Process Explained [Book Review]

    Publication Year: 2003, Page(s):82 - 84
    Request permission for commercial reuse | PDF file iconPDF (200 KB) | HTML iconHTML
    Freely Available from IEEE
  • Effective Work Breakdown Structures [Book Review]

    Publication Year: 2003, Page(s):84 - 85
    Request permission for commercial reuse | PDF file iconPDF (194 KB) | HTML iconHTML
    Freely Available from IEEE
  • Applied Java Patterns [Book Review]

    Publication Year: 2003, Page(s): 85
    Request permission for commercial reuse | PDF file iconPDF (189 KB) | HTML iconHTML
    Freely Available from IEEE
  • After elcomsoft: DMCA still worries developers, researchers

    Publication Year: 2003, Page(s):86 - 89
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software language should help protect networks from hackers

    Publication Year: 2003, Page(s):89 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • International portals provide standards information

    Publication Year: 2003, Page(s): 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the declarative specification of models

    Publication Year: 2003, Page(s):96 - 95
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (263 KB) | HTML iconHTML

    Computer power and automatic graph-drawing algorithms have sufficiently advanced so as to allow the automatic placement of graph nodes on the canvas and the near optimal routing of the respective edges. So, we can design models using a declarative textual representation and subsequently view, publish, and share them in graphical form. Creating models in a declarative, textual notation offers sever... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pragmatic software configuration management

    Publication Year: 2003, Page(s):15 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB)

    Often an organization's software configuration management (SCM) mechanisms don't help with the work of building software as much as they could. Either no mechanisms exist for doing common tasks or the processes to use those mechanisms are too complicated and become tasks in themselves. On a daily basis, developers shouldn't notice SCM that much, and what they do notice, they should eagerly embrace... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scientific management meets the personal software process

    Publication Year: 2003, Page(s):12 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB)

    There are several ways that the personal software process (PSP) can bolster the principles of scientific management to provide needed artifacts. PSP data can be gathered and then collated to make early time and budget estimates more accurate. Also, PSP data indicates that the oft-repeated belief that projects should spend more time on planning and design is correct. In both cases, calculating time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blending CMM and Six Sigma to meet business goals

    Publication Year: 2003, Page(s):42 - 48
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2222 KB) | HTML iconHTML

    Tata Consultancy Services (TCS) blended Six Sigma concepts with the various SW CMM key process areas, thereby creating a quality management system. This helped TCS improve its customer focus and sustain process improvement initiatives by explicitly linking them to business goals. The TCS team implemented the QMS on the lines of Level 2 and 3 requirements of SW CMM, using Six Sigma concepts to rein... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A process model for component-oriented software engineering

    Publication Year: 2003, Page(s):34 - 41
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    The investigation of reuse has a long history, eventually maturing into the "build by integration" paradigm. Meanwhile, component technologies also improved along with engineering practices. What is missing is a methodology that uses components within such a paradigm, thus bridging the gap. The authors propose a model devoted to complete component orientation, rather than modifying object-oriented... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing code ownership

    Publication Year: 2003, Page(s):26 - 33
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    Solving the problem of failed project ownership is not merely a process of assigning developers to subsystems. This article describes four code ownership models, ranging from one individual owning an entire system to the collective ownership that is a core extreme programming practice. No single code ownership model is best. In fact, many projects would benefit from dynamically adjusting the owner... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The marriage of research and practice [software research]

    Publication Year: 2003, Page(s):5 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB)

    Some types of research are of interest to all software readers, and all types o f research are of interest to some software readers; but not all types of research are of interest to all Software readers. The key to success for IEEE Software, or any other publication trying to disseminate research results to practitioners, is to identify research that is of interest to "all Software readers.". View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating COTS middleware acquisition: the i-Mate process

    Publication Year: 2003, Page(s):72 - 79
    Cited by:  Papers (22)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB) | HTML iconHTML

    COTS middleware speeds e-business application deployment but can be difficult to select. The i-Mate tool provides a proven, structured software engineering process for COTS middleware acquisition. Using i-Mate in six major projects for a wide range of organizations led to highly visible, accountable, and ultimately reliable selections of COTS middleware products in greatly compressed time scales. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why the Vasa sank: 10 problems and some antidotes for software projects

    Publication Year: 2003, Page(s):18 - 25
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1750 KB) | HTML iconHTML

    In 1628, the newest ship in the Royal Swedish Navy took its maiden voyage. After sailing about 1,300 meters, a light gust of wind caused the Vasa to capsize. The reasons that the Vasa was constructed to be unstable, and the reasons it was launched when known to be unstable, are as relevant to our modern-day attempts to build large, complex software systems as they were to the 17th-century art and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical process control: what you don't measure can hurt you!

    Publication Year: 2003, Page(s):49 - 51
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB)

    Statistical control charts are the most commonly used tools to analyze and monitor process variation and stability. Control charts help us isolate nonrandom causes of variation by plotting a measured attribute of the process over time; the upper and lower control limits are empirically derived from the measurements of process variation over time. If a data point falls outside the control limits, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements by collaboration: getting it right the first time

    Publication Year: 2003, Page(s):52 - 55
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    We know that we must involve all the stakeholders if we want to discover a project's requirements; but we need some guidelines on how to involve the right people and, given how busy everyone is, how to minimize the time and maximize the result. This paper explains a key aspect of collaborative requirements workshops: identifying who should participate and outlining their roles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Patterns [software patterns]

    Publication Year: 2003, Page(s):56 - 57
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB)

    Patterns provide a mechanism for rendering design advice in a reference format. Software design is a massive topic, and when faced with a design problem, one must be able to focus on something as close to the problem as you can get. Patterns can help by trying to identify common solutions to recurring problems. The solution is really what the pattern is, yet the problem is a vital part of the cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task descriptions as functional requirements

    Publication Year: 2003, Page(s):58 - 65
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1335 KB) | HTML iconHTML

    The tasks and support approach uses task descriptions that specify what the user and computer shall accomplish together without being explicit about who performs which parts of a task. The requirement is simply to support the identified tasks. Stakeholders can easily validate and later verify such requirements. This approach is just as successful for product development and large-scale work restru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The intelligent alarm management system

    Publication Year: 2003, Page(s):66 - 71
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Nuisance alarms often clutter and obscure a process plant operator's view of critical information, with potentially severe consequences. The intelligent alarm management system (IAMS) suppresses nuisance alarms and provides valuable advisory information to help the operator focus quickly on important alarm information and take correct, quick actions. Test results show that IAMS effectively suppres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org