By Topic

IEEE Transactions on Software Engineering

Issue 10 • Oct. 2003

Filter Results

Displaying Results 1 - 8 of 8
  • Guest editor's introduction: 2002 conference on the foundations of software engineering

    Publication Year: 2003, Page(s): 865
    Request permission for commercial reuse | PDF file iconPDF (223 KB) | HTML iconHTML
    Freely Available from IEEE
  • Using redundancies to find errors

    Publication Year: 2003, Page(s):915 - 928
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2617 KB) | HTML iconHTML

    Programmers generally attempt to perform useful work. If they performed an action, it was because they believed it served some purpose. Redundant operations violate this belief. However, in the past, redundant operations have been typically regarded as minor cosmetic problems rather than serious errors. This paper demonstrates that, in fact, many redundancies are as serious as traditional hard err... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal logic query checking: a tool for model exploration

    Publication Year: 2003, Page(s):898 - 914
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1537 KB) | HTML iconHTML

    Temporal logic query checking was first introduced by W. Chan in order to speed up design understanding by discovering properties not known a priori. A query is a temporal logic formula containing a special symbol ?1, known as a placeholder. Given a Kripke structure and a propositional formula φ, we say that φ satisfies the query if replacing the placeholder by φ results in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CARISMA: context-aware reflective middleware system for mobile applications

    Publication Year: 2003, Page(s):929 - 945
    Cited by:  Papers (180)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1245 KB) | HTML iconHTML

    Mobile devices, such as mobile phones and personal digital assistants, have gained wide-spread popularity. These devices will increasingly be networked, thus enabling the construction of distributed applications that have to adapt to changes in context, such as variations in network bandwidth, battery power, connectivity, reachability of services and hosts, etc. In this paper, we describe CARISMA,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Template semantics for model-based notations

    Publication Year: 2003, Page(s):866 - 882
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3100 KB) | HTML iconHTML

    We propose a template-based approach to structuring the semantics of model-based specification notations. The basic computation model is a nonconcurrent, hierarchical state-transition machine (HTS), whose execution semantics are parameterized. Semantics that are common among notations (e.g., the concept of an enabled transition) are captured in the template, and a notation's distinct semantics (e.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Special Section - On the International Conference on the Foundations of Software Engineering

    Publication Year: 2003, Page(s):0_1 - 0_2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural-level risk analysis using UML

    Publication Year: 2003, Page(s):946 - 960
    Cited by:  Papers (57)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2239 KB) | HTML iconHTML

    Risk assessment is an essential part in managing software development. Performing risk assessment during the early development phases enhances resource allocation decisions. In order to improve the software development process and the quality of software products, we need to be able to build risk analysis models based on data that can be collected early in the development process. These models wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Searching for points-to analysis

    Publication Year: 2003, Page(s):883 - 897
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2213 KB) | HTML iconHTML

    The points-to analysis problem is to find the pointer relationships that could arise during program execution. Many points-to analysis algorithms exist, each making a particular trade off between cost of the analysis and precision of the results. In this paper, we show how points-to analysis algorithms can be defined as transformed versions of an exact algorithm. We present a set of program transf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org