By Topic

IEEE Software

Issue 6 • Date Nov.-Dec. 2004

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (601 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (421 KB)
    Freely Available from IEEE
  • Article Summaries

    Publication Year: 2004, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Confidence--and the Software Developer

    Publication Year: 2004, Page(s):5 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Spyware and other widespread security threats are undermining users' confidence in the Internet. The authors, recently inundated with spyware, discuss how they are handling this and give specific advice on four products that can help you. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Letters

    Publication Year: 2004, Page(s):9 - 11
    Request permission for commercial reuse | PDF file iconPDF (379 KB) | HTML iconHTML
    Freely Available from IEEE
  • Practice [software construction]

    Publication Year: 2004, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    The concept of "construction" is being a separate activity in the development process. Having something called "construction" makes it easy for some in the industry to Balkanize the concept. Construction has connotations that make it seem somewhat manual compared to the more cerebral "analysis" and "design" phases. Let's use a construction metaphor to see why that's dangerous. Software constructio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software's secret sauce: the "-ilities" [software quality]

    Publication Year: 2004, Page(s):14 - 15
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    If beauty is in the eye of the beholder, then quality must be as well. We live in a world where beauty to one is a complete turnoff to another. Software quality is no different. We have the developer's perspective, the end users perspective, the testers perspective, and so forth. As you can see, meeting the requirements might be different from being fit for a purpose, which can also be different f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Persistent Software Attributes

    Publication Year: 2004, Page(s):16 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified model of dependability: capturing dependability in context

    Publication Year: 2004, Page(s):19 - 25
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    In contemporary societies, individuals and organizations increasingly depend on services delivered by sophisticated software-intensive systems to achieve personal and business goals. So, a system must have engineered and guaranteed dependability, regardless of continuous, rapid, and unpredictable technological and context changes. The International Federation for Information Processing Working Gro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated management of multicustomer code bases

    Publication Year: 2004, Page(s):26 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Applications such as management information systems, customizing the code base to meet each new customer's needs can sometimes be unavoidable. Although good design can minimize the need for such code-level modifications, it can't eliminate it. We developed a highly automated, model-driven approach for maintaining multicustomer code bases. This approach to the updating process helps control costs, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving distributed systems critical properties: a model-driven approach

    Publication Year: 2004, Page(s):32 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1616 KB) | HTML iconHTML

    The need for creating predictability in distributed systems is most often specified in terms of quality-of-service (QoS) requirements, which help define the acceptable levels of dependability with which capabilities such as processing capacity, data throughput, or service availability reach users. For longer-term properties such as scalability, maintainability, adaptability, and system security, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Separating adaptable persistence attributes through computational reflection

    Publication Year: 2004, Page(s):41 - 49
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    To receive persistence capabilities, applications usually must explicitly access database management systems, such as object-oriented databases or object-relational mapping products. The usual way of building an application is tangling its functional code with explicit structured query language (SQL) or object query language (OQL) persistence statements. This tangling has several drawbacks: defici... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying requirements conflicts and cooperation: how quality attributes and automated traceability can help

    Publication Year: 2004, Page(s):50 - 58
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    Requirements about software attributes have numerous complex and nontrivial interdependencies. Requirements conflict with each other when they make contradicting statements about common software attributes, and they cooperate when they mutually enforce such attributes. Because software developers rarely apply formal requirements specification techniques in practice, and because reliable techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The future of software infrastructure protection

    Publication Year: 2004, Page(s):59 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    In this paper the author describes how a Gatekeeper prototype had detected 83 percent of all unknown real viruses thrown at it. Even more intriguing was that the 17 percent of viruses missed were all due to the prototype code's immaturity, rather than any failing of the method used to detect them. Stated another way: An enterprise-ready version of the prototype would have captured every virus the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Open source reuse in commercial firms

    Publication Year: 2004, Page(s):62 - 69
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles

    "Open Source Reuse in Commercial Firms"
    by T.R. Madanmohan and Rahul De
    in IEEE Software, Vol. 21, Issue 6, November/December 2004, pp. 62-69

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Piloting XP on four mission-critical projects

    Publication Year: 2004, Page(s):70 - 75
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    According to proponents, extreme programming creates focused, efficient software development that heavily emphasizes customer involvement. As software developers for mission-critical two-way radio systems in Motorola's commercial, government, and industrial solutions sector, we'd been hearing a lot about XP's benefits. Software development teams constantly battle to increase productivity while mai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COTS component acquisition in an emerging market

    Publication Year: 2004, Page(s):76 - 82
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Component-based software engineering has generated much interest among researchers and in industry. Purported CBSE benefits include lower development costs, higher productivity, and more manageable quality of the developed software. But today's software component market is far from mature - it is, at best, in the early emerging phase and hence lacks industry standards and management guidelines. Un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seeing more of the world [requirements engineering]

    Publication Year: 2004, Page(s):83 - 85
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Requirements engineering experience shows that failure to look at all aspects of the problem space results in missing or incorrect requirements. The author provides a systematic approach for identifying which parts of the world require your attention, along with some easily applied heuristics for discovering whether you've looked far enough. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Before clarity [software design]

    Publication Year: 2004, Page(s):86 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB) | HTML iconHTML

    Most software developers become preoccupied with the question of what makes good design at some point in their careers, usually after witnessing the effects of bad design first hand. At that point, we start to reflect. We go through a stage where we feel we know what good design is but can't really define it. Then we learn various design principles and rules of thumb that make it easier to judge w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ant: automating the process of building applications

    Publication Year: 2004, Page(s):89 - 91
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Everyone uses build tools. We have Make, GNU Make, Nmake, Jam, and many others. But Apache's Ant is different from typical build tools. Instead of using inherently evil shell-based commands, it's based on Java classes. Its use of XML for configuration files and architecture enables Ant's big advantages: simplicity, portability, and power. In this paper we have summarized Ant's most important featu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is the software industry's productivity declining?

    Publication Year: 2004, Page(s):92 - 94
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (59 KB) | HTML iconHTML

    Software development has seen rapid evolution over the past few decades: software projects are increasing in size and complexity, software companies are merging at a record pace, and open source code is proliferating. Not surprisingly, productivity improvement is a key issue for development organizations. In this article we discuss some views whether software industry's productivity is declining. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Annual Index

    Publication Year: 2004, Page(s):95 - 99
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing Test-Driven Software Development

    Publication Year: 2004, Page(s):100 - 101
    Request permission for commercial reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Freely Available from IEEE
  • Political Reasons for Failed Software Projects

    Publication Year: 2004, Page(s):104 - 103
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    Many software projects involve at least one stakeholder who secretly wants the project to fail. Finding this stakeholder can be difficult but is important to ensuring the project's success. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Design, Part 2

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org