By Topic

IEEE Software

Issue 3 • May-June 2006

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1643 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (838 KB)
    Freely Available from IEEE
  • Article summaries

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Eating Your Own Dog Food

    Publication Year: 2006, Page(s):5 - 7
    Cited by:  Papers (4)
    Request permission for commercial reuse | PDF file iconPDF (176 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letters

    Publication Year: 2006, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (246 KB) | HTML iconHTML
    Freely Available from IEEE
  • The Accidental Architecture

    Publication Year: 2006, Page(s):9 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB) | HTML iconHTML

    Every interesting software-intensive system has an architecture. While some of these architectures are intentional, most appear to be accidental. Philippe Kruchten has observed that "the life of a software architect is a long and rapid succession of suboptimal design decisions taken partly in the dark." The journey between vision and ultimate executable system is complex, and for every interesting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and Software Quality: An Interview with Frank Perry

    Publication Year: 2006, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    The ramifications of failing to completely and correctly address security can devastate an organization, not only in compromised data and financial cost but also in the time and energy spent to recover. One of us, Jane Hayes, sat down with an expert in the field, Frank Perry, to discuss the state of the art and future directions of system security and particularly how it interacts with software qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RE 05: Engineering Successful Products

    Publication Year: 2006, Page(s):16 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1736 KB) | HTML iconHTML

    At the Requirements Engineering conference series, researchers and practitioners exchange experiences, discuss problems, and propose solutions. The theme of RE 05--Engineering Successful Products--reflects the understanding that high-quality requirements are at the heart of successful products. To be successful, developers must understand the goals and needs of users, customers, and other stakehol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding the product life cycle: four key requirements engineering techniques

    Publication Year: 2006, Page(s):19 - 25
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    Many enterprises frequently commit to requirements and contracts to boost short- term revenues without properly aligning sales, product management, project management, and marketing. Such misalignment results in insufficient capacity planning or product-development resource allocation, thus delaying projects. For this field study, Alcatel's R&D effectiveness team investigated products and solu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-service design using i* and e/sup 3/ value modeling

    Publication Year: 2006, Page(s):26 - 33
    Cited by:  Papers (73)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB) | HTML iconHTML

    Two requirements engineering techniques, i* and e3 value, work together to explore commercial e-services from a strategic-goal and profitability perspective. We demonstrate our approach using a case study on Internet radio View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The usage model: describing product usage during design and development

    Publication Year: 2006, Page(s):34 - 41
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2118 KB) | HTML iconHTML

    A usage model is a collection of data that describes system usage within a stated context. The usage model data describe the interactions between the user and the system at a level that identifies the system's benefits to the user View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting requirements with video-based analysis

    Publication Year: 2006, Page(s):42 - 44
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB) | HTML iconHTML

    The dealing-room study is one of many studies that have used video to support requirements elicitation and the general design process. A growing body of experience with video-based ethnographies supports technology development in various domains, including air traffic and other control rooms, healthcare, public settings such as museums, and more experimental technologies, including media spaces an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Refreshing patterns

    Publication Year: 2006, Page(s):45 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    Different authors make different design choices, and their descriptions of the same pattern will vary. Although the author assign to students the original versions of patterns as presented in design patterns, the author also expose them to other published variations. Consider the composite pattern. It supports composing objects into tree structures. In such a structure, an object can either be a c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Schedule estimation and uncertainty surrounding the cone of uncertainty

    Publication Year: 2006, Page(s):48 - 54
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    Software development project schedule estimation has long been a difficult problem. The Standish CHAOS Report indicates that only 20 percent of projects finish on time relative to their original plan. Conventional wisdom proposes that estimation gets better as a project progresses. This concept is sometimes called the cone of uncertainty, a term popularized by Steve McConnell (1996). The idea that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reflections on software engineering education

    Publication Year: 2006, Page(s):55 - 61
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (110 KB) | HTML iconHTML

    The "engineering" focus in software engineering education leaves instructors vulnerable to several traps. It also misleads students as to SE's essential human and social dimensions. Here, the author discusses how this limited conception of SE contributes to five assumptions that can trap SE educators: (i) an SE course needs an industrial project. (ii) SE is like other branches of engineering. (iii... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimethods in C++ using recursive deferred dispatching

    Publication Year: 2006, Page(s):62 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    The author proposes a new approach for multimethod implementation in C++ based on recursive deferred dispatching. The proposed approach provides a partially broken dependency between target classes and a broken dependency between target classes and multimethods. This approach provides multimethods with strong type safety and constant execution time. A multimethod is a virtual method of several obj... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certifying software component attributes

    Publication Year: 2006, Page(s):74 - 81
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    The success of component-based software engineering depends on systems integrators' ability to select the most suitable components for their intended application. System integrators depend on component suppliers to reliably describe their products. A flexible, property- value approach lets suppliers adequately describe simple and complex properties, and a certification scheme ensures the descripti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What do we know about defect detection methods? [software testing]

    Publication Year: 2006, Page(s):82 - 90
    Cited by:  Papers (45)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB) | HTML iconHTML

    A survey of defect detection studies comparing inspection and testing techniques yields practical recommendations: use inspections for requirements and design defects, and use testing for code. Evidence-based software engineering can help software practitioners decide which methods to use and for what purpose. EBSE involves defining relevant questions, surveying and appraising avail able empirical... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated programming the next wave of developer power tools

    Publication Year: 2006, Page(s):91 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (39 KB) | HTML iconHTML
    Freely Available from IEEE
  • Open source software ERPs: a new alternative for an old need

    Publication Year: 2006, Page(s):94 - 97
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1056 KB) | HTML iconHTML

    Both OSS ERPs and proprietary ERPs involve complex system implementations that usually require modifications to a firm's business processes as well as some adaptation of the ERP' functionality. This mutual matching project usually involves consulting firms. However, the benefits of applying OSS are greater for ERPs than for other kinds of applications, for three main reasons: increased adaptabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Debuggers and logging frameworks

    Publication Year: 2006, Page(s):98 - 99
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    The testing, diagnostic, and repair equipment of many professions is horrendously expensive. Assuming that the bug-finding systems the author discussed that program code a clean bill of health, our next alternatives for productively pinpointing errors that have crept into our code are debuggers or logging instrumentation. Our toolbag is full of useful debugging tools. Being an expert user of a deb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bookshelf

    Publication Year: 2006, Page(s):100 - 102
    Request permission for commercial reuse | PDF file iconPDF (65 KB) | HTML iconHTML
    Freely Available from IEEE
  • Are "Best Practices" Requirements Documents a Myth?

    Publication Year: 2006, Page(s): 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (136 KB) | HTML iconHTML
    Freely Available from IEEE

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org