By Topic

IEEE Transactions on Software Engineering

Issue 4 • Date April 1985

Filter Results

Displaying Results 1 - 18 of 18
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1985, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (393 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1985, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • Identifying Error-Prone Software—An Empirical Study

    Publication Year: 1985, Page(s):317 - 324
    Cited by:  Papers (88)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2688 KB)

    A major portion of the effort expended in developing commercial software today is associated with program testing. Schedule and/ or resource constraints frequently require that testing be conducted so as to uncover the greatest number of errors possible in the time allowed. In this paper we describe a study undertaken to assess the potential usefulness of various product-and process-related measur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Translating SQL Into Relational Algebra: Optimization, Semantics, and Equivalence of SQL Queries

    Publication Year: 1985, Page(s):324 - 345
    Cited by:  Papers (10)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5672 KB)

    In this paper, we present a translator from a relevant subset of SQL into relational algebra. The translation is syntax-directed, with translation rules associated with grammar productions; each production corresponds to a particular type of SQL subquery. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Centralized Databases with Static Locking

    Publication Year: 1985, Page(s):346 - 355
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3064 KB)

    The performance of transaction processing systems is determined by the contention for hardware as well as software resources (database locks), due to the concurrency control mechanism of the database being accessed by transactions. We consider a transaction processing system with a set of dominant transcation classes. Each class needs to acquire a certain subset of the locks in the database before... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SEES—A Software testing Environment Support System

    Publication Year: 1985, Page(s):355 - 366
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4432 KB)

    SEES is a database system to support program testing. The program database is automatically created during the compilation of the program by a compiler built using the YACC compiler-compiler. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selecting Software Test Data Using Data Flow Information

    Publication Year: 1985, Page(s):367 - 375
    Cited by:  Papers (431)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3296 KB)

    This paper defines a family of program test data selection criteria derived from data flow analysis techniques similar to those used in compiler optimization. It is argued that currently used path selection criteria, which examine only the control flow of a program, are inadequate quate. Our procedure associates with each point in a program at which a variable is defined, those points at which the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to the Modeling of Software Testing with Some Applications

    Publication Year: 1985, Page(s):375 - 386
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4976 KB)

    In this paper, an approach to the modeling of software testing is described. A major aim of this approach is to allow the assessment of the effects of different testing (and debugging) strategies in different situations. It is shown how the techniques developed can be used to estimate, prior to the commencement of testing, the optimum allocation of test effort for software which is to be nonunifor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flex: A High-Level Language for Specifying Customized Microprocessors

    Publication Year: 1985, Page(s):387 - 396
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3224 KB)

    Researchers at Bell Labs have recently developed a silicon compiler, named Plex, that automatically generates VLSI layouts of high performance and area efficient microprocessors. Plex takes as input a specification of the function to be executed and generates a complete mask-level layout of a customized microprocessor to execute that function. The Plex microprocessor interacts with the external wo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication and Synchronization Primitives for Distributed Programs

    Publication Year: 1985, Page(s):396 - 416
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6888 KB)

    A distributed program is a collection of several processes which execute concurrently, possibly in different nodes of a distributed system, and which cooperate with each other to realize a common goal. In this paper, we present a design of communication and synchronization primitives for distributed programs. The primitives are designed such that they can be provided by a kernel of a distributed o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete Time Stochastic Petri Nets

    Publication Year: 1985, Page(s):417 - 423
    Cited by:  Papers (79)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2560 KB)

    Basic graph models of processes, such as Petri nets, have usually omitted the concept of time as a parameter. Time has been added to the Petri net model in two ways. The timed Petri net (TPN) uses a fixed number of discrete time intervals. The stochastic Petri net (SPN) uses an exponentially distributed random variable. In this paper, a discrete time stochastic Petri model is described. These disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Configuration for Distributed Systems

    Publication Year: 1985, Page(s):424 - 436
    Cited by:  Papers (103)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4000 KB)

    Dynamic system configuration is the ability to modify and extend a system while it is running. The facility is a requirement in large distributed systems where it may not be possible or economic to stop the entire system to allow modification to part of its hardware or software. It is also useful during production of the system to aid incremental integration of component parts, and during operatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eager Reclamation

    Publication Year: 1985, Page(s):437 - 439
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    Reclamation policies are presented which permit the reuse of storage for procedure instances before the procedures terminate. These eager reclamation policies are applicable under certain conditions and can reduce the total amount of memory needed for the execution of a program. The policies essentially differ in the amount of run-time checks needed and the reclamation opportunities. This eager re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variations on a Method for Representing Data Items of Unlimited Length

    Publication Year: 1985, Page(s):439 - 441
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    A recent encoding method [11 is revisited here, and two simple variations are proposed to reduce the length of the encoded data strings. The new variations also decrease encoding time, and allow numerical data to be represented in any base. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 1985, Page(s): 442
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • IEEE copyright form

    Publication Year: 1985, Page(s): 443
    Request permission for commercial reuse | PDF file iconPDF (269 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1985, Page(s): 443-b
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • Beyond the Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society

    Publication Year: 1985, Page(s): 443-c
    Request permission for commercial reuse | PDF file iconPDF (1088 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org