By Topic

IEEE Transactions on Software Engineering

Issue 8 • Date Aug. 1985

Filter Results

Displaying Results 1 - 23 of 23
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1985, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (486 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1985, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • Analysis and Design in MSG.84: Formalizing Functional Specifications

    Publication Year: 1985, Page(s):657 - 670
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4472 KB)

    Model building is identified as the most important part of the analysis and design process for software systems. A set of primitives to support this process is presented, along with a formal language, MSG.84, for recording the results of analysis and design. The semantics of the notation is defined in terms of the actor formalism, which is based on a message passing paradigm. The automatic derivat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Specification of User Interfaces: A Comparison and Evaluation of Four Axiomatic Approaches

    Publication Year: 1985, Page(s):671 - 685
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4120 KB)

    Few examples of formal specification of the semantics of user interfaces exist in the literature. This paper presents a comparison of four axiomatic approaches which we have applied to the specification of a commercial user interface–the line editor for the Tandy PC-1 Pocket Computer. These techniques are shown to result in complete and relatively concise descriptions. A number of useful and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to User Specification of Interactive Display Interfaces

    Publication Year: 1985, Page(s):686 - 698
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4416 KB)

    Forms have become widely used as a user interface for database systems. By analyzing the components of forms, a unified treatment of aggregation operators, headings, subheadings, and internal logic of a form is possible. In this paper we present a theory and a system based on that theory which allows users to easily specify displays. Displays are composed of components and the user can specify geo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending State Transition Diagrams for the Specification of Human–Computer Interaction

    Publication Year: 1985, Page(s):699 - 713
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3976 KB)

    User Software Engineering is a methodology for the specification and implementation of interactive information systems. An early step in the methodology is the creation of a formal executable description of the user interaction with the system, based on augmented state transition diagrams. This paper shows the derivation of the USE transition diagrams based on perceived shortcomings of the "pure" ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Aspect of Aesthetics in Human-Computer Communications: Pretty Windows

    Publication Year: 1985, Page(s):714 - 717
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2176 KB)

    Aesthetics in user interfaces addresses font definitions, typesetting conventions, color combinations, graphics design considerations, high resolution for viewscreens, and the shapes of windows. Computer viewscreens are evolving into pictorial media, communicating information with visual immediacy. The more interesting interfaces make use of multiple windows, menus, icons, and other visual effects... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences with a Feedback Version Development Methodology

    Publication Year: 1985, Page(s):718 - 723
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB)

    In the development of programs for novel applications, a series of design-implementation phases may be necessary in order to acquire a deeper understanding of the problem. This paper develops a feedback version development approach incorporating systematic knowledge integration techniques. Our experiences in applying these methods to various projects are also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transformation and Verification of Office Procedures

    Publication Year: 1985, Page(s):724 - 734
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3712 KB)

    An office procedure is a structured set of office activities for accomplishing a specific office task. A unified model, called office procedure model (OPM), is presented to model office procedures. The OPM describes the relationships among messages, databases, alerters, and activities. The OPM can be used to coordinate and integrate the activities of an office procedure. The OPM also allows the sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Theory of Forward Error Recovery

    Publication Year: 1985, Page(s):735 - 748
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3336 KB)

    When the state of a program in execution is accidentally altered, a recovery action may be needed before the execution can proceed on. Two approaches exist for the design of recovery actions: backward recovery consists of retrieving a previously saved correct state and restarting the computation; forward recovery consists of generating á (sufficiently) correct state from the current (not too)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Structure Analysis: Clustering with Data Bindings

    Publication Year: 1985, Page(s):749 - 757
    Cited by:  Papers (93)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2888 KB)

    This paper examines the use of cluster analysis as a tool for system modularization. Several clustering techniques are discussed and used on two medium-size systems and a group of small projects. The small projects are presented because they provide examples (that will fit into a paper) of certain types of phenomena. Data bindings between the routines of the system provide the basis for the bindin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Qualified Function Approach to Analysis of Program Behavior and Performance

    Publication Year: 1985, Page(s):758 - 773
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4096 KB)

    The notion of a qualified function is introduced as a general means of representing the parameters of dynamic systems. Two specific types of qualified functions are defined for the analysis of the behavior and performance of structured programs. Transformation functions represent the values of variables during execution and timing algorithms express the execution times of programs symbolically. Co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Synthesizing Code for Resource Controllers

    Publication Year: 1985, Page(s):774 - 783
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3352 KB)

    A distributed system is viewed as a set of objects and processes utilizing the objects. If a shared object, known as a resource, is accessed concurrently, some mechanism is necessary to control use of the resource in order to satisfy the consistency and fairness requirements associated with the resource. These mechanisms are termed resource controllers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbolic Semantics and Program Reduction

    Publication Year: 1985, Page(s):784 - 794
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3168 KB)

    A class of transformations of functional programs based on symbolic execution and simplification of conditionals is presented. The operational symbolic semantics of a family of functional languages is defined exploiting a set-theoretic notion of symbolic constants. An effective transformation able to simplify a functional program via removal of conditionals is discussed. Finally, it is shown that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query Processing in a Fragmented Relational Distributed System: Mermaid

    Publication Year: 1985, Page(s):795 - 810
    Cited by:  Papers (19)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4696 KB)

    This paper describes the query optimizer of the Mermaid system which provides a user with a unified view of multiple preexisting databases which may be stored under different DBMS's. The algorithm is designed for databases which may contain replicated or fragmented relations and for users who are primarily making interactive, ad hoc queries. Although the implementation of the algorithm is a front-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Image Processing Language with Icon-Assisted Navigation

    Publication Year: 1985, Page(s):811 - 819
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1984 KB)

    This paper describes a generic image processing language IPL, and a programming environment supporting the language primitives for an image information system. The central notion of IPL is that it allows the user to navigate through the image database and manipulate images using generalized icons. The image processing language IPL consists of three subsets: the logical image processing language LI... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • False Deadlock Detection in Distributed Systems

    Publication Year: 1985, Page(s):820 - 821
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Detecting a nonexistent deadlock in distributed systems has been referred to as false deadlock detection. This correspondence shows that false deadlock wi1l never occur in a system of two-phase locking transactions. We also describe an algorithm to avoid false deadlock detection when transactions are not two-phase locking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Elements of Software Configuration Management"

    Publication Year: 1985, Page(s): 822
    Request permission for commercial reuse | PDF file iconPDF (224 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correction to "A Concurrency Measure"

    Publication Year: 1985, Page(s): 822
    Request permission for commercial reuse | PDF file iconPDF (224 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers

    Publication Year: 1985, Page(s): 823
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Tutorial Week Washington 1985

    Publication Year: 1985, Page(s): 823-a
    Request permission for commercial reuse | PDF file iconPDF (224 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1985, Page(s): 823-b
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • Beyond the Basics: A Software Publication Series for Successful Computer Professionals From the IEEE Computer Society

    Publication Year: 1985, Page(s): 823-c
    Request permission for commercial reuse | PDF file iconPDF (1072 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org