By Topic

IEEE Transactions on Software Engineering

Issue 9 • Date Sept. 1985

Filter Results

Displaying Results 1 - 25 of 26
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1985, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (466 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1985, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • IEEE Software

    Publication Year: 1985, Page(s):829-a - 829-d
    Request permission for commercial reuse | PDF file iconPDF (3584 KB)
    Freely Available from IEEE
  • An Introduction to IEEE Software

    Publication Year: 1985, Page(s): 829
    Request permission for commercial reuse | PDF file iconPDF (1421 KB)
    Freely Available from IEEE
  • Foreword Technical Conferences: A Window to the Future

    Publication Year: 1985, Page(s):830 - 831
    Request permission for commercial reuse | PDF file iconPDF (1416 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Omega—A Data Flow Analysis Tool for the C Programming Language

    Publication Year: 1985, Page(s):832 - 838
    Cited by:  Papers (4)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2360 KB)

    This paper describes Omega, a prototype system designed to analyze data flow in C programs. Omega is capable of detecting certain types of common programming errors, or assuring their absence. Omega also addresses the problems of analyzing pointer variables. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of Software Reliability Models

    Publication Year: 1985, Page(s):839 - 849
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3080 KB)

    This paper proposes a method for assessing software reliability models and its application to the Musa and Littlewood-Verrall models. It is divided into two parts. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Stability Measures for Software Maintenance

    Publication Year: 1985, Page(s):849 - 856
    Cited by:  Papers (58)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4080 KB)

    The high cost of software during its life cycle can be attributer largely to software maintenance activities, and a major portion of these activities is to deal with the modifications of the software. In this paper, design stability measures which indicate the potential ripple effect characteristics due to modifications of the program at the design level are presented. These measures can be genera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Uncertainty in the Correctness of Computer Programs

    Publication Year: 1985, Page(s):857 - 864
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1552 KB)

    The use of digital computers in critical process control systems requires the formal assessment of the system reliability. Failures can be due to either component malfunctions or design faults. Only the latter are relevant in evaluating software reliability. Although it is preferable to prove whether the program meets its specification, this is not yet practical for real-time control programs. Fur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database Integrity Block Construct: Concepts and Design Issues

    Publication Year: 1985, Page(s):865 - 885
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5840 KB)

    When a crash occurs in a transaction processing system, the database can enter an unacceptable state. To continue the processing, the recovery system has three tasks: 1) verification of the database state for acceptability, 2) restoration of an acceptable database state, and 3) restoration of an acceptable history of transaction processing. Unfortunately these tasks are not trivial and the computa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Implementation of an Automated Protocol Synthesizer (APS) and Its Application to the X.21 Protocol

    Publication Year: 1985, Page(s):886 - 908
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4616 KB)

    In the past, a number of methods have been proposed to model and validate communication protocols that have already been designed. However, design criteria and design aids are still lacking for designing correct protocols. The objective of developing automated protocol synthesizers is to provide a systematic way of designing new communication protocols such that their correctness can be ensured. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Software Quality Assurance

    Publication Year: 1985, Page(s):909 - 916
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2728 KB)

    This paper describes a family of tools which not only supports software development, but also assures the quality of each software product from the requirements definition to the integrated system. It is based upon an explicit definition of the design objectives and includes specification verification, design evaluation, static program analysis, dynamic program analysis, integration test auditing,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Testing Aided by Structured Analysis: A Practical Experience

    Publication Year: 1985, Page(s):917 - 921
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2088 KB)

    This paper deals with the use of Structured Analysis just prior to system acceptance testing. Specifically, the drawing of data flow diagrams (DFD) was done after integration testing. The DFD's provided a picture of the logical flow through the integrated system for thorough system acceptance testing. System test sets, were derived from the flows in the DFD's. System test repeatability was enhance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic Modeling of Branch-and-Bound Algorithms with Best-First Search

    Publication Year: 1985, Page(s):922 - 934
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3816 KB)

    Branch-and-bound algorithms are organized and intelligently structured searches of solutions in a combinatorially large problem space. In this paper, we propose an approximate stochastic model of branch-and-bound algorithms with a best-first search. We have estimated the average memory space required and have predicted the average number of subproblems expanded before the process terminates. Both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Environmental Testing Techniques for Software Certification

    Publication Year: 1985, Page(s):934 - 938
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3416 KB)

    The problems of developing software requirements and quality assurance techniques have basically dealt with an environment where a single organization acts as the designer, developer, and user of the software product. Since the mid-1970' s, however, there has been a great increase in the use of "packaged" software products designed and developed by one organization for use in a variety of other or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RUBRIC: A System for Rule-Based Information Retrieval

    Publication Year: 1985, Page(s):939 - 945
    Cited by:  Papers (10)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3816 KB)

    A research prototype software system for conceptual information retrieval has been developed. The goal of the system, called RUBRIC, is to provide more automated and relevant access to unformatted textual databases. The approach is to use production rules from artificial intelligence to define a hierarchy of retrieval subtopics, with fuzzy context expressions and specific word phrases at the botto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPD: A Humanized Documentation Technology

    Publication Year: 1985, Page(s):945 - 953
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3880 KB)

    The SPD (Structured Programming Diagram) is a documentation technology used to design well structured programs. With SPD, designers can easily express functional structure, control structure, and physical layout of a program on one sheet of paper. Its straightforward expression appeals to both document writers and readers. SPD concept and conventions are introduced in this paper. SPD usage is then... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time and Cost Evaluation Schemes of Multiple Copies of Data in Distributed Database Systems

    Publication Year: 1985, Page(s):954 - 959
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3464 KB)

    In comparison to centralized database systems, distributed database systems have certain advantages depending on the manner in which data are redundantly distributed. These advantages are improvement in response time, better data availability, reduction in transmission cost, etc. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive File Allocation in Star Computer Network

    Publication Year: 1985, Page(s):959 - 965
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2704 KB)

    In this paper, we study the allocation of files in a star network. Unlike previous algorithms which assume that files are independently accessed and independently assigned, the interaction of files during the processing of queries is directly incorporated into our cost model. We present an adaptive algorithm, which is much faster than existing algorithms on file allocation, obtains solutions which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward the Next Generation of Data Modeling Tools

    Publication Year: 1985, Page(s):966 - 970
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2216 KB)

    This paper describes the Update Protocol Model (UPM), a formal language for the expression of database update semantics. UPM has been used primarily to capture and communicate in a precise and uniform notation the plethora of database semantics described by a variety of "fourth generation" models, many of which are imprecise when it comes to update semantics. Several computing trends–knowled... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Augmenting Ada for SIMD Parallel Processing

    Publication Year: 1985, Page(s):970 - 977
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4088 KB)

    In order to program SIMD (single instruction stream-multiple data stream) parallel machines used for tasks such as speech and image processing, a language with explicit parallel constructs is often desirable. The language Ada, developed by the Department of Defense, is used here as a basis for such a language. Extensions of Ada, which allow the user to specify such operations as interprocessor com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Software Development Through Dynamic Variables

    Publication Year: 1985, Page(s):978 - 985
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2560 KB)

    This paper describes research conducted by the Software Engineering Laboratory (SEL) on the use of dynamic variables as a tool to monitor software development. The intent of the project is to identify project independent measures which may be used in a management tool for monitoring software development. This study examines several Fortran projects with similar profiles. The staff was experienced ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomous Vehicle Control Using Al Techniques

    Publication Year: 1985, Page(s):986 - 992
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3872 KB)

    A review of early work on a project to develop autonomous vehicle control technology is presented. The primary goal of this effort is the development of a generic capability that can be specialized to a wide range of DoD applications. The emphasis in this project is development of the fundamental Al-based technology required by autonomous systems and the implementation of a testbed environment to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 1985, Page(s): 992
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1985, Page(s): 992-a
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org