By Topic

IEEE Transactions on Software Engineering

Issue 7 • Date July 1987

Filter Results

Displaying Results 1 - 17 of 17
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1987, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (374 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1987, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • The Path Prefix Software Testing Strategy

    Publication Year: 1987, Page(s):761 - 766
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2032 KB)

    A new software testing strategy is described. The strategy is "adaptive" in that previous test paths (inputs) are used as a guide in the selection of subsequent paths (inputs). Preliminary implementations have successfully exploited the method's inherent user-interactive capability. The method ensures branch coverage, requires only "order n" tests (n being the number of decision nodes in the progr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring Errors in Operational Analysis Assumptions

    Publication Year: 1987, Page(s):767 - 776
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2512 KB)

    Operational analysis, an area of study first defined in the computer science field, has been used in the analysis of systems performance. System performance measures for a specific set of output data are obtained using operational analysis formulas derived from assumptions which are verifiable by the observed data. This paper gives relationships which may be used to quantify the errors in these as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Recursion Theoretic Approach to Program Testing

    Publication Year: 1987, Page(s):777 - 784
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3072 KB)

    Inductive inference, the automatic synthesis of programs, bears certain ostensible relationships with program testing. For inductive inference, one must take a finite sample of the desired input/output behavior of some program and produce (synthesize) an equivalent program. In the testing paradigm, one seeks a finite sample for a function such that any program (in a given set) which computes somet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Superviews: Virtual Integration of Multiple Databases

    Publication Year: 1987, Page(s):785 - 798
    Cited by:  Papers (41)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4072 KB)

    An important advantage of a database system is that it provides each application with a custom view of the data. The issue addressed in this paper is how to provide such custom views to applications that access multiple databases. The paper describes a formal method that generates such superviews, in an interactive process of schema editing operations. A mapping of the superview into the individua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Access Methods Using Compact Binary Trees

    Publication Year: 1987, Page(s):799 - 810
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4680 KB)

    It is shown how a highly compact representation of binary trees can be used as the basis of two access methods for dynamic files, called BDS-trees and S-trees, respectively. Both these methods preserve key-order and offer easy and efficient sequential access. They are different in the way the compact binary trees are used for searching. With a BDS-tree the search is a digital search using binary d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation

    Publication Year: 1987, Page(s):811 - 819
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3176 KB)

    In this paper, we give a polynomial-time method to construct effectively the unique universal instance, using as few nulls as possible, from any loop-free network database, via a "minimal information" extension of natural join. Our results can be seen as concretely and quickly implementing the universal relation view for databases which are not pairwise consistent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theory of Modules

    Publication Year: 1987, Page(s):820 - 829
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2736 KB)

    Because large-scale software development is a struggle against internal program complexity, the modules into which programs are divided play a central role in software engineering. A module encapsulating a data type allows the programmer to ignore both the details of its operations, and of its value representations. It is a primary strength of program proving that as modules divide a program, maki... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Conceptual Analysis of the Draco Approach to Constructing Software Systems

    Publication Year: 1987, Page(s):830 - 844
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3568 KB)

    This paper analyzes the concepts of software construction embodied in the Draco approach. The analysis relates specific aspects of Draco to particular software engineering (SE) principles and suggests future research needed to extend the approach. The purpose of this analysis is to help researchers understand Draco better and thus to enhance future research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating Software Engineering Technologies

    Publication Year: 1987, Page(s):845 - 851
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2400 KB)

    Many new software development practices, tools, and techniques have been introduced in recent years. Few, however, have been empirically evaluated. The objectives of this study were to measure technology use in a production environment, develop a statistical model for evaluating the effectiveness of technologies, and evaluate the effects of some specific technologies on productivity and reliabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-Sensitive Cost Models in the Commercial MIS Environment

    Publication Year: 1987, Page(s):852 - 859
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2520 KB)

    Current time-sensitive cost models suggest a significant impact on project effort if elapsed time compression or expansion is implemented. This paper reports an empirical study into the applicability of these models in the management information systems environment. It is found that elapsed time variation does not consistently affect project effort. This result is analyzed in terms of the theory s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Integration in Distributed Databases

    Publication Year: 1987, Page(s):860 - 864
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB)

    Data integration in a distributed database refers to the production of union-compatible views for similar information expressed dissimilarly in different nodes. Such a facility is needed for location transparency and for easier formulation of global queries over the apparently incompatible data aggregated from different nodes. This paper examines the issues in data integration within a relational ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Note on Concurrent Programming Control

    Publication Year: 1987, Page(s):865 - 866
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    An extension to Dijkstra's solution [1], of the problem of limiting access by multiple processors to a single resource, is described. The solution has similar delay characteristics to Ferguson's solution [3] while using less complex data structures. Some claims in [3] are examined. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The One Leveraged Investment With a Guaranteed Return

    Publication Year: 1987, Page(s):867 - 867-a
    Request permission for commercial reuse | PDF file iconPDF (304 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1987, Page(s): 867-b
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • In this issue

    Publication Year: 1987, Page(s): 867
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org