By Topic

IEEE Transactions on Software Engineering

Issue 3 • Date May 1980

Filter Results

Displaying Results 1 - 14 of 14
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1980, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (396 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1980, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • Guest Editorial Special Collection on Program Testing

    Publication Year: 1980, Page(s):233 - 235
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1648 KB)

    THIS special collection had its genesis at the IEEE Computer Society Workshop on Software Testing and Test Documentation, held in Fort Lauderdale, Florida, during December 18-20, 1978. This collection is devoted to selected papers on program testing that were presented at the Workshop. It contains six papers whose concerns span a wide range: theoretical issues, practical expenence With particular ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theories of Program Testing and the Application of Revealing Subdomains

    Publication Year: 1980, Page(s):236 - 246
    Cited by:  Papers (95)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3320 KB)

    The theory of test data selection proposed by Goodenough and Gerhart is examined. In order to extend and refine this theory, the concepts of a revealing test criterion and a revealing subdomain are proposed. These notions are then used to provide a basis for constructing program tests. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Domain Strategy for Computer Program Testing

    Publication Year: 1980, Page(s):247 - 257
    Cited by:  Papers (173)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3408 KB)

    This paper presents a testing strategy desiged to detect errors in the control flow of a computer program, and the conditions under which this strategy is reliable are given and characterized. The control flow statements in a computer progam partition the input space into a set of mutually exclusive domains, each of which corresponds to a particular program path and consists of input data points w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Sensitive Test Cases Analysis (ESTCA)

    Publication Year: 1980, Page(s):258 - 264
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2168 KB)

    A hardware failure analysis technique adapted to software yielded three rules for generating test cases sensitive to code errors. These rules, and a procedure for generating these cases, are given with examples. Areas for further study are recommended. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Detection in Concurrent Software by Static Data Flow Analysis

    Publication Year: 1980, Page(s):265 - 278
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3576 KB)

    Algorithms are presented for detecting errors and anomalies in programs which use synchronization constructs to implement concurrency. The algorithms employ data flow analysis techniques. First used in compiler object code optimization, the techniques have more recently been used in the detection of variable usage errors in dngle process programs. By adapting these existing algorithms, the sane cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience with Path Analysis and Testing of Programs

    Publication Year: 1980, Page(s):278 - 286
    Cited by:  Papers (87)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3768 KB)

    There are a number of practical difficulties in performing a path testing strategy for computer programs. One problem is in deciding which paths, out of a possible infinity, to use as test cases. A hierarchy of structural test metrics is suggested to direct the choide and to monitor the coverge of test paths. Another problem is that many of the chosen paths may be infeasible in the sense that no t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SADAT—An Automated Testing Tool

    Publication Year: 1980, Page(s):286 - 290
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2896 KB)

    This paper describes the automated testing tool SADAT, which supports the testing of single Fortran modules. The different functions which are integrated in this system are explained, the usage of the tool is demonstrated, and some output results are presented. The special benefits of the SADAT system are summarized. The history and the present status of the system are outlned. Finaly, a listing o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Alternative to the Rayleigh Curve Model for Software Development Effort

    Publication Year: 1980, Page(s):291 - 296
    Cited by:  Papers (48)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2024 KB)

    A new model of the software development process is presented and used to derive the form of the resource consumption curve of a project over its life cycle. The function obtained differs in detail from the Rayleigh curve previously used in fitting actual project data. The main advantage of the new model is that it relates the rate of progress which can be achieved in developing software to the str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subsystems of Processes with Deadlock Avoidance

    Publication Year: 1980, Page(s):297 - 304
    Cited by:  Papers (7)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2680 KB)

    A graph-oriented approach to deadlock avoidance, which treates both shared and exclusive locking, has been described [6]. The method is particularly suited for database systems. With enhancements introduced here, the problem of indefimite delay, i.e., the possibility that a process will not run to completion (will be delayed indefinitely) can be eliminated. The approach taken is to partition the r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deadline-Oriented Servicing: Waiting-Time Distributions

    Publication Year: 1980, Page(s):304 - 312
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2472 KB)

    An infinite queue single server model is considered where requests arrive from independent Poisson streams and demand service according to arbitrary distribution functions which may be different for different requests. Associated with each request is an urgency number which, together with request's time of arrival, defines a deadline for beginning its service. This relative urgency discipline has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Publications

    Publication Year: 1980, Page(s): 312-a
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 1980, Page(s): 312
    Request permission for commercial reuse | PDF file iconPDF (1353 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org