Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Transactions on Software Engineering

Issue 5 • Sept. 1980

Filter Results

Displaying Results 1 - 19 of 19
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1980, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (392 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1980, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • Editor's Notice

    Publication Year: 1980, Page(s): 401
    Request permission for commercial reuse | PDF file iconPDF (736 KB)
    Freely Available from IEEE
  • Data Element Security and Its Effects on File Segmentation

    Publication Year: 1980, Page(s):402 - 410
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2496 KB)

    The literature on physical database design in general, and on file segmentation in particular, typically ignores any consideration of data security and the cost to enforce it. If records can be physically designed so that all data elements in a given record type have identical security restrictions for a given user, then data element level security enforcement can be transformed into the less cost... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design of a Cryptography Based Secure File System

    Publication Year: 1980, Page(s):411 - 420
    Cited by:  Papers (8)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3136 KB)

    The design of a secure file system based on user controlled cryptographic (UCC) transformations is investigated. With UCC transformations, cryptography not only complements other protection mechanisms, but can also enforce protection specifications. Files with different access permissions are enciphered by different cryptographic keys supplied by authorized users at access time. Several classes of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Design Representation Using Abstract Process Networks

    Publication Year: 1980, Page(s):420 - 435
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5616 KB)

    An approach to software design representation which is consistent with the concept of engineering blueprints is presented. The main criteria for software engineering blueprints are defined and a network scheme of graphical representation is considered through an overview of Petri net techniques. The concept of an abstract process (AP) is introduced as the basic element of system representation. An... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Deadlock Detection in Distributed Systems

    Publication Year: 1980, Page(s):435 - 440
    Cited by:  Papers (45)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2392 KB)

    A hierarchically organized and a distributed protocol for deadlock detection in distributed databases are presented in [1]. In this paper we show that the distributed protocol is incorrect, and present possible remedies. However, the distributed protocol remains impractical because "condensations" of "transaction-wait-for" graphs make graph updates difficult to perform. Delayed graph updates cause... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of Asynchronous Concurrent Systems Using Petri Nets

    Publication Year: 1980, Page(s):440 - 449
    Cited by:  Papers (310)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3464 KB)

    Some analysis techniques for real-time asynchronous concurrent systems are presented. In order to model clearly the synchronization involved in these systems, an extended timed Petri net model is used. The system to be studied is first modeled by a Petri net. Based on the Petri net model, a system is classified into either: 1) a consistent system; or 2) an inconsistent system. Most real-world syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Universal File Server

    Publication Year: 1980, Page(s):450 - 453
    Cited by:  Papers (3)  |  Patents (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB)

    A file server is a utility provided in a computer connected via a local communications network to a number of other computer. File servers exist to preserve material for the benefit of client machines or systems. It is desirable for a file server to be able to support multiple file directory and access management systems, so that the designer of a client system retains the freedom to design the sy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of the Axiomatic and Functional Models of Structured Programming

    Publication Year: 1980, Page(s):454 - 465
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4168 KB)

    This paper discusses axiomatic and functional models of the semantics of structured programming. The models are presented together with their respective methodologies for proving program correctness and for deriving correct programs. Examples using these methodologies are given. Finally, the models are compared and contrasted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program correctness: on inductive assertion methods

    Publication Year: 1980, Page(s):465 - 479
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4686 KB)

    A study of several of the proof of correctness methods is presented. In particular, the form of induction used is explored in detail. A relational semantic model for programming languages is introduced and its relation to predicate transformers is explored. A rather elementary viewpoint is taken in order to expose, as simply as possible, the basic differences of the methods and the underlying prin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Verification Rule and Its Applications

    Publication Year: 1980, Page(s):480 - 484
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1680 KB)

    This paper describes a verification rule for loop programs, and shows how it can be used in conjunction with the invariant-relation theorem to facilitate verification of programs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Formal Specification of Control Modules

    Publication Year: 1980, Page(s):485 - 489
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1032 KB)

    This paper is concerned with the formal specification of program modules which control access to resources shared among concurrent proceses. The concept of state space is defined for such program modules and the formal specification is given in terms of a program module invariant and input-output assertions defined on the state space. Examples are provided to ilustrate the construction of sDecific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theories of Software Reliability: How Good Are They and How Can They Be Improved?

    Publication Year: 1980, Page(s):489 - 500
    Cited by:  Papers (97)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2936 KB)

    An examination of the assumptions used in early bug-counting models of software reliability shows them to be deficient. Suggestions are made to improve modeling assumptions and examples are given of mathematical implementations. Model verification via real-life data is discussed and minimum requirements are presented. An example shows how these requirements may be satisfied in practice. It is sugg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Summary of the Discussion on "An Analysis of Competing Software Reliability Models"

    Publication Year: 1980, Page(s):501 - 502
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 1980, Page(s): 502
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 1980, Page(s): 502
    Request permission for commercial reuse | PDF file iconPDF (1081 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1980, Page(s): 502-c
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Advance Announcing... Tutorial Week80

    Publication Year: 1980, Page(s): 502
    Request permission for commercial reuse | PDF file iconPDF (2135 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org