By Topic

IEEE Transactions on Software Engineering

Issue 4 • Date July 1981

Filter Results

Displaying Results 1 - 19 of 19
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1981, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (437 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1981, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (448 KB)
    Freely Available from IEEE
  • Major Issues in Software Engineering Project Management

    Publication Year: 1981, Page(s):333 - 342
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2216 KB)

    Software engineering project management (SEPM) has been the focus of much recent attention because of the enormous penalties incurred during software development and maintenance resulting from poor management. To date there has been no comprehensive study performed to determine the most significant problems of SEPM, their relative importance, or the research directions necessary to solve them. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Software Maintainability Evaluation Methodology

    Publication Year: 1981, Page(s):343 - 351
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2952 KB)

    This paper describes a conceptual framework of software maintainability and an implemented procedure for evaluating a program's documentation and source code for maintainability characteristics. The evaluation procedure includes use of closed-form questionnaires completed by a group of evaluators. Statistical analysis techniques for validating the evaluation procedure are described. Some prelimina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Editor's Note

    Publication Year: 1981, Page(s): 352
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • The Annotated Assistant: A Step Towards Human Engineering

    Publication Year: 1981, Page(s):353 - 373
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4096 KB)

    The Hatter's watch nicely illustrates the effect of idiosynracy in system design. Really, a watch could provide any number of features, but most watches designed for people put a high priority on telling the correct time of day. Thus, the Hatter's watch is an excellent example of bad human engineering. By human engineering we mean "the selection among design alternatives so as to relate to people.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global Comments

    Publication Year: 1981, Page(s): 370
    Request permission for commercial reuse | PDF file iconPDF (360 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments from a Letter Written on July 19, 1978

    Publication Year: 1981, Page(s):370 - 371
    Request permission for commercial reuse | PDF file iconPDF (600 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's reply

    Publication Year: 1981, Page(s):373 - 374
    Request permission for commercial reuse | PDF file iconPDF (1638 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mathematical Model for the Comparison of Static and Dynamic Memory Allocation in a Paged System

    Publication Year: 1981, Page(s):375 - 385
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2760 KB)

    In this paper we compare the two classical memory allocation policies in a multiprogrammed system with paged memory: a static policy based on prepaging and a dynamic policy using page allocation on demand. The two policies are modeled by networks of queues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Modeling of Shared-Resource Array Processors

    Publication Year: 1981, Page(s):386 - 394
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2720 KB)

    This paper presents a Markov chain model to analyze the performance of shared-resource array processors for multiple vector processing. Such a parallel processor contains multiple control units sharing a resource pool of processing elements and operating with multiple single-instruction multiple-data streams (MSIMD). In the steady state, the Markov model corresponds to a two-dimensional Markov cha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Symmetrical Exponential Open Queue Network with Blocking and Feedback

    Publication Year: 1981, Page(s):395 - 402
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2504 KB)

    The exponential open queue network model studied here consists of n symmetrical queues in parallel served by independent first-level servers in tandem with a second-level server. Blocking of the flow of units through a first-level server occurs each time the server completes a service. The server remains blocked until its blocking unit completes its service at the second-level server. An approxima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Long Term File Reference Patterns for Application to File Migration Algorithms

    Publication Year: 1981, Page(s):403 - 417
    Cited by:  Papers (21)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3272 KB)

    In most large computer installations files are moved between on-line disk and mass storage (tape, integrated mass storage device) either automatically by the system and/or at the direction of the user. In this paper we present and analyze long term file reference data in order to develop a basis for the construction of algorithms for file migration. Specifically, we examine the use of the on-line ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proofs of Networks of Processes

    Publication Year: 1981, Page(s):417 - 426
    Cited by:  Papers (132)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2984 KB)

    We present a proof method for networks of processes in which component processes communicate exclusively through messages. We show how to construct proofs of invariant properties which hold at all times during network computation, and terminal properties which hold upon termination of network computation, if network computation terminates. The proof method is based upon specifying a process by a p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach to Distributed Computing System Software Design

    Publication Year: 1981, Page(s):427 - 436
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4584 KB)

    Distributed computing systems represent a wide variety of computer systems, ranging from a centralized star network to a completely decentralized computer system. The design of software for distributed computing systems is more complicated due to many design constraints and interactions of software components of the system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structuring Distributed Systems for Recoverability and Crash Resistance

    Publication Year: 1981, Page(s):436 - 447
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4992 KB)

    An object-oriented multilevel model of computation is used to discuss recoverability and crash resistance issues in distributed systems. Of particular importance are the issues that are raised when recoverability and crash resistance properties are desired from objects whose concrete representations are distributed over several nodes. The execution of a program at a node of the system can give ris... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Runtime Checking for ISO Standard Pascal

    Publication Year: 1981, Page(s):447 - 448
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1720 KB)

    Changes to Pascal, embodied in the proposed ISO Pascal standard, affected Fischer and LeBlanc's runtime error checking implementation designed for Wirthian Pascal. Three kinds of runtime errors became obsolete; two were introduced, and one was apparently neglected. A criticism is made of Fischer and LeBlanc's conclusion that runtime errors will always be with us. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Publications

    Publication Year: 1981, Page(s): 448-a
    Request permission for commercial reuse | PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 1981, Page(s): 448
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org