By Topic

IEEE Transactions on Software Engineering

Issue 2 • Date March 1982

Filter Results

Displaying Results 1 - 16 of 16
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1982, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (367 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1982, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (264 KB)
    Freely Available from IEEE
  • The Performance Evaluation of Control Implementations

    Publication Year: 1982, Page(s):89 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3112 KB)

    A methodology for the experimental investigation of the implementation of control in programming languages is presented. The methodology specifies a data-collection technique, the environment for driving simulations of control implementations, and a meaningful metric for performance evaluation. The key in the methodology is the separation of activity which is affected by the control implementation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some Results on the Working Set Anomalies in Numerical Programs

    Publication Year: 1982, Page(s):97 - 106
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2232 KB)

    This paper shows that the working set parameter-real memory and real memory-fault rate anomalies mentioned by Franklin, Graham, and Gupta in [13] do occur in traces generated by real programs. The results of the detailed investigation of this anomalous behavior in four Fortran programs are presented. In some cases a drop of a factor of two in the average real-time memory allotment is observed when... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Code Optimization Considerations in List Processing Systems

    Publication Year: 1982, Page(s):107 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2536 KB)

    Code optimization is characterized as a time versus space tradeoff. Space optimizations are further decomposed into static and dynamic categories. Using this characterization, the optimization requirements of a list processing language such as LISP are examined. Scrutiny of the structure of programs written in such a language reveals that traditional code optimization techniques have little benefi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queueing Analysis of a Reordering Issue

    Publication Year: 1982, Page(s):113 - 123
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2456 KB)

    In this paper an M/G/∞queue is considered that receives a stream of numbered tasks. Results are derived concerning the probabilistic properties of the reordering done by the queue. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Impact of Run-Time Schema Interpretation in a Network Data Model DBMS

    Publication Year: 1982, Page(s):123 - 136
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5376 KB)

    This paper describes a simulation study of the effect of runtime schema interpretation in a network data model database management system. To perform database operations, programmers use a data manipulation language which supports calls to the data manipulation routines. The data manipulation routines utilize database descriptors from the schema to determine which operations on the database are to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Local Network Based on the UNIX Operating System

    Publication Year: 1982, Page(s):137 - 146
    Cited by:  Papers (10)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3520 KB)

    The design and implementation of a local network operating ystem based on the UNIX1operating system is described. UNIX has been extended to allow existing programs to access remote resources with no source program changes. Programs may access remote files, have a remote working directory, execute remote programs, and communicate with remote processes using the standard UNIX interprocess... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Functional Approach to Module Verification

    Publication Year: 1982, Page(s):147 - 160
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3704 KB)

    The purpose of this paper is to develop a method for designing and verifying data abstractions using the functional approach. Before doing so, the existing techniques for designing and verifying procedure and data abstractions will be surveyed briefly. These techniques will then be modified and extended to verify data abstractions. By using the concept of a mathematical function, one can model the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Corrigendum to "Proofs of Networks of Processes"

    Publication Year: 1982, Page(s): 160
    Request permission for commercial reuse | PDF file iconPDF (1272 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Announcing an Important New Journal IEEE Transactions on Medical Imaging

    Publication Year: 1982, Page(s): 160-a
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • Advance Announcement... Tutorial Week East82

    Publication Year: 1982, Page(s): 160
    Request permission for commercial reuse | PDF file iconPDF (1991 KB)
    Freely Available from IEEE
  • Call for Participation

    Publication Year: 1982, Page(s): 160
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • IEEE Computer Society Press Checklist of New Titles December 1981

    Publication Year: 1982, Page(s): 160-d
    Request permission for commercial reuse | PDF file iconPDF (272 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1982, Page(s): 160-e
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 1982, Page(s): 160
    Request permission for commercial reuse | PDF file iconPDF (1298 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org