By Topic

IEEE Transactions on Software Engineering

Issue 6 • Date Nov. 1982

Filter Results

Displaying Results 1 - 19 of 19
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1982, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (479 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1982, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (296 KB)
    Freely Available from IEEE
  • Implementation of the Database Machine Direct

    Publication Year: 1982, Page(s):533 - 543
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3640 KB)

    DIRECT is a multiprocessor database machine designed and implemented at the University of Wisconsin. This paper describes our experiences with the implementation of DIRECT. We start with a brief overview of the original machine proposal and how it differs from what was actually implemented. We then describe the structure of the DIRECT software. This includes software on host computers that interfa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • View Modeling and Integration Using the Functional Data Model

    Publication Year: 1982, Page(s):544 - 553
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3488 KB)

    Conventional database design techniques rely heavily on the designer's skill and experience, which are neither efficient nor effective for large, realistic design problems. A computer design aid can help by storing many design parameters and performing simple preprocessing before design decisions are made. In this paper, we report on the development of such a system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Protocols for Deadlock Detection in Distributed Database Systems

    Publication Year: 1982, Page(s):554 - 557
    Cited by:  Papers (13)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2088 KB)

    In distributed databases, deadlocks may occur due to conflicts in data file lockings A system is in a deadlock if and only if there is a directed cycle in its demand graph. However, due to the inherent communication delay in a distributed system, it is not easy to construct a consistent demand graph for a distributed system. In this paper, three deadlock detection protocols are discussed. The firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Family of Locking Protocols for Database Systems that Are Modeled by Directed Graphs

    Publication Year: 1982, Page(s):558 - 562
    Cited by:  Papers (4)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB)

    This paper is concerned with the problem of ensuring the integrity of database systems that are accessed concurrently by a number of independent asychronously running transactions. It is assumed that the database system is partitioned into small units that are referred to as the database entities. The relation between the entities is represented by a directed acyclic graph in which the vertices co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Logical Access Path Schema of a Database

    Publication Year: 1982, Page(s):563 - 573
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2904 KB)

    A new schema which models the usage of the logical access paths of the database is proposed. The schema models all database activities (i.e., retrievals and updates), and integrates their logical access paths by recognizing common subpaths and increasing the "weight" of the shared subpaths. The logical access path schema provides a comprehensive picture of the logical access paths, and the cumulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Auditing and Inference Control in Statistical Databases

    Publication Year: 1982, Page(s):574 - 582
    Cited by:  Papers (25)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1984 KB)

    A statistical database (SDB) may be defined as an ordinary database with the capability of providing statistical information to user queries. The security problem for the SDB is to limit the use of the SDB so(that only statistical information is available and no sequence of queries is sufficient to infer protected information about any individual. When such information is obtained, the SDB is said... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mechanism for Database Protection in Cellular-Logic Devices

    Publication Year: 1982, Page(s):583 - 596
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4544 KB)

    Protection of data in a database against unauthorized disclosure, alteration, or destruction is an important aspect of a multiuser database system. In a system which uses a celiular-logic device as a means for data management applications, protection can be achieved in part by associating security windows with queries. This paper describes a mechanism for dynamically creating these windows for cel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unidirectional Transport of Rights and Take–Grant Control

    Publication Year: 1982, Page(s):597 - 604
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2936 KB)

    One of the most critical and least understood aspects of protection is the exercise of control over the movement of rights between the subjects of a system. The conventional Take-Grant mechanism for exercising such control suffers from a puzzling and unfortunate limitation: it cannot enforce strictly unidirectional channels for the flow of rights. That is, if rights can be moved directly or indire... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Databases and Units of Measure

    Publication Year: 1982, Page(s):605 - 611
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2608 KB)

    A serious impediment to the integrated use of databases across international boundaries, scientific disciplines and application areas is the use of different units of measure, e.g., miles or kilometers for distance, dollars or rupees for currency, and Btu or kWh for energy. Units of measure are not specified in the data definition language but associated by convention with values in the database. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Extendible Hashing

    Publication Year: 1982, Page(s):611 - 619
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4312 KB)

    Extendible hashing is an attractive direct-access technique which has been introduced recently. It is characterized by a combination of database-size flexibility and fast direct access. This paper derives performance measures for extendible hashing, and considers their implecations on the physical database design. A complete characterization of the probability distribution of the directory size an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "A Method for Representing Data Items of Unlimited Length in a Computer Memory"

    Publication Year: 1982, Page(s):620 - 621
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    In the above paper,1Baber describes a scheme for representing data items with unlimited length. We would like to argue that this scheme is not very different from other published schemes and that his scheme is not obviously useful for the proposed application. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author's reply2

    Publication Year: 1982, Page(s): 621
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (318 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 1982 Index IEEE Transactions on Software Engineering Vol. SE-18

    Publication Year: 1982, Page(s): 621
    Request permission for commercial reuse | PDF file iconPDF (1109 KB)
    Freely Available from IEEE
  • Advance Announcement... Tutorial Week West82

    Publication Year: 1982, Page(s): 621
    Request permission for commercial reuse | PDF file iconPDF (1398 KB)
    Freely Available from IEEE
  • Call for Papers 1983 Trends and Applications Conference

    Publication Year: 1982, Page(s): 621
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1982, Page(s): 621-h
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 1982, Page(s): 621
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org