By Topic

IEEE Transactions on Software Engineering

Issue 3 • Date May 1983

Filter Results

Displaying Results 1 - 25 of 26
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1983, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (547 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1983, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (304 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 1983, Page(s): 217
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • State-of-the-Art Issues in Distributed Databases

    Publication Year: 1983, Page(s): 218
    Request permission for commercial reuse | PDF file iconPDF (1352 KB)
    Freely Available from IEEE
  • A Formal Model of Crash Recovery in a Distributed System

    Publication Year: 1983, Page(s):219 - 228
    Cited by:  Papers (78)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2176 KB)

    A formal model for atomic commit protocols for a distributed database system is introduced. The model is used to prove existence results about resilient protocols for site failures that do not partition the network and then for partitioned networks. For site failures, a pessimistic recovery technique, called independent recovery, is introduced and the class of failures for which resilient protocol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Rematerialization: Processing Distributed Queries Using Redundant Data

    Publication Year: 1983, Page(s):228 - 232
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    In this paper an approach to processing distributed queries that makes explicit use of redundant data is proposed. The basic idea is to focus on the dynamics of materialization, defined as the collection of data and partial results available for processing at any given time, as query processing proceeds. In this framework the role of data redudancy in maximizing parallelism and minimizing data mov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyzing Concurrency Control Algorithms When User and System Operations Differ

    Publication Year: 1983, Page(s):233 - 239
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2560 KB)

    Concurrency control algorithms for database systems are usually regarded as methods for synchronizing Read and Write operations. Such methods are judged to be correct if they only produce serializable executions. However, Reads and Writes are sometimes inaccurate models of the operations executed by a database system. In such cases, serializability does not capture all aspects of concurrency contr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Mutual Inconsistency in Distributed Systems

    Publication Year: 1983, Page(s):240 - 247
    Cited by:  Papers (83)  |  Patents (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1792 KB)

    Many distributed systems are now being developed to provide users with convenient access to data via some kind of communications network. In many cases it is desirable to keep the system functioning even when it is partitioned by network failures. A serious problem in this context is how one can support redundant copies of resources such as files (for the sake of reliability) while simultaneously ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Input–Output Tools: A Language Facility for Interactive and Real-Time Systems

    Publication Year: 1983, Page(s):247 - 259
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3848 KB)

    A conceptual model is discussed which allows the hierarchic definition of high-level input driven objects, called input-output tools, from any set of basic input primitives. An input-output tool is defined as a named object. Its most important elements are the input rule, output rule, internal tool definitions, and a tool body consisting of executable statements. The input rule contains an express... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File Structures, Program Structures, and Attributed Grammars

    Publication Year: 1983, Page(s):260 - 266
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2696 KB)

    A language for defining sequential file structures, characterized as nested sequences of records having in common certain keys and types, is presented. "Input schemata" are defined as program skeletons that contain all the necessary control structure to process a specified file. A method for obtaining an input schema from the corresponding file structure definition is given. The method is based on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compilation of Nonprocedural Specifications into Computer Programs

    Publication Year: 1983, Page(s):267 - 279
    Cited by:  Papers (15)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4104 KB)

    The paper describes the compilation of a program specification, written in the very high level nonprocedural MODEL language, into an object, PL/1 or Cobol, procedural language program. Nonprocedural programming languages are descriptive and devoid of procedural controls. They are therefore easier to use and require less programming skills than procedural languages. The MODEL language is briefly pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Diagrammatic Notation for Abstract Syntax and Abstract Structured Objects

    Publication Year: 1983, Page(s):280 - 289
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2424 KB)

    The concept of abstract syntax is commonly applied to the formal specification of programming language semantics and is also useful in the broader context of software design. This paper proposes a scheme for the representation of abstract syntax specifications in the form of easily understood charts. The structuring primitives considered are those of scalar enumeration, heterogeneous aggregation, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design for a Secure System Based on Program Analysis

    Publication Year: 1983, Page(s):289 - 299
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4504 KB)

    This paper describes the design of a prototype experimental secure operating system kernel called xsl that supports compile-time enforcement of an information flow policy. The security model chosen is an extension of Feiertag's model modified to state requirements in terms of program analysis functions. A prototype flow analyzer for Pascal programs, based on Denning's model, has been designed and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VSWS: The Variable-Interval Sampled Working Set Policy

    Publication Year: 1983, Page(s):299 - 305
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3984 KB)

    A local variable-size memory policy called the variable-interval sampled working set (VSWS) policy is described. The results of trace-driven simulation experiments reported here show that VSWS has a static performance comparable to those of the working set (WS) and sampled working set (SWS) policies, a dynamic performance better than those of WS, SWS, and the page fault frequency (PFF) policy, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of a New Perfect Hash Scheme

    Publication Year: 1983, Page(s):305 - 313
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3824 KB)

    A new approach is proposed for the design of perfect hash functions. The algorithms developed can be effectively applied to key sets of large size. The basic ideas employed in the construction are rehash and segmentation. Analytic results are given which are applicable when problem sizes are small. Extensive experiments have been performed to test the approach for problems of larger size. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonsensitive Data and Approximate Transactions

    Publication Year: 1983, Page(s):314 - 322
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3136 KB)

    A methodology has been proposed for solving database problems requiring only approximate solutions. Data items are classified as sensitive and nonsensitive. An approximate transaction modifies only the nonsensitive data items which need not satisfy strong consistency constraints, and provides results only up to a degree of approximation. Further, it is shown that such an approach improves the perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Release Time of Computer Software

    Publication Year: 1983, Page(s):323 - 327
    Cited by:  Papers (60)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2000 KB)

    A decision procedure to determine when computer software should be released is described. This procedure is based upon the cost-benefit for the entire company that has developed the software. This differs from the common practice of only minimizing the repair costs for the data processing division. Decision rules are given to determnine at what time the system should be released based upon the res... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining Testing with Formal Specifications: A Case Study

    Publication Year: 1983, Page(s):328 - 335
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2624 KB)

    This paper describes our experience specifying, implementing, and validating a record-oriented text editor similar to one discussed in [7]. Algebraic axioms served as the specification notation; and the implementation was tested with a compiler-based system that uses the axioms to test implementations with a finite collection of test cases. Formal specifications were sometimes difficult to produce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing for Perturbations of Program Statements

    Publication Year: 1983, Page(s):335 - 346
    Cited by:  Papers (22)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5016 KB)

    Many testing methods require the selection of a set of paths on which tests are to be conducted. Errors in arithmetic expressions within program statements can be represented as perturbing functions added to the correct expression. It is then possible to derive the set of errors in a chosen functional class which cannot possibly be detected using a given test path. For example, test paths which pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Flow Oriented Program Testing Strategy

    Publication Year: 1983, Page(s):347 - 354
    Cited by:  Papers (160)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3016 KB)

    Some properties of a program data flow can be used to guide program testing. The presented approach aims to exercise use-definition chains that appear in the program. Two such data oriented testing strategies are proposed; the first involves checking liveness of every definition of a variable at the point(s) of its possible use; the second deals with liveness of vectors of variables treated as arg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Software Fault Tolerance in Real-Time Systems

    Publication Year: 1983, Page(s):355 - 364
    Cited by:  Papers (53)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3496 KB)

    Real-time systems often have very high reliability requirements and are therefore prime candidates for the inclusion of fault tolerance techniques. In order to provide tolerance to software faults, some form of state restoration is usually advocated as a means of recovery. State restoration can be expensive and the cost is exacerbated for systems which utilize concurrent processes. The concurrency... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Noisy Substring Matching Problem

    Publication Year: 1983, Page(s):365 - 370
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2432 KB)

    Let T(U) be the set of words in the dictionary H which contains U as a substring. The problem considered here is the estimation of the set T(U) when U is not known, but Y, a noisy version of U is available. The suggested set estimate S*(Y) of T(U) is a proper subset of H such that its every element contains at least one substring which resembles Y most according to the Levenshtein metric. The prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Protocols for Deadlock Detection in Distributed Database Systems"

    Publication Year: 1983, Page(s): 371
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    The two-phase deadlock detection protocol in the above paperl detects false deadlocks. This is contrary to what the authors claim. The false detection o. f deadlocks is shown using a counterexample. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 1982 Referees List

    Publication Year: 1983, Page(s): 372
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • IEEE Computer Soceity Publications

    Publication Year: 1983, Page(s): 372-a
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org