IEEE Transactions on Software Engineering

Issue 8 • Aug 1992

Filter Results

Displaying Results 1 - 7 of 7
  • Working with persistent objects: to swizzle or not to swizzle

    Publication Year: 1992, Page(s):657 - 673
    Cited by:  Papers (26)  |  Patents (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1644 KB)

    Pointer swizzling is the conversion of database objects between an external form (object identifiers) and an internal form (direct memory pointers). Swizzling is used in some object-oriented databases, persistent object stores, and persistent and database programming language implementations to speed manipulation of memory resident data. The author describes a simplifying model of application beha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer aided analysis and derivation for artificial neural systems

    Publication Year: 1992, Page(s):728 - 735
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    The theoretical analysis and derivation of artificial neural systems, which consists essentially of manipulating symbolic mathematical objects according to certain mathematical and biological knowledge, can be done more efficiently with computer assistance by using and extending methods and systems of symbolic computation. After presenting the mathematical characteristics of neural systems and a b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fundamentals of deductive program synthesis

    Publication Year: 1992, Page(s):674 - 704
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2204 KB)

    An informal tutorial for program synthesis is presented, with an emphasis on deductive methods. According to this approach, to construct a program meeting a given specification, the authors prove the existence of an object meeting the specified conditions. The proof is restricted to be sufficiently constructive, in the sense that, in establishing the existence of the desired output, the proof is f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic scheduling of hard real-time tasks and real-time threads

    Publication Year: 1992, Page(s):736 - 748
    Cited by:  Papers (50)  |  Patents (29)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1236 KB)

    The authors investigate the dynamic scheduling of tasks with well-defined timing constraints. They present a dynamic uniprocessor scheduling algorithm with an O(n log n) worst-case complexity. The preemptive scheduling performed by the algorithm is shown to be of higher efficiency than that of other known algorithms. Furthermore, tasks may be related by precedence constr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Querying of executable software specifications

    Publication Year: 1992, Page(s):705 - 716
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1092 KB)

    The availability of executable specification languages allows testing to be carried out soon after or concurrently with the requirements specification phase. In addition, it becomes possible to use these languages for rapid prototyping, making it possible to gather information on properties of the specified target system including its behavior in response to external events. The inspection of soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting unsafe error recovery schedules

    Publication Year: 1992, Page(s):749 - 760
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1224 KB)

    A mechanism for modeling timing, precedence, and data-consistency constraints on concurrently executing processes is presented. The model allows durations and intervals between events to be specified. An algorithm is provided to detect schedules which may be unsafe with respect to the constraints. This work, motivated by the design and validation of autonomous error-recovery strategies on the Gali... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PIE: a dynamic failure-based technique

    Publication Year: 1992, Page(s):717 - 727
    Cited by:  Papers (172)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (996 KB)

    A dynamic technique called PIE (propagation, infection, and execution) is presented for statistically estimating three program characteristics that affect a program's computational behavior: (1) the probability that a particular section of a program is executed, (2) the probability that the particular section affects the data state, and (3) the probability that a data state produced by that sectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org