By Topic

Software, IET

Issue 5 • Date October 2008

Filter Results

Displaying Results 1 - 6 of 6
  • Theory for classifying equivalences of unified modelling language activity diagrams

    Page(s): 391 - 403
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (255 KB)  

    Despite the fact that there has been a wide adoption of unified modelling language activity diagrams (UML ADs) for software development, research focusing on the equivalence notions of UML ADs is scarce. To address this area of concern, the author presents a sound theoretical foundation for UML ADs. Through the use of these formal definitions of UML ADs, the author propounds a method which classifies various types of equivalences of UML ADs in a systematic way. The proposed classification, which is the core result of our work, provides a framework that enables the study of the properties and inter-relationships of the equivalences. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The π measure

    Page(s): 404 - 416
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (412 KB)  

    A novel software measure, called the pi measure, used for evaluating the fault-detection effectiveness of test sets, for measuring test-case independence and for measuring code complexity is proposed. The pi measure is interpreted as a degree of run-time control and data difference at the code level, resulting from executing a program on a set of test cases. Unlike other well-known static and dynamic complexity measures, the pi measure is an execution measure, computed using only run-time information. The Diversity Analyzer computes the pi measure for programs written in C, C++, C# and VB in .NET. The experimental data presented here show a correlation between the pi measure, test case independence and fault-detection rates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing a software measurement program in small and medium enterprises: a suitable framework

    Page(s): 417 - 436
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (352 KB)  

    The successful implementation of software measurement programs is not an easy task. Software measurement program implementations sometimes fail, and this failure is frequently caused by their definition: the measurement program does not provide the required information, the data required are difficult to obtain and so on. The definition of measurement programs is even less encouraging in small and medium enterprises (SMEs), since most of the outstanding measurement program models are not suited to these types of companies. Additionally, the literature provides few cases of measurement program implementation, which could be used as a source of reference for good practices through which to successfully perform these activities. A measurement program definition framework suited to SMEs called MIS-PyME is used to implement a measurement program in the software development and maintenance department of a medium company. The result of this measurement program and the good practices detected from this experience are expounded, along with the benefits obtained using MIS-PyME in contrast to our previous experiences of using the goal question indicator metric. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reliability allocation of digital relay for transmission line protection using a combined system hierarchy and fault tree approach

    Page(s): 437 - 445
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (340 KB)  

    Digital relay is a special purpose signal processing unit in which the samples of physical parameters such as current, voltage and other quantities are taken. With the proliferation of computer technology in terms of computational ability as well as reliability, computers are being used for such digital signal processing purposes. As far as computer hardware is concerned, it has been growing steadily in terms of power and reliability. Since power plant technology is now globally switching over to such computer-based relaying, software reliability naturally emerges as an area of prime importance. Recently, some computer-based digital relay algorithms have been proposed based on frequency-domain analysis using wavelet-neuro-fuzzy techniques for transmission line faults. A software reliability allocation scheme is devised for the performance evaluation of a multi-functional, multi-user digital relay that does detection, classification and location of transmission line faults. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conflict-aware schedule of software refactorings

    Page(s): 446 - 460
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (265 KB)  

    Software refactoring is to restructure the internal structure of object-oriented software to improve software quality, especially maintainability, extensibility and reusability while preserving its external behaviours. According to predefined refactoring rules, we may find many places in the software where refactorings can be applied. Applying each refactoring, we may achieve some effect (quality improvement). If we can apply all of the available refactorings, we can achieve the greatest effect. However, the conflicts among refactorings usually make it impossible. The application of a refactoring may change or delete elements necessary for other refactorings, and thus disables these refactorings. As a result, the application order (schedule) of the available refactorings determines which refactorings will be applied, and thus determines the total effect achieved by the refactoring activity. Consequently, conflicting refactorings had better be scheduled rationally so as to promote the total effect of refactoring activities. However, how to schedule conflicting refactorings is rarely discussed.In this paper, a conflict-aware scheduling approach is proposed. It schedules refactorings according to the conflict matrix of refactorings and effects of each individual refactoring. The scheduling model is a multi-objective optimisation model. We propose a heuristic algorithm to solve the scheduling model. We also evaluate the proposed scheduling approach in non-trivial projects. Evaluation results suggest that refactoring activities with the scheduling approach lead to greater effect (quality improvement) than refactoring activities without explicit scheduling. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Types for task-based access control in workflow systems

    Page(s): 461 - 473
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (259 KB)  

    Task-based access control (TBAC) is a flexible security mechanism, which has been widely implemented in workflow management systems. In TBAC, permissions are assigned to tasks and users can only obtain the permissions during the execution of tasks. The authors aim at developing a method for formalising and analysing security properties of workflow systems under TBAC policy. To achieve this goal, the authors first present WFPI, workflow pi-calculus. By adding task execution and submission primitives, and tagging each agent with its executing and distributing tasks, WFPI can flexibly represent the concepts and elements in workflow systems. Then, based on WFPI, a type system is proposed to ensure that the well-typed workflow systems can abide by the TBAC policy at run time, by avoiding run-time access violations. To the best of onepis knowledge, the present research is the first attempt to study workflow access control by process calculus and types. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Software publishes papers on all aspects of the software lifecycle, including design, development, implementation and maintenance.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_sen@theiet.org