By Topic

IET Software

Issue 2 • April 2009

Filter Results

Displaying Results 1 - 7 of 7
  • Editorial: Selected papers from SBES '07

    Publication Year: 2009, Page(s):67 - 68
    IEEE is not the copyright holder of this material | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Refactoring to improve the understandability of specifications written in object constraint language

    Publication Year: 2009, Page(s):69 - 90
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (629 KB)

    Object constraint language (OCL) is the object management group standard language for the precise specification of constraints associated with MetaObject facility specification-compliant models and metamodels. Although OCL has been created with the intention of being a simpler language when compared with traditional formal specification languages, it is common to find specifications containing OCL... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing finite state machine test

    Publication Year: 2009, Page(s):91 - 105
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (759 KB)

    To plan testing activities, testers face the challenge of determining a strategy, including a test coverage criterion that offers an acceptable compromise between the available resources and test goals. Known theoretical properties of coverage criteria do not always help and, thus, empirical data are needed. The results of an experimental evaluation of several coverage criteria for finite state ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web usability inspection technique based on design perspectives

    Publication Year: 2009, Page(s):106 - 123
    Cited by:  Papers (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (367 KB)

    A usability inspection technique called Web design perspective based usability evaluation (WDP) as well as the experimentation methodology followed to support its development and improvement is described. Three experimental studies (one secondary and two primaries) were carried out and led to the current version of WDP. Results indicate the feasibility of the WDP technique and its possibility to b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interaction laws for dependability explicit computing in open multi-agent systems

    Publication Year: 2009, Page(s):124 - 139
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (639 KB)

    In an open multi-agent system (MAS), agent autonomy and heterogeneity may possibly exploit cooperation, leading the system to an undesirable state. Since an MAS has no central control, a coordination mechanism must be developed to allow agents to fulfill their design goals. It is proposed to incorporate the dependability explicit computing (DepEx) ideas into a law-governed approach in order to bui... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring embedded software timing properties with an SoC-resident monitor

    Publication Year: 2009, Page(s):140 - 153
    Cited by:  Papers (3)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (664 KB)

    Many safety-critical software applications are hard real-time systems. They have stringent timing requirements that have to be adhered to. Functional timing requirements need to interact properly with performance timing requirements. A novel runtime monitor that can check for proper timing behaviour of software, in the actual implementation environment, is presented. The monitor can be synthesised... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive service migration for long-running Byzantine fault-tolerant systems

    Publication Year: 2009, Page(s):154 - 164
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (468 KB)

    A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Software publishes papers on all aspects of the software lifecycle, including design, development, implementation and maintenance.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_sen@theiet.org