By Topic

IEEE Transactions on Software Engineering

Issue 2 • Date March 1984

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 1984, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1984, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Editorial

    Publication Year: 1984, Page(s): 125
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 1984, Page(s):126 - 127
    Request permission for commercial reuse | PDF file iconPDF (1081 KB)
    Freely Available from IEEE
  • Specification of the UNIX Filing System

    Publication Year: 1984, Page(s):128 - 142
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2551 KB)

    A specification of the UNIX filing system is given using a notation based on elementary mathematical set theory. The notation used involves very few special constructs of its own. The specification is detailed enough to capture the filing system's behavior at the system call level, yet abstracts from issues of data representation, whether in programs or on the storage medium, and from the descript... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Rigorous Development of a System Version Control Program

    Publication Year: 1984, Page(s):143 - 154
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2572 KB)

    A rigorous approach to software development is followed in developing a program to control the various components and versions of systems. This particular approach to systematic program development is known as the Vienna Development Method (VDM). This paper documerits the author's early experiences with VDM on a small, yet nontrivial, application. The functional specification of the version contro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SLAN-4-A software specification and design language

    Publication Year: 1984, Page(s):155 - 162
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2180 KB)

    SLAN-4 ("Software Language-4") was developed to meet the need for a formal tool for specifying and designing large software systems. It provides language constructs for algebraic and axiomatic specifications and also pseudocode constructs for the design step. A major design goal was to ease subsequent refinements of a (given) specification. The design can start with a very informal specification, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correct and Robust Programs

    Publication Year: 1984, Page(s):163 - 174
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3289 KB)

    The design of programs which are both correct and robust is investigated. It is argued that the notion of an exception is a valuable tool for structuring the specification, design, verification, and modification of such programs. The syntax and semantics of a language with procedures and exception handling are presented. A deductive system is proposed for proving total correctness and robustness p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Programming by Iterations

    Publication Year: 1984, Page(s):175 - 178
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1341 KB)

    Iterative computations are considered in this paper as a general problem-solving technique. The loop invariant is derived from problem properties rather than from program properties (as is usual in programming literature). To this end, the notion of equisolution states-a special subset of space-state in which lie the iterated trajectories-is introduced. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cell: A Distributed Computing Modularization Concept

    Publication Year: 1984, Page(s):178 - 185
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2787 KB)

    This paper presents a new language construct for distributed computing. This construct, called cell, allows one to simulate a variety of language constructs, Its salient features provide the programmer with: 1) an effective communication and synchronization scheme, 2) a mechanism to control the order in which various activities within a cell should be executed. We demonstrate the usefulness of our... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access Control with Single-Key-Lock

    Publication Year: 1984, Page(s):185 - 191
    Cited by:  Papers (24)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2799 KB)

    Based on the concept of an access matrix, a new protection system that achieves access control is proposed. In this system, associated with each accessor is only a key, and associated with each resource is only a lock, and through simple operations on the keys and locks, privacy decisions of the protection system can be revealed. Amechanism that realizes this system is also described. Noticing the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database Support for Versions and Alternatives of Large Design Files

    Publication Year: 1984, Page(s):191 - 200
    Cited by:  Papers (39)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4006 KB)

    We identify the roles played by design versions and alternatives in an engineering database. The obvious way to implement versions is to maintain each in a separate collection of files. Because several versions must be kept on line in a design environment, the approach leads to large disk requirements. We develop B-tree-based storage structures to encode versions as ``negative'' differential files... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design Considerations for a Message File Server

    Publication Year: 1984, Page(s):201 - 210
    Cited by:  Papers (46)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2569 KB)

    In this paper we describe a message server facility for handling large organizational archives of messages in an office information system environment. Messages can be retrieved according to attribute values specified and to some pattern of words appearing in the text of the message. We discuss design decisions and performance considerations in this environment and we derive analytic formulas for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Debugging a Distributed Computing System

    Publication Year: 1984, Page(s):210 - 219
    Cited by:  Papers (42)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3972 KB)

    In this paper we discuss the issues involved in debugging a provide distributed computing system. We describe the major differences between debugging a distributed system and debugging a sequential program. We suggest a methodology for distributed debugging, and we propose various tools or aids. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 1984, Page(s): 220
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 1984, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org