By Topic

# IEEE Transactions on Software Engineering

## Filter Results

Displaying Results 1 - 21 of 21
• ### [Front cover]

Publication Year: 1984, Page(s): c1
| PDF (26 KB)

Publication Year: 1984, Page(s): nil1
| PDF (26 KB)
• ### Protocol Verification via Projections

Publication Year: 1984, Page(s):325 - 342
Cited by:  Papers (89)  |  Patents (1)
| | PDF (4719 KB)

The method of projections is a new approach to reduce the complexity of analyzing nontrivial communication protocols. A protocol system consists of a network of protocol entities and communication channels. Protocol entities interact by exchanging messages through channels; messages in transit may be lost, duplicated as well as reordered. Our method is intended for protocols with several distingui... View full abstract»

• ### Broadcasting Sequential Processes (BSP)

Publication Year: 1984, Page(s):343 - 351
Cited by:  Papers (28)  |  Patents (3)
| | PDF (2703 KB)

Communication in a broadcast protocol multiprocessor (BPM) is inherently different from that in distributed systems formed by explicit links between processors. A message broadcast by a processor in a BPM is received directly by all other processors in the network instead of being restricted to only one processor. Broadcasting is an inexpensive way of communicating with a large number of processor... View full abstract»

• ### Program Slicing

Publication Year: 1984, Page(s):352 - 357
Cited by:  Papers (1080)  |  Patents (23)
| | PDF (2110 KB)

Program slicing is a method for automatically decomposing programs by analyzing their data flow and control flow. Starting from a subset of a program's behavior, slicing reduces that program to a minimal form which still produces that behavior. The reduced program, called a slice,'' is an independent program guaranteed to represent faithfully the original program within the domain of the specifi... View full abstract»

• ### Automatic Design of the Internal Schema for a CODASYL Database System

Publication Year: 1984, Page(s):358 - 375
Cited by:  Papers (3)  |  Patents (2)
| | PDF (3983 KB)

This paper describes the concepts and implementation of a design aid for the internal schema of an existing CODASYL-like database system. It allows for tailoring the storage structure level to a given logical schema and a specified workload. According to the 1978 CODASYL report, our DBMS provides two levels of schema declaration, the DDL-level for logical schema description and a DSDL-like level f... View full abstract»

• ### Modeling Software Behavior in Terms of a Formal Life Cycle Curve: Implications for Software Maintenance

Publication Year: 1984, Page(s):376 - 383
Cited by:  Papers (6)
| | PDF (2518 KB)

In this paper, a formal model of the software manloading pattern, the Rayleigh model, is described and then applied to four Bankers Trust Company (BTCo.) new development projects possessing complete life cycle manloading data (maintenance phase included). To fit the Rayleigh curve to a project's manloading scores, (nonlinear) regression was used to obtain least squares estimates of the Rayleigh pa... View full abstract»

• ### A Software Engineering Environment (SEE) for Weapon System Software

Publication Year: 1984, Page(s):384 - 397
Cited by:  Papers (2)
| | PDF (3308 KB)

A software engineering environment (SEE) has been designed, developed, and used for the life-cycle support of weapon system software. This SEE consists of two types of facilities: software production and integration. The software production facility consists of a software system that runs on a commercial multicomputer configuration. The approach features increased management visibility of the soft... View full abstract»

• ### Research on Structured Programming: An Empiricist's Evaluation

Publication Year: 1984, Page(s):397 - 407
Cited by:  Papers (25)
| | PDF (4099 KB)

In spite of the widespread acceptance by academics and practitioners of structured programming precepts, relatively few formal empirical studies have been conducted to obtain evidence that either supports or refutes the theory. This paper reviews the empirical studies that have been undertaken and critiques them from the viewpoints of the soundness of their methodology and their ability to contrib... View full abstract»

• ### Use of Software Engineering Practices at a Small MIS Shop

Publication Year: 1984, Page(s):408 - 413
| | PDF (1498 KB)

This paper describes the software engineering practices used by the MIS Department at United Technologies Microelectronics Center (UTMC). It describes the life cycle of a software change and the controls established to implement the change. Several software tools used by UTMC to develop and control software development and integration are described as well as methods used to integrate vendor softw... View full abstract»

• ### Some Equivalence Results for Load-Independent Exponential Queueing Networks

Publication Year: 1984, Page(s):414 - 422
Cited by:  Papers (1)
| | PDF (2218 KB)

In this paper we derive a number of results concerning the behavior of closed load-independent exponential queueing networks. It is shown that if the service rate of any station is increased (decreased), then the throughput of the network itself also increases (decreases). This is not true for product form networks in general. In addition, if the service rate at server i is increased then both the... View full abstract»

• ### Virtual Memory Behavior of Some Sorting Algorithms

Publication Year: 1984, Page(s):422 - 431
Cited by:  Papers (6)
| | PDF (3338 KB)

Experimnental results are given about the performance of six sorting algorithms in a virtual memory based on the working set principle. With one exception, the algorithms are general internal sorting algorithms and not especially tuned for virtual memory. Algorithms are compared in terms of their time requirements, space requirements, and space-time integrals. The relative performances of the algo... View full abstract»

• ### Data Flow Anomaly Detection

Publication Year: 1984, Page(s):432 - 437
Cited by:  Papers (10)
| | PDF (1768 KB)

The occurrence of a data flow anomaly is often an indication of the existence of a programming error. The detection of such anomalies can be used for detecting errors and to upgrade software quality. This paper introduces a new, efficient algorithm capable of detecting anomalous data flow patterns in a program represented by a graph. The algorithm based on static analysis scans the paths entering ... View full abstract»

• ### An Evaluation of Random Testing

Publication Year: 1984, Page(s):438 - 444
Cited by:  Papers (263)  |  Patents (1)
| | PDF (2145 KB)

Random testing of programs has usually (but not always) been viewed as a worst case of program testing. Testing strategies that take into account the program structure are generally preferred. Path testing is an often proposed ideal for structural testing. Path testing is treated here as an instance of partition testing, where by partition testing is meant any testing scheme which forces execution... View full abstract»

• ### On the Execution of Large Batch Programs in Unreliable Computing Systems

Publication Year: 1984, Page(s):444 - 450
Cited by:  Papers (8)
| | PDF (2995 KB)

The execution of long-running batch programs imposes severe reliability constraints on a computing system since the occurrence of a failure during its execution is more likely and that once occurred, a failure would destroy all the processing perfonned thus far. This paper studies the execution delay and machine resources consumed in supporting the running of large batch programs in a computing en... View full abstract»

• ### Static Data Flow Analysis of PL/I Programs with the PROBE System

Publication Year: 1984, Page(s):451 - 459
Cited by:  Papers (5)
| | PDF (2186 KB)

An experimental data flow analyzer for PL/I programs has been implemented within the PROBE system developed at the GM Research Laboratories. PROBE is an experimental software package that examines the internal structure of PL/I programs in order to expose error-prone design and programming features. This paper describes 1) the algorithms and data structures used by the data flow analyzer, 2) the s... View full abstract»

• ### Estimating the Number of Faults in Code

Publication Year: 1984, Page(s):459 - 464
Cited by:  Papers (49)
| | PDF (988 KB)

This paper provides formulas relating the number of faults or bugs'' to the number of lines of code and to the number of conditional jumps. A result is that there are, on the average, about 21 bugs per KSLOC discoverable after successful compilation. A major motivation for the work presented here was to determine if some published data suggest any relationship between the level of the coding lan... View full abstract»

• ### Comments on "Optimization Algorithms for Distributed Queries

Publication Year: 1984, Page(s):464 - 465
Cited by:  Papers (2)
| | PDF (509 KB)

First Page of the Article
View full abstract»

• ### A Method for Processing Distributed Database Queries

Publication Year: 1984, Page(s):466 - 471
Cited by:  Papers (6)
| | PDF (920 KB)

The efficient processing of distributed database queries is of great importance in a distributed database management system. The algorithm-S described in this research is very efficient and low in complexity. The algorithm assumes uniformly distributed data within the attributes of a relation and data independence across attributes. Natural data reductions which occur in nonjoining attributes with... View full abstract»

• ### Call for Papers

Publication Year: 1984, Page(s): 472
| PDF (113 KB)
• ### [Front cover]

Publication Year: 1984, Page(s): c2
Cited by:  Papers (3)
| PDF (26 KB)

## Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall