By Topic

IEEE Transactions on Software Engineering

Issue 4 • July 1984

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 1984, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1984, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Protocol Verification via Projections

    Publication Year: 1984, Page(s):325 - 342
    Cited by:  Papers (88)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4719 KB)

    The method of projections is a new approach to reduce the complexity of analyzing nontrivial communication protocols. A protocol system consists of a network of protocol entities and communication channels. Protocol entities interact by exchanging messages through channels; messages in transit may be lost, duplicated as well as reordered. Our method is intended for protocols with several distingui... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Broadcasting Sequential Processes (BSP)

    Publication Year: 1984, Page(s):343 - 351
    Cited by:  Papers (28)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2703 KB)

    Communication in a broadcast protocol multiprocessor (BPM) is inherently different from that in distributed systems formed by explicit links between processors. A message broadcast by a processor in a BPM is received directly by all other processors in the network instead of being restricted to only one processor. Broadcasting is an inexpensive way of communicating with a large number of processor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program Slicing

    Publication Year: 1984, Page(s):352 - 357
    Cited by:  Papers (1050)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2110 KB)

    Program slicing is a method for automatically decomposing programs by analyzing their data flow and control flow. Starting from a subset of a program's behavior, slicing reduces that program to a minimal form which still produces that behavior. The reduced program, called a ``slice,'' is an independent program guaranteed to represent faithfully the original program within the domain of the specifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Design of the Internal Schema for a CODASYL Database System

    Publication Year: 1984, Page(s):358 - 375
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3983 KB)

    This paper describes the concepts and implementation of a design aid for the internal schema of an existing CODASYL-like database system. It allows for tailoring the storage structure level to a given logical schema and a specified workload. According to the 1978 CODASYL report, our DBMS provides two levels of schema declaration, the DDL-level for logical schema description and a DSDL-like level f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Software Behavior in Terms of a Formal Life Cycle Curve: Implications for Software Maintenance

    Publication Year: 1984, Page(s):376 - 383
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2518 KB)

    In this paper, a formal model of the software manloading pattern, the Rayleigh model, is described and then applied to four Bankers Trust Company (BTCo.) new development projects possessing complete life cycle manloading data (maintenance phase included). To fit the Rayleigh curve to a project's manloading scores, (nonlinear) regression was used to obtain least squares estimates of the Rayleigh pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Software Engineering Environment (SEE) for Weapon System Software

    Publication Year: 1984, Page(s):384 - 397
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3308 KB)

    A software engineering environment (SEE) has been designed, developed, and used for the life-cycle support of weapon system software. This SEE consists of two types of facilities: software production and integration. The software production facility consists of a software system that runs on a commercial multicomputer configuration. The approach features increased management visibility of the soft... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Structured Programming: An Empiricist's Evaluation

    Publication Year: 1984, Page(s):397 - 407
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4099 KB)

    In spite of the widespread acceptance by academics and practitioners of structured programming precepts, relatively few formal empirical studies have been conducted to obtain evidence that either supports or refutes the theory. This paper reviews the empirical studies that have been undertaken and critiques them from the viewpoints of the soundness of their methodology and their ability to contrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of Software Engineering Practices at a Small MIS Shop

    Publication Year: 1984, Page(s):408 - 413
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1498 KB)

    This paper describes the software engineering practices used by the MIS Department at United Technologies Microelectronics Center (UTMC). It describes the life cycle of a software change and the controls established to implement the change. Several software tools used by UTMC to develop and control software development and integration are described as well as methods used to integrate vendor softw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some Equivalence Results for Load-Independent Exponential Queueing Networks

    Publication Year: 1984, Page(s):414 - 422
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2218 KB)

    In this paper we derive a number of results concerning the behavior of closed load-independent exponential queueing networks. It is shown that if the service rate of any station is increased (decreased), then the throughput of the network itself also increases (decreases). This is not true for product form networks in general. In addition, if the service rate at server i is increased then both the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Memory Behavior of Some Sorting Algorithms

    Publication Year: 1984, Page(s):422 - 431
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3338 KB)

    Experimnental results are given about the performance of six sorting algorithms in a virtual memory based on the working set principle. With one exception, the algorithms are general internal sorting algorithms and not especially tuned for virtual memory. Algorithms are compared in terms of their time requirements, space requirements, and space-time integrals. The relative performances of the algo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Flow Anomaly Detection

    Publication Year: 1984, Page(s):432 - 437
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1768 KB)

    The occurrence of a data flow anomaly is often an indication of the existence of a programming error. The detection of such anomalies can be used for detecting errors and to upgrade software quality. This paper introduces a new, efficient algorithm capable of detecting anomalous data flow patterns in a program represented by a graph. The algorithm based on static analysis scans the paths entering ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evaluation of Random Testing

    Publication Year: 1984, Page(s):438 - 444
    Cited by:  Papers (257)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2145 KB)

    Random testing of programs has usually (but not always) been viewed as a worst case of program testing. Testing strategies that take into account the program structure are generally preferred. Path testing is an often proposed ideal for structural testing. Path testing is treated here as an instance of partition testing, where by partition testing is meant any testing scheme which forces execution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Execution of Large Batch Programs in Unreliable Computing Systems

    Publication Year: 1984, Page(s):444 - 450
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2995 KB)

    The execution of long-running batch programs imposes severe reliability constraints on a computing system since the occurrence of a failure during its execution is more likely and that once occurred, a failure would destroy all the processing perfonned thus far. This paper studies the execution delay and machine resources consumed in supporting the running of large batch programs in a computing en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static Data Flow Analysis of PL/I Programs with the PROBE System

    Publication Year: 1984, Page(s):451 - 459
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2186 KB)

    An experimental data flow analyzer for PL/I programs has been implemented within the PROBE system developed at the GM Research Laboratories. PROBE is an experimental software package that examines the internal structure of PL/I programs in order to expose error-prone design and programming features. This paper describes 1) the algorithms and data structures used by the data flow analyzer, 2) the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating the Number of Faults in Code

    Publication Year: 1984, Page(s):459 - 464
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    This paper provides formulas relating the number of faults or ``bugs'' to the number of lines of code and to the number of conditional jumps. A result is that there are, on the average, about 21 bugs per KSLOC discoverable after successful compilation. A major motivation for the work presented here was to determine if some published data suggest any relationship between the level of the coding lan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comments on "Optimization Algorithms for Distributed Queries

    Publication Year: 1984, Page(s):464 - 465
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method for Processing Distributed Database Queries

    Publication Year: 1984, Page(s):466 - 471
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    The efficient processing of distributed database queries is of great importance in a distributed database management system. The algorithm-S described in this research is very efficient and low in complexity. The algorithm assumes uniformly distributed data within the attributes of a relation and data independence across attributes. Natural data reductions which occur in nonjoining attributes with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 1984, Page(s): 472
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 1984, Page(s): c2
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org