By Topic

IEEE Transactions on Software Engineering

Issue 6 • Nov. 1984

Filter Results

Displaying Results 1 - 25 of 31
  • [Front cover]

    Publication Year: 1984, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 1984, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • A Note from the Editor-in-Chief

    Publication Year: 1984, Page(s): 613
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Representative instances and γ-acyclic relational schemes

    Publication Year: 1984, Page(s):614 - 618
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1520 KB)

    In this paper, we study under what conditions will a pairwise inconsistent relational database ≪R,r≫ have a universal/representative instance L. If R is γ-acyclic and r satisfies all existence constraints, then it is possible to construct a universal instance L, using unmarked nulls, whose total projections onto R yield exactly the relations in r. We show that L would actuall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Knowledge Representation for Model Management Systems

    Publication Year: 1984, Page(s):619 - 628
    Cited by:  Papers (117)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2823 KB)

    This paper examines the concept of a model management system, what its functions are, and how they are to be achieved in a decision support context. The central issue is model representation which involves knowledge representation and knowledge management within a database environment. The model abstraction structure is introduced as a vehicle for model representation which supports both heuristic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • View Definition and Generalization for Database Integration in a Multidatabase System

    Publication Year: 1984, Page(s):628 - 645
    Cited by:  Papers (127)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4305 KB)

    Access to a heterogeneous distributed collection of databases can be simplified by providing users with a logically integrated interface or global view. There are two aspects to database integration. Firstly, the local schemas may model objects and relationships differently and, secondly, the databases may contain mutually inconsistent data. This paper identifies several kinds of structural and da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Site Initialization, Recovery, and Backup in a Distributed Database System

    Publication Year: 1984, Page(s):645 - 650
    Cited by:  Papers (23)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3539 KB)

    Site initialization is the problem of integrating a new site into a running distributed database system (DDBS). Site recovery is the problem of integrating an old site into a DDBS when the site recovers from failure. Site backup is the problem of creating a static backup copy of a database for archival or query purposes. We present an algorithm that solves the site initialization problem. By modif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Methodology for Data Schema Integration in the Entity Relationship Model

    Publication Year: 1984, Page(s):650 - 664
    Cited by:  Papers (75)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2826 KB)

    The conceptual design of databases is usually seen as divided into two steps: view modeling, during which user requirements are formally expressed by means of several user oriented conceptual schemata, and schema integration, whose goal is to merge such schemata into a unique global conceptual schema. This paper is devoted to describe a methodology for schema integration. An enriched entity relati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scheme for Batch Verification of Integrity Assertions in a Database System

    Publication Year: 1984, Page(s):664 - 680
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4420 KB)

    A database management system can ensure the semantic integrity of a database via an integrity control subsystem. A technique for implementation of such a subsystem is proposed. After a database is updated by transactions, its integrity must be verified by evaluation of a set of semantic integrity assertions. For evaluation of an integrity assertion a number of database pages need to be transferred... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Optimal Selection of Multilist Database Structures

    Publication Year: 1984, Page(s):681 - 687
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1876 KB)

    The optimal selection of secondary indexes asks for the quantitative evaluation of the performance of a number of candidate secondary indexes in order to determine the particular combination of indexes which satisfies the anticipated user transactions at a minimal cost. Previous studies determine the optimal selection by assuming that the cost of satisfying a query using a secondary index is not a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Criteria for Software Reliability Model Comparisons

    Publication Year: 1984, Page(s):687 - 691
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2392 KB)

    A set of criteria is proposed for the comparison of software reliability models. The intention is to provide a logically organized basis for determining the superior models and for the presentation of model characteristics. It is hoped that in the future, a software manager will be able to more easily select the model most suitable for his/her requirements from among the preferred ones. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Error Recovery Blocks Used for Cooperating Processes

    Publication Year: 1984, Page(s):692 - 700
    Cited by:  Papers (21)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2252 KB)

    Three alternatives for implementing recovery blocks (RB's) are conceivable for backward error recovery in concurrent processing. These are the asynchronous, synchronous, and the pseudorecovery point implementations. Asynchronous RB's are based on the concept of maximum autonomy in each of concurrent processes. Consequently, establishment of RB's in a process is made independently of others and unb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability Evaluation of Software Systems in Operation

    Publication Year: 1984, Page(s):701 - 714
    Cited by:  Papers (91)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3306 KB)

    This paper deals with evaluation of the dependability (considered as a generic term, whose main measures are reliability, availability, and maintainability) of software systems during their operational life, in contrast to most of the work performed up to now, devoted mainly to development and validation phases. The failure process due to design faults, and the behavior of a software system up to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Successful Software Development

    Publication Year: 1984, Page(s):714 - 727
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4171 KB)

    In 1980, System Development Corporation (SDC) delivered software for a modern air defense system (ADS) for a foreign country. Development of the ADS software was a successful SCD project where all products were delivered within budget and within an ambitious 25 month schedule. This paper describes SDC's approach and experience in developing ADS software. SDC's software development approach include... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Methodology for Collecting Valid Software Engineering Data

    Publication Year: 1984, Page(s):728 - 738
    Cited by:  Papers (347)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3101 KB)

    An effective data collection method for evaluating software development methodologies and for studying the software development process is described. The method uses goal-directed data collection to evaluate methodologies with respect to the claims made for them. Such claims are used as a basis for defining the goals of the data collection, establishing a list of questions of interest to be answer... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Concurrent General Purpose Operator Interface

    Publication Year: 1984, Page(s):738 - 748
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3014 KB)

    Compact interactive control consoles are rephcing traditional control rooms as operator interfaces for physical processes. In the irust major application of concurrent programming outside the area of operating systems, this paper presents a design for a general purpose operator interface which uses a color graphics terminal with a touch-sensitive screen as the control console. Operators interact w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Industrial Software Engineering Retraining Course: Development Considerations and Lessons Learned

    Publication Year: 1984, Page(s):748 - 755
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3208 KB)

    Israel Aircraft Industries has recently been conducting a novel six-month intensive course to retrain practicing engineers to become software engineers working on embedded computer systems. The first course was concluded in January 1982 and the second course began in November 1982. This paper describes the objectives, educational philosophy, course content, and practical experience of the first co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-Time Execution Monitoring

    Publication Year: 1984, Page(s):756 - 764
    Cited by:  Papers (48)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2538 KB)

    Today's programming methodology emphasizes the study of static aspects of programs. In practice, however, monitoring a program in execution, i.e., monitoring a process, is routinely done by any programmer whose task it is to produce a reliable piece of software. There are two reasons why one might want to examine the dynamic aspects of a program: first, to evaluate the performance of a program, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring for Deadlock and Blocking in Ada Tasking

    Publication Year: 1984, Page(s):764 - 777
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3672 KB)

    We present a deadlock monitoring algodrithm for Ada tasking programs which is based on transforming the source program. The transformations introduce a new task called the monitor, which receives information from all other tasks about their tasking activities. The monitor detects deadlocks consisting of circular entry calls as well as some noncircular blocking situations. The correctness of the pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent Maintenance of Binary Search Trees

    Publication Year: 1984, Page(s):777 - 784
    Cited by:  Papers (9)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2269 KB)

    The problem of providing efficient concurrent access for independent processes to a dynamic search structure is the topic of this paper. We develop concurrent algorithms for search, update, insert, and delete in a simple variation of binary search trees, called external trees. The algorithm for deletion, which is usually the most difficult operation, is relatively easy in this data structure. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Counting Paths: Nondeterminism as Linear Algebra

    Publication Year: 1984, Page(s):785 - 794
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2641 KB)

    Nondeterminism is considered to be ignorance about the actual state transition sequence performed during a computation. The number of distinct potential paths from state i to j forms a matrix [nij]. The behavior of a nondeterministic program is defined to be this multiplicity matrix of the state transitions. The standard programming constructs have behaviors defined in terms of the beha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Required Element Testing

    Publication Year: 1984, Page(s):795 - 803
    Cited by:  Papers (98)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2647 KB)

    In this paper we introduce two classes of program testing strategies that consist of specifying a set of required elements for the program and then covering those elements with appropriate test inputs. In general, a required element has a structural and a functional component and is covered by a test case if the test case causes the features specified in the structural component to be executed und... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Concurrency Measure

    Publication Year: 1984, Page(s):804 - 810
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1588 KB)

    With the new advents of technology and the availability of microprocessors and minicomputers, parallel and distributed processing is gaining widespread acceptability. In such systems resources are shared among a number of processes. Accesses to the resources must be synchronized in order to guarantee proper operation of a system. In this research work, a measure, called maximal compatibility, is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selectors: High-Level Resource Schedulers

    Publication Year: 1984, Page(s):810 - 825
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4182 KB)

    Resource sharing problems can be described in three basically independent modular components. • The constraints the resource places upon sharing because of physcal limitations and consistency requirements. • The desired ordering of resource requests to achieve efficiency-either efficiency of resource utilization or efficiency of processes making the requests. • Modification... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algebraic Specification of HDLC Procedures and Its Verification

    Publication Year: 1984, Page(s):825 - 836
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4686 KB)

    It is well known that algebraic specification methods are promising for specifying programs and for verifying their various properties formally. In this paper, an algebraic specification of information transfer procedures of high-level data link control (HDLC) procedures is presented and some of the main properties of the specification are shown. First, we introduce abstract states, state transiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org