By Topic

IEEE Transactions on Software Engineering

Issue 2 • Date March-April 2010

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Editorial: Readers, Writers, Reviewers, and Editors

    Publication Year: 2010, Page(s):145 - 156
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors' Introduction to the Special Section on Exception Handling: From Requirements to Software Maintenance

    Publication Year: 2010, Page(s):147 - 149
    Request permission for commercial reuse | PDF file iconPDF (105 KB) | HTML iconHTML
    Freely Available from IEEE
  • Understanding Exception Handling: Viewpoints of Novices and Experts

    Publication Year: 2010, Page(s):150 - 161
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    Several recent studies indicate that many industrial applications exhibit poor quality in the design of exception-handling. To improve the quality of error-handling, we need to understand the problems and obstacles that developers face when designing and implementing exception-handling. In this paper, we present our research on understanding the viewpoint of developers-novices and experts-toward e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exception Handling Patterns for Process Modeling

    Publication Year: 2010, Page(s):162 - 183
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3126 KB) | HTML iconHTML

    Process modeling allows for analysis and improvement of processes that coordinate multiple people and tools working together to carry out a task. Process modeling typically focuses on the normative process, that is, how the collaboration transpires when everything goes as desired. Unfortunately, real-world processes rarely proceed that smoothly. A more complete analysis of a process requires that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Programming Robust Context-Aware Applications

    Publication Year: 2010, Page(s):184 - 197
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3461 KB) | HTML iconHTML

    In this paper, we present a forward recovery model for programming robust context-aware applications. The mechanisms devised as part of this model fall into two categories: asynchronous event handling and synchronous exception handling. These mechanisms enable designing recovery actions to handle different kinds of failure conditions arising in context-aware applications. These include service dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exception Handling for Repair in Service-Based Processes

    Publication Year: 2010, Page(s):198 - 215
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3319 KB) | HTML iconHTML

    This paper proposes a self-healing approach to handle exceptions in service-based processes and to repair the faulty activities with a model-based approach. In particular, a set of repair actions is defined in the process model, and repairability of the process is assessed by analyzing the process structure and the available repair actions. During execution, when an exception arises, repair plans ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Quantitative Investigation of the Acceptable Risk Levels of Object-Oriented Metrics in Open-Source Systems

    Publication Year: 2010, Page(s):216 - 225
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2155 KB) | HTML iconHTML

    Object-oriented metrics have been validated empirically as measures of design complexity. These metrics can be used to mitigate potential problems in the software complexity. However, there are few studies that were conducted to formulate the guidelines, represented as threshold values, to interpret the complexity of the software design using metrics. Classes can be clustered into low and high ris... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Theoretical and Empirical Study of Search-Based Testing: Local, Global, and Hybrid Search

    Publication Year: 2010, Page(s):226 - 247
    Cited by:  Papers (63)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5287 KB) | HTML iconHTML

    Search-based optimization techniques have been applied to structural software test data generation since 1992, with a recent upsurge in interest and activity within this area. However, despite the large number of recent studies on the applicability of different search-based optimization approaches, there has been very little theoretical analysis of the types of testing problem for which these tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian Approaches to Matching Architectural Diagrams

    Publication Year: 2010, Page(s):248 - 274
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3492 KB) | HTML iconHTML

    IT system architectures and many other kinds of structured artifacts are often described by formal models or informal diagrams. In practice, there are often a number of versions of a model or diagram, such as a series of revisions, divergent variants, or multiple views of a system. Understanding how versions correspond or differ is crucial, and thus, automated assistance for matching models and di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering a Sound Assertion Semantics for the Verifying Compiler

    Publication Year: 2010, Page(s):275 - 287
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1719 KB) | HTML iconHTML Multimedia Media

    The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or component is correct, where correctness is defined by program assertions. While several VC prototypes exist, all adopt a semantics for assertions that is unsound. This paper presents a consolidation of VC requirements anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service-Level Agreements for Electronic Services

    Publication Year: 2010, Page(s):288 - 304
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2884 KB) | HTML iconHTML

    The potential of communication networks and middleware to enable the composition of services across organizational boundaries remains incompletely realized. In this paper, we argue that this is in part due to outsourcing risks and describe the possible contribution of Service-Level Agreements (SLAs) to mitigating these risks. For SLAs to be effective, it should be difficult to disregard their orig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TSE Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org