By Topic

Software Engineering, IEEE Transactions on

Issue 3 • Date May-June 2010

Filter Results

Displaying Results 1 - 14 of 14
  • [Front cover]

    Publication Year: 2010 , Page(s): c1
    Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010 , Page(s): c2
    Request Permissions | PDF file iconPDF (134 KB)  
    Freely Available from IEEE
  • In Memoriam: Robin Milner and Amir Pnueli

    Publication Year: 2010 , Page(s): 305
    Request Permissions | PDF file iconPDF (98 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Guest Editors' Introduction to the Special Section on Evaluation and Improvement of Software Dependability

    Publication Year: 2010 , Page(s): 306 - 308
    Cited by:  Papers (1)
    Request Permissions | PDF file iconPDF (88 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Incremental Test Generation for Software Product Lines

    Publication Year: 2010 , Page(s): 309 - 322
    Cited by:  Papers (8)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1711 KB) |  | HTML iconHTML  

    Recent advances in mechanical techniques for systematic testing have increased our ability to automatically find subtle bugs, and hence, to deploy more dependable software. This paper builds on one such systematic technique, scope-bounded testing, to develop a novel specification-based approach for efficiently generating tests for products in a software product line. Given properties of features a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Reliability and Testing Time Allocation: An Architecture-Based Approach

    Publication Year: 2010 , Page(s): 323 - 337
    Cited by:  Papers (10)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2325 KB) |  | HTML iconHTML  

    With software systems increasingly being employed in critical contexts, assuring high reliability levels for large, complex systems can incur huge verification costs. Existing standards usually assign predefined risk levels to components in the design phase, to provide some guidelines for the verification. It is a rough-grained assignment that does not consider the costs and does not provide suffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verification and Trade-Off Analysis of Security Properties in UML System Models

    Publication Year: 2010 , Page(s): 338 - 356
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2334 KB) |  | HTML iconHTML  

    Designing secure systems is a nontrivial task. Incomplete or faulty designs can cause security mechanisms to be incorrectly incorporated in a system, allowing them to be bypassed and resulting in a security breach. We advocate the use of the Aspect-Oriented Risk-Driven Development (AORDD) methodology for developing secure systems. This methodology begins with designers defining system assets, iden... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vulnerability Discovery with Attack Injection

    Publication Year: 2010 , Page(s): 357 - 370
    Cited by:  Papers (10)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (2563 KB) |  | HTML iconHTML  

    The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being revealed, compromising the security of systems. This paper addresses this problem by presenting an attack injection methodology for the automatic discovery of vulnerabilities in software components. The proposed methodo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Services during Service-Based System Design Using UML

    Publication Year: 2010 , Page(s): 371 - 389
    Cited by:  Papers (6)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3021 KB) |  | HTML iconHTML  

    Recently, there has been a proliferation of service-based systems, i.e., software systems that are composed of autonomous services but can also use software code. In order to support the development of these systems, it is necessary to have new methods, processes, and tools. In this paper, we describe a UML-based framework to assist with the development of service-based systems. The framework adop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Learning Communicating Automata from MSCs

    Publication Year: 2010 , Page(s): 390 - 408
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3219 KB) |  | HTML iconHTML  

    This paper is concerned with bridging the gap between requirements and distributed systems. Requirements are defined as basic message sequence charts (MSCs) specifying positive and negative scenarios. Communicating finite-state machines (CFMs), i.e., finite automata that communicate via FIFO buffers, act as system realizations. The key contribution is a generalization of Angluin's learning algorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Event-Based Middleware for Location-Aware Mobile Applications

    Publication Year: 2010 , Page(s): 409 - 430
    Cited by:  Papers (6)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (3754 KB) |  | HTML iconHTML  

    As mobile applications become more widespread, programming paradigms and middleware architectures designed to support their development are becoming increasingly important. The event-based programming paradigm is a strong candidate for the development of mobile applications due to its inherent support for the loose coupling between components required by mobile applications. However, existing midd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Program Behavior Discovery and Verification: A Graph Grammar Approach

    Publication Year: 2010 , Page(s): 431 - 448
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (6478 KB) |  | HTML iconHTML  

    Discovering program behaviors and functionalities can ease program comprehension and verification. Existing program analysis approaches have used text mining algorithms to infer behavior patterns or formal models from program execution. When one tries to identify the hierarchical composition of a program behavior at different abstraction levels, textual descriptions are not informative and express... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TSE Information for authors

    Publication Year: 2010 , Page(s): c3
    Request Permissions | PDF file iconPDF (134 KB)  
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010 , Page(s): c4
    Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org