Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Software, IEEE

Issue 2 • Date March-April 2011

Filter Results

Displaying Results 1 - 25 of 28
  • Front Cover

    Publication Year: 2011 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (1188 KB)  
    Freely Available from IEEE
  • John Wiley & Sons Advertisement

    Publication Year: 2011 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (512 KB)  
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2011 , Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (928 KB)  
    Freely Available from IEEE
  • Perfectionists in a World of Finite Resources

    Publication Year: 2011 , Page(s): 4 - 6
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | PDF file iconPDF (474 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Software Experts Summit [advertisement]

    Publication Year: 2011 , Page(s): 7
    Save to Project icon | Request Permissions | PDF file iconPDF (1084 KB)  
    Freely Available from IEEE
  • Dominant Design

    Publication Year: 2011 , Page(s): 8 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    The article is discussing architecture of software-intensive systems and its application in road traffic management. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Success of a COTS Caseload Management System in State Government

    Publication Year: 2011 , Page(s): 10 - 14
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1927 KB) |  | HTML iconHTML  

    This article discusses about the COTS caseload management system in state government. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process Management Tools

    Publication Year: 2011 , Page(s): 15 - 18
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1854 KB) |  | HTML iconHTML  

    Software development is complex, especially with many interacting people and teams. A variety of tools exist to model the development process and thus facilitate communication, automation, and collaboration. This installment looks to support tools for process modeling and their underlying methodologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software in an Evolving Train Traffic Control System

    Publication Year: 2011 , Page(s): 19 - 21
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (567 KB) |  | HTML iconHTML  

    This contribution is rather different from the other articles we're run in this department to date. Here, software volume isn't an issue as there is only one Tokyo-instead, we look at the incremental development of a network of systems controlling railway lines, which requires adding value without disruption. This particular scenario contains many interesting facets, including the use of COTS and refactoring. We're indebted to Takao Futagami for facilitating this contribution. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements Analysis: The Next Generation

    Publication Year: 2011 , Page(s): 22 - 23
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1492 KB) |  | HTML iconHTML  

    One technological advance that will influence future requirements processes is ubiquitous computing. Technologies will be far more integrated into the fabric of our every day lives, from our homes to our cars to even our clothes and jewelry. It's likely to mean that scoping new computer-based applications-differentiating them from other applications and everyday tasks such as preparing meals, cleaning, and exercising-will be even more challenging. Requirements will be the equivalent of items in to-do lists that evolve as new requirements emerge and exist ing ones are met by software or other means. In 20 years, getting software will be almost as commonplace as shopping for food is today. Stakeholders will think less about requirements and more about choices and decisions to make. They'll record, blog, and annotate as well as type their requirements, based on everyday experiences with their physical and digital environments. They'll directly communicate their requirements to potential service providers in virtual communities operating as self-contained marketplaces of trusted partners, following super-agile processes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editors' Introduction: Software Protection

    Publication Year: 2011 , Page(s): 24 - 27
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4047 KB) |  | HTML iconHTML  

    A computer system's security can be compromised in many ways a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdrop per can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside-we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system- from system administrators down to ordinary users-to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention. Methods for protecting against MATE attacks are variously known as anti-tamper techniques, digital asset protection, or, more commonly, software protection. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CodeBender: Remote Software Protection Using Orthogonal Replacement

    Publication Year: 2011 , Page(s): 28 - 34
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1608 KB) |  | HTML iconHTML  

    CodeBender implements a novel client replacement strategy to counter the malicious host problem and address the problem of guaranteeing client-code security. CodeBender is a tool that implements a novel client-replacement strategy to counter the malicious host problem. It works by limiting the client code's validity and, when the code expires, by having the server provide a new client that replaces the former one. The complexity of analyzing frequently changing, always different (orthogonal) program code deters an adversary's reverse engineering efforts. We've implemented CodeBender and tested its practicability in two case studies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Trusted Platform Agent

    Publication Year: 2011 , Page(s): 35 - 41
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1612 KB) |  | HTML iconHTML  

    The Trusted Platform Agent is an open source library for writing applications that use Trusted Computing technology. The TPA simplifies the integration of TC primitives with other commonly needed functions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guilty or Not Guilty: Using Clone Metrics to Determine Open Source Licensing Violations

    Publication Year: 2011 , Page(s): 42 - 47
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1432 KB) |  | HTML iconHTML  

    To increase productivity, programmers often unwittingly violate open source software licenses by reusing code fragments, or clones. The authors explore metrics that can reveal the existence or absence of code reuse and apply these metrics to 1,225 open source product pairs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Copyrights and Moral Rights of Service-Based Software

    Publication Year: 2011 , Page(s): 48 - 55
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1674 KB) |  | HTML iconHTML  

    Service orientation of software raises new challenges for representing the intellectual rights associated with services and requirements for developing service licensing strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Point/Counterpoint

    Publication Year: 2011 , Page(s): 56 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (570 KB)  

    The article is discussing new challenges faced by modern security systems because the traditional perimeter defenses against man-in-the-middle attacks are inadequate in protection against the man-at-the-end white-box attacks favored by many attackers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Certification Advertisement

    Publication Year: 2011 , Page(s): 60
    Save to Project icon | Request Permissions | PDF file iconPDF (6590 KB)  
    Freely Available from IEEE
  • A Service-Based Framework for Flexible Business Processes

    Publication Year: 2011 , Page(s): 61 - 67
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1805 KB) |  | HTML iconHTML  

    A framework for the design and enactment of flexible and adaptive business processes combines design-time and runtime mechanisms to offer a single integrated solution. Globalization and accessibility have caused a significant shift in business processes, from static solutions to flexible processes that can ad dress rapidly changing business needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scrapheap Software Development: Lessons from an Experiment on Opportunistic Reuse

    Publication Year: 2011 , Page(s): 68 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1659 KB) |  | HTML iconHTML  

    In this paper a set of 10 guidelines for opportunistic software reuse is discussed. These guidelines are based on observations of nine systems developed entirely with scraps of functionality scavenged from abandoned projects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Oh Dear, We Bought Our Competitor: Integrating Similar Software Systems

    Publication Year: 2011 , Page(s): 75 - 82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1693 KB) |  | HTML iconHTML  

    A look at 10 case studies addresses the technological, personnel, and organizational challenges. The 10 cases involved seven organizations in different business sectors. Our data collection methods included our participation in projects, several rounds of interviews with project leaders and software architects, and several rounds of questionnaires with software architects and project managers, as well as project and product documentation. 2 Companies we studied included ABB, Bombardier, Ericsson, Saab, and Westinghouse. However, we can't disclose detailed information or relate case descriptions to specific companies or systems. Our observations regarding cultural influences might be skewed because all the organizations involved Sweden and other European or North American countries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Membership Advertisement

    Publication Year: 2011 , Page(s): 83
    Save to Project icon | Request Permissions | PDF file iconPDF (1355 KB)  
    Freely Available from IEEE
  • Agile Model-Driven Development in Practice

    Publication Year: 2011 , Page(s): 84 - 91
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1643 KB) |  | HTML iconHTML  

    This article presents practical experiences and lessons learned in defining and implementing an agile model-driven development process using the MDD tools chain. This process and its implementation inherit the merits of scrum, extreme programming, and the Unified Software Development Processes. The experience data demonstrates that combining MDD practices with agile development process can significantly reduce software development cycle time and increase productivity and quality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Don't Read Books

    Publication Year: 2011 , Page(s): 92 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (690 KB) |  | HTML iconHTML  

    Reading is a critical habit to learn and keeping current. But books aren't the only thing available to read. The articles discuss pros and cons of articles related to books and how to organize and choose your readings. Reading articles is a good source of knowledge and will help you to read better, read better books, and even read more books. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Five Facts on the Adoption of Open Source Software

    Publication Year: 2011 , Page(s): 95 - 99
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1364 KB) |  | HTML iconHTML  

    Across the spectrum of software organizations-from traditional software houses to service providers, in both public and private sectors-open source software (OSS) is changing the way they develop, acquire, use, and commercialize software. However, con flicting views about exactly what the OSS phenomenon is remain common. Furthermore, the professional literature doesn't clarify as much as it could-not only because empirical studies are still sparse but also because the studies that do exist reflect different perspectives. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unusable Software Is Useless, Part 2

    Publication Year: 2011 , Page(s): 100 - 102
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (273 KB) |  | HTML iconHTML  

    In this installment, I turn my attention to the internals of software-centric systems, since usability is also of prime importance for the architectures we create. Ultimately, unusable architectures can lead to architecture drift, complex code, and other consequences that are costly to fix. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software's mission is to build the community of leading and future software practitioners. The magazine delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org