By Topic

IEEE Transactions on Software Engineering

Issue 6 • Date Nov.-Dec. 2011

Filter Results

Displaying Results 1 - 15 of 15
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • A Dynamic Slicing Technique for UML Architectural Models

    Publication Year: 2011, Page(s):737 - 771
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5341 KB) | HTML iconHTML

    This paper proposes a technique for dynamic slicing of UML architectural models. The presence of related information in diverse model parts (or fragments) makes dynamic slicing of Unified Modeling Language (UML) models a complex problem. We first extract all relevant information from a UML model specifying a software architecture into an intermediate representation, which we call a Model Dependenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities

    Publication Year: 2011, Page(s):772 - 787
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2304 KB) | HTML iconHTML

    Security inspection and testing require experts in security who think like an attacker. Security experts need to know code locations on which to focus their testing and inspection efforts. Since vulnerabilities are rare occurrences, locating vulnerable code locations can be a challenging task. We investigated whether software metrics obtained from source code and development history are discrimina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring the Discriminative Power of Object-Oriented Class Cohesion Metrics

    Publication Year: 2011, Page(s):788 - 804
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3087 KB) | HTML iconHTML

    Several object-oriented cohesion metrics have been proposed in the literature. These metrics aim to measure the relationship between class members, namely, methods and attributes. Different metrics use different models to represent the connectivity pattern of cohesive interactions (CPCI) between class members. Most of these metrics are normalized to allow for easy comparison of the cohesion of dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventing Temporal Violations in Scientific Workflows: Where and How

    Publication Year: 2011, Page(s):805 - 825
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2396 KB) | HTML iconHTML

    Due to the dynamic nature of the underlying high-performance infrastructures for scientific workflows such as grid and cloud computing, failures of timely completion of important scientific activities, namely, temporal violations, often take place. Unlike conventional exception handling on functional failures, nonfunctional QoS failures such as temporal violations cannot be passively recovered. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Putting Preemptive Time Petri Nets to Work in a V-Model SW Life Cycle

    Publication Year: 2011, Page(s):826 - 844
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1928 KB) | HTML iconHTML

    Preemptive Time Petri Nets (pTPNs) support modeling and analysis of concurrent timed SW components running under fixed priority preemptive scheduling. The model is supported by a well-established theory based on symbolic state space analysis through Difference Bounds Matrix (DBM) zones, with specific contributions on compositional modularization, trace analysis, and efficient overapproximation and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Swarm Verification Techniques

    Publication Year: 2011, Page(s):845 - 857
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1499 KB) | HTML iconHTML

    The range of verification problems that can be solved with logic model checking tools has increased significantly in the last few decades. This increase in capability is based on algorithmic advances and new theoretical insights, but it has also benefitted from the steady increase in processing speeds and main memory sizes on standard computers. The steady increase in processing speeds, though, en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tuning Temporal Features within the Stochastic π-Calculus

    Publication Year: 2011, Page(s):858 - 871
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1224 KB) | HTML iconHTML Multimedia Media

    The stochastic π-calculus is a formalism that has been used for modeling complex dynamical systems where the stochasticity and the delay of transitions are important features, such as in the case of biochemical reactions. Commonly, durations of transitions within stochastic π-calculus models follow an exponential law. The underlying dynamics of such models are expressed in terms of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Distribution of Bugs in the Eclipse System

    Publication Year: 2011, Page(s):872 - 877
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (701 KB) | HTML iconHTML

    The distribution of bugs in software systems has been shown to satisfy the Pareto principle, and typically shows a power-law tail when analyzed as a rank-frequency plot. In a recent paper, Zhang showed that the Weibull cumulative distribution is a very good fit for the Alberg diagram of bugs built with experimental data. In this paper, we further discuss the subject from a statistical perspective,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society Magazines and Transactions available in ePUB format [advertisement]

    Publication Year: 2011, Page(s): 878
    Request permission for commercial reuse | PDF file iconPDF (385 KB)
    Freely Available from IEEE
  • New Transactions Issue Alerts

    Publication Year: 2011, Page(s): 879
    Request permission for commercial reuse | PDF file iconPDF (1640 KB)
    Freely Available from IEEE
  • What's new in Transactions [advertisement]

    Publication Year: 2011, Page(s): 880
    Request permission for commercial reuse | PDF file iconPDF (345 KB)
    Freely Available from IEEE
  • [Inside back cover]

    Publication Year: 2011, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org