By Topic

Software Engineering, IEEE Transactions on

Issue 8 • Date Aug. 1986

Filter Results

Displaying Results 1 - 10 of 10
  • Dynamic file structure for partial match retrieval based on overflow bucket sharing

    Publication Year: 1986 , Page(s): 801 - 810
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2097 KB)  

    A hashing-based dynamic file structure is introduced for partial match retrieval using overflow bucket sharing. The sharing of overflow buckets is dynamic in the sense that an overflow bucket is shared by a varying number of primary buckets according to the local conditions of the file. The use and sharing of overflow buckets defers splitting of the data buckets, thereby increasing the storage uti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error recovery in asynchronous systems

    Publication Year: 1986 , Page(s): 811 - 826
    Cited by:  Papers (40)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (3551 KB)  

    A framework for the provision of fault tolerance in asynchronous systems is introduced. The proposal generalizes the form of simple recovery facilities supported by nested atomic actions in which the exception mechanisms only permit backward error recovery. It allows the construction of systems using both forward and backward error recovery and thus allows the exploitation of the complementary ben... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mechanical verification and automatic implementation of communication protocols

    Publication Year: 1986 , Page(s): 827 - 843
    Cited by:  Papers (23)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2908 KB)  

    An automated technique for protocol development is discussed along with its application to the specification, verification, and semiautomatic implementation of an authentication protocol for computer networks. An overview is given of the specification language, implementation method, and software tools used with this technique. The authentication protocol is described, along with an example of its... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal allocation of file servers in a local network environment

    Publication Year: 1986 , Page(s): 844 - 848
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1192 KB)  

    A globally optimal allocation for files in a local network environment is presented. The principal concern is the delays due to contention at the file servers; storage space is assumed to be adequate. A queuing network model is used to represent the file servers and the workstations. The workloads generated by the workstations are statistically identical. The model assumes that the communications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SODOS: A software documentation support environment — Its definition

    Publication Year: 1986 , Page(s): 849 - 859
    Cited by:  Papers (21)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (2372 KB)  

    A description is given of the data abstraction mechanisms used in SODOS (software documentation support), a computerized system which supports the definition and manipulation of documents used in developing software. The generic definition of a document is given, the operations of consistency, completeness, and traceability are defined precisely, and it is shown how the generic document and associ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal method for composing a network command language

    Publication Year: 1986 , Page(s): 860 - 865
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1244 KB)  

    A formal method is introduced for the development and definition of command languages for heterogeneous computer networks. The network command languages are developed from the command languages of the systems constituting the network. This is done by defining a common presentation model for the system command languages and constructing the network command language by applying a composition princip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic analysis of the effects access rule modifications have upon security

    Publication Year: 1986 , Page(s): 866 - 870
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1072 KB)  

    A technique is presented for analyzing the relationships among the predicates in a predicate-based security model for database management systems. The principal tool of the technique is the Boolean difference, which is used to examine the relationships among the predicates when users are allowed to be members of more than one user group. The effects of deleting or adding predicates on the user gro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of computed chaining to predictors

    Publication Year: 1986 , Page(s): 870 - 874
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (963 KB)  

    Computed chaining and predictors are two recent techniques for resolving hashing collisions which use a pseudolink field instead of an actual address link to group records which map to the same home address. With additional computation on the pseudolink, the actual address can be determined. The advantage of the pseudolink is that it often takes much less storage than an actual address would take.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correction to “a rational design process: How and why to fake it”

    Publication Year: 1986 , Page(s): 874
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (160 KB)  

    A careful reader, Max Stern of Teradata Corporation, has brought to our attention two errors in the above paper.1 On page 253 in the second paragraph under point 4) the text reads, “A purely digital or purely hybrid computer is a special case of this general module.” It should read, “A purely digital or purely analog computer is a special case of this general model.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers

    Publication Year: 1986 , Page(s): 875 - 876
    Save to Project icon | Request Permissions | PDF file iconPDF (172 KB)  
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tseeicdwyer@computer.org