Includes the top 50 most frequently accessed documents for this publication according to the usage statistics for the month of

  • A critique of cyclomatic complexity as a software metric

    Publication Year: 1988, Page(s):30 - 36
    Cited by:  Papers (38)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1174 KB)

    McCabe's cyclomatic complexity metric (1976) is widely cited as a useful predictor of various software attributes such as reliability and development effort. This critique demonstrates that it is based upon poor theoretical foundations and an inadequate model of software development. The argument that the metric provides the developer with a useful engineering approximation is not borne out by the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BCS and IEE accreditation of software engineering courses

    Publication Year: 1989, Page(s):245 - 248
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (414 KB)

    Both the British Computer Society and the Institution of Electrical Engineers regularly visit academic departments to accredit degree courses which include software engineering. In some cases, the two bodies have visited together. The paper outlines the purposes of accreditation and the criteria applied, and suggests ways in which the traditional expertise of the two chartered bodies may complemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering with viewpoints

    Publication Year: 1996, Page(s):5 - 18
    Cited by:  Papers (37)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1486 KB)

    The requirements engineering process involves a clear understanding of the requirements of the intended system. This includes the services required of the system, the system users, its environment and associated constraints. This process involves the capture, analysis and resolution of many ideas, perspectives and relationships at varying levels of detail. Requirements methods based on global reas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applicability of modified condition/decision coverage to software testing

    Publication Year: 1994, Page(s):193 - 200
    Cited by:  Papers (119)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (624 KB)

    Modified condition/decision coverage is a structural coverage criterion requiring that each condition within a decision is shown by execution to independently and correctly affect the outcome of the decision. This criterion was developed to help meet the need for extensive testing of complex Boolean expressions in safety-critical applications. The paper describes the modified condition/decision co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controlling software projects

    Publication Year: 1986
    Cited by:  Papers (13)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1588 KB)

    In recent years the software industry has seen the increasing imposition of structure and discipline on technical development activities in an attempt to improve the efficiency of software development and the reliability of the software produced. The clear emphasis in the modern approach to software engineering is to focus attention on the overall development process and the co-ordination all aspe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ACRE: selecting methods for requirements acquisition

    Publication Year: 1996, Page(s):183 - 192
    Cited by:  Papers (51)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1082 KB)

    A framework is presented that assists requirements engineers in choosing methods for requirements acquisition. Practitioners are often unaware of the range of methods available. Even when practitioners are aware, most do not foresee the need to use several methods to acquire complete and accurate requirements. One reason for this is the lack of guidelines for method selection. The ACRE framework s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design metrics: an empirical analysis

    Publication Year: 1990, Page(s):3 - 10
    Cited by:  Papers (9)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (580 KB)

    The application of design metrics to software development. is considered. An empirical investigation is described, the goal of which is to identify design metrics that allow the software engineer to discriminate between designs and pinpoint design weaknesses, particularly with a view to minimising development effort. A design measure based upon information flows between modules is proposed and emp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying new scheduling theory to static priority pre-emptive scheduling

    Publication Year: 1993, Page(s):284 - 292
    Cited by:  Papers (354)  |  Patents (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (709 KB)

    The paper presents exact schedulability analyses for real-time systems scheduled at runtime with a static priority pre-emptive dispatcher. The tasks to be scheduled are allowed to experience internal blocking (from other tasks with which they share resources) and (with certain restrictions) to release jitter, such as waiting for a message to arrive. The analysis presented is more general than that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application and benefits of formal methods in software development

    Publication Year: 1992, Page(s):335 - 346
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1141 KB)

    Formal methods for software development receive much attention in research centres, but are rarely used in industry for the development of (large) software systems. One of the reasons is that little is known about the integration of formal methods in the software process, and the exact role of formal methods in the software life-cycle is still unclear. A detailed examination is made of the applica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Syntax-directed editing

    Publication Year: 1988, Page(s):37 - 46
    Cited by:  Papers (1)  |  Patents (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1091 KB)

    The conventional approach to the construction of a program is to view it as a sequence of characters. However, it is now becoming more meaningful to perceive and develop a program in terms of its inherent syntactic structure. The paper introduces the topic of syntax-directed editing in general and then considers some of the problems and design decisions that are encountered when implementing a syn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safety-critical systems, formal methods and standards

    Publication Year: 1993, Page(s):189 - 209
    Cited by:  Papers (41)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (2031 KB)

    Standards concerned with the development of safety-critical systems, and the software in such systems in particular, abound today as the software crisis increasingly affects the world of embedded computer-based systems. The use of formal methods is often advocated as a way of increasing confidence in such systems. The paper examines the industrial use of these techniques, the recommendations conce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The management of risk in system development: Project SP and the New Spiral Model

    Publication Year: 1989, Page(s):134 - 142
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (868 KB)

    The article discusses the development of complex products, with a particular emphasis on software, and focuses on the problem of how to manage the risks in the development process. A number of models of the development process are described including Boehm's Spiral Model, which has risk management as a central theme. An example is described where Boehm's Spiral Model has been tried. The strengths ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The evolution of configuration management and version control

    Publication Year: 1990, Page(s):303 - 310
    Cited by:  Papers (3)  |  Patents (29)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (612 KB)

    The activities of configuration management and version control are particularly important for software engineers, since during most of a system lifecycle they have to deal with a growing number of versions of a single component, and to rebuild the complete system in different ways using different components. These tasks are repetitive and trivial, and they require a lot of manual work and accuracy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling hard real-time systems: a review

    Publication Year: 1991, Page(s):116 - 128
    Cited by:  Papers (58)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1272 KB)

    Results of the application of scheduling theory to hard real-time systems are reviewed in this paper. The review takes the form of an analysis of the problems presented by different application requirements and characteristics. Issues covered include uniprocessor and multiprocessor systems, periodic and aperiodic processes, static and dynamic algorithms, transient overloads and resource usage. Pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test data adequacy measurement

    Publication Year: 1993, Page(s):21 - 29
    Cited by:  Papers (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (705 KB)

    Criteria for test data adequacy are rules for deciding when enough testing has been performed. Development of these criteria is an important objective of research in software testing. The abstract properties of adequacy criteria are investigated in a formal axiomatic style. Starting from work by Weyuker (1986, 1988) and Parrish and Zweben (1991), the authors define an adequacy criterion as a funct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software development methods and tools: some trends and issues

    Publication Year: 1996, Page(s):99 - 103
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (584 KB)

    Rapid changes in hardware and software architecture are transforming the nature of application software systems, leading to upheaval in the methods and tools used to develop software. The paper offers a brief review of developments and dilemmas in the state and usage of structured and object-oriented methods, RAD, GUI design and software process management, and CASE tools and repositories. It note... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing programming paradigms: an evaluation of functional and object-oriented programs

    Publication Year: 1996, Page(s):247 - 254
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (856 KB)

    A quantitative evaluation of the functional and object-oriented paradigms is presented. The aim of this project is to investigate whether the quality of code produced using a functional language is significantly different from that produced using an object-oriented language. 12 sets of algorithms are developed, together with a number of utility functions, in both Standard ML (SML) and C++. Strict ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic structural testing using genetic algorithms

    Publication Year: 1996, Page(s):299 - 306
    Cited by:  Papers (70)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (899 KB)

    Genetic algorithms have been used to generate test sets automatically by searching the domain of the software for suitable values to satisfy a predefined testing criterion. These criteria have been set by the requirements for test data set adequacy of structural testing, such as obtaining full branch coverage and controlling the number of iterations of a conditional loop. This technique has been a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation and selection criteria for software requirements specification standards

    Publication Year: 1996, Page(s):307 - 319
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1633 KB)

    Various organisations have published proposals to prescribe the form and content of software requirements specification documents; the standards were designed to support the specific needs of these organisations and the intricacies of their development projects. To help third parties in taking advantage of this body of work, a set of criteria are proposed and discussed that can be used to evaluate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability estimation from appropriate testing of plant protection software

    Publication Year: 1995, Page(s):206 - 218
    Cited by:  Papers (12)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1552 KB)

    Plant protection software may be realistically tested using inputs from a plant model before its initial use, or when it is not feasible to take the plant into certain fault conditions. If statistical estimation of software reliability is to be performed using the test results, it is not sufficient for the plant model to produce inputs which are simply correct in the sense that the plant could hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NewSpeak: an unexceptional language

    Publication Year: 1986, Page(s):170 - 176
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1124 KB)

    NewSpeak is a language designed for use in safety-critical programs. It tries to limit the freedom of the programmer to the kind of ideas in programming that are reasonably easy to formalise, without making these restrictions unduly onerous. Its principal characteristic is that it has no exceptional values or states. Incorrect constructions which would lead to exceptional behaviour, such as range ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirements engineering for real-time systems

    Publication Year: 1991, Page(s):101 - 115
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1464 KB)

    Outlines techniques to support requirements engineering for real-time systems. The nature of real-time embedded systems requirements are discussed. Some key areas that may be expected to contribute to improved requirements engineering techniques are reviewed. A detailed discussion of the FOREST approach, which has been developed to support requirements engineering for real-time systems, is given a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software development: two approaches to animation of Z specifications using Prolog

    Publication Year: 1992, Page(s):264 - 276
    Cited by:  Papers (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1085 KB)

    Formal methods rely on the correctness of the formal requirements specification, but this correctness cannot be proved. This paper discusses the use of software tools to assist in the validation of formal specifications and advocates a system by which Z specifications may be animated as Prolog programs. Two Z/Prolog translation strategies are explored; formal program synthesis and structure simula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Bayesian modification to the Jelinski-Moranda software reliability growth model

    Publication Year: 1987, Page(s):30 - 41
    Cited by:  Papers (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1603 KB)

    The Jelinski-Moranda (JM) model for software reliability growth is one of the most commonly cited (often in its guise as the `Musa model┬┐┬┐). Recent studies show that the reliability estimates and predictions given by the model are often grossly inaccurate. It has been suggested that one reason for this poor performance may be the use of the maximum-likelihood method of inference. This paper descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbolic execution systems-a review

    Publication Year: 1988, Page(s):229 - 239
    Cited by:  Papers (20)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1172 KB)

    Symbolic execution is a technique that is useful in the validation of software. It may be used to aid in the generation of test data and in program proving. As software engineering becomes more concerned with the development of tools, symbolic execution will become an important item in the toolkit. This paper gives a review of symbolic execution and its applications. A minimum set of features for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation of software design using the DEMETER tool

    Publication Year: 1993, Page(s):319 - 324
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (499 KB)

    The purpose of this study was to investigate the provision of measures suitable for evaluating software designs. These would allow some degree of predictability in estimating the quality of a coded software product. Experiments were conducted to test hypotheses concerning the evaluation of software design metrics related to code complexity. Three medium-sized software projects were used. Metrics f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of real-time systems: from specification to implementation and verification

    Publication Year: 1991, Page(s):72 - 82
    Cited by:  Papers (11)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1019 KB)

    Presents an engineering approach to the design of distributed real-time systems, which guarantee hard deadlines and can tolerate a specified set of faults. The methodology covers the stepwise refinement of the given requirements, expressed in the form of real-time transactions, to task and protocol executions. It also includes a timing analysis and dependability evaluation of the still incomplete ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Viewpoints for requirements definition

    Publication Year: 1992, Page(s):375 - 387
    Cited by:  Papers (22)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1053 KB)

    This paper is a survey of the current viewpoint-oriented requirements approaches and a description of an alternative object-oriented viewpoint-based approach. The paper sets out a case for a multiple viewpoint-oriented approach in requirements definition and, using a simple case study, examines the viewpoint approach adopted by three requirements methodologies. The paper concludes by proposing an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The problems of managing software projects

    Publication Year: 1986, Page(s):3 - 6
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (526 KB)

    Experience suggests that projects involving a significant software content run a considerable risk of being completed late and over budget, while the resulting software does not always meet the original design specifications. This is in spite of the fact that the general principles of project management are well understood. This paper discusses the particular difficulties often cited by managers o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Engineering: A Practitioner's Approach [Book Review]

    Publication Year: 1995, Page(s): 266
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (117 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of distribution on support for object-oriented software development

    Publication Year: 1992, Page(s):130 - 138
    Cited by:  Papers (3)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (939 KB)

    Object-oriented computing is now an established technology for software development. However, a number of challenges must be met before the topic can claim to be fully mature. One of the most demanding challenges is posed by the move from single workstation environments to the more general case of a distributed system. The paper considers the impact of distribution on object-oriented computing. A ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Industrial perspective on static analysis

    Publication Year: 1995, Page(s):69 - 75
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (666 KB)

    Static analysis within industrial applications provides a means of gaining higher assurance for critical software. This survey notes several problems, such as the lack of adequate standards, difficulty in assessing benefits, validation of the model used and acceptance by regulatory bodies. It concludes by outlining potential solutions and future directions.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shotgun correlations in software measures

    Publication Year: 1993, Page(s):5 - 13
    Cited by:  Papers (11)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (609 KB)

    Many software measures have been forwarded on the simple basis of a high linear correlation coefficient with some measurable quantities. The linear correlation coefficient is an unreliable statistic for deciding whether an observed correlation indicates significant association. Several published software measure experiments collected more than 20 different measurements, or have 14 or fewer observa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A graphical environment for user-interface design and development

    Publication Year: 1990, Page(s):289 - 299
    Cited by:  Papers (1)  |  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (840 KB)

    The design of an easy-to-use and flexible user-interface management system (UIMS) is described. The authors identify two major problems for UIMSs. The first problem is to find a way to make the UIMS easier to use without sacrificing important functionality. A design concept, behaviour abstraction, is described which allows important gains in ease-of-use, while retaining the kind of flexibility nee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The choice of computer languages for use in safety-critical systems

    Publication Year: 1991, Page(s):51 - 58
    Cited by:  Papers (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (773 KB)

    The paper reviews the choice of computer language for use in safety-critical systems. The advice given reflects both civil and military requirements. A comparison is made between assembly-level languages, the language C, CORAL 66, Pascal, Modula-2 and Ada. It is concluded that a well defined sub-language is essential for use in safety-critical projects, and a guide is provided for project managers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive scheduling algorithm for fault-tolerant real-time systems

    Publication Year: 1991, Page(s):93 - 100
    Cited by:  Papers (10)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (692 KB)

    Particularly concerned with the deadline mechanism, proposed as a means to design and implement fault-tolerant real-time systems. The computing system considered uses a single-processor machine to run multiple software processes; each of them executes a task in response to periodic requests. Based on redundancy the deadline mechanism assumes that every task is composed of primary and alternate alg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Law-governed systems

    Publication Year: 1991, Page(s):285 - 302
    Cited by:  Papers (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1710 KB)

    A description is given of a software development environment based on a new approach for managing large-scale evolving systems. Under this approach, the conventional notion of a system is augmented with a new component called the law of the system, which is an explicit and strictly enforced set of rules about the operation of the system, about its evolution and about the evolution of the law itsel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vista: a user interface for a distributed object-oriented software engineering environment

    Publication Year: 1992, Page(s):25 - 34
    Cited by:  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1420 KB)

    A prototype user interface for a distributed software engineering environment is described, where the components of the environment are autonomous agents with some inherent decision-making capabilities. Agents may be distributed across a local- or wide-area network. Two forms of interaction are supported; namely, direct manipulation and message passing. Synchronous interaction is supported via the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File system caching in large point-to-point networks

    Publication Year: 1992, Page(s):65 - 80
    Cited by:  Papers (1)  |  Patents (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1287 KB)

    The design of a file system for a general-purpose scalable parallel computing engine, based on an extensible mesh of processors is examined. Although many distributed file systems have already been developed, none have properly addressed the characteristics that are special to these computing engines, namely dynamic load-balancing and point-to-point networks. Client caching is identified as a key ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Encapsulation, delegation and inheritance in object-oriented languages

    Publication Year: 1992, Page(s):95 - 101
    Cited by:  Papers (2)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (717 KB)

    For the reuse of software to become routine, it is essential that all modules have well defined interfaces and that all users of these modules respect these interfaces. The paper examines the interfaces in object-oriented programs. It uses the notion of delegation, which can be thought of as underlying all inheritance mechanisms, to provide a framework for the examination of encapsulation mechanis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification of interfering programs based on interconditions

    Publication Year: 1992, Page(s):205 - 217
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1157 KB)

    Flat VVSL is an extension of a VDM specification language wherein operations, which interfere through a shared state, can be specified in a VDM-like style by the use of interconditions in addition to pre- and postconditions. Interconditions are temporal formulae. The paper explains the role of interconditions in the specification of interfering operations and describes the temporal formulae that c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software reliability growth model for an error-removal phenomenon

    Publication Year: 1992, Page(s):291 - 294
    Cited by:  Papers (22)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (276 KB)

    The authors develop a software reliability growth model based on the non-homogeneous Poisson process, under the assumption that the detection of these errors can also cause the detection of some of the remaining errors without these errors causing any failure. Using the expected number of errors thus detected, the authors obtain the mean value function describing the failure phenomenon. Parameters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specifications are (preferably) executable

    Publication Year: 1992, Page(s):323 - 334
    Cited by:  Papers (17)  |  Patents (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1078 KB)

    The validation of specifications with respect to user requirements is extremely difficult. To ease the validation task and to give users immediate feedback on the behaviour of the future software, it was suggested that specifications should be made executable. However I.J. Hayes and C.B. Jones (1989) argue that executable specifications should be avoided because executability can restrict the expr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Polymorphism, persistence and software re-use in a strongly typed object-oriented environment

    Publication Year: 1987, Page(s):199 - 204
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (719 KB)

    The major requirements of a system for software re-use are that it must provide an abstraction mechanism for adequately describing the components, a mechanism for naming and storing the components, and a mechanism for composing new objects out of existing components. This paper describes a polymorphic type system that may be used to describe generic components and a persistence mechanism that may ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient scheduling algorithm for divisible and indivisible tasks in loosely coupled multiprocessor systems

    Publication Year: 1994, Page(s):13 - 18
    Cited by:  Papers (7)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (477 KB)

    We investigate a scheduling problem in loosely coupled multiprocessor systems. This problem has been addressed by many researchers because it has a substantial effect on the performance of multiprocessor systems. Previous work considered only one class of tasks to be scheduled. We propose an algorithm to schedule two classes of tasks, indivisible and divisible tasks, among the available processors... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Treating interactions systematically: a theme to cope with an aspect of the complexity of managing life-cycle software production

    Publication Year: 1994, Page(s):67 - 82
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1164 KB)

    The paper presents a method for simplifying the complex managerial phenomena in the life-cycle software production by means of systems analysis. The reason for this is that software products are becoming increasingly complex and that project teams are, and will continue to be, the dominant way of organising software development. There is a fundamental principle; the complexity of the field in ques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification scheme for the visualisation of data structures

    Publication Year: 1994, Page(s):127 - 133
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1219 KB)

    The paper describes a general principle for program visualisation, based on the concept of structure models. We propose a specification scheme that can be used to implement the general principle without requiring a change of the program code. Two aspects of the scheme are discussed in detail; the specification of critical entities and their graphical representations. Its use is illustrated by mean... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executable specifications and CASE

    Publication Year: 1994, Page(s):174 - 182
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (687 KB)

    The idea of executing graphical system models is not new. Several accounts of research in this area are well documented. Despite this, such research is still in its infancy, particularly in relation to CASE environments and the practical application of ideas. The paper considers executability within CASE, with a focus on executable specifications. The importance of executability is highlighted, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Axiomatic assessment of control flow-based software test adequacy criteria

    Publication Year: 1995, Page(s):194 - 204
    Cited by:  Papers (5)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (948 KB)

    Software test data adequacy criteria are rules to determine whether a piece of software has been adequately tested. Since J.B. Goodenough and S.L. Gerhard (1975) pointed out that the central problem of software testing is 'what is a test data adequacy criterion', many test data adequacy criteria have been proposed and investigated in the literature. Each criterion has its own strength and weakness... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of effort estimating techniques in current development environments

    Publication Year: 1995, Page(s):162 - 170
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (681 KB)

    As the cost of a project closely relates to the effort involved in its development, it is vital to correctly estimate development effort. The paper compares the performance of a selection of well known effort estimating techniques as used in the development of a contemporary GUI project.<> View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

Published from 1986-1996, Software Engineering Journal included original contributions of interest to practitioners, researchers and managers who were engaged in software engineering. It covered reports on practical experience using software engineering methods and tools, and papers on long-term research activities.

Full Aims & Scope