By Topic

IEEE Software

Issue 5 • Sept.-Oct. 1997

Filter Results

Displaying Results 1 - 20 of 20
  • The mousetrap paradigm

    Publication Year: 1997, Page(s): 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will linking battle unravel the web?

    Publication Year: 1997, Page(s):106 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pitfalls Of Object-oriented Development [Book Review]

    Publication Year: 1997, Page(s):115 - 116
    Request permission for commercial reuse | PDF file iconPDF (312 KB)
    Freely Available from IEEE
  • Programming with threads [Book Review]

    Publication Year: 1997, Page(s): 116
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Threads primer: a guide to multithreaded programming [Book Review]

    Publication Year: 1997, Page(s): 116
    Request permission for commercial reuse | PDF file iconPDF (174 KB)
    Freely Available from IEEE
  • Civilizing Cyberspace [Book Review]

    Publication Year: 1997, Page(s): 117
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • Object-oriented compiler construction [Book Review]

    Publication Year: 1997, Page(s):117 - 118
    Request permission for commercial reuse | PDF file iconPDF (597 KB)
    Freely Available from IEEE
  • Intrusion detection via system call traces

    Publication Year: 1997, Page(s):35 - 42
    Cited by:  Papers (55)  |  Patents (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Unusual behavior in computer systems can be detected by monitoring the system calls being executed by programs. Analysis of the temporal ordering of these calls reveals that such anomalies are localized within traces and that normal program behavior can be described compactly using deterministic finite automata. This article presents preliminary work in analyzing system call traces, particularly t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and privacy: promising advances

    Publication Year: 1997, Page(s):27 - 32
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    The paper discusses some promising advances in computer security. Security system designers and implementers must consider several factors: security policy, privileges, authentication, correctness and auditing. The paper presents an overview of some sub-fields and their successes: trusted systems, operating systems, database management systems, distributed systems, cryptography, protocols, system ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can a manufacturing quality model work for software?

    Publication Year: 1997, Page(s):101 - 102, 105
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    Six-sigma (i.e. 6 standard deviations) is a parameter that is used in statistical models of the quality of manufactured goods (including computer hardware). It also serves as a slogan that suggests high quality. Some attempts have been made in the past to apply 6-sigma to software quality measurement. Software engineers often look to hardware analogies to suggest techniques that are useful in buil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When past solutions cause future problems [Year 2000 problem]

    Publication Year: 1997, Page(s):19 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    Currently, a worldwide effort is underway to uncover the calendar-related programs embedded in our legacy software. When these applications were first coded, had programmers rigorously and repeatedly questioned how their code handled date validity, the Year 2000 problem-the largest crisis the information technology industry has yet faced-could have been greatly mitigated. Most code lasts for longe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firewalls: an expert roundtable

    Publication Year: 1997, Page(s):60 - 66
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The Internet's increasing popularity has brought with it a downside: more severe security risks. With initial funding from the US government, the computer security community has developed products called firewalls that help protect users' systems from harm when they connect to the Internet and other networks beyond their control. Dozens of commercial firewall products on the market worldwide are e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling concurrent software

    Publication Year: 1997, Page(s):93 - 100
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    The author proposes a disciplined multitasking method, entity-life modeling, which may provide a more direct and efficient approach to concurrent computing. He then shows how this method could apply to an automated control system. He discusses an example of a flexible manufacturing system View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software platform for testing intrusion detection systems

    Publication Year: 1997, Page(s):43 - 51
    Cited by:  Papers (24)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB)

    Intrusion detection systems monitor system activities to identify unauthorized use, misuse, or abuse. IDSs offer a defense when your system's vulnerabilities are exploited and do so without requiring you to replace expensive equipment. The steady growth in research on intrusion detection systems has created a demand for tools and methods to test their effectiveness. The authors have developed a so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Breathing new life into the waterfall model

    Publication Year: 1997, Page(s):103 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    Due diligence-it's a concept that savvy investors and investment bankers understand. Before you invest in something, spend the time to fully understand the people and the business. Only proceed after you're convinced that everything is okay. The author discusses a form of due diligence that can be applied when software development work is contracted. He argues that both the contractor and the cust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Navigating the applet-browser divide

    Publication Year: 1997, Page(s):22 - 25
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    The World Wide Web has emerged as a new application-delivery platform. In response, developers are offering users sophisticated Web-based Java applets that range from cybershopping carts to complex tools for genome mapping. These applets give you application functionality without taking up space on your hard drive. But trailing behind the applet bounty are new usability questions. A major one is h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cost-value approach for prioritizing requirements

    Publication Year: 1997, Page(s):67 - 74
    Cited by:  Papers (245)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    Developing software systems that meet stakeholders' needs and expectations is the ultimate goal of any software provider seeking a competitive edge. To achieve this, you must effectively and accurately manage your stakeholders' system requirements: the features, functions, and attributes they need in their software system. Once you agree on these requirements, you can use them as a focal point for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A flexible security system for using Internet content

    Publication Year: 1997, Page(s):52 - 59
    Cited by:  Papers (5)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The Internet and World Wide Web have introduced a powerful new way to acquire content. Previously, users had to either buy or order content on coded disks. They can now download executable code and applications directly. From the users' viewpoint, this decreases the amount of software stored on their machines. It also lets content providers customize applications by combining different vendors' co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How software process improvement helped Motorola

    Publication Year: 1997, Page(s):75 - 81
    Cited by:  Papers (89)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Many organizations are using or considering the Capability Maturity Model as a vehicle for software process improvement. But does the CMM provide real benefits? The authors offer metrics and data that show the results of Motorola's CMM usage View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rapid prototyping for distributed virtual environments

    Publication Year: 1997, Page(s):83 - 92
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    The authors combine rapid and exploratory prototyping techniques to capture initially unknown, interdependent requirements in the development of distributed virtual environment applications. They employ containerization to accelerate data exchange View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Software delivers reliable, useful, leading-edge software development information to keep engineers and managers abreast of rapid technology change.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Diomidis Spinellis
Athens University of Economics and Business
28is Oktovriou 76
Athina 104 33, Greece
dds@computer.org