By Topic

IEEE Transactions on Software Engineering

Issue 1 • Jan. 1980

Filter Results

Displaying Results 1 - 20 of 20
  • IEEE Transactions on Software Engineering - Table of contents

    Publication Year: 1980, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (429 KB)
    Freely Available from IEEE
  • IEEE Computer Society

    Publication Year: 1980, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (248 KB)
    Freely Available from IEEE
  • Editor's Notice

    Publication Year: 1980, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (1016 KB)
    Freely Available from IEEE
  • Specifying Software Requirements for Complex Systems: New Techniques and Their Application

    Publication Year: 1980, Page(s):2 - 13
    Cited by:  Papers (201)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3344 KB)

    This paper concerns new techniques for making requirements specifications precise, concise, unambiguous, and easy to check for completeness and consistency. The techniques are well-suited for complex real-time software systems; they were developed to document the requirements of existing flight software for the Navy's A-7 aircraft. The paper outlines the information that belongs in a requirements ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notes on Type Abstraction (Version 2)

    Publication Year: 1980, Page(s):13 - 23
    Cited by:  Papers (42)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4520 KB)

    This paper, which was initially prepared to accompany a series of lectures given at the 1978 NATO International Summer School on Program Construction, is primarily tutorial in nature. It begins by discussing in a general setting the role of type abstraction and the need for formal specifications of type abstractions. It then proceeds to examine in some detail two approaches to the construction of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abstract Data Type Specification in the Affirm System

    Publication Year: 1980, Page(s):24 - 32
    Cited by:  Papers (41)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3152 KB)

    This paper describes the data type definition facilities of the AFFIRM system for program specification and verification. Following an overview of the system, we review the rewrite rule concepts that form the theoretical basis for its data type facilities. The main emphasis is on methods of ensuring convergence (finite and unique termination) of sets of rewrite rules and on the relation of this pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Note on Synthesis of Inductive Assertions

    Publication Year: 1980, Page(s):32 - 39
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3344 KB)

    One of the principal impediments to widespread use of automated program verification methodology is due to the user burden of creating appropriate inductive assertions. In this paper, we investigate a class of programs for which such inductive assertions can be mechanically generated from Input-output specifications. This class of programs, called accumulating programs, are iterative realizations ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ADI: Automatic Derivation of Invariants

    Publication Year: 1980, Page(s):40 - 48
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2360 KB)

    Most current systems for mechanical program verification are not fully automatic, since the user himself must provide the intermediate inductive assertions. This paper describes an interactive computer program, called ADI, which automatically generates the needed inductive assertions. ADI is also able to extend partial loop assertions supplied by the user to form complete assertions. The implement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Device Monitors

    Publication Year: 1980, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1944 KB)

    A driver is the part of an I/O system used for processing of an I/O request for a specific channel. The interaction of the CPU with a channel is described through the monitor concept of Hoare and Brinch Hansen. The implementation of monitors using hardware interrupt facilities is described. The resulting device monitor is compared pared with the device processes of Wirth's Modula. The concept is i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automatic-Controller Description Language

    Publication Year: 1980, Page(s):53 - 64
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4496 KB)

    This paper proposes a control-oriented Algol-like nonprocedural language called Condor. Automatic controller theory, in company with computer science, underlies many industrial fields. Sequential control is especially important. So far, sequential-controller description methods have by and large been lmited to graphic ones, which are unreadable in the case of large controllers. A higher-level ling... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Working Sets Past and Present

    Publication Year: 1980, Page(s):64 - 84
    Cited by:  Papers (110)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6504 KB)

    A program's working set is the collection of segments (or pages) recently referenced. This concept has led to efficient methods for measuring a program's intrinsic memory demand; it has assisted in undetstanding and in modeling program behavior; and it has been used as the basis of optimal multiprogrammed memory management. The total cost of a working set dispatcher is no larger than the total cos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteed Response Times in a Hard-Real-Time Environment

    Publication Year: 1980, Page(s):85 - 91
    Cited by:  Papers (95)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2216 KB)

    This paper describes a scheduling algorithm for a set of tasks that guarantees the time within which a task, once started, will complete. A task is started upon receipt of an external signal or the completion of other tasks. Each task has a rxed set of requirements in processor time, resources, and device operations needed for completion of its various segments. A worst case analysis of task perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Database Transformation, Query Translation, and Performance Analysis of a New Database Computer in Supporting Hierarchical Database Management

    Publication Year: 1980, Page(s):91 - 109
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4352 KB)

    Database computers are special-purpose storage and processing devices which are intended to relieve the database management (software) systems running on the general-purpose computers and provide improved storage and processing capabilities (via hardware) for the existing and new database application. However, to support existing database applications, two steps must be followed. First, the existi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acknowledgment of referees

    Publication Year: 1980, Page(s):110 - 111
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Information for authors

    Publication Year: 1980, Page(s): 112
    Request permission for commercial reuse | PDF file iconPDF (260 KB)
    Freely Available from IEEE
  • IEEE copyright form

    Publication Year: 1980, Page(s): 112
    Request permission for commercial reuse | PDF file iconPDF (265 KB)
    Freely Available from IEEE
  • Information about the Society

    Publication Year: 1980, Page(s): 112-c
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Computer Communication Professionals...

    Publication Year: 1980, Page(s): 112
    Request permission for commercial reuse | PDF file iconPDF (1305 KB)
    Freely Available from IEEE
  • IEEE Computer Society Publications

    Publication Year: 1980, Page(s): 112-e
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 1980, Page(s): 112
    Request permission for commercial reuse | PDF file iconPDF (1278 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Software Engineering is interested in well-defined theoretical results and empirical studies that have potential impact on the construction, analysis, or management of software. The scope of this Transactions ranges from the mechanisms through the development of principles to the application of those principles to specific environments. Specific topic areas include: a) development and maintenance methods and models, e.g., techniques and principles for the specification, design, and implementation of software systems, including notations and process models; b) assessment methods, e.g., software tests and validation, reliability models, test and diagnosis procedures, software redundancy and design for error control, and the measurements and evaluation of various aspects of the process and product; c) software project management, e.g., productivity factors, cost models, schedule and organizational issues, standards; d) tools and environments, e.g., specific tools, integrated tool environments including the associated architectures, databases, and parallel and distributed processing issues; e) system issues, e.g., hardware-software trade-off; and f) state-of-the-art surveys that provide a synthesis and comprehensive review of the historical development of one particular area of interest.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Matthew B. Dwyer
Dept. Computer Science and Engineering
256 Avery Hall
University of Nebraska-Lincoln
Lincoln, NE 68588-0115 USA
tse-eic@computer.org