COMPEURO'90: Proceedings of the 1990 IEEE International Conference on Computer Systems and Software Engineering - Systems Engineering Aspects of Complex Computerized Systems

8-10 May 1990

Filter Results

Displaying Results 1 - 25 of 87
  • Systems engineering approach to time driven systems

    Publication Year: 1990, Page(s):4 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (126 KB)

    Summary form only given. Basic notions are presented for the design of time-driven systems and a framework to formulate the design problems for such systems. In these systems time plays the fundamental role and all actions are assigned a time when they must take place. The resources are managed by assigning the requires resources to an activity for an appropriate period of time. Such assignment re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VLSI technology: outlook for the year 2000 and its impact on systems

    Publication Year: 1990
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (94 KB)

    Summary form only given. Understanding of physics, process technology and process equipment limitations indicates that fundamental limitations will not be reached by the year 2000. As a result transistor density per chip will reach 50-100 million, with clock frequencies up to 250 MHz. This assumes that the dominant VLSI technology crossing the year 2000 will be silicon-based and there will be a co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COMPEURO '90. Proceedings of the 1990 IEEE International Conference on Computer Systems and Software Engineering (Cat. No.90CH2867-0)

    Publication Year: 1990
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • CRUISE-creative user interface for software engineering: an overview

    Publication Year: 1990, Page(s):298 - 306
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    A description is presented of CRUISE, the graphic user interface of OBSERV. OBSERV is a methodology that allows a rapid construction of an executable specification (or prototype) to support testing of the prototype by simulation, to facilitate smooth transition to a target system, and to provide means for reusing specification, design and code. CRUISE provides OBSERV with graphic editing capabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time pattern matching technique for executable SA/RT specifications

    Publication Year: 1990, Page(s):288 - 295
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    Preliminary results with an experimental run-time system are reported. The run-time system is designed for real-time prototyping of software specifications created with the Ward & Mellor Structured Analysis for Real-Time systems (SA/RT) techniques. Execution is based on SA/RT specifications converted to an object-oriented C language syntax from a high-level Petri net representation of SA/RT sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information systems architecture: a consulting methodology

    Publication Year: 1990, Page(s):568 - 572
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    A digital consulting methodology for information technology planning is presented. The approach provides improved communications across organizational boundaries throughout the enterprise, resulting in greater management involvement and a clearer understanding of business directions, generating the information technology architecture as well as specific applications requirements. The architecture ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparative case study of prototyping tools-experiences and conclusions

    Publication Year: 1990, Page(s):494 - 501
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    An examination is made of (1) the goal pursued in following a prototyping approach, i.e. which questions a prototype should answer, (2) tools supporting the prototyping process, and (3) the impact of tools on the software development process. These questions have been examined by conducting case studies in the context of student projects. In evaluating these projects special consideration was give... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Executing JSD specifications: the specification presentation tool

    Publication Year: 1990, Page(s):280 - 287
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    A specification presentation tool which is founded on the specification execution approach is described. The purpose of the presentation tool is to give automated assistance to the system analyst in the presentation of specifications to the user for validation. Specifically, the software alloys the user to check that the specification meets the requirements by interacting with an actual system. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A formal approach to system design and refinement

    Publication Year: 1990, Page(s):544 - 545
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (188 KB)

    The Petri net formalism is used in the synthesis of system designs. A methodology is used that makes it possible to synthesize arbitrary size well-behaved Petri nets, using a stepwise refinement technique. This technique provides a method for constructing large systems that are well-behaved by design. The steps that are required in developing a synthesis procedure are outlined and brief mention is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Market research of hardware and software with partial-order classification

    Publication Year: 1990, Page(s):564 - 567
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    This work deals with one of the basic problems of market research: the evaluation of many different qualities, e.g. price, size, performance, and service. All the above are accumulated into comparable numbers and presented to the decision-makers as a total sum of qualities. To improve the techniques of data representation and accumulation, the author proposes the use of partial order classificatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complexity and uncertainty in software design

    Publication Year: 1990, Page(s):482 - 489
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    The authors focus on two modes of operation, namely, rational and experimental, and on two means of expression, namely, specifications and prototypes, as key features of approaches to software design. The discussion is based on an examination of relevant trends in software development and on reappreciation of well-known principles of human problem-solving. They conclude that the effectiveness of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The software estimation dilemma, a small step forward

    Publication Year: 1990, Page(s):242 - 249
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    The EEM (Effort Estimation Model) for software development is a support system to assist in the process of economic evaluation of software projects that takes place when a project is about to start. At that point the estimates are done only at a low level of precision, to enable the management to determine project feasibility. The EEM uses techniques consistent with the level of knowledge generall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of simulation strategies for computer networks on parallel MIMD computers

    Publication Year: 1990, Page(s):528 - 529
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    A comparison by practical evaluation of several general-purpose distributed simulation algorithms that use different ways of bringing parallelism to the simulation of computer networks is presented. A description is given of the characteristics of computer networks relevant to distributed simulation, an approach to their modeling, and the characteristics of the parallel computer architecture used.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed application engineering: an integrated model, language and tool approach

    Publication Year: 1990, Page(s):391 - 398
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    An approach based on the object-oriented paradigm is presented. Its major characteristics are an extended object-oriented model of computation, communication and structure, linguistic support for distributed programming, and tool support for application development. The approach is based on existing facilities from the areas of distributed object-oriented systems, remote procedure call, and object... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application generator for a family of real-time monitor and control systems

    Publication Year: 1990, Page(s):274 - 279
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    An application generator (AG) for a family of real-time monitor and control system (RTMCS) is presented. The input to the AG is a system specification of a desired RTMC system, and the output is an Ada program for the specified system (the target system). The system specification of a desired RTMC system is defined with the aid of an interactive menu-driven program. After checking the specificatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design tool for fault tolerant software

    Publication Year: 1990, Page(s):130 - 137
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    The features and the implementation of the Recovery Meta Program, a mechanism for backward error recovery in concurrent and distributed application programs, are described. The Recovery Meta Program executes in a specific software layer that is distinct from the application and kernel layers; its implementation is described as an extension of XMDS (cross multimicro development system). The interfa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combined application/datafault recovery

    Publication Year: 1990, Page(s):36 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The problem of cooperating processes accessing a shared database is investigated. This combined case is of particular importance for real-time applications. Various scenarios and models for cooperating transactions are suggested. In particular, a study was made of the cases of several transactions included within a conversation and several conversations included within a transaction. Some implemen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending modular languages with persistent data

    Publication Year: 1990, Page(s):542 - 543
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    A method for introducing data persistence in modular languages is presented; the method is based on an extension of the module concept that performs in the framework of an object-oriented paradigm. Application of the method to Modula-2, a language that supports modularity and encapsulation, is described. The method, however, is more general, being a simple and powerful approach to introducing data... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a general blackboard shell

    Publication Year: 1990, Page(s):178 - 185
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB)

    Considerations for making blackboard shells more general in order to improve the knowledge engineering process are described. An architecture for general blackboard shells is then proposed. It includes a set of generalized functions for constructing and supporting various operations on different types of blackboards, i.e. planning, constraint, domain, and context blackboards. A general structure f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture, software and complexity

    Publication Year: 1990, Page(s):92 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Abstraction of smaller design tasks into hierarchies is the accepted solution to the problem of having to deal with the enormous amount of detail that arises in software design. Unfortunately, the practice of abstracting the semantics of the problem being addressed out of the data processed leads to dependencies that cannot be expressed in relation to that problem and consequently are not easily u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VLSI architectures for object recognition

    Publication Year: 1990, Page(s):562 - 563
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    Solutions to the problem of object recognition based on the method of the generalized Hough transform are proposed. The exploitation of the capabilities of VLSI techniques in the solution of the problem of shape detection is analyzed for some examples of dedicated integrated circuits. A systolic machine for vote collection is described in detail View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On system reliability and verification

    Publication Year: 1990, Page(s):475 - 481
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    In response to a paper by J.H. Fetzer (Commun. ACM, vol.31, p.1048-63, 1988) and the subsequent decision, a clarification is given of what is meant by program verification and what are its benefits and limitations. An explanation is presented as to why formal verification can only, at best, guarantee the correct operation of an algorithm. For real systems (e.g. a program running on a real... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical visual techniques for joint refinement of structure and temporal behaviour in reactive system design

    Publication Year: 1990, Page(s):194 - 208
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1056 KB)

    Highlights are presented of the visual notation MachineCharts and the corresponding architectural design method. The approach has its roots in Buhr diagrams for Ada, but is both deeper than Buhr diagrams and wider in scope than Ada. Relationships to current tools are identified. The primary objectives were to provide human designers with means of (1) building confidence in the robustness of their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experience in modeling a concurrent software system using STATEMATE

    Publication Year: 1990, Page(s):104 - 108
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    STATEMATE was used to produce an executable model of a software system which would be implemented as a concurrent program with multiple tasks. In addition, the STATEMATE prototyper was used to produce executable Ada code which exhibited the same behavioral characteristics as the STATEMATE model. By augmenting this code with an Ada implementation of low-level primitive activities and a graphical in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the software maintenance factor in JSD using rules

    Publication Year: 1990, Page(s):218 - 224
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    Although the underlying philosophy of the JSD (Jackson System Development) method promotes orthogonality of system components in its specification, it fails to make explicit the business requirement policies that define the systems. The formalism adopted by JSD implicitly translates user requirement policies into lower-level procedural representation, thus burying the requirement policies in progr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.