Proceedings of IEEE 18th International Conference on Software Engineering

25-30 March 1996

Filter Results

Displaying Results 1 - 25 of 55
  • Proceedings of IEEE 18th International Conference on Software Engineering

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • System acquisition based on software product assessment

    Publication Year: 1996, Page(s):210 - 219
    Cited by:  Papers (33)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB)

    The procurement of complex software product involves many risks. To properly assess and manage those risks, Bell Canada has developed methods and tools that combine process capability assessment with a static analysis based software product assessment. This paper describes the software product assessment process that is part of our risk management approach. The process and the tools used to conduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study in applying a systematic method for COTS selection

    Publication Year: 1996, Page(s):201 - 209
    Cited by:  Papers (56)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    This paper describes a case study that used and evaluated key aspects of a method developed for systematic reusable off-the-shelf software selection. The paper presents a summary of the common problems in reusable off-the-shelf software selection, describes the method used and provides details about the case study carried out. The case study indicated that the evaluated aspects of the method are f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical and empirical evaluation of software reuse metrics

    Publication Year: 1996, Page(s):189 - 199
    Cited by:  Papers (18)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1196 KB)

    How much can be saved by using existing software components when developing new software systems? With the increasing adoption of reuse methods and technologies, this question becomes critical. However, directly tracking the actual cost savings due to reuse is difficult. A worthy goal would be to develop a method of measuring the savings indirectly by analyzing the code for reuse of components. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experiences of software quality management using metrics through the life-cycle

    Publication Year: 1996, Page(s):179 - 188
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (740 KB)

    Many software quality metrics to objectively grasp software products and process have been proposed in the past decades. In actual projects, quality metrics has been widely applied to manage software quality. However, there are still several problems with providing effective feedback to intermediate software products and the software development process. We have proposed a software quality managem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prototypes as assets, not toys. Why and how to extract knowledge from prototypes. (Experience report)

    Publication Year: 1996, Page(s):522 - 531
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1012 KB)

    Software prototypes are becoming more and more important, as computer applications invade new domains and as personal prototyping environments become more powerful. Although numerous approaches recommend their use, prototypes are sometimes treated like their developers' personal toys, and little effort is made to extract and share the experiences and knowledge that emerged as a by-product of build... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assertion-oriented automated test data generation

    Publication Year: 1996, Page(s):71 - 80
    Cited by:  Papers (21)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    Assertions are recognized as a powerful tool for automatic run time detection of software errors. However, existing testing methods do not use assertions to generate test cases. We present a novel approach of automated test data generation in which assertions are used to generate test cases. In this approach the goal is to identify test cases on which an assertion is violated. If such a test is fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effort estimation using analogy

    Publication Year: 1996, Page(s):170 - 178
    Cited by:  Papers (81)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    The staff resources or effort required for a software project are notoriously difficult to estimate in advance. To date most work has focused upon algorithmic cost models such as COCOMO and Function Points. These can suffer from the disadvantage of the need to calibrate the model to each individual measurement environment coupled with very variable accuracy levels even after calibration. An altern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Beyond structured programming

    Publication Year: 1996, Page(s):268 - 277
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (844 KB)

    Structured programming principles are not strong enough to control complexity and guarantee high reliability of software at the module level. Stronger organizing principles and stronger properties of components are needed to make significant gains in the quality of software. Practical proposals, based on the definition of normal forms which have a mathematical/logical foundation, are suggested as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding and predicting the process of software maintenance releases

    Publication Year: 1996, Page(s):464 - 474
    Cited by:  Papers (45)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (956 KB)

    One of the major concerns of any maintenance organization is to understand and estimate the cost of maintenance releases of software systems. Planning the next release so as to maximize the increase in functionality and the improvement in quality are vital to successful maintenance management. The objective of the paper is to present the results of a case study in which an incremental approach was... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reliability model combining representative and directed testing

    Publication Year: 1996, Page(s):506 - 514
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB)

    Directed testing methods, such as functional or structural testing, have been criticized for a lack of quantifiable results. Representative testing permits reliability modeling, which provides the desired quantification. Over time, however, representative testing becomes inherently less effective as a means of improving the actual quality of the software under test. A model is presented which perm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytic framework for specifying and analyzing imprecise requirements

    Publication Year: 1996, Page(s):60 - 69
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    There are at least three challenges with requirements analysis. First, it needs to bridge informal requirements, which are often vague and imprecise, to formal specification methods. Second, requirements often conflict with each other. Third, existing formal requirement specification methodologies are limited in supporting trade-off analysis between conflicting requirements and identifying the imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Independent on-line monitoring of evolving systems

    Publication Year: 1996, Page(s):134 - 143
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    We argue that the trustworthiness of evolving software systems can be significantly enhanced by a rigorous process of independent on-line monitoring. Such monitoring can prevent fraud, encourage careful maintenance, and serve as an early detector of irregularities in the state and behavior of a system. Unfortunately, there is a conflict between the concepts of on-line and independent monitoring. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using KIDS as a tool support for VDM

    Publication Year: 1996, Page(s):236 - 245
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (992 KB)

    KIDS/VDM is an experimental environment that supports the synthesis of executable prototypes from VDM specifications. The development proceeds as a series of correctness preserving transformations under the strict control of the tool. A by-product of this development is the proof of consistency properties of the original specification. Experiments with the tool have shown its ability to handle ind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design of whole-program analysis tools

    Publication Year: 1996, Page(s):16 - 27
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB)

    Building efficient tools for understanding large software systems is difficult. Many existing program understanding tools build control flow and data flow representations of the program a priori, and therefore may require prohibitive space and time when analyzing large systems. Since much of these representations may be unused during an analysis, we construct representations on demand, not in adva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A software engineering experiment in software component generation

    Publication Year: 1996, Page(s):542 - 552
    Cited by:  Papers (33)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (984 KB)

    The paper presents results of a software engineering experiment in which a new technology for constructing program generators from domain-specific specification languages has been compared with a reuse technology that employs sets of reusable Ada program templates. Both technologies were applied to a common problem domain, constructing message translation and validation modules for military comman... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical study of static call graph extractors

    Publication Year: 1996, Page(s):90 - 99
    Cited by:  Papers (24)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    Informally, a call graph represents calls between entities in a given program. The call graphs that compilers compute to determine the applicability of an optimization must typically be conservative: a call may be omitted only if it can never occur an any execution of the program. Numerous software engineering tools also extract call graphs, with the expectation that they will help software engine... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to consistency control in software engineering

    Publication Year: 1996, Page(s):289 - 297
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (752 KB)

    Quality assurance methods as suggested by standards like ISO 9000 focus on the principle of review and feedback loops, which may be implemented by computer-based software process management including life cycle models, version control, and change tracking. Provided that the software process is modelled independently of concrete design methods, development tools, and software representations, a gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assertional reasoning about pairwise transient interactions in mobile computing

    Publication Year: 1996, Page(s):155 - 164
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    Mobile computing represents a major point of departure from the traditional distributed computing paradigm. The potentially very large number of independent computing units, a decoupled computing style, frequent disconnections, continuous position changes, and the location-dependent nature of the behavior and communication patterns of the individual components present designers with unprecedented ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forcing behavioral subtyping through specification inheritance

    Publication Year: 1996, Page(s):258 - 267
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (940 KB)

    A common change to object-oriented software is to add a new type of data that is a subtype of some existing type in the program. However, due to message passing, unchanged pearls of the program may now call operations of the new type. To avoid reverification of unchanged code, such operations should have specifications that are related to the specifications of the appropriate operations in their s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An exact array reference analysis for data flow testing

    Publication Year: 1996, Page(s):565 - 574
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (892 KB)

    Data-flow testing is a well-known technique, and it has proved to be better than the commercially-used branch testing. The problem with data-flow testing is that, apart from scalar variables, only approximate information is available. This paper presents an algorithm that precisely determines the definition-use pairs for arrays within a large domain. There are numerous methods addressing the array... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilanguage interoperability in distributed systems. Experience report

    Publication Year: 1996, Page(s):451 - 463
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1188 KB)

    The Q system provides interoperability support for multilingual, heterogeneous component-based software systems. Initial development of Q began in 1988, and was driven by the very pragmatic need for a communication mechanism between a client program written in Ada and a server written in C. The initial design was driven by language features present in C, but not in Ada, or vice-versa. In time our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Slicing object-oriented software

    Publication Year: 1996, Page(s):495 - 505
    Cited by:  Papers (104)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1108 KB)

    Describes the construction of system dependence graphs for object-oriented software on which efficient slicing algorithms can be applied. We construct these system dependence graphs for individual classes, groups of interacting classes and complete object-oriented programs. For an incomplete system consisting of a single class or a number of interacting classes, we construct a procedure dependence... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GRIDS-GRaph-based, integrated development of software: integrating different perspectives of software engineering

    Publication Year: 1996, Page(s):48 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB)

    The paper presents a multi dimensional software engineering model, based on a formal graph specification. In contrast to other software engineering approaches, we concentrate on the integration of the “partial” models of software processes, system architectures and views onto the system into one consistent project framework, in order to enhance large scale software development. We firs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.