%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.00", %%% date = "01 August 2018", %%% time = "17:23:52 MDT", %%% filename = "sigsoft1990.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "http://www.math.utah.edu/~beebe", %%% checksum = "34222 31397 155436 1477549", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "ACM SIGSOFT Software Engineering Notes; %%% bibliography; BibTeX", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a COMPLETE bibliography of ACM %%% SIGSOFT Software Engineering Notes (CODEN %%% SFENDP, ISSN 0163-5948 (print), 1943-5843 %%% (electronic)) for the years 1990--1999. %%% Other decades are covered in companion %%% bibliographies named sigsoftYYY0.bib. %%% %%% Publication began with volume 1, number 1, in %%% May 1976, and there are up to 8 issues per %%% annual volume. %%% %%% The journal has Web sites at: %%% %%% http://www.sigsoft.org/ %%% https://dl.acm.org/citation.cfm?id=J728 %%% %%% At version 1.00, the COMPLETE year coverage %%% looked like this: %%% %%% 1990 ( 84) 1994 ( 66) 1998 ( 135) %%% 1991 ( 61) 1995 ( 127) 1999 ( 115) %%% 1992 ( 54) 1996 ( 149) %%% 1993 ( 79) 1997 ( 147) %%% %%% Article: 1017 %%% %%% Total entries: 1017 %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{"\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi"} %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|http://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-SIGSOFT = "ACM SIGSOFT Software Engineering Notes"} %%% ==================================================================== %%% Bibliography entries, sorted by publication order with ``bibsort %%% --byvolume'': @Article{Neumann:1990:RPCa, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "15", number = "1", pages = "4--23", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382295", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Knight:1990:RCK, author = "John C. Knight and Nancy G. Leveson", title = "A reply to the criticisms of the {Knight \& Leveson} experiment", journal = j-SIGSOFT, volume = "15", number = "1", pages = "24--35", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382710", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "The original paper is J. C. Knight and N. G. Leveson, \booktitle{An Experimental Evaluation of the Assumption of Independence in Multi-version Programming}, IEEE Transactions on Software Engineering, Vol. SE-12, No. 1 (January 1986), pp. 96--109.", } @Article{Britton:1990:TAD, author = "Carol Britton and Jill Doake and Richard Mitchell", title = "Taming the abstract data type: a taxonomy to help information systems designers", journal = j-SIGSOFT, volume = "15", number = "1", pages = "36--41", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382711", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The overall aim of our research is to investigate the use of data abstraction in the early stages of the development of information systems. In this paper we suggest a simple classification of abstract data types as a guide to inexperienced system developers in the transition from an initial problem statement to a system description using data abstraction. The classification identifies different roles that abstract data types can play in a system description: providing simple values; providing the ability to calculate with simple values; providing the means to build tuples and sets from simpler types; and providing the means to express the required systems inputs and outputs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chan:1990:COO, author = "M. L. Chan and B. Henderson-Sellers", title = "{Corporate Object-oriented Development Environment (CODE)}", journal = j-SIGSOFT, volume = "15", number = "1", pages = "42--43", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382713", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The maximum potential of the object-oriented paradigm relies on reusability of existing code. For full realisation in the corporate environment it is crucial that evolving libraries of reusable modules be managed efficiently and effectively. A framework for such management is proposed: the Corporate Object-oriented Development Environment (CODE).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Loy:1990:COO, author = "Patrick H. Loy", title = "A comparison of object-oriented and structured development methods", journal = j-SIGSOFT, volume = "15", number = "1", pages = "44--48", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382714", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The significance of ``object-oriented'' as a development method, and the current confusion over the term are addressed. A set of characteristics is proposed as a basis for agreement on a definition of the term. Object-oriented development is compared to the ``structured techniques,'' and work in progress on integrating the two methods is reviewed. Practical recommendations on assessing the importance of object-oriented development are given.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hecht:1990:COO, author = "Alan Hecht", title = "Cute object-oriented acronyms considered {FOOlish}", journal = j-SIGSOFT, volume = "15", number = "1", pages = "48", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382715", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brinkkemper:1990:DMC, author = "S. Brinkkemper and M. de Lange and R. Looman and F. H. G. C. van der Steen", title = "On the derivation of method companionship by meta-modelling", journal = j-SIGSOFT, volume = "15", number = "1", pages = "49--58", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382716", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "For an efficient and effective system development the relation between methods and tools should be maintained carefully. This relation --- called method companionship --- can be derived using the mata-data models and meta-activity models of methods and tools. In order to formulate guide-lines for the use of the Information Engineering Workbench (IEW) within the System Development Methodology (SDM), we discuss the determination of the meta-data models and a formal derivation of the support. The structure of the guide-lines is discussed together with their verification within some organizations. Finally, some conclusions from this research are given.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zhou:1990:PSP, author = "Wanlei Zhou", title = "{PM}: a system for prototyping and monitoring remote procedure call programs", journal = j-SIGSOFT, volume = "15", number = "1", pages = "59--63", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382717", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The design and implementation of a software tool PM for prototyping and monitoring remote procedure call (RPC) programs is described. The tool has two parts: a prototyping generator and a monitor. The prototyping generator takes as input several server description files, one for each server, analyses them, and produces a group of source files of the RPC prototype program. If debug option is chosen during prototyping, the produced programs will be monitored by the monitor. The monitor records all events of an RPC-based program into the monitor's database. Facilities are provided for programmers to define, choose, and combine events that will be recorded. Partial ordering among events is built after the program's execution. An user can use this relation to trace and replay the program's execution. The tool forms a proper environment for RPC-based program development.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Caron:1990:BTD, author = "Jacqueline M. Caron and Peter A. Darnell", title = "{Bugfind}: a tool for debugging optimizing compilers", journal = j-SIGSOFT, volume = "15", number = "1", pages = "64--65", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382719", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes a tool for isolating modules that are compiled incorrectly when optimization is invoked. This tool benefits application developers by automatically compiling each module to its highest level of correct optimization. It benefits compiler writers by pinpointing failing modules.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Offutt:1990:CT, author = "A. Jefferson Offutt", title = "Comments on Tai", journal = j-SIGSOFT, volume = "15", number = "1", pages = "67", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382720", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brandt:1990:QMD, author = "Dennis L. Brandt", title = "Quality measures in design: finding problems before coding", journal = j-SIGSOFT, volume = "15", number = "1", pages = "68--72", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.383048", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Structure Charts are the third major deliverable of a structured design, following the logical model and the physical model. Code is usually written immediately after the Structure Charts are approved. Many metrics are available for measuring code complexity and some forms of data coupling. Applying similar metrics to the design might be used to find problems in complexity and coupling before interfaces are formalized and code is written. This paper reviews complexity and coupling code measures which could be applied to structure charts. Since there has been little analysis and data collected in this area, it is proposed that relative figures of merit can be derived from structure charts. It is also proposed that in large systems, structure charts with out of normal figures of merit are candidates for detailed review. The general outline of an Automated Auditor is also defined as a tool to assist designers and reviewers in design analysis.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Polack:1990:PAC, author = "Alexander J. Polack", title = "Practical applications of {CASE} tools on {DoD} projects", journal = j-SIGSOFT, volume = "15", number = "1", pages = "73--78", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382724", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The use of software in the defense--related systems has increased substantially in the last decade. The Department of Defense has developed a comprehensive standard for software development. Known as DoD-STD-2167 A, its use is now mandated for all DoD projects. CASE tools are uniquely positioned to help DoD contractors in fulfilling the requirements of the standard. This article discusses some of the practical aspects of CASE technology applications in the DoD contracting environment. An example, using Software Requirements Analysis activity, is given.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tahvanainen:1990:ACB, author = "Veli-Pekka Tahvanainen and Kari Smolander", title = "An annotated {CASE} bibliography", journal = j-SIGSOFT, volume = "15", number = "1", pages = "79--92", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382727", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Terwilliger:1990:OBE, author = "Robert B. Terwilliger", title = "An overview and bibliography of {ENCOMPASS}: an environment for incremental software development using executable, logic-based specification", journal = j-SIGSOFT, volume = "15", number = "1", pages = "93--94", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382728", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Holbrook:1990:SBM, author = "H. {Holbrook III}", title = "A scenario-based methodology for conducting requirements elicitation", journal = j-SIGSOFT, volume = "15", number = "1", pages = "95--104", month = jan, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382294.382725", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:29 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Requirements analysis is the process of identifying a user's needs and determining what to build in an a system. Within requirements analysis is the process of requirements elicitation in which tacit information about ``what to build'' is obtained from the user and his environment. Here, we will describe a methodology, dubbed Scenario Based Requirements Elicitation (SBRE), which structures the early interaction between users and designers in order to quickly develop a set of initial requirements. The methodology features the parallel development of requirements and a high-level design, the use of scenarios to communicate the behavior of a design, an evaluation function to assess the suitability of the design, and an issue base with which to maintain the issues that arise during the elicitation process.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1990:RPCb, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "15", number = "2", pages = "3--22", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382297", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Delgado:1990:ITS, author = "Joseph F. Delgado", title = "Issues in transfer of skills in software engineering training", journal = j-SIGSOFT, volume = "15", number = "2", pages = "23--25", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382695", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper summarizes issues of skills transfer in current software engineering training, under the categories of management support, training resources, scheduling, training process, and incentives.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Clark:1990:FVD, author = "Jon D. Clark", title = "Function versus data-driven methodologies: a prescriptive metric", journal = j-SIGSOFT, volume = "15", number = "2", pages = "26", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382696", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bowles:1990:NYS, author = "Adrion J. Bowles", title = "A note on the Yourdon structured method", journal = j-SIGSOFT, volume = "15", number = "2", pages = "27", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382697", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brown:1990:CCQ, author = "Bradley J. Brown", title = "Correctness is not congruent with quality", journal = j-SIGSOFT, volume = "15", number = "2", pages = "28", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382698", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Duncan:1990:OMT, author = "I. M. M. Duncan and D. J. Robson", title = "Ordered mutation testing", journal = j-SIGSOFT, volume = "15", number = "2", pages = "29--30", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382699", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Mutation Analysis is an established technique for test data generation and source code testing. Developed systems have concentrated on applying some or all of the possible mutant operators (perturbations) to the submitted code. Recent work tackled the scheduling of mutant program execution on vector processors or a Hypercube as a cost reduction scheme. This paper discusses a logical mechanism of impact driven testing in order to achieve full mutation testing with reduced overheads regardless of implementation. Guiding the mutant generation by block impact together with mutant operator heirarchies and a test data coverage scheme enable an efficient tool to be constructed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wybolt:1990:ECO, author = "Nicholas Wybolt", title = "Experiences with {C++} and object-oriented software development", journal = j-SIGSOFT, volume = "15", number = "2", pages = "31--39", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382700", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Object-oriented is a very hot topic and buzzword both in academia and industry. There are object-oriented analysis and design techniques, object-oriented languages and databases, and so on. Many people see the letters ``OO'', attach a ``G'' to the front, and a ``D'' to the back and deem it to be ``GOOD'' --- without much consideration for what it means in the software life cycle. This paper discusses the on-going (3+ years) object-oriented re-design and re-implementation in C++ of a commercial CASE tool. Specifically, why an object-oriented approach was chosen and the implications and collective experiences of this approach. In addition to the anticipated benefits, much of what we experienced was unforeseen and unexpected.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Koelbel:1990:WRE, author = "Chuck Koelbel and Gene Spafford and George Leach", title = "Workshop report: experiences with building distributed and multiprocessor systems", journal = j-SIGSOFT, volume = "15", number = "2", pages = "39--41", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382701", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1990:WDR, author = "Will Tracz", title = "Where does reuse start?", journal = j-SIGSOFT, volume = "15", number = "2", pages = "42--46", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382702", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Prieto-Diaz:1990:DAI, author = "Rub{\'e}n Prieto-D{\'\i}az", title = "Domain analysis: an introduction", journal = j-SIGSOFT, volume = "15", number = "2", pages = "47--54", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382703", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The objective of this paper is to provide a brief introduction to the area of domain analysis as seen from the software engineering perspective. The approach is by illustrating the concepts through selected reported experiences and to point out the specific characteristics of these experiences that relate to domain analysis. Definitions are introduced after the examples to avoid over explaining the concepts. A model for the domain analysis process is also proposed. The concept of a library based domain infrastructure is introduced as an attempt to show how domain analysis is integrated into the software development process.A second objective in this paper is to give a perspective on some of the research issues facing domain analysis. The nature of the process calls for a variety of multidiciplinary issues ranging from knowledge acquisition and knowledge representation to management and methodologies to cultural and social questions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cabral:1990:ISM, author = "Regina H. B. Cabral and Ivan M. Campos and Donald D. Cowan and Carlos J. P. Lucena", title = "Interfaces as specifications in the {MIDAS} user interface development systems", journal = j-SIGSOFT, volume = "15", number = "2", pages = "55--69", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382704", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes an evolving User Interface Development System called MIDAS (for Merging Interface Development with Application Specification) which allows interface/systems designers to develop an application-specific user interface interactively, in a prototyping-oriented environment, while refining the specification of the intended application itself. The interface/systems designer receives expert advice on both interface and application software design principles, emerging from MIDAS' knowledge base, and can also animate the intended user dialogue with the interface being designed via an extensive set of visual programming aids. The generated interface can be further customized by the end-user, by flexibly altering the default appearance of the dialogue scenarios. Furthermore, the application-specific end-user interface is also knowledge based. Its domain knowledge covers user modeling and the application domain, in order to adapt itself dynamically to different degrees of user familiarity with the application, from novice to expert. Both the interface code and the programming-in-the-large of the application code are developed within an object-oriented framework. A proposal for a software life cycle model based on the rapid prototyping of user interfaces as a means to refining the specification of the application all the way down to the import-export list and module semantics specification for each and every application module is also presented. The lifecycle model is rule-encoded in MIDAS' knowledge base. The interface/systems designer is guided by the interpretation of those rules. MIDAS aims to provide a testbed for new ideas in human-computer interfaces, knowledge-based support of design activities and life cycle models based on rapid prototyping of user interfaces.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Coomber:1990:GTP, author = "C. J. Coomber and R. E. Childs", title = "A graphical tool for the prototyping of real-time systems", journal = j-SIGSOFT, volume = "15", number = "2", pages = "70--82", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382705", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes a prototyping tool for the design and execution of real-time system specifications known as transformation schemas. The tool comprises an editor that makes full use of windows, menus, and icons; and a simulator that executes transformation schemas based on an object-oriented strategy. The tool not only enables the syntactic correctness of a transformation schema to be verified, but also assists in proving its semantic correctness.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Terry:1990:TSE, author = "B. Terry and D. Logee", title = "Terminology for Software Engineering Environment {(SEE)} and Computer-Aided Software Engineering {(CASE)}", journal = j-SIGSOFT, volume = "15", number = "2", pages = "83--94", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382706", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tripp:1990:CES, author = "Leonard L. Tripp", title = "{CASE} evaluation and selection bibliography", journal = j-SIGSOFT, volume = "15", number = "2", pages = "95", month = apr, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/382296.382707", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:30 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Yeung:1990:IJD, author = "W. L. Yeung and G. Topping", title = "Implementing {JSD} designs in {Ada}: a tutorial", journal = j-SIGSOFT, volume = "15", number = "3", pages = "25--32", month = jul, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101114.101115", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Jackson System Development (JSD) method is widely recognized as viable for the design of real-time embedded systems. This paper discusses the implementation of JSD designs in Ada through a simulated lift control example.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Coomer:1990:DRS, author = "T. N. {Coomer, Jr.} and J. R. Comer and D. J. Rodjak", title = "Developing reusable software for military systems, why it is needed, why it isn't working", journal = j-SIGSOFT, volume = "15", number = "3", pages = "33--38", month = jul, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101114.101116", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper discusses the importance of developing reusable software component libraries for Department of Defense (DoD) military software systems, as well as a few of the main reasons why current approaches are not working. A working definition of software reusability is established and the major goals of reuse are examined. The emphasis of the paper is on the necessary characteristics of a reusable software component as well as the compilation and utilization of reusable component libraries. The roles of UNIX{\TM}, Ada{\reg}, and C in the development of reusable components are examined. Many of the problems facing the development of adaptable, reusable software components are outlined as well as some possible solutions to these problems. Conclusions are drawn concerning the critical need for these software characteristics in DoD military systems of the future.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gyorkos:1990:ICT, author = "J. Gy{\"o}rk{\"o}s and I. Rozman and T. Welzer", title = "Introducing {CASE} tools into the software development group", journal = j-SIGSOFT, volume = "15", number = "3", pages = "39--41", month = jul, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101114.101117", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Conventional groups for software development try to increase its efficiency with a more advanced approach to all phases of software life cycle. The need for more formal specifications demands the introduction of computer aided tools which base on the empirically confirmed methodologies. The most important task of CASE tools is to unite the methodologies for covering various life cycle phases under one shell. In the paper the problems, appearing in the contact of the tool with the subjects of the developers team are described.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Balda:1990:CEM, author = "D. Balda and D. A. Gustafson", title = "Cost estimation models for reuse and prototype {SW} development life-cycles", journal = j-SIGSOFT, volume = "15", number = "3", pages = "42--50", month = jul, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101114.101118", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Cocomo cost estimation model was developed to estimate the cost of developing software utilizing the waterfall life-cycle model. The assumptions in the waterfall model account for many software development situations, but do not account for the actual development process when the requirements are known to be unstable or incomplete or when extensive code and design information are reused. The prototype and reuse life-cycle models, respectively, were developed to model these specific situations. The assumptions made by any life-cycle model directly influence its cost estimation model; therefore, when the life-cycle model is inappropriate, its cost estimation model is also inappropriate. This makes the Cocomo cost estimation model inadequate for estimating development effort for software developed utilizing the prototype or reuse software development life-cycle models. Two cost estimation models, one for the prototype software life-cycle model and one for the reuse software life-cycle model, are presented. Each cost estimation model is derived from the basic Cocomo model and modified to fit the characteristics of its respective life-cycle model.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Martinis:1990:SCC, author = "J. Martinis", title = "Softool change\slash configuration management", journal = j-SIGSOFT, volume = "15", number = "3", pages = "51", month = jul, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101114.101119", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:31 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bolognesi:1990:SGR, author = "Tommaso Bolognesi", title = "On the soundness of graphical representations of interconnected processes in {LOTOS}", journal = j-SIGSOFT, volume = "15", number = "4", pages = "1--7", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99574", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chung:1990:EED, author = "Anthony Chung and Deepinder Sidhu", title = "Experience with an {Estelle} development system", journal = j-SIGSOFT, volume = "15", number = "4", pages = "8--17", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99801", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{DeMan:1990:MLM, author = "Jozef {De Man}", title = "Making languages more powerful by removing limitations", journal = j-SIGSOFT, volume = "15", number = "4", pages = "18--24", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99805", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Eggert:1990:TSP, author = "Paul Eggert", title = "Toward special-purpose program verification", journal = j-SIGSOFT, volume = "15", number = "4", pages = "25--29", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99807", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Frost:1990:CPC, author = "Richard A. Frost", title = "Constructing programs in a calculus of lazy interpreters", journal = j-SIGSOFT, volume = "15", number = "4", pages = "30--41", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99810", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1990:RFR, author = "David Garlan", title = "The role of formal reusable frameworks", journal = j-SIGSOFT, volume = "15", number = "4", pages = "42--44", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99812", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jacky:1990:FSC, author = "Jonathan Jacky", title = "Formal specification for a clinical cyclotron control system", journal = j-SIGSOFT, volume = "15", number = "4", pages = "45--54", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99814", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ledru:1990:AVL, author = "Yves Ledru and Pierre-Yves Schobbens", title = "Applying {VDM} to large developments", journal = j-SIGSOFT, volume = "15", number = "4", pages = "55--58", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99815", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Logrippo:1990:ASL, author = "Luigi Logrippo and Tim Melanchuk and Robert J. {Du Wors}", title = "The algebraic specification language {LOTOS}: an industrial experience", journal = j-SIGSOFT, volume = "15", number = "4", pages = "59--66", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99817", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Narayana:1990:IPD, author = "K. T. Narayana and Sanjeev Dharap", title = "Invariant properties in a dialog system", journal = j-SIGSOFT, volume = "15", number = "4", pages = "67--79", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99818", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ness:1990:PET, author = "Linda Ness", title = "{L.0}: a parallel executable temporal logic language", journal = j-SIGSOFT, volume = "15", number = "4", pages = "80--89", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99820", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Nord:1990:FMM, author = "Robert L. Nord and Peter Lee and William L. Scherlis", title = "Formal manipulation of modular software systems", journal = j-SIGSOFT, volume = "15", number = "4", pages = "90--99", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99825", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Platek:1990:FMM, author = "Richard Platek", title = "Formal methods in mathematics", journal = j-SIGSOFT, volume = "15", number = "4", pages = "100--103", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99827", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Reddy:1990:FMT, author = "Uday S. Reddy", title = "Formal methods in transformational derivation of programs", journal = j-SIGSOFT, volume = "15", number = "4", pages = "104--114", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99828", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Runciman:1990:FDS, author = "Colin Runciman and Mike Firth", title = "Formalised development of software by machine assisted transformation", journal = j-SIGSOFT, volume = "15", number = "4", pages = "115--117", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99829", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Toetenel:1990:SAF, author = "Hans Toetenel and Jan van Katwijk and Nico Plat", title = "Structured analysis --- formal design, using stream and object oriented formal specifications", journal = j-SIGSOFT, volume = "15", number = "4", pages = "118--127", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99830", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wile:1990:ARA, author = "David S. Wile", title = "Adding relational abstraction to programming languages", journal = j-SIGSOFT, volume = "15", number = "4", pages = "128--139", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99833", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wing:1990:ELP, author = "Jeannette M. Wing and Chun Gong", title = "Experience with the Larch Prover", journal = j-SIGSOFT, volume = "15", number = "4", pages = "140--143", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99835", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wood:1990:AFM, author = "William G. Wood", title = "Application of formal methods to system and software specification", journal = j-SIGSOFT, volume = "15", number = "4", pages = "144--146", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99837", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Young:1990:VPS, author = "William D. Young", title = "Verified program support environments", journal = j-SIGSOFT, volume = "15", number = "4", pages = "147--149", month = sep, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99571.99839", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1990:RP, author = "P. G. Neumann", title = "Risks to the public", journal = j-SIGSOFT, volume = "15", number = "5", pages = "3--17", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101330", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ketchum:1990:CCQ, author = "D. W. Ketchum", title = "Correctness is not congruent with quality", journal = j-SIGSOFT, volume = "15", number = "5", pages = "18", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101331", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lott:1990:CCQ, author = "C. M. Lott", title = "Correctness is congruent with quality", journal = j-SIGSOFT, volume = "15", number = "5", pages = "19--20", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101332", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Laplante:1990:HU, author = "P. Laplante", title = "{Heisenberg} Uncertainty", journal = j-SIGSOFT, volume = "15", number = "5", pages = "21--22", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101333", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/bibnet/authors/h/heisenberg-werner.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper it is suggested that the Heisenberg Uncertainty Principle, normally applied to physical systems, can be applied in analogy to certain phenomena found in software engineering. The point is illustrated with several examples. The applications of this principle in the design and testing of software is discussed. The import of this is that paradigms relating physical phenomena to software engineering may be found.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Aiken:1990:ABS, author = "M. W. Aiken", title = "{AI} based simulation in reusability", journal = j-SIGSOFT, volume = "15", number = "5", pages = "23--27", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101334", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents a knowledge-based approach for selecting and testing modular reusable code. This approach entails three stages: system definition through a system entity structure (SES), SES pruning and model synthesis using an expert system (ES), and the evaluation of candidate design models using discrete event simulation (DEVS). An example of this approach is shown through the development of a Group Decision Support System (GDSS) idea generation tool.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Carasik:1990:DDG, author = "R. P. Carasik and S. M. Johnson and D. A. Patterson and G. A. {Von Glahn}", title = "Domain description grammar: application of linguistic semantics", journal = j-SIGSOFT, volume = "15", number = "5", pages = "28--43", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101335", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Domain descriptions should represent more than the characteristics of data and the operations on it. They should be ``semantic'' in the sense that they may represent information such as the meanings of special terms used in the business, as well as goals and rules. ER models are often described as ``semantic data models''. However, the correspondence between ER and natural language is through syntactic rather than through semantic constructs. Conceptual modeling languages and knowledge representation techniques are more appropriate for representing domain meaning. Modern research in linguistics, semantics, and artificial intelligence provides valuable insight into basic issues regarding such representations. Domain descriptions must use languages based on generally-accepted linguistic and knowledge representation principles.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jean:1990:ETO, author = "C. Jean and A. Strohmeier", title = "An experience in teaching {OOD} for {Ada} software", journal = j-SIGSOFT, volume = "15", number = "5", pages = "44--49", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101336", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Overmyer:1990:DSM, author = "S. P. Overmyer", title = "{DoD-Std-2167A} and methodologies", journal = j-SIGSOFT, volume = "15", number = "5", pages = "50--59", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101338", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Many experts in software engineering agree that the emerging iterative requirements engineering, software engineering and software design methodologies present excellent ways to identify and validate user requirements. These methodologies often include innovative techniques for elicitation and validation of user requirements including various forms of human engineering analysis, rapid prototyping, and knowledge acquisition tasks. This paper addresses the compatibility of these techniques with DoD-Std-2167A. Assessment is made regarding the compatibility of the standard with innovative requirements techniques, and how and where these techniques may be inserted into the life cycle.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mrdalj:1990:BOO, author = "S. Mrdalj", title = "Biblio of object-oriented system development", journal = j-SIGSOFT, volume = "15", number = "5", pages = "60--63", month = oct, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/101328.101339", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:33 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An increasing number of articles and books is being published in the area of object-oriented system development (OOSD). A need for collection, classification and evaluation of the available material is already evident. This is why we decided to collect a bibliography when we started our research project on comparison of object-oriented analysis and design methods. Most of the included items do not attack the whole problem of OOSD but together they represent work done on many aspects of the problem. Some are related to the system design using various object-oriented programming languages. Also a few items have been included that deal with object-oriented principles in general. There are even some which are ``comments'' or ``discussions'' on the topic. The items were chosen on the basis that they should have some direct reference to object-oriented system development. This bibliography contains material in the field that has been published before Spring 1990. It is by no means supposed to be complete. If any references of particular significance have been omitted, the author would appreciate hearing about them. I hope this bibliography will help those planning to build object-oriented systems, or those who are working on new OOSD methods.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1990:LCA, author = "David Garlan and Ehsan Ilias", title = "Low-cost, adaptable tool integration policies for integrated environments", journal = j-SIGSOFT, volume = "15", number = "6", pages = "1--10", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99279", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An important requirement for successful integrated programming environments is support for implicit tool invocation; rather than force a user to explicitly invoke each tool, mechanisms in the environment can take responsibility for guaranteeing that the right tools are invoked at the right times. However, these mechanisms typically intertwine policies of when and how the tools are invoked, with what the tools do when they are invoked. Consequently, adapting the environment to achieve different tool interactions is often difficult without modifying the code that implements the environment or the tools. In this paper we describe a simple, low-cost mechanism that solves this problem. Specifically, we show how tool integration based on selective broadcast can be adapted to allow dynamically configurable policies of tool interaction. We describe an implementation of these mechanisms, and show how it supports multiple levels of users.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Clement:1990:DAP, author = "Dominique Cl{\'e}ment", title = "A distributed architecture for programming environments", journal = j-SIGSOFT, volume = "15", number = "6", pages = "11--21", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99280", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Programming environments are typically based on concepts, such as syntax and semantics, and they provide functionalities, such as parsing, editing, type-checking, and compiling. Most existing programming environments are designed in a fully integrated manner, where parsers, editors, and semantic tools are tightly coupled. This leads to systems that are the sum of all their components, with obvious implications in terms of size, reusability, and maintainability. In this paper, we present a proposal for a distributed architecture for programming environments.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sullivan:1990:REI, author = "Kevin Sullivan and David Notkin", title = "Reconciling environment integration and component independence", journal = j-SIGSOFT, volume = "15", number = "6", pages = "22--33", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99281", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present an approach that eases the design and evolution of integrated environments by increasing independence among components. Our approach combines mediators, which localize relationships, and a general event mechanism, which increases the independence of components from relationships in which they participate. To clarify our notion of independence and its relationship to evolution, we analyze four designs for a simple environment. The first three show how common approaches compromise independence in various ways. The fourth design demonstrates how our approach overcomes these problems. Our event mechanism is specially designed to support integration and evolution. We discuss detailed aspects of mediators and events by presenting three environments we have built. Our approach has also given us significant insights into other related systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Qian:1990:CMP, author = "Xiaolei Qian and Richard Jullig and Marilyn Daum", title = "Consistency management in a project management assistant", journal = j-SIGSOFT, volume = "15", number = "6", pages = "34--43", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99282", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Object management systems have been identified as the core of object-oriented software development environments. One of the most important objectives of object management systems is to maintain consistency between the vast amount of interrelated objects, which is generated, accessed, and manipulated throughout the software life cycle. Consistency management in such systems is beyond the reach of conventional database technology due to the complex structure and the incompleteness of data, the dynamic nature of constraints, and the need to tolerate various levels of inconsistency. We investigate the design issues for consistency management in the context of a Project Management Assistant. Our consistency manager organizes constraints into a hierarchy of consistency, and associates a spectrum of management techniques with classes of constraints. The various levels of consistency are achieved by enabling or disabling classes of constraints, and propagating constraints cross the class boundary. The constraint manager is capable of compiling constraint specifications into triggers attached to objects in the object base. The architecture is open to new constraints and new management techniques.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Minsky:1990:CMC, author = "Naftaly H. Minsky and David Rozenshtein", title = "Configuration management by consensus: an application of law-governed systems", journal = j-SIGSOFT, volume = "15", number = "6", pages = "44--55", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99283", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "It is self-evident that if one wants to model and control the cooperative process of software development, one must provide for cooperative decision making. In particular, one should be able to base the decision on whether and how to carry out a given operation on the consensus of several, possibly independent, agents. It is important to emphasize that this is not just a matter of computing the conjunction of some set of conditions. One must also provide a mechanism for establishing any desired consensus structure, which would specify who is allowed to state which kinds of concerns regarding this operation, and what the relationship among these concerns should be. In this paper we propose a general framework for such decision making by consensus, which is based on the concept of law-governed software development. As a concrete application domain in which to illustrate this framework, we consider here the issue of configuration binding.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tan:1990:CCO, author = "Lichao Tan and Yoichi Shinoda and Takuya Katayama", title = "Coping with changes in an object management system based on attribute grammars", journal = j-SIGSOFT, volume = "15", number = "6", pages = "56--65", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99284", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper, we discuss methods of dealing with change in an object management system OS/O, which is a prototype of an attribute grammar based object management model, called Object-Oriented Attribute Grammars(OOAG)[SK 9Oa]. OOAG is a hybrid model that combines features of functional and object-oriented paradigms. Various aspects of software object databases can be described using its capabilities. Software objects in OOAG are managed as autonomous, hierarchical trees containing attributes. The OOAG is also capable of describing software processes as hierarchies of software objects, with data driven process enaction mechanism. Many aspects of changes to such a tree, including the evolution of the tree type definition, or the dynamic transformation of its internal structure can be dealt with easily by the benefits of a combined attribute grammars based and object oriented paradigm. We also introduce a mechanism that helps to provide an efficient way for manipulating changed objects. The mechanism is characterized by meta-objects that are used to control the evaluation of the changes. Meta-objects prove to be a suitable mechanism for handling change management tasks in evolving object environments.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jordan:1990:EPE, author = "Mick Jordan", title = "An extensible programming environment for Modula-3", journal = j-SIGSOFT, volume = "15", number = "6", pages = "66--76", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99285", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes the design and implementation of a practical programming environment for the Modula-3 programming language. The environment is organised around an extensible intermediate representation of programs and makes extensive use of reusable components. The environment is implemented in Modula-3 and exploits some of the novel features of the language.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ballance:1990:PLB, author = "Robert A. Ballance and Susan L. Graham and Michael L. {Van De Vanter}", title = "The {Pan} language-based editing system for integrated development", journal = j-SIGSOFT, volume = "15", number = "6", pages = "77--93", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99286", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Powerful editing systems for developing complex software documents are difficult to engineer. Besides requiring efficient incremental algorithms and complex data structures, such editors must integrate smoothly with the other tools in the environment, maintain a sharable database of information concerning the documents being edited, accommodate flexible editing styles, provide a consistent, coherent, and empowering user interface, and support individual variations and project-wide configurations. Pan is a language-based editing and browsing system that exhibits these characteristics. This paper surveys the design and engineering of Pan, paying particular attention to a number of issues that pervade the system: incremental checking and analysis, information retention in the presence of change, tolerance for errors and anomalies, and extension facilities.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ipser:1990:MFS, author = "Edward A. Ipser and David S. Wile and Dean Jacobs", title = "A multi-formalism specification environment", journal = j-SIGSOFT, volume = "15", number = "6", pages = "94--106", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99287", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes initial work on a software development environment capable of smoothly integrating modules written in different languages. The focus of this work is on supporting the construction of executable, multi-formalism specifications, where each part of a problem is described in a language that is close to its underlying domain. We distinguish specifications from programs to emphasize the closeness of the formalism to these domains rather than underlying computational models, and to indicate that we are not attempting to integrate existing implementations of programming languages. Rather, we provide a grammar-based framework for the construction and integration of interpreters for different specification formalisms. The key to our approach is that formalisms communicate through grammatically described interfaces. Such interfaces hide incompatible aspects of different formalisms, allowing new combinations of formalisms to be created easily.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Goldberg:1990:RSD, author = "Allen Goldberg", title = "Reusing software developments", journal = j-SIGSOFT, volume = "15", number = "6", pages = "107--119", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99288", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software development environments of the future will be characterized by extensive reuse of previous work. This paper addresses the issue of reusability in the context in which design is achieved by the transformational development of formal specifications into efficient implementations. It explores how an implementation of a modified specification can be realized by replaying the transformational derivation of the original and modifying it as required by changes made to the specification. Our approach is to structure derivations using the notion of tactics, and record derivation histories as an execution trace of the application of tactics. One key idea is that tactics are compositional: higher level tactics are constructed from more rudimentary using defined control primitives. This is similar to the approach used in LCF[12] and NuPRL[1, 8]. Given such a derivation history and a modified specification, the correspondence problem [21, 20] addresses how during replay a correspondence between program parts of the original and modified program is established. Our approach uses a combination of name association, structural properties, and associating components to one another by intensional descriptions of objects defined in the transformations themselves. An implementation of a rudimentary replay mechanism for our interactive development system is described. For example with the system we can first derive a program from a specification that computes some basic statistics such as mean, variance, frequency data, etc. The derivation is about 15 steps; it involves deriving an efficient means of computing frequency data, combining loops and selecting data structures. We can then modify the specification by adding the ability to compute the maximum or mode and replay the steps of the previous derivation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hart:1990:EDS, author = "C. Frederick Hart and John J. Shilling", title = "An environment for documenting software features", journal = j-SIGSOFT, volume = "15", number = "6", pages = "120--132", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99289", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The software engineering environment described in this paper directly addresses the problems of modifying software by explicitly linking software designs to implementations --- localizing and partitioning the portions of the implementation corresponding to distinct features and thus facilitating understanding. The operations of feature extraction and generic feature instantiation implemented in this environment provide mechanisms for partially automating the configuration of software. Software documentation based on the notion of features not only records information on program function and structure but information on how maintenance is to be performed. Furthermore, a design environment supporting features and feature contexts promotes feature-oriented design which means designing for reuse and maintainability.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Yang:1990:PIA, author = "Wuu Yang and Susan Horwitz and Thomas Reps", title = "A program integration algorithm that accommodates semantics-preserving transformations", journal = j-SIGSOFT, volume = "15", number = "6", pages = "133--143", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99290", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Given a program Base and two variants, A and B, each created by modifying separate copies of Base, the goal of program integration is to determine whether the modifications interfere, and if they do not, to create an integrated program that includes both sets of changes as well as the portions of Base preserved in both variants. Text-based integration techniques, such as the one used by the UNIX diff3 utility, are obviously unsatisfactory because one has no guarantees about how the execution behavior of the integrated program relates to the behaviors of Base, A, and B. The first program-integration algorithm to provide such guarantees was developed by Horwitz, Prins, and Reps. However, a limitation of that algorithm is that it incorporates no notion of semantics-preserving transformations. This limitation causes the algorithm to be overly conservative in its definition of interference. For example, if one variant changes the way a computation is performed (without changing the values computed) while the other variant adds code that uses the result of the computation, the algorithm would classify those changes as interfering. This paper describes a new integration algorithm that is able to accommodate semantics-preserving transformations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Snodgrass:1990:FGD, author = "Richard Snodgrass and Karen Shannon", title = "Fine grained data management to achieve evolution resilience in a software development environment", journal = j-SIGSOFT, volume = "15", number = "6", pages = "144--156", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99291", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A software development environment (SDE) exhibits evolution resilience if changes to the SDE do not adversely affect its functionality nor performance, and also do not introduce delays in returning the SDE to an operational state after a change. Evolution resilience is especially difficult to achieve when manipulating fine grained data, which must be tightly bound to the language in which the SDE is implemented to achieve adequate performance. We examine a spectrum of approaches to tool integration that range from high SDE-development-time efficiency to high SDE-execution-time efficiency. We then present a meta-environment, a specific SDE tailored to the development of target SDE's, that supports easy movement of individual tools along this spectrum.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lockman:1990:PTT, author = "Abe Lockman and John Salasin", title = "A procedure and tools for transition engineering", journal = j-SIGSOFT, volume = "15", number = "6", pages = "157--172", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99292", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kobialka:1990:CEG, author = "Hans-Ulrich Kobialka", title = "Configuration editing, generation and test within working contexts", journal = j-SIGSOFT, volume = "15", number = "6", pages = "173--182", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99293", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In a software development environment any progress is reflected in modifications of design documents. These changes must be attended by recording of versions in order to restore consistent states and to rebuild delivered systems for error detection. The introduction of versions implies the need for version selection mechanisms, to achieve the same degree of operability as known in versionless environments. This paper introduces a version selection mechanism based on the notion of working contexts. Examples generated by the ADD document management system illustrate how editing, generation and test of configurations are eased using working contexts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ambriola:1990:SPE, author = "V. Ambriola and P. Ciancarini and C. Montangero", title = "Software process enactment in Oikos", journal = j-SIGSOFT, volume = "15", number = "6", pages = "183--192", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99294", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Despite much research work in progress to model the different facets of software process enactment from different approaches, there are no models yet generally recognized as adequate, and there is need for more experimentation. We describe the Oikos environment and its coordination language ESP: they provide an infrastructure in which experiments may be performed and evaluated. Oikos predefines a number of services offering basic facilities, like access to data bases, workspaces, user interfaces etc.. Services are customizable, in a declarative way that matches naturally the way ESP defines and controls the software process. ESP allows to define services, to structure them in a dynamic hierarchy, and to coordinate them according to the blackboard paradigm. The concepts of environment and of software process and their interplay are naturally characterized in Oikos, in terms of sets of services and of the hierarchy. In the paper, an example taken from a real project (the specification of a small language and the implementation of its compiler) shows how Oikos and ESP are effective for software process enactment. As it is, ESP embeds Prolog as its sequential component, and combines it smoothly to the blackboard approach to deal with concurrency and distribution. Anyway, most of the concepts used to model and enact software processes are largely independent of logic programming.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gruhn:1990:MSP, author = "Volker Gruhn", title = "Managing software processes in the environment {MELMAC}", journal = j-SIGSOFT, volume = "15", number = "6", pages = "193--205", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99295", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we introduce an approach to software process modeling and execution based on the distinction between an application level (oriented towards a comprehensive representation of software process models) and an intermediate level representation of software process models (oriented towards uniform and executable description of software process models). The application level representation of software models identifies various entities of software process models. For describing different entities of software process models different views are used. The entities specified within all the views are uniformly represented on the intermediate level by FUNSOFT nets. FUNSOFT nets are high-level Petri nets which are adapted to the requirements of software process management. A mechanism for coping with software process model modifications raised in software process execution is introduced. This mechanism is based on modification points. Moreover, we discuss the architecture of the environment MELMAC which supports software process modeling as well as software process execution.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sutton:1990:LCM, author = "Stanley M. {Sutton, Jr.} and Dennis Heimbigner and Leon J. Osterweil", title = "Language constructs for managing change in process-centered environments", journal = j-SIGSOFT, volume = "15", number = "6", pages = "206--217", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99296", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Change is pervasive during software development, affecting objects, processes, and environments. In process centered environments, change management can be facilitated by software-process programming, which formalizes the representation of software products and processes using software-process programming languages (SPPLs). To fully realize this goal SPPLs should include constructs that specifically address the problems of change management. These problems include lack of representation of inter-object relationships, weak semantics for inter-object relationships, visibility of implementations, lack of formal representation of software processes, and reliance on programmers to manage change manually. APPL/A is a prototype SPPL that addresses these problems. APPL/A is an extension to Ada.. The principal extensions include abstract, persistent relations with programmable implementations, relation attributes that may be composite and derived, triggers that react to relation operations, optionally-enforceable predicates on relations, and five composite statements with transaction-like capabilities. APPL/A relations and triggers are especially important for the problems raised here. Relations enable inter-object relationships to be represented explicitly and derivation dependencies to be maintained automatically. Relation bodies can be programmed to implement alternative storage and computation strategies without affecting users of relation specifications. Triggers can react to changes in relations, automatically propagating data, invoking tools, and performing other change management tasks. Predicates and the transaction-like statements support change management in the face of evolving standards of consistency. Together, these features mitigate many of the problems that complicate change management in software processes and process-centered environments.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ossher:1990:SCR, author = "Harold Ossher and William Harrison", title = "Support for change in {RPDE3}", journal = j-SIGSOFT, volume = "15", number = "6", pages = "218--228", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99297", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "RPDE$^3$ is a framework for building environments. Great emphasis has been placed on supporting changes of various kinds, such as extensions to existing environments and creation of new environments by adapting existing environments. We have a three-pronged approach to supporting change: (1) use of a central framework providing key services is a uniform fashion, (2) an extended object-oriented programming paradigm supporting fine-grained changes by addition of small code fragments, and (3) structured representation of program material facilitating sophisticated language-sensitive processing. RPDE$^3$ has been used on a daily basis for its own development for about three years now, and during that time has undergone extensive change. This experience has indicated strongly that our approach to supporting change is effective, and has identified extensions to it that should make it more effective still. This paper describes the approach and, primarily, our experience.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mahler:1990:ICM, author = "Axel Mahler and Andreas Lampen", title = "Integrating configuration management into a generic environment", journal = j-SIGSOFT, volume = "15", number = "6", pages = "229--237", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99298", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The software development process consists of a number of complex activities for work coordination, organization, communication, and disciplines that are essential for achieving quality software, maintaining system integrity, and keeping the software process manageable. Software Engineering Environments can be helpful instruments in pursuing these goals when they are integrated, open to extension, and capable of adapting to real processes as they occur in software development projects. Adaptability and the ability to perform adaptations rapidly are crucial features of SEEs. In this paper we are presenting an approach to rapid environment extension that provides the means to capture characteristics of software development processes and realize environment support for these processes by using existing tools. An object oriented environment infrastructure is the basis for achieving these goals while providing and maintaining an integrated behavior of the environment. The presented approach is demonstrated by defining a set of classes for version control and configuration management that model the behavior of an existing configuration management toolkit.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tedjini:1990:QSS, author = "Mohamed Tedjini and Ian Thomas and Guy Benoliel and Fernando Gallo and R{\'e}gis Minot", title = "A query service for a software engineering database system", journal = j-SIGSOFT, volume = "15", number = "6", pages = "238--248", month = dec, year = "1990", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/99278.99299", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The PCTE interfaces define a Public Tool Interface intended to serve as a basis for the construction of integrated software engineering environments (SEEs). The interfaces include Object Management System (OMS) services that manage the data repository of the environment. The OMS is based on a binary Entity-Relationship model. This paper describes a query service constructed on the PCTE interfaces. Following a brief summary of the OMS features that are necessary to understand the paper, we describe the requirements and design objectives for a query service in an integrated SEE, the basic model for our solution, and then review the facilities of the service. The paper also contains a comparison with other work on queries on E-R and object-oriented databases. The paper's conclusions indicate the differences that exist between requirements and characteristics for query services on SEE data repositories and those for other databases. It shows, for example, how assumptions about data availability and accessibility that are often made for query services are not appropriate for SEE data repositories.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wei:1991:MCU, author = "Yin-min Wei and Klaus Eldridge", title = "Module Completeness as a Useful Guideline for Programming", journal = j-SIGSOFT, volume = "16", number = "1", pages = "35", month = jan, year = "1991", CODEN = "SFENDP", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Scarlato:1991:DAS, author = "Philip P. Scarlato", title = "Developing {Ada} software without target hardware", journal = j-SIGSOFT, volume = "16", number = "1", pages = "36--40", month = jan, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/126496.126497", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An analysis of several of the Ada software projects recently completed at the E-Systems ECI Division reveals that although the software is very target specific, a large portion of this software could be developed independent of the target hardware. Only a very small portion of this software could not be developed in some way without the physical target hardware. However, it seems that the projects that experienced the most difficulty in completing the software task had a large portion of the software that was target test dependent. To visualize this software development difficulty, the target test dependent portion of software can be thought of as the small portion of an iceberg's mass that is visible above the water line as illustrated in figure 1 --- the greater the mass above the water line, the greater the overall mass of the iceberg, the longer the melt down, and the greater the threat to navigation. Therefore, to reduce the overall navigation threat to project completion, this target test dependent software should be limited in a manner that allows the bulk of the iceberg to be verified and fine tuned independent of the target hardware. This paper discusses software development tactics used to reduce the overall risk in developing software for a project in which hardware and software were developed in parallel and access to the target hardware was limited or unavailable until after the majority of the software was developed. These tactics are useful in partitioning the software into a manageable form, can help prevent the creation of duplicate software development, and can allow Computer Software Component (CSC) integration and test of the majority of the software in the host environment before the target hardware becomes available.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rine:1991:PSS, author = "David C. Rine", title = "A proposed standard set of principles for object-oriented development", journal = j-SIGSOFT, volume = "16", number = "1", pages = "43--49", month = jan, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/126496.126498", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Maciaszek:1991:ACR, author = "Leszek A. Maciaszek", title = "{AD}\slash Cycle repository manager from object-oriented perspective", journal = j-SIGSOFT, volume = "16", number = "1", pages = "50--53", month = jan, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/126496.126499", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The advantage of an object-oriented approach to development is that it offers the analyst, designer and programmer a higher level of abstraction in which to work. AD/Cycle uses object orientation in two contexts: (1) it encourages an object-oriented approach to software production based on AD/Cycle, and (2) it presents itself as an object-oriented database development platform. The former is a methodological issue, the latter --- an environmental issue. The methodological issue is only sketched in AD/Cycle documents, and as such is addressed only briefly in this paper. The main thread of the paper is on the evaluation of the environmental aspect of AD/Cycle. This implies that the paper concentrates on the Repository Manager of AD/Cycle. In particular, the paper examines the conceptual specification view and also the logical specification view combined with run-time services. The conclusions of this paper are only as sound as the object orientation paradigm itself. The paper places special emphasis on this issue. It is believed that object orientation solves the application a nd data management problems faced by CASE developers and users, but hard proof has yet to be provided. The same applies to the claims of productivity improvements in most but particularly susceptible application development activities (such as window management).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ducasse:1991:ODEa, author = "Mireille Ducass{\'e} and Anna-Maria Emde", title = "{OPIUM}: a debugging environment for {Prolog} development and debugging research", journal = j-SIGSOFT, volume = "16", number = "1", pages = "54--59", month = jan, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/126496.126500", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Opium is an extensible debugging environment for PROLOG providing high-level debugging facilities for programmers and debugging experts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kamat:1991:CR, author = "Vikas K. Kamat", title = "Code reader", journal = j-SIGSOFT, volume = "16", number = "1", pages = "60--61", month = jan, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/126496.126501", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Source code reading as an element of Software Engineering has long been ignored. Presented here is a pseudo-design of a Code reader (CREAD) for 'C' like language.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kirner:1991:RTS, author = "Tereza G. Kirner", title = "Real-time systems specification: a process and a tool", journal = j-SIGSOFT, volume = "16", number = "1", pages = "62--67", month = jan, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/126496.126502", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bukovsky:1991:PAS, author = "Nikolay S. Bukovsky", title = "A practical approach to software quality assurance", journal = j-SIGSOFT, volume = "16", number = "1", pages = "68--72", month = jan, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/126496.126503", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software quality assurance (SQA) has been recognized as an effective approach to quality problems. This paper reflects INTERPROGRAMA Institute's experience in developing and implementing a SQA program. Topics to be discussed will include: Phased approach to SQA implementation; Management and organization of SQA; Quality measurement; Quality control procedures; Quality measurement tools; Developers' participation in SQA; Anomaly reporting; Quality planning; Defects analysis; INTERPROGRAMA's practical experience and results.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lai:1991:ATT, author = "Robert Chi Tau Lai", title = "{Ada} task taxonomy support for concurrent programming", journal = j-SIGSOFT, volume = "16", number = "1", pages = "73--91", month = jan, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/126496.126504", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Ada task taxonomy can be used as the main scheme to help programmers to develop concurrent programs. The conventional way of defining a taxonomy for software modules is not based on the interactive behavior of the modules. The behavior of Ada tasks is more dynamic than that of other Ada modules such as procedures, functions and packages. By classifying sets of tasks by their interactive characteristics, functions, and procedural behaviors, a task taxonomy can be formulated. Task taxonomy can be used as an abstraction for software developers to design, store, and retrieve concurrent systems and reusable parts. A set of tools based on characteristics formally representing kinds of tasks can be designed. This set of tools will help programmers define their own task taxonomies for designing, constructing, and maintaining concurrent systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1991:RPCa, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "16", number = "2", pages = "4--18", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122539", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{DeTreville:1991:CT, author = "John DeTreville", title = "A cautionary tale", journal = j-SIGSOFT, volume = "16", number = "2", pages = "19--22", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122540", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lyu:1991:PRD, author = "Michael Lyu", title = "{PANEL}: research and development issues in software reliability engineering", journal = j-SIGSOFT, volume = "16", number = "2", pages = "23--30", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122541", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kilov:1991:CCE, author = "Haim Kilov", title = "Conventional and convenient in entity-relationship modeling", journal = j-SIGSOFT, volume = "16", number = "2", pages = "31--32", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122542", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Waters:1991:TDA, author = "Richard C. Waters and Yang Meng Tan", title = "Toward a design apprentice: supporting reuse and evolution in software design", journal = j-SIGSOFT, volume = "16", number = "2", pages = "33--34", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122543", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Peterson:1991:CTS, author = "A. Spencer Peterson", title = "Coming to terms with software reuse terminology: a model-based approach", journal = j-SIGSOFT, volume = "16", number = "2", pages = "45--51", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122544", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This article attempts to standardize the use of many terms used in the software reuse literature. Three terms of particular interest --- taxonomy, software reuse, and domain analysis --- and some problems with their usage are discussed. The specific problems with these terms are generalized and several solutions are given, the most important being the introduction of the concept of using reuse process models to provide both context and an overall view of the potential areas of discourse in reuse. Several new terms are proposed for future use; definitions of existing terms that are meaningful in the context of software reuse are also included.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cherry:1991:SCOa, author = "George W. Cherry", title = "Software construction by object-oriented pictures: stimulus-response machines", journal = j-SIGSOFT, volume = "16", number = "2", pages = "52--56", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122545", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Beckman:1991:DHT, author = "Brian Beckman", title = "Debugging for hypercubes in time warp", journal = j-SIGSOFT, volume = "16", number = "2", pages = "57", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122546", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Marsh:1991:VPM, author = "Shaun Marsh", title = "The V project manager tools", journal = j-SIGSOFT, volume = "16", number = "2", pages = "58--61", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122548", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper proposes a simple set of tools for managing the concurrent development of a given project by many developers. These tools may be added to most programming environments while not hiding the files from other tools which the developer may wish to use.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sprague:1991:RSC, author = "Kristopher G. Sprague", title = "The role of software configuration management in a measurement-based software engineering program", journal = j-SIGSOFT, volume = "16", number = "2", pages = "62--66", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122547", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The role of Software Configuration Management has rapidly expanded and grown in importance over the last few years for a number of reasons. This paper presents an overview of the significant changes that are occurring in the Software Configuration Management discipline with respect to its role in a measurement-based software engineering program. It identifies the changes, provides an overview of the SCM functions, proposes a process, and discusses directions for future research and development.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ducasse:1991:ODEb, author = "Mireille Ducass{\'e} and Anna-Maria Emde", title = "{OPIUM}: a debugging environment for {Prolog} development and debugging research", journal = j-SIGSOFT, volume = "16", number = "2", pages = "67--72", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122549", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Opium is an extensible debugging environment for PROLOG providing high-level debugging facilities for programmers and debugging experts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Morell:1991:IDS, author = "Larry J. Morell and Jeffrey Voas", title = "On the inadequacies of data state space sampling as a measure of the trustworthiness of programs", journal = j-SIGSOFT, volume = "16", number = "2", pages = "73--74", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122550", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Omar:1991:SSF, author = "A. A. Omar and F. A. Mohammed", title = "A survey of software functional testing methods", journal = j-SIGSOFT, volume = "16", number = "2", pages = "75--82", month = apr, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122538.122551", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Functional testing is used to find disagreement between the specifications and the actual implementation of the software systems. The method of representing the specification can help to detect inconsistency and incompleteness in it. The various specification representation schemes are outlined in the paper. The basic technique of functional testing of software systems is the black box technique. This technique generates the test data using the information contained in the program's specification, independent of the implemented program's code. Black box testing cannot discover errors contained in the functions which are not mentioned explicitly in the specification. Therefore, a program dependent testing is necessary to discover this type of errors. The paper surveys the different methods of generating test data for both techniques; the black box and the program dependent techniques.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1991:RPCb, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "16", number = "3", pages = "3--28", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127100", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Knight:1991:PIT, author = "John C. Knight and E. Ann Myers", title = "{Phased} inspections and their implementation", journal = j-SIGSOFT, volume = "16", number = "3", pages = "29--35", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127101", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1991:CMM, author = "Will Tracz", title = "A conceptual model for megaprogramming", journal = j-SIGSOFT, volume = "16", number = "3", pages = "36--45", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127102", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "`` Currently, software is put together one statement at a time. What we need is to put software together one component at a time.'' --- Barry Boehm, at the Domain Specific Software Architecture (DSSA) Workshop, July 11--12, 1990. Megaprogramming, as defined at the first ISTO Software Technology Community Meeting, June 27-29, 1990, by Barry Boehm, director of DARPA/ISTO, is component-based software engineering and life-cycle management. The goal of this paper is to place megaprogramming in perspective with research in other areas of software engineering (i.e., formal methods and rapid prototyping) and to describe the author's experience developing a system to support megaprogramming. The paper, first, analyzes megaprogramming and its relationship to other DARPA research initiatives (CPS/CPL --- Common Prototyping System/Common Prototyping Language, DSSA --- Domain Specific Software Architectures, and SWU --- Software Understanding). Next, the desirable attributes of megaprogramming software components are identified and a software development model (The 3C Model) and resulting prototype megaprogramming system (LILEANNA --- Library Interconnection Language Extended by Annotated Ada) are described.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dolado:1991:SDG, author = "Jos{\'e} Javier Dolado", title = "Structured development of graph-grammars for icon manipulation", journal = j-SIGSOFT, volume = "16", number = "3", pages = "46--51", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127103", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this work we are showing a structured process to build a grammar for icon manipulation. We presuppose that the object to be manipulated in the computer screen can be stated as a set of relations among its parts. We describe a procedure to generate a program that manipulates the object, guaranteeing that only objects with those properties will be constructed, and that every instance of that object is allowable. The formation rules for the object are stored in terms of attributed graph-grammars productions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cherry:1991:RMV, author = "George W. Cherry", title = "{S-R} machines: a visual formalism for reactive and interactive systems", journal = j-SIGSOFT, volume = "16", number = "3", pages = "52--55", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127105", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wybolt:1991:PCT, author = "Nicholas Wybolt", title = "Perspectives on {CASE} tool integration", journal = j-SIGSOFT, volume = "16", number = "3", pages = "56--60", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127106", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "CASE tool integration means making the whole tool environment greater than the sum of its constituent parts (tools). An integrated CASE environment, in turn, is built on an integration framework. This paper presents a series of perspectives on CASE tool integration and frameworks.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Prieto-Diaz:1991:MSR, author = "Rub{\'e}n Prieto-D{\'\i}az", title = "Making software reuse work: an implementation model", journal = j-SIGSOFT, volume = "16", number = "3", pages = "61--68", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127107", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Despite software reuse's promise to significantly improve software quality and productivity, its practice remains elusive. The difficult issues outside the technical realm are seldom addressed. To be practical, reuse must address not only technical but managerial, economic, performance, cultural, and technology transfer issues. A model for implementing software reuse programs is discussed and supported by successful experiences. This model is based on an incremental strategy and addresses the above issues, directly and indirectly. The approach is practical, effective, and has potential to make reuse a regular practice in the software development process. Portions of the model have been used successfully in consulting with SPC member companies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Yu:1991:VTR, author = "Don Yu", title = "A view on three {R}'s ({3Rs}): reuse, re-engineering, and reverse-engineering", journal = j-SIGSOFT, volume = "16", number = "3", pages = "69", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127109", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Buckley:1991:PAS, author = "Fletcher J. Buckley", title = "Perestroika, anyone? {A} standard for democracy in professional organizations", journal = j-SIGSOFT, volume = "16", number = "3", pages = "70--72", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127111", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The IEEE Computer Society has been recently taken to task for being an ``old boys'' club. Response to these kind of attacks can sometimes be to raise the drawbridge, drop the portcullis and man the battlements. Sometimes, however, it is more productive to sift through the muck and the mire, take a look at the facts and see if a real problem exists. In this particular case, as Al Smith used to say, let's take a look at the record.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{MacAuslan:1991:CDH, author = "Joel MacAuslan", title = "Comments on debugging hypercubes in a {von Neumann} language", journal = j-SIGSOFT, volume = "16", number = "3", pages = "73", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127113", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Foster:1991:AST, author = "Kenneth A. Foster", title = "Arithmetic statement testing", journal = j-SIGSOFT, volume = "16", number = "3", pages = "74--77", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127115", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tripp:1991:RFS, author = "Leonard L. Tripp", title = "Report on future software engineering standards direction", journal = j-SIGSOFT, volume = "16", number = "3", pages = "77", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127117", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Musa:1991:PAR, author = "John D. Musa", title = "Performance analysis rat holes to avoid or how to stall a performance presentation", journal = j-SIGSOFT, volume = "16", number = "3", pages = "78", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127119", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Musa:1991:RFE, author = "John D. Musa", title = "Rationale for fault exposure ratio {$K$}", journal = j-SIGSOFT, volume = "16", number = "3", pages = "79", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127121", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Musa:1991:ETN, author = "John D. Musa and A. Iannino", title = "Estimating the total number of software failures using an exponential model", journal = j-SIGSOFT, volume = "16", number = "3", pages = "80--84", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127123", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Different approaches to estimating the total number of failures parameter for the Jelinski-Moranda model are considered. The maximum likelihood estimator, a harmonic jackknife maximum likelihood estimator, and a simple Bayesian estimator are studied. None of these is found to be entirely satisfactory, each suffering from either infinite estimates and/or severe bias in small to moderate samples. The purpose of this paper is to summarize this work, in order to stimulate a search for better estimators.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Saradhi:1991:SDP, author = "Motamarri Saradhi", title = "Systems deployment planning and scheduling", journal = j-SIGSOFT, volume = "16", number = "3", pages = "85--87", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127124", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In any large scale Systems Development activity, it is unlikely that the whole application system is ready at a time for deployment/launching to live action. In case of turnkey projects the situation is much more critical. Added to this there can be situations in which, the implementation of design and deployment of application system may have to go in tandem. As the Systems Development Life Cycle does not include these, the Project Management within that constrained framework may likely face enormous setbacks. I have realised these issues in the process of a turnkey computerisation project for a large Thrift and Credit Co-Operative Society application. The paper aims at elaborating the role of Systems Deployment Planning and Scheduling for successful Systems Development and Deployment in such situations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lindquist:1991:OVT, author = "Timothy E. Lindquist and Kurt M. Gutzmann and David L. Remkes and Gary McKee", title = "Optimization of validation test suite coverage", journal = j-SIGSOFT, volume = "16", number = "3", pages = "87--92", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127126", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Test coverage is an important aspect of a validation suite for implementations of a standard such as the CAIS. This paper presents the development and application of a constrained optimization process for CAIS test coverage. Subjective criteria and goals combined with objective measures of test coverage derived from information models yield a quasi-quantitative figure of merit for test objectives. The approach next identifies resource (time and effort) and process constraints. A greedy algorithm provides a partial solution to the coverage design problem. The decreasing first fit bin packing heuristic then refines the coverage measure of the validation test suite within the process constraints. Finally, the paper presents the results of the application test selection and optimization process to the design of the CIVC-A test suite.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Smith:1991:QAT, author = "Richard E. Smith", title = "Quality assurance through direct implementation of analysis and design constructs", journal = j-SIGSOFT, volume = "16", number = "3", pages = "93--94", month = jul, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/127099.127128", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A measurably good design does not guarantee a correspondingly good implementation. When an implementer translates a software design into the implementation language. We weaken the correspondence between the measured capabilities of the design and the implementation. This can lead to a failure to achieve goals that the design originally assured. We can avoid such failures if we transform the exad models and structures from the analysis and design phase into software components of the implementation. This paper presents a practitioners efforts to integrate realtime software implementation with the abstractions used in system analysis and design. Our approach as been to adapt existing paradigms and took to achieve this effect. We have applied this to three real time software projects using techniques such as object oriented analysis and data low design.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Boundy:1991:TP, author = "David Boundy", title = "A taxonomy of programmers", journal = j-SIGSOFT, volume = "16", number = "4", pages = "23--30", month = oct, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122552.122553", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:39 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{vonMayrhauser:1991:TED, author = "Anneliese von Mayrhauser", title = "Testing and evolutionary development", journal = j-SIGSOFT, volume = "16", number = "4", pages = "31--36", month = oct, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122552.122554", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:39 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Shimomura:1991:ARM, author = "Takao Shimomura", title = "Automatic resumption mechanism for program debugging", journal = j-SIGSOFT, volume = "16", number = "4", pages = "37--41", month = oct, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122552.122555", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:39 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In program debugging, tracing control instructions that examine internal program states can be saved in a file and this file can be used to initialize the debugging environment when a program is loaded by a debugger. When a source program is modified because of bugs, however, source line numbers are also changed. It is therefore necessary to update the source line numbers in a tracing control instruction file according to the modifications in the source program. This paper proposes a solution by means of an automatic resumption mechanism that simplifies the debugging procedure from source modification to the beginning of the next debugging. While a programmer is creating an executable program using make after he has modified the program, the tracing control instruction file is updated automatically, so the programmer does not even have to think of updating them. This mechanism makes it very easy to resume debugging with the same debugging environment after program modification.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cherry:1991:SCOb, author = "George W. Cherry", title = "System construction with object-oriented pictures", journal = j-SIGSOFT, volume = "16", number = "4", pages = "42--52", month = oct, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122552.122556", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:39 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes the process guide, behavior model, icons, and diagrams of SCOOP-3, a pictorial method for developing reactive systems. SCOOP-3's semantics are Concurrent C++ or Ada: its icons and diagrams are mechanically translatable to these languages. SCOOP-3's process guide supports reuse, prototyping, and concurrent specification and design. Its behavior model (S-R Machines) integrates the notions of finite and infinite automata, data abstractions, and objects. My earlier notes in SEN demonstrated the Finite State Automata power of S-R Machines. This note demonstrates their far greater power and expressiveness. SCOOP-3's black box, machine, and clear box diagrams have the same objective (and names!) as Mills' Box-Structured approach: stepwise provable specifications and designs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{McLaughlin:1991:SNP, author = "Robert McLaughlin", title = "Some notes on program design", journal = j-SIGSOFT, volume = "16", number = "4", pages = "53--54", month = oct, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122552.122557", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:39 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Program design is an important part of the design process. The propose of this paper is to give some guidelines to the design process. It is not possible to write down a set of rules that will deal with all design problems. However it is possible to make program design a respected science within the computer sciences.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hughes:1991:MSE, author = "David K. Hughes", title = "Multilingual software engineering using {Ada} and {C}", journal = j-SIGSOFT, volume = "16", number = "4", pages = "55--59", month = oct, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122552.122558", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:39 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The technique necessary to interface one software language with another is not clearly defined. The significant increase in the size and complexity of embedded systems and the time and cost constraints imposed by both government and the market place require that software engineers develop a better understanding of the problems of multilingual software implementation. This paper focuses on the technique necessary to successfully interface the Ada* language with the C language in homogeneous or embedded computer systems. These two languages should dominate the software development arena for at least the next decade: Ada, because it is mandated by Federal law to be used in all Department of Defense contracts which require software, and C because it is the implementation language of choice for the vast majority of commercial off-the-shelf software systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rine:1991:SOH, author = "David C. Rine", title = "A short overview of a history of software maintenance: as it pertains to reuse", journal = j-SIGSOFT, volume = "16", number = "4", pages = "60--63", month = oct, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122552.122559", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:39 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kokol:1991:SSM, author = "Peter Kokol and Bruno Stiglic and Viljem Zumer", title = "Soft system methodology and is research: development of a new is design paradigm evaluation approach", journal = j-SIGSOFT, volume = "16", number = "4", pages = "64--66", month = oct, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/122552.122560", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:39 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A sound and complete evaluation is a necessity in efficient and effective information system design. In the present paper we show how the Checklands Soft System Methodology can be used in the development of a new evaluation process, in the manner to overcome some of the greatest weaknesses of conventional ones.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rushby:1991:FVA, author = "John Rushby and Friedrich von Henke", title = "Formal verification of algorithms for critical systems", journal = j-SIGSOFT, volume = "16", number = "5", pages = "1--15", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123044", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Atlee:1991:SBM, author = "Joanne Atlee and John Gannon", title = "State-based model checking of event-driven system requirements", journal = j-SIGSOFT, volume = "16", number = "5", pages = "16--28", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123047", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dandanell:1991:RDU, author = "Bent Dandanell", title = "Rigorous development using {RAISE}", journal = j-SIGSOFT, volume = "16", number = "5", pages = "29--43", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123049", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hansen:1991:SVR, author = "Kirsten M. Hansen and Anders P. Ravn and Hans Rischel", title = "Specifying and verifying requirements of real-time systems", journal = j-SIGSOFT, volume = "16", number = "5", pages = "44--54", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123051", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sogaard-Anderson:1991:SKD, author = "J{\o}rgen F. S{\o}gaard-Anderson and Camilla {\O}sterberg Rump and Hans Henrik L{\o}vengreen", title = "A systematic kernel development", journal = j-SIGSOFT, volume = "16", number = "5", pages = "55--65", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123053", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Butler:1991:IEQ, author = "Ricky W. Butler and George B. Finelli", title = "The infeasibility of experimental quantification of life-critical software reliability", journal = j-SIGSOFT, volume = "16", number = "5", pages = "66--76", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123054", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Frankl:1991:AFD, author = "Phyllis G. Frankl and Elaine J. Weyuker", title = "Assessing the fault-detecting ability of testing methods", journal = j-SIGSOFT, volume = "16", number = "5", pages = "77--91", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123056", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Issarny:1991:EHM, author = "Val{\'e}rie Issarny", title = "An exception handling model for parallel programming and its verification", journal = j-SIGSOFT, volume = "16", number = "5", pages = "92--100", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123058", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cameron:1991:RTT, author = "E. Jane Cameron and Yow-Jian Lin", title = "A real-time transition model for analyzing behavioral compatibility of telecommunications services", journal = j-SIGSOFT, volume = "16", number = "5", pages = "101--111", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123059", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ratel:1991:PVC, author = "Christophe Ratel and Nicolas Halbwachs and Pascal Raymond", title = "Programming and verifying critical systems by means of the synchronous data-flow language {LUSTRE}", journal = j-SIGSOFT, volume = "16", number = "5", pages = "112--119", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123062", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kurki-Suonio:1991:SDR, author = "Reino Kurki-Suonio", title = "Stepwise design of real-time systems", journal = j-SIGSOFT, volume = "16", number = "5", pages = "120--131", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123063", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Xu:1991:STC, author = "Jia Xu and David Lorge Parnas", title = "On satisfying timing constraints in hard-real-time systems", journal = j-SIGSOFT, volume = "16", number = "5", pages = "132--146", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123066", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wang:1991:AAB, author = "Chih-Kan Wang and Duu-Chung Tsou and Rwo-Hsi Wang and James C. Browne and Aloysius K. Mok", title = "Automated analysis of bounded response time for two {NASA} expert systems", journal = j-SIGSOFT, volume = "16", number = "5", pages = "147--161", month = dec, year = "1991", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/123041.123067", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1992:IRP, author = "Peter G. Neumann", title = "Illustrative risks to the public in the use of computer systems and related technology", journal = j-SIGSOFT, volume = "17", number = "1", pages = "23--32", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134293", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Griswold:1992:CAV, author = "William G. Griswold and David Notkin", title = "Computer-aided vs. manual program restructuring", journal = j-SIGSOFT, volume = "17", number = "1", pages = "33--41", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134294", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Restructuring a software system as it evolves promises to reduce associated maintenance costs. To simplify restructuring, we have developed a tool that preserves the meaning of a program as the engineer applies structural transformations. To help evaluate the prototype tool and its underlying approach, we ran an experiment to compare how people using standard editing tools restructure a program against the computer-aided style that our tool supports. We drew three conclusions from the experiment. First, the subjects generally used a mix of copy/paste and cut/paste editing paradigms; our tool gives the engineer the safety of copy/paste and the speed of cut/paste. Second, most of the subjects made mistakes, including simple syntactic errors and semantic errors (such as not updating the call site after modifying a function definition); our tool avoids errors by the engineer using compensation (for instance, it automatically updates call sites when a procedure definition is changed) or by signalling an error. Third, manual restructuring tends to be haphazard, with engineers handling the order of changes, testing, etc. in inconsistent and potentially error-prone ways; by separating restructuring from functional maintenance and by ensuring preservation of meaning during restructuring, our approach can make the maintenance process more orderly.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{vanReeken:1992:SNP, author = "A. J. van Reeken", title = "Some notes on program design", journal = j-SIGSOFT, volume = "17", number = "1", pages = "42", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134295", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", note = "See reply \cite{McLaughlin:1992:SNS}.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Matthews:1992:WWB, author = "Peter J. D. Matthews", title = "When to white box test", journal = j-SIGSOFT, volume = "17", number = "1", pages = "43", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134296", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finkelsteiin:1992:RE, author = "Anthony Finkelsteiin", title = "Requirements engineering", journal = j-SIGSOFT, volume = "17", number = "1", pages = "45--47", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134297", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leveson:1992:FM, author = "Nancy Leveson", title = "Formal methods", journal = j-SIGSOFT, volume = "17", number = "1", pages = "49--50", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134298", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Schaefer:1992:DMS, author = "Wilhelm Schaefer", title = "Design methods and software processes", journal = j-SIGSOFT, volume = "17", number = "1", pages = "50--51", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134302", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jian:1992:MAF, author = "Lu Jian", title = "A method of acquiring formal specifications from examples", journal = j-SIGSOFT, volume = "17", number = "1", pages = "52--56", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134299", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The acquisition of the formal specification is very important in software development automation. This paper presents a method which combines the concept formation and the antecedent derivation mechanism to accomplish the automatic acquisition of the formal specification from the example specification and the plausibility of the generated formal specification is guaranteed in some sense.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rine:1992:ECT, author = "David Rine", title = "{EIFFEL}: a case tool supporting object-oriented software construction", journal = j-SIGSOFT, volume = "17", number = "1", pages = "57", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134300", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tripp:1992:WFS, author = "Leonard L. Tripp", title = "What is the future of software engineering standards?: discussion paper", journal = j-SIGSOFT, volume = "17", number = "1", pages = "58--61", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134301", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Henderson-Sellers:1992:CCO, author = "B. Henderson-Sellers and C. Freeman", title = "Cataloguing and classification for object libraries", journal = j-SIGSOFT, volume = "17", number = "1", pages = "62--64", month = jan, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/134292.134303", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Reusable object classes are seen as a major benefit of adopting the object-oriented paradigm in the commercial data processing and applications programming worlds. However, without some efficient and effective method of locating previously written classes, this benefit of reuse will be lost. Code location requires the classes to be stored in some retrievable fashion. Such an underlying classification system, together with an associated cataloguing system, appropriate for object libraries, is proposed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wiener:1992:TRS, author = "Lauren Wiener", title = "A trip report on {SIGSOFT} '91", journal = j-SIGSOFT, volume = "17", number = "2", pages = "23--38", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130841", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Scott:1992:CSE, author = "Gregory J. Scott", title = "Can software engineering afford to improve the process?", journal = j-SIGSOFT, volume = "17", number = "2", pages = "39--42", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130842", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The purpose of this paper is to raise questions and generate discussion within the software engineering community about the potential impact of software engineering process improvements. This paper begins by providing a few facts about software engineering economics and process improvement benefits followed by three views of those facts: the traditional cost savings perspective; a software engineer's perspective; and a government contractor's perspective. In the last two perspectives, the questions of what is in this for me and is it in my best interests to support process improvement are asked. The conclusion of this paper is that apparently significant changes must be made in the business culture before process improvements can hope to occur.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Connors:1992:SDM, author = "Danny T. Connors", title = "Software development methodologies and traditional and modern information systems", journal = j-SIGSOFT, volume = "17", number = "2", pages = "43--49", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130843", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Considerable discussion exists about the proper methodology for developing software. Some individuals favor a strict step-by-step approach, while others favor rapid prototyping. The extra dimensions of newer information systems such as Decision Support Systems and Expert Systems add to the confusion. Many individuals believe that new systems need new methodologies. This paper surveys the literature to determine current philosophies concerning traditional and modern information systems. Then, a typology which integrates the philosophies into a model useful for selecting an appropriate methodology for the information system task at hand is proposed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Schaschinger:1992:EES, author = "Harald Schaschinger", title = "{ESA --- an} expert supported {OOA} method and tool", journal = j-SIGSOFT, volume = "17", number = "2", pages = "50--56", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130845", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Although this paper deals with object-oriented software development in general, the focus is definitely set on object-oriented analysis (OOA). After a short comparison of the most important OOA approaches, a new one will be derived. This approach is evolutionary, non-domain specific and starts at the definition of a software system. Based on this approach there will be a presentation of an expert supported OOA tool (ESA), which supports an analyst starting at the collection of the requirements through the analysis of an object-oriented system up to a preliminary high-level design. Both the method and the tool are conceived for the needs of practitioners.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Saradhi:1992:SMD, author = "Motamarri Saradhi", title = "Systems modelling and description", journal = j-SIGSOFT, volume = "17", number = "2", pages = "57--63", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130846", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The purpose of this paper is to enunciate the underlying notions of systems modelling. There is an obvious lack with many techniques to allow the description of the real world as native to its functioning as possible. A generic analytical framework is likely to have a strong impact in problem solving, whatever may be the domain. Further, it may ease the process of communication among various people by virtue of proper capturing of the system functionality in a more understandable framework. The exploration for such a framework will also rationalize the development process of computerized systems, whether they are going to employ conventional software or AI/ES techniques. The criticality of the computerized systems has been raising potential problems with respect to safety and security. Validation and verification of the systems have become a potential challenge. The current discussion will shed light on these issues, and guide in ensuring a robust application system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cherry:1992:GFS, author = "George W. Cherry", title = "Graphic formalisms should integrate communication, control, and data flow", journal = j-SIGSOFT, volume = "17", number = "2", pages = "64--69", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130847", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{McLaughlin:1992:SNS, author = "Robert McLaughlin", title = "Some notes on software design: reply to a reaction", journal = j-SIGSOFT, volume = "17", number = "2", pages = "70", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130848", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", note = "See \cite{vanReeken:1992:SNP}.", abstract = "Mr. van Reeken wrote a note on my note. It is nice to know that some reads what you write. I think his comments force me to be a little more specific. I agree with some of what he says, but must mark my disagreement with other things he says.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ben-Natan:1992:MAT, author = "Ron Ben-Natan", title = "Making all types typedefed", journal = j-SIGSOFT, volume = "17", number = "2", pages = "72--73", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130849", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Encapsulation has been recognized as one of the most important methods for assuring that software systems maintenance is made possible. Many modern programming languages now provide specific constructs for encapsulation and abstraction. This note emphasizes the fact that the return types of an encapsulation's interface is a part of the interface functions themselves, and as such must also be encapsulated. The examples are given in C++ and encapsulating of the types is done using typedefs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Linos:1992:TRC, author = "Panagiotis Linos", title = "{ToolCASE}: a repository of computer-aided software engineering tools", journal = j-SIGSOFT, volume = "17", number = "2", pages = "74--78", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130850", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The design and construction of an up-to-date repository of CASE (Computer-Aided Software Engineering) tools, called ToolCASE, is introduced in this paper. ToolCASE is populated with information regarding purchasing, citations and software engineering capabilities of existing CASE tools. Purchasing information, included in ToolCASE, embodies vendors, costs, discounts, hardware and software requirements; the citations encompass various publications on CASE, whereas software engineering capabilities comprise phases of the paradigm automated, software application area targeted and methodologies supported by CASE tools. ToolCASE is designed for people with diverse backgrounds who wish to choose the proper CASE tool for their specific needs. For instance, a project manager can retrieve the name and phone number of the company that develops a particular CASE tool, its price and the first year it was available. A software engineer may request all CASE tools that automate a particular phase of a software engineering paradigm, aim at the development of software for a specific application area or follow a certain methodology. In addition, a researcher could acquire citations on existing CASE tools that meet specific requirements.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hagemeister:1992:ABS, author = "J. Hagemeister and B. Lowther and P. Oman and X. Yu and W. Zhu", title = "An annotated bibliography on software maintenance", journal = j-SIGSOFT, volume = "17", number = "2", pages = "79--84", month = apr, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/130840.130852", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Saradhi:1992:SEP, author = "Motamarri Saradhi", title = "Software engineering from a practical perspective", journal = j-SIGSOFT, volume = "17", number = "3", pages = "21--26", month = jul, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/140938.140939", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The development of software is a marathon feat. Software Quality Assurance is a much more difficult and challenging task. Further, putting the software for live use, is a still more complex affair. These matters are not trivial for successful and appropriate exploitation of computers and Information Technology, rather they are the central issues one must answer first. Motivated by the ongoing discussions on a plenty of issues related to software, (software technology!) including standards and quality assurance, I am translating my experiences as the mentioned issues are duly represented in my systems development projects. Perhaps, this is an attempt to bring to light the prominent but less addressed points, especially that are lying at the interface of the several disciplines related to software creation. I present a generic structure of Systems Development Process (SDP) from a practical view point. The presentation will outline the framework of SDP, and the environment in which it takes place to illustrate the line of thinking that has influenced the creation of successful application systems developed in several domains.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1992:DAW, author = "Will Tracz", title = "Domain analysis working group report: {First International Workshop on Software Reusability}", journal = j-SIGSOFT, volume = "17", number = "3", pages = "27--34", month = jul, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/140938.140940", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Loka:1992:SEQ, author = "Raghavendra Rao Loka", title = "Software engineering: quality assurance", journal = j-SIGSOFT, volume = "17", number = "3", pages = "34--38", month = jul, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/140938.140941", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ward:1992:NGC, author = "Aidan Ward", title = "The next generation of computer assistance for software engineering", journal = j-SIGSOFT, volume = "17", number = "3", pages = "39--42", month = jul, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/140938.140942", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rozman:1992:USE, author = "I. Rozman and J. Gy{\"o}rk{\"o}s and K. Rizma{\~n}", title = "Understandability of the software engineering method as an important factor for selecting a case tool", journal = j-SIGSOFT, volume = "17", number = "3", pages = "43--46", month = jul, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/140938.140943", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The article highlights the understandability of a software engineering methodology as an important criterion for selecting a CASE tool. This aspect is treated through the comparison of learning properties for two very well known methodology on which the CASE tools are usually based on. The first one is SA-SD and the second one is JSD. In the purpose to compare both methodology a group of young engineers has been tested. Each of them wrote a seminar theme, answered a questionnaire and explained his observations. At the end of the paper, a general conclusion is presented.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brown:1992:ABI, author = "Alan W. Brown and Maria H. Penedo", title = "An annotated bibliography on integration in software engineering environments", journal = j-SIGSOFT, volume = "17", number = "3", pages = "47--55", month = jul, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/140938.140944", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:42 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mody:1992:PA, author = "R. P. Mody", title = "Is programming an art?", journal = j-SIGSOFT, volume = "17", number = "4", pages = "19--21", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141877", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finkelsteiin:1992:SPI, author = "Anthony Finkelsteiin", title = "A software process immaturity model", journal = j-SIGSOFT, volume = "17", number = "4", pages = "22--23", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141878", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chelini:1992:DAR, author = "James V. Chelini", title = "A discussion on the {Ada Run-Time Environment} in safety critical applications", journal = j-SIGSOFT, volume = "17", number = "4", pages = "24--27", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141879", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The complex systems being built today are increasingly software driven. These systems, such as air traffic control systems, nuclear power plants, avionics software, and even automotive control software, are integral parts of our world. We take these systems for granted everyday and trust them to work safely, without injury to us. The Ada language is being used in a growing number of these systems. This requires a reevaluation of how the language can be effectively used in safety-critical systems. A key element of this evaluation is the Ada Run-Time Environment (RTE) itself. Ada is unique in that it provides its own real-time executive. This paper examines the impact of the Ada RTE on safety critical software and discusses steps to identify and reduce potential risks.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Walters:1992:UHS, author = "Neal Walters", title = "Using Harel statecharts to model object-oriented behavior", journal = j-SIGSOFT, volume = "17", number = "4", pages = "28--31", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141880", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Object-oriented analysis and design methods are increasingly being considered for complex system development. However, object-oriented implementations can introduce run-time inefficiencies. Therefore, predicting system behavior is an important simulation objective for validating completeness and analyzing performance. There are two contributors to system behavior --- the individual behavior of each object and the collaborative behavior of object when executing scenarios required by the system. Modeling the collaborative interaction of objects is the primary subject of this paper. Templates for three types of objects are presented: Director, Agent and Server object classes. The mechanisms presented in this paper utilize Harel state diagram notation as supported by the Statemate CASE tool.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Laitinen:1992:DCS, author = "Kari Laitinen", title = "Document classification for software quality systems", journal = j-SIGSOFT, volume = "17", number = "4", pages = "32--39", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141882", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software development organizations need to have appropriate document control policies. A software document classification can serve as a framework for establishing such policies. This paper presents a software document classification and discusses the quality system functions needed for each class of documents. Software development is viewed as a documentation process, and documents are considered the most essential products of the development process. Referring to the document classification, new definitions for the concept of software are given, and the general difficulties of software documentation are analyzed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Perry:1992:FSS, author = "Dewayne E. Perry and Alexander L. Wolf", title = "Foundations for the study of software architecture", journal = j-SIGSOFT, volume = "17", number = "4", pages = "40--52", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141884", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The purpose of this paper is to build the foundation for software architecture. We first develop an intuition for software architecture by appealing to several well-established architectural disciplines. On the basis of this intuition, we present a model of software architecture that consists of three components: elements, form, and rationale. Elements are either processing, data, or connecting elements. Form is defined in terms of the properties of, and the relationships among, the elements --- that is, the constraints on the elements. The rationale provides the underlying basis for the architecture in terms of the system constraints, which most often derive from the system requirements. We discuss the components of the model in the context of both architectures and architectural styles and present an extended example to illustrate some important architecture and style considerations. We conclude by presenting some of the benefits of our approach to software architecture, summarizing our contributions, and relating our approach to other current work.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cheng:1992:PSS, author = "Jingwen Cheng", title = "Parameterized specifications for software reuse", journal = j-SIGSOFT, volume = "17", number = "4", pages = "53--59", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141886", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software reusability is believed to be the key to improving software development productivity, while specification plays an important part in software reuse. From a modern object oriented view, the reusable software components can be grouped into three categories. Procedural components, abstract data types and concrete data objects. Both procedural components and abstract data types can be parameterized in many Object-Oriented languages. Specifications for reuse of these components are discussed in detail in this paper. The reusable software components and their specifications will form a reusable software library, and the information extracted from the specifications forms a knowledge base. Based on the knowledge base and the reusable software library, a new software development paradigm with software reusability can be realized.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Debest:1992:RCE, author = "Xavier A. Debest and R{\"u}diger Knoop and J{\"u}rgen Wagner", title = "{Reveng}: a cost-effective approach to reverse-engineering", journal = j-SIGSOFT, volume = "17", number = "4", pages = "60--67", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141887", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Like many other Software Engineering buzzwords, ``Reverse Engineering'' emerges as an attempt to formalize some specific tasks, which have long been performed by almost every software development or maintenance team, but which were not judged worth before to be considered an engineering discipline. The emergence of powerful Computer Aided Software Engineering (CASE) tools opens new opportunities for the cost-effective re-use of the investments made in existing software systems, and thus for the development of specific tools and techniques to recover the original design of these systems. While most of the current discussion is centered around the development and utilization of tools to automate the Reverse Engineering Process, our attention focuses on the practical application of these tools and techniques under conditions found in real world entreprises. From this view-point, the scope of the Reverse Engineering Techniques appears to be much broader than implied by the characteristics of individual tools. Our approach is based on experiences gained by CMG in projects, either directly related to Reverse Engineering or dealing with tasks, where specific Reverse Engineering Techniques and Tools were advantageously used (e.g. Software Maintenance, Re-Design, Down-Sizing, Conversion). It also evidentiates some pitfalls, which may lead to the failure of some Reverse Engineering projects.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Saradhi:1992:DVI, author = "Motamarri Saradhi", title = "A diagnostic view on information technology", journal = j-SIGSOFT, volume = "17", number = "4", pages = "68--70", month = oct, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/141874.141888", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Computers, computerization, Systems Analysis, Systems Design etc., have become the catchwords of the day. In majority of the cases analysis is interpreted in the narrow sense as the study of the existing system in view of computerizing its operations. The thrust for computerization is emphasized without any relevance to the context of application. The real power of the computer, its limitations, and level of applicability are not properly thought of. Computerization at most, is one facet of Information Technology; is surprisingly overlooked. The aim of this article is to drive home the point that a much rational thought and approach are mandatory to get fruitful benefits out of Information Technology.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ferrans:1992:HFH, author = "James C. Ferrans and David W. Hurst and Michael A. Sennett and Burton M. Covnot and Wenguang Ji and Peter Kajka and Wei Ouyang", title = "{HyperWeb}: a framework for hypermedia-based environments", journal = j-SIGSOFT, volume = "17", number = "5", pages = "1--10", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.142899", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software productivity and quality will increase as we improve our model of software and develop tools to support that model. Development environments must take into account that software is more than source; that it is more than text; and that it forms a highly interconnected web of information. Because more time is spent understanding and maintaining software than creating it, environments should strongly support browsing and reading. Finally, environments must be easy to customize. In this paper we present HyperWeb, a framework that supports the construction of hypermedia-based software development environments having this richer view of software. It coordinates the activities of an integrated set of tools through a message server, uses an object-oriented database to store software artifacts, and supports hypermedia linking of these software artifacts. It is built around an interpreter for a general purpose scripting language, allowing for very flexible customization and environment building. We also describe our experience in using it to build an environment that supports software design, development and maintenance on Unix. Its primary features include support for document linking, source code annotation and restructuring, and modification request tracking. It is being used and evaluated internally and at several external sites.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kaplan:1992:SCS, author = "Simon M. Kaplan and William J. Tolone and Alan M. Carroll and Douglas P. Bogia and Celsina Bignoli", title = "Supporting collaborative software development with {ConversationBuilder}", journal = j-SIGSOFT, volume = "17", number = "5", pages = "11--20", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.142903", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we discuss the architecture of the Conversation Builder, an environment for collaborative work, and show how our framework provides a powerful basis for support of collaborative software development activities.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Barghouti:1992:SCM, author = "Naser S. Barghouti", title = "Supporting cooperation in the {Marvel} process-centered {SDE}", journal = j-SIGSOFT, volume = "17", number = "5", pages = "21--31", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.142907", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Large scale software development processes often require cooperation among multiple teams of developers. To support such processes, SDEs must allow developers to interleave their access to the various components of the projects. This interleaving can lead to interference, which may corrupt the project components. In traditional database systems, the problem is avoided by enforcing serializability among concurrent transactions. In traditional software development, the problem has been addressed by introducing version and configuration management techniques combined with checkout/checkin mechanisms. Unfortunately, both of these solutions are too restrictive for SDEs because they enforce serialization of access to data, making cooperation unacceptably difficult. In this paper, I illustrate the problem and show how the encoding of the software development process in process-centered SDEs can be used to provide more appropriate concurrency control. I present the concurrency control mechanism I developed for the MARVEL SDE. This mechanism uses the process model in MARVEL to support the degree of cooperation specified in the development process.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Quester:1992:OCF, author = "Remco Quester", title = "{obTIOS}: a {CAx-framework} service for building concurrent engineering environments", journal = j-SIGSOFT, volume = "17", number = "5", pages = "32--40", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.142909", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An open integrated CAx-framework supplies services to build derived CAx-environments (e.g. for concurrent Engineering (CE), VLSI-design, Software Engineering, etc.) with specialized, integrated in-house or foreign tools. Such integrated tool uses services of the CAx-framework and cooperates with other integrated tools to achieve a common engineering objective like the simulation of a VLSI-circuit. In most CAx-frameworks the integrated tools cooperate indirectly using CAx-framework services like Data Handling or Inter-Tool Communication (ITC). With obTIOS a high-level approach to control cooperation of integrated tools within a Computer Aided Concurrent Engineering (CACE) environment is introduced. The tools of a CACE-environment are grouped to domains which represent the most coarse, mutually independent, structural unit within the CACE-environment. The way in which the tools of a domain cooperate is described by Encapsulated Composed Activities (ECA). An ECA represents a template of control regarding cooperation-in-the-large and cooperation-in-the-small of tools.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Toleman:1992:EIM, author = "Mark A. Toleman and Jim Welsh and Alan J. Chapman", title = "An empirical investigation of menu design in language-based editors", journal = j-SIGSOFT, volume = "17", number = "5", pages = "41--46", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.142911", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In program visualization some form of graphics is used to represent some aspect of a program. However, graphics are necessarily expensive with respect to ``screen real estate''. Alternatives, therefore, may be required for presentation of certain concepts fundamental to the programmer's model of a program. For example, one graphical representation of a program, written in a block-structured language like Pascal or Modula-2, is the structure chart model of the hierarchical structure of the blocks or modules making up the program. This graphic may be the most appropriate but it may not be conveniently implemented as a menu and a means of ``directly'' selecting blocks of program code to view or edit. Such graphics are used extensively, for example, in the Garden environment developed at Brown University. An alternative is a text-based list of block names indented to summarize the program's structure. UQ1, a language-based editor developed at the University of Queensland, implements the concept in this manner. Both types of menu structure were examined and compared for efficiency in a direct manipulation style of interaction. In general, there was no significant difference ($ P > 0.05$) in time taken by subjects to select items from either style of menu.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Meyers:1992:ESM, author = "Scott Meyers and Steven P. Reiss", title = "An empirical study of multiple-view software development", journal = j-SIGSOFT, volume = "17", number = "5", pages = "47--57", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.142913", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hangensen:1992:CSS, author = "Torben Mejlvang Hangensen and Bent Bruun Kristensen", title = "Consistency in software system development: framework, model, techniques \& tools", journal = j-SIGSOFT, volume = "17", number = "5", pages = "58--67", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.142914", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An important aspect in the software development process is the consistency between various parts of the software system being designed and implemented. During the development of a system we are aware of the consistency problems and we usually solve these by special arrangements developed as part of the development of the software system. In general the solutions applied for some specific system cannot be reused for other systems. The purpose of this paper is to introduce a general understanding of consistency and the techniques and tools for handling consistency. We introduce a concept called description to denote the various pieces of information which must be consistent. The description covers any fragments software and data, e.g. such as source code, parse trees, and machine code. The interpretation of a description is defined as a mapping into the set of objects, that the description is supposed to describe. Consistency of descriptions is defined as relations between the interpretations of the descriptions. The concepts description, interpretation and relation are used as a framework for modeling consistency in software systems. A consistency model includes interfaces, control parts and representations for descriptions in a system, and a specification of the consistency relations, that are relevant for the system. The model provides consistency as a new and very important perspective on software systems. It provides a graphical notation, which gives an overview of the consistency relations in a software system being designed. The model is very general and it does therefore apply to any type of software systems. This restricts the level of detail in the model of consistency, but the model allows enhancement of the specification once the type of software system is given. We define four basic techniques for handling consistency in software systems modeled in terms of descriptions. By combining these techniques we are able to describe the handling of consistency in a given software system. These techniques and the graphical consistency modeling language form a first step towards an engineered approach to the construction of software systems from a consistency view.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1992:TAG, author = "David Garlan and Linxi Cai and Robert L. Nord", title = "A transformational approach to generating application-specific environments", journal = j-SIGSOFT, volume = "17", number = "5", pages = "68--77", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.142917", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Current software development environments tend to lie at opposite ends of a spectrum: at one extreme are specialized application generators; at the other are general-purpose programming environments. The former provide strong support for system development and reuse, but are costly to build and available only for limited domains. The latter provide weak support, but are generally available and universally applicable. We describe a technique for automating the production of application-specific environments that lie between these two extremes. The key idea is that these environments can be derived from general-purpose programming environments by a process of structured transformation. We describe a tool for performing these transformations. It provides a set of formal operators for specializing a description of a general-purpose environment; as operators are applied, the system semi-automatically builds a set of transformation rules used to translate application-specific programs into those of the original general-purpose environment. The output of the tool is an application-specific environment together with a program transformer that provides execution semantics for programs written in that environment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lippe:1992:OBM, author = "Ernst Lippe and Norbert van Oosterom", title = "Operation-based merging", journal = j-SIGSOFT, volume = "17", number = "5", pages = "78--87", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143753", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Existing approaches for merging the results of parallel development activities are limited. These approaches can be characterised as state-based: only the initial and final states are considered. This paper introduces operation-based merging, which uses the operations that were performed during development. In many cases operation-based merging has advantages over state-based merging, because it automatically respects the data-type invariants of the objects, is extensible for arbitrary object types, provides better conflict detection and allows for better support for solving these conflicts. Several algorithms for conflict detection are described and compared.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Muller:1992:REE, author = "H. A. M{\"u}ller and S. R. Tilley and M. A. Orgun and B. D. Corrie and N. H. Madhavji", title = "A reverse engineering environment based on spatial and visual software interconnection models", journal = j-SIGSOFT, volume = "17", number = "5", pages = "88--98", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143755", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Reverse engineering is the process of extracting system abstractions and design information out of existing software systems. This information can then be used for subsequent development, maintenance, re-engineering, or reuse purposes. This process involves the identification of software artifacts in a particular subject system, and the aggregation of these artifacts to form more abstract system representations. This paper describes a reverse engineering environment which uses the spatial and visual information inherent in graphical representations of software systems to form the basis of a software interconnection model. This information is displayed and manipulated by the reverse engineer using an interactive graph editor to build subsystem structures out of software building blocks. The spatial component constitutes information about how a software structure looks. The coexistence of these two representations is critical to the comprehensive appreciation of the generated data, and greatly benefits subsequent analysis, processing, and decision-making.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{White:1992:IHC, author = "Elizabeth L. White and James M. Purtilo", title = "Integrating the heterogeneous control properties of software modules", journal = j-SIGSOFT, volume = "17", number = "5", pages = "99--108", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143757", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A concurrent software application, whether running on a single machine or distributed across multiple machines, is composed of tasks that interact (communicate and sychronize) in order to achieve some goal. Developing such concurrent programs so they cooperate effectively is a complex task, requiring that progrmmers craft their modules--the components from which concurrent applications are built --- to meet both functional requirements and communication requirements. Unfortunately the result of this effort is a module that is difficult to reason about and even more difficult to reuse. Making programmers treat too many diverse issues simultaneously leads to increased development costs and opportunities for error. This suggests the need for ways that a developer may specify control requirements separately from the implementation of functional requirements, but then have this information used automatically when building the component executables. The result is an environment where programmers have increased flexibility in composing software modules into concurrent applications, and in reusing those same modules. This paper describes our research toward a technology for control integration, where we have developed techniques for users to express control objectives for an application and a system that translates those specifications for use in packaging executables.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Richardson:1992:DIP, author = "Debra J. Richardson and T. Owen O'Malley and Cynthia Tittle Moore and Stephanie Leif Aha", title = "Developing and integrating {ProDAG} in the {Arcadia} environment", journal = j-SIGSOFT, volume = "17", number = "5", pages = "109--119", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143759", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "ProDAG is an analysis toolset that provides an application programmatic interface for program dependence analysis. Program dependences are syntactic relationships between program statements. The ProDAG interface provides a uniform set of operations for creating and accessing several pre-defined dependence relations, which are represented as graphs, as well as a standard mechanism for developing new dependence graphs. ProDAG is one analysis toolset in Arcadia, ProDAG was developed in the Arcadia environment and has been integrated with the language processing, object management, and process definition components of the Arcadia architecture, and further integration with the user interface development system and the measurement and evaluation components are underway. This paper describes the design, implementation and integration of proDAG within Arcadia.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Thery:1992:RTP, author = "Laurent Th{\'e}ry and Yves Bertot and Gilles Kahn", title = "Real theorem provers deserve real user-interfaces", journal = j-SIGSOFT, volume = "17", number = "5", pages = "120--129", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143760", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper explains how to add a modern user interface to existing theorem provers, using principles and tools designed for programming environments.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Graham:1992:PPS, author = "Susan L. Graham and Michael A. Harrison and Ethan V. Munson", title = "The {Proteus} presentation system", journal = j-SIGSOFT, volume = "17", number = "5", pages = "130--138", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143762", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software development environments can increase user productivity by presenting information in more useful ways. This paper describes Proteus, the presentation system of Ensemble, a software development environment that supports a wide variety of language and document capabilities. Proteus provides a set of services which allow the appearance of software development documents, such as programs or design specifications, to be determined by formal specifications of style. Proteus is based on a generic model of presentation services and is intended for use with a wide variety of media.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brown:1992:ATE, author = "Alan W. Brown and Peter H. Feiler", title = "An analysis technique for examining integration in a project support environment", journal = j-SIGSOFT, volume = "17", number = "5", pages = "139--148", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143764", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "While many Computer-Aided Software Engineering (CASE) tool vendors claim to provide open, integrated environments for software development, in practice such claims must be examined very carefully to understand what is meant. One of the problems faced in trying to examine these claims is that there is no established technique for examining software development environments with regard to their integration characteristics.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ben-Shaul:1992:AMU, author = "Israel Z. Ben-Shaul and Gail E. Kaiser and George T. Heineman", title = "An architecture for multi-user software development environments", journal = j-SIGSOFT, volume = "17", number = "5", pages = "149--158", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143765", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present an architecture for multi-user software development environments, covering general, process-centered and rule-based MUSDEs. Our architecture is founded on componentization, with particular concern for the capability to replace the synchronization component--to allow experimentation with novel concurrency control mechanisms--with minimal effects on other components while still supporting integration. The architecture has been implemented for the MARVEL SDE.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Heimbigner:1992:PPS, author = "Dennis Heimbigner", title = "The {ProcessWall}: a process state server approach to process programming", journal = j-SIGSOFT, volume = "17", number = "5", pages = "159--168", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143767", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The ProcessWall is a process state server providing storage for process states plus operations for defining and manipulating the structure of those states. It separates the state of a software process from any program for constructing that state. Instead, client programs implement the processes for operating on the process state. This approach has a number of potential benefits such as support for process formalism interoperability, support for multiple process languages, low-cost retro-fitting of process into existing environments, and support for long-term execution of processes. The process server interface provides descriptive mechanisms for representing process state as well as product state. A classification of client programs is provided to show how the state server can be used in a variety of ways.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kadia:1992:IEB, author = "R. Kadia", title = "Issues encountered in building a flexible software development environment: lessons from the {Arcadia} project", journal = j-SIGSOFT, volume = "17", number = "5", pages = "169--180", month = dec, year = "1992", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/142882.143768", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:44 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents some of the more significant technical lessons that the Arcadia project has learned about developing effective software development environments. The principal components of the Arcadia-1 architecture are capabilities for process definition and execution, object management, user interface development and management, measurement and evaluation, language processing, and analysis and testing. In simultaneously and cooperatively developing solutions in these areas we learned several key lessons. Among them: the need to combine and apply heterogeneous componentry, multiple techniques for developing components, the pervasive need for rich type models, the need for supporting dynamism (and at what granularity), the role and value of concurrency, and the role and various forms of event-based control integration mechanisms. These lessons are explored in the paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Loy:1993:MWS, author = "Patrick Loy", title = "The method won't save you: (but it can help)", journal = j-SIGSOFT, volume = "18", number = "1", pages = "30--34", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157398", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tichy:1993:SDW, author = "Walter F. Tichy and Nico Habermann and Lutz Prechelt", title = "Summary of the {Dagstuhl Workshop on Future Directions in Software Engineering: February 17--21, 1992, Schlo{\ss} Dagstuhl}", journal = j-SIGSOFT, volume = "18", number = "1", pages = "35--48", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157399", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The intent of the workshop was to bring together leading scientists for identifying promising directions for future research in Software Engineering. The motivation for the workshop was the realization that Software Engineering research was not in good shape, with the present emphasis on management and risk control diverting attention from hard, technical subjects. After week-long, intensive discussions of a great number of issues, the following topics were seen as most crucial for progress:1. Developing the area of software architecture as a foundation of Software Engineering;2. Learning to master evolving systems;3. Building a scientific basis for Software Engineering;4. Emphasizing science and engineering know-how when educating practitioners. Formal methods, domain specific knowledge, special purpose languages, and reuse were seen as important approaches, but not as solutions or ends in themselves. There was also a fair amount of introspection on proper method, evaluation, and experimentation in Software Engineering research. This report contains participants' position statements and a record of the discussions. The editors hope that it may help make research in Software Engineering an exciting and thriving endeavor once again.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Terashima:1993:TAC, author = "Nobuyoshi Terashima", title = "Toward automated communication software development", journal = j-SIGSOFT, volume = "18", number = "1", pages = "49--51", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157401", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Aggarwal:1993:TWO, author = "E. K. Aggarwal and M. Pavan Kumar and Vinay Santurkar and Radha Ratnaparkhi", title = "Towards a weighted operational profile", journal = j-SIGSOFT, volume = "18", number = "1", pages = "52--53", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157402", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lang:1993:SMO, author = "Neil Lang", title = "{Schlaer--Mellor} object-oriented analysis rules", journal = j-SIGSOFT, volume = "18", number = "1", pages = "54--58", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157404", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Shlaer-Mellor Object Oriented Analysis provides a complete and executable description of a problem domain using a set of formal analysis models: an information model, a set of state models, and a set of process models. In this paper we present the conditions that must be satisfied by a valid Shlaer-Mellor Object Oriented Analysis.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Saradhi:1993:DCP, author = "Motamarri Saradhi", title = "Database conversion planning", journal = j-SIGSOFT, volume = "18", number = "1", pages = "59--64", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157405", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In conventional approaches to Systems Development the crucial task of the exercise, deployment figures almost, at the end! The performance of the developed software can only be realized if and only if, there is a database to interact with. Surprisingly, this slips the attention of system developers! The challenge of converting the existing manual system, of all, the database maintained in paper volumes to that of computerized version, is not well accounted for. However, mundane this task, Database Conversion Planning (DBCP), has a definite and dominant role to play in systems development. While handling several complex turnkey computerization projects, we are compelled to realize the criticality of DBCP. A careful consideration of these issues in the early stages of systems development has shown a multitude of benefits. As a result, we were able to deploy projects amidst several constraining and conflicting factors. The projects have won the appreciation of customers, of all, end-users. We would like to share the vision that had lead to the creation of these systems, where software and quality have only synonymous meaning! We finally wish that these thoughts will influence the practice of systems development or in general, software engineering.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vazquez:1993:ASF, author = "Federico Vazquez and Guy Hanacek", title = "Automatic system file generator", journal = j-SIGSOFT, volume = "18", number = "1", pages = "65--73", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157407", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Advanced Automation System is a large complex system for Air Traffic Control used by the Federal Aviation Administration and its development is expected to last several years. Data Structure Design will change throughout the development cycle during these years. The Automatic System File Generator (ASFG) is designed to ease the effect of this continuous change in design in the area of Data Analysis. ASFG allows the creation of system files from thousands of message types whose structure is in continuous modification and revision. The basic purpose of the ASFG is to allow the input of any kind of message type files and convert them to system files for use by the Report System that is implemented with the Statistical Package for the Social Sciences (SPSS).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Liao:1993:SRB, author = "Hsian-Chou Liao and Feng-Jian Wang", title = "Software reuse based on a large object-oriented library", journal = j-SIGSOFT, volume = "18", number = "1", pages = "74--80", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157409", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Object-oriented software libraries expand in size more rapidly than other type of software library. This paper presents a simple approach for aiding reuse in software development using object-oriented library. Our approach improves the effectiveness of code searching by reorganizing the library with facet classification scheme and thesaurus. Information in specification models, such as data flow diagrams (DFDs), is extracted through object abstraction and then used as a query input. We are currently implementing a Computer-Aided Reuse Tool (CART) based on the approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brykczynski:1993:ABS, author = "Bill Brykczynski and David A. Wheeler", title = "An annotated bibliography on software inspections", journal = j-SIGSOFT, volume = "18", number = "1", pages = "81--88", month = jan, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/157397.157411", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1993:RPC, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "18", number = "2", pages = "4--17", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155829", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{McLaughlin:1993:DCM, author = "Robert McLaughlin", title = "Does {CASE} make the customer happier", journal = j-SIGSOFT, volume = "18", number = "2", pages = "18", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.156630", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "CASE technology is and will change the nature of software development. It is often hailed as the thing that will save our industry. It is however just another tool. Just as a good hammer in the hands of a bad carpenter will make a house that collapses, CASE in the hands of a fool will save no one.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Boundy:1993:SCS, author = "David Boundy", title = "Software cancer: the seven early warning signs", journal = j-SIGSOFT, volume = "18", number = "2", pages = "19", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.156632", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Olenfeldt:1993:WSC, author = "Lars Olenfeldt", title = "{Wish-4}: a specification for a {CASE}-tool to wish for", journal = j-SIGSOFT, volume = "18", number = "2", pages = "20--22", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155830", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Carmel:1993:DSC, author = "Erran Carmel", title = "A discussion of special characteristics for software package development life cycle models", journal = j-SIGSOFT, volume = "18", number = "2", pages = "23--24", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155832", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software package development (SPD) is playing an increasingly important role in the software market. Traditionally, most software has been developed for custom purposes which differs somewhat from SPD in some Life Cycle Model (LCM) characteristics. Five special characteristics for SPD are discussed: accommodating the unknown user, formalizing customer requirements, supporting multiple platforms and versions, facilitating speed of development and reacting to market pressures, and incorporating risk minimization.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kokol:1993:MHW, author = "Peter Kokol", title = "Metamodeling: how, why and what?", journal = j-SIGSOFT, volume = "18", number = "2", pages = "25--26", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155834", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The metamodeling is analyzed in the context of three crucial questions: How, why and What? This analysis showed that albeit the great advancement of process modeling in last years at least one important question still remains unsolved: How to design new process models? In this paper we introduce a metaparadigm as a possible solution to this question. Metaparadigm is a metadesign paradigm based on Checklands Soft System Methodology.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fisch:1993:UIU, author = "Eric A. Fisch", title = "Understanding and improving the user interface design process", journal = j-SIGSOFT, volume = "18", number = "2", pages = "27--29", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155835", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Over the past few years user interfaces, especially graphical ones, have been emphasized in the design of computer systems [1]. Users often take for granted the interfaces of today's computer systems. The person entering data or typing up a report does not even consider the work that has gone into making the system and its applications as easy to use as a pen and paper. The difficulty that does go into creating the ``perfect'' user interface begins from the systems inception and does not end until the system becomes obsolete. Even then, the lasting effects of the interface on its users will make future designers work more laborious. This paper will discuss the design process of the user interface. It concludes with some suggestions that future designers may wish to consider to make their jobs easier.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kaindl:1993:MLR, author = "Hermann Kaindl", title = "The missing link in requirements engineering", journal = j-SIGSOFT, volume = "18", number = "2", pages = "30--39", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155836", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Especially the early phase of requirements engineering is one of the most important and least supported parts of the software life cycle. Since pure natural language has its disadvantages, and directly arriving at a formal representation is very difficult, a link through a mediating representation is missing. We use hypertext for this purpose, providing also links among requirements statements and the representation of objects in a domain model. This possibility of explicit representation of links allows the users and analysts to make relationships and dependencies explicit and helps to be aware of them. Actually, our approach and the tool supporting it use a combination of various technologies, including also object-oriented approaches and a grain of artificial intelligence (in particular frames). Therefore, inheritance is provided by our tool already in the early phase of requirements engineering. In particular, we found it very useful to view requirements as objects. A key idea is to support the ordering of ideas especially through classification already in the early stages. While our approach is not intended to substitute useful existing techniques emphasizing more formal representations, it can be combined with them.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1993:DSS, author = "Will Tracz and Lou Coglianese and Patrick Young", title = "A domain-specific software architecture engineering process outline", journal = j-SIGSOFT, volume = "18", number = "2", pages = "40--49", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155837", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "One of the dilemmas that has prevented software developers from reusing software is the lack of software artifacts to use or the existence of artifacts that are difficult to integrate. Domain-Specific Software Architectures (DSSAs) have been proposed[4] in order to address these issues. A DSAA not only provides a framework for reusable software components to fit into, but captures the design rationale and provides for a degree of adaptability. This paper$_1$ presents an outline for a Domain-Specifid Software Architecture engineering process.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Terwilliger:1993:TTS, author = "Robert B. Terwilliger", title = "Toward tools to support the {Gries\slash Dijkstra} design process", journal = j-SIGSOFT, volume = "18", number = "2", pages = "50--59", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155838", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/bibnet/authors/d/dijkstra-edsger-w.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We are investigating software design processes using a three part approach. For a design method of interest, we first perform walkthroughs on a number of small problems. Second, we construct a simulation program which duplicates the designs produced by the walkthroughs, and third, we construct a process program that supports human application of the method. We have been pursuing this program for the formal design process developed by Dijkstra and Gries. In this paper, we describe our first step towards process programming this method: ISLET, a language-oriented program/proof editor. ISLET supports simple stepwise refinement with proof by automatically generating and mechanically certifying verification conditions. In addition, through ISLET the programmer has access to a library of pre-verified cliches that can be used to create programs more easily. We have constructed a prototype implementation in Prolog and used it to generate a number of example designs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sharble:1993:OOB, author = "Robert C. Sharble and Samuel S. Cohen", title = "The object-oriented brewery: a comparison of two object-oriented development methods", journal = j-SIGSOFT, volume = "18", number = "2", pages = "60--73", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155839", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Interest in object-oriented methods has been rapidly increasing, as software developers and project managers try to reduce escalating development and maintenance costs. There is an increasing need to determine if there are differences in effectiveness between various methods of object-oriented software development, and whether techniques from more successful methods can be extracted and applied to improve other methods. This paper reports on research to compare the effectiveness of two methods for the development of object-oriented software. These methods are representative of two dominant approaches in the industry. The methods are the responsibility-driven method and a data-driven method that was developed at The Boeing Company and taught in a course available to the public. Each of the methods was used to develop a model of the same example system. A suite of metrics suitable for object-oriented software was used to collect data for each model, and the data was analyzed to identify differences. The model developed with the responsibility-driven method was found to be much less complex, and specifically to have much less coupling between objects and much more cohesion within an object.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Griss:1993:WFA, author = "Martin Griss and Will Tracz", title = "{WISR'92: Fifth Annual Workshop in Software Reuse}: working group reports", journal = j-SIGSOFT, volume = "18", number = "2", pages = "74--85", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155841", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cherry:1993:SRM, author = "George W. Cherry", title = "Stimulus-response machines: a new visual formalism for describing classes and objects", journal = j-SIGSOFT, volume = "18", number = "2", pages = "86--95", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155842", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Arifoglu:1993:MSC, author = "Ali Arifoglu", title = "A methodology for software cost estimation", journal = j-SIGSOFT, volume = "18", number = "2", pages = "96--105", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155844", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software Cost Estimation is an empirical process to be applied to find out basically the effort and development time requirements for the software product which is going to be developed. The process starts with the planning phase activities and refined throughout the development. It is very important for managing and scheduling the software project. Various cost estimation methods are available to be used for software development process. Depending on the size of the software, a macro (for the information systems requiring more than 30 man years to develop) or a micro cost model can be used for estimation. The paper discusses available work on the cost estimation methods and proposes a methodological view in cost estimation. Basically, the methodology involves; how to combine available cost estimation techniques to have better estimation and, how to apply the methodology through software development. In the application of the cost estimation techniques, SD (Structured Development/Design) methodology is assumed as applied during the development. Some of the observations in the experiments are also given in the paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Shu:1993:IRC, author = "William S. Shu", title = "Inertia --- the reluctance of code motion?", journal = j-SIGSOFT, volume = "18", number = "2", pages = "106--108", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155845", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The effects of optimisation on debugging were characterised, first as metric-based distances along paths, and then within an algebraic framework [6, 7, 8]. In them, we observed algorithmic ambiguities which may seriously compromise the efficiency-though not the semantic definition-of a debugger for optimised programs. Informal observations appear to indicate enhanced performance if displaced codes were favoured for further displacements, and unmoved codes were preferentially left alone. This reluctance to change the ``state of code motion'' seems much like the physical quantity known as inertia. This paper highlights points to support the ``inertial argument'', and raises questions to be explored in relation to it.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tripp:1993:SDP, author = "Leonard L. Tripp", title = "Standards development preference survey", journal = j-SIGSOFT, volume = "18", number = "2", pages = "109", month = apr, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/159420.155846", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Blum:1993:DPC, author = "Manuel Blum", title = "Designing programs to check their work (abstract)", journal = j-SIGSOFT, volume = "18", number = "3", pages = "1", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154185", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Students, engineers, programmers, \ldots{}, are all expected to check their work. Computer programs are not. There are several reasons for this: 1. Computer hardware almost never makes errors --- but that fails to recognize that programmers do! 2. Programs are hard enough to write without having to also write program checkers for them --- but that is the price of increased confidence! 3. There is no clear notion what constitutes a good checker. Indeed, the same students and engineers who are cautioned to check their work are rarely informed what it is that makes a procedure good for doing so --- but that is just the sort of problem that computer science should be able to solve! In my view, the lack of correctness checks in programs is an oversight. Programs have bugs that could perfectly well be caught by such checks. This talk urges that programs be written to check their work, and outlines a promising and rigorous approach to the study of this fascinating new area.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Woit:1993:SOP, author = "Denise M. Woit", title = "Specifying operational profiles for modules", journal = j-SIGSOFT, volume = "18", number = "3", pages = "2--10", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154187", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We describe a technique for specifying operational profiles for modules. The technique is more general than those of the current literature and allows more accurate specification of module usage. We also outline an algorithm for automatically generating random test cases from any such operational profile specification for a module, such that the test cases correspond to a random sampling of the module's input in actual operation. Operational-based statistical estimations, such as operational reliability, may be more meaningful when our specification method and generation algorithm are used, because our method permits more precise specifications than do other methods in the current literature.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Stocks:1993:TTF, author = "P. Stocks and D. Carrington", title = "Test template framework: a specification-based testing case study", journal = j-SIGSOFT, volume = "18", number = "3", pages = "11--18", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154190", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A framework for specification-based testing is demonstrated on a symbol table case study, specified using the Z notation. Test derivation and structuring is discussed, as well as applications of the framework in deriving test oracles and aiding regressing testing during maintenance. Areas for further research and discussion are comparison of heuristics with regard to generated test suites and usability, formalising testing heuristics, and the discrepancy between functional testing and robustness testing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jackson:1993:AAA, author = "Daniel Jackson", title = "Abstract analysis with aspect", journal = j-SIGSOFT, volume = "18", number = "3", pages = "19--27", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154192", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Aspect is a static analysis technique for detecting bugs in code based on three forms of abstraction: declarative specification, data abstraction and partiality (ignoring some behavioural details). Together, they bring efficiency (the checker runs almost as fast as a type checker), modularity (a procedure can be analysed independently of the procedures it calls) and incrementality (allowing the checking of incomplete programs). Aspect can detect errors that are not detectable by other static means, especially errors of omission, which are pervasive but usually hard to detect.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Felder:1993:ARS, author = "Miguel Felder and Carlo Ghezzi and Mauro Pezz{\`e}", title = "Analyzing refinements of state based specifications: the case of {TB} nets", journal = j-SIGSOFT, volume = "18", number = "3", pages = "28--39", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154193", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We describe how formal specifications given in terms of a high-level timed Petri net formalism (TB nets) can be analyzed to check the temporal properties of bounded invariance (the systems stays in a given state until time $ \tau $) and bounded response (the system will enter a given state within time $ \tau $). In particular, we concentrate on specifications given in a hierarchical, top-down manner, where one specification level refines a more abstract level. Our goal is to define the conditions under which the properties that are proven to hold at a given abstraction level are preserved at the next refined level. To do so, we define the concept of correct refinement, and we show that bounded invariance and bounded response are preserved by a correct refinement. We also provide a set of constructive rules that may be applied to refine a net in such a way that the resulting net is a correct refinement.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Levine:1993:MDR, author = "David L. Levine and Richard N. Taylor", title = "Metric-driven reengineering for static concurrency analysis", journal = j-SIGSOFT, volume = "18", number = "3", pages = "40--50", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154196", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An approach to statically analyzing a concurrent program not suited for analysis is described. The program is reengineered to reduce the complexity of concurrency-related activities, thereby reducing the size of the concurrency state space. The key to the reengineering process is a metric set that characterizes program task interaction complexity and provides guidance for restructuring. An initial version of a metric set is proposed and applied to two examples to demonstrate the utility of the reengineering-for-analysis process. The reengineering has potential benefits apart from supporting analyzability, following the dictum that if it is hard to analyze, it is hard to understand and maintain.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Duri:1993:USS, author = "S. Duri and U. Buy and R. Devarapalli and S. M. Shatz", title = "Using state space reduction methods for deadlock analysis in {Ada} tasking", journal = j-SIGSOFT, volume = "18", number = "3", pages = "51--60", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154197", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Over the past few years, a number of research investigations have been initiated for static analysis of concurrent and distributed software. In this paper we report on experiments with various optimization techniques for reachability-based deadlock detection in Ada programs using Petri net models. Our experimental results show that various optimization techniques are mutually beneficial with respect to the effectiveness of the analysis.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vogel:1993:IGP, author = "Peter A. Vogel", title = "An integrated general purpose automated test environment", journal = j-SIGSOFT, volume = "18", number = "3", pages = "61--69", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154200", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As software systems become more and more complex, both the complexity of the testing effort and the cost of maintaining the results of that effort increase proportionately. Most existing test environments lack the power and flexibility needed to adequately test significant software systems. The CONVEX Integrated Test Environment (CITE) is discussed as an answer to the need for a more complete and powerful general purpose automated software test system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Belli:1993:IBA, author = "B. Belli and O. Jack", title = "Implementation-based analysis and testing of {Prolog} programs", journal = j-SIGSOFT, volume = "18", number = "3", pages = "70--80", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154203", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper, we describe the PROTest II (PROlog Test Environment, Version 2) system to test logic programs in an interactive support environment. Logic programs are augmented with declarative information about the types and modes of the arguments of a predicate. Modes correspond to in, out, and in-out parameters. With this information PROTest II statically checks the types of Prolog programs, generates test cases, executes Prolog programs, and produces reports summarizing results including information about new test coverage metrics. Thus, PROTest II enables both static analysis and dynamic testing uniformly using a Prolog-based test language DTL/1. The strength of PROTest II stems from its idea of defining coverage in real logic programming terms, rather than adapting imperative programming ideas.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Modes:1993:SIV, author = "Ronald W. Modes", title = "Structured {IV} \& {V} for the space shuttle flight software", journal = j-SIGSOFT, volume = "18", number = "3", pages = "81", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154205", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Avritzer:1993:LTS, author = "Alberto Avritzer and Brian Larson", title = "Load testing software using deterministic state testing", journal = j-SIGSOFT, volume = "18", number = "3", pages = "82--88", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154244", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we introduce a new load testing technique called Deterministic Markov State Testing and report on its application. Our approach is called ``deterministic'' because the sequence of test case execution is set at planning time, and ``state testing'' because each test case certifies a unique software state. There are four main advantages of Deterministic Markov State Testing for system testers: provision of precise software state information for root cause analysis in load test, accommodation for limitations of the system test lab configuration, higher acceleration ratios in system test, and simple management of distributed execution of test cases. System testers using the proposed method have great flexibility in dealing with common system test problems: limited access to the system test environment, unstable software, or changing operational conditions. Because each test case verifies correct execution on a path from the idle state to the software state under test, our method does not require the continuous execution of all test cases. Deterministic Markov State Testing is operational-profile-based, and allows for measurement of software reliability robustness when the operational profile changes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hamlet:1993:FSA, author = "Dick Hamlet and Jeff Voas", title = "Faults on its sleeve: amplifying software reliability testing", journal = j-SIGSOFT, volume = "18", number = "3", pages = "89--98", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154246", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Most of the effort that goes into improving the quality of software paradoxically does not lead to quantitative, measurable quality. Software developers and quality-assurance organizations spend a great deal of effort preventing, detecting, and removing ``defects'' --- parts of software responsible for operational failure. But software quality can be measured only by statistical parameters like hazard rate and mean time to failure, measures whose connection with defects and with the development process is little understood. At the same time, direct reliability assessment by random testing of software is impractical. The levels we would like to achieve, on the order of 10$^6$ --- 10$^8$ executions without failure, cannot be established in reasonable time. Some limitations of reliability testing can be overcome but the ``ultrareliable'' region above 10$^8$ failure-free executions is likely to remain forever untestable. We propose a new way of looking at the software reliability program. Defect-based efforts should amplify the significance of reliability testing. That is, developers should demonstrate that the actual reliability is better than the measurement. We give an example of a simple reliability-amplification technique, and suggest applications to systematic testing and formal development methods.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Thevenod-Fosse:1993:SAS, author = "P. Th{\'e}venod-Fosse and H. Waeselynck", title = "{STATEMATE} applied to statistical software testing", journal = j-SIGSOFT, volume = "18", number = "3", pages = "99--109", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154262", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper is concerned with the use of statistical testing as a verification technique for complex software. Statistical testing involves exercising a program with random inputs, the test profile and the number of generated inputs being determined according to criteria based on program structure or software functionality. In case of complex programs, the probabilistic generation must be based on a black box analysis, the adopted criteria being defined from behavior models deduced from the specification. The proposed approach refers to a hierarchical specification produced in the STATEMATE environment. Its feasibility is exemplified on a safety-critical module from the nuclear field, and the efficiency in revealing actual faults is investigated through experiments involving two versions of the module.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Corbett:1993:PTB, author = "J. Corbett and G. Avrunin", title = "A practical technique for bounding the time between events in concurrent real-time systems", journal = j-SIGSOFT, volume = "18", number = "3", pages = "110--116", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154263", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Showing that concurrent systems satisfy timing constraints on their behavior is difficult, but may be essential for critical applications. Most methods are based on some form of reachability analysis and require construction of a state space of size that is, in general, exponential in the number of components in the concurrent system. In an earlier paper with L. K. Dillon and J. E. Wileden, we described a technique for finding bounds on the time between events without enumerating the state space, but the technique applies chiefly to the case of logically concurrent systems executing on a uniprocessor, in which events do not overlap in time. In this paper, we extend that technique to obtain upper bounds on the time between events in maximally parallel concurrent systems. Our method does not require construction of the state space and the results of preliminary experiments show that, for at least some systems with large state spaces, it is quite tractable. We also briefly describe the application of our method to the case in which there are multiple processors, but several processes run on each processor.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Atlee:1993:ATR, author = "Joanne M. Atlee and John Gannon", title = "Analyzing timing requirements", journal = j-SIGSOFT, volume = "18", number = "3", pages = "117--127", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154264", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Coen-Porisini:1993:CAR, author = "Alberto Coen-Porisini and Richard A. Kemmerer", title = "The composability of {ASTRAL} realtime specifications", journal = j-SIGSOFT, volume = "18", number = "3", pages = "128--138", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154271", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "ASTRAL is a formal specification language for realtime systems. It is intended to support formal software development, and therefore has been formally defined. In ASTRAL a realtime system is modeled by a collection of state machine specifications and a single global specification. This paper focuses on extending the ASTRAL methodology to allow the composition of ASTRAL system specifications into specifications of larger and more complex systems. The ASTRAL language includes structuring mechanisms that allow one to build modularized specifications of complex systems with layering. In this paper we concentrate on how to combine these complex system specifications into specifications of even more complex realtime systems. This is accomplished by adding a COMPOSE section to the language that provides the needed information to combine two or more ASTRAL specifications into a single new one. In this paper we also introduce the necessary proof obligations to assure that the assumptions of each of the components of the larger system are satisfied by the other components of the system that replace the previous external environment. We also discuss how some exported transitions become internal transitions of the new system. A telephony example with local central controls that interface to long distance units is used to motivate the extensions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Untch:1993:MAU, author = "Roland H. Untch and A. Jefferson Offutt and Mary Jean Harrold", title = "Mutation analysis using mutant schemata", journal = j-SIGSOFT, volume = "18", number = "3", pages = "139--148", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154265", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Mutation analysis is a powerful technique for assessing and improving the quality of test data used to unit test software. Unfortunately, current automated mutation analysis systems suffer from severe performance problems. This paper presents a new method for performing mutation analysis that uses program schemata to encode all mutants for a program into one metaprogram, which is subsequently compiled and run at speeds substantially higher than achieved by previous interpretive systems. Preliminary performance improvements of over 300\% are reported. This method has the additional advantages of being easier to implement than interpretive systems, being simpler to port across a wide range of hardware and software platforms, and using the same compiler and run-time support system that is used during development and/or deployment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Weiss:1993:ISA, author = "Stewart N. Weiss and Vladimir N. Fleyshgakker", title = "Improved serial algorithms for mutation analysis", journal = j-SIGSOFT, volume = "18", number = "3", pages = "149--158", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154266", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Existing serial algorithms to do mutation analysis are inefficient, and descriptions of parallel mutation systems pre-suppose that these serial algorithms are the best one can do serially. We present a universal mutation analysis data structure and new serial algorithms for both strong and weak mutation analysis that on average should perform much faster than existing ones, and can never do worse. We describe these algorithms as well as the results of our analysis of their run time complexities. We believe that this is the first paper in which analytical methods have been applied to obtain the run time complexities of mutation analysis algorithms.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Miller:1993:EST, author = "Edward F. Miller", title = "Exploitation of software test technology", journal = j-SIGSOFT, volume = "18", number = "3", pages = "159", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154267", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Harrold:1993:ECP, author = "Mary Jean Harrold and Brian Malloy and Gregg Rothermel", title = "Efficient construction of program dependence graphs", journal = j-SIGSOFT, volume = "18", number = "3", pages = "160--170", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154268", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/gnu.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present a new technique for constructing a program dependence graph that contains a program's control flow, along with the usual control and data dependence information. Our algorithm constructs a program dependence graph while the program is being parsed. For programs containing only structured transfers of control, our algorithm does not require information provided by the control flow graph or post dominator tree and therefore obviates the construction of these auxiliary graphs. For programs containing explicit transfers of control, our algorithm adjusts the partial control dependence subgraph, constructed during the parse, to incorporate exact control dependence information. There are several advantages to our approach. For many programs, our algorithm may result in substantial savings in time and memory since our construction of the program dependence graph does not require the auxiliary graph. Furthermore, since we incorporate control and data flow as well as exact control dependence information into the program dependence graph, our graph has a wide range of applicability. We have implemented our algorithm by incorporating it into the Free Software Foundation's GNU C compiler; currently we are performing experiments that compare our technique with the traditional approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Goradia:1993:DIA, author = "Tarak Goradia", title = "Dynamic impact analysis: a cost-effective technique to enforce error-propagation", journal = j-SIGSOFT, volume = "18", number = "3", pages = "171--181", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154269", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper introduces dynamic impact analysis as a cost-effective technique to enforce the error-propagation condition for detecting a fault. The intuition behind dynamic impact analysis is as follows. In a specific test-case, if an execution of a syntactic component has a strong impact on the program output and if the output is correct, then the value of that component-execution is not likely to be erroneous. To capture this intuition in a theoretical framework the notion of impact is formally defined and the concept of impact strength is proposed as a quantitative measure of the impact. In order to provide an infrastructure supporting the computation of impact strengths, program impact graphs and execution impact graphs are introduced. An empirical study validating the computation of impact strengths is presented. It is shown that the impact strengths computed by dynamic impact analysis provide reasonable estimates for the error-sensitivity with respect to the output except when the impact is via one or more error-tolerant components of the program. Potential applications of dynamic impact analysis in the area of mutation testing and dynamic program slicing are discussed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Thompson:1993:IFM, author = "Margaret C. Thompson and Debra J. Richardson and Lori A. Clarke", title = "An information flow model of fault detection", journal = j-SIGSOFT, volume = "18", number = "3", pages = "182--192", month = jul, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/174146.154270", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "RELAY is a model of how a fault causes a failure on execution of some test datum. This process begins with introduction of an original state potential failure at a fault location and continues as the potential failure(s) transfers to output. Here we describe the second stage of this process, transfer of an incorrect intermediate state from a faulty statement to output. Transfer occurs along information flow chains, where each link in the chain involves data dependence transfer and/or control dependence transfer. RELAY models concurrent transfer along multiple information flow chains with transfer sets, which identify possible interaction between potential failures, and with transfer routes, which identify actual interactions. Transfer sets, transfer routes, and control dependence transfer are unique to the RELAY model. The model demonstrates that the process of potential failure transfer is extremely complex and full analysis of real programs may not be practical. Nonetheless, RELAY provides insight into testing and fault detection and suggests an approach to fault-based testing and analysis that may be warranted for critical systems software.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Notkin:1993:NHR, author = "David Notkin", title = "{Nico Habermann} remembered", journal = j-SIGSOFT, volume = "18", number = "4", pages = "1", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163627", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Starke:1993:URI, author = "Gernot Starke", title = "Urgent research issues in software process engineering", journal = j-SIGSOFT, volume = "18", number = "4", pages = "13--15", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163628", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper outlines the major problems and research directions in software process engineering. These problems concern the terminology and language of models; the difference between type and instance; the inherent reflexivity of detailed process models and the dynamic aspects of process models. Furthermore human factors are shown to impose major difficulties on process engineers.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rine:1993:NSE, author = "David Rine", title = "A note on software engineering, software systems engineering and software design", journal = j-SIGSOFT, volume = "18", number = "4", pages = "16--18", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163629", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hefley:1993:CCA, author = "William E. Hefley", title = "The {Cobbler}'s children: applying total quality management to business process improvement, information engineering and software engineering", journal = j-SIGSOFT, volume = "18", number = "4", pages = "19--25", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163630", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes an approach to, and the relationship among, Business Process Improvement, Business Case Analysis, Information Engineering, and Total Quality Management. This approach is shown to not only complement existing software engineering approaches; but to also provide a framework for implementing continuous improvement processes focused on improving the quality of the organization's processes, services and products.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Conradi:1993:CFE, author = "Reidar Conradi and Christer Fernstr{\"o}m and Alfonso Fuggetta", title = "A conceptual framework for evolving software processes", journal = j-SIGSOFT, volume = "18", number = "4", pages = "26--35", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163631", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software processes are complex entities that may last for long periods of time and are carried out through the interaction of humans and computerized tools. They need to continuously evolve in order to cope with different kinds of changes or customizations both in the organization and in the technologies used to support software production activities. In recent years, many software process support technologies have been developed, and have currently been further extended and used in trial projects. Moreover, some research prototypes have generated commercial products, that are marketed and currently used in industrial organizations. Despite these significant efforts and results, however, there is still little conceptual characterization and assessment of the properties of software processes and related support environments. It is difficult to compare and assess existing approaches. Even a common characterization of the problems to be addressed seems to be problematic and difficult to achieve. This is particularly true when we consider the process evolution problem, for which it does not seem that a common view of the issue has been established yet. This paper aims at proposing a conceptual framework to describe and assess flexible and evolving software processes. It is based on the assumption that a software process is composed of two main components: a software production process to carry out software production activities, and a software meta-process to improve and evolve the whole software process. The general requirements and properties of the process domain are first discussed, and the meta-process concept is introduced. Then, we discuss several process related concepts and, in particular, the relationship between the meta-process and the rest of the software process. Methods and technologies needed to support the meta-process are highlighted and discussed. Finally, we apply the resulting framework to an example, in order to show the potential and expected benefits of the proposed approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Steward:1993:SSM, author = "Donald V. Steward", title = "A simple straightforward method for software development", journal = j-SIGSOFT, volume = "18", number = "4", pages = "36--43", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163632", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This article presents a method that greatly simplifies software development even while providing a richer description of the system being developed. One tree like structure captures the configuration of the product throughout the whole development process. This avoids the much criticized 'chasm' between analysis and design [2] and gives complete traceability and measurability from requirements to code. It provides for the rich description of interfaces particularly important for large systems. Although the system is documented as a tree structure. it can be used with top-down, bottom-up, object oriented and formal styles of development. It can be tried and evaluated quite easily using a conventional outline processor, which allows one to show just the level of detail of whatever part one wishes to see. This article will start out by showing how you can use the basic method, then successively add more features to demonstrate the ramifications of this simple idea.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vazquez:1993:UOO, author = "Federico Vazquez", title = "Using object oriented structured development to implement a hybrid system", journal = j-SIGSOFT, volume = "18", number = "4", pages = "44--53", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163633", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Object Oriented Analysis, Design and Programming are increasingly impacting the development approach to Computer Systems. Although these methodologies are not new, their use in industry is increasing and they have had a large impact in both System Analysis and System Design. Some People think that object oriented techniques will be the new predominant methodologies used in the 90s and there is no relationship with Structured Design. Others believe that there is indeed a relationship between Structured Analysis and Object Oriented Design. During my work with the development of computer systems I have found a certain degree of compatibility between Object Oriented Analysis and Structured Analysis. I did not however find compatibility between Structured Design and Object Oriented Design. This paper deals with the use of both techniques in a successful system development effort with a hybrid approach. It is possible to work with hybrid systems where object Oriented and Structured development are combined and complement each other.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Henderson-Sellers:1993:MOO, author = "B. Henderson-Sellers and J. M. Edwards", title = "The {O-O-O} methodology for the object-oriented life cycle", journal = j-SIGSOFT, volume = "18", number = "4", pages = "54--60", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163634", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{McGregor:1993:NIS, author = "John D. McGregor and Douglas M. Dyer", title = "A note on inheritance and state machines", journal = j-SIGSOFT, volume = "18", number = "4", pages = "61--69", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163635", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The inheritance relationships in an object-oriented program have been shown to be a natural structure for facilitating reuse in a number of areas such as test cases. This note reports on a technique for incrementally building the state machine for a class from the state machines of its base classes. Using a style of state diagram similar to object charts provides a graphical means of displaying the resulting state machine. This incremental technique allows more complex machines to be built with less effort.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cheng:1993:ISR, author = "Jingwen Cheng", title = "Improving the software reusability in object-oriented programming", journal = j-SIGSOFT, volume = "18", number = "4", pages = "70--74", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163636", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "One of the promises which OOP (Object-Oriented Programming) holds is that it enhances software reusability. Indeed, software components designed in OOP is easier to be reused than those designed in conventional programming. But the state-of-the-art software reusability in most OOP environments is still very limited. This paper examines how OOP enhances software reusability, what are the limitations of software reuse in current state, and how to improve software reusability.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Poulin:1993:ISS, author = "Jeffrey S. Poulin", title = "Integrated support for software reuse in Computer-Aided Software Engineering {(CASE)}", journal = j-SIGSOFT, volume = "18", number = "4", pages = "75--82", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163637", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The success and acceptance of reuse tools and libraries depends on their integration into existing software development environments. However, the addition of large libraries of reusable components to software design databases only exacerbates the problem of design data management. Object-oriented databases originated to meet the requirements of design data management that relational databases could not satisfy. This paper describes a semantic data model for an object-oriented database supporting an integrated Computer Aided Software Engineering environment (CASE). The data model promotes reuse by providing objects that match program design requirements to existing components in the reuse library.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lott:1993:PMS, author = "Christopher M. Lott", title = "Process and measurement support in {SEEs}", journal = j-SIGSOFT, volume = "18", number = "4", pages = "83--93", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163638", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software evolution processes are well-known to be difficult to manage. Some software engineering environments (SEEs) can use models of these processes to guide their enaction. A few of these SEEs can additionally collect and use measurement data to guide processes precisely. Measurement-based guidance is intended to improve the manageability of the guided processes. This paper contributes an overview of many process-centered SEEs, with special emphasis on those that support the systematic collection of process, product, and resource data for the purpose of process guidance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Edelstein:1993:RIS, author = "D. Vera Edelstein", title = "Report on the {IEEE STD 1219--1993} --- standard for software maintenance", journal = j-SIGSOFT, volume = "18", number = "4", pages = "94--95", month = oct, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/163626.163639", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:49 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hoare:1993:AM, author = "C. A. R. Hoare", title = "Algebra and models", journal = j-SIGSOFT, volume = "18", number = "5", pages = "1--8", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167053", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Science makes progress by constructing mathematical models, deducing their observable consequences, and testing them by experiment. Successful theoretical models are later taken as the basis for engineering methods and codes of practice for design of reliable and useful products. Models can play a similar central role in the progress and practical application of Computing Science.A model of a computational paradigm starts with choice of a carrier set of potential direct or indirect observations that can be made of a computational process. A particular process is modelled as the subset of observations to which it can give rise. Process composition is modelled by relating observations of a composite process to those of its components. Indirect observations play an essential role in such compositions. Algebraic properties of the composition operators are derived with the aid of the simple theory of sets and relations. Feasibility is checked by a mapping from a more operational model.A model constructed as a family of sets is easily adapted as a calculus of design for total correctness. A specification is given by an arbitrary set containing all observations permitted in the required product. It should be expressed as clearly as possible with the aid of the full power of mathematics and logic. A product meets a specification if its potential observations form a subset of its permitted observations. This principle requires that all envisaged failure modes of a product are modelled as indirect observations, so that their avoidance can be proved. Specifications of components can be composed mathematically by the same operators as the components themselves. This permits top-down proof of correctness of designs even before their implementation begins. Algebraic properties and reasoning are helpful throughout development. Non-determinism is seen as no problem, but rather as a part of the solution.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Abowd:1993:USU, author = "Gregory Abowd and Robert Allen and David Garlan", title = "Using style to understand descriptions of software architecture", journal = j-SIGSOFT, volume = "18", number = "5", pages = "9--20", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167055", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The software architecture of most systems is described informally and diagrammatically. In order for these descriptions to be meaningful at all, figures are understood by interpreting the boxes and lines in specific, conventionalized ways[5]. The imprecision of these interpretations has a number of limitations. In this paper we consider these conventionalized interpretations as architectural styles and provide a formal framework for their uniform definition. In addition to providing a template for precisely defining new architectural styles, this framework allows for the proof that the notational constraints on a style are sufficient to guarantee the meanings of all described systems and provides a unified semantic base through which different stylistic interpretations can be compared.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Balzer:1993:MGP, author = "Robert Balzer and K. Narayanaswamy", title = "Mechanisms for generic process support", journal = j-SIGSOFT, volume = "18", number = "5", pages = "21--32", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167058", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As more and more programming environments incorporate explicit process descriptions, generic process capabilities will become crucial to the convenient instantiation and maintenance of process description. However, partly because process modeling languages have followed the example of programming languages in general, they are surprisingly weak in supporting generic process descriptions. We propose mechanisms whereby generic process capability can be added to any process formalism. The generic portions of the process description can then be refined through instantiation. We define a system architecture in which a generic process description can be refined gradually during its enactment. Such capabilities will be crucial to incorporating explicit process descriptions into the program environments of the future.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Magnusson:1993:FGR, author = "Boris Magnusson and Ulf Asklund and Sten Min{\"o}r", title = "Fine-grained revision control for collaborative software development", journal = j-SIGSOFT, volume = "18", number = "5", pages = "33--41", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167061", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents a framework for controlling the evolution of complex software systems concurrently developed by teams of software engineers. A general technique for fine-grained revision control of hierarchically structured information, such as programs and documents, is described and evaluated. All levels in the hierarchy are revision controlled, leaves as well as branch nodes. The technique supports sharing of unchanged nodes among revisions, automatic change propagation, and change-oriented representation of differences. Its use in a software development environment is presented, facilitating optimistic check-out of revisions and alternatives, check-in with incremental merge support, visualization of change propagation, and an integrated flexible diff-ing technique providing group awareness for team members.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Griswold:1993:DUD, author = "William G. Griswold", title = "Direct update of data flow representations for a meaning-preserving program restructuring tool", journal = j-SIGSOFT, volume = "18", number = "5", pages = "42--55", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167063", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Automated assistance for meaning-preserving global restructuring is an approach for helping software engineers improve the structure of programs, thus lowering the costs of maintenance. The construction of a restructuring tool encounters many conflicting goals --- such as simplicity. extensibility, and good performance --- that cannot be met without some compromise. In particular, the current technique for assisting restructuring uses a costly program representation --- a Program Dependence Graph (PDG) with alias information --- that is not practical to recompute from scratch after each restructuring transformation. There are at least two possible solutions. A commonly suggested approach for efficiently updating data flow representations is to use a generic incremental algorithm that does not make use of the special nature of the restructuring. This approach is general, but it does not yet handle aliasing fully. By taking advantage of the special nature of the restructuring transformations it is possible to implement a more efficient update than generic update that also handles aliasing. The idea is to implement direct updates to the PDG that are analogous to the changes on the program text. The downsides to direct update are that it is application-specific, applies only to semantically restricted applications like restructuring, and may be more complex. The choice between the two techniques requires an understanding of the current and future needs of the tool's users. This paper describes the direct approach of updating the PDG and related representations for restructuring, provides techniques for managing its complexity, critiques its advantages and shortcomings relative to generic incremental update, and presents performance results.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tarr:1993:POM, author = "Peri Tarr and Lori A. Clarke", title = "{PLEIADES}: an object management system for software engineering environments", journal = j-SIGSOFT, volume = "18", number = "5", pages = "56--70", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167065", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software engineering environments impose challenging requirements on the design and implementation of an object management system. Existing object management systems have been limited in both the kinds of functionality they have provided and in the models of support they define. This paper describes a system, called PLEIADES, which provides many of the object management capabilities required to support software engineering environments.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cai:1993:TIP, author = "Jiazhen Cai and Robert Paige", title = "Towards increased productivity of algorithm implementation", journal = j-SIGSOFT, volume = "18", number = "5", pages = "71--78", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167067", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper reports experimental results that support the feasibility of a new transformational approach developed by the authors for implementing complex algorithms correctly and efficiently. The class of algorithms amenable to our methods includes nonnumerical graph algorithms. Experiments were performed to measure how this approach affects productivity (in terms of the number of source lines in the implementation divided by manual programming time) and running times. Comparative benchmarks showed that productivity can be increased over a conventional ad hoc approach by factors ranging from 5.1 to 9.9 Preliminary results also showed that the running time of C code produced by this new approach can be as fast as 1.5 times that of tightly coded high quality Fortran.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wood:1993:PAS, author = "Kenneth R. Wood", title = "A practical approach to software engineering using Z and the refinement calculus", journal = j-SIGSOFT, volume = "18", number = "5", pages = "79--88", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167068", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present a methodology for the formal specification and development of software systems using Z and the refinement calculus. The methodology combines the data structuring capabilities and the codified discrete mathematics of Z with the data encapsulation properties and development style of the refinement calculus, and it aims to provide a formal path from design to implementation without unnecessary transformations of notation or the definition of a new calculus. It is illustrated here by the development of two systems, a simply diary and (part of) a text editor, and is contrasted with the use of Z on its own. We discuss related and future work and conclude with some general comments on applied formal methods.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Carrington:1993:DMD, author = "David Carrington and David Duke and Ian Hayes and Jim Welsh", title = "Deriving modular designs from formal specifications", journal = j-SIGSOFT, volume = "18", number = "5", pages = "89--98", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167066", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We consider the problem of designing the top-level modular structure of an implementation. Our starting point is a formal specification of the system. Our approach is to analyse the references to the state variables by the operations of the system. Operations that reference/modify similar sets of variables are likely candidates for grouping into a module. We evaluate the strategy by applying it to a large Z specification of a language-based editor.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lutz:1993:TSR, author = "Robyn R. Lutz", title = "Targeting safety-related errors during software requirements analysis", journal = j-SIGSOFT, volume = "18", number = "5", pages = "99--106", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167069", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper provides a Safety Checklist for use during the analysis of software requirements for spacecraft and others safety-critical, embedded systems. The checklist specifically targets the two most common causes of safety-related software errors: (1) inadequate interface requirements and (2) discrepancies between the documented requirements and the requirements actually needed for correct functioning of the system. The analysis criteria represented in the checklist are evaluated by application to two spacecraft projects. Use of the checklist to enhance the software-requirements analysis is shown to reduce the number of safety-related software errors.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Votta:1993:DEI, author = "Lawrence G. {Votta, Jr.}", title = "Does every inspection need a meeting?", journal = j-SIGSOFT, volume = "18", number = "5", pages = "107--114", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167070", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "At each step in large software development, reviewers carry out inspections to detect faults. These inspections are usually followed by a meeting to collect the faults that have been discovered. However, we have found that these inspection meetings are not as beneficial as managers and developers think they are. Even worse, they cost much more in terms of products development interval and developer's time than anyone realizes. Analysis of the inspection and collection process leads us to make the following suggestions. First, at the least, the number of participants required at each inspection meeting should be minimized. Second, we propose two alternative fault collection methods, either of which would eliminate the inspection meetings altogether: (a) collect faults by deposition (small face-to-face meetings of two or three persons), or (b) collect faults using verbal or written media (telephone, electronic mail, or notes). We believe that such a change in procedure would increase efficiency by reducing production times without sacrificing product quality.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cheung:1993:ECR, author = "S. C. Cheung and J. Kramer", title = "Enhancing compositional reachability analysis with context constraints", journal = j-SIGSOFT, volume = "18", number = "5", pages = "115--125", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167071", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Compositional techniques have been proposed for traditional reachability analysis in order to introduce modularity and to control the state explosion problem. While modularity has been achieved, state explosion is still a problem. Indeed, this problem may even be exacerbated as a locally minimised subsystem may contain many states and transitions forbidden by its context or environments. This paper presents a method to alleviate this problem effectively by including context constraints in local subsystem minimisation. The global behaviour generated using the method is observationally equivalent to that generated by compositional reachability analysis without the inclusion of context constraints. Context constraints, specified as interface processes, are restrictions imposed by the environment on subsystem behaviour. The minimisation produces a simplified machine that describes the behaviour of the subsystem constrained by its context. This machine can also be used as a substitute for the original subsystem in the subsequent steps of the compositional reachability analysis. Interface processes capturing context constraints can be specified by users or automatically constructd using a simple algorithm. The concepts in the paper are illustrated with a clients/server system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bahsoun:1993:FPF, author = "Jean Paul Bahsoun and Stephan Merz and Corinne Servieres", title = "A framework for programming and formalizing concurrent objects", journal = j-SIGSOFT, volume = "18", number = "5", pages = "126--137", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167072", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We propose an object-oriented programming model based on concurrently executing communicating agents which aims to achieve reusability and extensibility of agent descriptions by separating aspects of functionality and synchronization. A formal semantics of an agent is given as a theory in the Temporal Logic of Actions [15] such that a system of agents is formalized by the conjunction of the single agents' specifications plus some axioms representing the communication structure. This representation allows for the formal derivation of systems properties. We terminate this paper by a discussion about the proof of inheritance properties in a parallel environment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Turpin:1993:LAD, author = "Russell Turpin", title = "A logical approach to data structures", journal = j-SIGSOFT, volume = "18", number = "5", pages = "138--148", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167073", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Galois project at the University of Texas is building a programming environment that supports the formal development and verification of data structure programs. This programming environment supports features such as pointer manipulation and destructive update that often make formal treatment difficult.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bergadano:1993:TCG, author = "F. Bergadano", title = "Test case generation by means of learning techniques", journal = j-SIGSOFT, volume = "18", number = "5", pages = "149--162", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167074", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Given a program P and a set of alternative programs P, we generate a sequence of test cases that are adequate, in the sense that they distinguish the given program from all alternatives. The method is related to fault-based approaches to program testing, but programs in P need not be simple mutations of P. The technique for generating an adequate test set is based on the inductive learning of programs from finite sets of input-output examples: given a partial test set, we generate inductively a program P' E P which is consistent with P on those input values; then we look for an input value that distinguishes P from P', and repeat the process until no program except P can be induced from the generated examples. We show that the so obtained test set is adequate w.r.t. the alternatives belonging to P. The method is made possible by a practical program induction procedure, which has evolved from recent research in Machine Learning and Inductive Logic Programming.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gustafson:1993:SMS, author = "David A. Gustafson and Joo T. Tan and Perla Weaver", title = "Software measure specification", journal = j-SIGSOFT, volume = "18", number = "5", pages = "163--168", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167075", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper introduces the model-order-mapping (MOM) approach for specifying software/document measures. A MOM specification requires that the important attributes of the document be identified, a model that captures the attributes be chosen, and a mapping from the document to the model be specified. A partial ordering on the model must be developed as well as an order-preserving mapping from the model to an answer set. The relationship of the approach to measurement theory is shown. Validation of the MOM specification is presented. Properties of software measures that are guaranteed by a validated MOM specification and those that can be proved from a validated specification are described.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Podgurski:1993:PTS, author = "Andy Podgurski and Charles Yang", title = "Partition testing, stratified sampling, and cluster analysis", journal = j-SIGSOFT, volume = "18", number = "5", pages = "169--181", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167076", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present a new approach to reducing the manual labor required to estimate software reliability. It combines the ideas of partition testing methods with those of stratified sampling to reduce the sample size necessary to estimate reliability with a given degree of precision. Program executions are stratified by using automatic cluster analysis to group those with similar features. We describe the conditions under which stratification is effective for estimating software reliability, and we present preliminary experimental results suggesting that our approach may work well in practice.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zaremski:1993:SMK, author = "Amy Moormann Zaremski and Jeannette M. Wing", title = "Signature matching: a key to reuse", journal = j-SIGSOFT, volume = "18", number = "5", pages = "182--190", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167077", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software reuse is only effective if it is easier to locate (and appropriately modify) a reusable component than to write it from scratch. We present signature matching as a method for achieving this goal by using signature information easily derived from the component. We consider two kinds of software components, functions and modules, and hence two kinds of matching, function matching and module matching. The signature of a function is simply its type; the signature of a module is a multiset of user-defined types and a multiset of function signatures. For both functions and modules, we consider not just exact match, but also various flavors of relaxed match. We briefly describe an experimental facility written in Standard ML for performing signature matching over a library of ML functions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Batory:1993:SSL, author = "Don Batory and Vivek Singhal and Marty Sirkin and Jeff Thomas", title = "Scalable software libraries", journal = j-SIGSOFT, volume = "18", number = "5", pages = "191--199", month = dec, year = "1993", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/167049.167078", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:50 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Many software libraries (e.g., the Booch C++ Components, libg++, NIHCL, COOL) provide components (classes) that implement data structures. Each component is written by hand and represents a unique combination of features (e.g. concurrency, data structure, memory allocation algorithms) that distinguishes it from other components. We argue that this way of building data structure component libraries is inherently unscalable. Libraries should not enumerate complex components with numerous features; rather, libraries should take a minimalist approach: they should provide only primitive building blocks and be accompanied by generators that can combine these blocks to yield complex custom data structures. In this paper, we describe a prototype data structure generator and the building blocks that populate its library. We also present preliminary experimental results which suggest that this approach does not compromise programmer productivity nor the run-time performance of generated data structures.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1994:IRP, author = "Peter G. Neumann", title = "Illustrative risks to the public in the use of computer systems and related technology", journal = j-SIGSOFT, volume = "19", number = "1", pages = "16--29", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181612", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kilov:1994:UHL, author = "Haim Kilov", title = "On understanding hypertext: are links essential?", journal = j-SIGSOFT, volume = "19", number = "1", pages = "30", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181614", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kontogiannis:1994:REQ, author = "Kostas A. Kontogiannis and Scott R. Tilley", title = "Reverse engineering questionnaire", journal = j-SIGSOFT, volume = "19", number = "1", pages = "31--38", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181615", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This is a questionnaire on program understanding and reverse engineering. It may be filled out manually or on-line. The results of the questionnaire will be used to guide the research of the two authors, both of whom are Ph.D. students working in this area. Copies of the resulting report will be mailed to all who participate, and a summary of the results will be published in an appropriate forum.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lea:1994:CAI, author = "Doug Lea", title = "{Christopher Alexander}: an introduction for object-oriented designers", journal = j-SIGSOFT, volume = "19", number = "1", pages = "39--46", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181617", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Apte:1994:PMS, author = "Kishor Apte", title = "Problem management system: experience and insights", journal = j-SIGSOFT, volume = "19", number = "1", pages = "53--54", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181619", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Poulin:1994:WAW, author = "Jeff Poulin and Will Tracz", title = "{WISR'93: 6th Annual Workshop on Software Reuse}: summary and working group reports", journal = j-SIGSOFT, volume = "19", number = "1", pages = "55--71", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181620", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sefcik:1994:CSF, author = "John G. Sefcik", title = "Critical success factors for implementing software quality plans", journal = j-SIGSOFT, volume = "19", number = "1", pages = "72--74", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181622", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mamone:1994:ISS, author = "Salvatore Mamone", title = "The {IEEE} standard for software maintenance", journal = j-SIGSOFT, volume = "19", number = "1", pages = "75--76", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181623", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Maintenance, traditionally the last phase of the Software Life Cycle, is usually overlooked, under documented, and never appreciated. Maintenance is usually thought of as ``something that's done after the work is done'' and is usually delegated to junior programmers. As a result the modified system can many times contain more defects that the original system. This article will describe the Software Maintenance Standard and how it can provide the foundation for better control of Maintenance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Roche:1994:SMM, author = "John M. Roche", title = "Software metrics and measurement principles", journal = j-SIGSOFT, volume = "19", number = "1", pages = "77--85", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181625", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software measurement is widely advocated as a fundamental constituent of an engineering approach to planning and controlling software development. Unfortunately, there is a dichotomy between the quantity of developed metrics and those used. This paper provides a tutorial review of software engineering measurement indicating the depth and breadth of the field. Individual metrics are not described due to the interest of this paper being on the measurement process and not the products of that process. Generic problems have been identified within existing measurement processes, these provide learning points for the expression of measurement principles. These principles are classified and described according to their position within the formulation, analysis and application stages of measurement. Conclusions are elaborated that suggest that existing measurement frameworks for applying measurement --- often called measurement methods --- do not provide sufficient support for the principles and their continued use will only serve to replicate the problems. In order to improve the products i.e. metrics, the measurement process requires improvement through inclusion of these principles in a new method.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sharma:1994:FDC, author = "Anil Sharma", title = "Framework to define {CASE} tool requirements for distributed environment", journal = j-SIGSOFT, volume = "19", number = "1", pages = "86--89", month = jan, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181610.181627", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we develop a framework for requirements definition for a CASE tool which cover all phases of software development life cycle. The resulting requirements are driven through set objectives. Since trend is toward distributed workstation based CASE tools, we would specifically focus on CASE tool requirements for heterogeneous network. These requirement are illustrative and require fine tuning for a specific organisation. But these can be used as a general framework to develop detailed requirement definition. These requirements become the part of general process of evaluating a CASE tool and can be used for example to develop 'Evaluation Check List'. Moreover requirements definitions is not aimed at conceiving a new CASE tool but addresses the issue of what to look for when selecting a CASE tool among many existing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Saradhi:1994:REI, author = "Motamarri Saradhi", title = "Re-Engineer: If It Wasn't Engineered!", journal = j-SIGSOFT, volume = "19", number = "2", pages = "17", month = apr, year = "1994", CODEN = "SFENDP", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garg:1994:SAB, author = "Pankaj K. Garg and Mehdi Jazayeri", title = "Selected, annotated bibliography on process-centered software engineering environments", journal = j-SIGSOFT, volume = "19", number = "2", pages = "18--21", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181630", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Marovac:1994:GES, author = "Nenad Marovac", title = "Guidelines for embedded software documentation", journal = j-SIGSOFT, volume = "19", number = "2", pages = "22--28", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181632", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Embedded program documentation, i.e. documentation included in computer programs within program comments, typically does not follow any formal standards or conventions with regards to its contents and structure. Software development organizations do not enforce any standards covering the information content or format of the embedded documentation. At best they may encourage the use of some proprietary rules. It is very common in such organizations that individual programmers have their own individual documentation styles. This is unfortunate since embedded documentation, containing proper information and being properly structured, can greatly assist us in reading and understanding software programs and their individual components during the maintenance of these programs or reuse of their components. Furthermore, the use of embedded documentation can assist in functional decomposition and design of computer programs and in ensuring the consistency of interfaces within programs. The purpose of this document is to report on the schema we use at San Diego State University in software projects and to propose guidelines regarding documentation embedded in computer programs and related documents. We believe that these guidelines will help us to maintain conformity in software documentation in programs developed at SDSU in Software Engineering and MultiMedia Labs. Furthermore, we have developed tools that are based on the proposed embedded documentation and that are used in four areas:1. interactive functional decomposition and design of programs2. automatic incorporation of submitted software into reuse libraries3. conversion of developed software into hypertext like structures that are used to maintain all material related to a software project in a form suitable for inspection, browsing, and updating4. automatic generation of software documentation on demand", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tomic:1994:PAO, author = "Marijana Tomic", title = "A possible approach to object-oriented reengineering of {Cobol} programs", journal = j-SIGSOFT, volume = "19", number = "2", pages = "29--34", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181633", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Reengineering is rapidly becoming a recognized and important component of future computer-aided systems-engineering (CASE) environment. This paper presents framework for analyzing Object-Oriented Reengineering process of COBOL programs. The process embody software engineering principles that concern module interactions such as low coupling and high cohesion.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ponder:1994:PCH, author = "Carl Ponder and Bill Bush", title = "Polymorphism considered harmful", journal = j-SIGSOFT, volume = "19", number = "2", pages = "35--37", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181635", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Davis:1994:CPM, author = "Alan M. Davis and Pradip Sitaram", title = "A concurrent process model of software development", journal = j-SIGSOFT, volume = "19", number = "2", pages = "38--51", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181637", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Most published software development models present software engineering as a series of discrete phases. They often capture the ``inevitable intertwining'' of pairs of phases and they often capture the need to return to earlier phases when new information is ascertained. However, in actual software development projects, activities typically associated with multiple phases are performed concurrently. This paper presents a new model of the software development process that effectively captures the concurrency among activities that is in berent in all non-trivial software development. Statecharts are used to present the model.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1994:DSS, author = "Will Tracz", title = "Domain-specific software architecture {(DSSA)} frequently asked questions {(FAQ)}", journal = j-SIGSOFT, volume = "19", number = "2", pages = "52--56", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181639", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Advanced Research Projects Agency's Domain-Specific Software Architecture (DSSA) Project has been the focal point of much interest in the software engineering community. This paper provides a list of ``Frequently Asked Questions'' (FAQ)$^1$. For a more thorough treatment of DSSA, the reader should consult ``Architecture-Based Acquisition and Development of Software: Guidelines and Recommendations from the ARPA Domain-Specific Software Architecture (DSSA) Program'' by Dr. Frederick Hayes-Roth (see address below).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cheng:1994:RBS, author = "Jingwen Cheng", title = "A reusability-based software development environment", journal = j-SIGSOFT, volume = "19", number = "2", pages = "57--62", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181641", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software reuse has great potential to improve software development productivity. However, it has had only limited success in practice. This is because that there are non technical factors as well technical ones affecting software reusability. This paper discusses some problems related to software reuse, analyzes some technical supports for software reuse, and introduces a reusability-based software development system which has been prototyped and is under further improvement. The prominent features of the system include: allowing programmers dynamically to put tested working program components (including data objects created at run-times) into the reusable software library, helping programmers produce software specifications, automatically searching for the required components according to users' queries, assisting users to make a query, and allowing users to select the retrieved components and browse their specifications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Henry:1994:DWR, author = "Joel Henry and Bob Blasewitz", title = "Do we really need {SQA} to produce quality software?: no! well maybe. it depends. yes!", journal = j-SIGSOFT, volume = "19", number = "2", pages = "63--64", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181642", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gorecki:1994:YCS, author = "Andrzej Tomasz Gorecki", title = "Is your computer system sub-critical?", journal = j-SIGSOFT, volume = "19", number = "2", pages = "65--67", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181643", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Favaro:1994:ESS, author = "John Favaro and Yves Coene and Marco Casucci", title = "The {European} Space Software Development Environment Reference Facility Project: a status report", journal = j-SIGSOFT, volume = "19", number = "2", pages = "68--71", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181644", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The ESSDE Reference Facility Project, whose goal is to provide a uniform, open environment for software development at the European Space Agency (ESA), has just completed the architectural design phase. A software engineering environment based upon the Portable Common Tool Environment (PCTE) interfaces has been specified, including a complete data model supporting all activities and products in the ESA standard software development life cycle. Several issues of much current interest have been addressed including scalability, configurability and the integration of commercial tools into an existing framework.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jankowski:1994:FCS, author = "David J. Jankowski", title = "The feasibility of {CASE} structured analysis methodology support", journal = j-SIGSOFT, volume = "19", number = "2", pages = "72--82", month = apr, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/181628.181645", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:52 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Feather:1994:SSI, author = "Martin S. Feather and Axel van Lamsweerde", title = "Succeedings of the {Seventh International Workshop on Software Specification and Design}", journal = j-SIGSOFT, volume = "19", number = "3", pages = "18--22", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182826", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dyadkin:1994:MP, author = "Lev J. Dyadkin", title = "Multibox parsers", journal = j-SIGSOFT, volume = "19", number = "3", pages = "23--25", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182827", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/fortran3.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Traditional compiler front end generating tools such as Lex/Yacc assume a front end consisting of two boxes: a lexical box and a syntax box. Lex produces a lexical analyzer using regular expressions as a token description. Yacc generates a syntax analyzer from the LALR grammar for the parsed language. This approach has big problems with such lexically and syntactically complex languages as Fortran. The main reason for these problems is that regular expressions, being equivalent to a right linear grammar, do not have the capability to describe the incredibly complex lexical structure of Fortran. As a result, compiler writers abandon Lex and produce handwritten lexers for Fortran, thus defeating the main purpose of the parser generator, automation. This work solves these problems by introducing a multibox parser, where each lower box modifies its input language to produce a more ``straightened'' output language for the higher box. The number of boxes reflects the complexity of the parsed language. For example, Fortran requires more boxes than does C. Each box is represented by an L-attributed translation grammar in simple assignment form with an LL(1) input grammar. LL(1) grammars were chosen for higher speed, smaller size, and because, unlike regular expressions, they can express constructs such as nested parentheses, a capability which is required for parsing Fortran on the lexical level. New operations for the LL(1) machine are added to ensure it is strictly forward moving, without backtracking in the parsed source code. We have extended the LL(1) grammars to ``indexed LL(1) grammars.''This enhancement allows more of the resulting code to be automatically generated, rather than handwritten. New parser generating tools have been developed by us to support this technology. The multibox approach has been implemented in the Lahey Fortran 90 compiler.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cherry:1994:VSE, author = "George W. Cherry", title = "Visual software engineering with rules", journal = j-SIGSOFT, volume = "19", number = "3", pages = "26--29", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182828", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bourque:1994:ISR, author = "Pierre Bourque and Alain Abran", title = "An innovative software reengineering tools workshop --- a test of market maturity and lessons learned", journal = j-SIGSOFT, volume = "19", number = "3", pages = "30--34", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182829", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Practitioners still feel ill at ease regarding an evaluation process for reengineering tools. To address this issue, a Qu{\'e}bec-based special interest group in software engineering reused a case study workshop format that had been previously implemented to compare CASE products. This case study format had to be substantially modified to allow both vendors and participants to properly position the reengineering tools. For example, the workshop committee had to prepare reengineering frameworks, including a taxonomy of tools as well as legacy system selection criteria for the case study. This article also reports on the challenges met during the project as well as lessons learned: within a context of an immature reengineering market, the time has not yet come for a full real-life case study at an acceptable economic cost.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zucconi:1994:ICR, author = "Lin Zucconi", title = "Issues concerning re-engineering of legacy software in the federal {R\&D} environment", journal = j-SIGSOFT, volume = "19", number = "3", pages = "35", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182831", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vazquez:1994:ICD, author = "Federico Vazquez", title = "Identification of complete data flow diagrams", journal = j-SIGSOFT, volume = "19", number = "3", pages = "36--40", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182832", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Structure Design is generated with Data Flow Diagrams (DFD). DFD have been used for more than ten years, and they are still popular. The main drawback of DFD is the lack of mathematical foundation. The great demand for bigger and more sophisticated computer systems makes necessary the formulation of a formal theory for DFD. This theory will provide a way of checking consistency and completeness. Universal Algebra has become a useful and important tool in theoretical computer science. Universal Algebra is used in this paper to represent DFD, to generate DFD, to prove consistency and completeness and to define complete DFD. A process decomposition is defined in strict mathematical way; the famous Birkoff's Variety Theorem is used to prove consistency in the process decomposition; a definition of minimal DFD is given; a relation between Universal Algebra concepts and DFD is defined; and a definition of complete (well-defined) DFD is given. The DFD are defined using basic concepts of Universal Algebra theory. The results from this paper can be incorporated in any of the CASE tools used to generate DFD.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kilov:1994:FMS, author = "Haim Kilov", title = "Formal methods and standards", journal = j-SIGSOFT, volume = "19", number = "3", pages = "40", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182833", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Juell:1994:SNR, author = "Paul Juell and Daniel Brekke and Ronald Vetter and John Wasson", title = "Storage and network requirements of a low-cost computer-based virtual classroom", journal = j-SIGSOFT, volume = "19", number = "3", pages = "41--44", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182834", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we investigate the network and storage requirements of a virtual classroom. The virtual classroom replaces traditional class methodologies by using the computer as the sole instrument for all class activity. The instructor and the students each have a networked workstation in an X cluster that provides for the creation, modification, and distribution of presentations, note-taking, capturing of presentation material, out-of-class reviewing of presentation material, and viewing of supplemental materials provided by the instructor (including selected readings, exams, and assignments). We have designed and implemented an virtual classroom as a means of enhancing the teaching/learning process. The creation of this virtual classroom was accomplished by using only existing computing resources: SUN workstations, X tools, an Ethernet network, and UNIX operating system support. Network statistics were collected to determine how well existing networks can be utilized within this environment. We also observed the performance of the system in a realistic setting by using it to teach an Office Information Systems class at North Dakota State University.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Slovin:1994:EEE, author = "Malcolm Slovin and Donn {Di Nunno}", title = "Engineering the enterprise: evolving quality systems", journal = j-SIGSOFT, volume = "19", number = "3", pages = "45--47", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182836", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Aggarwal:1994:MFS, author = "K. K. Aggarwal and Yogesh Singh", title = "A modified form of software science measures", journal = j-SIGSOFT, volume = "19", number = "3", pages = "48--50", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182837", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In attempting to describe the quality of computer software, one of the most frequently mentioned measurable attributes is the complexity of the flow of control. During the past several years, there have been many attempts to quantify this aspect of computer program, approaching the problem from such diverse points of view as graph theory and software science. Existing software science provides a general measure of program complexity, but it fails to adequately quantify program control flow complexity except for the linearization issue. In this paper, weights are assigned to the operators and operands which are part of the control structures. Although similar type of approach was used by Ramamurthy \& Melton for few control structures, there was a need for a generalized approach and this paper is an attempt in this direction.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dedene:1994:MRM, author = "G. Dedene and M. Snoeck", title = "{M.E.R.O.DE.}: a model-driven entity-relationship object-oriented Development method", journal = j-SIGSOFT, volume = "19", number = "3", pages = "51--61", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182838", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Object Orientation has as primary goal to improve the software construction process. Object Oriented analysis, design and software construction should yield software of a high quality: software that is reliable, maintainable, extensible, adaptable. However, delivering large OO software systems in a qualitative way is a significant challenge. Scaling up requires formal precision of the semantics of the modelling techniques and languages used by the development team. And when the target system contains an abundance of parallelism, the problem of validation becomes unfeasible if it is not supported by formal techniques. With the incorporation of formal techniques in the development process, we can expect significant benefits in terms of software quality. For this reason, one might expect a high level of formality in current OOAD methods [9]. Unfortunately, most current OOAD methods are characterised by a low level of formality. The M.E.R.O.DE. methodology addresses this void. By making use of algebra, the methodology has been provided with a formal basis at several levels with a significant improvement of the quality of the software development process as a result. Before presenting M.E.R.O.DE. to the reader in the second section, the first section motivates the development of still another OOA method. The final section demonstrates how exactly the formal definition of M.E.R.O.DE. results in a gain of quality at the software specification level.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Castano:1994:FRE, author = "Silvana Castano and Valeria {De Antonellis}", title = "The F3 reuse environment for requirements engineering", journal = j-SIGSOFT, volume = "19", number = "3", pages = "62--65", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182839", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The F$^3$ reuse environment for supporting the Requirements Engineering process is illustrated and discussed in the paper. In particular, an overview of our approach for building reusable components from existing requirements and for exploiting them in the development of new applications is presented. The approach is based on classification techniques to facilitate extraction of reusable components, and on transformation techniques to support composition of reusable components.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fuggetta:1994:ABS, author = "Alfonso Fuggetta and Gian Pietro Picco", title = "An annotated bibliography on software process improvement", journal = j-SIGSOFT, volume = "19", number = "3", pages = "66--68", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182841", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software process improvement is a critical problem that is currently addressed both at the academic and industrial level. The field is relatively young, and there is no ``ultimate approach'' to the problem. The related scientific literature is rapidly growing, and is more and more difficult to make our way in the plethora of different perspectives, approaches, and case studies. This paper provides a guide to the process improvement literature: we think that both newbies and experts of this field can take advantage from it.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gossain:1994:USM, author = "Sanjiv Gossain", title = "Using the {Shlaer--Mellor} method to support a level 4 software process", journal = j-SIGSOFT, volume = "19", number = "3", pages = "69--74", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182842", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hayes:1994:UDB, author = "I. J. Hayes and C. B. Jones and J. E. Nicholls", title = "Understanding the differences between {VDM} and Z", journal = j-SIGSOFT, volume = "19", number = "3", pages = "75--81", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182843", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper attempts to provide an understanding of the interesting differences between two well-known specification languages.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rolling:1994:PAB, author = "Walter A. Rolling", title = "A preliminary annotated bibliography on domain engineering", journal = j-SIGSOFT, volume = "19", number = "3", pages = "82--84", month = jul, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/182824.182844", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:53 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pfleeger:1994:DAS, author = "Shari Lawrence Pfleeger", title = "Design and analysis in software engineering: the language of case studies and formal experiments", journal = j-SIGSOFT, volume = "19", number = "4", pages = "16--20", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190680", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sitariman:1994:CBS, author = "Marulli Sitariman and Bruce Weide", title = "Component-based software using {RESOLVE}", journal = j-SIGSOFT, volume = "19", number = "4", pages = "21--22", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.199221", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "The first author may be correctable to ``Murali Sitaraman''.", } @Article{Ogden:1994:PRF, author = "William F. Ogden and Murali Sitaraman and Bruce W. Weide and Stuart H. Zweben", title = "Part I: the {RESOLVE} framework and discipline: a research synopsis", journal = j-SIGSOFT, volume = "19", number = "4", pages = "23--28", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190681", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Edwards:1994:PIS, author = "Stephen H. Edwards and Wayne D. Heym and Timothy J. Long and Murali Sitaraman and Bruce W. Weide", title = "{Part II}: specifying components in {RESOLVE}", journal = j-SIGSOFT, volume = "19", number = "4", pages = "29--39", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190682", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bucci:1994:PII, author = "Paolo Bucci and Joseph E. Hollingsworth and Joan Krone and Bruce W. Weide", title = "{Part III}: implementing components in {RESOLVE}", journal = j-SIGSOFT, volume = "19", number = "4", pages = "40--51", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190683", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hollingsworth:1994:PIR, author = "Joseph E. Hollingsworth and Sethu Sreerama and Bruce W. Weide and Sergey Zhupanov", title = "{Part IV}: {RESOLVE} components in {Ada} and {C++}", journal = j-SIGSOFT, volume = "19", number = "4", pages = "52--63", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190684", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Edwards:1994:PVA, author = "Stephen H. Edwards", title = "Part V: annotated bibliography of {RESOLVE} research", journal = j-SIGSOFT, volume = "19", number = "4", pages = "64--67", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190685", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Terry:1994:OTD, author = "Allan Terry and Frederick Hayes-Roth and Lee Erman and Norman Coleman and Mary Devito and George Papanagopoulos and Barbara Hayes-Roth", title = "Overview of {Teknowledge}'s domain-specific software architecture program", journal = j-SIGSOFT, volume = "19", number = "4", pages = "68--76", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190686", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As part of the ARPA DSSA program, we are developing a methodology and integrating a suite of supporting tools to help specify, design, validate, package and deploy distributed intelligent control and management (DICAM) applications. Our domain of specialization is vehicle management systems, and our near-term focus is on advanced artillery systems. To attain higher levels of performance and functionality while reducing the time and cost required for development, we are recommending a generic control architecture suitable for use as a single intelligent agent or as multiple cooperating agents. This reference architecture combines a task-oriented domain controller with a meta-controller that schedules activities within the domain controller. The domain controller provides functions for model-based situation assessment and planning, and inter-controller communication. Typically, these functions are performed by components taken from a repository of reusable software. In tasks that are simple, deterministic or time-stressed, the modules may be complied into or replaced by conventional control algorithms. In complex, distributed, cooperative, non-deterministic or unstressed situations, these modules will usually exploit knowledge-based reasoning and deliberative control. To improve the controller development process, we are combining many of the best ideas from software engineering and knowledge engineering in a software environment. This environment includes a blackboard-like development workspace to represent both the software under development and the software development process itself. In this workspace, controllers are realized by mapping requirements into specializations of the reference architecture. The workspace also provides mechanisms for triggering applications of software tools, including knowledge-based software design assistants. We are currently in the third year of a five-year program. In conjunction with our collaborators at ARDEC, we have produced a schema for describing architectures which is being used by ARDEC's community of contractors, by an ARPA architecture specification project for the Joint Task Force ATD, and by the Stanford Knowledge Systems Laboratory. We have released the second major version of our development environment, which is being used at ARDEC and in support of this ARPA architecture specification program. This version of the development environment is focused on initial requirements, architecture, and design. It provides both CASE-like editing of architectures and textual browsing/editing of repository descriptions expressed in the schema mentioned above. In the remaining years of the program we will be expanding the suite of tools and improving the methodologies required to build intelligent, distributed, hybrid controllers capable of spanning multiple levels of organization and system hierarchy. This technology holds considerable promise for near-term value, and the associated methodology provides a candidate approach for realizing the goals of mega-programming practice in control software. In assessing this prospect, we discuss some of the remaining shortfalls in both methodology and tools that require additional research and development.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gelperin:1994:PIM, author = "David Gelperin", title = "The power of integrated methods", journal = j-SIGSOFT, volume = "19", number = "4", pages = "77--78", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190687", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Improving software quality is easy. Just do three things: (1) Insert fewer bugs, (2) Find them earlier, and (3) Find more of them. Modern test and evaluation methods are very effective at all three. What is even more effective is to integrate these methods into a modern T\&E process and to integrate this process with acquisition and development methods into a software engineering program. Integration multiplies the impact of effective methods and is a major theme in modern approaches. On most projects, developers are responsible for testing as well as designing, and coding the software components. For a new component or change to an existing component, one person usually carries out all software engineering tasks. This note describes an activity sequence that is very effective at both avoiding and detecting defects when a single individual does all the software engineering. The order as well as the specific tasks in this sequence is important in maximizing effectiveness. Understanding the principals behind this process will make it easy to modify when more than one person is assigned to the development of a sinle component.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zelkowitz:1994:AMR, author = "Marvin V. Zelkowitz", title = "Algebra and models (and reality)", journal = j-SIGSOFT, volume = "19", number = "4", pages = "79--81", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190688", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Billard:1994:QSG, author = "Edward A. Billard and Alice E. Riedmiller", title = "{Q-Sim}: a {GUI} for a queueing simulator using {Tcl\slash Tk}", journal = j-SIGSOFT, volume = "19", number = "4", pages = "82--85", month = oct, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/190679.190689", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:55 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A design and implementation are presented for a graphical user interface to a batch queueing simulator, illustrating the benefits of using a high-level script language. Rapid development was made possible with the use of Tcl/Tk scripts to implement the entire interface. The script implements a dynamic display of job and queue movement along with graphs of statistical behaviors. A message system is used to control the interaction between the human interface and the batch simulator.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jackson:1994:NMP, author = "Daniel Jackson and Eugene J. Rollins", title = "A new model of program dependences for reverse engineering", journal = j-SIGSOFT, volume = "19", number = "5", pages = "2--10", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195281", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A dependence model for reverse engineering should treat procedures in a modular fashion and should be fine-grained, distinguishing dependences that are due to different variables. The program dependence graph (PDG) satisfies neither of these criteria. We present a new form of dependence graph that satisfies both, while retaining the advantages of the PDG: it is easy to construct and allows program slicing to be implemented as a simple graph traversal. We define 'chopping', a generalization of slicing that can express most of its variants, and show that, using our dependence graph, it produces more accurate results than algorithms based directly on the PDG.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Reps:1994:SS, author = "Thomas Reps and Susan Horwitz and Mooly Sagiv and Genevieve Rosay", title = "Speeding up slicing", journal = j-SIGSOFT, volume = "19", number = "5", pages = "11--20", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195287", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Program slicing is a fundamental operation for many software engineering tools. Currently, the most efficient algorithm for interprocedural slicing is one that uses a program representation called the system dependence graph. This paper defines a new algorithm for slicing with system dependence graphs that is asymptotically faster than the previous one. A preliminary experimental study indicates that the new algorithm is also significantly faster in practice, providing roughly a 6-fold speedup on examples of 348 to 757 lines.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mashayekhi:1994:CCA, author = "Vahid Mashayekhi and Chris Feulner and John Riedl", title = "{CAIS}: collaborative asynchronous inspection of software", journal = j-SIGSOFT, volume = "19", number = "5", pages = "21--34", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195290", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Many software engineering tasks have a synchronous component that requires the participants to assemble together at the same time and place. This approach is expensive in terms of traveling, scheduling and human resources. Existing computer tools mitigate these constraints by adding structure to the meeting, providing on-line document support, and distributing the participants over geographic boundaries. The constraint remains, however, that all participants participate at the same time. We propose relaxing the time constraint in software engineering tasks to resolve issues non-concurrently, in effect reducing (and in some cases eliminating) the need for the synchronous meeting. We hypothesize that support for asynchrony will enable software engineering teams to work together as effectively in different times as in same time. We have chosen software inspection as our candidate software engineering task because it is well-understood, highly-structured, and widely-practiced. We have designed and developed a Collaborative Asynchronous Inspection of Software (CAIS) meeting prototype that supports the meeting part of inspection. CAIS allows participants to effectively ``meet'' even when separated by time zones and working schedules. We have conducted a pilot study comparing the manual and CAIS meetings and present our results and lessons learned.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cece:1994:DIL, author = "G{\'e}rard C{\'e}c{\'e} and Alain Finkel and S. Purushothaman Iyer", title = "Duplication, insertion and lossiness errors in unreliable communication channels", journal = j-SIGSOFT, volume = "19", number = "5", pages = "35--43", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195292", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We consider the problem of verifying correctness of finite state machines that communicate with each other over unbounded FIFO channels that are unreliable. Various problems regarding verification of FIFO channels that can lose messages have been considered by Finkel [10], and by Abdulla and Johnson [1, 2]. We consider, in this paper, other possible unreliable behaviors of communication channels, viz. (a) duplication and (b) insertion errors. Furthermore, we also consider various combinations of duplication, insertion and lossiness errors. Finite state machines that communicate over unbounded FIFO buffers is a model of computation that forms the backbone of ISO standard protocol specification languages Estelle and SDL. While an assumption of a perfect communication medium is reasonable at the higher levels of the OSI protocol stack, the lower levels have to deal with an unreliable communication medium; hence our motivation for the present work. The verification problems that are of interest are reachability, unboundedness, deadlock, and model-checking against CTL. All of these problems are undecidable for machines communicating over reliable unbounded FIFO channels. So, it is perhaps surprising that some of these problems become decidable when unreliable channels are modeled. The contributions of this paper are: (a) An investigation of solutions to these problems for machines with insertion errors, duplication errors, or a combination of duplication, insertion and lossiness errors, and (b) A comparison of the relative expressive power of the various errors.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Abowd:1994:ISE, author = "Gregory D. Abowd and Alan J. Dix", title = "Integrating status and event phenomena in formal specifications of interactive systems", journal = j-SIGSOFT, volume = "19", number = "5", pages = "44--52", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195293", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we investigate the appropriateness of formal specification languages for the description of user interface phenomena. Specifically, we are concerned with the distinction between continuously available information, which we call status, and atomic, non-persistent information, which we call events. We propose a hybrid model and notation to address status and event phenomena symmetrically. We demonstrate the effectiveness of this model for designing and understanding mixed control interaction, an especially important topic in the design of multi-user systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Corbett:1994:TSC, author = "James C. Corbett and George S. Avrunin", title = "Towards scalable compositional analysis", journal = j-SIGSOFT, volume = "19", number = "5", pages = "53--61", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195294", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Due to the state explosion problem, analysis of large concurrent programs will undoubtedly require compositional techniques. Existing compositional techniques are based on the idea of replacing complex subsystems with simpler processes with the same interfaces to their environments, and using the simpler processes to analyze the full system. Most algorithms for proving equivalence between two processes, however, require enumerating the states of both processes. When part of a concurrent system consists of many highly coupled processes, it may not be possible to decompose the system into components that are both small enough to enumerate and have simple interfaces with their environments. In such cases, analysis of the systems by standard methods will be infeasible. In this paper, we describe a technique for proving trace equivalence of deterministic and divergence-free systems without enumerating their states. (For deterministic systems, essentially all the standard notions of process equivalence collapse to trace equivalence, so this technique also establishes failures equivalence, observational equivalence, etc.) Our approach is to generate necessary conditions for the existence of a trace of one system that is not a trace of the other; if the necessary conditions cannot be satisfied the systems are equivalent. We have implemented the technique and used it to establish the equivalence of some systems with state spaces too large for enumeration to be practical.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dwyer:1994:DFA, author = "Matthew B. Dwyer and Lori A. Clarke", title = "Data flow analysis for verifying properties of concurrent programs", journal = j-SIGSOFT, volume = "19", number = "5", pages = "62--75", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195295", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we present an approach, based on data flow analysis, that can provide cost-effective analysis of concurrent programs with respect to explicitly stated correctness properties. Using this approach, a developer specifies a property of a concurrent program as a pattern of selected program events and asks the analysis to verify that all or no program executions satisfy the given property. We have developed a family of polynomial-time, conservative data flow anlysis algorithms that support reasoning about these questions. To overcome the traditional inaccuracies of static analysis, we have also developed a range of techniques for improving the accuracy of the analysis results. One strength of our approach is the flexibility allowed in choosing and combining these techniques so as to increase accuracy without making analysis time impractical. We have implemented a prototype toolset that automates the analysis for programs with explicit tasking and rendezvous style communication. We present preliminary experimental results using this toolset.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Levy:1994:LIA, author = "N. L{\'e}vy and G. Smith", title = "A language-independent approach to specification construction", journal = j-SIGSOFT, volume = "19", number = "5", pages = "76--86", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195296", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An interactive specification development environment is presented in which a number of development methodologies and specification languages can be supported. Within the environment, design concepts and strategies are captured by the application of development operators, i.e. operators which enable the incremental construction and modification of specifications. The focus of this paper is to investigate the language independence feature of the environment, based on the work done in the Esprit project ICARUS. A set of operators enabling an object-oriented approach to specification development are instantiated for both the algebraic specification language Glider and the model-based specification language Z. These operators are illustrated by the development of a case study of a simple card game in both Glider and Z.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Evans:1994:LTU, author = "David Evans and John Guttag and James Horning and Yang Meng Tan", title = "{LCLint}: a tool for using specifications to check code", journal = j-SIGSOFT, volume = "19", number = "5", pages = "87--96", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195297", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes LCLint, an efficient and flexible tool that accepts as input programs (written in ANSI C) and various levels of formal specification. Using this information, LCLint reports inconsistencies between a program and its specification. We also describe our experience using LCLint to help understand, document, and re-engineer legacy code.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bowdidge:1994:ASE, author = "Robert W. Bowdidge and William G. Griswold", title = "Automated support for encapsulating abstract data types", journal = j-SIGSOFT, volume = "19", number = "5", pages = "97--110", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195298", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A software engineer can use a meaning-preserving program restructuring tool during maintenance to change a program's structure to ease modification. One common restructuring action is to create a new abstract data type by encapsulating an existing data structure. Data encapsulation simplifies modification by isolating changes to the implementation and behavior of an abstract data type. To perform encapsulation, a programmer must understand how the data structure is used in the code, identify abstract operations performed on the data structure, and choose concrete expressions to be made into functions. We provide a manipulable program visualization, called the star diagram, that both highlights information pertinent to encapsulation and supports the application of meaning-preserving restructuring transformations on the program through a direct-manipulation user interface. The visualization graphically and compactly presents all statements in the program that use the given global data structure, helping the programmer to choose the functions that completely encapsulate it. Additionally, the visualization elides code unrelated to the data structure and to the task, and collapses similar expressions to allow the programmer to identify frequently occurring code fragments and manipulate them together. The visualization is mapped directly to the program text, so manipulation of the visualization also restructures the program. We describe the design, implementation, and application of the star diagram, and evaluate its ability to assist data encapsulation in large programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Batory:1994:RCA, author = "Don Batory and Jeff Thomas and Marty Sirkin", title = "Reengineering a complex application using a scalable data structure compiler", journal = j-SIGSOFT, volume = "19", number = "5", pages = "111--120", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195299", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "P2 is a scalable compiler for collection data structures. High-level abstractions insulate P2 users from data structure implementation details. By specifying a target data structure as a composition of components from a reuse library, the P2 compiler replaces abstract operations with their concrete implementations.LEAPS is a production system compiler that produces the fastest sequential executables of OPS5 rule sets. LEAPS is a hand-written, highly-tuned, performance-driven application that relies on complex data structures. Reengineering LEAPS using P2 was an acid test to evaluate P2's scalability, productivity benefits, and generated code performance. In this paper, we present some of our experimental results and experience in this reengineering exercise. We show that P2 scaled to this complex application, substantially increased productivity, and provided unexpected performance gains.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vandevoorde:1994:USP, author = "Mark T. Vandevoorde and John V. Guttag", title = "Using specialized procedures and specification-based analysis to reduce the runtime costs of modularity", journal = j-SIGSOFT, volume = "19", number = "5", pages = "121--127", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195300", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Managing tradeoffs between program structure and program efficiency is one of the most difficult problems facing software engineers. Decomposing programs into abstractions simplifies the construction and maintenance of software and results in fewer errors. However, the introduction of these abstractions often introduces significant inefficiencies. This paper describes a strategy for eliminating many of these inefficiencies. It is based upon providing alternative implementations of the same abstraction, and using information contained in formal specifications to allow a compiler to choose the appropriate one. The strategy has been implemented in a prototype compiler that incorporates theorem proving technology.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hamlet:1994:FST, author = "Dick Hamlet", title = "Foundations of software testing: dependability theory", journal = j-SIGSOFT, volume = "19", number = "5", pages = "128--139", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195400", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Testing is potentially the best grounded part of software engineering, since it deals with the well defined situation of a fixed program and a test (a finite collection of input values). However, the fundamental theory of program testing is in disarray. Part of the reason is a confusion of the goals of testing --- what makes a test (or testing method) ``good.'' I argue that testing's primary goal should be to measure the dependability of tested software. In support of this goal, a plausible theory of dependability is needed to suggest and prove results about what test methods should be used, and under what circumstances. Although the outlines of dependability theory are not yet clear, it is possible to identify some of the fundamental questions and problems that must be attacked, and to suggest promising approaches and research methods. Perhaps the hardest step in this research is admitting that we do not already have the answers.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dillon:1994:OCT, author = "Laura K. Dillon and Qing Yu", title = "Oracles for checking temporal properties of concurrent systems", journal = j-SIGSOFT, volume = "19", number = "5", pages = "140--153", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195401", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Verifying that test executions are correct is a crucial step in the testing process. Unfortunately, it can be a very arduous and error-prone step, especially when testing a concurrent system. System developers can therefore benefit from oracles automating the verification of test executions. This paper examines the use of Graphical Interval Logic (GIL) for specifying temporal properties of concurrent systems and describes a method for constructing oracles from GIL specifications. The visually intuitive representation of GIL specifications makes them easier to develop and to understand than specifications written in more traditional temporal logics. Additionally, when a test execution violates a GIL specification, the associated oracle provides information about a fault. This information can be displayed visually, together with the execution, to help the system developer see where in the execution a fault was detected and the nature of the fault.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Harrold:1994:PDF, author = "Mary Jean Harrold and Gregg Rothermel", title = "Performing data flow testing on classes", journal = j-SIGSOFT, volume = "19", number = "5", pages = "154--163", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195402", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The basic unit of testing in an object-oriented program is a class. Although there has been much recent research on testing of classes, most of this work has focused on black-box approaches. However, since black-box testing techniques may not provide sufficient code coverage, they should be augmented with code-based or white-box techniques. Dataflow testing is a code-based testing technique that uses the dataflow relations in a program to guide the selection of tests. Existing dataflow testing techniques can be applied both to individual methods in a class and to methods in a class that interact through messages, but these techniques do not consider the dataflow interactions that arise when users of a class invoke sequences of methods in an arbitrary order. We present a new approach to class testing that supports dataflow testing for dataflow interactions in a class. For individual methods in a class, and methods that send messages to other methods in a the class, our technique is similar to existing dataflow testing techniques. For methods that are accessible outside the class, and can be called in any order by users of the class, we compute dataflow information, and use it to test possible interactions between these methods. The main benefit of our approach is that it facilitates dataflow testing for an entire class. By supporting dataflow testing of classes, we provide opportunities to find errors in classes that may not be uncovered by black-box testing. Our technique is also useful for determining which sequences of methods should be executed to test a class, even in the absence of a specification. Finally, as with other code-based testing techniques, a large portion of our technique can be automated.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Moriconi:1994:CCS, author = "Mark Moriconi and Xiaolei Qian", title = "Correctness and composition of software architectures", journal = j-SIGSOFT, volume = "19", number = "5", pages = "164--174", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195403", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The design of a large system typically involves the development of a hierarchy of different but related architectures. A criterion for the relative correctness of an architecture is presented, and conditions for architecture composition are defined which ensure that the correctness of a composite architecture follows from the correctness of its parts. Both the criterion and the composition requirements reflect special considerations from the domain of software architecture. The main points are illustrated by means of familiar architecture for a compiler. A proof of the relative correctness of two different compiler architectures shows how to decompose a proof into generic properties, which are proved once for every pair of architectural styles, and instance-level properties, which must be proved for every architecture.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1994:ESA, author = "David Garlan and Robert Allen and John Ockerbloom", title = "Exploiting style in architectural design environments", journal = j-SIGSOFT, volume = "19", number = "5", pages = "175--188", month = dec, year = "1994", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/195274.195404", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:56 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As the design of software architectures emerges as a discipline within software engineering, it will become increasingly important to support architectural description and analysis with tools and environments. In this paper we describe a system for developing architectural design environments that exploit architectural styles to guide software architects in producing specific systems. The primary contributions of this research are: (a) a generic object model for representing architectural designs; (b) the characterization of architectural styles as specializations of this object model; and (c) a toolkit for creating an open architectural design environment from a description of a specific architectural style. We use our experience in implementing these concepts to illustrate how style-oriented architectural design raises new challenges for software support environments.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Howell:1995:SNSa, author = "Chuck Howell", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "20", number = "1", pages = "7--15", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225908", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1995:RPCa, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "20", number = "1", pages = "16--21", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225909", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pfleeger:1995:EDAa, author = "Shari Lawrence Pfleeger", title = "Experimental design and analysis in software engineering:{Part 2}: how to set up and experiment", journal = j-SIGSOFT, volume = "20", number = "1", pages = "22--26", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225910", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Shaw:1995:BOS, author = "Mary Shaw", title = "Beyond objects: a software design paradigm based on process control", journal = j-SIGSOFT, volume = "20", number = "1", pages = "27--38", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225911", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", note = "See response \cite{Appelbe:1995:BOR}.", abstract = "A standard demonstration problem in object-oriented programming is the design of an automobile cruise control. This design exercise demonstrates object-oriented techniques well, but it does not ask whether the object-oriented paradigm is the best one for the task. Here we examine the alternative view that cruise control is essentially a control problem. We present a new software organization paradigm motivated by process control loops. The control view leads us to an architecture that is dominated by analysis of a classical feedback loop rather than by the identification of discrete stateful components to treat as objects. The change in architectural model calls attention to important questions about the cruise control task that aren't addressed in an object-oriented design.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pohl:1995:WSF, author = "Klaus Pohl and Gernot Starke and Peter Peters", title = "Workshop summary: {First International Workshop on Requirements Engineering: Foundation of Software Quality (REFSQ;94)}", journal = j-SIGSOFT, volume = "20", number = "1", pages = "39--45", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225912", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As achieving high quality means the realization of customers needs, requirements engineering (RE) is the most crucial phase within software development. In the RE process not only the functional requirements but also the so-called 'non-functional' or 'quality' requirements of the planned software system have to be elicited from the customer and represented in a requirements document in order to provide the software designer a complete and correct specification. Conventional RE methods usually support only parts of this process or help stating only specific kinds of requirements. These methodological problems were the prime motivation for the REFSQ'94 workshop held in conjunction with the CAiSE '94 Conference on Advanced Information Systems Engineering in Utrecht, The Netherlands on June 6th and 7th 1994. In order to find solutions which handle the described deficiencies, it was the goal of the workshop to improve the understanding of the relations between both areas of research in software engineering and not to give new definitions of either requirements engineering or software quality. On the Call for Papers addressing the above problems we received 24 submissions. After the reviewing process, we accepted 14 papers which have high quality and cover the research areas related to the workshop. Finally, 13 full and position papers were presented at REFSQ '94 and discussed with the 23 participants (including the organizers) coming from eleven different countries.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Song:1995:FUI, author = "Xiping Song", title = "A framework for understanding the integration of design methodologies", journal = j-SIGSOFT, volume = "20", number = "1", pages = "46--54", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225913", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software researchers and practitioners have studied and used a number of approaches to integrating major design paradigms in order to improve Software Design Methodologies (SDMs). Software tool developers have developed tools to aid the integration and customization of existing SDM support tools. However, a framework for understanding and guiding various integration and customization processes is still lacking. Because of this users, even with tool support, often fail to systematically integrate SDMs and SDM support tools. In this paper, we define a framework that can be used to understand various SDM integrations and customizations. Through this definition, we describe what kinds of integrations are useful, what difficulties are to be met, and how the integrity of the SDMs can be maintained.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raccoon:1995:CMC, author = "L. B. S. Raccoon", title = "The chaos model and the chaos cycle", journal = j-SIGSOFT, volume = "20", number = "1", pages = "55--66", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225914", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "I believe that to truly understand software development, we must not only understand the flow of an entire project and how to write each line of code, we must also understand how one line of code relates to the whole project. It seems to me that we have studied each aspect of software development in isolation, not how all aspects fit together. The Waterfall model, defined by Royce, and the Spiral model, defined by Boehm, discuss management-level issues, such as phases and deadlines, rather than how to write one line of code or fix one bug. Programming methodologies show us how to solve technical problems, rather than how to solve users' problems or to meet deadlines. In this paper, I use the principles of chaos (or fractals) as a metaphor to bridge the gap in our understanding of the relationship between one line of code and the entire project. Throughout this paper, I describe software development from the developer's point of view. If we want to understand software development, we must describe what developers do. After all, developers do the work. We know that large programs consist of many lines of code and that large projects consist of the daily efforts made by individual developers. We know that the large scale and the small scale somehow relate to each other. Yet most models of software development seem to focus on one extreme or another, ignoring the role of developers. In the first section, I define the Chaos model which combines a simple, people-oriented, problem-solving loop with fractals to describe the structures within a project. I believe that software development is a human activity: people write the software, use the solutions, and experience the problems. I believe that creating software is very complex; we cannot simplify software development by imposing simple models on it. The Chaos model uses fractals to describe a cohesive structure which encompasses many of the issues actually encountered during software development. This structure helps to explain the influences within a project and the roles that developers play. In the second section, I interpret the Chaos model to reveal the meaning behind the structure. I show that users, developers, and technologies form a continuum throughout software development. They all interact in a complex dance. This interpretation improves our understanding of the contribution and limitations of users, developers, and technologies. In the third section, I define the Chaos life cycle to describe how a project evolves over time. Life cycles are essentially the top-level perspectives of software development. In light of the Chaos model, I define the phases of the life cycle in terms of fractals and show that all phases occur throughout the life cycle. These chaotic definitions suggest that I can interpret the complete life cycle in terms of each phase, and conversely, I can interpret each phase in terms of a complete life cycle. The phases of the life cycle show our perspectives on the state of a project, rather than what the state of a project really is. Thus, developers need many skills to be able to understand and respond to situations that arise throughout a software development project.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Amoroso:1995:CFS, author = "Edward G. Amoroso", title = "Creating formal specifications from requirements documents", journal = j-SIGSOFT, volume = "20", number = "1", pages = "67--70", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225915", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An approach is introduced for creating a model-based formal specification from an informal requirements document. The approach employs a structured categorization and evolutionary refinement of informal requirements to functional requirements, goals, implementation demands, theorems, and axioms stated with respect to a formal specification. The evolutionary refinement terminates when the specification and axioms can be expressed using constructs in a target specification language. Guidance is provided for integrating requirements changes, existing automated support, and informal design activities into the refinement. The approach is demonstrated using informal requirements for an RS-232 repeater device.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jorgensen:1995:QQB, author = "Magne J{\o}rgensen", title = "The quality of questionnaire based software maintenance studies", journal = j-SIGSOFT, volume = "20", number = "1", pages = "71--73", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225916", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Questionnaires sent to maintenance managers is a frequently used approach to collect data on software maintenance. This paper reports findings from two studies, carried out at a large Norwegian maintenance organisation, investigating the quality of questionnaire based software maintenance studies. Interesting findings were, among others, that:- The definition of essential terms, for example of 'software maintenance', at the beginning of a questionnaire did not assure a consistent use of the terms by the questionnaire respondents.- Manager estimates of the proportion of effort spent on corrective maintenance were biased when based on best guesses instead of good data. For this reason, the frequently referred studies of Lientz and Swanson (1980) and Nosek and Palvia (1990) may have reported a too high proportion of effort spent on corrective maintenance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Viljamaa:1995:PBI, author = "Panu Viljamaa", title = "The patterns business: impressions from {PLoP-94}", journal = j-SIGSOFT, volume = "20", number = "1", pages = "74--78", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225917", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Monticello --- Illinois was the place that hosted PLoP-94 (The first Conference on Pattern Languages of Programs) 4th --- 6th August 1994. Here I'll summarize the insights into the nature of 'Patterns' and 'Pattern Languages' I gained. The intended reader works with software development but is more generally anybody trying to improve the quality of intellectual tasks.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jazaa:1995:TBS, author = "Adid Jazaa", title = "Toward better software automation", journal = j-SIGSOFT, volume = "20", number = "1", pages = "79--84", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225918", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper discusses the concept and advantages of automating software activities. It also addresses software production costs and the problems associated with software development. A logic-based framework for managing the complexity of software projects is proposed. The main investigations and suggestions are summarised.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ambriola:1995:DVM, author = "Vincenzo Ambriola and Giovanni A. Cignoni", title = "A distributed virtual machine to support software process", journal = j-SIGSOFT, volume = "20", number = "1", pages = "85--89", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.225919", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", abstract = "The availability of new technologies increases, at least potentially, the chance to support cooperative work exploiting the many resources offered by computer networks. This opportunity is impaired by the lack of tools able to manage the large variety of network resources at an adequate level of abstraction. This lack is particularly felt in the implementation of software process support environments. In this paper we describe how, in Oikos, we realized the distributed run-time support to process enactment. On the basis of this experience, we claim the need of a homogeneous framework that overcomes this limitation. We propose oiXos, a virtual machine that abstracts a network of Unix workstations, disk servers, and X Window terminals. We introduce the notions of component, item, and gibject. Upon these notions we build the abstraction level given by the oiXos virtual machine. We discuss the oiXos architecture that relies on a collection of system components that manage the objects of the oiXos machine.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Poulin:1995:BRO, author = "Jeffrey S. Poulin", title = "Book Reviews: {{\booktitle{Object Databases --- The Essentials}} by Mary E. S. Loomis}", journal = j-SIGSOFT, volume = "20", number = "1", pages = "90--91", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.565600", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kostecki:1995:BRO, author = "John A. Kostecki", title = "Book review: {{\booktitle{Object-Oriented Software Metrics}} by Mark Lorenz and Jeff Kidd}", journal = j-SIGSOFT, volume = "20", number = "1", pages = "91--93", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.773556", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1995:BRS, author = "Peter G. Neumann", title = "Book review: {{\booktitle{Software Creativity}} by Robert L. Glass}", journal = j-SIGSOFT, volume = "20", number = "1", pages = "93", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.773557", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1995:BRC, author = "Will Tracz", title = "Book review: {{\booktitle{Computer Related Risks}} by Peter G. Neumann (ACM Press Books 1995)}", journal = j-SIGSOFT, volume = "20", number = "1", pages = "93", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.773559", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1995:BRS, author = "Will Tracz", title = "Book review: {{\booktitle{Software Engineering Standards and Specifications: an Annotated Index and Directory}} by Stan Magee and Leanard L. Trip}", journal = j-SIGSOFT, volume = "20", number = "1", pages = "93", month = jan, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/225907.773558", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:57 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1995:RPCb, author = "Peter G. Neumann", title = "Risks to the Public in Computers and Related Systems", journal = j-SIGSOFT, volume = "20", number = "2", pages = "7--13", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565629", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pfleeger:1995:EDAb, author = "Shari Lawrence Pfleeger", title = "Experimental Design and Analysis in Software Engineering: Types of Experimental Design", journal = j-SIGSOFT, volume = "20", number = "2", pages = "14--16", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565630", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sejnowski:1995:RDS, author = "Matt Sejnowski", title = "Revolutionary {DCF} System to Replace {CMM}", journal = j-SIGSOFT, volume = "20", number = "2", pages = "16--17", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565632", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Davis:1995:PPD, author = "Margaret J. Davis", title = "Process and Product: Dichotomy or Duality?", journal = j-SIGSOFT, volume = "20", number = "2", pages = "17--18", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565634", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vanooteghem:1995:MMA, author = "Hubert Vanooteghem", title = "The Maturity Movement and Acedia", journal = j-SIGSOFT, volume = "20", number = "2", pages = "18--19", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565636", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Britchef:1995:FPF, author = "Bob Britchef", title = "A Few (Proposed) Fundamental Laws of Programming", journal = j-SIGSOFT, volume = "20", number = "2", pages = "19--20", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565637", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Holloway:1995:SEE, author = "C. Michael Holloway", title = "Software Engineering and Epistemology", journal = j-SIGSOFT, volume = "20", number = "2", pages = "20--21", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565638", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1995:TIC, author = "Will Tracz", title = "Third International Conference on Software Reuse Summary", journal = j-SIGSOFT, volume = "20", number = "2", pages = "21--22", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565639", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Anderson:1995:BOC, author = "Bruce Anderson", title = "Building organizational competence in software architecture: {OOPSLA'94 Workshop} report", journal = j-SIGSOFT, volume = "20", number = "2", pages = "25--28", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565642", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dubois:1995:GTT, author = "E. Dubois and J. Hagelstein and A. van Lamsweerde and F. Orejas and J. Souquieres and P. Wodon", title = "A Guided Tour through the {ICARUS} Project", journal = j-SIGSOFT, volume = "20", number = "2", pages = "28--33", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565643", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Krishnamurthy:1995:CWE, author = "Balachander Krishnamurthy", title = "{CSCW 94 Workshop to Explore Relationships between Research in Computer Supported Cooperative Work and Software Process}: Workshop Report", journal = j-SIGSOFT, volume = "20", number = "2", pages = "34--35", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.565647", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Agarwal:1995:PPA, author = "Rakesh Agarwal and Patricia Lago", title = "{PATHOS --- a} paradigmatic approach to high-level object-oriented software development", journal = j-SIGSOFT, volume = "20", number = "2", pages = "36--41", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.224156", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The growing complexity of information systems and the ensuring problems of their development, maintenance and management have highlighted the inadequacy of formal and informal methods for constructing such systems. These problems manifest themselves in the computer systems which are often unmanageable, unreliable, inflexible and hence difficult to maintain. Users have often demanded for reliable computer systems because they realize that most failures are due to poor specification, and design. This has resulted in the emergence of a number of information systems methodologies together with associated computerized development environments in which the Object-Oriented (OO) approach is one of the most recent.OO is often used for promoting software development and its reuse. Languages like Smalltalk reduce not only development time but also the cost of maintenance, simplifying the creation of new systems and the reuse of old ones. Nevertheless OO is not a panacea i.e. efforts are to put in for its proper use. Thus we consider OO as a paradigm which provides a new image, a new way of conceptualizing the development life cycle. By the help of paradigms, software developers and users are supported in apprehending the development life cycle and means to organize the aspects of the life cycle into a comprehensive method.PATHOS (A Paradigmatic Approach To High-level Object-Oriented Software development) aims to demonstrate an approach to information system development that will lead not only to good information system creation, but also to explicitly represent the maintenance of the business knowledge so as to allow for its more effective and active exploitation at run time.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mannion:1995:SR, author = "Mike Mannion and Barry Keepence", title = "{SMART} requirements", journal = j-SIGSOFT, volume = "20", number = "2", pages = "42--47", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.224157", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Systems Analysis, or as it is increasingly known as today, Requirements Engineering, is a time consuming, expensive but critical phase in software (and system) development. The ``perfect'' Requirements Specification should exhibit a number of qualities including correctness, completeness and consistency. Within a Requirements Specification individual requirements at the microscopic level should be justified, clear, unambiguous and verifiable. However, in many cases Systems Analysts or Requirements Engineers describe requirements which fall short of these demands. In addition, outside reviewers faced with presenting an independent qualitative assessment of a Requirements Specification have few guidelines to assist them. In this paper we present a simple technique, borrowed from objective setting in Management Psychology, to assist the construction and evaluation of individual requirements.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jing:1995:MHL, author = "Ying Jing and He Zhijun and Wu Zhaohui and Li Jiangyun and Fan Weicheng and Xu Zhaohui", title = "A methodology for high-level software specification construction", journal = j-SIGSOFT, volume = "20", number = "2", pages = "48--54", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.224158", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper puts forward a kind of novel methodology for software system development, from the point of view of the problem existed in software development --- the gap between the requirement specification level and the program implementation level. We attempt to begin from the specification level of software development to touch the process of high-level specification construction profoundly. We propose a specification language to support multiple semantic dimensions and based on which build a unified functional model of software system in a specific domain. On the bases of these, we apply transformation and refinement methods to the model and transit it from the specification level to the implementation level. We expect such a process can change the current software producing procedure in nature. We also put this methodology into the application of the software development in real-time serving domain we focus on, which turns out to be encouraging.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zelkowitz:1995:AMR, author = "Marvin V. Zelkowitz", title = "Algebra and models (and reality)", journal = j-SIGSOFT, volume = "20", number = "2", pages = "55--57", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.224159", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ryant:1995:CAS, author = "Ivan Ryant", title = "The correctly analyzed system which behaves incorrectly", journal = j-SIGSOFT, volume = "20", number = "2", pages = "58--61", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.224161", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Many systems analysts believe that strictly following a methodology prevents them from producing incorrect system specification. In fact, banking systems, telephone exchanges and other information and control systems may fail in any moment because of hidden errors. This article explains that the most widespread methodologies nowadays aid rising of dangerous synchronization errors in the specification. What's the matter? The methodologies isolate interacting concurrent processes one from other. In order to analyze concurrent behavior, we need to consider interactions as a whole. We must not split interactions into separate processes. Systems analysis aims to specify information systems. There are several approaches to the systems analysis. The two main streams today are structured and object oriented analysis. Unfortunately, both of them hide the danger of incorrect synchronization without giving the analyst any chance to control it. Perhaps, the most delusive case of incorrect synchronization are time --- dependent errors. Concurrent system is the system of concurrent (sequential) processes that may interact (communicate or synchronize each other).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Arnold:1995:CIB, author = "John E. Arnold", title = "Control integration: a briefly annotated bibliography", journal = j-SIGSOFT, volume = "20", number = "2", pages = "62--67", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.224162", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Churcher:1995:TCF, author = "Neville I. Churcher and Martin J. Shepperd", title = "Towards a conceptual framework for object oriented software metrics", journal = j-SIGSOFT, volume = "20", number = "2", pages = "69--75", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.224163", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The development of software metrics for object oriented (OO) languages is receiving increasing attention. We examine the reasons why this is a much more challenging problem than for conventional languages. It seems premature to develop and apply OO metrics while there remains uncertainty not only about the precise definitions of many fundamental quantities and their subsequent impact on derived metrics, but also a lack of qualitative understanding of the structure and behaviour of OO systems. We argue that establishing a standard terminology and data model will help provide a framework for both theoretical and empirical work and increase the chances of early success. One potential benefit is improvement of the ability to perform independent validation of models and metrics. We propose a data model and terminology and illustrate the importance of such definitions by examining the seemingly straightforward concept of the number of methods per class. We discuss the implications of ambiguities in definitions for a suite of metrics which has recently been proposed. Preliminary results from our analysis of industrial systems are presented.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Whittle:1995:MLC, author = "Ben Whittle", title = "Models and languages for component description and reuse", journal = j-SIGSOFT, volume = "20", number = "2", pages = "76--89", month = apr, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/224155.224165", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:12:58 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper brings together the current research on reusable component models and component description languages for reuse. The paper contains a description and comparison of the 3C and REBOOT component models. The importance and further development of the 3C model is discussed. The component description language field is surveyed, and an introduction is given to the languages LIL, ACT TWO, $ \Pi $, Meld, CDL, CIDER, LILEANNA, and RESOLVE. All of these languages are aimed at describing reusable components in the design stages of development. Criteria for examining component description languages are introduced and used as the basis of a comparison of the languages. The paper concludes with suggestions for the convergence of these developments, and suggestions for further work in this field.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Howell:1995:SNSb, author = "Chuck Howell", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "20", number = "3", pages = "2--7", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.773573", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1995:RPCc, author = "Peter G. Neumann", title = "Risks to the Public in Computers and Related Systems", journal = j-SIGSOFT, volume = "20", number = "3", pages = "7--12", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.773574", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pfleeger:1995:EDAc, author = "Shari Lawrence Pfleeger", title = "Experimental design and analysis in software engineering, part 4: choosing an experimental design", journal = j-SIGSOFT, volume = "20", number = "3", pages = "13--15", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219311", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1995:ICS, author = "Will Tracz", title = "17th International Conference on Software Engineering: Window on the World", journal = j-SIGSOFT, volume = "20", number = "3", pages = "16--28", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.773575", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Parnas:1995:IMI, author = "David Lorge Parnas", title = "On {ICSE}'s ``most influential'' papers", journal = j-SIGSOFT, volume = "20", number = "3", pages = "29--32", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219312", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The International Conference on Software Engineering has established a tradition of looking back 10 conferences and selecting papers that have stood the test of time. The remarks below were prepared in connection an acceptance speech at ICSE 17 where two colleagues and I received the award for the best paper of ICSE 7.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Humphrey:1995:WSY, author = "Watts S. Humphrey", title = "Why should you use a personal software process?", journal = j-SIGSOFT, volume = "20", number = "3", pages = "33--36", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219313", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Personal Software Process (PSP) is a structured set of forms, standards, and procedures that is designed to help you do better work. Data on the PSP's early use shows that engineers achieve average reductions of 75\% in numbers of injected defects, make more accurate plans, and have higher productivity. To date, the PSP has been used to write more than 1000 small programs with a total of over 100,000 LOC. C is the language most commonly used but C++, Ada, Pascal, FORTRAN, and Visual Basic have also been used. This note describes the PSP, why it was developed, and how it can help you to be a better software engineer.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raccoon:1995:CG, author = "L. B. S. Raccoon", title = "The complexity gap", journal = j-SIGSOFT, volume = "20", number = "3", pages = "37--44", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219315", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Complexity Gap defines a new way to think about software development. We have all heard that developers need to be more productive and to work harder. But what does this mean exactly? The Complexity Gap defines a structure in which to explore concepts of process and productivity and to show how these concepts relate to conventional software development issues of tools and training. Software development is complex. This paper expands on the principles of the Chaos model that suggest that the top-level user requirements and bottom-level hacking are connected through many intermediate levels, and that every level of software development affects quality and productivity to the same degree. In The Chaos Model and the Chaos Life Cycle, I make these points. To clarify the possibilities and limitations of software development, I compare software development to assembly-line work. In the software engineering community, we compare software development to assembly lines for a variety of reasons. Some managers want to acquire the same sense of control over software development as factory managers have over assembly lines. Other managers want to apply assembly-line techniques, such as Statistical Quality Control, to software development. I use both the definition of the Complexity Gap and the assembly-line analogy to suggest ways to improve the software development process.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Appelbe:1995:BOR, author = "Bill Appelbe and Gregory Abowd", title = "Beyond objects: a response", journal = j-SIGSOFT, volume = "20", number = "3", pages = "45--48", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219316", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", note = "See \cite{Shaw:1995:BOS}.", abstract = "In a recent article [5], Shaw puts forth the argument that a process control paradigm for structuring software is more natural, and hence most appropriate for process control applications. However, we believe that there are other considerations, such as scalability and maintainability, that need to be addressed when choosing a design paradigm. Our experience, and a re-examination of Shaw's models, suggests that object modeling is more appropriate for large scale process control applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1995:DDS, author = "Will Tracz", title = "{DSSA} (Domain-Specific Software Architecture): pedagogical example", journal = j-SIGSOFT, volume = "20", number = "3", pages = "49--62", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219318", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A Domain-Specific Software Architecture (DSSA) has been defined as: * ``an assemblage of software components, specialized for a particular type of task (domain), generalized for effective use across that domain, composed in a standardized structure (topology) effective for building successful applications'' [Hay94] or, alternately * a context for patterns of problem elements, solution elements, and situations that define mappings between them'' [Hid90]. The following small example illustrates these definitions as well as provides the reader with some insight into the types of processes and tools needed to support the creation and use of a DSSA.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1995:SDW, author = "David Garlan and Walter Tichy and Frances Paulisch", title = "Summary of the {Dagstuhl Workshop on Software Architecture}", journal = j-SIGSOFT, volume = "20", number = "3", pages = "63--83", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219320", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1995:FIW, author = "David Garlan", title = "{First International Workshop on Architectures for Software Systems} workshop summary", journal = j-SIGSOFT, volume = "20", number = "3", pages = "84--89", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219322", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As systems become more complex, the high-level organization of the overall system --- the software architecture --- becomes a critical aspect of design. Architectural concerns include organization of a system as a composition of components; global control structures; protocols for communication, synchronization, and data access; assignment of functionality to design elements; physical distribution; scaling and performance; dimensions of evolution; and selection among design alternatives. Recently, software architecture has begun to emerge as an important field of study for software engineering practitioners and researchers. Architectural issues are being addressed by work in areas such as module interface languages, domain-specific architectures, software reuse, codification of organizational patterns for software, architectural description languages, formal underpinnings for architectural design, and architectural design environments. While there has been considerable recent activity in this area, much of it has gone on in small groups and many of these efforts are operating without detailed knowledge of other on-going work. This workshop brought together researchers and practitioners interested in software architecture to discuss the current state of the practice and art. The primary goal was to establish a common understanding of the state of the practice, the kinds of research and development efforts that are in progress, and the important challenges for this emerging field. The response to the call for papers for this workshop provides convincing evidence of the increasing interest and importance of software architecture. There were 86 papers submitted, involving over 140 authors. Of these, 32 were chosen for inclusion in the workshop. These papers were distributed to the participants in the form of a workshop proceedings. The proceedings has recently been reissued as a Carnegie Mellon Technical report, ``Proceedings of the First International Workshop on Software Architecture'', CMU-CS-TR-95-151. Copies may be obtained from CS Documentation, School of Computer Science, Carnegie Mellon University, 5000 Forbes Ave., Pittsburgh, PA 15213-3891 (tel: 412-268-2596, email: [email protected]). The workshop organizing committee consisted of David Garlan, Workshop Chair (Carnegie Mellon University), Bob Balzer (USC Information Sciences Institute), Barry Boehm (University of Southern California), Martin Griss (Hewlett Packard Laboratories), Jeffrey Kramer (Imperial College), Doug Lea (SUNY Oswego \& NY CASE Center), Dewayne Perry (AT\&T Bell Labs), Mary Shaw (Carnegie Mellon University), Will Tracz (Loral Federal Systems), and Alexander Wolf (University of Colorado at Boulder).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Maiden:1995:ROR, author = "N. A. M. Maiden", title = "Reuse-oriented requirements engineering in {NATURE}", journal = j-SIGSOFT, volume = "20", number = "3", pages = "90--93", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219324", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This short paper outlines research undertaken as part of the ESPRIT III NATURE basic research action into domain-specific requirements engineering environments. It describes a set of problem abstractions which are the basis for intelligent guidance during requirements scoping, acquisition, modeling, critiquing and communication. It presents a toolkit designed to exploit the problem abstractions during different requirements engineering activities. Routes for industrial exploitation of these research results are also outlined.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tatsuta:1995:PVR, author = "Tanehiro Tatsuta", title = "Practical verification for requirements model of {Hatley\slash Pirbhai}", journal = j-SIGSOFT, volume = "20", number = "3", pages = "94--97", month = jul, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/219308.219325", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:00 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Five years have passed since translated version of a popular book on Real Time Structured Analysis method was published in Japan. Japanese readers of it have been discussing its practical usage actively. Its research work is however hardly ever presented abroad. We will show here recent Japanese research work on it.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Aho:1995:FIG, author = "Alfred V. Aho and Nancy D. Griffeth", title = "Feature interactions in the global information infrastructure", journal = j-SIGSOFT, volume = "20", number = "4", pages = "2--4", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222133", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1995:SAP, author = "David Garlan", title = "Software architecture (panel): next steps towards an engineering discipline for software systems design", journal = j-SIGSOFT, volume = "20", number = "4", pages = "5", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222134", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zaremski:1995:SMS, author = "Amy Moormann Zaremski and Jeannette M. Wing", title = "Specification matching of software components", journal = j-SIGSOFT, volume = "20", number = "4", pages = "6--17", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222135", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Murphy:1995:SRM, author = "Gail C. Murphy and David Notkin and Kevin Sullivan", title = "Software reflexion models: bridging the gap between source and high-level models", journal = j-SIGSOFT, volume = "20", number = "4", pages = "18--28", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222136", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gupta:1995:HSA, author = "Rajiv Gupta and Mary Lou Soffa", title = "Hybrid slicing: an approach for refining static slices using dynamic information", journal = j-SIGSOFT, volume = "20", number = "4", pages = "29--40", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222137", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Reps:1995:PIC, author = "Thomas Reps and Genevieve Rosay", title = "Precise interprocedural chopping", journal = j-SIGSOFT, volume = "20", number = "4", pages = "41--52", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222138", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hoffman:1995:SAM, author = "Daniel Hoffman and Paul Strooper", title = "State abstraction and modular software development", journal = j-SIGSOFT, volume = "20", number = "4", pages = "53--61", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222139", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fekete:1995:LCM, author = "Alan Fekete", title = "Liveness conditions in model-based service specifications: a case study", journal = j-SIGSOFT, volume = "20", number = "4", pages = "62--71", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222140", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fiadeiro:1995:IFS, author = "Jos{\'e} Luiz Fiadeiro and Tom Maibaum", title = "Interconnecting formalisms: supporting modularity, reuse and incrementality", journal = j-SIGSOFT, volume = "20", number = "4", pages = "72--80", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222141", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Weyuker:1995:UCF, author = "Elaine J. Weyuker", title = "Using the consequence of failures for testing and reliability assessment", journal = j-SIGSOFT, volume = "20", number = "4", pages = "81--91", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222143", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Porter:1995:EAC, author = "A. Porter and H. Siy and C. A. Toman and L. G. Votta", title = "An experiment to assess the cost-benefits of code inspections in large scale software development", journal = j-SIGSOFT, volume = "20", number = "4", pages = "92--103", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222144", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Horwitz:1995:DID, author = "Susan Horwitz and Thomas Reps and Mooly Sagiv", title = "Demand interprocedural dataflow analysis", journal = j-SIGSOFT, volume = "20", number = "4", pages = "104--115", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222146", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Murphy:1995:LSM, author = "Gail C. Murphy and David Notkin", title = "Lightweight source model extraction", journal = j-SIGSOFT, volume = "20", number = "4", pages = "116--127", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222147", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wing:1995:MCS, author = "Jeannette M. Wing and Mandana Vaziri-Farahani", title = "Model checking software systems: a case study", journal = j-SIGSOFT, volume = "20", number = "4", pages = "128--139", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222148", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cheung:1995:CRA, author = "S. C. Cheung and J. Kramer", title = "Compositional reachability analysis of finite-state distributed systems with user-specified constraints", journal = j-SIGSOFT, volume = "20", number = "4", pages = "140--150", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222149", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zeller:1995:UVM, author = "Andreas Zeller", title = "A unified version model for configuration management", journal = j-SIGSOFT, volume = "20", number = "4", pages = "151--160", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222151", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kaplan:1995:FAU, author = "Alan Kaplan and Jack C. Wileden", title = "Formalization and application of a unifying model for name management", journal = j-SIGSOFT, volume = "20", number = "4", pages = "161--172", month = oct, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/222132.222152", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:01 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1995:RPCd, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "20", number = "5", pages = "8--14", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217031", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pfleeger:1995:EDAd, author = "Shari Lawrence Pfleeger", title = "Experimental design and analysis in software engineering, part 5: analyzing the data", journal = j-SIGSOFT, volume = "20", number = "5", pages = "14--17", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217032", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Boehm:1995:REN, author = "Barry Boehm", title = "Reuse emphasized at next process workshop", journal = j-SIGSOFT, volume = "20", number = "5", pages = "17", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.773572", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Salasin:1995:EDC, author = "John Salasin and Howie Shrobe", title = "Evolutionary design of complex software {(EDCS)}", journal = j-SIGSOFT, volume = "20", number = "5", pages = "18--22", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217033", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This document is intended to provide background information for offerers responding to BAA 95-40: Evolutionary Design of Complex Software (EDCS). It describes the general problem that the EDCS Program addresses along with some of the characteristics of the Program's organization. Then it discusses some concepts for evolutionary systems and some of the technology investigations that are felt to support those concepts. This is presented for illustrative purposes only. Offerors should not feel constrained to the particular concepts of evolution articulated nor to the technology areas and sample investigation projects delineated.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cross:1995:SWC, author = "James H. {Cross II} and Alex Quilici and Linda Wills and Philip Newcomb and Elliot Chikofsky", title = "Second working conference on reverse engineering summary report", journal = j-SIGSOFT, volume = "20", number = "5", pages = "23--26", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217619", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Taylor:1995:SDU, author = "Richard N. Taylor and Will Tracz and Lou Coglianese", title = "Software development using domain-specific software architectures: {CDRl} A011 --- a curriculum module in the {SEI} style", journal = j-SIGSOFT, volume = "20", number = "5", pages = "27--38", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217034", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The objective of software development using domain-specific software architectures (DSSA) is reduction in time and cost of producing specific application systems within a supported domain, along with increased product quality, improved manageability, and positioning for acquisition of future business. Key aspects of the approach include software reuse based on parameterization of generic components and interconnection of components within a canonical solution framework. Viability of the approach depends on identification and deep understanding of a selected domain of applications. The DSSA approach, to be effectively applied, requires a variety of support tools, including repository mechanisms, prototyping facilities, and analysis tools. This curriculum module describes the DSSA approach, representative examples, supporting tools, and processes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kelsey:1995:PTM, author = "Robert Bruce Kelsey", title = "``{A} plea for tolerance in matters epistemological{\ldots}''", journal = j-SIGSOFT, volume = "20", number = "5", pages = "39", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217036", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raccoon:1995:CS, author = "L. B. S. Raccoon", title = "The chaos strategy", journal = j-SIGSOFT, volume = "20", number = "5", pages = "40--47", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217037", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "``What line of code should I write next?'' This paper resulted from my search for an answer that reflects my experiences in writing real programs, and reflects both the Chaos model and life cycle. After trying to infer an answer directly from the Chaos life cycle, in fact from any life cycle, I ultimately gave up. I concluded that while life cycles describe what I can do in a project, life cycles do not describe what I should do in a project. For that I need another concept, such as strategy. Strategies are idealized plans of how software development should work. Strategies help us to prioritize the things we do. A general strategy defines an overall approach for solving a problem that must be adapted to meet local circumstances. A specific strategy defines immediate goals. A good specific strategy balances short-term progress with long-term goals. Applying the concept of strategy to software development may seem inappropriate, or even absurd, to software developers who normally worry about concepts like correctness, specification, and quality. Developers have been taught to think of software development as totally predictable, with each step a perfectly understood element. Strategy implies a contest which admits that a developer could lose. On the other hand, developers may be more familiar applying strategy to investments, marketing, elections, and war. People do meaningfully use strategy for complex military and business problems. In The Chaos Model and the Chaos Life Cycle, I argued that each software development project is a chaotic, multi-level sequence of issues that arise and get resolved. Developers repeatedly select an issue to resolve, devise an approach, implement a solution, maintain the resulting program, and so forth. Software development is a project-to-project, situation-to-situation, minute-to-minute process, with many levels. Developers must deal with all levels from the ``whole project'' level down to the ``one line of code'' level. In The Complexity Gap, I argued that the middle levels of a project are not addressed by the traditional Stepwise Refinement and Object-Oriented Design strategies. The macro-process and top-down strategies address the top levels of a project. The micro-process and bottom-up strategies address the bottom levels of a project. In this paper, I propose the Chaos strategy to guide development on the levels of a project within the Complexity Gap. I begin by describing parallels between software development and games of strategy, and by defining the Software Development Game. I then define elements of the Chaos strategy, a middle-out, technology-independent strategy. Finally, I show how to adapt the Chaos strategy to fit the various circumstances that arise in complex software development projects.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Billard:1995:GML, author = "Edward A. Billard and Alice E. Riedmiller", title = "A {GUI} for a manager of lightweight processes", journal = j-SIGSOFT, volume = "20", number = "5", pages = "48--50", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217038", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A design is presented for a graphical user interface to a manager of lightweight processes. The manager is XINU-like in its support for semaphores, messages and sleeping but is implemented with the lightweight process library of UNIX. Each state change is piped to a GUI written in Tcl/Tk. The display shows processes waiting in queues and processes moving from state to state (i.e. free, suspended, ready, current, waiting, receiving, sleeping, writing, reading). The GUI has a control panel that allows the user to watch and debug user-written concurrent processes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Philip:1995:RFS, author = "Thomas Philip and Ramani Ramsundar", title = "A reengineering framework for small scale software", journal = j-SIGSOFT, volume = "20", number = "5", pages = "51--55", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217040", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Reengineering software is approached in different ways, even though the basic process remains the same: reverse engineering followed by forward engineering. Tools are available to aid during reverse engineering and reengineering. This paper presents a framework we used to reengineer a small scale software system from a partial structured implementation to an object-oriented implementation. The framework uses function matrix to organize the extracted abstractions, algorithm tables, and data dictionary during its initial phase. Components for the target system object model are retrieved from the matrices and the dictionary. An empirical reuse metric was applied to the matrix to identify reusable parts. Application of this framework is also discussed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Aggarwal:1995:SRA, author = "K. K. Aggarwal and Yogesh Singh", title = "Software reliability apportionment using the analytic hierarchy process", journal = j-SIGSOFT, volume = "20", number = "5", pages = "56--61", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217041", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper, we present a software reliability apportionment scheme using analytic hierarchy process which attempts to answer the question ``how reliable should each system module be?''. Reliability requirements determined by integrating user's view, software manager's view and programmer's view would be more realistic, consistent and economically attainable than those obtained through subjective or haphazard method. This model determines reliability goals at the planning and design stages of the software project, hence making reliability a singular measure for performance evaluation. The concept of frequency ratio is used which considers the probability of a module execution when the software is executed for a predefined number of input cases. Modules which are to be executed rather infrequently may be allocated relatively lower reliability values.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Xu:1995:ISS, author = "Dianxiang Xu and Guoliang Zheng", title = "Inheritance as sublation and its semantics", journal = j-SIGSOFT, volume = "20", number = "5", pages = "62--66", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217042", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents an approach to non-monotonic inheritance in an object-oriented logic programming framework. Inheritance as sublation, achieved through predicate extension and exception, not only provides a very flexible mechanism for software reuse but also is very philosophical. Taking the (iterated least fixpoint) well-founded model semantics to traditional logic programs as a basis, the declarative semantics is also explored.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Xu:1995:DJD, author = "Manwu Xu and Fancong Zeng and Jianfeng Lu and Dong Yang", title = "The development of {JR}-{DSSG}: a case study of software reuse", journal = j-SIGSOFT, volume = "20", number = "5", pages = "67--72", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217043", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "To increase software productivity and enhance its quality, techniques for software reuse have attracted more and more attention in recent years. Among these techniques, application generator is a rather practical one but without deep explorations yet. In this paper, at first we examine the application generator in terms of characteristics of software reuse. And then, as a case study of application generator technique, the development of JR-DSSG and its features are presented. Finally, we end this paper with a discussion of intended further work.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kogut:1995:DRC, author = "Paul Kogut", title = "Design reuse: chemical engineering vs. software engineering", journal = j-SIGSOFT, volume = "20", number = "5", pages = "73--77", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217044", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The evolution of software engineering to a mature engineering discipline can be accelerated by adopting practices from other mature engineering disciplines. Mature engineering disciplines such as a chemical engineering have extensive systematic design reuse practices. In this paper, design reuse in chemical engineering is compared to current and emerging design reuse in software engineering. This comparison is based on the analogy that a chemical process that is implemented as a chemical plant is comparable to a software architecture that is implemented as a software system. The goal is to gain some insights on how engineering models are used to support systematic design reuse. These insights will help form the basis of model based software engineering.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leach:1995:IDA, author = "Ronald J. Leach and Terrence L. Fuller", title = "An illustration of the domain analysis process", journal = j-SIGSOFT, volume = "20", number = "5", pages = "78--82", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217046", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/linux.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib; http://www.math.utah.edu/pub/tex/bib/unix.bib", abstract = "Most researchers in software reuse believe that domain analysis is a requirement for a successful reuse program. Domain analysis is a generalization of systems analysis, in which the primary objective is to identify the operations and objects needed to specify information processing in a particular application domain. The ultimate purpose is to create domain-specific languages that permit specifications to be written in terms meaningful to the domain. The paper discusses domain analysis of the Linux operating system.", acknowledgement = ack-nhfb, affiliation = "Dept. of Syst. and Comput. Sci., Howard Univ., Washington, DC, USA", classification = "C6110B (Software engineering techniques); C6150J (Operating systems)", fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", keywords = "Domain analysis; Domain-specific languages; Information processing; Linux; Operating system; Software reuse; Specification; Systems analysis", thesaurus = "Formal specification; Operating systems [computers]; Software reusability; Systems analysis", } @Article{Ozcan:1995:VRV, author = "M. B. Ozcan and I. Morrey", title = "A visual requirements validation environment for the reverse engineering of formal specifications from rapid prototypes", journal = j-SIGSOFT, volume = "20", number = "5", pages = "83--87", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.217047", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes a research project whose aim is the use of requirements visualisation techniques in the construction of an environment for the reverse engineering of validated formal specifications from rapid prototypes. The work will build on established research by the proposers in the animation of model-based and algebraic formal specifications. The report examines the current problems with requirements engineering and looks at solutions based on software prototyping and executable formal specifications. It is argued that prototypes built in this way can be too ``formal'', in the sense that the customer viewing the prototype cannot easily comprehend the results of execution. For these types of prototypes to be useful, the output must be transformed into a representation which is more amenable for comprehension, namely graphical visualisations and animation instead of cryptic mathematical expressions. In this context, the term ``animation'' normally refers to an executable version of a formal specification which can be used to demonstrate to the user that the specification is doing what it should. In other words, the animation is a program whose behaviour can be explored with a view to confirming the user's expectations. Our aim is to investigate techniques and a methodology for building this program prior to the specification, based on some initial informal requirements, and reverse engineering a formal specification from it. The product of the research programme will be a software environment to support this requirements visualisation, animation and reverse engineering approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ayers:1995:BRC, author = "Michael Ayers", title = "Book Reviews: {{\booktitle{The Capability Maturity Model Guidelines for Improving the Software Process}}}", journal = j-SIGSOFT, volume = "20", number = "5", pages = "88--89", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.565652", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Borstler:1995:BRR, author = "Jurgen Borstler", title = "Book Review: {{\booktitle{Reengineering Information Technology Success Through Empowerment}}}", journal = j-SIGSOFT, volume = "20", number = "5", pages = "89", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.565653", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finkbine:1995:SI, author = "Ronald B. Finkbine and Ph. D.", title = "Software Inspection", journal = j-SIGSOFT, volume = "20", number = "5", pages = "90", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.565654", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leisner:1995:CUP, author = "Marry Leisner", title = "Confessions of a Used Program Salesman: Institutionalizing Software Reuse", journal = j-SIGSOFT, volume = "20", number = "5", pages = "90", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.565657", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1995:SSS, author = "Peter Neumann", title = "Safeware: System Safety and Computers", journal = j-SIGSOFT, volume = "20", number = "5", pages = "90--91", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.565656", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hansen:1995:SS, author = "Brinch Hansen", title = "The {SuperPascal} Software", journal = j-SIGSOFT, volume = "20", number = "5", pages = "91", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.565658", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1995:FDC, author = "Peter Neumann", title = "Fatal Defect: Chasing Killer Computer Bugs", journal = j-SIGSOFT, volume = "20", number = "5", pages = "91", month = dec, year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/217030.565659", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:02 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Shaw:1995:AIS, author = "Mary Shaw", title = "Architectural issues in software reuse: it's not just the functionality, it's the packaging", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "3--6", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211783", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Effective reuse depends not only on finding and reusing components, but also on the ways those components are combined. The informal folklore of software engineering provides a number of diverse styles for organizing software systems. These styles, or architectures, show how to compose systems from components; different styles expect different kinds of component packaging and different kinds of interactions between the components. Unfortunately, these styles and packaging distinctions are often implicit; as a consequence, components with appropriate functionality may fail to work together. This talk surveys common architectural styles, including important packaging and interaction distinctions, and proposes an approach to the problem of reconciling architectural mismatches.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Prieto-Diaz:1995:SRS, author = "Rub{\'e}n Prieto-D{\'\i}az", title = "Systematic reuse: a scientific or an engineering method?", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "9--10", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211784", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Tracz:1995:CUP, author = "Will Tracz", title = "Confessions of a used-program salesman: lessons learned", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "11--13", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211785", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software reuse is the second oldest programming profession. Ever since the first program logic board was wired, people have been looking for ways of saving time and money by building upon other's efforts and not ``not re-inventing any wheels.'' This article summarizes the lessons I have learned as used-program salesman. Using this analogy, I will examine efforts made to institutionalize software reuse.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Griss:1995:SSR, author = "Martin Griss and Ivar Jacobson and Chris Jette and Bob Kessler and Doug Lea", title = "Systematic software reuse (panel): objects and frameworks are not enough", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "17--20", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.213969", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Ensuring that object technology will achieve its promise of significant software reuse requires that special attention be paid to a combination of people, process and technology issues. Reuse will not happen automatically. The panelists will describe their experience with OO reuse and their views on the issues.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Arango:1995:SRI, author = "Guillermo Arango", title = "Software reusability and the {Internet}", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "22--23", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.213970", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Batory:1995:CRA, author = "Don Batory and Lou Coglianese and Mark Goodwin and Steve Shafer", title = "Creating reference architectures: an example from avionics", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "27--37", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211786", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "ADAGE is a project to define and build a domain-specific software architecture (DSSA) environment for assisting the development of avionics software. A central concept of DSSA is the use of software system generators to implement component-based models of software synthesis in the target domain [SEI90]. In this paper, we present the ADAGE component-based model (or reference architecture) for avionics software synthesis. We explain the modeling procedures used, review our initial goals, show how component reuse is achieved, and examine what we were (and were not) able to accomplish. The contributions of our paper are the avionics reference architecture and the lessons that we learned; both may be beneficial to others in future modeling efforts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Davis:1995:ARC, author = "Margaret J. Davis", title = "Adaptable, reusable code", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "38--46", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211789", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper discusses the concept of adaptability as a means for reaping the cost and schedule reduction benefits of reuse. Adaptability strives to implement the variability identified by domain analyses while managing the cost of implementation, extension, and use. The paper discusses a context for understanding different domain-specific reuse approaches relative to adaptability and analyzes experience in designing and developing adaptable code. The experience is drawn from the ARPA Software Technology for Adaptable, Reliable Systems (STARS) joint demonstration project with U.S. Navy.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Bieman:1995:RTI, author = "James M. Bieman and Josephine Xia Zhao", title = "Reuse through inheritance: a quantitative study of {C++} software", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "47--52", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211794", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "According to proponents of object-oriented programming, inheritance is an excellent way to organize abstraction and a superb tool for reuse. Yet, few quantitative studies of the actual use of inheritance have been conducted. Quantitative studies are necessary to evaluate the actual usefulness of structures such as inheritance. We characterize the use of inheritance in 19 existing C++ software systems containing 2,744 classes. We measure the class depth in the inheritance hierarchies, and the number of child and parent classes in the software. We find that inheritance is used far less frequently than expected.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{BenGhezala:1995:RAB, author = "Henda Hadjami {Ben Ghezala} and Farouk Kamoun", title = "A reuse approach based on object orientation: its contributions in the development of {CASE} tools", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "53--62", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The aim of this paper is to present an approach to facilitate reuse. This approach, which is based on an object oriented design method, describes a way of structuring components and reuse library. Two concepts, domain and theme, are introduced to allow a classification of components by the services that they offer and by application domain. The library itself is organized in three hierarchical levels -general, dedicated and personal-, where the reusable components are stored according to their degree of ``interest'' (general interest, by application type or particular). So, the library is generic and could cluster various reusable component types (specification components, design components, packages,{\ldots}). The contributions of this approach in the development of CASE tools are also emphasized.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Mambella:1995:IAS, author = "E. Mambella and R. Ferrari and F. D. Carli and A. L. Surdo", title = "An integrated approach to software reuse practice", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "63--80", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211805", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Since 1993, Sodalia's Software Engineers have been studying a reuse program whose goal is making software reuse a significant and systematic part of the software process. The Sodalia's Corporate Reuse Program is intended to develop a Software Reuse Process that incorporates reuse-specific activities along the Object-Oriented Software Development Process, and a reuse library to support the classification and management of reusable components. This paper focuses on the on-going experience of Sodalia in the gradual introduction of reuse practice in the organization, illustrates the evolutionary stages, and the reached results.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Gennari:1995:RPI, author = "John H. Gennari and Russ B. Altman and Mark A. Musen", title = "Reuse with {PROT{\'E}G{\'E}-II}: from elevators to ribosomes", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "72--80", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.316710", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Castano:1995:BRC, author = "S. Castano and V. {De Antonellis} and B. Pernici", title = "Building reusable components in the public administration domain", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "81--87", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211809", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The paper proposes methods and tools for building reusable components from families of Information System conceptual schemas, based on the identification of similar components in different schemas, and on their engineering into normalized descriptions. Clustering and abstraction techniques to help identifying similar components, and techniques to build corresponding reusable components are described in the paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Alencar:1995:FSR, author = "P. S. C. Alencar and D. D. Cowan and C. J. P. Lucena and L. C. M. Nova", title = "Formal specification of reusable interface objects", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "88--96", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211811", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we present a formal approach of a new object-oriented design concept to support reuse-in-the-large called Abstract Data Views (ADVs). The ADV approach was created to specify clearly and formally the separation of interfaces from the application components of a software system. Such an approach should lead to high degree of reuse of designs for both interface and application components. Our specification framework is based on descriptive schemas for both ADVs and ADOs, that are the basic building blocks for the system specification, design, and implementation using the ADV approach. These schemas describe the structural, static, and dynamic features of each system object, and include the specification of the concurrent operation of system components. Additionally, such schemas can be seen as an underlying structure to support the development of a specification language that describes the interconnection between interface and application components.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Jeng:1995:SMS, author = "Jun-Jang Jeng and Betty H. C. Cheng", title = "Specification matching for software reuse: a foundation", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "97--105", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211817", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Using formal specifications to represent software components facilitates the determination of reusability because they more precisely characterize the functionality of the software, and the well-defined syntax makes processing amenable to automation. We present specification matching as a method for classification, retrieval, and modification of reusable components. A software component is specified in terms of order-sorted predicate logic. For both components and methods, we consider not only exact match, but also relaxed match and logical match for performing specification matching over a library of reusable software components.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Caplan:1995:LFS, author = "Joshua E. Caplan and Mehdi T. Harandi", title = "A logical framework for software proof reuse", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "106--113", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211821", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We describe a logical framework PR for verification of reusable software components. Within our system, developers can employ the advantages traditionally associated with software reuse to reduce the cost of software verification by reusing abstract proofs and specifications. One can construct an algorithm with parameters, a specification with parameters, and a proof that the algorithm satisfies the specification provided the parameters satisfy certain conditions. Proofs in PRwill themselves contain parameters for subproofs concerning those conditions. In this framework, typing, type checking, and proof checking are decidable.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Jarzabek:1995:RLE, author = "Stan Jarzabek", title = "From reuse library experiences to application generation architectures", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "114--122", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211823", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Reuse through application generators has been successful in the area of programming language systems. We analyzed three language system projects that realized transition from the initial ad hoc programs, through libraries of reusable modules to application generator solutions. We tried to understand the underlying thinking process and technical factors that made such a transition possible. Based on this study, we generalized reuse experiences gained in the language system domain and formulated a reuse implementation framework. Our framework is to facilitate transition from component-based reuse to application generators in other domains. Ultimately, we hope our framework will offer reuse implementation guidelines for companies to realize such a transition. Initial findings are described in this paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Schappert:1995:ASS, author = "Albert Schappert and Peter Sommerlad and Wolfgang Pree", title = "Automated support for software development with frameworks", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "123--127", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211824", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This document presents some of the results of an industrial research project on automation of software development. The project's objective is to improve productivity and quality of software development. We see software development based on frameworks and libraries of prefabricated components as a step in this direction. An adequate development style consists of two complementary activities: the creation of frameworks and new components for functionality not available and the composition and configuration of existing components. Just providing adequate frameworks and components does not necessarily yield automation and efficiency of software development. We developed the concept of relations between software components as a foundation for abstraction, reuse and automatic code generation for component interrelationship. Furthermore we suggest to supplement frameworks with an active cookbook consisting of active recipes which guide the software developer in the use of framework elements. In this paper our concept of using relations among software components is presented and the active cookbook is illustrated as a means for developer guidance. We created a prototype to demonstrate these concepts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Sugiyama:1995:OMT, author = "Yasuhiro Sugiyama", title = "Object make: a tool for constructing software systems from existing software components", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "128--136", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211826", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Dusink:1995:RD, author = "Liesbeth Dusink and Jan van Katwijk", title = "Reuse dimensions", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "137--149", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211828", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In recent years, there have been much publications on reuse. In order to bet an overview of the whole field and also a good impression of the state of the reuse art, we studied reuse literature of the last few years. As basis for comparison, we classified literature according to four (more or less orthogonal) dimensions, based on the actions and knowledge of the reuser, i.e. the software engineer. The dimensions are: actions to be taken to get an existing reusable item; knowledge to be applied to find an existing reusable item; actions to be taken to build the complete system needed; knowledge to be applied to get the complete system needed. The survey shows that research on reuse from the viewpoint of needed system, receives far less attention than research from the viewpoint of reusable artifacts. We expect reuse to live up to its promise if this topic is addressed was well.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Fowler:1995:PWR, author = "Glenn S. Fowler and David G. Korn and Kiem-Phong Vo", title = "Principles for writing reusable libraries", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "150--159", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211834", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Over the past 10 years, the Software Engineering Research Department in AT\&T has been engaging in a research program to build a collection of highly portable advanced software tools known as Ast, Advanced Software Technology. A recent monograph, ``Practical Reusable UNIX Software'' (John Wiley \& Sons, Inc., 1995), summarizes the philosophy and components of this research program. A major component of this program is a collection of portable, and reusable libraries servicing a wide range of functions, from a porting base to all known UNIX platforms, to efficient buffered I/O, memory allocation, data compression, and expression evaluation. The libraries currently stand at about 150,000 non-commented lines of C code. They are developed and maintained independently by different researchers. Yet they work together seamlessly --- largely because of a collection of library design principles and conventions developed to help maintaining interface consistency and reducing needless or overlapped work.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Poulin:1995:MSA, author = "Jeffrey S. Poulin and Keith J. Werkman", title = "Melding structured abstracts and World Wide {Web} for retrieval of reusable components", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "160--168", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211841", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Reusable Software Libraries (RSLs) often suffer from poor interfaces, too many formal standards, high levels of training required for their use, and most of all, a high cost to build and maintain. Hence, RSLs have largely failed to return the reuse benefits promised by their developers. This paper first describes an RSL implementation using the World Wide Web (WWW) browser Mosaic and shows how it meets most RSL needs, avoids most RSL pitfalls, and costs only a fraction of the cost for the average commercial RSL. Second, the paper describes a way to quickly assess the important aspects of a piece of software so programmers can decide whether or not to reuse it. Using the observation that when programmers discuss software they tend to convey the same key information in a somewhat predictable order, this paper describes a method to automatically mimic this activity using a Structured Abstract of reusable components. Structured Abstracts provide a natural, easy to use way for developers to (1) search for components, (2) quickly assess the component for use, and (3) submit components to the RSL.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Lung:1995:ACD, author = "Chung-Horng Lung and Joseph E. Urban", title = "An approach to the classification of domain models in support of analogical reuse", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "169--178", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211842", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents an approach to classify domain models in order to facilitate reuse through analogy. Domain analysis plays a critical role for systematic reuse, but domain analysis is difficult to perform, especially for new application areas. Analogical approach to reuse can support the domain analysis process by providing software products in a different but analogous domain. In order to achieve this goal, domain models need to be classified. This paper proposes a classification method for domain models. The method is an integration of the enumerative hierarchy and faceted scheme. The classification approach can help the domain analyst to locate an analogous domain to perform the modeling and analysis process. Moreover, the approach is more flexible and more descriptive than conventional classification methods.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Browne:1995:LIN, author = "Shirley Browne and Jack Dongarra and Stan Green and Keith Moore and Theresa Pepin and Tom Rowan and Reed Wade", title = "Location-independent naming for virtual distributed software repositories", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "179--185", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211843", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/bibnet/authors/d/dongarra-jack-j.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A location-independent naming system for network resources has been designed to facilitate organization and description of software components accessible through a virtual distributed repository. This naming system enables easy and efficient searching and retrieval, and it addresses many of the consistency, authenticity, and integrity issues involved with distributed software repositories by providing mechanisms for grouping resources and for authenticity and integrity checking. This paper details the design of the naming system, describes how the system fits into the development of the National HPCC Software Exchange, an virtual software repository that has the goal of providing access to reusable software components for high-performance computing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Henninger:1995:DDK, author = "Scott Henninger", title = "Developing domain knowledge through the reuse of project experiences", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "186--195", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211844", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software development is no longer a homogeneous field. Software is being developed for an increasingly diverse set of applications and user populations, each with different characteristics and development constraints. As a consequence, researchers and practitioners have begun to realize the importance of identifying and understanding the characteristics and special development needs of application domains. This paper presents a method for developing and refining knowledge about application domains by creating a repository of project experiences. Subsequent projects can then benefit from these experiences by locating similar projects and reusing the knowledge accumulated in the repository. We develop a framework for a system to capture relationships between development projects and resources for developing software, including process models, methods, technologies, and tools. We then show how this information can be reused to improve the productivity and quality of software development efforts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Simos:1995:ODM, author = "Mark A. Simos", title = "Organization domain modeling {(ODM)}: formalizing the core domain modeling life cycle", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "196--205", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211845", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Researchers and practitioners are looking for systematic ways of comparing domain analysis (DA) methods. Comparisons have often focused on linkage between DA methods and related technologies such as systems modeling. Less attention has been paid to comparing DA methods in terms of certain core methodological issues, including problems of scoping, contextualizing, descriptive vs. prescriptive modeling, and formalized models of variability. This paper presents key aspects of Organization Domain Modeling (ODM), a systematic domain analysis method structured in terms of a core domain modeling life cycle directly addressing these methodological concerns.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{France:1995:ADA, author = "Robert B. France and Thomas B. Horton", title = "Applying domain analysis and modeling: an industrial experience", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "206--214", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211846", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we describe our experience in applying domain analysis within a company that develops personal electronic devices. We describe how we tailored the DSSA method to suit our needs and then present the process and representations that we found most useful for this situation. The conclusions and lessons learned are useful because few studies published at this time provide details about applications of domain engineering in commercial development environments.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Bhansali:1995:HAS, author = "Sanjay Bhansali", title = "A hybrid approach to software reuse", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "215--218", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211847", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We describe a hybrid approach to software reuse in an ongoing project that addresses a challenging software engineering task. The approach is driven by an architectural design and makes use of both code components and program synthesis technology. We describe criteria that were used in choosing the reuse strategy for different parts of the application and argue that to be successful a reuse strategy must be driven by the needs of an application program instead of adapting a software development strategy around a reuse program.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Wasmund:1995:SIR, author = "Michael Wasmund", title = "The spin-off illusion: reuse is not a by-product", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "219--221", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211848", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Based on the desire of enterprise management to find a smooth, low-risk way of introducing reuse methodology, this paper discusses several approaches taken. The illusion of using the by-product of software development to obtain reusable assets is the subject of the second approach. The third successful approach follows the software factory paradigm and has been successfully implemented at several IBM sites.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Fraser:1995:PTD, author = "Steven Fraser and Deborah Leishman and Robert McLellan", title = "Patterns, teams and domain engineering", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "222--224", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211849", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Gall:1995:RDS, author = "Harald Gall and Mehdi Jazayeri and Ren{\'e} Kl{\"o}sch", title = "Research directions in software reuse: where to go from here?", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "225--228", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211850", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software reuse is no longer in its infancy. We are able to look back at more than 15 years of research and should use the opportunity of such a symposium to critically evaluate the past research in order to identify promising future research areas in software reuse. In this paper, we give a broader view of reuse and some of the so far less-considered areas, which we believe may support software reuse to get off the ground. We mention our ongoing research in software reuse, discussing reuse experiments in the areas of long-term software evolution and component programming. Furthermore, we indicate the critical importance of interactions among the reuse and related communities within software engineering, such as the object-oriented and the software maintenance communities.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Gacek:1995:EDA, author = "Cristina Gacek", title = "Exploiting domain architectures in software reuse", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "229--232", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211851", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper provides motivation towards the use of domain specific repositories and DSSA's. It shows many of the positive side-effects this usage brings about. An extension to the faceted approach to components classification [Prieto-Diaz and Freeman 1987] is introduced. Our extension suggests a natural way of further benefiting from the use of domain specific repositories.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Ransom:1995:SSR, author = "Keith J. Ransom and Chris D. Marlin", title = "Supporting software reuse within an integrated software development environment (position paper)", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "233--237", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211852", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Significant gains in programmer productivity have been achieved through the use of simple abstraction mechanisms that enhance the reuse of code. There are other useful forms of abstraction (over arbitrary identifier bindings, for example) which could further increase reuse rates, but are not well supported by programming languages; such forms may be better expressed by exploiting mechanisms provided by an integrated programming environment. This paper outlines ongoing work which aims to provide programming environment mechanisms that support the reuse of code via various forms of abstraction that complement those traditionally provided by programming languages. The concept of derivation-based reuse is also defined, and a generic framework for its support is outlined. In addition, a collection of environment mechanisms, intended to fit within this framework, are outlined.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Dai:1995:DRE, author = "W. Dai", title = "Development of reusable expert system components: preliminary experience", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "238--246", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211853", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper addresses the metrics of expert system reusability through practical experience obtained in developing and using a previously implemented system called INDEX. It presents a principled approach in defining expert system component granularity, transparency, and a specification methodology in identifying and building reusable expert system skeletons and components to allow them to be used in most conventional software environments. The adoption of such an approach has led to the production of reusable expert system components for different expert system development projects. The preliminary experience in reusing INDEX facilities has been presented. Two applications are chosen to show the effectiveness of such an approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Voas:1995:STE, author = "J. Voas and J. Payne and R. Mills and J. McManus", title = "Software testability: an experiment in measuring simulation reusability", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "247--255", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211854", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software reuse can be more readily enabled if the testing of the code in the previous environment is still applicable to the new environment. The reusability of previous verification efforts is an important parameter is assessing the ``immediate'' reusability of the code; in this paper, the verification technique that we are focusing on is software testing. This paper presents the use of a software testability measure, sensitivity analysis, as a quantitative assessment of the reusability of previous verification. The ability to reuse verification is a factor to consider in determining the reusability of code. We have applied this technique to a large NASA supersonic software simulation, High Speed Civil Transport (HSCT), and the reusability results of that application suggest a possible concern about the sufficiency of the original verification.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Gomaa:1995:DMM, author = "Hassan Gomaa", title = "Domain modeling methods and environments", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "256--258", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211855", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Bieman:1995:CRO, author = "James M. Bieman and Byung-Kyoo Kang", title = "Cohesion and reuse in an object-oriented system", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "259--262", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211856", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We define and apply two new measures of object-oriented class cohesion to a reasonably large C++ system. We find that most of the classes are quite cohesive, but that the classes that are reused more frequently via inheritance exhibit clearly lower cohesion.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Paredes:1995:RRS, author = "Carlos Paredes and Jos{\'e} Luiz Fiadeiro", title = "Reuse of requirements and specifications: a formal framework", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "263--266", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211857", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "It is claimed that requirements engineering, as a problem of formalization and agreement, can benefit from raising the level of reusability up to functional requirements elicitation and specification levels. At these levels, it is important to support incomplete information in a declarative, reusable and refineable form. For that purpose, a model is proposed which is based on temporal theories, in the logical sense, together with a set of incremental specification techniques formalized through categorial constructions on theories.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Henninger:1995:SPS, author = "Scott Henninger", title = "Supporting the process of satisfying information needs with reusable software libraries: an empirical study", journal = j-SIGSOFT, volume = "20", number = "SI", pages = "267--270", year = "1995", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/223427.211858", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:04 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Retrieval tools for component-based software reuse libraries face two interrelated problems. The first is the ill-defined nature of information needs. The second is that large repositories will often use unfamiliar and esoteric vocabulary to describe software components. CodeFinder, a retrieval system designed to help developers locate software components for reuse, addresses these issues through an innovative combination of retrieval by reformulation and spreading activation. An empirical study comparing CodeFinder with two other systems showed evidence that subjects using CodeFinder with ill-defined tasks or mismatching vocabulary performed better than subjects using the other systems. The study confirmed the utility of spreading activation and retrieval by reformulation techniques for satisfying information needs of the kind encountered in software design.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", remark = "SSR '95 Proceedings of the 1995 Symposium on Software reusability.", } @Article{Notkin:1996:LEC, author = "David Notkin", title = "Letter from the executive committee", journal = j-SIGSOFT, volume = "21", number = "1", pages = "1--1", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381791", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leciston:1996:LE, author = "David John Leciston", title = "Letter to the editor", journal = j-SIGSOFT, volume = "21", number = "1", pages = "2--5", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381793", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Howell:1996:SNS, author = "Chuck Howell", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "21", number = "1", pages = "6--10", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381794", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1996:ESEa, author = "Barbara Ann Kitchenham", title = "Evaluating software engineering methods and tool part 1: The evaluation context and evaluation methods", journal = j-SIGSOFT, volume = "21", number = "1", pages = "11--14", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381795", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In the last five issues of SIGSOFT Notes, Shari Lawrence Pfleeger has discussed the use of formal experiments to evaluate software engineering methods and tools [1]. Shari's articles were based on work she performed for the U.K. DESMET project which aimed to develop a methodology for evaluating software engineering methods and tools. The DESMET project identified a number of useful evaluation methods in addition to formal experiments, and Shari asked me to continue this column by describing some of other methods. As a starting point, I will give an overview of the scope of the DESMET methodology in this article and describe the nine different evaluation methods DESMET identified. In the next few articles I will discuss criteria for selecting a specific method in particular circumstances. Later I will present the DESMET guidelines for performing quantitative case studies and feature analysis.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sitaraman:1996:ISR, author = "Murali Sitaraman", title = "4th international software reuse conference overview", journal = j-SIGSOFT, volume = "21", number = "1", pages = "15--15", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381796", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1996:IRP, author = "Peter G. Neumann", title = "Illustrative risks to the public in the use of computer systems and related technology", journal = j-SIGSOFT, volume = "21", number = "1", pages = "16--30", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381797", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pohl:1996:WSS, author = "Klaus Pohl and Peter Peters", title = "Workshop summary {Second International Workshop on Requirements Engineering: Foundation of Software Quality}", journal = j-SIGSOFT, volume = "21", number = "1", pages = "31--34", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As achieving high quality means the realization of customers needs, requirements engineering (RE) is the most crucial phase within software development. During RE not only the functional requirements but also the so-called 'non-functional' requirements of the planned software system have to be elicited from the customer and represented in a requirements document in order to provide the software designer with a complete and correct specification. Conventional RE methods normally support only parts of this process or help stating only specific kinds of requirements. These methodological problems are the prime motivation for the REFSQ workshop series held in conjunction with the CAiSE Conference on Advanced Information Systems Engineering. In order to find solutions which handle the described deficiencies it is the goal of this workshop series to improve the understanding of the relations between RE and software quality. This year's workshop, REFSQ'95, was held in conjunction with CAiSE'95 in Jyvaskyla, Finland on June 12th and 13th 1995. After the reviewing process we accepted 12 out of the 18 papers submitted. Finally, 11 full and position papers were presented at REFSQ'95 and discussed with the 15 participants (including the organizers). The participants came from 9 different countries.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Benner:1996:OSR, author = "Kevin Benner", title = "{``The Organization''} (or Software Reuse in a Business Environment)", journal = j-SIGSOFT, volume = "21", number = "1", pages = "35--39", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565660", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Latour:1996:WAW, author = "Larry Latour and Kevin Wentzel", title = "{WISR'95: 7th Annual Workshop on Software Reuse} summary and working group reports", journal = j-SIGSOFT, volume = "21", number = "1", pages = "35--54", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381799", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bailin:1996:DPE, author = "Sid Bailin", title = "Domain Processes and Engineering", journal = j-SIGSOFT, volume = "21", number = "1", pages = "39--42", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565661", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Simos:1996:DMR, author = "Mark Simos", title = "Domain Modeling Representation Strategies: Towards a Comparative Framework", journal = j-SIGSOFT, volume = "21", number = "1", pages = "42--46", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565663", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Frakes:1996:RP, author = "Bill Frakes", title = "The Reuse of Processes", journal = j-SIGSOFT, volume = "21", number = "1", pages = "46", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565674", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Edwards:1996:MAS, author = "Steve Edwards", title = "Micro-Architecture of Software Components and The Need For Good Mental Models of Software Subsystems", journal = j-SIGSOFT, volume = "21", number = "1", pages = "46--50", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565664", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Because of similar interests, these two groups initially met together, and then decided to jointly pursue both topics. From the micro-architecture perspective, the group was interested in the details of both the structure and the behavior of software component interfaces and on the implementations of individual components, sets of components, and how they compose and ``interoperate'' with each other. From the mental models perspective the group was interested in exploring the methods by which humans develop good mental models of generic software subsystems, the methods by which one can design software interfaces that ``project'' easy-to-assimilate mental models, and how existing programming languages support/hinder these efforts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Griss:1996:SOR, author = "Martin L. Griss", title = "Systematic {OO} Reuse --- a Tale Of Two Cultures", journal = j-SIGSOFT, volume = "21", number = "1", pages = "50--52", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565675", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Davis:1996:BIU, author = "Margaret J. Davis", title = "Barriers to Institutionalizing Using Current Tools and Environments", journal = j-SIGSOFT, volume = "21", number = "1", pages = "52--54", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565677", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Svoboda:1996:SWS, author = "Frank Svoboda and Fred Maymir-Ducharme and Jeff Poulin", title = "{SRI} workshop summary: ``domain analysis in the {DoD}''", journal = j-SIGSOFT, volume = "21", number = "1", pages = "55--67", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381800", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Workshop on ``Domain Analysis in the DoD,'' sponsored by the Software Reuse Initiative (SRI) and Defense Information Systems Agency (DISA), was held at MITRE Corporation, in McLean, Virginia on 26 --- 27 September 1995. The primary purpose of the workshop was to discuss issues related to identifying and scoping domains with emphasis on product lines and to assess the usefulness of the strawman SRI Domain Scoping Framework as a proposed basis for this scoping activity. To this end, two specific objectives were identified:1. to identify the barriers facing Program Executive Offices (PEOs) and Program Managers (PMs) in incorporating domain analysis technology in their organizations and programs and2. to recommend a range of solutions and/or approaches to address and overcome these barriers. Many DoD and Industry programs can benefit from the application of domain analysis technology (concepts, processes, methods, and tools). However, PEOs/PMs rarely have enough information regarding why, when, or how to use domain analysis on their programs. A more basic question is whether there are sufficient reuse benefits within an organization/domain to warrant the associated investment in domain engineering --- does a product line exist that justifies reuse costs? The solution to this problem involves bringing together leading domain analysis experts and PEO/PM representatives and managers to discuss a framework, currently under development by the DoD SRI, to guide DoD managers in applying domain analysis in their organizations and programs. The workshop brought together over fifty representatives from DoD, commercial, and academic organizations, with varied interests and perspectives on Domain Analysis, including those of methodologist, practitioner, management, and customer. The workshop approach included a Program Management panel, Domain Analysis Experts panel, a follow-up plenary discussion session and two working group sessions. In the working groups, the attendees were divided into 5 color-coded teams: Blue, Green, Gold, Orange, and Red, and were instructed to (1) identify issues in performing domain scoping, using the SRI Domain Scoping Framework as a ``strawman''; and (2) make recommendations for improving the framework and applying its principles in real-world situations. The teams were chosen to provide a diversified mix of view-points. Each team included a facilitator/rapporteur (responsible for keeping the discussion activities relevant to the task at hand) and a Framework expert (who served as the technical authority on issues relating to framework content). The general team approach involved focusing on issues and actions within the individual teams and then looking across teams for common threads in the plenary sessions. The ultimate goal was to build consensus and move ahead with implementation recommendations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garg:1996:FCS, author = "Pankaj K. Garg and Sriram Sankar", title = "Fifth {California} software symposium", journal = j-SIGSOFT, volume = "21", number = "1", pages = "68--70", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381801", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The California Software Symposium (CSS), which was held this year on March 30 at the University of California, Irvine, is the fifth in a series of symposia held annually in southern California. Previously, it was called the Irvine Software Symposium, and was organized by the University of California, Irvine. Starting this year, the event is co-organized by University of California, Irvine; and University of Southern California, Los Angeles (hence the name change). The symposium will be located alternately at the two organizing sites --- the next will be at the University of Southern California in April 1996. The purpose of this symposium is to bring together researchers and practitioners to share ideas and experiences in areas of software engineering. This year, a successful tools fair organized by IRUS (Irvine Research Unit in Software) was co-located with the symposium. The participating vendors were: Atria, Cadre, Continuus, IDE, Intersolv, Mark V, Rational, Softool, and Sun. The symposium is slowly gaining momentum and there has been a noticeable increase in the number of papers submitted and in participation. We anticipate further growth in the coming years. The symposium was co-chaired this year by Barry Boehm (USC), and Debra Richardson (UCI). The program committee consisted of 22 people, with a good mixture of academic and industrial representatives. For further information on the upcoming CSS or for any other related information, please contact Debra Brodbeck (714-824-2260, [email protected]) or Sandra Lapis (213-740-5703, [email protected]).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Nourani:1996:MAO, author = "Cyrus F. Nourani", title = "Multi-agent object level {AI} validation and verification", journal = j-SIGSOFT, volume = "21", number = "1", pages = "70--72", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381802", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A Methodology for validation and verification of AI systems in aerospace is presented. The approach is applicable to both systems that are already coded and to those that are to be designed. Design methods are proposed that can be applied to (reverse projected from) AI systems that are designed in the field and already coded. We note that there are well-developed software validation and verification methods that can be applied to the AI systems if an appropriate methodology is applied for validation of AI systems. Thus rather than reinventing methods for AI validation, we only invent methods to allow us to reduce to known problems in software validation and verification methodologies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wartik:1996:SYR, author = "Steve Wartik", title = "Slow down, you read too fast", journal = j-SIGSOFT, volume = "21", number = "1", pages = "73--74", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381803", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Carey:1996:SQI, author = "Dick Carey", title = "Is Software Quality Intrinsic, Subjective, or Relational?", journal = j-SIGSOFT, volume = "21", number = "1", pages = "74--75", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565678", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bruce:1996:IAM, author = "Michael Bruce", title = "{Internet} agility\slash Maturity model survey for the software industry call for participation", journal = j-SIGSOFT, volume = "21", number = "1", pages = "75--76", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381804", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This project is the first phase of M.S. thesis research performed by Michael Bruce, a graduate student at the Information Networking Institute of Carnegie Mellon University. This work is being done in conjunction with INSTEP, Inc., a strategic development firm located in Northern Virginia. The goal of the thesis is to evaluate the Internet's pervasiveness in the software industry, while creating a framework which enables a software firm to strategically and successfully increase its Internet presence. Towards this end, we are distributing a questionnaire entitled the Internet Agility/Maturity Model Survey for the Software Industry. The Internet Agility/Maturity Model (IAMM) survey elicits Internet usage trends with the software industry in each of the following five areas: * Background Information on Corporate Internet Use: Queries regarding the initial Internet connectivity planning and establishment phases. * Internet Presence Management: Queries regarding resources committed to on-going support and administration of the corporation's Internet presence * Internet ROI / Business Process Integration: Queries regarding which functions use Internet services, the tools employed to do so, and the value of an organization's presence in terms of its ROI * Internet Utilization Issues: Queries regarding future issues and current difficulties pertaining to the corporation's Internet presence * Agile Competitors and Virtual Organizations: Queries regarding the knowledge of and the concepts incorporated into the Iacocca Institute's agility model. A summary of our findings will be submitted for publication in a future issue of Software Engineering Notes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raccoon:1996:LCP, author = "L. B. S. Raccoon", title = "A learning curve primer for software engineers", journal = j-SIGSOFT, volume = "21", number = "1", pages = "77--86", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381805", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "I believe that many software engineers have heard of learning curves. We know that new skills take time to learn, that developers take a while to ramp up on a new project, and that improvement slows as time goes on. I also believe that we share many misconceptions about learning curves. We don't assume that learning curves are relevant to our software projects and we don't use them in our processes. In this paper, I want to raise the level of understanding of learning curves within the Software Engineering community. This paper is for managers and developers who want to better understand learning curves. Learning curves are much more than a hurdle to full productivity. They are both a metaphor and a specific set of equations that describe the most common patterns of improvement within stable processes. Learning curves explain why the productivity of a stable process changes the way that it does, why productivity is lowest at the start of a project and highest at the end of a project. Learning curves explain that though the improvements diminish throughout the process, the improvements continue adding up. And, we can use learning curves to predict future productivity. This paper is laid out as follows. In the first section, I define learning curves, describe their history, and argue that they apply to Software Engineering. In the second section, I describe the need to both stabilize and improve a process. Our concept of process influences how we try to improve it, so I discuss the implications of two different concepts of process. Learning curves denote the relationship between stability and improvement. In the third section, I discuss the implications of learning curves on staffing a project. Specifically, I show that Brooks's observations about man-months can be explained in terms of learning curves and that we need to keep teams together on long-term projects. And in the fourth section, I comment on several technical issues one might encounter when applying learning curves to software development. I describe the equations one might use to model a process as well as the affect learning curves typically have on software engineering projects.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Veryard:1996:ICM, author = "Richard Veryard", title = "Information coordination --- the management of information model, systems, and organizations", journal = j-SIGSOFT, volume = "21", number = "1", pages = "87--89", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.381806", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Burstler:1996:PLF, author = "Jurgen Burstler", title = "Pattern Languages o f Program Design", journal = j-SIGSOFT, volume = "21", number = "1", pages = "88--89", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565679", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finkbine:1996:MMS, author = "Ronald B. Finkbine and Ph. D.", title = "Metrics and Models in Software Quality Engineering", journal = j-SIGSOFT, volume = "21", number = "1", pages = "89", day = "1", month = jan, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381790.565681", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:06 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Poore:1996:HMP, author = "Jesse H. Poore", title = "{Harlan Mills}' Passing", journal = j-SIGSOFT, volume = "21", number = "2", pages = "6", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.773577", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1996:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "21", number = "2", pages = "7--10", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227532", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1996:ESEb, author = "Barbara Ann Kitchenham", title = "Evaluating software engineering methods and tool --- part 2: selecting an appropriate evaluation method --- technical criteria", journal = j-SIGSOFT, volume = "21", number = "2", pages = "11--15", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227533", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In the previous article about the DESMET evaluation methodology, I identified nine different types of evaluation:1. Quantitative Experiments2. Quantitative Case Studies3. Quantitative Surveys4. Feature Analysis --- Screening mode5. Feature Analysis --- Case Study6. Feature Analysis --- Experiment7. Feature Analysis --- Survey8. Qualitative Effects Analysis9. Benchmarking. This article considers the way in which different evaluation requirements and organisation capabilities affect your choice of evaluation method. Your particular choice of evaluation method will be affected by your evaluation goals, the characteristics of the object you want to evaluate, the characteristics of the organisation you work in, and the limitations and constraints placed on the evaluation exercise. These different factors interact in complicated ways, so it is difficult to identify which evaluation method is the most appropriate. The specific criteria that the DESMET methodology uses to determine your circumstances are:1. The evaluation context.2. The nature of the expected impact of using the method/tool.3. The nature of the object (i.e., method/tool/generic method) to be evaluated.4. The scope of impact of the method/tool.5. The maturity of the method/tool.6. The learning curve associated with the method/tool.7. The measurement capability of the organisation undertaking the evaluation. These issues are discussed in the following sections.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1996:RPCa, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "21", number = "2", pages = "16--22", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227534", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{McManus:1996:PMK, author = "Joe McManus and Renaat Vergruggen", title = "A proposed methodology for knowledge based systems development", journal = j-SIGSOFT, volume = "21", number = "2", pages = "22--31", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227535", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper proposes a new methodology for the development of Knowledge Based Systems (KBS). The key characteristics of knowledge based systems are examined, with particular emphasis on those aspects of developing such systems which differentiate them from more conventional development approaches. Existing KBS development methodologies are considered, and some of the important aspects of these methodologies are adopted/adapted within the new methodology, which seeks to define a methodological approach which satisfies the key requirements of knowledge-based systems development, while ensuring that the key managerial aspects of a methodological approach are also catered for. The proposed methodology is then assessed in the light of the particular difficulties of the paradigm which it seeks to address.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pillai:1996:FMI, author = "Krish Pillai", title = "The fountain model and its impact on project schedule", journal = j-SIGSOFT, volume = "21", number = "2", pages = "32--38", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227536", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A software life-cycle is defined as ``[the activity related to the software during] the period of time beginning when the software product is conceived and ending when the resultant software products are no longer available for use [7].'' A software development life-cycle can be broadly divided into phases, each phase being characterized by a well-defined set of activities associated with it. A model to represent such a life-cycle helps team members define their tasks more precisely. It helps managers track the project schedule and aids verification of requirements specification as the product evolves. Traditionally, software development has been based on the ``Waterfall'' model, shown in figure 1, or its variations. There is a natural tendency among designers to proceed in a highly sequential, linear, and non-iterative manner. Designers tend to adhere to the old adage ``Well begun is half done,'' by trying to make the analysis and design of the product as complete and precise as possible, before even embarking on its implementation. Every iteration, if any, to refine the design is viewed as an indicator of an insufficiency in the design. Tampering with the original conceptual design is discouraged, and though designers do iterate, they do so with a feeling of ``guilt/incompetence.'' Conventionally, the different phases in a life-cycle were classified as follows: * {\em Requirements Definition and Analysis Phase} --- This phase is characterized by review and analysis of a functional document that describes the product. Requirements are reviewed and analyzed and requirements based test-cases are also generated at this stage. * {\em Design Phase} --- Design drafts are reviewed and finalized. Test cases for design integrity are also generated at this stage. * {\em Implementation and Testing Phase} --- All test cases are finalized. The implementation is tested, first at the unit level, then following integration. * {\em Installation Phase} --- The system is accepted for release to customers during this phase. This may involve some minimal final acceptance level testing. * {\em Maintenance Phase} --- Regression testing, software evaluations and specifications for evolving the software are generated during this phase. The waterfall model does not have a well defined method of prototyping. It should be noted that a methodology such as the one above, provides hardly any latitude for iteration either. The stress is on refining the output of each phase to the highest degree possible before the commencement of the succeeding phase. Such an approach may however, not prove feasible under certain circumstances, especially when the product under development is highly complex, and composed of several agencies responsible for tasks of very high specificity. The sheer complexity of the requirements specification can obscure the underlying details so much that, a precise and detailed design is rendered impossible. Another instance is the case with products that involve ``cutting-edge'' technology, where research and development forms an integral part of the developmental life-cycle. The problem with designing ``state-of-the-art'' products is that, usually the most efficient design isn't yet known at the analysis stage. This necessitates an iterative approach to the analysis, design, and implementation stages discernible in a product's developmental life-cycle. However, the necessity of an iterative approach to product development requires basic building blocks that do not undergo drastic mutation over iterations. This is an issue of the choice of the ``Problem representation domain'' in which the model life-cycle is to be represented. The solution to this is to adopt an object-oriented approach since objects are fairly stable building blocks that can be identified at a very early stage in the product life-cycle. In most cases, the analysis, design, and implementation stages can all be mapped into the object-oriented domain without having to make disjoint mappings into the ``Structured Analysis Domain'' [3]. And the ``Fountain model,'' employed with much success in object-oriented projects, is ideally suited [5] for modeling such projects. A problem that is seldom addressed in concerned literature is the tendency for projects employing an iterative paradigm to run behind schedule. This paper investigates the most common causes of schedule slippage in a typical project based on the fountain model. Solutions that project team leaders adopt to counter these causes are also mentioned. ``Constraint mechanisms'' that are indicators of possible schedule slippage, are also investigated.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leite:1996:WRS, author = "Julio Cesar Sampaio do Prado Leite", title = "Working results on software re-engineering", journal = j-SIGSOFT, volume = "21", number = "2", pages = "39--44", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227537", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We view software re-engineering as a new approach to software maintenance. Instead of performing maintenance at the source code of systems, we work on high level abstractions. From these abstractions we proceed in a forward manner reusing the available implementations, when it is the case. As such, we view re-engineering as centered on design recovery. We have been working on methods for re-engineering and applying them to real cases. Our studies are centered on the idea of using JSD [Jackson 83] as a way of casting the recovered design. We worked with two small systems and a complex one. Our objective here is to highlight our approach, report on what has been done and point out what was learned.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Shoemaker:1996:ESE, author = "Dan Shoemaker and Vladan Jovanovic", title = "Educating software executives: a doctorate in software management", journal = j-SIGSOFT, volume = "21", number = "2", pages = "45--46", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227538", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This presents a model that integrates ``best theory and practice'' into a doctoral program focused on the development of leaders for the software industry. The advantage of a study centered on improvement of the software process should be intuitively obvious. This provides an overview, a model, and a course array.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bernstein:1996:SIS, author = "Lawrence Bernstein", title = "Software investment strategy", journal = j-SIGSOFT, volume = "21", number = "2", pages = "47--53", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227539", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kokol:1996:TQO, author = "Peter Kokol", title = "Toward quality oriented {IS} design processes using two levelled design", journal = j-SIGSOFT, volume = "21", number = "2", pages = "53--55", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227540", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The quality of information systems (IS) is strongly related with the quality of the IS design process and both are fundamental issues in successful IS construction and use process. In the paper we present a two-levelled IS design approach aimed to result in both quality oriented information system design processes and quality information systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{George:1996:SMF, author = "Joseph George and Bradley D. Carter", title = "A strategy for mapping from function-oriented software models to object-oriented software models", journal = j-SIGSOFT, volume = "21", number = "2", pages = "56--63", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227541", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Because of being in transition or because of choice, many software development environments make use of both the function-oriented and object-oriented approaches in their software development process. In some cases, object-oriented and function-oriented approaches are used in the development of the same system, such as when using function-oriented analysis with object-oriented design, necessitating a transition or mapping from one model to the other. This paper reviews the issues involved in mapping from a function-oriented software model to an object-oriented software model and presents a strategy for accomplishing the mapping in a consistent and partially automatable manner. The effectiveness of the strategy is assessed with four different applications drawn from the literature. It is concluded that the mapping strategy is feasible and reasonably automatable.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Johnson:1996:SES, author = "D. M. Johnson", title = "The systems engineer and the software crisis", journal = j-SIGSOFT, volume = "21", number = "2", pages = "64--73", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227542", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This report examines the software crisis from a systems engineer's viewpoint. It analyses the key areas of requirements specification, verification and validation and software re-use. It assesses some of the solutions to the crisis proposed by the software engineering community and highlights some of their problems and limitations from the systems engineer's perspective. The report describes how, through the use of computer-aided symbolic specification techniques and simulation, and with an understanding of the software development process, the skilled systems engineer can contribute to the resolution of the software crisis. The skilled systems engineer, can through the use of these techniques and by the application of systems engineering methods and project management skills, reduce the demands placed on software engineers, hence reducing the software engineering effort and also reducing the total development cost.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kelsey:1996:BFC, author = "Robert Bruce Kelsey", title = "Bad fixes, change specifications, and linguistic constraints on problem diagnosis", journal = j-SIGSOFT, volume = "21", number = "2", pages = "74--78", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227543", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Analyzing, diagnosing, and proposing fixes to problems in complex software is essentially a linguistic activity: we think in languages such as C and English, we analyze written problem reports, we read listings. In cognitive psychology and interpretation theory, the linguistic constraints upon cognition are well established; but with the exception of those authors working within the field of Speech Act Theory, little has been said about how these constraints affect software problem diagnosis or what we can do to overcome these constraints. This paper examines some of the linguistic aspects of software problem analysis, showing how these may contribute to the bad fix, and then describes a change specification procedure specifically designed to help development teams overcome some of the liabilities of interpreting complex software failures.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Swartz:1996:AAB, author = "A. John Swartz", title = "{Airport 95}: automated baggage system?", journal = j-SIGSOFT, volume = "21", number = "2", pages = "79--83", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227544", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Denver International Airport automated baggage system was a major news story spanning the years 1994-95. Reconstruction of the events of the project management of this system serves as an example of project summary reporting, which is stipulated in every project management methodology, but which is seldom or never done. The author provides sufficient detail to enable simulation of the design approach alternatives. If other projects are reported in the same format, it will be possible to compare projects on a design phase and/or event-by-event basis. The author recommends establishment and maintenance of a knowledge base of specific causes for failed software development projects.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pitts:1996:WWR, author = "David R. Pitts and Barbara H. Miller", title = "The wild-west revisited", journal = j-SIGSOFT, volume = "21", number = "2", pages = "84--86", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227545", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In 1985 Mark Spinrad and Curt Abraham published; `` The Wild West Lifecycle (WILI) '' [1] which, although written with a slightly irreverent tongue-in-cheek style, introduced a significant metaphor for the software engineering lifecycle. In this paper we will discuss briefly the importance of software metaphors in general, and then revisit and expand the Wild West analogy.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rine:1996:SDO, author = "David Rine", title = "Structural defects in object-oriented programming", journal = j-SIGSOFT, volume = "21", number = "2", pages = "86--88", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227546", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garcia:1996:PM, author = "Manuel J. Barranco Garc{\'\i}a and Juan Carlos Granja Alvarez", title = "Productive maintainability", journal = j-SIGSOFT, volume = "21", number = "2", pages = "89--91", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.227547", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "It is obvious the existence of a powerful connection between quality and productivity in the software projects. Normally, an increase of quality bring to a greater productivity. Maintainability is a very important factor of quality, considering the enormous consumption of resources that is carried out during the maintenance stage. We comment in this article the relation between maintainability and productivity, and when the maintainability result productive and when not.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ayers:1996:BRI, author = "Michael Ayers", title = "Book Review: {{\booktitle{Information Modeling --- An Object-Oriented Approach}} by Haim Kilov and James Ross}", journal = j-SIGSOFT, volume = "21", number = "2", pages = "91--92", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.773578", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leciston:1996:BRP, author = "David John Leciston", title = "Book Review: {{\booktitle{PCTE: The Standard for Open Repositories}} by Lois Wakeman and Jonathan Jowett}", journal = j-SIGSOFT, volume = "21", number = "2", pages = "92", month = mar, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/227531.773579", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:08 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1996:TAS, author = "Will Tracz", title = "Test and analysis of software architectures", journal = j-SIGSOFT, volume = "21", number = "3", pages = "1--3", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226296", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Some DoD programs now require prospective contractors to demonstrate the superiority of their software architectures for new weapons systems. This acquisition policy provides new software engineering challenges that focus heavily on the test and analysis of software architectures in order to determine the ``best'' architecture in terms of its implementability, affordability, extendability, scalability, adaptability, and maintainability --- not overlooking whether or not it will meet the functional requirements of the system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kang:1996:ESS, author = "Inhye Kang and Insup Lee", title = "An efficient state space generation for analysis of real-time systems", journal = j-SIGSOFT, volume = "21", number = "3", pages = "4--13", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226297", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "State explosion is a well-known problem that impedes analysis and testing based on state-space exploration. This problem is particularly serious in real-time systems because unbounded time values cause the state space to be infinite. In this paper, we present an algorithm that produces a compact representation of reachable state space of a real-time system. The algorithm yields a small state space, but still retains enough timing information for analysis. To avoid the state explosion which can be caused by simply adding time values to states, our algorithm first uses history equivalence and transition bisimulation to collapse states into equivalent classes. In this approach, equivalent states have identical observable events although transitions into the states may happen at different times. The algorithm then augments the resultant state space with timing relations that describe time distances between transition executions. For example, the relation @(tr 1) + 3 \leq @(tr 2) \leq @(tr 1) + 5 means that transition tr 2 is taken 3 to 5 time units before transition tr 2 is taken. This is used to analyze timing properties such as minimum and maximum time distances between events. To show the effectiveness of our algorithm, we have implemented the algorithm and are currently comparing it to other existing techniques which generate state space for real-time systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Koppol:1996:IAS, author = "Pramod V. Koppol and Kuo-Chung Tai", title = "An incremental approach to structural testing of concurrent software", journal = j-SIGSOFT, volume = "21", number = "3", pages = "14--23", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226298", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Structural testing of a concurrent program P involves the selection of paths of P according to a structure-based criterion. A common approach is to derive the reachability graph (RG) of P, select a set of paths of P, derive one or more inputs for each selected path, and force deterministic executions of P according to the selected paths and their inputs. The use of RG(P) for test path selection has the state explosion problem, since the number of states of RG(P) is an exponential function of the number of processes in P. In this paper, we present a new incremental approach to structural testing of P. Based on the hierarchy of processes in P, our incremental testing approach is to integrate processes in P in a bottom-to-top manner. When a set S of processes in P at the same level are integrated, we construct a reduced RG for S such that the reduced RG contains all synchronizations involving the processes in S and some of the synchronizations involving processes at lower levels in order to connect synchronizations involving processes in S. Based on the reduced RG for S, we can select test paths to focus on the detection of interface faults involving processes in S. After the selection of paths, RG(S) is further reduced in order to retain only some of the synchronizations involving processes in S that are needed in order to connect synchronizations between S and other processes in P. Our incremental approach alleviates the state explosion problem and offers other advantages.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chamillard:1996:IAP, author = "A. T. Chamillard and Lori A. Clarke", title = "Improving the accuracy of {Petri} net-based analysis of concurrent programs", journal = j-SIGSOFT, volume = "21", number = "3", pages = "24--38", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226299", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Spurious results are an inherent problem of most static analysis methods. These methods, in an effort to produce conservative results, overestimate the executable behavior of a program. Infeasible paths and imprecise alias resolution are the two causes of such inaccuracies. In this paper we present an approach for improving the accuracy of Petri net-based analysis of concurrent programs by including additional program state information in the Petri net. We present empirical results that demonstrate the improvements in accuracy and, in some cases, the reduction in the search space that result from applying this approach to concurrent Ada programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Morasca:1996:GFT, author = "Sandro Morasca and Angelo Morzenti and Pieluigi SanPietro", title = "Generating functional test cases in-the-large for time-critical systems from logic-based specifications", journal = j-SIGSOFT, volume = "21", number = "3", pages = "39--52", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226300", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We address the problem of generating functional test cases for complex, highly structured time-critical systems starting from a modularized logic-based specification written in the TRIOR$^+$ language, an object-oriented extension of the temporal logic TRIO. First, we present methods for producing test cases for a TRIO$^+$ specification module, referring both to the internal, hidden, portion of the module and to its interface. Then, we discuss criteria to be used in the construction of test cases from a TRIO$^+$ specification based on its composing modules and the connections among their interfaces. We formally define the notions related to test case derivation from TRIO$^+$ modules and we introduce an executable language for describing a variety of strategies for constructing test cases for structured TRIO$^+$ specifications starting from (parts of) the test cases of the composing modules. This language can be the basis for the implementation of an interactive tool for the semiautomatic construction of functional test cases from complex time-critical systems starting from their TRIO$^+$ specification.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hughes:1996:DSA, author = "Merlin Hughes and David Stotts", title = "{Daistish}: systematic algebraic testing for {OO} programs in the presence of side-effects", journal = j-SIGSOFT, volume = "21", number = "3", pages = "53--61", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226301", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Daistish is a tool that performs systematic algebraic testing similar to Gannon's DAISTS tool [2]. However, Daistish creates effective test drivers for programs in languages that use side effects to implement ADTs; this includes C++ and most other object-oriented languages. The functional approach of DAISTS does not apply directly in these cases. The approach in our work is most similar to the ASTOOT system of Doong and Frankl [1]; Daistish differs from ASTOOT by using Guttag-style algebraic specs (functional notation), by allowing aliasing of type names to tailor the application of parameters in test cases, and by retaining the abilities of DAISTS to compose new test points from existing ones. Daistish is a Perl script, and is compact and practical to apply. We describe the implementation and our experiments in both Eiffel and C++. Our work has concentrated on solving the semantics-specific issues of correctly duplicating objects for comparison; we have not worked on methods for selecting specific test cases. Daistish consists of a perl script and supporting documentation. The current distribution can be obtained via WWW at URL http://www.cs.unc.edu/~stotts/Daistish/.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chang:1996:SSB, author = "Juei Chang and Debra J. Richardson and Sriram Sankar", title = "Structural specification-based testing with {ADL}", journal = j-SIGSOFT, volume = "21", number = "3", pages = "62--70", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226302", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes a specification-based black-box technique for testing program units. The main contribution is the method that we have developed to derive test conditions, which are descriptions of test cases, from the formal specification of each program unit. The derived test conditions are used to guide test selection and to measure comprehensiveness of existing test suites. Our technique complements traditional code-based techniques such as statement coverage and branch coverage. It allows the tester to quickly develop a black-box test suite. In particular, this paper presents techniques for deriving test conditions from specifications written in the Assertion Definition Language (ADL) [SH94], a predicate logic-based language that is used to describe the relationships between inputs and outputs of a program unit. Our technique is fully automatable, and we are currently implementing a tool based on the techniques presented in this paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Crowley:1996:IFS, author = "J. L. Crowley and J. F. Leathrum and K. A. Liburdy", title = "Issues in the full scale use of formal methods for automated testing", journal = j-SIGSOFT, volume = "21", number = "3", pages = "71--78", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226303", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Experience from a full scale effort to apply formal methods to automated testing in the open systems software arena is described. The formal method applied in this work is based upon the Clemson Automated Testing System (CATS) which includes a formal specification language, a set of guidelines describing how to use the method effectively, and tool support capable of translating formal specifications into executable tests. This method is currently being used to develop a full scale test suite for IEEE's Ada Language Binding to POSIX. Following an overview of CATS, an experience report consisting of results, lessons learned and future directions is presented.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Heimdahl:1996:ELA, author = "Mats P. E. Heimdahl", title = "Experiences and lessons from the analysis of {TCAS II}", journal = j-SIGSOFT, volume = "21", number = "3", pages = "79--83", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226304", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This report highlights some of the experiences gathered while analyzing the requirements specification for a commercial avionics system called TCAS II (Traffic alert and Collision Avoidance System II) for consistency and completeness. Completeness in this context is defined as a complete set of requirements, that is, there is a behavior specified for every possible input and input sequence. Under the leadership of Dr. Nancy G. Leveson, the Irvine Safety Research Group has developed a state-based requirements specification language RSML (Requirements State Machine Language) using TCAS II as a testbed [6]. The TCAS requirements specification project was very successful; RSML was well liked by all participants in the project, and the formal specification has been adopted as the official TCAS II requirements. The requirements document has been delivered to the FAA and has undergone an extensive independent validation and verification effort (IV\&V). In a previous investigation, we defined procedures for analyzing state-based requirements specifications for completeness and consistency [5]. To demonstrate that our approach is feasible and is applicable to realistic systems, we have implemented a draft analysis tool and we have applied the analysis to the TCAS II requirements. The initial results from the analysis effort were encouraging [4, 5] and scaled well to a large requirements specification. The most complex parts of the TCAS requirements specification have recently been analyzed. Even though the effort was largely successful, some limitations with the approach have surfaced. Most importantly, the accuracy of the analysis algorithms needs improvement. When analyzing the most complex parts of the TCAS requirements, the number of spurious error reports can occasionally be overwhelming. Furthermore, we discovered that once the analysis has identified problems, it has been unexpectedly difficult to correct some of them.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hamlet:1996:PDT, author = "Dick Hamlet", title = "Predicting dependability by testing", journal = j-SIGSOFT, volume = "21", number = "3", pages = "84--91", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226305", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In assessing the quality of software, we would like to make engineering judgements similar to those based on statistical quality control. Ideally, we want to support statements like: ``The confidence that this program's result at X is correct is p, '' where X is a particular vector of inputs, and confidence p is obtained from measurements of the software (perhaps involving X). For the theory to be useful, it must be feasible to predict values of p near 1 for many programs, for most values of X. Blum's theory of self-checking/correcting programs has exactly the right character, but it applies to only a few unusual problems. Conventional software reliability theory is widely applicable, but it yields only confidence in a failure intensity, and the measurements required to support a correctness-like failure intensity (say 10$^{-9}$ /demand) are infeasible. Voas's sensitivity theory remedies these problems of reliability theory, but his model is too simple to be very plausible. In this paper we combine these ideas: reliability, sensitivity, and self-checking, to obtain new results on ``dependability,'' plausible predictions of software quality.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Morell:1996:UPA, author = "Larry Morell and Branson Murrill", title = "Using perturbation analysis to measure variation in the information content of test sets", journal = j-SIGSOFT, volume = "21", number = "3", pages = "92--97", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226306", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We define the information content of test set T with respect to a program P to be the degree to which the behavior of P on T approximates the overall behavior of P. Informally, the higher the information content of a test set, the greater the likelihood an error in the data state of a program will be manifested under testing. Perturbation analysis injects errors into the data state of an executing program and traces the impact of those errors on the intervening states and the program's output. The injection is performed by perturbation functions that randomly change the program's data state. Using perturbation analysis we demonstrate that different test sets may satisfy the same testing criterion but have significantly different information content. We believe that ``consistency of information content'' is a crucial measure of the quality of a testing strategy. We show how perturbation analysis may be used to assess individual testing strategies and to compare different testing strategies. The ``coupling effect'' of mutation testing implies that there is little variation among mutation-adequate test sets for a program. This implication is investigated for two simple programs by analyzing the variation among several mutation-adequate test sets.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Howden:1996:LSE, author = "W. E. Howden and G. M. Shi", title = "Linear and structural event sequence analysis", journal = j-SIGSOFT, volume = "21", number = "3", pages = "98--106", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226307", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An approach to systematic informal program analysis is discussed in which comments that describe hypotheses and assertions about the behavior of programs are analyzed. Event sequence comments analysis methods analyze the consistency of comments that describe events. Two event sequence analysis methods are discussed, one of which uses a linear event sequence model, and which has been applied to the analysis of large data processing systems. The other uses a new approach involving rule-based structural models, and has been applied to the analysis of Ada programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Harrold:1996:SCA, author = "Mary Jean Harrold and Gregg Rothermel", title = "Separate computation of alias information for reuse", journal = j-SIGSOFT, volume = "21", number = "3", pages = "107--120", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.309037", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Interprocedural dataflow information is useful for many software testing and analysis techniques, including dataflow testing, regression testing, program slicing and impact analysis. For programs with aliases, these testing and analysis techniques can yield invalid results, unless the dataflow information accounts for aliasing effects. Recent research provides algorithms for performing interprocedural dataflow analysis in the presence of aliases; however, these algorithms are expensive, and achieve precise results only on complete programs. This paper presents an algorithm for performing alias analysis on incomplete programs, that lets individual software components such as library routines, subroutines, or subsystems be independently analyzed. The paper also presents an algorithm for reusing the results of this separate analysis when linking the individual software components with calling modules. The primary advantage of our algorithms is that they let us analyze frequently used software components, such as library routines or classes, independently, and reuse the results of that analysis when analyzing calling programs, without incurring the expense of completely reanalyzing each calling program.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{DeMillo:1996:CSS, author = "Richard A. DeMillo and Hsin Pan and Eugene H. Spafford", title = "Critical slicing for software fault localization", journal = j-SIGSOFT, volume = "21", number = "3", pages = "121--134", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226310", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Developing effective debugging strategies to guarantee the reliability of software is important. By analyzing the debugging process used by experienced programmers, we have found that four distinct tasks are consistently performed: (1) determining statements involved in program failures, (2) selecting suspicious statements that might contain faults, (3) making hypotheses about suspicious faults (variables and locations), and (4) restoring program state to a specific statement for verification. This research focuses support for the second task, reducing the search domain for faults, which we refer to as fault localization. We explored a new approach to enhancing the process of fault localization based on dynamic program slicing and mutation-based testing. In this new approach, we have developed the technique of Critical Slicing to enable debuggers to highlight suspicious statements and thus to confine the search domain to a small region. The Critical Slicing technique is partly based on ``statement deletion'' mutant operator of the mutation-based testing methodology. We have explored properties of Critical Slicing, such as the relationship among Critical Slicing, Dynamic Program Slicing, and Executable Static Program Slicing; the cost to construct critical slices; and the effectiveness of Critical Slicing. Results of experiments support our conjecture as to the effectiveness and feasibility of using Critical Slicing for fault localization. This paper explains our technique and summarizes some of our findings. From these, we conclude that a debugger equipped with our proposed fault localization method can reduce human interaction time significantly and aid in the debugging of complex software.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Marx:1996:PWA, author = "Delia I. S. Marx and Phyllis G. Frankl", title = "The path-wise approach to data flow testing with pointer variables", journal = j-SIGSOFT, volume = "21", number = "3", pages = "135--146", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226311", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes a new approach to performing data flow testing on programs that use pointer variables and a tool based on this approach. Our technique is based on the observation that, under certain reasonable assumptions, we can determine which dereferenced pointers are aliased whenever control reaches a given program point via a particular path. Furthermore, we can group together paths which behave similarly and represent them by regular expressions. The resulting test requirements demand that the test data execute representatives of particular sets of paths between variable definitions and uses.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Marre:1996:UDT, author = "Martina Marr{\'e} and Antonia Bertolino", title = "Unconstrained duals and their use in achieving all-uses coverage", journal = j-SIGSOFT, volume = "21", number = "3", pages = "147--157", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226312", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Testing takes a considerable amount of the time and resources spent on producing software. It would therefore be useful to have ways (1) to reduce the cost of testing and (2) to estimate this cost. In particular, the number of tests to be executed is an important and useful attribute of the entity ``testing effort''. All-uses coverage is a data flow testing strategy widely researched in recent years. In this paper we present spanning sets of duas for the all-uses coverage criterion. A spanning set of duas is a minimum set of duas (definition-use associations) such that a set of test paths covering them covers every dua in the program. We give a method to find a spanning set of duas using the relation of subsumption between duas. Intuitively, there exists a natural ordering between the duas in a program: some duas are covered more easily than others, since coverage of the former is automatically guaranteed whenever the latter are covered. Those duas that are the most difficult to be covered according to this ordering are called unconstrained. A spanning set of duas is composed of unconstrained duas. Our results are useful for reducing the cost of testing, since the generation of test paths can be targeted to cover the smaller spanning set of duas, rather than all those in a program. On the other hand, assuming that a different path is taken to cover each dua in a spanning set, the cardinality of spanning sets can be used to estimate the cost of testing. Other interesting uses of spanning sets of duas are also discussed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Daran:1996:SEA, author = "Murial Daran and Pascale Th{\'e}venod-Fosse", title = "Software error analysis: a real case study involving real faults and mutations", journal = j-SIGSOFT, volume = "21", number = "3", pages = "158--171", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226313", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The paper reports on a first experimental comparison of software errors generated by real faults and by 1st-order mutations. The experiments were conducted on a program developed by a student from the industrial specification of a critical software from the civil nuclear field. Emphasis was put on the analysis of errors produced upon activation of 12 real faults by focusing on the mechanisms of error creation, masking, and propagation up to failure occurrence, and on the comparison of these errors with those created by 24 mutations. The results involve a total of 3730 errors recorded from program execution traces: 1458 errors were produced by the real faults, and the 2272 others by the mutations. They are in favor of a suitable consistency between errors generated by mutations and by real faults: 85\% of the 2272 errors due to the mutations were also produced by the real faults. Moreover, it was observed that although the studied mutations were simple faults, they can create erroneous behaviors as complex as those identified for the real faults. This lends support to the representativeness of errors due to mutations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pezze:1996:GMF, author = "Mauro Pezz{\`e} and Michal Young", title = "Generation of multi-formalism state-space analysis tools", journal = j-SIGSOFT, volume = "21", number = "3", pages = "172--179", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226314", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As software evolves from early architectural sketches to final code, a variety of representations are appropriate. Moreover, at most points in development, different portions of a software system are at different stages in development, and consequently in different representations. State-space analysis techniques (reachability analysis, model checking, simulation, etc.) have been developed for several representations of concurrent systems, but each tool or technique has typically been targeted to a single design or program notation. We describe an approach to constructing space analysis tools using a core set of basic representations and components. Such a tool generation approach differs from translation to a common formalism. We need not map every supported design formalism to a single internal form that completely captures the original semantics; rather, a shared ``inframodel'' represents only the essential information for interpretation by tool components that can be customized to reflect the semantics of each formalism. This results in more natural and compact internal representations, and more efficient analysis, than a purely translational approach. We illustrate the approach by applying the prototype tool to a small example problem, coordination of access to a coffee machine. The coffee machine is controlled by an Ada program, and the protocol of human users is modeled with Petri nets. Nets and process graph models are represented in the common internal form, and their composite behavior is analyzed by the prototype tool.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sloane:1996:BTP, author = "Anthony M. Sloane and Jason Holdsworth", title = "Beyond traditional program slicing", journal = j-SIGSOFT, volume = "21", number = "3", pages = "180--186", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226315", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Traditional program slices are based on variables and statements. Slices consist of statements that potentially affect (or are affected by) the value of a particular variable at a given statement. Two assumptions are implicit in this definition: (1) that variables and statements are concepts of the programming language in which the program is written, and (2) that slices consist solely of statements. Generalised slicing is an extension of traditional slicing where variables are replaced by arbitrary named program entities and statements by arbitrary program constructs. A model of generalised slicing is presented that allows the essence of any slicing tool to be reduced to a node marking process operating on a program syntax tree. Slicing tools can thus be implemented in a straight-forward way using tree-based techniques such as attribute grammars.A variety of useful program decompositions are shown to be instances of generalised slicing including: call graph generation, interface extraction, slicing of object-oriented inheritance hierarchies and slices based on type dependences. Examples are also given of how slicing can enhance understanding of formal compiler specifications and aid the creation of subset language specifications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Callahan:1996:AVV, author = "John R. Callahan and Todd L. Montgomery", title = "An approach to verification and validation of a reliable multicasting protocol", journal = j-SIGSOFT, volume = "21", number = "3", pages = "187--194", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226316", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptography1990.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes the process of implementing a complex communications protocol that provides reliable delivery of data in multicast-capable, packet-switching telecommunication networks. The protocol, called the Reliable Multicasting Protocol (RMP), was developed incrementally using a combination of formal and informal techniques in an attempt to ensure the correctness of its implementation. Our development process involved three concurrent activities: (1) the initial construction and incremental enhancement of a formal state model of the protocol machine; (2) the initial coding and incremental enhancement of the implementation; and (3) model-based testing of iterative implementations of the protocol. These activities were carried out by two separate teams: a design team and a V\&V team. The design team built the first version of RMP with limited functionality to handle only nominal requirements of data delivery. In a series of iterative steps, the design team added new functionality to the implementation while the V\&V team kept the state model in fidelity with the implementation. This was done by generating test cases based on suspected errant or off-nominal behaviors predicted by the current model. If the execution of a test was different between the model and implementation, then the differences helped identify inconsistencies between the model and implementation. The dialogue between both teams drove the co-evolution of the model and implementation. Testing served as the vehicle for keeping the model and implementation in fidelity with each other. This paper describes (1) our experiences in developing our process model; and (2) three example problems found during the development of RMP.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Offutt:1996:SMP, author = "A. Jefferson Offutt and J. Huffman Hayes", title = "A semantic model of program faults", journal = j-SIGSOFT, volume = "21", number = "3", pages = "195--200", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226317", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Program faults are artifacts that are widely studied, but there are many aspects of faults that we still do not understand. In addition to the simple fact that one important goal during testing is to cause failures and thereby detect faults, a full understanding of the characteristics of faults is crucial to several research areas in testing. These include fault-based testing, testability, mutation testing, and the comparative evaluation of testing strategies. In this workshop paper, we explore the fundamental nature of faults by looking at the differences between a syntactic and semantic characterization of faults. We offer definitions of these characteristics and explore the differentiation. Specifically, we discuss the concept of ``size'' of program faults --- the measurement of size provides interesting and useful distinctions between the syntactic and semantic characterization of faults. We use the fault size observations to make several predictions about testing and present preliminary data that supports this model. We also use the model to offer explanations about several questions that have intrigued testing researchers.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Yang:1996:TSL, author = "Cheer-Sun D. Yang and Lori L. Pollock", title = "Towards a structural load testing tool", journal = j-SIGSOFT, volume = "21", number = "3", pages = "201--208", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226318", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Load sensitive faults cause a program to fail when it is executed under a heavy load or over a long period of time, but may have no detrimental effect under small loads or short executions. In addition to testing the functionality of these programs, testing how well they perform under stress is very important. Current approaches to stress, or load, testing treat the system as a black box, generating test data based on parameters specified by the tester within an operational profile. In this paper, we advocate a structural approach to load testing. There exist many structural testing methods; however, their main goal is generating test data for executing all statements, branches, definition-use pairs, or paths of a program at least once, without consideration for executing any particular path extensively. Our initial work has focused on the identification of potentially load sensitive modules based on a static analysis of the module's code, and then limiting the stress testing to the regions of the modules that could be the potential causes of the load sensitivity. This analysis will be incorporated into a testing tool for structural load testing which takes a program as input, and automatically determines whether that program needs to be load tested, and if so, automatically generates test data for structural load testing of the program.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Korel:1996:ATD, author = "Bogdan Korel", title = "Automated test data generation for programs with procedures", journal = j-SIGSOFT, volume = "21", number = "3", pages = "209--215", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226319", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Test data generation in program testing is the process of identifying a set of test data that satisfies a selected testing criterion, such as, statement coverage or branch coverage. The existing methods of test data generation are limited to unit testing and may not efficiently generate test data for programs with procedures. In this paper we present an approach for automated test data generation for programs with procedures. This approach builds on the current theory of execution-oriented test data generation. In this approach, test data are derived based on the actual execution of the program under test. For many programs, the execution of the selected statement may require prior execution of some other statements that may be part of some procedures. The existing methods use only control flow information of a program during the search process and may not efficiently generate test data for these types of programs because they are not able to identify statements that affect execution of the selected statement. Our approach uses data dependence analysis to guide the process of test data generation. Data dependence analysis automatically identifies statements (or procedures) that affect the execution of the selected statement and this information is used to guide the search process. The initial experiments have shown that this approach may improve the chances of finding test data.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pomakis:1996:RAF, author = "Keith P. Pomakis and Joanne M. Atlee", title = "Reachability analysis of feature interactions: a progress report", journal = j-SIGSOFT, volume = "21", number = "3", pages = "216--223", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226320", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Features are added to an existing system to add functionality. A new feature interacts with an existing feature if the behavior of the existing feature is changed by the presence of the new feature. Our research group has started to investigate how to detect feature interactions during the requirements phase of feature development. We have adopted a layered state-transition machine model that prioritizes features and avoids interactions due to non-determinism. We have a tabular notation for specifying behavioral requirements of services and features. Specifications are composed into a reachability graph, and the graph is searched for feature interactions. This paper demonstrates how reachability analysis has been used to automatically detect known control interactions, data interactions, and resource contentions among telephony features.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bultan:1996:CVM, author = "Tevfik Bultan and Jeffrey Fischer and Richard Gerber", title = "Compositional verification by model checking for counter-examples", journal = j-SIGSOFT, volume = "21", number = "3", pages = "224--238", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226321", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Many concurrent systems are required to maintain certain safety and liveness properties. One emerging method of achieving confidence in such systems is to statically verify them using model checking. In this approach an abstract, finite-state model of the system is constructed; then an automatic check is made to ensure that the requirements are satisfied by the model. In practice, however, this method is limited by the state space explosion problem. We have developed a compositional method that directly addresses this problem in the context of multi-tasking programs. Our solution depends on three key space-saving ingredients: (1) checking for counter-examples, which leads to simpler search algorithms; (2) automatic extraction of interfaces, which allows a refinement of the finite model --- even before its communicating partners have been compiled; and (3) using propositional ``strengthening assertions'' for the sole purpose of reducing state space. In this paper we present our compositional approach, and describe the software tools that support it.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jackson:1996:ESA, author = "Daniel Jackson and Craig A. Damon", title = "Elements of style: analyzing a software design feature with a counterexample detector", journal = j-SIGSOFT, volume = "21", number = "3", pages = "239--249", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226322", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We illustrate the application of Nitpick, a specification checker, to the design of a style mechanism for a word processor. The design is cast, along with some expected properties, in a subset of Z. Nitpick checks a property by enumerating all possible cases within some finite bounds, displaying as a counterexample the first case for which the property fails to hold. Unlike animation or execution tools, Nitpick does not require state transitions to be expressed constructively, and unlike theorem provers, operates completely automatically without user intervention. Using a variety of reduction mechanisms, it can cover an enormous number of cases in a reasonable time, so that subtle flaws can be rapidly detected.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Corbett:1996:CAM, author = "James C. Corbett", title = "Constructing abstract models of concurrent real-time software", journal = j-SIGSOFT, volume = "21", number = "3", pages = "250--260", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226323", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Concurrent real-time software is used in many safety-critical applications. Assuring the quality of such software requires the use of formal methods. Before a program can be analyzed formally, however, we must construct a mathematical model that captures the aspects of the program we want to verify. In this paper, we show how to construct mathematical models of concurrent real-time software that are suitable for analyzing the program's timing properties. Our approach differs from schedulability analysis in that we do not assume that the software has a highly restricted structure (e.g., a set of periodic tasks). Also, unlike most more abstract models of real-time systems, we account for essential properties of real implementations, such as resource constraints and run-time overhead.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Godefroid:1996:UPO, author = "Patrice Godefroid and Doron Peled and Mark Staskauskas", title = "Using partial-order methods in the formal validation of industrial concurrent programs", journal = j-SIGSOFT, volume = "21", number = "3", pages = "261--269", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226324", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We have developed a formal validation tool that has been used on several projects that are developing software for AT\&T's 5ESS$^{{\TM }}$ telephone switching system. The tool uses Holzmann's supertrace algorithm to check for errors such as deadlock and livelock in networks of communicating processes. The validator invariably finds subtle errors that were missed during thorough simulation and testing; however, the brute-force search it performs can result in extremely long running times, which can be frustrating to users. Recently, a number of researchers have been investigating techniques known as partial-order methods that can significantly reduce the running time of formal validation by avoiding redundant exploration of execution scenarios. In this paper, we describe the design of a partial-order algorithm for our validation tool and discuss its effectiveness. We show that a careful compile-time static analysis of process communication behavior yields information that can be used during validation to dramatically improve its performance. We demonstrate the effectiveness of our partial-order algorithm by presenting the results of experiments with actual industrial examples drawn from a variety of 5ESS$^{{\TM }}$ application domains, including call processing, signalling, and switch maintenance.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Barjaktarovic:1996:FSV, author = "Milica Barjaktarovic and Shiu-Kai Chin and Kamal Jabbour", title = "Formal specification and verification of the kernel functional unit of the {OSI} session layer protocol and service using {CCS}", journal = j-SIGSOFT, volume = "21", number = "3", pages = "270--279", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226325", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes an application of formal methods to protocol specification, validation and verification. Formal methods can be incorporated in protocol design and testing so that time and resources are saved on implementation, testing, and documentation. In this paper we show how formal methods can be used to write the control sequence, i.e. pseudo code, which can be formally tested using automated support. The formal specification serves as a blueprint for a correct implementation with desired properties. As a formal method we chose a process algebra called ``plain'' Calculus of Communicating Systems (CCS). Our specific objectives were to: (1) build a CCS model of the Kernel Functional Unit of OSI session layer service: (2) obtain a session protocol specification through stepwise refinement of the service specification; and (3) verify that the protocol specification satisfies the service specification. We achieved all of our objectives. Verification and validation were accomplished by using the CCS's model checker, the Edinburgh Concurrency Workbench (CWB). We chose plain CCS because of its succinct, abstract, and modular specifications, strong mathematical foundation which allows for formal reasoning and proofs, and existence of the automated support tool which supports temporal logic. The motivation for this work is: (1) testing the limits of CCS's succinct notation; (2) combining CCS and temporal logic; and (3) using a model-checker on a real-life example.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Atlee:1996:LMS, author = "Joanne M. Atlee and Michael A. Buckley", title = "A logic-model semantics for {SCR} software requirements", journal = j-SIGSOFT, volume = "21", number = "3", pages = "280--292", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226326", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents a simple logic-model semantics for Software Cost Reduction (SCR) software requirements. Such a semantics enables model-checking of native SCR requirements and obviates the need to transform the requirements for analysis. The paper also proposes modal-logic abbreviations for expressing conditioned events in temporal-logic formulae. The Symbolic Model Verifier (SMV) is used to verify that an SCR requirements specification enforces desired global requirements, expressed as formulae in the enhanced logic. The properties of a small system (an automobile cruise control system) are verified, including an invariant property that could not be verified previously. The paper concludes with a discussion of how other requirements notations for conditioned-event-driven systems could be similarly checked.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Denney:1996:WSA, author = "Richard Denney and Dick Kemmerer and Nancy Leveson and Alberto Savoia", title = "Why state-of-the-art is not state-of-the-practice (panel)", journal = j-SIGSOFT, volume = "21", number = "3", pages = "293", month = may, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/226295.226327", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:10 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1996:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "6--9", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232074", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1996:ESEc, author = "Barbara Ann Kitchenham", title = "Evaluating software engineering methods and tool --- part 3: selecting an appropriate evaluation method --- practical issues", journal = j-SIGSOFT, volume = "21", number = "4", pages = "9--12", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232075", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In the first article about the DESMET evaluation methodology, I identified nine different types of evaluation:1. Quantitative Experiments2. Quantitative Case Studies3. Quantitative Surveys4. Feature Analysis --- Screening mode5. Feature Analysis --- Case Study6. Feature Analysis --- Experiment7. Feature Analysis --- Survey8. Qualitative Effects Analysis9. Benchmarking. In the last article I discussed various technical criteria that would influence your choice of an evaluation method. In principle, you should select the simplest evaluation method appropriate for your specific evaluation requirements and organisational capability. However there are a number of constraints that can influence your final choice of evaluation method: * the elapsed time that is needed for the different evaluation options; * the confidence that a user can have in the results of an evaluation; * the cost of an evaluation;This information may be useful in two circumstances:1. When you want to decide between a quantitative case study and a quantitative formal experiment and there are no clear technical reasons for preferring one to the other.2. When you want to ensure that the evaluation you have decided to undertake is feasible. These issues are discussed in this article.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1996:RPCb, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "21", number = "4", pages = "12--18", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232076", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Samadzadeh:1996:SSR, author = "M. Samadzadeh and M. K. Zand", title = "{SSR'95} summary report", journal = j-SIGSOFT, volume = "21", number = "4", pages = "39--40", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232077", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Smith:1996:FIC, author = "Graeme Smith", title = "{First ISEW Cleanroom} workshop summary", journal = j-SIGSOFT, volume = "21", number = "4", pages = "41--44", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232078", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jelly:1996:CRD, author = "Innes Jelly and Ian Gorton", title = "Current research directions in software engineering for parallel and distributed systems", journal = j-SIGSOFT, volume = "21", number = "4", pages = "44--46", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232080", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In March 1996, the First IFIP Workshop on Software Engineering for Parallel and Distributed Systems was held in Berlin, Germany. The two day workshop was co-sponsored by the German Computer Society GI (Gesellschaft fur Informatik), and organised in association with the International Software Engineering Conference --- ICSE 18. The aim of the workshop was to provide a forum for exchange of information and publication of the latest technological and theoretical advances in software engineering for parallel and distributed systems. Our previous experience of running short workshop on this topic in Aachen, Germany (1993), Como, Italy (1994) and Hawaii, USA (1995) had indicated that there was a growing need for this specialized event [1], [2], [3]. The International Programme Committee was formed from a group of experts in different countries and application areas, all of whom were enthusiastic to explore and publicize contemporary research in parallel and distributed software engineering. In this report we discuss the rationale for the workshop, detail its outcomes and look at some of the research issues that it highlighted. The proceedings of the workshop are published by Chapman and Hall [4], and full information is available on the PDSE Web page: http://www.dcs.shef.ac.uk/~prc/PDSE.html", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ludewig:1996:STI, author = "Jochen Ludewig", title = "Summary of the {Third International Workshop on Software Engineering Education (IWSEE3)}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "47--51", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232081", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bull:1996:RDP, author = "Tim Bull and Keith Bennett", title = "A report on the {Durham Program Transformations Workshop}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "51--53", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232082", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A Workshop on Program Transformation Systems was held in the Centre for Software Maintenance at University of Durham on 1st and 2nd April 1996. The Workshop was intended as a follow up for the successful event held on the same topic at ICSE in Seattle in 1995. Twenty-three people attended the Workshop, and this is a short report on the proceedings.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sommerville:1996:SIW, author = "Ian Sommerville", title = "{Sixth International Workshop on Software Configuration Management}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "54--57", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232083", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Muhlhauser:1996:MWM, author = "Max M{\"u}hlh{\"a}user", title = "{MMSD'96: Workshop on Multimedia Software Development}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "58--63", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232085", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Multimedia imposes quite a number of specific issues and requirements on software. While system support for multimedia has been seriously investigated for several years now, the software engineering community has not yet reached a deep understanding of the impacts of multimedia on their field. MMSD'96 brought together a representative spectrum of researchers investigating this issue. Four general observations could be retained from their contributions: 1. distributed multimedia applications exploit both more long-term potential and more persistent research problems than multimedia PC applications; 2. A reference model of multimedia software is not yet in reach; the large number of models proposed, even at MMSD, still lack better rationales, theoretic foundation, and convergence. 3. the MMSD community brings together people with a ``document-background'' and those with a ``software background''; their views and approaches are still far from being harmonized. 4. While the multimedia community struggles for a common understanding among its members, it is in desperate need of a harmonization with approaches to distributed software development. In the remainder of this article, we will review issues to be addressed in the MMSD context, discuss the contributions made at the workshop itself, and draw conclusions for the state of the art.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rosenblum:1996:FMT, author = "David S. Rosenblum", title = "Formal methods and testing: why the state-of-the art is not the state-of-the practice", journal = j-SIGSOFT, volume = "21", number = "4", pages = "64--66", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232086", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ramachandran:1996:RDS, author = "Muthu Ramachandran", title = "Requirements-driven software test: a process-oriented approach", journal = j-SIGSOFT, volume = "21", number = "4", pages = "66--70", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232088", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Testing is essential for proving the quality of all products. It is expensive and hard to test interactive multimedia systems. This paper proposes a model for the test process, and investigates the possibility of deriving test cases from system models and requirement analysis techniques such as requirements definition and specification. We believe this will allow early detection of errors thereby reducing the cost for testing. These test cases can also be used as guidelines on design for testability. Effectiveness of the test tools depends on the careful selection of test cases.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vazquez:1996:AAD, author = "Federico Vazquez", title = "An algebra approach to the deduction of data flow diagrams and object oriented diagrams from algebraic specifications", journal = j-SIGSOFT, volume = "21", number = "4", pages = "71--80", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232090", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Software Engineering procedures usually lack formal mathematical foundations. This paper presents a formal approach for the development of Specifications, Data Flow Diagrams and Object Oriented Diagrams using algebraic theory. The use of algebraic theory allows the check for completeness and consistency and the generation of automatic procedures for translating specifications into Data Flow Diagrams or Object Oriented Diagrams.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Laitinen:1996:EUS, author = "Kari Laitinen", title = "Estimating understandability of software documents", journal = j-SIGSOFT, volume = "21", number = "4", pages = "81--92", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232092", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software developers and maintainers need to read and understand source programs and other kinds of software documents in their work. Understandability of software documents is thus important. This paper introduces a method for estimating the understandability of software documents. The method is based on a language theory according to which every software document is considered to contain a language of its own, which is a set of symbols. The understandability of documents written according to different documentation practices can be compared using the rules of the language theory. The method and the language theory are presented by using source programs with different naming styles as example documents. The method can, at least theoretically, be applied to any kind of document. It can also be used to explain the benefits of some well-known software design methods.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ryant:1996:LSM, author = "Ivan Ryant", title = "7-layered (small mental exercise)", journal = j-SIGSOFT, volume = "21", number = "4", pages = "93", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.232095", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ayers:1996:BRR, author = "Michael Ayers", title = "Book Review: {{\booktitle{Reliable Object-Oriented Software --- Applying Analysis and Design}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "94--95", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565768", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ayers:1996:BRB, author = "Michael Ayers", title = "Book Review: {{\booktitle{Bringing Design to Software}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "95--96", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565769", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finkbine:1996:BRSa, author = "Ronald B. Finkbine", title = "Book Review: {{\booktitle{Software Development Using Eiffel}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "96", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565785", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finkbine:1996:BRSb, author = "Ronald B. Finkbine", title = "Book Review: {{\booktitle{Software Fault Tolerance}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "96", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565786", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hollenbach:1996:BRS, author = "Frank Hollenbach", title = "Book Review: {{\booktitle{Software Systems Construction with Examples in Ada}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "97", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565787", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/adabooks.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kelsey:1996:BRI, author = "Robert Bruce Kelsey", title = "Book Review: {{\booktitle{An ISO 9000 Approach To Building Quality Software}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "97--98", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565788", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kelsey:1996:BRQ, author = "Robert Bruce Kelsey", title = "Book Review: {{\booktitle{A Quantitative Approach to Software Management: The ami Handbook}} [ISBN 0-201-87746-5, 179 pages, \$24.69]}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "98--99", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565792", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kelsey:1996:BRH, author = "Robert Bruce Kelsey", title = "Book Review: {{\booktitle{How To Run Successful Projects}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "99", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565804", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kelsey:1996:BRM, author = "Robert Bruce Kelsey", title = "Book Review: {{\booktitle{A MAP For Software Acquisition}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "99", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565805", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leisner:1996:BRD, author = "Marty Leisner", title = "Book Review: {{\booktitle{Debugging the Development Process}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "99--100", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.565806", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leisner:1996:BRM, author = "Marty Leisner", title = "Book Review: {{\booktitle{Managing Your Move to Object Technology: Guidelines and Strategies for a Smooth Transition}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "100", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.566079", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{OLaughlin:1996:BRB, author = "Brian O'Laughlin", title = "Book Review: {{\booktitle{Beyond Technology's Promise}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "100--101", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.566080", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{OLaughlin:1996:BRC, author = "Brian O'Laughlin", title = "Book Review: {{\booktitle{C\slash C++ Software Quality Tools}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "101--103", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.566081", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{OLaughlin:1996:BRF, author = "Brian O'Laughlin", title = "Book Review: {{\booktitle{Foundations of Software Measurement}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "103", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.566082", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Person:1996:BRO, author = "Suzette Person", title = "Book Review: {{\booktitle{The Object Primer}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "104", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.566083", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raynham:1996:BRR, author = "Peter Raynham", title = "Book Review: {{\booktitle{Rapid Software Development with Smalltalk}}}", journal = j-SIGSOFT, volume = "21", number = "4", pages = "104", month = jul, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/232069.566084", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:12 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1996:FSF, author = "David Garlan and Mark Morieoni", title = "The Fourth Symposium on the Foundations of Software Engineering {(FSE4)}", journal = j-SIGSOFT, volume = "21", number = "5", pages = "4", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.773580", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fuggetta:1996:IPG, author = "Alfonso Fuggetta", title = "{ICSE 97}: picking up the gauntlet", journal = j-SIGSOFT, volume = "21", number = "5", pages = "5--6", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235970", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1996:SNSc, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "21", number = "5", pages = "6--10", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235971", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sadler:1996:ESE, author = "Chris Sadler and Barbara Ann Kitchenham", title = "Evaluating software engineering methods and tool --- part 4: the influence of human factors", journal = j-SIGSOFT, volume = "21", number = "5", pages = "11--13", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235972", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In previous articles, we have described the range of methods available if you want to evaluate a software engineering method/tool and the criteria you need to consider to select a method appropriate to your individual circumstances. In future articles we will describe some guidelines to help you perform quantitative case studies and feature analysis. However, in this article we would like to review some of the human factors issues that can affect an evaluation exercise.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1996:RPCc, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "21", number = "5", pages = "13--20", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235975", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kramer:1996:SIW, author = "Jeff Kramer and Alexander L. Wolf", title = "Succeedings of the {8th International Workshop on Software Specification and Design}", journal = j-SIGSOFT, volume = "21", number = "5", pages = "21--35", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235976", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The 8th International Workshop on Software Specification and Design (IWSSD-8) was held at Schloss Velen, Germany, in March 1996. In order to foster informed and fruitful discussions, the workshop was an invitation-only event of limited size. Based on formal submissions, approximately 60 people were selected and invited. Like its predecessors, IWSSD-8 maintained the principle that the accepted papers should serve as background material for the workshop. Therefore, the workshop did not include formal paper presentations, but rather provided an opportunity to engage in real work, with intensive discussions focussed around major themes. Each theme was discussed in a separate working group directed by a Working Group Chair who organized their group members so as to discuss the research issues of that particular theme. This year the themes selected were Requirements Engineering, Design Engineering, Software Architecture, and Concurrency/Distribution.IWSSD has established a tradition of using ``case studies'' as a focus for individual working groups. These case studies, supplied in advance to participants, have proved to be a fruitful way of working. Evidence of this can be seen most clearly in the ``succeedings'' or workshop reports which have followed previous workshops. It was decided that for IWSSD-8, in order to provide common ground between the themes, a single common case study should be used. The ``Report on the Inquiry into the London Ambulance Service'' was selected, with each theme drawing on it in a manner appropriate to their own interests and concerns. The London Ambulance Service (LAS) is briefly summarized below and discussed in the first paper appearing in the proceedings. The case study was presented in a plenary session at the beginning of the workshop and the findings of the different working groups presented and discussed at the end of the workshop, again in a plenary session. In order to make best use of the time available, working group members were asked to prepare for the workshop by familiarizing themselves with the case study and the major issues in their area relevant to that case study. We believe that this format made it both attractive and rewarding for people to attend, and was a major reason for the success of this workshop.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tatsuta:1996:CCA, author = "Tanehiro Tatsuta", title = "Conference on computer-aided software engineering summary report", journal = j-SIGSOFT, volume = "21", number = "5", pages = "36--39", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235978", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The fifth Conference on Computer-Aided Software Engineering was held July 10-12, 1996 in Tokyo in conjunction with CASE Japan'96. The general chair, Yoshihiro Matsumoto (University of OSAKA Institute of Technology), organized the program, along with the vice-chair, Hiroshi Mukaiyama (Japan Information Processing Developing Center), Ichiro Moriyama (Reed Exhibitions Japan), and the 17 members of the program Screening Committee. Reed Exhibitions Japan sponsored the Conference and all the related events as well. The program consisted of the Keynote Address and 20 sessions. I have selected several features out of the program and have submitted here as a Summary Report on behalf of all the members of the Committee so as to attempt to capture the essence of the Conference.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1996:EDC, author = "Will Tracz", title = "{Evolutionary Design of Complex Software (EDCS)} kick off workshop summary", journal = j-SIGSOFT, volume = "21", number = "5", pages = "40--42", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235979", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Favaro:1996:SPC, author = "John Favaro", title = "On the scalability problem in {COTS-based} programming environments", journal = j-SIGSOFT, volume = "21", number = "5", pages = "43--46", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235981", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This article reports on a software design experience in which the concept of scalability is applied to the architecture of a software development environment based upon Commercial-Off-The-Shelf (COTS) tools. The experience has raised many issues, which are summarized here together with attempts to analyse their origins and indicate solutions. We believe that problems with the introduction of scalability will be encountered by any project attempting the integration of heterogeneous COTS products.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Day:1996:URC, author = "Donald L. Day", title = "User responses to constraints in computerized design tools (extended abstract)", journal = j-SIGSOFT, volume = "21", number = "5", pages = "47--50", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235982", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This study sought to improve our understanding of user attitudes, perceptions, satisfaction and behavior in reference to constraints within computerized design tools. It also attempted to examine the differences in perspective between tool builders and tool users regarding appropriate design practices, as communicated via design tools. The study created a typology of constraints and described a set of strategies users employ in the negotiation of constraints encountered in of computer-aided systems engineering (CASE) tools. Also addressed were (a) the cognitive fit between tool users and tool builders in terms of appropriate and necessary constraints, and (b) issues of creativity in the design of computer software. An eight-page questionnaire containing 61 questions was developed by conducting structured interviews with tool users and managers, in industry. Following a pre-test, the questionnaire was administered to an international sample of tool users, tool builders and non-CASE software application developers (a control group). More than 200 questionnaires were returned (half via electronic mail) from respondents largely in North America, but also from Europe, Australia and New Zealand. Analysis followed a factorial design that evaluated the impact of normative attitudes toward and perceptions of control upon satisfaction and behavior. Most respondents reported not feeling especially encumbered with constraints in their tools, although most also reserved the right to override or work around constraints, depending upon circumstances. The study found that normative attitudes toward control have a significant impact upon behavior in response to constraints in computerized design tools. (Favorable attitudes toward control are associated significantly with conforming behavior.) It also found that perceptions of control have a significant impact upon satisfaction and behavior. (Perceptions of high control are associated significantly with low satisfaction and with resistant behavior.) No significant differences were observed between tool users and tool builders in terms of key constructs. Suggestions for future research include investigation of concerns raised by the current study, examination of similar effects in other domains (such as architectural design), and development of the potential for intelligent machine guidance in creative design activities.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zucconi:1996:BTS, author = "Lin Zucconi and Karl Reed", title = "Building testable software", journal = j-SIGSOFT, volume = "21", number = "5", pages = "51--55", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235983", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper examines a connection between well known specification, design, implementation methodologies and test-design which appears not to have been previously well-formulated. We refer to the fact that the use of finite state machines (FSMs) in each development phase (specification, design, implementation and testing) is well known and documented. However, despite the fact that much of this work is more than twenty years old, there appears to be no detailed proposal for a consistent FSM-based approach be used across all development phases for other than very specific application types. We suggest that the adoption of a systematic FSM-based approach across all phases, including implementation, may allow a number of major problems in software development to be either eliminated or simplified. In this way, testable, highly dependable systems can be produced. In such systems, behaviour is explicitly defined, built, and tested using both functional and structural methods. Undesired behaviours can be found and eliminated, and abnormal or unexpected input explicitly handled. We discuss the issues we consider to be involved, and the benefits which we expect may be gained. We also identify those areas where further work appears to be required.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cook:1996:SDG, author = "Michael Cook", title = "Software design is a good thing", journal = j-SIGSOFT, volume = "21", number = "5", pages = "56--57", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235985", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ying:1996:SCS, author = "Jing Ying and Zhijun He", title = "Some comments on software methodology versus {CASE}", journal = j-SIGSOFT, volume = "21", number = "5", pages = "58--59", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235986", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents a personal viewpoint on the relationship between software methodology and Computer-aided Software Engineering (CASE). Also several questions are put forward: Can CASE technology contribute to the high quality and efficient productivity of software product? Can CASE explore its largest power based on current software methodology? Or need current software methodology be revolutionized to a great degree? How should software researchers deal with the roles, significance and relationships among CASE, software methodology, software re-engineering, and so on? The answers to these questions will have vital effect on the development of software industry in the next century.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Denney:1996:CMB, author = "Richard Denney", title = "A comparison of the model-based \& algebraic styles of specification as a basis for test specification", journal = j-SIGSOFT, volume = "21", number = "5", pages = "60--64", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235988", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The use of formal specifications as a basis for specifying functional tests has been discussed by a numbers of researchers with most work focusing on one style of specification or another separately. But is any single style an adequate basis for writing functional tests? The strengths, weaknesses and complementary nature of two popular styles of software specification, model-based and algebraic, are examined as a basis for functional test specification.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zhang:1996:NOA, author = "Jiazhong Zhang and Zhijian Wang", title = "{NDHORM}: an {OO} approach to requirements modeling", journal = j-SIGSOFT, volume = "21", number = "5", pages = "65--69", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235990", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper, we propose an OO approach to requirement modeling, which includes a hierarchical object-oriented requirements model NDHORM and its requirements modeling procedure. The NDHORM model concentrates on capturing and simulating dynamic interaction relationships between problem objects in a real world, as well as the stepwise refinement of interacting objects during the modeling process. A behavior-directed method and its uniform notations for identifying objects, attributes, services, relationships, etc. are also provided.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Johnson:1996:EFA, author = "Philip Johnson", title = "{Egret}: a framework for advanced {CSCW} applications", journal = j-SIGSOFT, volume = "21", number = "5", pages = "70--71", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235989", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Egret is a publicly available, advanced framework for construction of computer-supported cooperative work applications. Egret provides an approach to multi-user, interactive application development that differs markedly from other frameworks or infrastructures, such as Groupkit, WWW, or Lotus Notes. This short paper introduces Egret, its architecture, design philosophy, selected applications, and interest groups within the software engineering community. It concludes with information on how Egret's sources, binaries, and documentation may be obtained free of charge using the Internet.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lam:1996:TDS, author = "Wing Lam and Ben Whittle", title = "A taxonomy of domain-specific reuse problems and their resolutions --- version 1.0", journal = j-SIGSOFT, volume = "21", number = "5", pages = "72--77", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235992", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents a taxonomy of problems related to domain-specific reuse. The taxonomy identifies seven major problem categories (such as domain, modeling notation and viewpoints) and their sub-categories. A description of each problem in the taxonomy is given, illustrated where appropriate, with an example taken from an industrial case-study performed by the authors for Rolls-Smiths Engine Controls Limited (RoSEC). A resolution matrix is also presented, which suggests practical strategies for resolving each kind of problem described in the taxonomy.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Harrison:1996:UTC, author = "R. Harrison and L. G. Samaraweera", title = "Using test case metrics to predict code quality and effort", journal = j-SIGSOFT, volume = "21", number = "5", pages = "78--88", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235993", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper reports on an investigation into the use of a design metric (the number of test cases) to predict code quality, development and testing time during the production of functional and object-oriented programs. We report on whether a significant difference exists in the number of test cases for equivalent functional and object-oriented programs as well as determining whether these test cases metrics are correlated with various development and design metrics for the different paradigms. The results of this investigation suggest that test case metrics could be used both as indicators of code quality and to predict the development and testing effort required for functional and object-oriented programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Henderson-Sellers:1996:MVS, author = "B. Henderson-Sellers", title = "The mathematical validity of software metrics", journal = j-SIGSOFT, volume = "21", number = "5", pages = "89--94", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235994", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Mathematical modelling, especially in software engineering metrics, requires more emphasis to be placed on the validity of the selected mathematical tools and techniques to be used. There are a plethora of occurrences in the recent literature of the misapplication of quantitative techniques together with errors in the underlying mathematics. Software engineering metrics needs to take more care in its use of mathematics if it is to gain credence in the scientific and engineering communities.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Drori:1996:PDI, author = "Offer Drori", title = "Planning and design of information systems using {OODPM}", journal = j-SIGSOFT, volume = "21", number = "5", pages = "95--98", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235995", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The process of system analysis and its planning includes various stages. Over the years various methodologies have been defined for this process. The methodologies themselves constitute a method that regulates the various stages in the process of planning and developing the information system. Each methodology has its own advantages and disadvantages but, generally, the correct methodology must be adapted to the required system. The aim of this article is to describe a new methodology, known as OODPM --- Object Oriented Design by a Prototype Methodology, that integrates two existing methodologies, namely OOD and Prototype, bringing together many advantages. The principle advantages of this method are as follows: the ability to reduce planning time; to better define user requirements; to plan an enhanced information system; to bridge the gap between the design of the required solution and its development. This article will offer a brief survey of the methodologies currently used in the development and planning of information systems, focusing on the OODPM method and the tools it uses.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mazhindu-Shumba:1996:CNW, author = "Rose Mazhindu-Shumba", title = "A comment on the notation of the {Wirfs--Brock} et al. object-oriented design method", journal = j-SIGSOFT, volume = "21", number = "5", pages = "99", month = sep, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/235969.235998", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:16 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jackson:1996:PMS, author = "Michael Jackson", title = "Problems, methods, and structures (abstract)", journal = j-SIGSOFT, volume = "21", number = "6", pages = "1", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239100", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Petroski:1996:EBC, author = "Henry Petroski", title = "Engineering bridges: from concept to reality (abstract)", journal = j-SIGSOFT, volume = "21", number = "6", pages = "1", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239101", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rechtin:1996:SSA, author = "Eberhardt Rechtin", title = "Software systems architecting (abstract)", journal = j-SIGSOFT, volume = "21", number = "6", pages = "1", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239102", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Boehm:1996:IPS, author = "Barry Boehm", title = "Industrial priorities for software engineering research (panel)", journal = j-SIGSOFT, volume = "21", number = "6", pages = "2", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239103", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kiczales:1996:WCP, author = "Gregor Kiczales", title = "What can programming languages contribute to software engineering, and vice versa? (panel)", journal = j-SIGSOFT, volume = "21", number = "6", pages = "2", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239099", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Magee:1996:DSS, author = "Jeff Magee and Jeff Kramer", title = "Dynamic structure in software architectures", journal = j-SIGSOFT, volume = "21", number = "6", pages = "3--14", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239104", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Much of the recent work on Architecture Description Languages (ADL) has concentrated on specifying organisations of components and connectors which are static. When the ADL specification is used to drive system construction, then the structure of the resulting system in terms of its component instances and their interconnection is fixed. This paper examines ADL features which permit the description of dynamic software architectures in which the organisation of components and connectors may change during system execution. The paper outlines examples of language features which support dynamic structure. These examples are taken from Darwin, a language used to describe distributed system structure. An operational semantics for these features is presented in the $ \pi $-calculus, together with a discussion of their advantages and limitations. The paper discusses some general approaches to dynamic architecture description suggested by these examples.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{LeMetayer:1996:SAS, author = "Daniel {Le M{\'e}tayer}", title = "Software architecture styles as graph grammars", journal = j-SIGSOFT, volume = "21", number = "6", pages = "15--23", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239105", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present a formalism for the definition of software architectures in terms of graphs. Nodes represent the individual agents and edges define their interconnection. Individual agents can communicate only along the links specified by the architecture. The dynamic evolution of the overall architecture is defined independently by a 'coordinator'. An architecture style is a class of architectures characterised by a graph grammar. The rules of the coordinator are statically checked to ensure that they preserve the constraints imposed by the architecture style.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Medvidovic:1996:UOO, author = "Nenad Medvidovic and Peyman Oreizy and Jason E. Robbins and Richard N. Taylor", title = "Using object-oriented typing to support architectural design in the {C2} style", journal = j-SIGSOFT, volume = "21", number = "6", pages = "24--32", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239106", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software architectures enable large-scale software development. Component reuse and substitutability, two key aspects of large-scale development, must be planned for during software design. Object-oriented (OO) type theory supports reuse by structuring inter-component relationships and verifying those relationships through type checking in an architecture definition language (ADL). In this paper, we identify the issues and discuss the ramifications of applying OO type theory to the C2 architectural style. This work stems from a series of experiments that were conducted to investigate component reuse and substitutability in C2. We also discuss the limits of applicability of OO typing to C2 and how we addressed them in the C2 ADL.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Griswold:1996:TSP, author = "William G. Griswold and Morison I. Chen and Robert W. Bowdidge and J. David Morgenthaler", title = "Tool support for planning the restructuring of data abstractions in large systems", journal = j-SIGSOFT, volume = "21", number = "6", pages = "33--45", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239107", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Restructuring software to improve its design can lower software maintenance costs. One problem in carrying out such a restructuring is planning the new detailed design. The star diagram manipulable visualization can help a programmer redesign a program based on abstract data types. However, our measurements revealed that the view can be too large for a programmer to effectively assimilate. Also, design plans can be expressed only by restructuring, although our studies revealed that it is beneficial to preplan a restructuring. Finally, the tool user can build a star diagram for only a single data structure, although an abstract data type might actually have several components or have multiple instantiations. Exploiting basic properties of the star diagram can mitigate these problems. First, programmer-controlled elision can remove clutter from the star diagram view. Second, elision and annotation of star diagram components can mimic restructuring, thereby supporting the planning of a restructuring. Such support also allows for the planning of a non-restructuring maintenance task. Finally, to dynamically control what data structures are visualized, the tool user can union star diagrams. We built a star diagram planning tool for C programs, measured its elision capabilities, and performed a programmer study for the encapsulation of a widely-used data structure in a 28,000 line program. We found that the amount of elision can be substantial, but is not always adequate. In the study we found that each programming team successfully planned their restructuring in rather different, unanticipated ways.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Seiter:1996:EOB, author = "Linda M. Seiter and Jens Palsberg and Karl J. Lieberherr", title = "Evolution of object behavior using context relations", journal = j-SIGSOFT, volume = "21", number = "6", pages = "46--57", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239108", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A collection of design patterns was described by Gamma, Helm, Johnson, and Vlissides in 1994. Recognizing that designs change, each pattern ensures that a certain system aspect can vary over time such as the operations that can be applied to an object or the algorithm of a method. The patterns are described by constructs such as the inheritance and reference relations, attempting to emulate more dynamic relationships. As a result, the design patterns demonstrate how awkward it is to program natural concepts of behavioral evolution when using a traditional object-oriented language. In this paper we present a new relation between classes: the context relation. It directly supports behavioral evolution, and it is meaningful at the analysis, design, and implementation level. At the design level we picture a context relation as a new form of arrow between classes. At the implementation level we use a small extension of C++. The basic idea is that if class C is context-related to a base class B, then B-objects can get their functionality dynamically altered by C-objects. Our language construct for doing this is a generalization of the method update in Abadi and Cardelli's imperative object calculus. A C-object may be explicitly attached to a B-object, or it may be implicitly attached to a group of B-objects for the duration of a method invocation. We demonstrate how the context relation can be used to easily model and program the Adapter, Bridge, Chain of Responsibility, Decorator, Iterator, Observer, State, Strategy, and Visitor patterns.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{VanHilst:1996:DCD, author = "Michael VanHilst and David Notkin", title = "Decoupling change from design", journal = j-SIGSOFT, volume = "21", number = "6", pages = "58--69", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239109", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Parnas' seminal 1972 paper, ``On the Criteria To Be Used in Decomposing Systems into Modules,'' identified simplifying change as a critical criterion for modularizing software. Successful designs are those in which a change can be accommodated by modifying a single module. There is a tacit assumption in most of the literature that once a change has been limited to a single module, the cost of making the change is essentially inconsequential. But modules have complexity of their own and are frequently large. Thus, making a change can be expensive, even if limited to a single module. We present a method of decomposing modules into smaller components for the purpose of supporting change. Although similar to the approach of modularizing programs described by Parnas, our approach is specific to decomposing modules. It is not intended to replace traditional high level modularization but rather to augment it with a second level of modularization where the standard of information hiding can be relaxed. The goal of the method is to make modules easier to change by decomposing them around smaller design decisions --- ideally encoding only one design choice per submodule component. In this paper we show how submodule components can be used to address the issue of change. We also demonstrate how the ability to address change with submodule components is, to a large extent, independent of the design level modularization. Moreover, we show that, at least in some cases, by using submodule components the choice of high level modularization can itself be changed without having to rewrite large amounts of code.A method of implementation is presented using inheritance, parameterization, and static binding in a way that minimizes implementation dependencies between components. The method supports fine grained decomposition with flexible composability and almost no runtime overhead.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Damon:1996:CRS, author = "Craig A. Damon and Daniel Jackson and Somesh Jha", title = "Checking relational specifications with binary decision diagrams", journal = j-SIGSOFT, volume = "21", number = "6", pages = "70--80", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239110", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Checking a specification in a language based on sets and relations (such as Z) can be reduced to the problem of finding satisfying assignments, or models, of a relational formula. A new method for finding models using ordered binary decision diagrams (BDDs) is presented that appears to scale better than existing methods. Relational terms are replaced by matrices of boolean formulae. These formulae are then composed to give a boolean translation of the entire relational formula. Throughout, boolean formulae are represented with BDDs; from the resulting BDD, models are easily extracted. The performance of the BDD method is compared to our previous method based instead on explicit enumeration. The new method performs as well or better on most of our examples, but can also handle specifications that, until now, we have been unable to analyze.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zhang:1996:PDP, author = "Sean Zhang and Barbara G. Ryder and William Landi", title = "Program decomposition for pointer aliasing: a step toward practical analyses", journal = j-SIGSOFT, volume = "21", number = "6", pages = "81--92", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239112", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Pointer aliasing analysis is crucial to compile-time analyses for languages with general-purpose pointer usage (such as C), but many aliasing methods have proven quite costly. We present a technique that partitions the statements of a program to allow separate, and therefore possibly different, pointer aliasing analysis methods to be used on independent parts of the program. This decomposition enables exploration of tradeoff between algorithm efficiency and precision. We also present a new, efficient flow-insensitive pointer aliasing algorithm, which is used together with an existing flow-sensitive aliasing algorithm in our experiments. We demonstrate our technique in the context of determining side effects and variable fetches through names containing pointer dereferences (Thru-deref MOD/REF). Initial empirical results using a combination of a flow-sensitive and a flow-insensitive aliasing analysis on the same program, demonstrate that the resulting analysis is much faster than solely using the flow-sensitive method, and obtains similar precision for the Thru-deref MOD/REF problems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Naumovich:1996:VCP, author = "Gleb N. Naumovich and Lori A. Clarke and Leon J. Osterweil", title = "Verification of communication protocols using data flow analysis", journal = j-SIGSOFT, volume = "21", number = "6", pages = "93--105", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239114", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we demonstrate the effectiveness of data flow analysis for verifying requirements of communication protocols. Data flow analysis is a static analysis method for increasing confidence in the correctness of software systems by automatically verifying that a given software artifact (e.g., design or code) must behave consistently with a specified requirement. In this case study, we apply the FLAVERS data flow analysis tool to pseudocode designs of the three way handshake connection establishment protocol and of the alternating bit protocol and prove that the behavior of the pseudocode is consistent with protocol behavioral requirement specifications. We show how FLAVERS is a particularly effective because it is computationally inexpensive, requires minimal human interaction, and is a general approach that can be applied incrementally until the desired accuracy is achieved. In addition, we show how assumptions about the environment in which a software system is executed can be incorporated into the analysis, using message losses as an example. We present experimental results and derive some guidelines about the classes of protocol requirement specifications that may be amenable to verification using FLAVERS.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dillon:1996:GOY, author = "L. K. Dillon and Y. S. Ramakrishna", title = "Generating oracles from your favorite temporal logic specifications", journal = j-SIGSOFT, volume = "21", number = "6", pages = "106--117", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239116", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes a generic tableau algorithm, which is the basis for a general customizable method for producing oracles from temporal logic specifications. A generic argument gives semantic rules with which to build the semantic tableau for a specification. Parameterizing the tableau algorithm by semantic rules permits it to easily accommodate a variety of temporal operators and provides a clean mechanism for fine-tuning the algorithm to produce efficient oracles. The paper develops conditions to ensure that a set of rules results in a correct tableau procedure. It gives sample rules for a variety of linear-time temporal operators and shows how rules are tailored to reduce the size of an oracle.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rosenblum:1996:PCE, author = "David S. Rosenblum and Elaine J. Weyuker", title = "Predicting the cost-effectiveness of regression testing strategies", journal = j-SIGSOFT, volume = "21", number = "6", pages = "118--126", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239118", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Selective regression testing strategies aim at choosing an appropriate subset of test cases from among a previously run test suite for a software system, based on information about the changes made to the system to create new versions. Although there has been a significant amount of research in recent years on the design of such strategies, there has been significantly less investigation of their cost-effectiveness. In this paper some computationally efficient predictors of the cost-effectiveness of the two main classes of selective regression testing approaches are presented. A case study is described in which these predictors are used to assess the appropriateness of using a particular regression testing strategy to test multiple versions of a widely-used software system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Parissis:1996:SBT, author = "Ioannis Parissis and Farid Ouabdesselam", title = "Specification-based testing of synchronous software", journal = j-SIGSOFT, volume = "21", number = "6", pages = "127--134", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239119", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Synchronous programming makes the implementation of reactive software easier and safer. Automatic formal verification methods based on model-checking have been developed within the synchronous approach to prove the satisfaction by the software of safety properties. But these methods often require huge memory or time amounts. As a solution to that problem we propose a set of formally defined testing techniques allowing for automatic test data generation. These techniques can be used independently or as a complement to formal verification, since they need the same set of specifications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Siff:1996:PGS, author = "Michael Siff and Thomas Reps", title = "Program generalization for software reuse: from {C} to {C++}", journal = j-SIGSOFT, volume = "21", number = "6", pages = "135--146", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239121", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We consider the problem of software generalization: Given a program component C, create a parameterized program component C' such that C' is usable in a wider variety of syntactic contexts than C. Furthermore, C' should be a semantically meaningful generalization of C; namely, there must exist an instantiation of C' that is equivalent in functionality to C. In this paper, we present an algorithm that generalizes C functions via type inference. The original functions operate on specific data types; the result of generalization is a collection of C++ function templates that operate on parameterized types. This version of the generalization problem is useful in the context of converting existing C programs to C++.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Barrett:1996:ASS, author = "Daniel J. Barrett and Alan Kaplan and Jack C. Wileden", title = "Automated support for seamless interoperability in polylingual software systems", journal = j-SIGSOFT, volume = "21", number = "6", pages = "147--155", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239123", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Interoperability is a fundamental concern in many areas of software engineering, such as software reuse or infrastructures for software development environments. Of particular interest to software engineers are the interoperability problems arising in polylingual software systems. The defining characteristic of polylingual systems is their focus on uniform interaction among a set of components written in two or more different languages. Existing approaches to support for interoperability are inadequate because they lack seamlessness: that is, they generally force software developers to compensate explicitly for the existence of multiple languages or the crossing of language boundaries. In this paper we first discuss some foundations for polylingual interoperability, then review and assess existing approaches. We then outline PolySPIN, an approach in which interoperability can be made transparent and existing systems can be made to interoperate with no visible modifications. We also describe PolySPINner, our prototype implementation of a toolset providing automated support for PolySPIN. We illustrate the advantages of our approach by applying it to an example problem and comparing PolySPIN's ease of use with that of an alternative, CORBA-style approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Anderson:1996:MCL, author = "Richard J. Anderson and Paul Beame and Steve Burns and William Chan and Francesmary Modugno and David Notkin and Jon D. Reese", title = "Model checking large software specifications", journal = j-SIGSOFT, volume = "21", number = "6", pages = "156--166", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239127", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we present our results and experiences of using symbolic model checking to study the specification of an aircraft collision avoidance system. Symbolic model checking has been highly successful when applied to hardware systems. We are interested in the question of whether or not model checking techniques can be applied to large software specifications. To investigate this, we translated a portion of the finite-state requirements specification of TCAS II (Traffic Alert and Collision Avoidance System) into a form accepted by a model checker (SMV). We successfully used the model checker to investigate a number of dynamic properties of the system. We report on our experiences, describing our approach to translating the specification to the SMV language and our methods for achieving acceptable performance in model checking, and giving a summary of the properties that we were able to check. We consider the paper as a data point that provides reason for optimism about the potential for successful application of model checking to software systems. In addition, our experiences provide a basis for characterizing features that would be especially suitable for model checkers built specifically for analyzing software systems. The intent of this paper is to evaluate symbolic model checking of state-machine based specifications, not to evaluate the TCAS II specification. We used a preliminary version of the specification, the version 6.00, dated March, 1993, in our study. We did not have access to later versions, so we do not know if the properties identified here are present in later versions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gunter:1996:ADB, author = "Carl A. Gunter", title = "Abstracting dependencies between software configuration items", journal = j-SIGSOFT, volume = "21", number = "6", pages = "167--178", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239129", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper studies an abstract model of dependencies between software configuration items based on a theory of concurrent computation over a class of Petri nets. The primary goal is to illustrate the descriptive power of the model and lay theoretical groundwork for using it to design software configuration maintenance tools or model software configurations. As a start in this direction, the paper analyzes and addresses certain limitations in make description files using a form of abstract interpretation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Darimont:1996:FRP, author = "Robert Darimont and Axel van Lamsweerde", title = "Formal refinement patterns for goal-driven requirements elaboration", journal = j-SIGSOFT, volume = "21", number = "6", pages = "179--190", month = nov, year = "1996", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/250707.239131", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:17 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Requirements engineering is concerned with the identification of high-level goals to be achieved by the system envisioned, the refinement of such goals, the operationalization of goals into services and constraints, and the assignment of responsibilities for the resulting requirements to agents such as humans, devices and programs. Goal refinement and operationalization is a complex process which is not well supported by current requirements engineering technology. Ideally some form of formal support should be provided, but formal methods are difficult and costly to apply at this stage. This paper presents an approach to goal refinement and operationalization which is aimed at providing constructive formal support while hiding the underlying mathematics. The principle is to reuse generic refinement patterns from a library structured according to strengthening/weakening relationships among patterns. The patterns are once for all proved correct and complete. They can be used for guiding the refinement process or for pointing out missing elements in a refinement. The cost inherent to the use of a formal method is thus reduced significantly. Tactics are proposed to the requirements engineer for grounding pattern selection on semantic criteria. The approach is discussed in the context of the multi-paradigm language used in the KAOS method; this language has an external semantic net layer for capturing goals, constraints, agents, objects and actions together with their links, and an inner formal assertion layer that includes a real-time temporal logic for the specification of goals and constraints. Some frequent refinement patterns are high-lighted and illustrated through a variety of examples. The general principle is somewhat similar in spirit to the increasingly popular idea of design patterns, although it is grounded on a formal framework here.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1997:SPS, author = "Will Tracz", title = "{SIGSOFT} policy statement for conferences and workshops sponsored by {SIGSOFT}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "3--4", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251769", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Schauer:1997:EFI, author = "Helmut Schauer", title = "{ESEC97\slash FSE5} invitation", journal = j-SIGSOFT, volume = "22", number = "1", pages = "6", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251778", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sears:1997:WGH, author = "Andrew Sears", title = "Working group on {HCI} education (identifying \& disseminating resources)", journal = j-SIGSOFT, volume = "22", number = "1", pages = "6", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251773", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Taylor:1997:IPU, author = "Richard Taylor", title = "{ICSE} 97 program update", journal = j-SIGSOFT, volume = "22", number = "1", pages = "7", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251781", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1997:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "8--12", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251785", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1997:ESEa, author = "Barbara Ann Kitchenham and Lindsay Jones", title = "Evaluating software engineering methods and tool part 5: the influence of human factors", journal = j-SIGSOFT, volume = "22", number = "1", pages = "13--15", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251790", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In previous articles, we have considered a number of general issues concerned with evaluating methods and tools. In the next few articles we describe how to perform a specific type of evaluation exercise called Feature Analysis. This article discusses the principles of feature analysis and describes how to identify features and establish a means of scoring products against those features. Later articles consider how to plan a feature-based evaluation and how to analyze the results of an evaluation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1997:RPCa, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "22", number = "1", pages = "16--22", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251795", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1997:SPM, author = "David Garlan", title = "{SIGSOFT'96} post mortem", journal = j-SIGSOFT, volume = "22", number = "1", pages = "23", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251812", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Notkin:1997:FSS, author = "David Notkin", title = "{FSE} 96 special session: novel notions, wild ideas, and fun flames", journal = j-SIGSOFT, volume = "22", number = "1", pages = "23--24", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251813", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Montangero:1997:RFE, author = "Carlo Montangero", title = "Report on the {Fifth European Workshop on Software Process Technology}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "24--27", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251816", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This is a short resume of the actual proceedings of the fifth European Workshop on Software Process Technology, held in Nancy, 9-11 October 1996. It is a post-hoc integration of the report that is included in the proceedings of the fourth International Conference on the Software Process, held in Brighton, UK, 3-5 December 1996, and published by IEEE Press. It is based on the presentations of the session rapporteurs, whom I gratefully acknowledge, together with E. Ellmer, who took minutes of the last wrap-up session. The papers that triggered the discussions are available by Springer Verlag, as volume 1149 of the Lecture Notes in Computer Science.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sitaraman:1997:FIC, author = "Murali Sitaraman", title = "Fourth international conference on software reuse {(ICSR4)}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "27", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251821", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sheth:1997:RNW, author = "Amit Sheth and Dimitrios Georgakopoulos and Stef M. M. Joosten and Marek Rusinkiewicz and Walt Scacchi and Jack Wileden and Alexander L. Wolf", title = "Report from the {NSF Workshop on Workflow and Process Automation in Information Systems}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "28--38", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251825", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An interdisciplinary research community needs to address challenging issues raised by applying workflow management technology in information systems. This conclusion results from the NSF workshop on Workflow and Process Automation in Information Systems which was held at the State Botanical Garden of Georgia during May 8-10, 1996. The workshop brought together active researchers and practitioners from several communities, with significant representation from database and distributed systems, software process and software engineering, and computer supported cooperative work. The presentations given at the workshop are available in the form of an electronic proceedings of this workshop at http://lsdis.cs.uga.edu/activities/. This report is the joint work of selected representatives from the workshop and it documents the results of significant group discussions and exchange of ideas.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Spanoudakis:1997:VIW, author = "George Spanoudakis and Anthony Finkelsteiin and Wolfgang Emmerich", title = "{Viewpoints 96: International Workshop on Multiple Perspectives in Software Development (SIGSOFT 96)} workshop report", journal = j-SIGSOFT, volume = "22", number = "1", pages = "39--41", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251832", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wolf:1997:SSI, author = "Alexander L. Wolf", title = "Succeedings of the {Second International Software Architecture Workshop (ISAW-2)}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "42--56", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251844", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Interest in software architecture as an area of research, education, and practice within software engineering has been growing steadily over the past decade. Software architecture is concerned with the principled study of large-grained software components, including their properties, relationships, and patterns of combination. It is becoming clear that one key to the effective development, operation, and evolution of software systems is the design and evaluation of appropriate architectures. As a complement to the Fourth Symposium on the Foundations of Software Engineering (FSE-4), whose theme was software architecture, the Second International Software Architecture Workshop (ISAW-2) brought together practitioners and researchers for two intense days of discussion and work. The ISAW-2 proceedings [6] were published in the Joint Proceedings of the SIGSOFT '96 Workshops, ACM Press, ISBN 0-89791-867-3. The participants were organized into three parallel working groups each focused on a different topic within software architecture. * Styles and Patterns --- Techniques and models for centering software architecture activities on generally useful design methods, components, and assemblages of components. * Architecture Description --- Languages and methods for the capture of architectural designs. * Tools and Methods --- Automated aids for designing, evaluating, validating, implementing, and evolving software architectures. Tying these work groups together was the use of a common case study derived from a real-world architecture found in industry. Each working group studied this architecture from its particular perspective and, to a greater or lesser extent, used the case study to organize their discussions. It is interesting to note, for example, that the three groups created specialized depictions of the architecture for their discussion (see figures 6, 8, and 10). The case study was the architecture of the Call Center Customer Care (C4) System, which was developed by Andersen Consulting. A description of the architecture and some of its more interesting challenges appears in Section 2. It is reproduced here in the hopes that it might be prove of continued use to the community. Also appearing here are reports from each working group. The Styles and Patterns Working Group was led by Frances Paulisch, of Siemens, and Mary Shaw, of CMU. The group tried to uncover the styles and patterns that underlay various components of the C4 architecture. In the process, they defined a new kind of architectural style that they named the Data Ooze. The Architectural Description Working Group was led by Paul Clements, of the SEI, and Jeff Magee, of Imperial College. The group concentrated on identifying critical aspects of architectures that require description and on identifying important areas where further work in architectural description is needed. The Tools and Methods Working group was led by William Griswold, of UCSD, and Philippe Kruchten, of Rational. The group pretended to go through a development cycle for the C4 system in order to uncover various architectural tool and method needs. At the conclusion of the workshop, the working group chairs held a panel session in which each group asked a ``challenge'' question of the other two groups. The questions and responses appear in Section 5.2. We hope that these succeedings capture at least some essence of the very fruitful discussion that occurred at the workshop. Of course, this report cannot replace the benefits of actual attendance. The workshop will indeed continue, and we hope that the reader will be interested in attending a future ISAW.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{vandenBrand:1997:RES, author = "M. G. J. van den Brand and P. Klint and C. Verhoef", title = "Reverse engineering and system renovation --- an annotated bibliography", journal = j-SIGSOFT, volume = "22", number = "1", pages = "57--68", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251849", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "To facilitate research in the field of reverse engineering and system renovation we have compiled an annotated bibliography. We put the contributions not only in alphabetical order but also grouped by topic so that readers focusing on a certain topic can read their annotations in the alphabetical listing. We also compiled an annotated list of pointers to information about reverse engineering and system renovation that can be reached via Internet. For the sake of ease we also incorporated a brief introduction to the field of reverse engineering.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Francalanci:1997:IIR, author = "C. Francalanci and A. Fuggetta", title = "Integrating information requirements along processes: a survey and research directions", journal = j-SIGSOFT, volume = "22", number = "1", pages = "68--74", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251864", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Information requirements have traditionally been collected separately for different business functions and then integrated into an overall specification. The recent orientation to a process perspective in managing business activities has emphasized early integration, by concurrently analyzing business processes and information requirements. Accordingly, information requirements analysis methodologies should take into account these new integration needs. In the paper, we discuss these new integration needs. Traditional methods for requirements integration from database design are analyzed and unfulfilled integration needs are highlighted. Then, other research fields are surveyed that dealt with problems similar to integration and offer interesting results: Recent developments in database design, software engineering and requirements reuse. Finally, we compare the different contributions and indicate open research directions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Putkonen:1997:CTS, author = "A. Putkonen and M. Kiekara", title = "A case-tool for supporting navigation in the class hierarchy", journal = j-SIGSOFT, volume = "22", number = "1", pages = "77--84", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251871", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The central role that class hierarchy plays in object-oriented systems is discussed. The study focuses on design and maintenance stages where the requirements of navigation facilities are greater than at other stages of the systems lifecycle. It will be shown that different kinds of navigation are needed and it is necessary to browse up and down the class hierarchy before it is possible to decide which classes have to be changed. A flexible navigation tool which can support these design and maintenance stages is also presented. The tool helps the designer to navigate the class hierarchy and to investigate the effect of the intended changes on the entire class hierarchy.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Drori:1997:TPH, author = "Offer Drori", title = "From theory to practice or how not to fail in developing information systems", journal = j-SIGSOFT, volume = "22", number = "1", pages = "85--87", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251875", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The development of information systems consists of a wide variety of activities and processes, which come together to create a product designed for a specific purpose. We often encounter products that do not serve the purpose they were intended for, and the question asked is: How does it happen that a process that has been defined and structured in principle, has such a high failure ratio? The purpose of this article is to attempt to clarify the problematic points or subjects that exist in the process of developing information systems and to supply the tools to help reduce the problem.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raccoon:1997:FYP, author = "L. B. S. Raccoon", title = "Fifty years of progress in software engineering", journal = j-SIGSOFT, volume = "22", number = "1", pages = "88--104", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.251878", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper, I describe a new outlook on the history of Software Engineering. I portray large-scale structures within Software Engineering to give a better understanding of the flow of history. I use these large-scale structures to reveal the steady, ongoing evolution of concepts, and show how they relate to the myriad whorls and eddies of change. I also have four smaller, more specific purposes in writing this paper. First, I want to point out that old ideas do not die. In The Mythical Man-Month after 20 Years, Brooks claims ``the Waterfall Model is Wrong.'' But if the Waterfall model were wrong, we would stop arguing over it. Though the Waterfall model may not describe the whole truth, it describes an interesting structure that occurs in many well-defined projects and it will continue to describe this truth for a long time to come. I expect the Waterfall model will live on for the next one hundred years and more. Second, I want to show that the Chaos model, Chaos life cycle, Complexity Gap, and Chaos strategy are part of the natural evolution of Software Engineering. The Chaos model and strategy supersede, but do not contradict, the Waterfall and Spiral models, and the Stepwise Refinement strategy. They are more up to date because they express contemporary issues more effectively, and fit our contemporary situations better. The Chaos model, life cycle, and strategy are equally as important, but not better than, other concepts. Third, I compare the Chaos model, life cycle, and strategy to other models, life cycles, and strategies. This paper can be considered a comparison of the ideas presented in my papers about chaos with other ideas in the field. I avoided comparisons in my other papers because I wanted to define those ideas in their own terms and the comparisons did not further the new ideas. Fourth, I make a few predictions about the next ten years of Software Engineering. The large-scale structures described in this history provide a stronger base for understanding how software engineering will evolve in the future. This paper is laid out as follows. In the first section, I use the flow of water as a metaphor to describe the flow of progress in Software Engineering. I use the Water metaphor to show some of the structures within Software Engineering. The current work builds on top of the historical work, and future work will build on top of current work. In the remaining sections, I describe the waves, streams, and tides that portray the evolution of concepts and technologies in Software Engineering.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ayers:1997:BRP, author = "Michael Ayers", title = "Book Reviews: {{\booktitle{Prototyping with Objects}}, Philippe Krief}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "105--106", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.565699", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1997:BROa, author = "Mark Doernhoefer", title = "Book Reviews: {{\booktitle{Object-Oriented Systems Design: an Integrated Approach}}, Edward Yourdon}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "106--107", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.565700", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1997:BROb, author = "Mark Doernhoefer", title = "Book Reviews: {{\booktitle{Object-Oriented Systems Design: an Integrated Approach}}, Edward Yourdon}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "106--107", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.567243", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{OLaughlin:1997:BRD, author = "Brian O'Laughlin", title = "Book Reviews: {{\booktitle{Dictionary of Object Technology}}, Donald G. Firesmith and Edward M. Eykholt}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "107--108", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.567244", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{OLaughlin:1997:BRO, author = "Brian O'Laughlin", title = "Book Reviews: {{\booktitle{Object Oriented Compiler Construction}}, Jim Holmes}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "108--108", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.567245", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raynham:1997:BRP, author = "Peter Raynham", title = "Book Reviews: {{\booktitle{Programming from Specifications}}, Second Edition, Carroll Morgan}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "108--109", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.567246", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Person:1997:BRW, author = "Suzette Person", title = "Book Reviews: {{\booktitle{What Every Software Manager MUST KNOW TO SUCCEED With Object Technology}}, John Williams}", journal = j-SIGSOFT, volume = "22", number = "1", pages = "109--109", month = jan, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251759.567247", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:19 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Nord:1997:SSA, author = "Robert L. Nord", title = "System and software architecture track third {IEEE} International Conference on Engineering of Complex Computer Systems {(ICECCS'97)}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "5", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251886", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Poulin:1997:SSR, author = "Jeff Poulin", title = "Symposium on Software Reuse information", journal = j-SIGSOFT, volume = "22", number = "2", pages = "5", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251884", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dovenbarger:1997:STC, author = "Dana Dovenbarger", title = "Software Technology Conference information", journal = j-SIGSOFT, volume = "22", number = "2", pages = "6", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251890", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rementeria:1997:SPO, author = "Santiago Rementeria", title = "Software process in the organizational context: more data on {European} practices", journal = j-SIGSOFT, volume = "22", number = "2", pages = "6--7", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251894", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1997:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "8--15", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251908", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1997:ESEb, author = "Barbara Ann Kitchenham and Lindsay Jones", title = "Evaluating software engineering methods and tools part 6: identifying and scoring features", journal = j-SIGSOFT, volume = "22", number = "2", pages = "16--18", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251912", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This article discusses the issues involved in selecting the list of features that will be used in a particular feature analysis evaluation exercise. We also consider candidate methods/tools can be evaluated by scoring them in terms of their provision of and support for features that are important to the users of technology.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1997:RPCb, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "22", number = "2", pages = "19--24", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251918", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sockut:1997:IDI, author = "Gary H. Sockut and Helen P. Arzu and Robert W. Matthews and David E. Shough", title = "Issues in designing an information model for application development", journal = j-SIGSOFT, volume = "22", number = "2", pages = "25--34", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251921", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "IBM's object-oriented information model lets a customer share data among various tools for application development. This paper discusses several issues in designing the information model, namely (1) techniques for diagrams (an essential part of communication between an information model designer and other designers or tool writers), (2) organization of the design of the information model (an essential step when many designers design anything large), and (3) technical content. These discussions of the experience of designing the information model should be valuable for further design of the information model and for other design efforts, e.g., involving other models or other integration of tools.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lam:1997:PRU, author = "W. Lam", title = "Process reuse using a template approach: a case-study from avionics", journal = j-SIGSOFT, volume = "22", number = "2", pages = "35--38", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251924", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper reports on the practical reuse of requirements engineering processes for aero-engine control systems. An approach is presented which uses templates to model typical activities in a process, where a process execution is seen as the instantiation of the template. The paper begins with the motivations for process reuse, and then describes aspects of the template approach in greater detail. The lessons learnt about process reuse based on our experience are summarised. The paper concludes with an early evaluation on the practicality of the approach, and highlights areas of further work.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mathalone:1997:BBM, author = "Sigal Mathalone", title = "A behaviorally-based methodology for modeling system specifications", journal = j-SIGSOFT, volume = "22", number = "2", pages = "39--42", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251925", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Behaviorally-Based Methodology (BBM), a methodology for modeling behaviorally-complex system requirements specifications, is introduced in this paper. The BBM provides guidelines for a Behaviorally-Based decomposition beginning at the first stage of system development, while placing the emphasis on system behavior and providing notations to represent this behavior. In Behaviorally-Based system modeling, all active services and system behavior at each instant are presented in one place (the relevant system state). Hence, problem domain information is more easily carried through the analysis phase allowing for a clear separation between system analysis and system design. In addition, inconsistencies in describing system behavior can be avoided more easily; where such problems occur they are detected and resolved with greater facility. The BBM is compared to more functional approaches, such as Hatley and Pirbhai's approach [1], highlighting the BBM's advantages. An experiment conducted in a graduate software engineering class is described. The experiment has shown that system modeling performance was significantly improved, in both accuracy and speed, when following the BBM. These design benefits of the BBM are then discussed and illustrated.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Law:1997:ODT, author = "Rob Law", title = "An overview of debugging tools", journal = j-SIGSOFT, volume = "22", number = "2", pages = "43--47", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251926", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper reviews empirical studies on debugging models and the findings associated with these models. There is a discussion on the evolution of program slicing applied to program debugging and different generations of debugging tools are analyzed and criticized. Finally, a programming environment section provides examples of program maintenance tools.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gambhir:1997:UDA, author = "S. S. Gulu Gambhir", title = "Use of domain analysis to implement the developer off-the-shelf systems {(DOTSS)} system acquisition approach", journal = j-SIGSOFT, volume = "22", number = "2", pages = "48--53", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251927", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper discusses implementation of Eisner's Developer Off-the-Shelf Systems (DOTSS) system acquisition approach. The DOTSS method involves reuse of entire systems rather than reuse of modules or subsystems. Reuse issues, including methods, benefits, and obstacles as they relate to the DOTSS approach, are presented. The use of Domain Analysis is proposed as a means of developing a set of high-level system requirements that are not overly specific to the problem domain at hand, thereby allowing existing systems from related domains to be considered for reuse. A set of evaluation criteria that can be used to differentiate candidate systems is also included.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Aggarwal:1997:TCI, author = "K. K. Aggarwal", title = "A tool for the collection of industrial software metrics data", journal = j-SIGSOFT, volume = "22", number = "2", pages = "54--57", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251929", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A tool has been designed under Windows 3.1, which converts a 'C' software to its abridged version that lists program characteristics of interest to the metric researchers. These characteristics may be operators, operands lists, their frequency of occurrences, number of terminators, different types of control structures, internal and external variables, etc. This information may be useful for the researchers but prevents the reconstruction of the original source code.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Blanqui:1997:DCA, author = "Fr{\'e}d{\'e}ric Blanqui", title = "A document-centered approach for an open {CASE} environment framework connected with the {World-Wide Web}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "58--63", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251933", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software development suffers from a number of well known difficulties, both technical and managerial [2]. A technical approach that could help to reduce them is the use of Computer-Aided Software Engineering (CASE) technologies. However, current Integrate Project Support Environment (IPSE) frameworks impose many constraints on CASE tool vendors, and this has impeded their adoption [10]. A more incremental strategy should be considered for the transfer and the diffusion of those technologies. This paper describes a document-centered approach and a simple but extendable system called Open Software Development System (OSDS) based on this approach. First, we describe difficulties inherent in the management of documents involved in software development. Second, we define some requirements to address those difficulties. Finally, we describe the important features of OSDS; these include an extension of Mosaic [3] that enables anyone with network access to connect to an OSDS, browse through it, and automatically integrate some documents into his/her own system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kelsey:1997:IDT, author = "Robert Bruce Kelsey", title = "Integrating a defect typology with containment metrics", journal = j-SIGSOFT, volume = "22", number = "2", pages = "64--67", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251947", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software metrics are numerous and varied, but they are typically disjoint and seldom directly support defect causal analysis. Diagnosing problems in the development process is certainly possible with disjoint metrics, but the task is greatly simplified if at least a subset of the metrics used are both applicable throughout the development cycle and oriented towards causal analysis of process deficiencies. This paper describes one such set of metrics, the integration of phase containment metrics with a modified defect typology drawn from the traditional inspection checklist. The result is a defect typology that identifies not only coding errors but deficiencies in the procedures used to develop and qualify the product.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Marovac:1997:SDE, author = "Nenad Marovac", title = "Software development environment based on {HyperNet}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "68--71", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251954", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In supporting groups working on development of large software programs we identify three classes of tools:1. CASE tools: tools which are used directly in the program development (specification, design, implementation, and testing).2. environment tools: tools which together are and effect the development environment, i.e. tools used in organizing and maintaining development information (program specifications, designs, code, test cases, etc.) which may be distributed world-wide.3. groupware tools: tools which are used to effect group communication and interaction, i.e. tools used for submission, organization and distribution of ideas and any issues related to the development and management process. In this paper we will address the second class of tools, the environment tools, and present an environment largely based on HyperNet --- A tool to choreograph world wide distributed hypermedia documents. The environment incorporates three main functionalities:1. A project knowledge base and associated processor. The knowledge base stores all material relevant to a project, i.e. specification, design, implementation, testing and maintenance related documents and source code for the project including operating system scripts required to compile, link, execute and test the software.2. mechanism supporting libraries of reusable material. The material includes program specifications, design documents, code and test data and procedures.3. documentation processor which produces on-demand documentation for the project on any desirable level of detail.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bing:1997:OBM, author = "Mao Bing and Xie Li", title = "An object-based model for prototyping user interfaces of cooperative systems", journal = j-SIGSOFT, volume = "22", number = "2", pages = "72--76", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251966", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents an object-based model to support the construction of user interfaces of CSCW systems. The model divides a cooperative system into layers and each layer is formed by component objects. A principal focus of the model is the provision of an object linking mechanism which links the relevant objects in the same interactive layers of multiple users to realize multi-level collaboration which is independent of the application. In addition, multi-level collaboration obtains fine-grained collaboration of the cooperative system and improves its collaboration efficiency. The object-based method used in this paper ensures a structured collaboration, realizes a simple collaboration management, and facilitates cooperative system development.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gintell:1997:LLA, author = "John W. Gintell and G{\'e}rard Memmi", title = "Lessons learned with {ACME} an environment integration experiment", journal = j-SIGSOFT, volume = "22", number = "2", pages = "77--81", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251985", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "ACME is an integration experiment with Marvel (a process centered environment) and ConversationBuilder (a CSCW system). Scrutiny, a collaborative software inspection system built with ConversationBuilder, is the subject application that operates in the integrated environment. The integration methodologies used by ACME are control integration, data integration, and tool integration. This paper describes the components and conceptual design of ACME and the effect that ACME has on the operation of Scrutiny. It also describes the lessons learned during this project. These lessons are categorized into those concerned with concept validation, integration issues, system design issues, software agent integration, and implementation and testing issues.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rosen:1997:PCS, author = "Clive Rosen", title = "{PLUNGE DA}: a case study", journal = j-SIGSOFT, volume = "22", number = "2", pages = "82--83", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251986", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dowson:1997:ASF, author = "Mark Dowson", title = "The Ariane 5 software failure", journal = j-SIGSOFT, volume = "22", number = "2", pages = "84", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251992", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Blyth:1997:IAM, author = "Andrew Blyth", title = "Issues arising from medical system's failure", journal = j-SIGSOFT, volume = "22", number = "2", pages = "85--86", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251994", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As more health-care providers adopt and utilise information technology in the treatment of there patients, so the number of system failures increases. Analysis of these failures shows us that these systems are failing for a variety of technical and social reason. The question that we are forced to ask is Why? In this paper I seek to highlight some of the problems that are currently facing developers and users of medical computing systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Morzenti:1997:ATA, author = "Angelo Morzenti and Fabio A. Schreiber", title = "Analysis of techniques in the assessment of ultra-reliable computerized systems", journal = j-SIGSOFT, volume = "22", number = "2", pages = "87--91", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.251998", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A wide gap exists between the dependability figures, required by standardization committees for life-critical computer applications, and the current state-of-art in techniques to provide and assess them. In this paper we make a quick review of the best suited methodologies for each phase of the system life-cycle. We argue that the traditional view, which distinguishes between the behaviour of hardware and software components, should be clarified by separating the logical activities in the specification and in the design phases, which can be related both to hardware and to software, and the physical defects and operation stress, which only affect hardware.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Greenwood:1997:MAL, author = "Garrison W. Greenwood", title = "So many algorithms. So little time", journal = j-SIGSOFT, volume = "22", number = "2", pages = "92--93", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.252002", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper discusses the futility in answering questions about convergence and performance in algorithms used to solve optimization problems. Not only are these answers difficult to obtain, they are often times meaningless.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{LeBissonnais:1997:MDR, author = "Marc {Le Bissonnais} and Fran{\c{c}}ois Prunet", title = "From manufacturing document requirements to customized authoring and automated publishing framework", journal = j-SIGSOFT, volume = "22", number = "2", pages = "94--98", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.252004", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The aim of this paper is a working-out of an open authoring framework for an automated documentation process binded with an object manufacturing-specific engineering framework. Using standards close together to support product documentation as part of the life-cycle of manufactured products is becoming an actual and urgent topic for industry. Indeed, this area leads people to describe very complex systems, but it uses different models, based on many standards, to be handled together during the life cycle steps of these systems. A customizable automated authoring and publishing framework trying to take into account some multimedia research aspects should make the work easier for the designers of such manufacturing systems, allowing them to follow the design process and to have a better communication. We contribute to the problem by using an object-oriented approach providing structuration, abstraction, re-use and easier upgrading based upon textual and graphical modes through the integration and merging of domain models with object services like customized editors, browsers and parsers.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finkbine:1997:BIU, author = "Robert B. Finkbine", title = "Barriers to Institutionalizing Using Current Tools and Environments: an Introduction to Functional Programming Systems Using {Haskell}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "99", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.566085", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kelsey:1997:BRE, author = "Robert Bruce Kelsey", title = "Book Review: {{\booktitle{Education for an Information Age: Teaching in the Computerized Classroom}}}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "99", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.566086", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1997:BROc, author = "Mark Doernhoefer", title = "Book Review: {{\booktitle{Object-Oriented Development Process and Metrics}}}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "100", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.566087", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raynham:1997:BRB, author = "Peter Raynham", title = "Book Review: Book Two of {{\booktitle{Object Oriented Knowledge: The Working Object}}}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "101--102", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.566088", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Suryanarayana:1997:BRO, author = "Manjunath Suryanarayana", title = "Book Review: {{\booktitle{Object-Orientation and Prototyping in Software Engineering}}}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "102", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.566089", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1997:BRA, author = "Will Tracz", title = "Book Review: {{\booktitle{The Art of Systems Architecting}}}", journal = j-SIGSOFT, volume = "22", number = "2", pages = "102", month = mar, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/251880.566090", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:21 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bassett:1997:TPA, author = "Paul G. Bassett", title = "The theory and practice of adaptive reuse", journal = j-SIGSOFT, volume = "22", number = "3", pages = "2--9", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258371", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Johnson:1997:CFP, author = "Ralph E. Johnson", title = "Components, frameworks, patterns", journal = j-SIGSOFT, volume = "22", number = "3", pages = "10--17", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258378", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bronsard:1997:TSP, author = "Fran{\c{c}}ois Bronsard and Douglas Bryan and W. Kozaczynski and Edy S. Liongosari and Jim Q. Ning and {\'A}sgeir {\'O}lafsson and John W. Wetterstrand", title = "Toward software plug-and-play", journal = j-SIGSOFT, volume = "22", number = "3", pages = "19--29", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258379", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Davis:1997:SAC, author = "Margaret J. Davis and Roger B. Williams", title = "Software architecture characterization", journal = j-SIGSOFT, volume = "22", number = "3", pages = "30--38", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258380", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{McCoog:1997:MRA, author = "Phillip McCoog and Rick Smith", title = "Mostly reuse: another code sharing option", journal = j-SIGSOFT, volume = "22", number = "3", pages = "39--43", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258382", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Maeda:1997:OIA, author = "Chris Maeda and Arthur Lee and Gail Murphy and Gregor Kiczales", title = "Open implementation analysis and design", journal = j-SIGSOFT, volume = "22", number = "3", pages = "44--52", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258383", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lam:1997:SDA, author = "W. Lam and J. A. McDermid", title = "A summary of domain analysis experience by way of heuristics", journal = j-SIGSOFT, volume = "22", number = "3", pages = "54--64", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258386", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jarzabek:1997:MMD, author = "Stan Jarzabek", title = "Modeling multiple domains in software reuse", journal = j-SIGSOFT, volume = "22", number = "3", pages = "65--74", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258387", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Meekel:1997:DMA, author = "Jacques Meekel and Thomas B. Horton and Robert B. France and Charlie Mellone and Sajid Dalvi", title = "From domain models to architecture frameworks", journal = j-SIGSOFT, volume = "22", number = "3", pages = "75--80", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258389", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Houdek:1997:QPA, author = "Frank Houdek and Hubert Kempter", title = "Quality patterns --- an approach to packaging software engineering experience", journal = j-SIGSOFT, volume = "22", number = "3", pages = "81--88", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258391", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mili:1997:ANC, author = "Hafedh Mili and Estelle Ah-Ki and Robert Godin and Hamid Mcheick", title = "Another nail to the coffin of faceted controlled-vocabulary component classification and retrieval", journal = j-SIGSOFT, volume = "22", number = "3", pages = "89--98", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258393", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1997:DRJ, author = "Will Tracz", title = "Developing reusable {Java} components", journal = j-SIGSOFT, volume = "22", number = "3", pages = "100--103", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258397", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hollingsworth:1997:UCD, author = "Jeffrey K. Hollingsworth and Ethan L. Miller", title = "Using content-derived names for configuration management", journal = j-SIGSOFT, volume = "22", number = "3", pages = "104--109", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258399", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mili:1997:RQR, author = "Hafedh Mili and Houari Sahraoui and Ilham Benyahia", title = "Representing and querying reusable object frameworks", journal = j-SIGSOFT, volume = "22", number = "3", pages = "110--120", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258401", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pastor:1997:UMM, author = "Esteban A. Pastor and R. T. Price", title = "Using metamodels of methodologies to determine the needs for reusability support", journal = j-SIGSOFT, volume = "22", number = "3", pages = "121--129", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258405", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Thibault:1997:FAG, author = "Scott Thibault and Charles Consel", title = "A framework for application generator design", journal = j-SIGSOFT, volume = "22", number = "3", pages = "131--135", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258408", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jimenez-Perez:1997:MSS, author = "Guillermo Jim{\'e}nez-P{\'e}rez and Don Batory", title = "Memory simulators and software generators", journal = j-SIGSOFT, volume = "22", number = "3", pages = "136--145", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258410", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Villarreal:1997:RGD, author = "E. E. Villarreal and Don Batory", title = "{Rosetta}: a generator of data language compilers", journal = j-SIGSOFT, volume = "22", number = "3", pages = "146--156", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258412", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mili:1997:CPM, author = "R. Mili and M. Frappier and J. Desharnais and A. Mili", title = "A calculus of program modifications", journal = j-SIGSOFT, volume = "22", number = "3", pages = "157--168", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258415", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Maruyama:1997:MAD, author = "Katsuhisa Maruyama and Ken-ichi Shima", title = "A mechanism for automatically and dynamically changing software components", journal = j-SIGSOFT, volume = "22", number = "3", pages = "169--180", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258417", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Browne:1997:RLI, author = "Shirley V. Browne and James W. Moore", title = "Reuse library interoperability and the World Wide {Web}", journal = j-SIGSOFT, volume = "22", number = "3", pages = "182--189", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258419", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Medvidovic:1997:RSC, author = "Nenad Medvidovic and Peyman Oreizy and Richard N. Taylor", title = "Reuse of off-the-shelf components in C2-style architectures", journal = j-SIGSOFT, volume = "22", number = "3", pages = "190--198", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258421", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Karhinen:1997:CDR, author = "Anssi Karhinen and Alexander Ran and Tapio Tallgren", title = "Configuring designs for reuse", journal = j-SIGSOFT, volume = "22", number = "3", pages = "199--208", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258423", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Guerrieri:1997:IJS, author = "Ernesto Guerrieri and Martin Griss and Doug Lea and Prashant Sridharan and Will Tracz", title = "The impact of {Java} on software reusability", journal = j-SIGSOFT, volume = "22", number = "3", pages = "210--211", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258426", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zand:1997:RRD, author = "Mansour Zand and Gillermo Arango and Maggie Davis and Ralph Johnson and Jeffrey S. Poulin and Andrew Watson", title = "Reuse research and development: is it on the right track?", journal = j-SIGSOFT, volume = "22", number = "3", pages = "212--216", month = may, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/258368.258428", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:24 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ethics:1997:DSE, author = "{ACM / IEEE-CS Task Force on Software Engineering Ethics and Practice}", title = "Draft software engineering code of ethics, version 2.1", journal = j-SIGSOFT, volume = "22", number = "4", pages = "3--6", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263245", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Krasner:1997:CRS, author = "Herb Krasner", title = "Clarifying the role of the {SEI}: they do not certify assessors or assessments", journal = j-SIGSOFT, volume = "22", number = "4", pages = "7", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263247", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rada:1997:NSE, author = "Roy Rada and James Schoening", title = "New standards for educational technology", journal = j-SIGSOFT, volume = "22", number = "4", pages = "9--10", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263248", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{ONeill:1997:SVA, author = "Don O'Neill", title = "Software value added study", journal = j-SIGSOFT, volume = "22", number = "4", pages = "11--12", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263249", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1997:SNSc, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "22", number = "4", pages = "13--20", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263250", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1997:ESEc, author = "Barbara Ann Kitchenham", title = "Evaluating software engineering methods and tools, part 7: planning feature analysis evaluation", journal = j-SIGSOFT, volume = "22", number = "4", pages = "21--24", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263251", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "When planning a feature analysis based evaluation of a method or tool the following areas should be addressed and included in the evaluation project plan:1. scope of the evaluation,2. basis of the evaluation,3. roles and responsibilities,4. procedures,5. assumptions and constraints made, and6. timescale and effort involved. These are discussed in the following sections.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1997:RPCc, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "22", number = "4", pages = "25--34", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263252", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Reifer:1997:RAC, author = "Donald J. Reifer", title = "Report: 4th {ACM} Conference On Computer and Communications Security", journal = j-SIGSOFT, volume = "22", number = "4", pages = "32--33", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.773581", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The 4th ACM Conference on Computer and Communications Security [1] was held on 1-4 April 1997 in Zurich, Switzerland. About 100 participants from around the world gathered to discuss advances being made primarily in the area of defensive information warfare. This was primarily a research-oriented event which attracted principal investigators working in the security field from about 14 nations. I attended the conference for the following four reasons: * I wanted to update my knowledge of the area. * I wanted to ascertain what progress has been made in the field. * I wanted to determine whether there were any breakthrough technologies on the horizon. * I wanted to understand the threats being guarded against and the defensive strategies that leaders in the field were recommending. As I will relate later, significant progress has been in many defensive information warfare areas. I particularly was impressed by the advances that have been made in the area of cryptography, digital signatures and communications protocols. I was disappointed by the perceived lack of progress over the years in the important area of trusted systems and information security infrastructure development. This was the first conference that I have attended on the subject in about a decade. I selected the event because I thought that it would allow me to view both present work in the field and look into the future.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kim:1997:RBA, author = "Hyoseob Kim", title = "Report on {Bruce Anderson}'s Tutorial on Pattern Languages of Program Design", journal = j-SIGSOFT, volume = "22", number = "4", pages = "34", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.773582", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Drori:1997:HIC, author = "Offer Drori", title = "Hypertext implications for {CASE} environments", journal = j-SIGSOFT, volume = "22", number = "4", pages = "35--38", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263253", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The article discusses hypertext and its use in the development of CASE based information systems. Information systems development is a lengthy process, comprising various phases dealing with different development processes --- from systems analysis, to system characterization and design, and culminating in the setting up of the system and assimilation by users. This is called the information system life cycle. The technology which deals with computerization of the various phases of information systems development is called CASE, or Computer-Aided Software Engineering. The work of the planner and programmer is frequently conducted in different work environments according to the phases of the system life cycle. To date, no computerized interface exists between the various environments, so that, in effect, management of the development phases is partially manual. The aim of this article is to show that a hypertext approach can be used to deal with the current difficulties in CASE-based information systems development. The basic premise of this article is that the CASE system should be viewed as a database, over which an appropriate dynamic hypertext model can then be defined. This approach differs from all other CASE approaches, which view CASE solely as a tool or working environment. Hypertext was developed in recent years to cope with the growing need for computer-aided management of large databases (particularly text-based ones). Hypertext enables the building of a large database and creation of information nodes with links between them, which make it possible to manage and control the many elements dispersed through numerous environments. This article sets out to show that it is possible to harness hypertext to manage many CASE-based work environments, thereby creating a computerized tool which draws together different work environments and enables management and control of its various elements.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lam:1997:CRA, author = "W. Lam", title = "Creating reusable architectures: initial experience report", journal = j-SIGSOFT, volume = "22", number = "4", pages = "39--43", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263254", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Achieving systematic reuse of software designs requires the creation of a reusable software architecture. This paper describes initial experience of creating reusable architectures in the avionics domain. A case-study is presented which illustrates the RACE (Reusable Architecture Creation and Employment) process. In RACE, a variability analysis is used to identify possible variations in a family of systems, which then guides the creation of a generic architecture and a set of architectural ``plug-ins.'' The paper concludes with a set of RACE guidelines which summarises our initial experience.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Guo:1997:ATD, author = "Minyi Guo", title = "Automatic transformation from data flow diagram to structure chart", journal = j-SIGSOFT, volume = "22", number = "4", pages = "44--49", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263255", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The software development methodologies --- structured analysis and structured design techniques are considered as the most popular and successful. But the process of transforming from structured software specification to structured design document is a challengingly intelligent activity. In this paper, we attempt to solve this problem automatically in our CASE tool, called CAST (Computer-Aided Structured Transformation). We propose a description language as a common machinery for the representation of various structured tools. Two kinds of algorithms which correspond to two structured analysis methods called transform analysis and transaction analysis, used to produce structure charts from data flow diagrams, are presented. The architecture of CAST is also described in the paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Agarwal:1997:IIO, author = "Rakesh Agarwal and Giorgio Bruno", title = "Implementing inheritance in operational graphical languages", journal = j-SIGSOFT, volume = "22", number = "4", pages = "50--55", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263256", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "System engineering development methods and automation techniques are required to manage the complexity inherent in the design of large computer based systems and to provide an efficient means for reusing the system by means of inheritance. Growing interest is being shown in operational models, i.e. models that can be executed using a suitable support environment. Most operational models are graphical and can be considered as high-level programs which are developed using high-level modeling languages. Generally speaking, while the OO approach has reached a good maturity at the programming level (although differences in individual languages are not negligible) there is no clear consensus on how it can be extended to the design and analysis phases. These artificial discontinuities can be eliminated if a single modeling language is used which is operational. The operational approach eliminates the scope and semantic discontinuities in the development process by using a single, integrated, formal set of modeling abstractions to create a given executable model. It was to address these problems and provide advanced software architectural features, that O$^3$ ML was developed by us. Combining the concept of Operational, OO and Modeling we get a modeling language which we refer to as Operational Object-Oriented Modeling Language (O$^3$ ML) that provides the basic vocabulary used to express both domain knowledge and prototyping ideas.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Srinath:1997:ISB, author = "S. Srinath and K. Venkatesh and D. Janaki Ram", title = "An integrated solution based approach to software development using unified reuse artifacts", journal = j-SIGSOFT, volume = "22", number = "4", pages = "56--60", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263258", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Although development processes are considered important in determining the quality of the product, often processes and products are considered as separate entities. This results in loss of information regarding dependencies spanning across processes and products. In this paper we propose a unit called Unified Reuse Artifact (URA) which can represent artifacts of either the ``process'' or the ``product,'' in effect representing an artifact of the ``solution.'' With this, a solution is represented as a directed graph of URAs establishing dependencies in a unified manner. This helps bring in other possibilities like project tracking, deciphering contexts and evolution in a unified way, etc. We then propose a process model oriented towards solutions, and which strives to reuse earlier experiences with the concept of a ``Solution Framework.''", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chen:1997:RES, author = "Yeh-Ling Chen and Arnold J. Stromberg", title = "Robust estimation in software experiments", journal = j-SIGSOFT, volume = "22", number = "4", pages = "60--64", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263260", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "``Software development, like other scientific developments, requires formal experiments with a great deal of plan and analysis if they are to provide meaningful results''[11]. This paper uses examples to extend the discussion to certain statistical analyses, i.e., robust estimation and variance modeling, which are relatively new and may have never been practiced in the software engineering field.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mugisa:1997:RTS, author = "Ezra K. Mugisa", title = "A reuse triplet for systematic software reuse", journal = j-SIGSOFT, volume = "22", number = "4", pages = "65--69", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263262", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present the view that for systematic software reuse (SSR) to happen we need a reuse software architecture (RSA) as the invariant base and a collection of reuse software components (RSCs) as the pluggable variant part of a family of architecturally similar software systems. We shall identify a reuse situation with a RSA, RSCs and a plugging operator. SSR is then presented as a case of plugging a collection of RSCs into the appropriate RSA. We apply this view of reuse to a number of reuse cases and find evidence that for reuse to be successful we need simple, clear and easily pluggable RSAs and RSCs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ram:1997:POT, author = "D. Janaki Ram and K. N. Anantha Raman and K. N. Guruprasad", title = "A pattern oriented technique for software design", journal = j-SIGSOFT, volume = "22", number = "4", pages = "70--73", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263265", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Design patterns can be considered as elements of complex software systems. Crafting these software systems using design patterns calls for a suitable design methodology or technique. Existing design methodologies do not serve this purpose well. This paper proposes a technique which helps in developing software systems using design patterns.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fink:1997:PBT, author = "George Fink and Matt Bishop", title = "Property-based testing: a new approach to testing for assurance", journal = j-SIGSOFT, volume = "22", number = "4", pages = "74--80", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263267", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The goal of software testing analysis is to validate that an implementation satisfies its specifications. Many errors in software are caused by generalizable flaws in the source code. Property-based testing assures that a given program is free of specified generic flaws. Property-based testing uses property specifications and a data-flow analysis of the program to guide evaluation of test executions for correctness and completeness.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Piattini:1997:ASM, author = "Mario G. Piattini and Herv{\'e} Tigr{\'e}at", title = "Applying the {``STUDIO''} method to the interface design of an environmental software system", journal = j-SIGSOFT, volume = "22", number = "4", pages = "81--83", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263268", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper addresses the application of the STUDIO (STructured User-interface Design for Interaction Optimization) method to the user-interface development of an information system (called ``HIMPPA'') that allows the simulation of heavy-particle dispersion. This method has been proposed in 1994 by D. P. Browne. We have adapted and integrated it with an object-oriented design technique for the HIMPPA project (an ESPRIT-PASO Special Action).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wang:1997:TOO, author = "Y. Wang and G. King and I. Court and M. Ross and G. Staples", title = "On testable object-oriented programming", journal = j-SIGSOFT, volume = "22", number = "4", pages = "84--90", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.263270", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A new philosophy contributing towards the design of testable object-oriented (OO) software is introduced in this paper. The testing of conventional OO software focuses on the generation of tests for existing objects and systems; the testable object-oriented programming (TOOP) method draws attention to building testabilities into objects and systems during coding or compiling, so that the succeeding processes in test generation and implementation can be simplified. A new method of TOOP is developed to improve the testability of OO software. Software testability at object level and system level is quantitatively modelled. A set of fundamental built-in testable mechanisms oriented to the basic control structures in objects is constructed in order to improve the testability of OO software in terms of test controllability and observability. The most interesting feature obtained by TOOP is that the built-in tests in any objects can be inherited and reused in the same way as that of codes or functions in conventional OO software.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1997:BRD, author = "Mark Doernhoefer", title = "Book review: {{\booktitle{Developing Object-Oriented Software An Experienced-Based Approach}} by IBM Object-Oriented Technology Center (PTR Prentice Hall, 1997)}", journal = j-SIGSOFT, volume = "22", number = "4", pages = "113--114", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.773583", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ives:1997:BRM, author = "Barry L. Ives", title = "Book Review: {{\booktitle{ML for the Working Programmer}} by L. C. Paulson (Cambridge University Press, 1996)}", journal = j-SIGSOFT, volume = "22", number = "4", pages = "114", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.773584", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ires:1997:BRU, author = "Barry L. Ires", title = "Book review: {{\booktitle{Using Z}} by Jim Woodcock and Jim Davies (Prentice Hall, 1996)}", journal = j-SIGSOFT, volume = "22", number = "4", pages = "114--115", month = jul, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/263244.773585", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:25 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1997:SNSd, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "22", number = "5", pages = "5--9", month = sep, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/270849.270850", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1997:ESEd, author = "Barbara Ann Kitchenham and Lindsay Jones", title = "Evaluating {SW} Eng. methods and tools, part 8: analysing a feature analysis evaluation", journal = j-SIGSOFT, volume = "22", number = "5", pages = "10--12", month = sep, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/270849.270851", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In the previous articles, we introduced the basic principles of Feature Analysis, its limitations, how to drive a feature list and score features and how to plan a Feature Analysis evaluation. In this article, we look in more detail at the issue of analysing the results of feature analysis and presenting the results of an evaluation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1997:RPCd, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "22", number = "5", pages = "13--15", month = sep, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/270849.270852", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kwon:1997:RS, author = "Oh Cheon Kwon", title = "Report from {SEKE'97}", journal = j-SIGSOFT, volume = "22", number = "5", pages = "15--16", month = sep, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/270849.270853", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Edwards:1997:WAW, author = "Stephen H. Edwards and Bruce W. Weide", title = "{WISR8: 8th Annual Workshop on Software Reuse}: summary and working group reports", journal = j-SIGSOFT, volume = "22", number = "5", pages = "17--32", month = sep, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/270849.270854", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Waugh:1997:DET, author = "Doug Waugh", title = "Description of {EDCS} technology clusters", journal = j-SIGSOFT, volume = "22", number = "5", pages = "33--42", month = sep, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/270849.270855", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:27 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Evolutionary Systems are those that are capable of accommodating change over an extended system lifetime with reduced risk and cost/schedule impact. Most of our complex defense systems depend on software for their successful operation and, as a result, the software in those systems is the primary vehicle for adapting to change. The EDCS (Evolutionary Design of Complex Software) Program is providing for the development and experimental application of new software technologies which can enable significant improvements in military mission effectiveness and information superiority. The goal is the capability to produce software intensive military systems that are highly flexible and adaptable to meet changing requirements --- evolutionary systems. In addition to DARPA, the EDCS Program is co-sponsored by USAF Rome Laboratory, USAF Wright Laboratory, US Army Missile Command, and the National Science Foundation (NSF). Technical management is provided jointly by the DoD Software Engineering Institute (SEI) and Rome Laboratory. Rome Laboratory is DARPA's primary contracting agent.EDCS is organized into 5 Technology Clusters:1. Rationale Capture and Software Understanding2. Architecture and Generation3. High Assurance / Real-Time4. Information Management5. Dynamic Languages. This paper contains a short description of each cluster.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Parnas:1997:SEE, author = "David Lorge Parnas", title = "Software engineering (extended abstract): an unconsummated marriage", journal = j-SIGSOFT, volume = "22", number = "6", pages = "1--3", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267897", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rushby:1997:SS, author = "John Rushby", title = "Subtypes for specifications", journal = j-SIGSOFT, volume = "22", number = "6", pages = "4--19", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267898", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Boehm:1997:DMA, author = "Barry Boehm and Alex Egyed and Julie Kwan and Ray Madachy", title = "Developing multimedia applications with the {WinWin} spiral model", journal = j-SIGSOFT, volume = "22", number = "6", pages = "20--39", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267899", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Maibaum:1997:WWT, author = "Tom S. E. Maibaum", title = "What we teach software engineers in the university: do we take engineering seriously?", journal = j-SIGSOFT, volume = "22", number = "6", pages = "40--50", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267900", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Uhl:1997:WWE, author = "J{\"u}rgen Uhl", title = "What we expect from software engineers in the industry", journal = j-SIGSOFT, volume = "22", number = "6", pages = "51", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267901", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kemmerer:1997:SID, author = "Richard A. Kemmerer", title = "Security issues in distributed software", journal = j-SIGSOFT, volume = "22", number = "6", pages = "52--59", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267902", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Medvidovic:1997:FCC, author = "Nenad Medvidovic and Richard N. Taylor", title = "A framework for classifying and comparing architecture description languages", journal = j-SIGSOFT, volume = "22", number = "6", pages = "60--76", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267903", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Naumovich:1997:ASA, author = "Gleb Naumovich and George S. Avrunin and Lori A. Clarke and Leon J. Osterweil", title = "Applying static analysis to software architectures", journal = j-SIGSOFT, volume = "22", number = "6", pages = "77--93", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267904", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Meijler:1997:MDP, author = "Theo Dirk Meijler and Serge Demeyer and Robert Engel", title = "Making design patterns explicit in {FACE}: a frame work adaptive composition environment", journal = j-SIGSOFT, volume = "22", number = "6", pages = "94--110", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267905", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Allen:1997:TLM, author = "Graham Allen and Leighton Davies and G{\"o}ran Lindmark and Even-Andr{\'e} Karlsson", title = "{TTM15 --- a} large multi-site improvement project", journal = j-SIGSOFT, volume = "22", number = "6", pages = "111--124", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267906", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Joeris:1997:CMN, author = "Gregor Joeris", title = "Change management needs integrated process and configuration management", journal = j-SIGSOFT, volume = "22", number = "6", pages = "125--141", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267907", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Sutton:1997:DNG, author = "Stanley M. {Sutton, Jr.} and Leon J. Osterweil", title = "The design of a next-generation process language", journal = j-SIGSOFT, volume = "22", number = "6", pages = "142--158", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267908", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{vanderHoek:1997:SRM, author = "Andr{\'e} van der Hoek and Richard S. Hall and Dennis Heimbigner and Alexander L. Wolf", title = "Software release management", journal = j-SIGSOFT, volume = "22", number = "6", pages = "159--175", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267909", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Pohl:1997:CAP, author = "Klaus Pohl and Klaus Weidenhaupt", title = "A contextual approach for process-integrated tools", journal = j-SIGSOFT, volume = "22", number = "6", pages = "176--192", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267910", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jahnke:1997:GFR, author = "Jens H. Jahnke and Wilhelm Sch{\"a}fer and Albert Z{\"u}ndorf", title = "Generic fuzzy reasoning nets as a basis for reverse engineering relational database applications", journal = j-SIGSOFT, volume = "22", number = "6", pages = "193--210", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267911", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Alborghetti:1997:PAS, author = "Andrea Alborghetti and Angelo Gargantini and Angelo Morzenti", title = "Providing automated support to deductive analysis of time critical systems", journal = j-SIGSOFT, volume = "22", number = "6", pages = "211--226", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267912", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cheung:1997:VLP, author = "Shing Chi Cheung and Dimitra Giannakopoulou and Jeff Kramer", title = "Verification of liveness properties using compositional reachability analysis", journal = j-SIGSOFT, volume = "22", number = "6", pages = "227--243", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267913", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dwyer:1997:MCG, author = "Matthew B. Dwyer and Vicki Carr and Laura Hines", title = "Model checking graphical user interfaces using abstractions", journal = j-SIGSOFT, volume = "22", number = "6", pages = "244--261", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267914", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wood:1997:CCS, author = "Murray Wood and Marc Roper and Andrew Brooks and James Miller", title = "Comparing and combining software defect detection techniques: a replicated empirical study", journal = j-SIGSOFT, volume = "22", number = "6", pages = "262--277", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267915", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ebert:1997:ECP, author = "Christof Ebert", title = "Experiences with criticality predictions in software development", journal = j-SIGSOFT, volume = "22", number = "6", pages = "278--293", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267916", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Land:1997:VDD, author = "Lesley Pek Wee Land and Chris Sauer and Ross Jeffery", title = "Validating the defect detection performance advantage of group designs for software reviews: report of a laboratory experiment using program code", journal = j-SIGSOFT, volume = "22", number = "6", pages = "294--309", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267917", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Desharnais:1997:ISS, author = "Jules Desharnais and Marc Frappier and Ridha Kh{\'e}dri and Ali Mili", title = "Integration of sequential scenarios", journal = j-SIGSOFT, volume = "22", number = "6", pages = "310--326", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267918", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Engels:1997:VOA, author = "Gregor Engels and Reiko Heckel and Gabi Taentzer and Hartmut Ehrig", title = "A view-oriented approach to system modelling based on graph transformation", journal = j-SIGSOFT, volume = "22", number = "6", pages = "327--343", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267919", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rosenblum:1997:DFI, author = "David S. Rosenblum and Alexander L. Wolf", title = "A design framework for {Internet}-scale event observation and notification", journal = j-SIGSOFT, volume = "22", number = "6", pages = "344--360", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267920", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bodik:1997:RDF, author = "Rastislav Bod{\'\i}k and Rajiv Gupta and Mary Lou Soffa", title = "Refining data flow information using infeasible paths", journal = j-SIGSOFT, volume = "22", number = "6", pages = "361--377", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267921", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Forgacs:1997:FTP, author = "Istv{\'a}n Forg{\'a}cs and Antonia Bertolino", title = "Feasible test path selection by principal slicing", journal = j-SIGSOFT, volume = "22", number = "6", pages = "378--394", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267922", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Devanbu:1997:CVT, author = "Prem Devanbu and Stuart G. Stubblebine", title = "Cryptographic verification of test coverage claims", journal = j-SIGSOFT, volume = "22", number = "6", pages = "395--413", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267923", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chen:1997:CDM, author = "Yih-Farn R. Chen and Emden R. Gansner and Eleftherios Koutsofios", title = "A {C++} data model supporting reachability analysis and dead code detection", journal = j-SIGSOFT, volume = "22", number = "6", pages = "414--431", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267924", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Reps:1997:UPP, author = "Thomas Reps and Thomas Ball and Manuvir Das and James Larus", title = "The use of program profiling for software maintenance with applications to the year 2000 problem", journal = j-SIGSOFT, volume = "22", number = "6", pages = "432--449", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267925", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Heimdahl:1997:RSH, author = "Mats P. E. Heimdahl and Michael W. Whalen", title = "Reduction and slicing of hierarchical state machines", journal = j-SIGSOFT, volume = "22", number = "6", pages = "450--467", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267926", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Schuetze:1997:PBA, author = "Martin Schuetze and Jan Peter Riegel and Gerhard Zimmermann", title = "A pattern-based application generator for building simulation", journal = j-SIGSOFT, volume = "22", number = "6", pages = "468--482", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267927", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ducasse:1997:ECT, author = "St{\'e}phane Ducasse and Tamar Richner", title = "Executable connectors: towards reusable design elements", journal = j-SIGSOFT, volume = "22", number = "6", pages = "483--499", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267928", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Picco:1997:ECM, author = "Gian Pietro Picco and Gruia-Catalin Roman and Peter J. McCann", title = "Expressing code mobility in mobile {UNITY}", journal = j-SIGSOFT, volume = "22", number = "6", pages = "500--518", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267929", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Karlsson:1997:IDA, author = "Even-Andr{\'e} Karlsson and Lars Taxen", title = "Incremental development for {AXE} 10", journal = j-SIGSOFT, volume = "22", number = "6", pages = "519--520", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267930", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Perry:1997:TTP, author = "Dewayne E. Perry and Lawrence G. Votta", title = "The tale of two projects (abstract)", journal = j-SIGSOFT, volume = "22", number = "6", pages = "521--522", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267931", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Idri:1997:TAC, author = "A. Idri and B. Griech and A. {El Iraki}", title = "Towards an adaptation of the {COCOMO} cost model to the software measurement theory", journal = j-SIGSOFT, volume = "22", number = "6", pages = "525--526", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267932", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dini:1997:FSA, author = "Petre Dini and Amina Belkhelladi and Walc{\'e}lio L. Melo", title = "Formalizing software architectures: an industrial experience", journal = j-SIGSOFT, volume = "22", number = "6", pages = "527--529", month = nov, year = "1997", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/267896.267933", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:28 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1998:RPCa, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "23", number = "1", pages = "9--15", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272266", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1998:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "23", number = "1", pages = "16--23", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.565662", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1998:ESEa, author = "Barbara Ann Kitchenham and Lesley M. Pickard", title = "Evaluating software engineering methods and tools: part 9: quantitative case study methodology", journal = j-SIGSOFT, volume = "23", number = "1", pages = "24--26", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272268", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This article is the first of three articles describing how to undertake a quantitative case study based on work done as part of the DESMET project [1], [2]. In the context of methods and tool evaluations, case studies are a means of evaluating methods and tools as part of the normal software development activities undertaken by an organisation. The main benefit of such case studies is that they allow the effect of new methods and tools to be assessed in realistic situations. Thus, case studies provide a cost-effective means of ensuring that process changes provide the desired results. However, unlike formal experiments and surveys, case studies do not have a well-understood theoretical basis. This series of articles provides guidelines for organising and analysing case studies so that your investigations of new technologies will produce meaningful results.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kwon:1998:RS, author = "Oh Cheon Kwon", title = "Report from {SEKE'97}", journal = j-SIGSOFT, volume = "23", number = "1", pages = "27--28", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.565665", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Demeyer:1998:RWO, author = "Serge Demeyer and Harald Hall", title = "Report: {Workshop on Object-Oriented Re-engineering (WOOR'97)}", journal = j-SIGSOFT, volume = "23", number = "1", pages = "28--29", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272269", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dubois:1998:RWS, author = "Eric Dubois and Andreas L. Opdahl and Klaus Pohl", title = "{REFSQ'97} workshop summary", journal = j-SIGSOFT, volume = "23", number = "1", pages = "30--34", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272270", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The REFSQ (Requirements Engineering: Foundation for Software Quality) 1997 workshop was held in conjunction with CAiSE'97 in Barcelona, Spain on June 16th and 17th, 1997. It was organised by Eric Dubois, Andreas L. Opdahl and Klaus Pohl. In this workshop summary we, the organisers, will provide an overview of the workshop and of the presentations given, and present our subjective view of the various and fruitful discussions that took place.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finneran:1998:RTC, author = "Lisa Finneran", title = "Report: technology challenges at {SPC}", journal = j-SIGSOFT, volume = "23", number = "1", pages = "35--37", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272271", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leavens:1998:WFC, author = "Gary T. Leavens and Oscar Nierstrasz and Murali Sitaraman", title = "{1997 Workshop on Foundations of Component-Based Systems}", journal = j-SIGSOFT, volume = "23", number = "1", pages = "38--41", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272272", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Carreira:1998:WDS, author = "Jo{\~a}o Carreira and Jo{\~a}o Gabriel Silva", title = "Why do some (weird) people inject faults?", journal = j-SIGSOFT, volume = "23", number = "1", pages = "42--43", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272273", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Butkus:1998:FEC, author = "Al Butkus and Barbara L. Mitchell", title = "A framework for encapsulating card-oriented, interactive, legacy applications", journal = j-SIGSOFT, volume = "23", number = "1", pages = "44--46", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272274", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Over the last several years Lockheed Martin has invested IR\&D funds to explore lowering the cost of ownership of Command and Control systems for DoD software intensive systems. Two key technologies that address this issue are developing software components that can be reused across a family of systems within the command and control domain and methods for reusing legacy system applications. This paper describes how these two approaches have been merged using Object Oriented Technology to provide a reusable framework for encapsulating legacy applications. The Object Oriented Technology (OOT) that we consider key to lowering cost of ownership and to strategies for reuse of legacy code is described as Design Patterns [Gamma] and Frameworks[Coplien]. Design Patterns exist at a level of abstraction that provides a high return on reuse investment because they model stable relationships that are not likely to change as a system evolves and which can be reused across systems [Coplien]. It is not the intent of this paper to describe these terms. Rather it is our purpose to illustrate the advantages of this level of OOT.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Huang:1998:MAC, author = "Riri Huang", title = "Making active {CASE} tools --- toward the next generation {CASE} tools", journal = j-SIGSOFT, volume = "23", number = "1", pages = "47--50", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272275", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In CASE field, there is a long-standing topic, i.e. the reason that CASE tools seem to be dearly bought but sparsely used. Based on our practical experience of making and using CASE tools, we point out the reason is that today's CASE tools are actually not very much user-oriented. The factors and requirements of CASE users are not given enough consideration in the production of CASE tools. Most today's CASE tools are motivated by new paradigms and techniques in the area of software engineering. Therefore, making CASE tools are often driven by techniques, rather than by real users' needs and expectations. In this paper, we present our viewpoints on the reason why CASE tools are used below expectations. We suggest some important features that are worthy of careful consideration while producing more people-oriented and active CASE tools. We also describe some strategies for building such CASE tools.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Valenti:1998:OCO, author = "S. Valenti and M. Panti and A. Cucchiarelli", title = "Overcoming communication obstacles in user-analyst interaction for functional requirements elicitation", journal = j-SIGSOFT, volume = "23", number = "1", pages = "50--55", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272276", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The importance of requirement engineering in the software development process has been widely recognised by the scientific community. One of the major error sources that arise in this phase is represented by ineffectual communication between users and analysts. Valusek and Fryback in [32] identify three classes of communication obstacles to a successful elicitation of requirements. Purpose of this paper is to discuss these obstacles and to identify the structure of a CASE tool that may allow to overcome them.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kokol:1998:ICM, author = "Peter Kokol and Janez Brest and Milan Zorman and Vili Podgorelec", title = "Integration of complexity metrics with the use of decision trees", journal = j-SIGSOFT, volume = "23", number = "1", pages = "56--58", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272277", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We would like to present the use of the decision tree approach in the integration of various complexity metrics on the example of distinguishing between random and ordinary programs. Following our proposition that randomness indicates meaningless we can state that with the approach we are able to measure the ``meaning'' of computer programs. The main contributions stated in the paper is that the new way of metrics integration enabling one to combine metrics with various measurement units.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Law:1998:GLO, author = "Rob Law", title = "Generalization of leaner object-oriented slicing", journal = j-SIGSOFT, volume = "23", number = "1", pages = "59--61", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272278", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Leaner Object-Oriented Slicing technique in [2], albeit effective in providing further code reduction from an object-oriented slice, fails to handle an object-oriented slice with multiple inheritance nets. That is, an object-oriented slice in a tree form with multiple branches is beyond the ability of leaner object-oriented slicing. This paper proposes a new approach which extends the applicability of code reduction by leaner object-oriented slicing. A generalized leaner object-oriented slicing method can now be achieved which provides further code reduction for general object-oriented slices.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Xia:1998:WWS, author = "Franck Xia", title = "{What}'s wrong with software engineering research methodology", journal = j-SIGSOFT, volume = "23", number = "1", pages = "62--65", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272279", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In a recent conference, there was a panel session on whether Software Engineering is really engineering. The debate was interesting but inconclusive, not because the panelists disagreed on the state of the arts of software engineering, but on the definition of what is called engineering. Some thought that the aim of engineering is to build useful machines, and as far as we build machines we are engineers using engineering knowledge. So the question of the panel session was somehow ill-posed. For others, an engineering needs a scientific theory to help building machines, and when the theory cannot well guide practice, the engineering is still at the craft stage [1]. I believe on the last definition: an engineering must have a scientific theory as foundation and this theory can be applied to build products. If we examine other engineering disciplines such as mechanical, electrical, or civil engineering in a modern sense, all these engineering disciplines have their theoretic foundation [2]. Therefore, anyone who builds products without theoretic knowledge, whatever the expertise he may have, can only be called craftsman or artist, not engineer. In this sense I feel that, with the current knowledge on software ``engineering'', those who develop software are akin to artisans rather than engineers. Many people will disagree with my assertion, by mentioning a great variety of tools, languages, environments, etc. It is true that software development practices have achieved a lot of progress. However, as an engineering discipline and therefore from its scientific aspect, I think we are progressing very slowly. The reason is that there are few theories in software engineering that can really be qualified scientific and I will try to demonstrate it from epistemology viewpoint. Comments will be welcome.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Law:1998:IOO, author = "Rob Law", title = "Interacting with Object-Oriented Program Slicing", journal = j-SIGSOFT, volume = "23", number = "1", pages = "66--67", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272280", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Object-Oriented Program Slicing was introduced by Law and Maguire [1,2]. On the basis of Object-Oriented Program Slicing, C++ Object-Oriented Program Slicer [C++\_OOPS] was developed to assist programmers locate program faults. Technical investigation of Object-Oriented Program Slicing and the design of C++\_OOPS can be found in [1,2]. This paper provides a discussion and analysis of programmers' views towards using C++\_OOPS. Users generally agree that C++\_OOPS assists high-level debugging, yet a more user-friendly C++\_OOPS environment could definitely be more beneficial.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Martin:1998:PDU, author = "Declan Martin", title = "Preliminary design use cases: combining use cases and event response lists for reuse and legacy system enhancement", journal = j-SIGSOFT, volume = "23", number = "1", pages = "68--71", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272281", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This report describes an approach to combining Use Cases with elements from Event Response Lists to help improve requirements understanding. The format suggested for the combination, called the Preliminary Design Use Cas, proves particularly effective in facilitating reuse of existing system elements. It also supports the definition of extensions to existing systems, and encourages dialogue between customers, analysts and designers. The approach has resulted from industrial practice and has proven particularly successful.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Anane:1998:HDP, author = "R. Anane", title = "Holistic design of a programming system", journal = j-SIGSOFT, volume = "23", number = "1", pages = "72--76", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272282", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The different stages of the prevailing software development model involve the use of software development tools and methods that are usually based on different paradigms. The mismatch between the different levels of this hierarchical process is often a source of difficulty and has led to an increasing interest in the holistic approach to software design and implementation. This approach requires all the levels to be based on the same principles. This paper describes how it was used in the design and implementation of a small programming system which incorporates a functional language, an optimiser and a syntax-directed editor. It also highlights the advantages of the holistic approach.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mannion:1998:PR, author = "Mike Mannion and Barry Keepence", title = "Partnering for reuse", journal = j-SIGSOFT, volume = "23", number = "1", pages = "77--80", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272283", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software Reuse is a business solution to the increasing demand for software over supply. However there remains little investment in software reuse despite the availability of return-on-investment models to show the cost-benefits, organisational models for undertaking the task and the appropriate technology to do so. In addition investment in reuse which transcends commercial barriers is practically non-existent. This position paper argues that global Software Reuse in the 21st Century will not be fully exploited without breaking down the traditional customer-supplier relationship and adopting long-term business relationships and supply chain management.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Xiaodong:1998:TDS, author = "Yuan Xiaodong and Chen Jiajun and Zheng Guoliang", title = "Two-dimensional software development model combining object-oriented method with formal method", journal = j-SIGSOFT, volume = "23", number = "1", pages = "81--85", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272284", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Most of current software development models are linear, one-dimensional model. On the basis of the analysis of the current models, this paper provides a two-dimensional software development model that combines object-oriented method with formal method. This model has the advantages of both methods. We introduce three key stages of the model architecture in details", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Krogstie:1998:IUQ, author = "John Krogstie", title = "Integrating the understanding of quality in requirements specification and conceptual modeling", journal = j-SIGSOFT, volume = "23", number = "1", pages = "86--91", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272285", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The notion of quality of information system models and other conceptual models is not well understood. However, recent quality frameworks have tried to take a more systematic approach. We have earlier developed a framework for understanding and assessing the quality of models in general, with emphasis on models made in conceptual modeling languages. At the same time, there is a long tradition on discussing quality of more specialized models, e.g. in the form of requirements specifications. Several authors have created taxonomies of useful properties of models and requirements specifications, the most comprehensive overview being presented by Alan Davis. We have in this paper extended our quality framework for models based on the work by Davis on quality in requirement specifications, looking upon a requirements specification as a specific type of model. Comparing the approaches we find on the one hand that the properties as summarized by Davis are subsumed by our framework on a high level, and that there are aspects within our framework that are not covered by Davis. On the other hand, the comparison has resulted in a useful extension and deepening of our framework on this specific kind of model, and in this way improved the practical applicability of our framework when applied to discussing the quality of requirements specifications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Juric:1998:UR, author = "Radmila Juric", title = "The {UML} rules", journal = j-SIGSOFT, volume = "23", number = "1", pages = "92--97", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272286", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Unified Modelling Language (UML), version 1.0, developed in order to standardise different object oriented development practices, offers a general way of representing technical, business and software models through the structure and dynamics of the UML modelling elements. The UML also defines a set of rules that are expected to be followed in order to claim that the UML is being followed. In this paper I extract the rules related to the core concepts, and structural and behavioural elements, found in the Semantics of the UML documentation set.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Nourani:1998:SAI, author = "Cyrus F. Nourani", title = "Software agents and intelligent object fusion", journal = j-SIGSOFT, volume = "23", number = "1", pages = "98", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272358", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Techniques for modular software design are presented applying software agents. The conceptual designs are domain independent and make use of specific domain aspects applying Multiagent AI. The stages of conceptualization, design and implementation are defined by new techniques coordinated by objects. Software systems are designed by knowledge acquisition, specification, and multiagent implementations. Multiagent implementations are defined for the modular designs, applying our recent projects which have lead to fault tolerant AI systems. A novel multi-kernel design technique is presented. Communicating pairs of kernels, each defining a part of the system, are specified by object-coobject super-modules. Treating objects as abstract data types and a two level programming approach to OOP allows us to define Pull-up abstractions to treat incompatible objects. Keywords Abstract Objects, Intelligent syntax, MJOOP, Multi Agent Object Level Programming, Multi Kernel Design With OOP, Software Agents, Intelligent Objects. Academic UCSB when at University", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jianmin:1998:CMC, author = "Hou Jianmin and Li Xuandong and Fan Xiaocon and Zheng Guoliang", title = "Compositional model-checking for real-time systems", journal = j-SIGSOFT, volume = "23", number = "1", pages = "99--ff.", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272359", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lam:1998:VCR, author = "W. Lam", title = "Viewpoint-centred reuse: bridging the gap between reusability and the needs of the reuser", journal = j-SIGSOFT, volume = "23", number = "1", pages = "100--103", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272360", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The ``Reuse without Reusers'' Syndrome. The problems of low productivity, late delivery and poor software quality are, unfortunately, characteristic of the software industry (Horowitz and Munson 1989). Increasingly, software developers are looking towards reuse as a possible solution to these problems. However, attempting to develop genuinely reusable artifacts without a firm understanding of the reuser's (or potential reuser's) needs, i.e. their ``reuse requirements'', is a difficult process. A lack of understanding and general detachment of the reuser from the reuse process is a situation recognised in this paper as the ``reuse without reusers'' syndrome. The aim of this paper is to highlight the role played by the reuser in the reuse process, and to encourage more user-centric approaches to key reuse activities such as domain analysis (Prieto-Diaz 1990). We do this by describing a reuse process called Viewpoint-Centred reuse (VCR), which forms part of our current research agenda in the ART (Applied Reuse Technology) project at the University of Hertfordshire, UK.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lee:1998:NSM, author = "Jonathan Lee and Nien-Lin Xue and Tai-Lin Kuei", title = "A note on state modeling through inheritance", journal = j-SIGSOFT, volume = "23", number = "1", pages = "104--110", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.272361", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "How to achieve the state modeling through inheritance has been considered as an important issue in object-oriented modeling. In this paper, an approach called Focus of Attention is proposed to make the state modeling easier by constructing state representations of a class from those of its parent. Facets impacting the state modeling are called FOA facets, which are used as a guideline to modify an inherited state model. Various specialization techniques are discussed, which help better understand the relationship between the state model of a superclass and its subclass.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Olaughlin:1998:BRY, author = "Brian Olaughlin", title = "Book Reviews: {{\booktitle{The Year 2000 Software Crisis: Challenge of the Century}}, William M. Ulrich and Ian S. Hayes}", journal = j-SIGSOFT, volume = "23", number = "1", pages = "109--109", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.565644", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1998:BRD, author = "Will Tracz", title = "Book Reviews: {{\booktitle{The Deadline, A Novel about Project Management}}, Tom DeMarco}", journal = j-SIGSOFT, volume = "23", number = "1", pages = "109--109", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.565645", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raynham:1998:BRS, author = "Peter Raynham", title = "Book Reviews: {{\booktitle{Smalltalk, Objects, and Design}}, by Chamond Liu}", journal = j-SIGSOFT, volume = "23", number = "1", pages = "110--110", month = jan, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/272263.565646", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:32 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Corbett:1998:CCM, author = "James C. Corbett", title = "Constructing compact models of concurrent {Java} programs", journal = j-SIGSOFT, volume = "23", number = "2", pages = "1--10", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271778", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Finite-state verification technology (e.g., model checking) provides a powerful means to detect concurrency errors, which are often subtle and difficult to reproduce. Nevertheless, widespread use of this technology by developers is unlikely until tools provide automated support for extracting the required finite-state models directly from program source. In this paper, we explore the extraction of compact concurrency models from Java code. In particular, we show how static pointer analysis, which has traditionally been used for computing alias information in optimizers, can be used to greatly reduce the size of finite-state models of concurrent Java programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Harrold:1998:CIC, author = "Mary Jean Harrold and Gregg Rothermel and Saurabh Sinha", title = "Computation of interprocedural control dependence", journal = j-SIGSOFT, volume = "23", number = "2", pages = "11--20", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271780", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Program dependence information is useful for a variety of software testing and maintenance tasks. Properly defined, control and data dependencies can be used to identify semantic dependencies. To function effectively on whole programs, tools that utilize dependence information require information about interprocedural dependencies: dependencies that exist because of interactions among procedures. Many techniques for computing data and control dependencies exist; however, in our search of the literature we find only one attempt to define and compute interprocedural control dependencies. Unfortunately, that approach can omit important control dependencies, and incorrectly identifies control dependencies for a large class of programs. This paper presents a definition of interprocedural control dependence that supports the relationship of control and data dependence to semantic dependence, an efficient algorithm for calculating interprocedural control dependencies, and empirical results obtained by our implementation of the algorithm.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Stocks:1998:CFC, author = "Philip A. Stocks and Barbara G. Ryder and William A. Landi and Sean Zhang", title = "Comparing flow and context sensitivity on the modification-side-effects problem", journal = j-SIGSOFT, volume = "23", number = "2", pages = "21--31", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271782", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Precision and scalability are two desirable, yet often conflicting, features of data-flow analyses. This paper reports on a case study of the modification --- ide-effects problem for C in the presence of pointers from the perspective of contrasting the flow and context sensitivity of the solution procedure with respect to precision and scalability. The results show that the cost of precision of flow- and context-sensitive analysis is not always prohibitive, and that the precision of flow- and context-insensitive analysis is substantially better than worst-case estimates and can be sufficient for certain applications. Program characteristics that affect the performance of data-flow analysis are identified.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mitchell:1998:EER, author = "Brian Mitchell and Steven J. Zeil", title = "An experiment in estimating reliability growth under both representative and directed testing", journal = j-SIGSOFT, volume = "23", number = "2", pages = "32--41", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271784", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Order Statistic model of reliability growth offers improved * experimental design, and * flexibility in testing methodology compared to conventional reliability growth models. It permits prediction of operational reliability without requiring that testing be conducted according to the operation profile of the program input space. This paper presents the first experimental use of the Order Statistic model under a test plan that combines both representative and directed tests. Results suggest that this is an effective way to obtain quantified measures of test quality without abandoning the advantages of directed test methods.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ntafos:1998:RPT, author = "Simeon Ntafos", title = "On random and partition testing", journal = j-SIGSOFT, volume = "23", number = "2", pages = "42--48", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271785", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "There have been many comparisons of random and partition testing. Proportional partition testing has been suggested as the optimum way to perform partition testing. In this paper we show that this might not be so and discuss some of the problems with previous studies. We look at the expected cost of failures as a way to evaluate the effectiveness of testing strategies and use it to compare random testing, uniform partition testing and proportional partition testing. Also, we introduce partition testing strategies that try to take the cost of failures into account and present some results on their effectiveness.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hamlet:1998:MIP, author = "Richard Hamlet and Richard Kemmerer and Edward F. Miller and Debra J. Richardson", title = "The most influential papers from the {ISSTA} research community (panel)", journal = j-SIGSOFT, volume = "23", number = "2", pages = "49", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271787", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hamlet:1998:WCW, author = "Dick Hamlet", title = "What can we learn by testing a program?", journal = j-SIGSOFT, volume = "23", number = "2", pages = "50--52", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271788", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "It is conventional to start research papers on software engineering, particularly on testing and software quality, with a statement of how important software has become in the world, and the potential dangers of using it when those who construct it really don't know what they are doing. The author then goes on to show that his or her theory/method/insights/tools will make the world safe (or safer, if the author is modest) by providing the understanding that is lacking. ISSTA authors (I among them) have started many of their papers in just this way, but speaking for myself, these statements are window dressing --- they disguise my real concern. Long before software was any part of the workaday world, before there was any ``software problem'' or even much software, I was interested in program analysis because programs are arguably the most intriguing mathematical objects people create. I have happily pursued the study of programs for over 30 years.I wrote my first program (in ALGOL 58) in 1962 --- it failed to properly calculate a table of values of the error integral, being somewhat off in the third significant figure. (I remember the failure, and the debugging, poring over a decimal memory dump. But I can't recall the fault.) It took me until the mid-1960s to recognize that programs per se were much more interesting than their applications: I stumbled on Maurice Halstead's book [4] on self-compiling NELIAC compilers. Here was magical stuff: the master program defining a language, and itself written in that language! In my application to the University of Washington, I explained that I wanted to study computers ``for themselves, not as they are used.'' Paul Klee, the topologist who was saddled with the task of replying to mathematics grad students that year, wrote back to assure me that ``we've got a computer around here somewhere, and by the time you arrive I'm sure I can locate it.'' It was an IBM 7090, complete with IBSYS and FORTRAN, and who could have asked for software more in need of analysis? There were standards of respectability for a PhD dissertation even in those days, so I took up recursive function theory and the program-equivalence problem. Its application to testing is that we would like to know if the program under test differs from its functional specification --- that is, can it fail? Any understanding of programs through testing (a mechanical process) must come up against the program-equivalence problem: we cannot hope to gain full understanding, because to do so would be to solve the unsolvable problem. My dissertation was an exploration of the additional information (beyond the purely functional) needed to make the program-equivalence problem solvable [5]. What brought me to the first ISSTA in 1978 was Bill Howden's 1976 paper ``Reliability of the path analysis strategy'' [6].", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gotlieb:1998:ATD, author = "Arnaud Gotlieb and Bernard Botella and Michel Rueher", title = "Automatic test data generation using constraint solving techniques", journal = j-SIGSOFT, volume = "23", number = "2", pages = "53--62", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271790", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Automatic test data generation leads to identify input values on which a selected point in a procedure is executed. This paper introduces a new method for this problem based on constraint solving techniques. First, we statically transform a procedure into a constraint system by using well-known ``Static Single Assignment'' form and control-dependencies. Second, we solve this system to check whether at least one feasible control flow path going through the selected point exists and to generate test data that correspond to one of these paths. The key point of our approach is to take advantage of current advances in constraint techniques when solving the generated constraint system. Global constraints are used in a preliminary step to detect some of the non feasible paths. Partial consistency techniques are employed to reduce the domains of possible values of the test data. A prototype implementation has been developed on a restricted subset of the C language. Advantages of our approach are illustrated on a non-trivial example.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hajnal:1998:ATD, author = "{\'A}kos Hajnal and Istv{\'a}n Forg{\'a}cs", title = "An applicable test data generation algorithm for domain errors", journal = j-SIGSOFT, volume = "23", number = "2", pages = "63--72", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271791", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An integrated testing criterion is proposed that extends traditional criteria to be effective to reveal domain errors. The method requires many fewer test cases and is applicable for any kind of predicates. An automated test data generation algorithm is developed to satisfy the criterion. This is the first integrated algorithm that unites path selection and test data generation. The method is based on function minimization and is extended to find required test cases corresponding to ON-OFF points very quickly. In this way the algorithm is dynamic and thus can be used in practice.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracey:1998:APF, author = "Nigel Tracey and John Clark and Keith Mander", title = "Automated program flaw finding using simulated annealing", journal = j-SIGSOFT, volume = "23", number = "2", pages = "73--81", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271792", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "One of the major costs in a software project is the construction of test-data. This paper outlines a generalised test-case data generation framework based on optimisation techniques. The framework can incorporate a number of testing criteria, for both functional and non-functional properties. Application of the optimisation framework to testing specification failures and exception conditions is illustrated. The results of a number of small case studies are presented and show the efficiency and effectiveness of this dynamic optimisation-base approach to generating test-data.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ostrand:1998:VTD, author = "Thomas Ostrand and Aaron Anodide and Herbert Foster and Tarak Goradia", title = "A visual test development environment for {GUI} systems", journal = j-SIGSOFT, volume = "23", number = "2", pages = "82--92", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271793", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We have implemented an experimental test development environment (TDE) intended to raise the effectiveness of tests produced for GUI systems, and raise the productivity of the GUI system tester. The environment links a test designer, a test design library, and a test generation engine with a standard commercial capture/replay tool. These components provide a human tester the capabilities to capture sequences of interactions with the system under test (SUT), to visually manipulate and modify the sequences, and to create test designs that represent multiple individual test sequences. Test development is done using a high-level model of the SUT's GUI, and graphical representations of test designs. TDE performs certain test maintenance tasks automatically, permitting previously written test scripts to run on a revised version of the SUT.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Molloy:1998:AIT, author = "Mark Molloy and Kristy Andrews and James Herren and David Cutler and Paul {Del Vigna}", title = "Automatic interoperability test generation for source-to-source translators", journal = j-SIGSOFT, volume = "23", number = "2", pages = "93--101", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271796", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes a strategy for automatically generating tests which ensure interface compatibility between software components expressed in two different languages. This strategy is useful for testing code produced by a source-to-source computer language translator and for testing the compatibility of compilers for the different languages.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chan:1998:IES, author = "William Chan and Richard J. Anderson and Paul Beame and David Notkin", title = "Improving efficiency of symbolic model checking for state-based system requirements", journal = j-SIGSOFT, volume = "23", number = "2", pages = "102--112", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present various techniques for improving the time and space efficiency of symbolic model checking for system requirements specified as synchronous finite state machines. We used these techniques in our analysis of the system requirements specification of TCAS II, a complex aircraft collision avoidance system. They together reduce the time and space complexities by orders of magnitude, making feasible some analysis that was previously intractable. The TCAS II requirements were written in RSML, a dialect of state-charts.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bultan:1998:VSI, author = "Tevfik Bultan and Richard Gerber and Christopher League", title = "Verifying systems with integer constraints and {Boolean} predicates: a composite approach", journal = j-SIGSOFT, volume = "23", number = "2", pages = "113--123", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271799", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Symbolic mode, checking has proved highly successful for large finite-state systems, in which states can be compactly encoded using binary decision diagrams (BDDs) or their variants. The inherent limitation of this approach is that it cannot be applied to systems with an infinite number of states --- even those with a single unbounded integer. Alternatively, we recently proposed a model checker for integer-based systems that uses Presburger constraints as the underlying state representation. While this approach easily verified some subtle, infinite-state concurrency problems, it proved inefficient in its treatment of Boolean and (unordered) enumerated types --- which possess no natural mapping to the Euclidean coordinate space. In this paper we describe a model checker which combines the strengths of both approaches. We use a composite model, in which a formula's valuations are encoded in a mixed BDD-Presburger form, depending on the variables used. We demonstrate our technique's effectiveness on a nontrivial requirements specification, which includes a mixture of Booleans, integers and enumerated types.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Godefroid:1998:MCM, author = "Patrice Godefroid and Robert S. Hanmer and Lalita Jategaonkar Jagadeesan", title = "Model checking without a model: an analysis of the heart-beat monitor of a telephone switch using {VeriSoft}", journal = j-SIGSOFT, volume = "23", number = "2", pages = "124--133", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271800", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "VeriSoft is a tool for systematically exploring the state spaces of systems composed of several concurrent processes executing arbitrary code written in full-fledged programming languages such as C or C++. The state space of a concurrent system is a directed graph that represents the combined behavior of all concurrent components in the system. By exploring its state space, VeriSoft can automatically detect coordination problems between the processes of a concurrent system. We report in this paper our analysis with VeriSoft of the ``Heart-Beat Monitor'' (HBM), a telephone switching application developed at Lucent Technologies. The HBM of a telephone switch determines the status of different elements connected to the switch by measuring propagation delays of messages transmitted via these elements. This information plays an important role in the routing of data in the switch, and can significantly impact switch performance. We discuss the steps of our analysis of the HBM using VeriSoft. Because no modeling of the HBM code is necessary with this tool, the total elapsed time before being able to run the first tests was on the order of a few hours, instead of several days or weeks that would have been needed for the (error-prone) modeling phase required with traditional model checkers or theorem provers. We then present the results of our analysis. Since VeriSoft automatically generates, executes and evaluates thousands of tests per minute and has complete control over nondeterminism, our analysis revealed HBM behavior that is virtually impossible to detect or test in a traditional lab-testing environment. Specifically, we discovered flaws in the existing documentation on this application and unexpected behaviors in the software itself. These results are being used as the basis for the redesign of the HBM software in the next commercial release of the switching software.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ball:1998:LCF, author = "Thomas Ball", title = "On the limit of control flow analysis for regression test selection", journal = j-SIGSOFT, volume = "23", number = "2", pages = "134--142", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271802", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Automated analyses for regression test selection (RTS) attempt to determine if a modified program, when run on a test t, will have the same behavior as an old version of the program run on t, but without running the new program on t. RTS analyses must confront a price/performance tradeoff: a more precise analysis might be able to eliminate more tests, but could take much longer to run. We focus on the application of control flow analysis and control flow coverage, relatively inexpensive analyses, to the RTS problem, considering how the precision of RTS algorithms can be affected by the type of coverage information collected. We define a strong optimality condition (edge-optimality) for RTS algorithms based on edge coverage that precisely captures when such an algorithm will report that re-testing is needed, when, in actuality, it is not. We reformulate Rothermel and Harrold's RTS algorithm and present three new algorithms that improve on it, culminating in an edge-optimal algorithm. Finally, we consider how path coverage can be used to improve the precision of RTS algorithms.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Korel:1998:ART, author = "Bogdan Korel and Ali M. Al-Yami", title = "Automated regression test generation", journal = j-SIGSOFT, volume = "23", number = "2", pages = "143--152", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271803", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Regression testing involves testing the modified program in order to establish the confidence in the modifications. Existing regression testing methods generate test cases to satisfy selected testing criteria in the hope that this process may reveal faults in the modified program. In this paper we present a novel approach of automated regression test generation in which all generated test cases uncover an error(s). This approach is used to test the common functionality of the original program and its modified version, i.e., it is used for programs whose functionality is unchanged after modifications. The goal in this approach is to identify test cases for which the original program and the modified program produce different outputs. If such a test is found, then this test uncovers an error. The problem of finding such a test case may be reduced to the problem of finding program input on which a selected statement is executed. As a result, existing methods of automated test data generation for white-box testing may be used to generate these tests. Our experiments have shown that our approach may improve the chances of finding software errors as compared to the existing methods of regression testing. The advantage of our approach is that it is fully automated and that all generated test cases reveal an error(s).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Yang:1998:ADP, author = "Cheer-Sun D. Yang and Amie L. Souter and Lori L. Pollock", title = "All-du-path coverage for parallel programs", journal = j-SIGSOFT, volume = "23", number = "2", pages = "153--162", month = mar, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/271775.271804", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:34 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "One significant challenge in bringing the power of parallel machines to application programmers is providing them with a suite of software tools similar to the tools that sequential programmers currently utilize. In particular, automatic or semi-automatic testing tools for parallel programs are lacking. This paper describes our work in automatic generation of all-du-paths for testing parallel programs. Our goal is to demonstrate that, with some extension, sequential test data adequacy criteria are still applicable to parallel program testing. The concepts and algorithms in this paper have been incorporated as the foundation of our DELaware PArallel Software Testing Aid, della pasta.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bagert:1998:TPL, author = "Donald J. Bagert", title = "{Texas} poised to license professional engineers in software engineering", journal = j-SIGSOFT, volume = "23", number = "3", pages = "8--10", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279440", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Engel:1998:DAC, author = "Gerald L. Engel and Richard J. LeBlanc and Bruce Ho Barnes and Martin Lo Griss and Tony Wasserman and Laurie Werth", title = "Draft accreditation criteria for software engineering", journal = j-SIGSOFT, volume = "23", number = "3", pages = "11--12", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279441", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1998:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "13--19", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279443", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1998:ESEb, author = "Barbara Ann Kitchenham and Lesley M. Pickard", title = "Evaluating software eng. methods and tools part 10: designing and running a quantitative case study", journal = j-SIGSOFT, volume = "23", number = "3", pages = "20--22", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279445", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In the last article we considered how to identify the context for a case study and how to define and validate a case study hypothesis. In this article, we continue my discussion of the eight steps involved in a quantitative case study by considering the remaining six steps: selecting the host projects; identifying the method of comparison; minimising the effect of confounding factors, planning the case study, monitoring the case study, analysing the results.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1998:RPCb, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "23", number = "3", pages = "23--29", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279447", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Tracz:1998:HDP, author = "Will Tracz", title = "Highlights from the {DoD} product line practice workshop product lines: bridging the gap --- commercial success to {DoD} practice", journal = j-SIGSOFT, volume = "23", number = "3", pages = "29--31", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279448", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Addy:1998:RFA, author = "Edward A. Addy", title = "Report from the {First Annual Workshop on Software Architectures in Product Line Acquisitions}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "32--39", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279454", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Clements:1998:NSI, author = "Paul C. Clements and Nelson Weiderman", title = "Notes on the {Second International Workshop on Development and Evolution of Software Architectures for Product Families}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "39--43", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279458", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Thompson:1998:WCS, author = "Craig Thompson", title = "{Workshop on Compositional Software Architectures}: workshop report", journal = j-SIGSOFT, volume = "23", number = "3", pages = "44--63", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279460", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Parnas:1998:SSE, author = "David Lorge Parnas", title = "Successful software engineering research", journal = j-SIGSOFT, volume = "23", number = "3", pages = "64--68", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279464", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Rumination about what makes research successful is a strong indication that a researcher will not continue to do successful research. Nonetheless, the invitation to publish a short article in SEN on the occasion of being honoured by receiving SIGSOFT's ``Outstanding Research Award'' has led me to reflect on what I have done. I have been active in research on software design for more than 35 years; perhaps this is the time to pause and look back. I also want to look forward; I have some concerns about the direction being taken by many researchers in the software community and would like to offer them my (possibly unwelcome) advice.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Barnes:1998:HSE, author = "Bruce H. Barnes", title = "A history of software engineering at the {National Science Foundation} (a personal view)", journal = j-SIGSOFT, volume = "23", number = "3", pages = "68--69", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279465", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Marovac:1998:EDS, author = "Nenad Marovac", title = "Embedded documentation for semi-automatic program construction and software reuse", journal = j-SIGSOFT, volume = "23", number = "3", pages = "70--74", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279468", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The purpose of this paper is to present a mechanism to classify software components for software reuse and semi-automatic program construction. The paper goes on to describe how is the classification information incorporated into software components through Flagged Sentences in Embedded Software Documentation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Haneef:1998:SDR, author = "Nuzhat J. Haneef", title = "Software documentation and readability: a proposed process improvement", journal = j-SIGSOFT, volume = "23", number = "3", pages = "75--77", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279470", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The paper is based on the premise that the productivity and quality of software development and maintenance, particularly in large and long term projects, is related to software readability. Software readability depends on such things as coding conventions and system overview documentation. Existing mechanisms to ensure readability --- for example, peer reviews --- are not sufficient. The paper proposes that software organizations or projects institute a readability/documentation group, similar to a test or usability group. This group would be composed of programmers and would produce overview documentation and ensure code and documentation readability. The features and functions of this group are described. Its benefits and possible objections to it are discussed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Yuan:1998:DCC, author = "Xiaodong Yuan and Jiajun Chen and Guoliang Zheng", title = "Duration calculus in {COOZ}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "78", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279473", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fan:1998:RAT, author = "Xiaocong Fan and Dianxiang Xu and Jianmin Hou and Guoliang Zheng", title = "Reasoning about team tracking", journal = j-SIGSOFT, volume = "23", number = "3", pages = "79--82", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279476", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "One subject of much ongoing research is team tracking --- tracking a team's joint goals and intentions in dynamic, real-time domains. In this paper, a theory of team tracking and an architecture for team-oriented communication-based agents are presented. The problems faced in tracking ill-structured teams are also discussed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chen:1998:MTO, author = "Jiajun Chen and Xiaodong Yuan and Guolian Zhengp", title = "A multi-threaded object-oriented programming model", journal = j-SIGSOFT, volume = "23", number = "3", pages = "83--86", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279477", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/multithreading.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents a concurrent object-oriented programming (COOP) model established around concurrent objects which may have a body. Once an object with a body is created, its body begins to run as a separate execution thread of the object. Distinguished from some active-object-based concurrent object-oriented models, the object body in our model is not used for the concurrency control of objects, but only as a mechanism to introduce concurrent executions into OO model. Concurrency control is specified by the attributes of objects and the control codes are generated by a compiling system based on these attributes. In addition, objects should be designed in such a way that they can be used in both sequential and concurrent environments, no matter whether they have a body or not. In our model, several execution threads may coexist in an object and some synchronization mechanisms are provided to control the concurrent executions of these threads. The paper presents two examples of concurrent programming with our model.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Liu:1998:AOM, author = "Hong Liu and G. Zeng and Zongkai Lin", title = "An agent-oriented modeling approach", journal = j-SIGSOFT, volume = "23", number = "3", pages = "87--92", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279480", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper proposes an agent-oriented modeling method for the information processing. First of all, it presents an information processing model for real world; then the hierarchical organization of agents and the structure of an agent are given. Furthermore, the logical representation of transaction and event are described. Finally, an agent-oriented modeling process is put forward. Modeling starts from describing the agents that participate in the process; then gathers the other information centered on agents and creates the model. The approach can explicitly present the organized structure of agents and the correlation among transactions, reflect the dynamic process change by describing the state change of the system, illustrate the dynamic character of information process.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kolski:1998:CAA, author = "Christophe Kolski", title = "A ``call for answers'' around the proposition of an {HCI}-enriched model", journal = j-SIGSOFT, volume = "23", number = "3", pages = "93--96", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279483", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The engineering of Human-Computer Interface (HCI) is a wide-ranging and huge research field. However development models stemming from Software Engineering overlook important aspects in terms of interactive systems development. That is why an HCI-enriched model, called $ \nabla $ model (pronounced nabla model), is envisaged in this paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Soloman:1998:NBD, author = "Ad Soloman", title = "A new bachelor's degree program in software engineering", journal = j-SIGSOFT, volume = "23", number = "3", pages = "98--101", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279485", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We describe a new program of studies in Software Engineering (SE). The program regards SE as an engineering discipline and focuses on the training of the student as an engineer involved in all aspects of a software product.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Strens:1998:URM, author = "M. R. Strens and J. S. Chudge", title = "Using responsibility modeling to match organizational change to changes in the systems development process", journal = j-SIGSOFT, volume = "23", number = "3", pages = "102--104", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279486", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Changes to an established software system development process are made for many reasons. We describe the use of responsibility modeling as an aid to identifying the organizational changes needed if changes to the software systems development process are to be implemented successfully within the organizational context.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raccoon:1998:TTS, author = "L. B. S. Raccoon", title = "Toward a tradition of software engineering", journal = j-SIGSOFT, volume = "23", number = "3", pages = "105--110", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279487", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Ever since Boehm's Letter from the Executive Committee, in October 1994, the question, ``is software engineering really engineering?'' has been raised many times. Apparently, the National Society of Professional Engineers would like to make it illegal for anyone to call himself or herself a ``software engineer'' because software engineering is not one of their 36 recognized disciplines. In response, we have been asking questions like: ``Is software development the same as software engineering?'' ``If not, what is the difference?'' and ``What would it take for us to become software engineers?''In January 1997, I received a copy of Defining ``Engineer'' --- How to Do It, and Why It Matters by Davis. After reading it closely, I feel compelled to write the following notes about the role of tradition in engineering and about the prospect of software engineering becoming real engineering.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raccoon:1998:MCH, author = "L. S. B. Raccoon and Puppydog P. O. P.", title = "A middle-out concept of hierarchy (or the problem of feeding the animals)", journal = j-SIGSOFT, volume = "23", number = "3", pages = "111--119", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279489", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Developers use class hierarchies to model ``real world'' objects and as metaphors to organize their programs. We (the authors) believe that developers intuitively understand the variety of everyday objects: this cup, that water, those pencils, or in computer terms, this number, that window, those records. We also believe that developers approve of only one concept of class hierarchy, one out of many possible concepts. Many hidden assumptions lurk behind object-oriented inheritance. Traditional object-oriented concepts of hierarchy are obsessively top-down and ignore many obvious bottom-up relationships. Authors who write about object-oriented programming usually define class hierarchies in traditional or archaic terms, referring to the theory of Realism and ancient Greek philosophy. But, just because somebody sees a similarity between concepts in Smalltalk or C++ and concepts described by Plato and other philosophers, does not mean that the perception is appropriate. While the correspondences between classes and concepts from philosophy are interesting, they are not the only possible or useful correspondences. In Women, Fire, and Dangerous Things on page 6, Lakoff writes, ``In fact, until very recently, the classical theory of categories was not even thought of as a theory. It was taught in most disciplines not as an empirical hypothesis but as an unquestionable, definitional truth.''We want to change that assumption and expand the possibilities of what class hierarchies can be. Specifically, we introduce a cognitive science perspective of objects and the basic level of a class hierarchy. We believe that developers use software classes in a middle-out manner, just like people use linguistic categories. We believe that this middle-out interpretation explains some of the limits to modeling with traditional object-oriented inheritance. We use the basic level to distinguish between the type relationships within a class hierarchy: above the basic level, developers use runtime type relationships, and below the basic, level developers use compile-time type relationships. We also show that developers do program above the basic level. This paper is organized as follows. In the first section, we discuss class and hierarchy from a cognitive science point of view. In the second section, we define the basic level and describe a middle-out concept of hierarchy. In the third section, we explain the developer's version of basic level through the example of ``feeding the animals'' and show how it relates to type checking. We also describe some of the techniques that developers use to program above the basic level. And, in the fourth section, we argue that many traditional concepts of inheritance fail above the basic level. We argue that the subset and prototype concepts of hierarchy do not work in general, and we argue that Liskov's Substitution Principle and Meyer's Open-Closed Principle only work below the basic level.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Krasna:1998:HIQ, author = "Marjan Kra{\v{s}}na and Ivan Rozman and Bruno Stiglic", title = "How to improve the quality of software engineering project management", journal = j-SIGSOFT, volume = "23", number = "3", pages = "120--125", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.279490", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Every project, including software engineering projects, start with the project plan. A project plan means the prediction of future events with the goal of minimizing the risk during execution of the project. The heart of the problem is to make the project plan as close to reality as possible. Ideally, it should be exactly the same as the post project measured data. In the end we always encounter the problem of ``the perfect project plan''. Does a perfect project plan exist? If it does not exist, can we be any better than we are now? In the article we will show that we can improve, but the perfect project plan is still somewhere in the future.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1998:BRO, author = "Mark Doernhoefer", title = "Book Reviews: {{\booktitle{Object Models Strategies, Patterns, and Applications}}, by Peter Coad}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "125--125", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.565648", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leisner:1998:BRS, author = "Marty Leisner", title = "Book Reviews: {{\booktitle{Structuring Techniques: an Introduction Using C++}}, Andrew C. Staugaard, Jr.}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "126--126", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.565683", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Poulin:1998:BRH, author = "Jeffrey S. Poulin", title = "Book Reviews: {{\booktitle{High Performance Oracle8 Object-Oriented Design}}, David A. Anstey}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "127--128", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.565684", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Raynham:1998:BRO, author = "Peter Raynham", title = "Book Reviews: {{\booktitle{Object Oriented COBOL}}, Edmund C. Arranga and Frank P. Coyle}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "128--129", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.565685", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kostecki:1998:BRC, author = "John A. Kostecki", title = "Book Reviews: {{\booktitle{The Craft of Software Testing: Subsystem Testing Including Object-Based and Object-Oriented Testing}}, by Brian Maxick}", journal = j-SIGSOFT, volume = "23", number = "3", pages = "129--130", month = may, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/279437.565688", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:36 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mester:1998:AFP, author = "Arnulf Mester", title = "{ACM Fellow} profile: {James Jay (Jim) Horning}", journal = j-SIGSOFT, volume = "23", number = "4", pages = "7--8", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286367", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cooper:1998:AFPa, author = "Greg Cooper", title = "{ACM Fellow} profile: {Dennis J. Frailey}", journal = j-SIGSOFT, volume = "23", number = "4", pages = "9--11", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286368", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1998:ESEc, author = "Barbara Ann Kitchenham and Lesley M. Pickard", title = "Evaluating software engineering methods and tools, part 11: analysing quantitative case studies", journal = j-SIGSOFT, volume = "23", number = "4", pages = "18--20", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286370", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1998:RPCc, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "23", number = "4", pages = "21--25", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286371", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Parnas:1998:WTM, author = "David Lorge Parnas", title = "Who taught me about software engineering research?", journal = j-SIGSOFT, volume = "23", number = "4", pages = "26--28", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286372", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Li:1998:OSA, author = "Li Li and Dharma P. Agrawal", title = "Operating systems architecture future directions for heterogeneous communication systems", journal = j-SIGSOFT, volume = "23", number = "4", pages = "35--37", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286373", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Samaraweera:1998:EFO, author = "L. G. Samaraweera and R. Harrison", title = "Evaluation of the functional and object-oriented programming paradigms: a replicated experiment", journal = j-SIGSOFT, volume = "23", number = "4", pages = "38--43", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286374", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kang:1998:PFB, author = "Kyo C. Kang and Gerard J. Kim and Ji Y. Lee and Hye J. Kim", title = "Prototype = function + behavior + form", journal = j-SIGSOFT, volume = "23", number = "4", pages = "44--49", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286375", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Laws:1998:MCS, author = "John Laws", title = "Management of complexity in software development", journal = j-SIGSOFT, volume = "23", number = "4", pages = "50--52", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286376", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vesterinen:1998:UID, author = "Petri Vesterinen", title = "Using inconsistent data for software process improvement", journal = j-SIGSOFT, volume = "23", number = "4", pages = "53--55", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286377", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{pratimPal:1998:FAL, author = "Partha pratim Pal", title = "A flexible, applet-like software distribution mechanism for {Java} applications", journal = j-SIGSOFT, volume = "23", number = "4", pages = "56--60", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286378", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wang:1998:BTR, author = "Yingxu Wang and Graham King and Dilip Patel and Ian Court and Geoff Staples and Margaret Ross and Shushma Patel", title = "On built-in tests and reuse in object-oriented programming", journal = j-SIGSOFT, volume = "23", number = "4", pages = "60--64", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286379", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ellmer:1998:LPS, author = "Ernst Ellmer", title = "A learning perspective on software process technology", journal = j-SIGSOFT, volume = "23", number = "4", pages = "65--69", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286380", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wang:1998:LBE, author = "Chung-Hua Wang and Feng-Jian Wang", title = "A language-based editing process for visual object-oriented programming", journal = j-SIGSOFT, volume = "23", number = "4", pages = "70--75", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286381", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Xiaodong:1998:CCO, author = "Yuan Xiaodong and Hu Deqiang and Xu Hao and Li Yong and Zheng Guoliang", title = "{COOZ}: a complete object-oriented extension to Z", journal = j-SIGSOFT, volume = "23", number = "4", pages = "76--81", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286382", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Singh:1998:MWNa, author = "Yogesh Singh and Pradeep Bhatia", title = "Module weakness: a new measure", journal = j-SIGSOFT, volume = "23", number = "4", pages = "82", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286383", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Xiaocong:1998:RCA, author = "Fan Xiaocong and Chen Guanling and Zheng Guoliang", title = "Research on concurrent actions in multi-agent systems", journal = j-SIGSOFT, volume = "23", number = "4", pages = "83", month = jul, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/286366.286384", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:37 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bagert:1998:TBV, author = "Donald J. Bagert", title = "{Texas} board votes to license software engineers", journal = j-SIGSOFT, volume = "23", number = "5", pages = "7", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290251", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cooper:1998:AFPb, author = "Greg Cooper", title = "{ACM Fellow} profile: {Grady Booch}", journal = j-SIGSOFT, volume = "23", number = "5", pages = "8--10", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290253", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cooper:1998:AFPc, author = "Greg Cooper and Arnulf Mester", title = "{ACM Fellow} profile: {Meir M (Manny) Lehman}", journal = j-SIGSOFT, volume = "23", number = "5", pages = "11", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290254", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kitchenham:1998:ESEd, author = "Barbara Ann Kitchenham", title = "Evaluating software engineering methods and tools part 12: evaluating {DESMET}", journal = j-SIGSOFT, volume = "23", number = "5", pages = "21--24", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290255", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1998:RPCd, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "23", number = "5", pages = "25--29", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290256", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Poulin:1998:ICS, author = "Jeffrey S. Poulin and Prem Devanbu", title = "5th international conference on software reuse {(ICSR'5)} conference summary", journal = j-SIGSOFT, volume = "23", number = "5", pages = "30--35", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290258", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Muller:1998:PCS, author = "Hausi M{\"u}ller and Thomas Reps and Gregor Snelting", title = "Program comprehension and software reengineering", journal = j-SIGSOFT, volume = "23", number = "5", pages = "36--44", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290260", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Opdahl:1998:WSR, author = "Andreas L. Opdahl and Klaus Pohl", title = "Workshop summary: {REFSQ'98}", journal = j-SIGSOFT, volume = "23", number = "5", pages = "44--50", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290262", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kim:1998:TRO, author = "Hyoseob Kim", title = "Trip report to the one-day seminar on componentware development", journal = j-SIGSOFT, volume = "23", number = "5", pages = "50--51", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290263", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ram:1998:IMD, author = "D. Janaki Ram and R. A. Dwivedi and Ramakrishna Ongole", title = "An implementation mechanism for design patterns", journal = j-SIGSOFT, volume = "23", number = "5", pages = "52--56", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290264", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zheng:1998:IFS, author = "Mingchun Zheng and Jiazhong Zhang and Yanbing Wang", title = "Integrating a formal specification notation with {HOOD}", journal = j-SIGSOFT, volume = "23", number = "5", pages = "57--61", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290265", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hilera:1998:SDE, author = "Jos{\'e} R. Hilera and Le{\'o}n A. Gonz{\'a}lez and Jos{\'e} A. Guiti{\'e}rrez and J. M. Martinez", title = "Software documentation as an engineering process", journal = j-SIGSOFT, volume = "23", number = "5", pages = "61--64", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290266", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rajanna:1998:TDG, author = "V. Rajanna", title = "Test data generation", journal = j-SIGSOFT, volume = "23", number = "5", pages = "65--68", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290267", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Favaro:1998:MSD, author = "John Favaro and Shari Lawrence Pfleeger", title = "Making software development investment decisions", journal = j-SIGSOFT, volume = "23", number = "5", pages = "69--74", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290268", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wong:1998:UDS, author = "W. Eric Wong and Norman Wilde and Kristin Blackwell and Rendy Justice", title = "Understanding data-sensitive code: one piece of the year 2000 puzzle", journal = j-SIGSOFT, volume = "23", number = "5", pages = "75--80", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290269", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Singh:1998:MWNb, author = "Yogesh Singh and Pradeep Bhatia", title = "Module weakness: a new measure", journal = j-SIGSOFT, volume = "23", number = "5", pages = "81", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290270", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Huang:1998:FHO, author = "Riri Huang", title = "Formalizing hierarchical object-oriented design method", journal = j-SIGSOFT, volume = "23", number = "5", pages = "82--88", day = "1", month = sep, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/290249.290271", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:38 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Astley:1998:CCD, author = "Mark Astley and Gul A. Agha", title = "Customization and composition of distributed objects: middleware abstractions for policy management", journal = j-SIGSOFT, volume = "23", number = "6", pages = "1--9", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288206", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Current middleware solutions such as CORBA and Java's RMI emphasize compositional design by separating functional aspects of a system (e.g. objects) from the mechanisms used for interaction (e.g. remote procedure call through stubs and skeletons). While this is an effective solution for handling distributed interactions, higher-level requirements such as heterogeneity, availability, and adaptability require policies for resource management as well as interaction. We describe the Distributed Connection Language (dcl): an architecture description language based on the Actor model of distributed objects. System components and the policies which govern an architecture are specified as encapsulated groups of actors. Composition operators are used to build connections between components as well as customize their behavior. This customization is realized using a meta-architecture. We describe the syntax and semantics of dcl, and illustrate the language by way of several examples.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Seemann:1998:PBD, author = "Jochen Seemann and J{\"u}rgen Wolff von Gudenberg", title = "Pattern-based design recovery of {Java} software", journal = j-SIGSOFT, volume = "23", number = "6", pages = "10--16", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288207", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we show how to recover design information from Java source code. We take a pattern-based approach and proceed in a step by step manner deriving several layers of increasing abstraction. A compiler collects information about inheritance hierarchies and method call relations. It also looks for particular source text patterns coming from naming conventions or programming guidelines. The result of the compile phase is a graph acting as the starting graph of a graph grammar that describes our design recovery process. We define criteria for the automatic detection of associations and aggregations between classes, as well as for some of the popular design patterns such as composite or strategy.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Stevens:1998:SRP, author = "Perdita Stevens and Rob Pooley", title = "Systems reengineering patterns", journal = j-SIGSOFT, volume = "23", number = "6", pages = "17--23", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288210", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The reengineering of legacy systems --- by which we mean those that have value and yet ``significantly resist modification and evolution to meet new and constantly changing business requirements'' --- is widely recognised as one of the most significant challenges facing software engineers. The problem is widespread, affecting all kinds of organisations; serious, as failure to reengineer can hamper an organisation's attempts to remain competitive; and persistent, as there seems no reason to be confident that today's new systems are not also tomorrow's legacy systems. This paper argues1. that the main problem is not that the necessary expertise does not exist, but rather, that it is hard for software engineers to become expert;2. that the diversity of the problem domain poses problems for conventional methodological approaches;3. that an approach via systems reengineering patterns can help. We support our contention by means of some candidate patterns drawn from our own experience and published work on reengineering. We discuss the scope of the approach, how work in this area can proceed, and in particular how patterns may be identified and confirmed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Naumovich:1998:CDF, author = "Gleb Naumovich and George S. Avrunin", title = "A conservative data flow algorithm for detecting all pairs of statements that may happen in parallel", journal = j-SIGSOFT, volume = "23", number = "6", pages = "24--34", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288213", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Information about which pairs of statements in a concurrent program can execute in parallel is important for optimizing and debugging programs, for detecting anomalies, and for improving the accuracy of data flow analysis. In this paper, we describe a new data flow algorithm that finds a conservative approximation of the set of all such pairs. We have carried out an initial comparison of the precision of our algorithm and that of the most precise of the earlier approaches, Masticola and Ryder's non-concurrency analysis [8], using a sample of 159 concurrent Ada programs that includes the collection assembled by Masticola and Ryder. For these examples, our algorithm was almost always more precise than non-concurrency analysis, in the sense that the set of pairs identified by our algorithm as possibly happening in parallel is a proper subset of the set identified by non-concurrency analysis. In 132 cases, we were able to use reachability analysis to determine exactly the set of pairs of statements that may happen in parallel. For these cases, there were a total of only 10 pairs identified by our algorithm that cannot actually happen in parallel.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Cook:1998:EBD, author = "Jonathan E. Cook and Alexander L. Wolf", title = "Event-based detection of concurrency", journal = j-SIGSOFT, volume = "23", number = "6", pages = "35--45", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288214", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Understanding the behavior of a system is crucial in being able to modify, maintain, and improve the system. A particularly difficult aspect of some system behaviors is concurrency. While there are many techniques to specify intended concurrent behavior, there are few, if any, techniques to capture and model actual concurrent behavior. This paper presents a technique to discover patterns of concurrent behavior from traces of system events. The technique is based on a probabilistic analysis of the event traces. Using metrics for the number, frequency, and regularity of event occurrences, a determination is made of the likely concurrent behavior being manifested by the system. The technique is useful in a wide variety of software engineering tasks, including architecture discovery, reengineering, user interaction modeling, and software process improvement.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Atkinson:1998:EWP, author = "Darren C. Atkinson and William G. Griswold", title = "Effective whole-program analysis in the presence of pointers", journal = j-SIGSOFT, volume = "23", number = "6", pages = "46--55", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288217", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Understanding large software systems is difficult. Traditionally, automated tools are used to assist program understanding. However, the representations constructed by these tools often require prohibitive time and space. Demand-driven techniques can be used to reduce these requirements. However, the use of pointers in modern languages introduces additional problems that do not integrate well with these techniques. We present new techniques for effectively coping with pointers in large software systems written in the C programming language and use our techniques to implement a program slicing tool. First, we use a fast, flow-insensitive, points-to analysis before traditional data-flow analysis. Second, we allow the user to parameterize the points-to analysis so that the resulting program slices more closely match the actual program behavior. Such information cannot easily be obtained by the tool or might otherwise be deemed unsafe. Finally, we present data-flow equations for dealing with pointers to local variables in recursive programs. These equations allow the user to select an arbitrary amount of calling context in order to better trade performance for precision. To validate our techniques, we present empirical results using our program slicer on large programs. The results indicate that cost-effective analysis of large programs with pointers is feasible using our techniques.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jeffords:1998:AGS, author = "Ralph Jeffords and Constance Heitmeyer", title = "Automatic generation of state invariants from requirements specifications", journal = j-SIGSOFT, volume = "23", number = "6", pages = "56--69", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288218", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Automatic generation of state invariants, properties that hold in every reachable state of a state machine model, can be valuable in software development. Not only can such invariants be presented to system users for validation, in addition, they can be used as auxiliary assertions in proving other invariants. This paper describes an algorithm for the automatic generation of state invariants that, in contrast to most other such algorithms, which operate on programs, derives invariants from requirements specifications. Generating invariants from requirements specifications rather than programs has two advantages: (1) because requirements specifications, unlike programs, are at a high level of abstraction, generation of and analysis using such invariants is easier, and (2) using invariants to detect errors during the requirements phase is considerably more cost-effective than using invariants later in software development. To illustrate the algorithm, we use it to generate state invariants from requirements specifications of an automobile cruise control system and a simple control system for a nuclear plant. The invariants are derived from specifications expressed in the SCR (Software Cost Reduction) tabular notation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Allen:1998:FMA, author = "Robert J. Allen and David Garlan and James Ivers", title = "Formal modeling and analysis of the {HLA} component integration standard", journal = j-SIGSOFT, volume = "23", number = "6", pages = "70--79", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288251", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An increasingly important trend in the engineering of complex systems is the design of component integration standards. Such standards define rules of interaction and shared communication infrastructure that permit composition of systems out of independently-developed parts. A problem with these standards is that it is often difficult to understand exactly what they require and provide, and to analyze them in order to understand their deeper properties. In this paper we use our experience in modeling the High Level Architecture (HLA) for Distributed Simulation to show how one can capture the structured protocol inherent in an integration standard as a formal architectural model that can be analyzed to detect anomalies, race conditions, and deadlocks.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Stuurman:1998:LCM, author = "Sylvia Stuurman and Jan van Katwijk", title = "On-line change mechanisms: the software architectural level", journal = j-SIGSOFT, volume = "23", number = "6", pages = "80--86", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288257", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Our interest in the field of software architecture is focused on the application in technical systems, such as control systems. Our current research in this field is centered around a real-life case study, a control system for unmanned vehicles transporting containers on the ``Maasvlakte'', an area in the ports of Rotterdam. Important issues in this control system are scalability, evolvability, and on-line change capacities. In this paper, we discuss two mechanisms for on-line change in the distributed control system for the Maasvlakte system, which we have implemented in Java. The software architecture we use is a configuration of distributed processes, communicating according to the subscription model. We will focus on the software architectural aspects of the mechanisms for on-line change. One of these mechanisms is associated with the decoupling of processes as a result of the subscription-based communication model. The other mechanism is based on the late-binding properties of Java.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mahony:1998:FHS, author = "Michael S. Mahony", title = "Finding a history for software engineering", journal = j-SIGSOFT, volume = "23", number = "6", pages = "87", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288260", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Krishnamurthi:1998:TFT, author = "Shriram Krishnamurthi and Matthias Felleisen", title = "Toward a formal theory of extensible software", journal = j-SIGSOFT, volume = "23", number = "6", pages = "88--98", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288269", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "As software projects continue to grow in scale and scope, it becomes important to reuse software. An important kind of reuse is extensibility, i.e., the extension of software without accessing existing code to edit or copy it. In this paper, we propose a rigorous, semantics-based definition of software extensibility. Then we illustrate the utility of our definitions by applying them to several programs. The examination shows how programming style affects extensibility and also drives the creation of a variant of an existing design pattern. We consider programs in both object-oriented and functional languages to prove the robustness of our definitions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Snelting:1998:RCH, author = "Gregor Snelting and Frank Tip", title = "Reengineering class hierarchies using concept analysis", journal = j-SIGSOFT, volume = "23", number = "6", pages = "99--110", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288273", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The design of a class hierarchy may be imperfect. For example, a class C may contain a member m not accessed in any C -instance, an indication that m could be eliminated, or moved into a derived class. Furthermore, different subsets of C 's members may be accessed from different C -instances, indicating that it might be appropriate to split C into multiple classes. We present a framework for detecting and remediating such design problems, which is based on concept analysis. Our method analyzes a class hierarchy along with a set of applications that use it, and constructs a lattice that provides valuable insights into the usage of the class hierarchy in a specific context. We show how a restructured class hierarchy can be generated from the lattice, and how the lattice can serve as a formal basis for interactive tools for redesigning and restructuring class hierarchies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Masuda:1998:ADP, author = "Gou Masuda and Norihiro Sakamoto and Kazuo Ushijima", title = "Applying design patterns to decision tree learning system", journal = j-SIGSOFT, volume = "23", number = "6", pages = "111--120", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288279", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we describe an application of design patterns to the development of a decision tree learning system. A decision tree learning system constructs a classifier as a form of tree from a given data set. It is required to be as flexible as possible when used in real application domains. Design patterns help us construct reusable software components and construct flexible and extensible systems. The approach employed in this study is as follows. First we examine several decision tree learning systems and identify hot-spots in the systems at points we anticipate future demand for modification and extension of the system. Second we determine which design pattern to apply to each hot-spot. We evaluate the extensibility of the system experimentally. Our experience shows that using design patterns in object-oriented software design allows the easy construction of flexible systems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jackson:1998:IDL, author = "Daniel Jackson", title = "An intermediate design language and its analysis", journal = j-SIGSOFT, volume = "23", number = "6", pages = "121--130", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288282", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A simple relational language is presented that has two desirable properties. First, it is sufficiently expressive to encode, fairly naturally, a variety of software design problems. Second, it is amenable to fully automatic analysis. This paper explains the language and its semantics, and describes a new analysis scheme (based on a stochastic boolean solver) that dramatically outperforms existing schemes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Karasick:1998:AMO, author = "Michael Karasick", title = "The architecture of {Montana}: an open and extensible programming environment with an incremental {C++} compiler", journal = j-SIGSOFT, volume = "23", number = "6", pages = "131--142", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288284", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Montana is an open, extensible integrated programming environment for C++ that supports incremental compilation and linking, a persistent code cache called a CodeStore, and a set of programming interfaces to the CodeStore for tool writers. CodeStore serves as a central source of information for compiling, browsing, and debugging. CodeStore contains information about both the static and dynamic structure of the compiled program. This information spans files, macros, declarations, function bodies, templates and their instantiations, program fragment dependencies, linker relocation information, and debugging information. Montana allows the compilation process to be extended and modified [11]. Montana has been used as the basis of a number of tools [1,7], and is also used as the infrastructure of a production compiler, IBM's Visual Age C++ 4.0 [8].", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Disney:1998:IDQ, author = "Anne M. Disney and Philip M. Johnson", title = "Investigating data quality problems in the {PSP}", journal = j-SIGSOFT, volume = "23", number = "6", pages = "143--152", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288292", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Personal Software Process (PSP) is used by software engineers to gather and analyze data about their work. Published studies typically use data collected using the PSP to draw quantitative conclusions about its impact upon programmer behavior and product quality. However, our experience using PSP in both industrial and academic settings revealed problems both in collection of data and its later analysis. We hypothesized that these two kinds of data quality problems could make a significant impact upon the value of PSP measures. To test this hypothesis, we built a tool to automate the PSP and then examined 89 projects completed by ten subjects using the PSP manually in an educational setting. We discovered 1539 primary errors and categorized them by type, subtype, severity, and age. To examine the collection problem we looked at the 90 errors that represented impossible combinations of data and at other less concrete anomalies in Time Recording Logs and Defect Recording Logs. To examine the analysis problem we developed a rule set, corrected the errors as far as possible, and compared the original and corrected data. This resulted in significant differences for measures such as yield and the cost-performance ratio, confirming our hypothesis. Our results raise questions about the accuracy of manually collected and analyzed PSP data, indicate that integrated tool support may be required for high quality PSP data analysis, and suggest that external measures should be used when attempting to evaluate the impact of the PSP upon programmer behavior and product quality.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Frankl:1998:FES, author = "Phyllis G. Frankl and Oleg Iakounenko", title = "Further empirical studies of test effectiveness", journal = j-SIGSOFT, volume = "23", number = "6", pages = "153--162", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288298", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper reports on an empirical evaluation of the fault-detecting ability of two white-box software testing techniques: decision coverage (branch testing) and the all-uses data flow testing criterion. Each subject program was tested using a very large number of randomly generated test sets. For each test set, the extent to which it satisfied the given testing criterion was measured and it was determined whether or not the test set detected a program fault. These data were used to explore the relationship between the coverage achieved by test sets and the likelihood that they will detect a fault. Previous experiments of this nature have used relatively small subject programs and/or have used programs with seeded faults. In contrast, the subjects used here were eight versions of an antenna configuration program written for the European Space Agency, each consisting of over 10,000 lines of C code. For each of the subject programs studied, the likelihood of detecting a fault increased sharply as very high coverage levels were reached. Thus, this data supports the belief that these testing techniques can be more effective than random testing. However, the magnitudes of the increases were rather inconsistent and it was difficult to achieve high coverage levels.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kontio:1998:EIR, author = "Jyrki Kontio and Gerhard Getto and Dieter Landes", title = "Experiences in improving risk management processes using the concepts of the Riskit method", journal = j-SIGSOFT, volume = "23", number = "6", pages = "163--174", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288301", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper describes experiences from two organizations that have used the Riskit method for risk management in their software projects. This paper presents the Riskit method, the organizations involved, case study designs, and findings from case studies. We focus on the experiences and insights gained through the application of the method in industrial context and propose some general conclusions based on the case studies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Alur:1998:MCH, author = "Rajeev Alur and Mihalis Yannakakis", title = "Model checking of hierarchical state machines", journal = j-SIGSOFT, volume = "23", number = "6", pages = "175--188", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288305", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Model checking is emerging as a practical tool for detecting logical errors in early stages of system design. We investigate the model checking of hierarchical (nested) systems, i.e. finite state machines whose states themselves can be other machines. This nesting ability is common in various software design methodologies and is available in several commercial modeling tools. The straightforward way to analyze a hierarchical machine is to flatten it (thus, incurring an exponential blow up) and apply a model checking tool on the resulting ordinary FSM. We show that this flattening can be avoided. We develop algorithms for verifying linear time requirements whose complexity is polynomial in the size of the hierarchical machine. We address also the verification of branching time requirements and provide efficient algorithms and matching lower bounds.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dwyer:1998:FBM, author = "Matthew B. Dwyer and Corina S. Pasareanu", title = "Filter-based model checking of partial systems", journal = j-SIGSOFT, volume = "23", number = "6", pages = "189--202", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288307", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Recent years have seen dramatic growth in the application of model checking techniques to the validation and verification of correctness properties of hardware, and more recently software, systems. Most of this work has been aimed at reasoning about properties of complete systems. This paper describes an automatable approach for building finite-state models of partially defined software systems that are amenable to model checking using existing tools. It enables the application of existing model checking tools to system components taking into account assumptions about the behavior of the environment in which the components will execute. We illustrate the application of the approach by validating and verifying properties of a reusable parameterized programming framework.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Griss:1998:SEP, author = "Martin Griss", title = "Software engineering as a profession: industry and academia working together", journal = j-SIGSOFT, volume = "23", number = "6", pages = "203--204", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288311", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gotterbarn:1998:SEP, author = "Don Gotterbarn", title = "Software engineering as a profession", journal = j-SIGSOFT, volume = "23", number = "6", pages = "205--206", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.295145", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Shaw:1998:PSE, author = "Mary Shaw", title = "A profession of software engineering: is there a need? {YES}: are we ready? {NO}", journal = j-SIGSOFT, volume = "23", number = "6", pages = "207--208", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.295149", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Garlan:1998:RAI, author = "D. Garlan and S. Jha and D. Notkin and J. Dingel", title = "Reasoning about implicit invocation", journal = j-SIGSOFT, volume = "23", number = "6", pages = "209--221", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288312", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Implicit invocation [SN92, GN91] has become an important architectural style for large-scale system design and evolution. This paper addresses the lack of specification and verification formalisms for such systems. Based on standard notions from process algebra and trace semantics, we define a formal computational model for implicit invocation. A verification methodology is presented that supports linear time temporal logic and compositional reasoning. First, the entire system is partitioned into groups of components (methods) that behave independently. Then, local properties are proved for each of the groups. A precise description of the cause and the effect of an event supports this step. Using local correctness, independence of groups, and properties of the delivery of events, we infer the desired property of the overall system. Two detailed examples illustrate the use of our framework.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fong:1998:PLA, author = "Philip W. L. Fong and Robert D. Cameron", title = "Proof linking: an architecture for modular verification of dynamically-linked mobile code", journal = j-SIGSOFT, volume = "23", number = "6", pages = "222--230", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288317", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", abstract = "Security flaws are routinely discovered in commercial implementations of mobile code systems such as the Java Virtual Machine (JVM). Typical architectures for such systems exhibit complex interdependencies between the loader, the verifier, and the linker, making them difficult to craft, validate, and maintain. This reveals a software engineering challenge that is common to all mobile code systems in which a static verification phase is introduced before dynamic linking. In such systems, one has to articulate how loading, verification, and linking interact with each other, and how the three processes should be organized to address various security issues. We propose a standard architecture for crafting mobile code verifiers, based on the concept of proof linking. This architecture modularizes the verification process and isolates the dependencies among the loader, verifier, and linker. We also formalize the process of proof linking and establish properties to which correct implementations must conform. As an example, we instantiate our architecture for the problem of Java bytecode verification and assess the correctness of this instantiation. Finally, we briefly discuss alternative mobile code verification architectures enabled by our modularization.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gupta:1998:ATD, author = "Neelam Gupta and Aditya P. Mathur and Mary Lou Soffa", title = "Automated test data generation using an iterative relaxation method", journal = j-SIGSOFT, volume = "23", number = "6", pages = "231--244", month = nov, year = "1998", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/291252.288321", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:40 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "An important problem that arises in path oriented testing is the generation of test data that causes a program to follow a given path. In this paper, we present a novel program execution based approach using an iterative relaxation method to address the above problem. In this method, test data generation is initiated with an arbitrarily chosen input from a given domain. This input is then iteratively refined to obtain an input on which all the branch predicates on the given path evaluate to the desired outcome. In each iteration the program statements relevant to the evaluation of each branch predicate on the path are executed, and a set of linear constraints is derived. The constraints are then solved to obtain the increments for the input. These increments are added to the current input to obtain the input for the next iteration. The relaxation technique used in deriving the constraints provides feedback on the amount by which each input variable should be adjusted for the branches on the path to evaluate to the desired outcome. When the branch conditions on a path are linear functions of input variables, our technique either finds a solution for such paths in one iteration or it guarantees that the path is infeasible. In contrast, existing execution based approaches may require an unacceptably large number of iterations for relatively long paths because they consider only one input variable and one branch predicate at a time and use backtracking. When the branch conditions on a path are nonlinear functions of input variables, though it may take more then one iteration to derive a desired input, the set of constraints to be solved in each iteration is linear and is solved using Gaussian elimination. This makes our technique practical and suitable for automation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gotterbarn:1999:PST, author = "Donald Gotterbarn", title = "A positive step toward a profession: the software engineering code of ethics and professional practice", journal = j-SIGSOFT, volume = "24", number = "1", pages = "9--14", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308770", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Finkbine:1999:AFP, author = "Ronald B. Finkbine", title = "{ACM Fellow} profile: {L. Peter Deutsch}", journal = j-SIGSOFT, volume = "24", number = "1", pages = "21", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308771", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1999:RPCa, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "24", number = "1", pages = "31--35", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308773", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Boehm:1999:EST, author = "Barry Boehm", title = "Escaping the software tar pit: model clashes and how to avoid them", journal = j-SIGSOFT, volume = "24", number = "1", pages = "36--48", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308775", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "``No scene from prehistory is quite so vivid as that of the mortal struggles of great beasts in the tar pits \ldots{} Large system programming has over the past decade been such a tar pit, and many great and powerful beasts have thrashed violently in it \ldots{} '' Everyone seems to have been surprised by the stickiness of the problem, and it is hard to discern the nature of it. But we must try to understand it if we are to solve it.'' Fred Brooks, 1975. Several recent books and reports have confirmed that the software tar pit is at least as hazardous today as it was in 1975. Our research into several classes of models used to guide software development (product models, process models, property models, success models), has convinced us that the concept of model clashes among these classes of models helps explain much of the stickiness of the software tar-pit problem. We have been developing and experimentally evolving an approach called MBASE --- Model-Based (System) Architecting and Software Engineering --- which helps identify and avoid software model clashes. Section 2 of this paper introduces the concept of model clashes, and provides examples of common clashes for each combination of product, process, property, and success model. Sections 3 and 4 introduce the MBASE approach for endowing a software project with a mutually supportive set of models, and illustrate the application of MBASE to an example corporate resource scheduling system. Section 5 summarizes the results of applying the MBASE approach to a family of small digital library projects. Section 6 presents conclusions to date.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Keller:1999:IWL, author = "Rudolf K. Keller and Bruno Lagu{\"e} and Reinhard Schauer", title = "{International Workshop on Large-Scale Software Composition}", journal = j-SIGSOFT, volume = "24", number = "1", pages = "49--54", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308777", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This report summarizes the International Workshop on Large-Scale Software Composition held at the University of Vienna, Austria, on August 28, 1998 in conjunction with the Database and Expert Systems Applications (DEXA'98) conference. An overall forty people attended the workshop consisting of seven presentations and plenary discussions. In the following, we outline the presentations and subsequent discussions in the four workshop sessions, which included Setting the Stage, Component Modeling, Migration towards Components, and Component-based Modelling of Distributed Systems. The workshop report can be found at http://www.iro.umontreal.ca/labs/gelo/iw-lssc98.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Casey:1999:OMS, author = "Richard M. Casey", title = "Object mappings in a software engineering project", journal = j-SIGSOFT, volume = "24", number = "1", pages = "55--59", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308780", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In a software engineering project, business objects were mapped directly to software and database objects. There was a natural correlation between objects in real world systems and their representation as software objects and database objects. This mapping may serve as an effective model for similar projects.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Li:1999:DSS, author = "Baojian Li and Guangzhou Zeng and Zongkai Lin", title = "A domain specific software architecture style for {CSCD} system", journal = j-SIGSOFT, volume = "24", number = "1", pages = "59--64", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308783", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper proposes a domain-specific software architecture style. In the architecture style we define three software component types: procedure components, object components and agent components. We design a software bus or connector called Tribus to facilitate interactions among these components and specify one way quotation relations between different component types and two-way quotation relations between components of the same type. We also give an application example of the software architecture style in the domain of Computer Supported Collaborative Design (CSCD).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Xiaoguang:1999:OOD, author = "Zhu Xiaoguang and Wang Dongmu and Hong Bingrong", title = "An object-oriented data framework for virtual environments with hierarchical modeling", journal = j-SIGSOFT, volume = "24", number = "1", pages = "65--68", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308787", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Virtual reality technology, which is cyberspace composed of multimedia, is a field of comprehensive technology. It is of three basic feathers, namely, interaction, immersion and imagination so that we have to cope with the need for extremely large data sets, massive amounts of computation, and high-throughput networking. This paper presents an approach for object-oriented data modeling framework of complicated virtual environments. The paper discusses the hierarchical decomposition of objects in virtual environments and reuse of these object data libraries to constitute model of virtual environments. This modeling approach used in the paper makes sure that modeling data can be inherited, modularized, maintained easily so as to control redundant data and reduce the software development time, at the same time, realizes dynamic behaviors of objects to meet the needs of some changes of virtual environments.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wahl:1999:ORT, author = "Nancy J. Wahl", title = "An overview of regression testing", journal = j-SIGSOFT, volume = "24", number = "1", pages = "69--73", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308790", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Regression testing is an important part of the software development life cycle. Many articles have been published lately detailing the different approaches. This article is an overview of regression testing in the following areas: types of regression testing; unit, integration and system level testing, regression testing of global variables, regression testing of object-oriented software, comparisons of selective regression techniques, and cost comparisons of the types of regression testing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fuggetta:1999:SRS, author = "Alfonso Fuggetta", title = "Some reflections on software engineering research", journal = j-SIGSOFT, volume = "24", number = "1", pages = "74--77", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308791", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The May and July issues of ACM Software Engineering Notes include three stimulating and thought-provoking papers, two by David Lorge Parnas and one by David Notkin. The papers discuss the nature of software engineering research and identify problems and issues that the community is facing. After reading them, I felt compelled to assess the research I have been doing during the past years. These notes are just an attempt to organize and structure in a written form the impressions and concerns that I have derived from this reflection. I hope they can be useful to continue and deepen the discussion on the subject. To anticipate some possible negative reactions to these notes, I admit up front that my comments might appear biased, harsh, and perhaps too pessimistic. Please consider them first and foremost as a sincere critique of myself. I do believe that the only way to solve problems is to address them without any fear or ambiguity. Ignoring or avoiding problems would just mean that we do not have the ability or the courage to solve them.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Drori:1999:ITR, author = "Offer Drori", title = "Integration of text retrieval technology into formatted (conventional) information systems", journal = j-SIGSOFT, volume = "24", number = "1", pages = "78--80", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308793", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Conventional information systems are characterized by data management, which is formatted according to the characterization, prepared by a systems analyst, in conjunction with the user of the new system. The operating principles of these systems enable efficient data management and the resolution of a broad range of problems. At times, systems of this nature do not meet the complex needs of an organization, such as the management of data that is difficult to characterize precisely, or the management of occasional activities that do not justify a separate system, etc. Text retrieval technology provides management of ``open'' data, as well as a wide range of other data management forms. This paper presents the advantages of integrating text retrieval technology into formatted information systems in order to solve the above problems.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kokol:1999:MFS, author = "Peter Kokol", title = "Measuring formal specification with $ \alpha $-metric", journal = j-SIGSOFT, volume = "24", number = "1", pages = "80--81", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308796", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper explains the use of $ \alpha $-metrics in analysing and comparison of various formal specification languages.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brykczynski:1999:SSI, author = "Bill Brykczynski", title = "A survey of software inspection checklists", journal = j-SIGSOFT, volume = "24", number = "1", pages = "82", month = jan, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/308769.308798", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:41 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software inspection processes call for a checklist to provide reviewers with hints and recommendations for finding defects during the examination of a workproduct. Many checklists have been published since Michael Fagan created the inspection process in the mid-1970's. This paper surveys 117 checklists from 24 sources. Different categories of checklist items are discussed and examples are provided of good checklist items as well as those that should be avoided.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Weske:1999:RMW, author = "Mathias Weske and Thomas Goesmann and Roland Holten and R{\"u}diger Striemer", title = "A reference model for workflow application development processes", journal = j-SIGSOFT, volume = "24", number = "2", pages = "1--10", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295667", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The success of workflow projects to a large extent depends on how workflow application development processes are planned, organized, and conducted. Based on lessons learned from problems encountered during real-world workflow application development projects, this paper presents a reference model for workflow application development processes, which guides project managers and developers through the complex structure of these processes, with the aim of developing more adequate, usable, and reliable workflow applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Grinter:1999:SAP, author = "Rebecca E. Grinter", title = "Systems architecture: product designing and social engineering", journal = j-SIGSOFT, volume = "24", number = "2", pages = "11--18", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295668", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The production of large and complex systems usually requires the coordination and collaboration of many individuals spread among numerous divisions of a corporation. However, much research examining coordination has focused on the subtleties of interactions between individuals who may work together in the same department. In this paper, I present a study of systems architects and the work that they do to coordinate design across organizational and institutional boundaries. I also describe the processes and tools that the architects use to support their work. The implications of the social processes involved in coordinating the design of large complex systems on the product and those involved in its production are discussed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Baresi:1999:WWD, author = "L. Baresi and F. Casati and S. Castano and M. G. Fugini and I. Mirbel and B. Pernici", title = "{WIDE} workflow development methodology", journal = j-SIGSOFT, volume = "24", number = "2", pages = "19--28", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295669", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The development of workflows (WFs) for complex organizations to be interfaced with existing information systems requires a specific methodological approach to guarantee benefits and effectiveness of the final results. In fact, the WF should be well integrated in the organization both from the technical and the organizational point of view. While the characteristics of the Workflow Management System (WFMS) platform adopted in the implementation are relevant to establish the boundary between the workflow system and other related applications, it is also important that the analysis and design phases are developed independently of those characteristics. The WF development methodology proposed in this paper starts with an analysis phase based on UML, adopted for business process descriptions and business goals. The design phase proposes a pattern-based approach to workflow schemas design, based on the WIDE WF model. This model allows a flexible representation of the exceptions which may occur during WF execution. It also considers the interaction of the WF with external applications and information systems. Finally, the paper briefly discusses the mapping to commercial and prototype WFMSs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ludwig:1999:VEC, author = "Heiko Ludwig and Keith Whittingham", title = "Virtual enterprise co-ordinator --- agreement-driven gateways for cross-organisational workflow management", journal = j-SIGSOFT, volume = "24", number = "2", pages = "29--38", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295670", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Today's Workflow Management Systems (WfMS) do not distinguish between an external view of a process that is visible outside the organisation and its internal details. Their interfaces are generally aimed at the internal user. This is a problem if one organisation (provider) wants to perform a process on behalf of another (requester) so that it can be initiated and accessed by the requester through an automated interface and, vice versa, that the results can be reported back. This issue gains importance as WfMS are in widespread use today and the trend to outsource non-core business leads to increased service activity between companies. Organisations do not want to make internal information generally available to business partners nor do they wish to restrict their ability to conduct business internally. If organisations enter a business relationship, they define in an agreement the circumstances in which the requester might initiate a process in the provider and exchange further information during the process's performance. This paper describes the Virtual Enterprise Co-ordinator (VEC), a concept for the setup and management of gateways to WfMS-enacted processes for outside organisations on the basis of simple agreements. Using VEC, organisations can provide external partners with a controlled way of accessing WfMS-enacted processes, while retaining the freedom to change the internal details of those processes.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Simone:1999:IMA, author = "Carla Simone and Gloria Mark and Dario Giubbilei", title = "Interoperability as a means of articulation work", journal = j-SIGSOFT, volume = "24", number = "2", pages = "39--48", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295671", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The interoperability of systems to support cooperative work requires moving beyond purely technical issues; it also concerns the means and practices that users adopt to articulate their cooperative activities. Articulation has to be supported by a technology which focuses on this higher level of interoperability. This claim is motivated by observing the articulation process of users in real cooperative work practice. Based on this study, the functionality for this technology was designed to help users reconcile different handling and perspectives on shared objects in their cooperative work. The paper presents the architecture of an application infrastructure centered on the identified interoperability issues and focuses on the design of a specialized module, called reconciler, which provides the above functionality. The current state of its implementation together with identifying open research problems conclude the paper.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hilerio:1999:HEI, author = "Israel Hilerio and Weidong Chen", title = "{Herbal-T}, enabling integration, interoperability, and reusability of {Internet} components", journal = j-SIGSOFT, volume = "24", number = "2", pages = "49--58", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295672", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Herbal-T introduces an architecture where Internet component integration, interoperability, and component instantiation are the base for information flow coordination. This architecture introduces a framework for combining object functionality across the Internet to create new Internet applications. These new applications are defined in terms of active relationships. The concept of active relations as found in active databases is extended to define a new paradigm for creating Internet applications. In addition, Internet component interoperability is achieved using Applets, Java Applications, CORBA and RMI. This paper presents how the Herbal-T architecture support extends active relations to create an integration, interoperability, and reusability framework.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Borgida:1999:TEW, author = "Alex Borgida and Takahiro Murata", title = "Tolerating exceptions in workflows: a unified framework for data and processes", journal = j-SIGSOFT, volume = "24", number = "2", pages = "59--68", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295673", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Practical workflow systems need to be able to tolerate deviations from the initial process model because of un-anticipated situations. They should also be able to accommodate deviations in the format of the forms and data being manipulated. We offer a framework for treating both kinds of deviations uniformly, by applying ideas from programming languages (with workflow agents as potential on-line exception handlers) to workflows that have been reified as objects in classes with special attributes. As a result, only a small number of new constructs, which can be applied orthogonally, need to be introduced. Special run-time checks are used to deal with the consequences of permitting deviations from the norm to persist as violations of constraints.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hull:1999:DWS, author = "Richard Hull and Fran{\c{c}}ois Llirbat and Eric Siman and Jianwen Su and Guozhu Dong and Bharat Kumar and Gang Zhou", title = "Declarative workflows that support easy modification and dynamic browsing", journal = j-SIGSOFT, volume = "24", number = "2", pages = "69--78", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295674", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A new programming paradigm named ``Vortex'' is introduced for specifying a wide range of decision-making activities including, in particular, workflows. In Vortex workflows are specified declaratively. A particular emphasis is on ``object-focused'' workflows, i.e., workflows focused on how individual input objects should be processed within an organization. Such workflows arise commonly in practice, including insurance claims processing, and many electronic commerce applications, and in the area of Customer Care, e.g., web-based storefronts. Vortex workflows are ``attribute-centric'', because they are centered around how the attribute values for an input object are gathered and computed. Initially, only a few attributes of an input object have assigned values. During processing of the object, additional attribute values may be assigned by external modules, or by internal modules, including ``decision modules''. Decision modules include ``attribute rules'' that specify contributions to specific attribute values; these are combined with one of a broad family of available semantics. In Vortex, enabling conditions are used to determine what attributes should be evaluated. A novel choice-based execution model provides a general framework for optimization strategies. The use of enabling conditions, attribute rules and declarative semantics makes Vortex workflows easier to modify and refine than traditional, procedurally specified workflows. Vortex supports modularity and permits the natural intermixing of Vortex workflows with traditional, procedural workflows. The paper introduces a novel spreadsheet-like interface for dynamic browsing of Vortex executions.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Heinl:1999:CAF, author = "Petra Heinl and Stefan Horn and Stefan Jablonski and Jens Neeb and Katrin Stein and Michael Teschke", title = "A comprehensive approach to flexibility in workflow management systems", journal = j-SIGSOFT, volume = "24", number = "2", pages = "79--88", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295675", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Flexibility has recently grown to be one of the major research topics in the area of workflow management. In this paper we focus on flexibility of workflow management applications, in contrast to flexibility of the implementation of workflow management systems. In a case study we show the necessity of flexibility in workflow management applications. This flexibility can roughly be classified into flexibility, which is provided by the workflow type, and flexibility, which goes beyond the scope of the workflow type and has additionally to be provided by a workflow management system. We call this flexibility by selection and flexibility by adaption, respectively. We point out that the modeling process as a main aspect of flexibility by adaption has to be treated as a CSCW scenario. The classification leads to a structured overall concept for flexibility in workflow management applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Li:1999:GCN, author = "Du Li and Zhenghao Wang and Richard R. Muntz", title = "``{Got COCA}?'' A new perspective in building electronic meeting systems", journal = j-SIGSOFT, volume = "24", number = "2", pages = "89--98", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295676", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In a previous paper[11], we presented COCA (Collaborative Objects Coordination Architecture) as a generic framework for developing collaborative systems. COCA advocates separation of coordination policies from general-purpose computations in collaborative systems so that the former can be modeled in a high-level specification language. Reuse of both coordination policies and collaboration tools can be achieved. This paper overviews the COCA model and focuses on the application of COCA in building real-life systems. We prototyped a modest set of tools for electronic meeting systems (EMSs) to show how they can be used to support both unstructured and structured meetings, with only changes in the coordination policies and no changes to the tools themselves. A subset of Robert's Rules of Order[21] was formalized and specified as an example of control of formal structured meetings. Finally the current status and the future directions are summarized.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Churchill:1999:VEW, author = "Elizabeth F. Churchill and Sara Bly", title = "Virtual environments at work: ongoing use of {MUDs} in the workplace", journal = j-SIGSOFT, volume = "24", number = "2", pages = "99--108", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295677", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In recent years much attention has been paid to network-based, distributed environments like text-based MUDs and MOOs for supporting collaborative work. Such environments offer a shared virtual world in which interactions can take place irrespective of the actual physical proximity or distance of interactants. Although these environments have proven successful within social, recreational and educational domains, few data have been reported concerning use of such systems in the workplace. In this paper we summarize in-depth interviews with 8 MUDders from a software research and development community where a MUD has been operational and actively used for a number of years. The interviews suggest that the MUD fills a valuable communication niche for this workgroup, being used both synchronously and asynchronously to enable the establishment of new contacts and the maintenance of existing contacts. These observations are discussed in the context of the organization under study.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Takao:1999:ENB, author = "Shinji Takao", title = "The effects of narrow-band width multipoint videoconferencing on group decision making and turn distribution", journal = j-SIGSOFT, volume = "24", number = "2", pages = "109--116", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295678", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This study reports an experiment that examines the effects that face-to-face meetings (FF) and two modes of videoconferencing, switching video (SV), which shows only the current speaker, and mixing video (MV), which shows each group member simultaneously, have on turn distribution and the quality of small group decision making. The subjects were 200 undergraduate students and the task was the NASA Moon Survival Problem. Multiple comparison tests indicated that MV yielded significantly higher group decision quality than FF. The other pairs, FF-SV and SV-MV, showed no significant differences. With regard to turn taking, there was almost no difference between SV-MV.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Herbsleb:1999:MRC, author = "James D. Herbsleb", title = "Metaphorical representation in collaborative software engineering", journal = j-SIGSOFT, volume = "24", number = "2", pages = "117--126", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295679", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Finding a useful abstract representation is fundamental to solving many difficult problems in software engineering. In order to better understand how representations are actually used in key collaborative software engineering tasks, this empirical study examined all of the spoken representations of software behavior in 9 domain analysis sessions. It found that about 70\% of them were metaphorical, representing system behavior as physical movement of objects, as perceptual processes, or in anthropomorphic terms ascribing beliefs and desires to the system. The pattern of use of these representations indicates (1) that they were not merely temporary placeholders, but rather their use persisted even when a specialized and more formal vocabulary had been developed, and (2) the metaphoric descriptions appear to reflect actual use of metaphor, rather than just a choice of vocabulary. The use of metaphor is explained in terms of how well they serve human cognitive abilities and collaborative needs. The predominance of metaphorical representations in synchronous collaborative sessions raises important issues about the possible misleading effects of metaphorical thinking. It also raises questions about the compatibility of the spoken representations with other representations (e.g., diagrams, specification languages) that trigger, and capture the results of, the verbal collaborative work.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bose:1999:WWA, author = "Prasanta Bose and Xiaoqing Zhou", title = "{WWAC}: {WinWin} abstraction based decision coordination", journal = j-SIGSOFT, volume = "24", number = "2", pages = "127--136", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295680", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Distributed engineering of complex software artifacts require collaboration of multiple independent stakeholders over extended periods of time. The independent decision changes, task executions, resource usages and other activities of the stakeholders may interact causing problems where mutual dependencies exist due to global activity ordering, resource sharing, product integrity, and other global constraints. Stakeholder coordination is required to ensure satisfaction of the global constraints. The paper presents an approach (WWAC) to the problem of stakeholder coordination for distributed design decision making that exploits an active meta-model arising out of stakeholder collaboration and captures abstractions of design decisions and their dependencies.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jensen:1999:CAA, author = "David Jensen and Yulin Dong and Barbara Staudt Legner and Eric K. McCall and Leon J. Osterweil and Stanley M. {Sutton, Jr.} and Alexander Wise", title = "Coordinating agent activities in knowledge discovery processes", journal = j-SIGSOFT, volume = "24", number = "2", pages = "137--146", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295681", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Knowledge discovery in databases (KDD) is an increasingly widespread activity. KDD processes may entail the use of a large number of data manipulation and analysis techniques, and new techniques are being developed on an ongoing basis. A challenge for the effective use of KDD is coordinating the use of these techniques, which may be highly specialized, conditional and contingent. Additionally, the understanding and validity of KDD results can depend critically on the processes by which they were derived. We propose to use process programming to address the coordination of agents in the use of KDD techniques. We illustrate this approach using the process language Little-JIL to program a representative bivariate regression process. With Little-JIL programs we can clearly capture the coordination of KDD activities, including control flow, pre- and post-requisites, exception handling, and resource usage.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Girgensohn:1999:SWR, author = "Andreas Girgensohn", title = "Supporting the writing of reports in a hierarchical organization", journal = j-SIGSOFT, volume = "24", number = "2", pages = "147--156", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295682", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In many hierarchical companies, reports from several independent groups must be merged to form a single, company-wide report. This paper describes a process and system for creating and structuring such reports and for propagating contributions up the organization. The system has been in regular use, in-house, by about 30 users for over a year to create monthly status reports. Our experiences indicate that it is possible to change a monthly reporting practice so that the system is easy to use, improves the quality of the written report, fosters collaboration across projects and creates a corporate memory for the company. These results were achieved as a consequence of our design effort to directly support the hierarchical and collaborative process of creating and assembling the report within the organization. User feedback has led to many improvements in the usability and functionality of the system. Further enhancements using information retrieval and text summarization techniques are in progress.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vishik:1999:KSQ, author = "Claire Vishik and Andrew B. Whinston", title = "Knowledge sharing, quality, and intermediation", journal = j-SIGSOFT, volume = "24", number = "2", pages = "157--166", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295683", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Informal publishing flourished in the World Wide Web environment, where every user with a sufficient level of access can become a publisher. Although it appears that in such an environment intermediation in the distribution and sharing of information becomes unnecessary, the uneven quality of information and resulting quality uncertainty of information users, together with the increased search efforts, represent a sufficient reason for information and knowledge intermediaries to preserve and even reinforce their roles. Large-scale efforts in knowledge management pursued by industry leaders highlight the need for ``new'' intermediation. The paper focuses on economic and business issues in the distribution and sharing of Internet based information and digital products. We address the inefficiency of the pure exchange model in ``information markets'' that is analyzed based on double coincidence of wants and the lack of discernment on the part of users (many of them occasional users) about the market and intrinsic value of informational and digital products. These inefficiencies can be remedied with the introduction of recognizable currencies, which do not have to be of monetary nature, and the situation can be further improved with intermediation. We conclude that ``virtual communities'' and intermediation are important in ameliorating the efficiency of the distribution of the electronic information and quality of informational goods. This point of view is supported by the success of the new Internet-based intermediaries, such as Yahoo.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Berchtold:1999:SSA, author = "Stefan Berchtold and Alexandros Biliris and Euthimios Panagos", title = "{SaveMe}: a system for archiving electronic documents using messaging groupware", journal = j-SIGSOFT, volume = "24", number = "2", pages = "167--176", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295684", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Today, organizations deal with an ever-increasing number of documents that have to be archived because they are either related to their core business (e.g., product designs) or needed to meet corporate or legal retention requirements (e.g., voucher). In this paper, we present the architecture and prototype implementation of SaveMe, a document archival system that is based on network-centric groupware such as Internet standards-based messaging systems. In SaveMe, the actions of archiving, retrieving, and classifying documents are similar to the actions of sending, retrieving, and classifying email into folders. SaveMe leverages existing messaging infrastructures --- the one common denominator sitting on every computer is email --- and, thus, it does not require individual users and IT personnel to learn a new technology. The resulting environment is not intrusive, easier to administer, and a lot easier to deploy.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Schuster:1999:CMA, author = "Hans Schuster and Jens Neeb and Ralf Schamburger", title = "A configuration management approach for large workflow management systems", journal = j-SIGSOFT, volume = "24", number = "2", pages = "177--186", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295686", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Scalability to large, heterogeneous, and distributed environments is an important requirement for workflow management systems (WfMS). As a consequence, the management of the configuration of a WfMS installation becomes a key issue. This paper proposes an approach for managing the configuration of WfMS together with an assignment strategy for workflow instances. Separating the logical issues of the workflow model from the physical configuration of a WfMS is the basis of our strategy. A formalization of physical organizational requirements in a WfMS configuration covering access rights, usage policies, and costs for the access to WfMS servers is presented and used in the assignment strategy for workflow instances. The results of our approach fit well for many existing WfMS and also for the reference architecture of the Workflow Management Coalition.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zhao:1999:TWM, author = "J. Leon Zhao and Edward A. Stohr", title = "Temporal workflow management in a claim handling system", journal = j-SIGSOFT, volume = "24", number = "2", pages = "187--195", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295687", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Temporal workflow management is important for processes that are time-driven. Claim handling, which requires the documentation, diagnosis, and resolution of customer claims due to faulty products or unsatisfactory services, is an example of such a process because fast turnaround is critical for customer satisfaction. However, little research has been reported in this area, especially at the policy level. In this paper, we develop a framework for temporal workflow management, which includes issues such as turnaround time predication, time allocation, and task prioritization. We propose also the use of reward functions to guide workers' behavior with the goal of increasing efficiency while allowing flexibility.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Estublier:1999:BFP, author = "Jacky Estublier and Mahfound Amiour and Samir Dami", title = "Building a federation of process support systems", journal = j-SIGSOFT, volume = "24", number = "2", pages = "197--206", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295689", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The effort in software process support has focused so far on modeling and enacting processes. A certain amount of work has been done, but little has reached a satisfactory level of maturity and acceptance. In our opinion, this is due to the difficulty for a system to accommodate the very numerous aspects involved in software processes. A complete process support should cover topics ranging from low level tasks (like compiling) to organizational and strategic tasks. This includes process enhancement, resource management and control, cooperative work, etc. The environment must also be convenient for software engineers, team leaders, managers and so on; it must be able to describe details for efficient execution, and be high level for capturing, understanding, etc. As a matter of fact, the few tools that have reached sufficient maturity have focussed on a single topic and addressed a single class of users. It is our claim that no single system can provide a satisfactory solution except in a clearly defined subdomain. Thus we shifted our attention from finding the universal system to finding ways to make many different systems cooperate with their associated formalisms and process engines. This paper presents a novel approach for software process support environments based on a federation of heterogeneous and autonomous components. The approach has been implemented and experimented in the APEL environment. It is shown which architecture and technology is involved, how it works, which interoperability paradigms have been used, which problems we have solved and which issues are still under study.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ramloll:1999:MEU, author = "Rameshsharma Ramloll and John A. Mariani", title = "Moksha: exploring ubiquity in event filtration-control at the multi-user desktop", journal = j-SIGSOFT, volume = "24", number = "2", pages = "207--216", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295690", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Collaborative systems need to provide some means for users to be aware of peer activities. Common approaches involve broadcasting events generated as a result of a particular user's actions at the interface to others. Rather than flooding users with information about all activities occurring in the shared environment, filtration techniques allow each user to be exposed to relevant awareness information. Such techniques are often based on user configurable agents. Unfortunately, these so far do not support satisfactorily the improvisational nature of collaborative activities. This is because user configuration is effective mainly in cases where interactions can be anticipated and where configuration plans can be drawn. It is also difficult for a configurable agent to capture the diversity and the complex interrelationships between collaborative activities. In highly dynamic collaborative environments, the need to synchronise configurations with rapidly evolving needs imposes a heavy task load on participants. In Moksha, our prototypical multi-user desktop, this problem is addressed by extending the desktop metaphor and automating the filtration control process so that it becomes ubiquitous to the user. The cross-client linkage of the desktop interface elements, the use of multi-media and its browsing techniques are the main components underlying our strategy.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Prince:1999:DIO, author = "Robert Prince and Jianwen Su and Hong Tang and Yonggang Zhao", title = "The design of an interactive online help desk in the {Alexandria} Digital Library", journal = j-SIGSOFT, volume = "24", number = "2", pages = "217--226", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295692", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In large software systems such as digital libraries, electronic commerce applications, and customer support systems, the user interface and system are often complex and difficult to navigate. It is necessary to provide users with interactive online support to help users learn how to effectively use these applications. Such online help facilities can include providing tutorials and animated demonstrations, synchronized activities between users and system supporting staff for real time instruction and guidance, multimedia communication with support staff such as chat, voice, and shared whiteboards, and tools for quick identification of user problems. In this paper, we investigate how such interactive online help support can be developed and provided in the context of a working system, the Alexandria Digital Library (ADL) for geospatially-referenced data. We developed an online help system, AlexHelp!. AlexHelp! supports collaborative sessions between the user and the librarian (support staff) that include activities such as map browsing and region selection, recorded demonstration sessions for the user, primitive tools for analyzing user sessions, and channels for voice and text based communications. The design of AlexHelp! is based on user activity logs, and the system is a light-weight software component that can be easily integrated into the ADL user interface client. A prototype of AlexHelp! is developed and integrated into the ADL client; both the ADL client and AlexHelp! are written in Java.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brennan:1999:WDE, author = "Susan E. Brennan and Justina O. Ohaeri", title = "Why do electronic conversations seem less polite? the costs and benefits of hedging", journal = j-SIGSOFT, volume = "24", number = "2", pages = "227--235", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295942", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Electronic conversations often seem less polite than spoken conversations. The usual explanation for this is that people who are not physically copresent become depersonalized and less inhibited by social norms. While this explanation is intuitively appealing, we consider another possibility, based on the costs of producing ``polite'' utterances when speaking versus when typing. We examined a corpus of conversations generated by 26 three-person groups who interacted either face-to-face or electronically to do a collaborative memory task. We coded hedges (which mark an utterance as provisional) and questions (which display doubt or invite input from others), as people presented their own recollections, accepted, modified, or rejected those of others, and tried to reach consensus. Both of these devices are associated with politeness. For most people, hedging is more difficult when typing than when speaking because additional words are required, while marking an utterance as a question is equally easy in both media. The two groups made somewhat different use of these devices: Face-to-face groups hedged more than electronic groups, but both groups used questions just as often. We discuss how these and other differences emerge from the costs and affordances of communication media.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Grinter:1999:WWP, author = "Rebecca E. Grinter", title = "{WACC'99} workshop program", journal = j-SIGSOFT, volume = "24", number = "2", pages = "237--238", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295696", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Grinter:1999:WT, author = "Rebecca E. Grinter", title = "{WACC'99} tutorials", journal = j-SIGSOFT, volume = "24", number = "2", pages = "239--240", month = mar, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/295666.295697", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:43 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Parnas:1999:CR, author = "David Lorge Parnas", title = "On code reuse", journal = j-SIGSOFT, volume = "24", number = "3", pages = "4", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311968", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", note = "See response \cite{Gotterbarn:1999:CRR}.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gotterbarn:1999:CRR, author = "Don Gotterbarn and Keith Miller and Simon Rogerson", title = "On code reuse: a response", journal = j-SIGSOFT, volume = "24", number = "3", pages = "4--6", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311971", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", note = "See \cite{Parnas:1999:CR}.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jazayeri:1999:IS, author = "Mehdi Jazayeri", title = "Invitation to {SSR}", journal = j-SIGSOFT, volume = "24", number = "3", pages = "7", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311973", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ghezzi:1999:IO, author = "Carlo Ghezzi", title = "{ICSE} 2000 opportunity", journal = j-SIGSOFT, volume = "24", number = "3", pages = "8", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311974", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leciston:1999:AFP, author = "David John Leciston", title = "{ACM Fellow} profile: {Larry E. Druffel}", journal = j-SIGSOFT, volume = "24", number = "3", pages = "9--10", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311975", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Eickelmann:1999:AFPa, author = "Nancy Eickelmann", title = "{ACM Fellow} profile: {David Lorge Parnas}", journal = j-SIGSOFT, volume = "24", number = "3", pages = "10--14", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311977", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1999:SNSa, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "24", number = "3", pages = "15--24", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311980", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Poulin:1999:WIS, author = "Jeffrey S. Poulin and Don Batory and Larry Latour", title = "{9th Workshop on Institutionalizing Software Reuse (WISR '9)} workshop summary", journal = j-SIGSOFT, volume = "24", number = "3", pages = "29--31", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311989", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "What has the field of reuse accomplished? Where can we declare success? Where should we take the blame for failure? The invitees to WISR recently met in Austin, Texas to address these questions and to help determine the direction of future reuse research and practice.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Edwards:1999:SRP, author = "Stephen H. Edwards", title = "The state of reuse: perceptions of the reuse community", journal = j-SIGSOFT, volume = "24", number = "3", pages = "32--36", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311992", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Ninth Workshop on Institutionalizing Software Reuse (WISR9) was held January 7-9, 1999, bringing together established reuse researchers from academia and industry. On the first day of the workshop, a survey was taken to collect feedback about the reuse community's collective beliefs and disagreements. Preliminary results were then shared with the participants during the last plenary session of the workshop. This article presents the results of the survey, which capture the opinions of an important segment of the reuse community.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Basili:1999:NWS, author = "Victor R. Basili and Laszlo Belady and Barry Boehm and Frederick Brooks and James Browne and Richard DeMillo and Stuart I. Feldman and Cordell Green and Butler Lampson and Duncan Lawrie and Nancy Leveson and Nancy Lynch and Mark Weiser and Jeannette Wing", title = "{NSF Workshop on a Software Research Program for the 21st Century}", journal = j-SIGSOFT, volume = "24", number = "3", pages = "37--44", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311993", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Brilliant:1999:ERS, author = "Susan S. Brilliant and John C. Knight", title = "{Empirical Research in Software Engineering}: a workshop", journal = j-SIGSOFT, volume = "24", number = "3", pages = "44--52", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.311998", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Lutz:1999:RBP, author = "Michael J. Lutz and J. Fernando Naveda", title = "{RIT}'s {BS} program in software engineering: a status report", journal = j-SIGSOFT, volume = "24", number = "3", pages = "53--55", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312000", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In the fall of 1996, the Rochester Institute of Technology (RIT) enrolled the first students in its undergraduate software engineering program. To the best of our knowledge, this was the first program in the U.S. leading to a Bachelor of Science in Software Engineering. This note is meant to apprise the readers of SEN of both the existence and current status of our program, and to contribute to the on-going conversation vis-{\`a}-vis the proper education of professional software developers.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Prechelt:1999:SDS, author = "Lutz Prechelt", title = "The surprising dynamics of a simple year 2000 bug", journal = j-SIGSOFT, volume = "24", number = "3", pages = "56--57", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312002", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "These are the reactions (and an analysis of their reasons) of a very simple program containing a rather simple form of century-dependent code. These reactions are extremely surprising and emerge from an interesting daisy-chain of effects.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Aharonian:1999:SPI, author = "Greg Aharonian", title = "17,500 software patents to issue in 1998", journal = j-SIGSOFT, volume = "24", number = "3", pages = "58--62", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312004", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Based on an analysis of 3336 software patents issued circa January/August of 1998, I have put together the following statistics. Simply put, in 1998 and 1999 the PTO will issue 40,000 software patents, ten times the amount issued six years earlier in 1992 and 1993, without ten times the resources.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Vesterinen:1999:ICE, author = "Petri Vesterinen", title = "Issues in calibrating effort estimation models", journal = j-SIGSOFT, volume = "24", number = "3", pages = "63--65", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312006", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper discusses some important issues when calibrating, or developing effort estimation models for software projects. The author has developed and calibrated several effort estimation models within Nokia Corporation. The paper takes use of the experience gained in those situations.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kirner:1999:EUC, author = "D. Kirner and R. Porter and P. Punniamoorthy and M. Schuh and D. Shoup and S. Tindall and D. Umphress", title = "Extending use cases throughout the software lifecycle", journal = j-SIGSOFT, volume = "24", number = "3", pages = "66--68", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312014", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The relevance of use cases throughout the software development life cycle is considered in the context of an actual project. Extensions, called behavior case and test cases are proposed to address design and testing activities.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{P:1999:MDT, author = "Puppydog P. O. P. and L. B. S. Raccoon", title = "Multiple downcasting techniques", journal = j-SIGSOFT, volume = "24", number = "3", pages = "69--75", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312008", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper, we describe and compare techniques that implement multiple downcasting in strongly-typed languages. We conclude that multimethods stand out as the single best technique. In the first section, we describe seven commonly used techniques. In the second section, we compare these seven techniques using ten criteria. And, in the third section, we comment on some additional techniques. Multiple downcasting occurs so often that developers use a variety of terms to describe it, and a variety of language constructs and patterns to implement it. ``Feed the animals,'' ``driver-vehicle,'' and ``parallel hierarchies'' are well-known examples that require multiple downcasting. ``Multiple type dispatch'' and ``covariant subclassing'' identify different facets of multiple downcasting. ``Dynamic type casting,'' ``typecase statements,'' and the ``visitor pattern'' are frequently used to implement multiple downcasting. We believe that multiple downcasting is not a mistake or the result of poor program design, rather multiple downcasting is a specific technique that implements a specific kind of application semantics. In the animal hierarchy shown in Figure 1, cows eat grass, wolves eat meat, and in the superclass, animals eat food. The generalization that animals eat food is imprecise: it ignores the facts that cows only eat grass and wolves only eat meat. So, how should developers write a function to safely ``feed the animals'' without getting the types mixed up? In Program 1, we show how a developer might like to ``feed the animals'' in C++. The {\tt feed\_unsafely} function may fail, while the {\tt feed\_safely} function works properly for all combinations of foods and animals. The animal hierarchy will not compile in C++, because the eat method is covariant. In this paper, we elaborate ideas and examples from A Middle-Out Concept of Hierarchy. We adapted the ``feed the animals'' example from Are Cows Animals? by Shang.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hong:1999:CAS, author = "Liu Hong and Lin Zongkai and Zeng Guangzhou", title = "A construction approach for software agents using components", journal = j-SIGSOFT, volume = "24", number = "3", pages = "76--79", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312017", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents a construction approach for software agents. A software agent is regarded as a main frame plus some components, and it is constructed by selecting suitable main frame and software components, assembling and running through the control mechanism on the main frame. The multi-agent system is organised on the Client/Server model. The developed system based on this method profits from software reuse in the distributed environment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Adams:1999:FRI, author = "Tom Adams", title = "A formula for the re-inspection decision", journal = j-SIGSOFT, volume = "24", number = "3", pages = "80", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312024", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Various recommendations concerning the re-inspection decision can be found in the literature. Some are based on general assumptions or estimates concerning the downstream cost of defects and the proportion of defects that get past the inspection ``filter''. None of these recommendations allow you to work with your own data or assumptions concerning specific types of documents. This article provides a way to make the re-inspection decision using your own data.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Holmes:1999:SEW, author = "Neville Holmes", title = "Software engineering: to be or what to be?", journal = j-SIGSOFT, volume = "24", number = "3", pages = "81--83", month = may, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/311963.312025", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:45 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This note reviews aspects of professionalism as related to computers, questions the structuring of responsibilities in software development, and commends subsuming overspecialized branches of engineering, such as Computer Systems Engineering and Software Engineering, within a more general discipline of Data Engineering.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kilov:1999:BSW, author = "Haim Kilov", title = "{Behavioral Semantics Workshop} (call for papers)", journal = j-SIGSOFT, volume = "24", number = "4", pages = "3", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329156", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Eickelmann:1999:AFPb, author = "Nancy Eickelmann", title = "{ACM Fellow} profile: {Barbara G. Ryder}", journal = j-SIGSOFT, volume = "24", number = "4", pages = "13--14", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329157", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Doernhoefer:1999:SNSb, author = "Mark Doernhoefer", title = "Surfing the net for {{\booktitle{Software Engineering Notes}}}", journal = j-SIGSOFT, volume = "24", number = "4", pages = "15--25", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329158", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Neumann:1999:RPCb, author = "Peter G. Neumann", title = "Risks to the public in computers and related systems", journal = j-SIGSOFT, volume = "24", number = "4", pages = "26--29", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329159", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Conn:1999:NCS, author = "Richard Conn", title = "Notes from the 12th Conference on Software Engineering Education and Training {(CSEET)} and 13th {SIGCSE} Technical Symposium on Computer Science Education {(CSE)}", journal = j-SIGSOFT, volume = "24", number = "4", pages = "30--32", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329160", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Richardson:1999:RIW, author = "Debra Richardson and Paola Inverardi", title = "{ROSATEA: International Workshop on the Role of Software Architecture in Analysis (and) Testing}", journal = j-SIGSOFT, volume = "24", number = "4", pages = "33--42", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329161", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This article reports on the International Workshop on the Role of Software Architecture in Analysis and Testing, which was sponsored jointly by U.S. and Italian government agencies. We begin by providing an overview of the workshop organization but focus the technical program. We conclude with the research agenda set forth by the workshop.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ulrich:1999:IWT, author = "Andreas Ulrich and Gunther Chrobok-Diening", title = "{International Workshop on Testing Distributed Component-Based Systems}", journal = j-SIGSOFT, volume = "24", number = "4", pages = "43--46", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329162", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This summary reports on the one-day Workshop on Testing Distributed Component-Based Systems (TDCS) that took place in affiliation with the International Conference on Software Engineering (ICSE) in Los Angeles in May 1999. The workshop dealt with new advances in test methods and test technologies for the emerging class of distributed component-based systems that are built on basis of middleware software like COM, CORBA, or Java RMI, including systems comprising Commercial-Off-The-Shelf (COTS) components. The around thirty workshop attendees discussed what efforts in software technology and research are required to cope with testing such systems. Twelve papers out of nineteen submissions were presented.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Parnas:1999:PPL, author = "David Lorge Parnas", title = "Parnas on Parnas: a life of indecision", journal = j-SIGSOFT, volume = "24", number = "4", pages = "47--49", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329163", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Anger:1999:DNS, author = "Frank D. Anger", title = "Directions for the {NSF} software engineering and languages program", journal = j-SIGSOFT, volume = "24", number = "4", pages = "50--52", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329164", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "PITAC, IT, and 50 years of history suggest changes in the way we ``do'' software engineering research. NSF's Software Engineering and Languages Program plans new emphases in the coming year that intend to help the field progress.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Anonymous:1999:ICD, author = "Anonymous", title = "{ICSE} '99 conference daily newspaper: Window on the World", journal = j-SIGSOFT, volume = "24", number = "4", pages = "53--74", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329165", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Abib:1999:GBT, author = "Janaina C. Abib and Tereza G. Kirner", title = "A {GQM-based} tool to support the development of software quality measurement plans", journal = j-SIGSOFT, volume = "24", number = "4", pages = "75--80", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329167", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper focuses on the Goal-Question-Metric (GQM) approach, which has been proposed as a goal-oriented approach for the measurement of products and processes in software engineering. First, the GQM is characterized, and then, the GQM-PLAN tool, is described. The GQM-PLAN was developed to support the preparation of measuring plans based on GQM.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Whittaker:1999:WSF, author = "James A. Whittaker and Alan Jorgensen", title = "Why software fails", journal = j-SIGSOFT, volume = "24", number = "4", pages = "81--83", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329168", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This note summarizes conclusions from a three year study about why released software fails. Our method was to obtain mature-beta or retail versions of real software applications and stress test them until they fail. From an analysis of the causal faults, we have synthesized four reasons why software fails. This note presents these four classes of failures and discusses the challenges they present to developers and testers. The implications for software testers are emphasized.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Polo:1999:RMP, author = "Macario Polo and Mario Piattini and Francisco Ruiz and Coral Calero", title = "Roles in the maintenance process", journal = j-SIGSOFT, volume = "24", number = "4", pages = "84--86", month = jul, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/329155.329169", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:46 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Software maintenance is the most expensive and least predictable stage of the software life cycle, representing in some cases between 67\% and 90\% of total costs. On the other hand, it is well known that the structure of a work team influences on the productivity of its members. We can help to decrease costs of maintenance through the definition of an adequate structure of the work team and with the clear identification of the tasks which every member must execute. In this work we expose the results that, in this sense, we have obtained from the application of MANTEMA to real projects. MANTEMA is a methodology for supporting software maintenance, developed jointly by our university and Atos ODS, an international enterprise among whose primary business activities is the outsourcing of software maintenance. Atos ODS is using MANTEMA in big projects of Spanish banking.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Field:1999:IPS, author = "John Field and G. Ramalingam", title = "Identifying procedural structure in {Cobol} programs", journal = j-SIGSOFT, volume = "24", number = "5", pages = "1--10", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316163", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The principal control-flow abstraction mechanism in the Cobol language is the perform statement. Normally, perform statements are used in a straightforward manner to define parameterless procedures (where global variables are used to pass data into and out of procedure bodies). However, unlike most procedural constructs, distinct performed procedures can share code in arbitrarily complicated ways. In addition, performs can also be used in such a way as to cause transfers of control that do not correspond to normal call/return semantics. In this paper, we show how a Cobol program can be efficiently transformed into a semantically-equivalent procedurally well-structured representation, in which conventional procedures (i.e., with the usual call and return semantics and without code sharing) and procedure call statements replace performed code and perform statements. This transformation process properly accounts for the non-procedural control flow that can result from ill-behaved perform statements. The program representation derived from our analysis can be used directly in program understanding applications, program restructuring tools, and inter-language translators. In addition, it can be used as the starting point for a variety of context-sensitive program analyses, e.g., program slicing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Agrawal:1999:ECT, author = "Hira Agrawal", title = "Efficient coverage testing using global dominator graphs", journal = j-SIGSOFT, volume = "24", number = "5", pages = "11--20", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316166", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Coverage testing techniques, such as statement and decision coverage, play a significant role in improving the quality of software systems. Constructing a thorough set of tests that yield high coverage, however, is often a very tedious, time consuming task. In this paper we present a technique to find a small subset of a program's statements and decisions with the property that covering the subset implies covering the rest. We introduce the notion of a mega block which is a set of basic blocks spanning multiple procedures with the property that one basic block in it is executed iff every basic block in it is executed. We also present an algorithm to construct a data structure called the global dominator graph showing dominator relationships among mega blocks. A tester only needs to create test cases that are aimed at executing one basic block from each of the leaf nodes in this directed acyclic graph. Every other basic block in the program will automatically be covered by the same test set.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Choi:1999:EPM, author = "Jong-Deok Choi and David Grove and Michael Hind and Vivek Sarkar", title = "Efficient and precise modeling of exceptions for the analysis of {Java} programs", journal = j-SIGSOFT, volume = "24", number = "5", pages = "21--31", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316171", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The Factored Control Flow Graph, FCFG, is a novel representation of a program's intraprocedural control flow, which is designed to efficiently support the analysis of programs written in languages, such as Java, that have frequently occurring operations whose execution may result in exceptional control flow. The FCFG is more compact than traditional CFG representations for exceptional control flow, yet there is no loss of precision in using the FCFG. In this paper, we introduce the FCFG representation and outline how standard forward and backward data flow analysis algorithms can be adapted to work on this representation. We also present empirical measurements of FCFG sizes for a large number of methods obtained from a variety of Java programs, and compare these sizes with those of a traditional CFG representation.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Whiting:1999:SAH, author = "Liz Whiting and Mike Hill", title = "Safety analysis of {Hawk In Flight} monitor", journal = j-SIGSOFT, volume = "24", number = "5", pages = "32--38", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316173", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The development of a military safety critical system has many facets, one of which is the collecting of evidence that can be used to assist the production of the safety case necessary for certification of a system into military use. Within the certification process, static analysis is required by the UK Ministry of Defence to provide evidence of a systems integrity and fitness for purpose. In this paper we describe how we have extended the approach of static analysis to gain evidence of the dynamic integrity of a system. This work, based on the abstract interpretation of variable values into sets of ranges of values, has resulted in the development of a software tool, called the Exception Analyser. This tool can investigate the potential for code, written in C, C++ and Ada, to raise run time exceptions and then derive the system constraints which would prevent these exceptions from occurring. We outline the foundation behind our approach and present the results of a case study into the successful application of the tool on a safety critical military project.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Liang:1999:EAG, author = "Donglin Liang and Mary Jean Harrold", title = "Equivalence analysis: a general technique to improve the efficiency of data-flow analyses in the presence of pointers", journal = j-SIGSOFT, volume = "24", number = "5", pages = "39--46", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316175", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Existing methods to handle pointer variables during data-flow analyses can make such analyses inefficient both in time and space because the data-flow analyses must store and propagate large sets of data facts that are introduced by dereferences of pointer variable. This paper presents equivalence analysis, a general technique to improve the efficiency of data-flow analyses in the presence of pointers. The technique identifies equivalence relations among the memory locations accessed by a procedure and ensures that two equivalent memory locations share the same set of data facts in a procedure and in the procedures that are called by that procedure. Thus, a data-flow analysis needs to compute the data-flow information only for a representative memory location in an equivalence class. The data-flow information for other memory locations in the equivalence class can be derived from that of the representative memory location. Our empirical studies indicate that equivalence analysis may effectively improve the efficiency of many data-flow analyses.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Souter:1999:ICD, author = "Amie L. Souter and Lori L. Pollock and Dixie Hisley", title = "Inter-class def-use analysis with partial class representations", journal = j-SIGSOFT, volume = "24", number = "5", pages = "47--56", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316178", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Object-oriented program design promotes the reuse of code not only through inheritance and polymorphism, but also through building server classes which can be used by many different client classes. Research on static analysis of object-oriented software has focused on addressing the new features of classes, inheritance, polymorphism, and dynamic binding. This paper demonstrates how exploiting the nature of object-oriented design principles can enable development of scalable static analyses. We present an algorithm for computing def-use information for a single class's manipulation of objects of other classes, which requires that only partial representations of server classes be constructed. This information is useful for data flow testing and debugging.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Naumovich:1999:UPO, author = "Gleb Naumovich and Lori A. Clarke and Jamieson M. Cobleigh", title = "Using partial order techniques to improve performance of data flow analysis based verification", journal = j-SIGSOFT, volume = "24", number = "5", pages = "57--65", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316180", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Partial order optimization techniques for distributed systems improve the performance of finite state verification approaches by avoiding redundant exploration of some portions of the state space. Previously, such techniques have been applied in the context of model checking approaches. In this paper we propose a partial order optimization of the program model used by FLAVERS, a data flow based finite state verification approach for checking user-specified properties of distributed software. We demonstrate experimentally that this optimization often leads to significant reductions in the run time of the analysis algorithm of FLAVERS. On average, for those cases where this optimization could be applied, we observed a speedup of 21\%. For one of the cases, the optimization resulted in an analysis speedup of 91\%.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chandra:1999:PTC, author = "Satish Chandra and Thomas Reps", title = "Physical type checking for {C}", journal = j-SIGSOFT, volume = "24", number = "5", pages = "66--75", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316183", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The effectiveness of traditional type checking in C is limited by the presence of type conversions using type casts. Because the C standard allows arbitrary type conversions between pointer types, neither C compilers, nor tools such as lint, can guarantee type safety in the presence of such type conversions. In particular, by using casts involving pointers to structures (C structs), a programmer can interpret any memory region to be of any desired type, further compromising C's weak type system. Not only do type casts make a program vulnerable to type errors, they hinder program comprehension and maintenance by creating latent dependencies between seemingly independent pieces of code. To address these problems, we have developed a stronger form of type checking for C programs, called physical type checking. Physical type checking takes into account the layout of C struct fields in memory. This paper describes an inference-based physical type checking algorithm. Our algorithm can be used to perform static safety checks, as well as compute useful information for software engineering applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Preston:1999:NTS, author = "Nicky Williams Preston", title = "New type signatures for legacy {Fortran} subroutines", journal = j-SIGSOFT, volume = "24", number = "5", pages = "76--85", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316184", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/fortran3.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We are currently developing a methodological framework for reverse engineering Fortran77 programs used by Electricit{\'e} de France, in which the first step is the construction of an algebraic specification which faithfully represents the Fortran code. To construct this specification, we must decide on a coherent set of ``profiles'' (type signatures) for the specifications of the Fortran sub-programs. We propose an analysis of the dynamic aliases between formal and actual sub-program arguments in order to derive these profiles. In many examples of real Fortran code this analysis does not give satisfactory results if arrays are treated as indivisible. Instead, we must take into account which fragment of the array may really be accessed by the sub-program. We have therefore implemented our analysis as an extension of the PIPS code parallelisation tool, which provides us with a precise analysis of inter-procedural array data-flow.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Balmas:1999:QON, author = "Fran{\c{c}}oise Balmas", title = "Query by outlines: a new paradigm to help manage programs", journal = j-SIGSOFT, volume = "24", number = "5", pages = "86--94", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316185", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We propose a new paradigm to query information about programs, namely query by outlines. This paradigm relies on an outlining model that conceptually describe units of code according to the computations they perform. Outlines are automatically constructed by our system PRISME for C and Lisp programs. Currently, both our model and our system are restricted to loops.QBO is a prototype tool that implements the query by outline paradigm. It proposes to browse the loops of a program directly through their outline, and allows to restrict these loops to browse with queries expressed as constraints on the outlines. Thus it enables to answer questions such as ``where is this variable modified?'', ``where is this kind of computation performed?'', or ``are there many places where this computation is performed?''. In this paper, we sketch our outlining model, introduce QBO and argue that query by outline is a helpful paradigm to manage programs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Kokai:1999:GGP, author = "Gabriella K{\'o}kai and J{\"o}rg Nilson and Christian Niss", title = "{GIDTS}: a graphical programming environment for {Prolog}", journal = j-SIGSOFT, volume = "24", number = "5", pages = "95--104", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316186", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper puts forward the Graphical Interactive Diagnosing, Testing and Slicing System (GIDTS) which is a graphical programming environment for PROLOG programs. The IDTS part of the system integrates Shapiro's Interactive Diagnosis Algorithm with the Category Partition Testing Method (CPM) and a slicing technique performing the algorithmic debugging and functional testing of PROLOG programs. The integration of IDTS with a graphical user interface (GUI) supports the whole functionality of IDTS and provides a user-friendly environment giving the user more information on the state of the debugging process. GIDTS extends IDTS to a complete programming environment. It allows one to handle the debugging of complex programs using the extended syntax and semantics of PROLOG in a very flexible way. A static code diagnosis has also been implemented. In addition GIDTS supports debugging-directed editing of the source program, and a quick source code navigation via any of the tools (for example: the debugger, the static call graph and the information retriever). All these features are supported by the graphical user interface.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Steindl:1999:BDF, author = "Christoph Steindl", title = "Benefits of a data flow-aware programming environment", journal = j-SIGSOFT, volume = "24", number = "5", pages = "105--109", month = sep, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/381788.316187", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:47 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Many programmers write their programs with a primitive text editor that has no knowledge about the edited text. On the other hand, they use ingenious compilers that collect control flow and data flow information to perform optimizations and generate optimized code. We argue that program editors should have the same knowledge about the control flow and data flow of a program. Such editors could help programmers to better understand programs and to be more productive. We propose a data flow-aware programming environment that makes the information that the compiler already computed visible. The bidirectional feedback from the compiler to the programmer and back from the programmer to the compiler enables productive programming and faster debugging.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Beck:1999:EPD, author = "Kent Beck", title = "Extreme programming: a discipline of software development (invited paper) (abstract only)", journal = j-SIGSOFT, volume = "24", number = "6", pages = "1", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318778", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "You can look at software development as a system with inputs and outputs. As with any system, software development needs negative feed-back loops to keep it from oscillating. The negative feedback loops traditionally used --- separate testing groups, documentation, lengthy release cycles, reviews --- succeed at keeping certain aspects under control, but they tend to have only long term benefits. What if we could find a set of negative feedback loops that kept software development under control, but that people wanted to do, even under stress, and that contributed to productivity both short and long term?", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Czarnecki:1999:CGP, author = "Krzysztof Czarnecki and Ulrich W. Eisenecker", title = "Components and generative programming (invited paper)", journal = j-SIGSOFT, volume = "24", number = "6", pages = "2--19", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318779", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper is about a paradigm shift from the current practice of manually searching for and adapting components and their manual assembly to Generative Programming, which is the automatic selection and assembly of components on demand. First, we argue that the current OO technology does not support reuse and configurability in an effective way. Then we show how a system family approach can aid in defining reusable components. Finally, we describe how automate the assembly of components based on configuration knowledge. We compare this paradigm shift to the introduction of interchangeable parts and automated assembly lines in the automobile industry. We also illustrate the steps necessary to develop a product line using a simple example of a car product line. We present the feature model of the product line, develop a layered architecture for it, and automate the assembly of the components using a generator. We also discuss some design issues, applicability of the approach, and future development.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Hauswirth:1999:CCM, author = "Manfred Hauswirth and Mehdi Jazayeri", title = "A component and communication model for push systems", journal = j-SIGSOFT, volume = "24", number = "6", pages = "20--38", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318784", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present a communication and component model for push systems. Surprisingly, despite the widespread use of many push services on the Internet, no such models exist. Our communication model contrasts push systems with client-server and event-based systems. Our component model provides a basis for comparison and evaluation of different push systems and their design alternatives. We compare several prominent push systems using our component model. The component model consists of producers and consumers, broadcasters and channels, and a transport system. We detail the concerns of each of these components. Finally, we discuss a number of open issues that challenge the widespread deployment of push or any other system on an Internet-wide scale. Payment models are the most important among these and are not adequately addressed by any existing system. We briefly present the payment approach in our Minstrel project.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Mascolo:1999:FGM, author = "Cecilia Mascolo and Gian Pietro Picco and Gruia-Catalin Roman", title = "A fine-grained model for code mobility", journal = j-SIGSOFT, volume = "24", number = "6", pages = "39--56", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318785", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper we take the extreme view that every line of code is potentially mobile, i.e., may be duplicated and/or moved from one program context to another on the same host or across the network. Our motivation is to gain a better understanding of the range of constructs and issues facing the designer of a mobile code system, in a setting that is abstract and unconstrained by compilation and performance considerations traditionally associated with programming language design. Incidental to our study is an evaluation of the expressive power of Mobile UNITY, a notation and proof logic for mobile computing.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gafni:1999:RRT, author = "Vered Gafni", title = "Robots: a real-time systems architectural style", journal = j-SIGSOFT, volume = "24", number = "6", pages = "57--74", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318786", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "This paper presents an architectural style for real-time systems, and an associated formal architectural description language, called Robots. A basic specification in Robots consists of a synchronous control task that is responsible for the dynamic reconfiguration of the system controller as a set of asynchronous observer and process tasks. The controller architecture evolves by hierarchical refinement of observers and processes into lower level control tasks each dominating a new set of observers and processes. Robots is given operational semantics by statecharts. Also, the architectural style is embedded in Robots by semantic rules that allow formal checking of the consistency and completeness of architectural specifications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Warboys:1999:CCI, author = "B. C. Warboys and D. Balasubramaniam and R. M. Greenwood and G. N. C. Kirby and K. Mayes and R. Morrison and D. S. Munro", title = "Collaboration and composition: issues for a second generation process language", journal = j-SIGSOFT, volume = "24", number = "6", pages = "75--90", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318787", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Over the past decade a variety of process languages have been defined and applied to software engineering environments. The idea of using a process language to encode a software process as a ``process model'', and enacting this using a process-sensitive environment is now well established. Many prototype process-sensitive environments have been developed; but their use in earnest has been limited. We are designing a second generation process language which is a significant departure from current conventional thinking. Firstly a process is viewed as a set of mediated collaborations rather than a set of partially ordered activities. Secondly emphasis is given to how process models are developed, used, and enhanced over a potentially long lifetime. In particular the issue of composing both new and existing model fragments is central to our development approach. This paper outlines these features, and gives the motivations behind them. It also presents a view of process support for software engineering drawing on our decade of experience in exploiting a ``first generation'' process language, and our experience in designing and exploiting programming languages.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jager:1999:UUS, author = "Dirk J{\"a}ger and Ansgar Schleicher and Bernhard Westfechtel", title = "Using {UML} for software process modeling", journal = j-SIGSOFT, volume = "24", number = "6", pages = "91--108", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318788", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Padberg:1999:PMS, author = "Frank Padberg", title = "A probabilistic model for software projects", journal = j-SIGSOFT, volume = "24", number = "6", pages = "109--126", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318932", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A probabilistic model for software development projects is constructed. The model can be applied to compute an estimate for the development time of a project. The chances of succeeding with a given amount of time and the risk of deviating from the estimate can be computed as well. Examples show that the model behaves as expected when the input data are changed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Leveson:1999:DSL, author = "Nancy G. Leveson and Mats P. E. Heimdahl and Jon Damon Reese", title = "Designing specification languages for process control systems: lessons learned and steps to the future", journal = j-SIGSOFT, volume = "24", number = "6", pages = "127--145", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318937", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Previously, we defined a blackbox formal system modeling language called RSML (Requirements State Machine Language). The language was developed over several years while specifying the system requirements for a collision avoidance system for commercial passenger aircraft. During the language development, we received continual feedback and evaluation by FAA employees and industry representatives, which helped us to produce a specification language that is easily learned and used by application experts. Since the completion of the RSML project, we have continued our research on specification languages. This research is part of a larger effort to investigate the more general problem of providing tools to assist in developing embedded systems. Our latest experimental toolset is called SpecTRM (Specification Tools and Requirements Methodology), and the formal specification language is SpecTRM-RL (SpecTRM Requirements Language). This paper describes what we have learned from our use of RSML and how those lessons were applied to the design of SpecTRM-RL. We discuss our goals for SpecTRM-RL and the design features that support each of these goals.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gargantini:1999:UMC, author = "Angelo Gargantini and Constance Heitmeyer", title = "Using model checking to generate tests from requirements specifications", journal = j-SIGSOFT, volume = "24", number = "6", pages = "146--162", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318939", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Recently, many formal methods, such as the SCR (Software Cost Reduction) requirements method, have been proposed for improving the quality of software specifications. Although improved specifications are valuable, the ultimate objective of software development is to produce software that satisfies its requirements. To evaluate the correctness of a software implementation, one can apply black-box testing to determine whether the implementation, given a sequence of system inputs, produces the correct system outputs. This paper describes a specification-based method for constructing a suite of test sequences, where a test sequence is a sequence of inputs and outputs for testing a software implementation. The test sequences are derived from a tabular SCR requirements specification containing diverse data types, i.e., integer, boolean, and enumerated types. From the functions defined in the SCR specification, the method forms a collection of predicates called branches, which ``cover'' all possible software behaviors described by the specification. Based on these predicates, the method then derives a suite of test sequences by using a model checker's ability to construct counterexamples. The paper presents the results of applying our method to four specifications, including a sizable component of a contractor specification of a real system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Thompson:1999:SBP, author = "Jeffrey M. Thompson and Mats P. E. Heimdahl and Steven P. Miller", title = "Specification-based prototyping for embedded systems", journal = j-SIGSOFT, volume = "24", number = "6", pages = "163--179", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318940", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Specification of software for safety critical, embedded computer systems has been widely addressed in literature. To achieve the high level of confidence in a specification's correctness necessary in many applications, manual inspections, formal verification, and simulation must be used in concert. Researchers have successfully addressed issues in inspection and verification; however, results in the areas of execution and simulation of specifications have not made as large an impact as desired. In this paper we present an approach to specification-based prototyping which addresses this issue. It combines the advantages of rigorous formal specifications and rapid systems prototyping. The approach lets us refine a formal executable model of the system requirements to a detailed model of the software requirements. Throughout this refinement process, the specification is used as a prototype of the proposed software. Thus, we guarantee that the formal specification of the system is always consistent with the observed behavior of the prototype. The approach is supported with the NIMBUS environment, a framework that allows the formal specification to execute while interacting with software models of its embedding environment or even the physical environment itself (hardware-in-the-loop simulation).", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Siff:1999:CTC, author = "Michael Siff and Satish Chandra and Thomas Ball and Krishna Kunchithapadam and Thomas Reps", title = "Coping with type casts in {C}", journal = j-SIGSOFT, volume = "24", number = "6", pages = "180--198", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318942", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The use of type casts is pervasive in C. Although casts provide great flexibility in writing programs, their use obscures the meaning of programs, and can present obstacles during maintenance. Casts involving pointers to structures (C structs) are particularly problematic, because by using them, a programmer can interpret any memory region to be of any desired type, thereby compromising C's already weak type system. This paper presents an approach for making sense of such casts, in terms of understanding their purpose and identifying fragile code. We base our approach on the observation that casts are often used to simulate object-oriented language features not supported directly in C. We first describe a variety of ways --- idioms --- in which this is done in C programs. We then develop a notion of physical subtyping, which provides a model that explains these idioms. We have created tools that automatically analyze casts appearing in C programs. Experimental evidence collected by using these tools on a large amount of C code (over a million lines) shows that, of the casts involving struct types, most (over 90\%) can be associated meaningfully --- and automatically --- with physical subtyping. Our results indicate that the idea of physical subtyping is useful in coping with casts and can lead to valuable software productivity tools.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Liang:1999:EPA, author = "Donglin Liang and Mary Jean Harrold", title = "Efficient points-to analysis for whole-program analysis", journal = j-SIGSOFT, volume = "24", number = "6", pages = "199--215", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318943", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "To function on programs written in languages such as C that make extensive use of pointers, automated software engineering tools require safe alias information. Existing alias-analysis techniques that are sufficiently efficient for analysis on large software systems may provide alias information that is too imprecise for tools that use it: the imprecision of the alias information may (1) reduce the precision of the information provided by the tools and (2) increase the cost of the tools. This paper presents a flow-insensitive, context-sensitive points-to analysis algorithm that computes alias information that is almost as precise as that computed by Andersen's algorithm --- the most precise flow- and context-insensitive algorithm --- and almost as efficient as Steensgaard's algorithm --- the most efficient flow- and context-insensitive algorithm. Our empirical studies show that our algorithm scales to large programs better than Andersen's algorithm and show that flow-insensitive alias analysis algorithms, such as our algorithm and Andersen's algorithm, can compute alias information that is close in precision to that computed by the more expensive flow- and context-sensitive alias analysis algorithms.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Ball:1999:CDA, author = "Thoms Ball", title = "The concept of dynamic analysis", journal = j-SIGSOFT, volume = "24", number = "6", pages = "216--234", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318944", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Dynamic analysis is the analysis of the properties of a running program. In this paper, we explore two new dynamic analyses based on program profiling:Frequency Spectrum Analysis. We show how analyzing the frequencies of program entities in a single execution can help programmers to decompose a program, identify related computations, and find computations related to specific input and output characteristics of a program. Coverage Concept Analysis. Concept analysis of test coverage data computes dynamic analogs to static control flow relationships such as domination, postdomination, and regions. Comparison of these dynamically computed relationships to their static counterparts can point to areas of code requiring more testing and can aid programmers in understanding how a program and its test sets relate to one another.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Rountev:1999:DFA, author = "Atanas Rountev and Barbara G. Ryder and William Landi", title = "Data-flow analysis of program fragments", journal = j-SIGSOFT, volume = "24", number = "6", pages = "235--252", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318945", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Traditional interprocedural data-flow analysis is performed on whole programs; however, such whole-program analysis is not feasible for large or incomplete programs. We propose fragment data-flow analysis as an alternative approach which computes data-flow information for a specific program fragment. The analysis is parameterized by the additional information available about the rest of the program. We describe two frameworks for interprocedural flow-sensitive fragment analysis, the relationship between fragment analysis and whole-program analysis, and the requirements ensuring fragment analysis safety and feasibility. We propose an application of fragment analysis as a second analysis phase after an inexpensive flow-insensitive whole-program analysis, in order to obtain better information for important program fragments. We also describe the design of two fragment analyses derived from an already existing whole-program flow- and context-sensitive pointer alias analysis for C programs and present empirical evaluation of their cost and precision. Our experiments show evidence of dramatically better precision obtainable at a practical cost.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Zeller:1999:YMP, author = "Andreas Zeller", title = "Yesterday, my program worked. Today, it does not. Why?", journal = j-SIGSOFT, volume = "24", number = "6", pages = "253--267", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318946", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Imagine some program and a number of changes. If none of these changes is applied (``yesterday''), the program works. If all changes are applied (``today''), the program does not work. Which change is responsible for the failure? We present an efficient algorithm that determines the minimal set of failure-inducing changes. Our delta debugging prototype tracked down a single failure-inducing change from 178,000 changed GDB lines within a few hours.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jaramillo:1999:CCA, author = "Clara Jaramillo and Rajiv Gupta and Mary Lou Soffa", title = "Comparison checking: an approach to avoid debugging of optimized code", journal = j-SIGSOFT, volume = "24", number = "6", pages = "268--284", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318947", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present a novel approach to avoid the debugging of optimized code through comparison checking. In the technique presented, both the unoptimized and optimized versions of an application program are executed, and computed values are compared to ensure the behaviors of the two versions are the same under the given input. If the values are different, the comparison checker displays where in the application program the differences occurred and what optimizations were involved. The user can utilize this information and a conventional debugger to determine if an error is in the unoptimized code. If the error is in the optimized code, the user can turn off those offending optimizations and leave the other optimizations in place. We implemented our comparison checking scheme, which executes the unoptimized and optimized versions of C programs, and ran experiments that demonstrate the approach is effective and practical.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Chang:1999:SSB, author = "Juei Chang and Debra J. Richardson", title = "Structural specification-based testing: automated support and experimental evaluation", journal = j-SIGSOFT, volume = "24", number = "6", pages = "285--302", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.318948", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "In this paper, we describe a testing technique, called structural specification-based testing (SST), which utilizes the formal specification of a program unit as the basis for test selection and test coverage measurement. We also describe an automated testing tool, called ADLscope, which supports SST for program units specified in Sun Microsystems' Assertion Definition Language (ADL). ADLscope automatically generates coverage conditions from a program's ADL specification. While the program is tested, ADLscope determines which of these conditions are covered by the tests. An uncovered condition exhibits aspects of the specification inadequately exercised during testing. The tester uses this information to develop new test data to exercise the uncovered conditions. We provide an overview of SST's specification-based test criteria and describe the design and implementation of ADLscope. Specification-based testing is guided by a specification, whereby the testing activity is directly related to what a component under test is supposed to do, rather than what it actually does. Specification-based testing is a significant advance in testing, because it is often more straightforward to accomplish and it can reveal failures that are often missed by traditional code-based testing techniques. As an initial evaluation of the capabilities of specification-based testing, we conducted an experiment to measure defect detection capabilities, code coverage and usability of SST/ADLscope; we report here on the results.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Gyimothy:1999:ERS, author = "Tibor Gyim{\'o}thy and {\'A}rp{\'a}d Besz{\'e}des and Ist{\'a}n Forg{\'a}cs", title = "An efficient relevant slicing method for debugging", journal = j-SIGSOFT, volume = "24", number = "6", pages = "303--321", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319248", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Dynamic program slicing methods are widely used for debugging, because many statements can be ignored in the process of localizing a bug. A dynamic program slice with respect to a variable contains only those statements that actually had an influence on this variable. However, during debugging we also need to identify those statements that actually did not affect the variable but could have affected it had they been evaluated differently. A relevant slice includes these potentially affecting statements as well, therefore it is appropriate for debugging. In this paper a forward algorithm is introduced for the computation of relevant slices of programs. The space requirement of this method does not depend on the number of different dynamic slices nor on the size of the execution history, hence it can be applied for real size applications.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Robillard:1999:AEF, author = "Martin P. Robillard and Gail C. Murphy", title = "Analyzing exception flow in {Java} programs", journal = j-SIGSOFT, volume = "24", number = "6", pages = "322--337", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319251", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Exception handling mechanisms provided by programming languages are intended to ease the difficulty of developing robust software systems. Using these mechanisms, a software developer can describe the exceptional conditions a module might raise, and the response of the module to exceptional conditions that may occur as it is executing. Creating a robust system from such a localized view requires a developer to reason about the flow of exceptions across modules. The use of unchecked exceptions, and in object-oriented languages, subsumption, makes it difficult for a software developer to perform this reasoning manually. In this paper, we describe a tool called Jex that analyzes the flow of exceptions in Java code to produce views of the exception structure. We demonstrate how Jex can help a developer identify program points where exceptions are caught accidentally, where there is an opportunity to add finer-grained recovery code, and where error-handling policies are not being followed.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Naumovich:1999:EAC, author = "Gleb Naumovich and George S. Avrunin and Lori A. Clarke", title = "An efficient algorithm for computing {MHP} information for concurrent {Java} programs", journal = j-SIGSOFT, volume = "24", number = "6", pages = "338--354", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319252", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Information about which statements in a concurrent program may happen in parallel (MHP) has a number of important applications. It can be used in program optimization, debugging, program understanding tools, improving the accuracy of data flow approaches, and detecting synchronization anomalies, such as data races. In this paper we propose a data flow algorithm for computing a conservative estimate of the MHP information for Java programs that has a worst-case time bound that is cubic in the size of the program. We present a preliminary experimental comparison between our algorithm and a reachability analysis algorithm that determines the ``ideal'' static MHP information for concurrent Java programs. This initial experiment indicates that our data flow algorithm precisely computed the ideal MHP information in the vast majority of cases we examined. In the two out of 29 cases where the MHP algorithm turned out to be less than ideally precise, the number of spurious pairs was small compared to the total number of ideal MHP pairs.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bokowski:1999:CSC, author = "Boris Bokowski", title = "{CoffeeStrainer}: statically-checked constraints on the definition and use of types in {Java}", journal = j-SIGSOFT, volume = "24", number = "6", pages = "355--374", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319253", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Usually, programming languages are used according to conventions and rules. Although general rules can be enforced by lint-like tools, there is a large class of rules that cannot be built into such tools because they result from particular design decisions or the reuse of existing software. This paper presents a system, called CoffeeStrainer, that statically checks programmer-specified constraints on Java programs. Unlike previous approaches, which only support constraints that apply to definitions of types, CoffeeStrainer additionally supports a second class of constraints which apply to all uses of a type. Both classes of constraints play an important role for object-oriented class libraries and frameworks, which often make assumptions on their correct use.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fierz:1999:CMC, author = "Hugo Fierz", title = "The {CIP} method: component- and model-based construction of embedded systems", journal = j-SIGSOFT, volume = "24", number = "6", pages = "375--392", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319255", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "CIP is a model-based software development method for embedded systems. The problem of constructing an embedded system is decomposed into a functional and a connection problem. The functional problem is solved by constructing a formal reactive behavioural model. A CIP model consists of concurrent clusters of synchronously cooperating extended state machines. The state machines of a cluster interact by multi-cast events. State machines of different clusters can communicate through asynchronous channels. The construction of CIP models is supported by the CIP Tool, a graphical modelling framework with code generators that transform CIP models into concurrently executable CIP components. The connection problem consists of connecting generated CIP components to the real environment. This problem is solved by means of techniques and tools adapted to the technology of the interface devices. Construction of a CIP model starts from the behaviour of the processes of the real environment, leading to an operational specification of the system behaviour in constructive steps. This approach allows stable interfaces of CIP components to be specified at an early stage, thus supporting concurrent development of their connection to the environment.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Wermelinger:1999:ASA, author = "Michel Wermelinger and Jos{\'e} Luiz Fiadeiro", title = "Algebraic software architecture reconfiguration", journal = j-SIGSOFT, volume = "24", number = "6", pages = "393--409", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319256", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The ability of reconfiguring software architectures in order to adapt them to new requirements or a changing environment has been of growing interest, but there is still not much formal work in the area. Most existing approaches deal with run-time changes in a deficient way. The language to express computations is often at a very low level of specification, and the integration of two different formalisms for the computations and reconfigurations require sometimes substantial changes. To address these problems, we propose a uniform algebraic approach with the following characteristics. Components are written in a high-level program design language with the usual notion of state. The approach combines two existing frameworks --- one to specify architectures, the other to rewrite labelled graphs --- just through small additions to either of them. It deals with certain typical problems such as guaranteeing that new components are introduced in the correct state (possibly transferred from the old components they replace). It shows the relationships between reconfigurations and computations while keeping them separate, because the approach provides a semantics to a given architecture through the algebraic construction of an equivalent program, whose computations can be mirrored at the architectural level.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Fradet:1999:CCM, author = "Pascal Fradet and Daniel {Le M{\'e}tayer} and Micha{\"e}l P{\'e}rin", title = "Consistency checking for multiple view software architectures", journal = j-SIGSOFT, volume = "24", number = "6", pages = "410--428", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319258", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Consistency is a major issue that must be properly addressed when considering multiple view architectures. In this paper, we provide a formal definition of views expressed graphically using diagrams with multiplicities and propose a simple algorithm to check the consistency of diagrams. We also put forward a simple language of constraints to express more precise (intra-view and inter-view) consistency requirements. We sketch a complete decision procedure to decide whether diagrams satisfy a given constraint expressed in this language. Our framework is illustrated with excerpts of a case study: the specification of the architecture of a train control system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Jarzabek:1999:SBC, author = "Stan Jarzabek and Peter Knauber", title = "Synergy between component-based and generative approaches", journal = j-SIGSOFT, volume = "24", number = "6", pages = "429--445", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319260", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "Building software systems out of pre-fabricated components is a very attractive vision. Distributed Component Platforms (DCP) and their visual development environments bring this vision closer to reality than ever. At the same time, some experiences with component libraries warn us about potential problems that arise in case of software system families or systems that evolve over many years of changes. Indeed, implementation level components, when affected by many independent changes, tend to grow in both size and number, impeding reuse. In this paper, we analyze in detail this effect and propose a program construction environment, based on generative techniques, to help in customization and evolution of component-based systems. This solution allows us to reap benefits of DCPs during runtime and, at the same time, keep components under control during system construction and evolution. In the paper, we describe such a construction environment for component-based systems that we built with a commercial generator and illustrate its features with examples from our domain engineering project. The main lesson learnt from our project is that generative techniques can extend the strengths of the component-based approach in two important ways: Firstly, generative techniques automate routine component customization and composition tasks and allow developers work more productively, at a higher abstraction level. Secondly, as custom components with required properties are generated on demand, we do not need to store and manage multiple versions of components, components do not overly grow in size, helping developers keep the complexity of an evolving system under control.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Bayer:1999:TLA, author = "Joachim Bayer and Jean-Fran{\c{c}}ois Girard and Martin W{\"u}rthner and Jean-Marc DeBaud and Martin Apel", title = "Transitioning legacy assets to a product line architecture", journal = j-SIGSOFT, volume = "24", number = "6", pages = "446--463", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319262", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "A successful software system evolves over time, but this evolution often occurs in an ad-hoc fashion. One approach to structure system evolution is the concept of software product lines where a core architecture supports a variety of application contexts. However, in practice, the high cost and high risks of redevelopment as well as the substantial investments made to develop the existing systems most often mandate significant leverage of the legacy assets. Yet, there is little guidance in the literature on how to transition legacy assets into a product line set-up. In this paper, we present RE-PLACE, an approach developed to support the transition of existing software assets towards a product line architecture while taking into account anticipated new system variants. We illustrate this approach with its application in an industrial setting.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Dossick:1999:CMB, author = "Stephen E. Dossick and Gail E. Kaiser", title = "{CHIME}: a metadata-based distributed software development environment", journal = j-SIGSOFT, volume = "24", number = "6", pages = "464--475", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319264", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We introduce CHIME, the Columbia Hypermedia IMmersion Environment, a metadata-based information environment, and describe its potential applications for internet and intranet-based distributed software development. CHIME derives many of its concepts from Multi-User Domains (MUDs), placing users in a semi-automatically generated 3D virtual world representing the software system. Users interact with project artifacts by ``walking around'' the virtual world, where they potentially encounter and collaborate with other users' avatars. CHIME aims to support large software development projects, in which team members are often geographically and temporally dispersed, through novel use of virtual environment technology. We describe the mechanisms through which CHIME worlds are populated with project artifacts, as well as our initial experiments with CHIME and our future goals for the system.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Grimaud:1999:FTI, author = "Gilles Grimaud and Jean-Louis Lanet and Jean-Jacques Vandewalle", title = "{FACADE}: a typed intermediate language dedicated to smart cards", journal = j-SIGSOFT, volume = "24", number = "6", pages = "476--493", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319265", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/java.bib; http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib; http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", abstract = "The use of smart cards to run software modules on demand has become a major business concern for application issuers. Such down-loadable executable content needs to be trusted by the card execution environment in order to ensure that an instruction on a memory area is compliant with the definition of the data stored in this area (i.e. its type). Current solutions for smart cards rely on three techniques. For Java Card, either an off-card verifier-converter performs a static verification of type-safety, or a defensive virtual machine performs the verification at runtime. For other types of open smart cards, no type-checking is carried out and the trust is only based on the containment of applications. Static verification is more efficient and flexible than dynamic techniques. Nevertheless, as the Java verifier cannot fit into a card, the trust is dependent on an external third-party. In this way, the card security has been partly turned to the outside. We propose and describe the FACADE language for which the type-safety verification can be performed statically on-card.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Braberman:1999:VRT, author = "Victor A. Braberman and Miguel Felder", title = "Verification of real-time designs: combining scheduling theory with automatic formal verification", journal = j-SIGSOFT, volume = "24", number = "6", pages = "494--510", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319266", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "We present an automatic approach to verify designs of real-time distributed systems for complex timing requirements. We focus our analysis on designs which adhere to the hypothesis of analytical theory for Fixed-Priority scheduling. Unlike previous formal approaches, we draw from that theory and build small formal models (based on Timed Automata) to be analyzed by means of model checking tools. We are thus integrating scheduling analysis into the framework of automatic formal verification.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", } @Article{Giannakopoulou:1999:CPA, author = "Dimitra Giannakopoulou and Jeff Magee and Jeff Kramer", title = "Checking progress with action priority: is it fair?", journal = j-SIGSOFT, volume = "24", number = "6", pages = "511--527", month = nov, year = "1999", CODEN = "SFENDP", DOI = "https://doi.org/10.1145/318774.319268", ISSN = "0163-5948 (print), 1943-5843 (electronic)", ISSN-L = "0163-5948", bibdate = "Wed Aug 1 17:13:48 MDT 2018", bibsource = "http://www.math.utah.edu/pub/tex/bib/sigsoft1990.bib", abstract = "The liveness characteristics of a system are intimately related to the notion of fairness. However, the task of explicitly modelling fairness constraints is complicated in practice. To address this issue, we propose to check LTS (Labelled Transition System) models under a strong fairness assumption, which can be relaxed with the use of action priority. The combination of the two provides a novel and practical way of dealing with fairness. The approach is presented in the context of a class of liveness properties termed progress, for which it yields an efficient model-checking algorithm. Progress properties cover a wide range of interesting properties of systems, while presenting a clear intuitive meaning to users.", acknowledgement = ack-nhfb, fjournal = "ACM SIGSOFT Software Engineering Notes", journal-URL = "https://dl.acm.org/citation.cfm?id=J728", }