scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Systems and Software in 1998"


Journal ArticleDOI
TL;DR: This methodology is intended to guide future research in DTD algorithms (since research continues on these algorithms) as well as to provide a classification survey for this area.

229 citations


Journal ArticleDOI
H. Rex Hartson1
TL;DR: This paper reviews some of the theory and modeling supporting the practice of HCI, development life cycles and activities, and much of the practice that constitutes “usability engineering”.

173 citations


Journal ArticleDOI
TL;DR: Evaluating Chidamber and Kemerer metrics by using Kitchenham's metric-evaluation framework and finds deficiencies in some of the C&K metrics, and proposes another metric suite for object-oriented programming.

159 citations


Journal ArticleDOI
TL;DR: Tests of hypotheses derived from the model demonstrate that task–technology fit, computed using methods for computing strategic fit, is associated with increased tool utilization and provides direction for the development of better maintenance support tools.

156 citations


Journal ArticleDOI
TL;DR: This paper quantifies how well experienced software developers predict change by conducting rdia, where rdian is the general activity of predicting changes based on change request and finds that project developers are unaware of their own positive and negative capabilities in predicting change.

110 citations


Journal ArticleDOI
TL;DR: The advantages of multi-threading in DSM systems and the importance of preempted dynamic thread migration are discussed and how some of these are implemented in the MILLIPEDE system are described.

85 citations


Journal ArticleDOI
TL;DR: New complexity and size metrics for effort evaluation and prediction are presented and compared with respect to the most important metrics proposed for the same purpose in the literature.

77 citations


Journal ArticleDOI
TL;DR: This research supports the thesis that there is a set of success factors which are common across organizations and have some predictability relationships to software reuse and investigates if software reuse had a predictive relationship to productivity and quality.

68 citations


Journal ArticleDOI
TL;DR: A practical system to solve the problems of authentication with the concept of public key distribution is presented, which hopes the password authentication system can solve these following problems: • In order to avoid interior personnel of the center from disclosing any passwords, the password table or the verification table must not be stored inside the computer.

55 citations


Journal ArticleDOI
TL;DR: An overview of the Software Quality Assurance (SQA) research domain is presented and a summary of the content and methodological orientation of present research is presented, recommending directions for future research.

46 citations


Journal ArticleDOI
TL;DR: A composable security property based on the principle of an existing one that was developed for the non-interference requirement and used to deal with composition of components linked as a chain is presented.

Journal ArticleDOI
TL;DR: The sensitivity issue is studied for a commonly used software reliability model so that attention can be paid to those parameters that affect the release time significantly.

Journal ArticleDOI
TL;DR: An empirical investigation aimed at finding appropriate measures and establishing simple, yet usable and cost-effective models for estimation and control of object-oriented system projects, was undertaken on a set of objects implemented in a stable environment.

Journal ArticleDOI
Kai-Yuan Cai1
TL;DR: This paper develops a new static model for estimating the number of remaining defects, which coincides with the Mills model in a particular case and shows its attraction in its applicability to a broader scope of circumstances.

Journal ArticleDOI
TL;DR: A number of initiatives taken by Victoria University of Technology to provide support and encouragement for female students in the computing discipline are reported on and research results and strategies employed by other Australian Universities are described.

Journal ArticleDOI
TL;DR: Research is reported on into the design, implementation and performance of RHODOS's process migration facility which reflects RHODos's aspiration to support both parallel execution and load balancing on a distributed system.

Journal ArticleDOI
TL;DR: The aim is to allocate the program modules to processors of a distributed computing system in a manner that maximizes the probability of it being able to successfully access all the files it requires for execution, and the allocation should not violate any of the constraints.

Journal ArticleDOI
TL;DR: An approach and toolset is reported on that enables a developer to construct a Z specification using the wiZe editor, demonstrate its properties by transforming it into an executable form using the ZAL animation system, and explore its adequacy by animating a variety of scenarios.

Journal ArticleDOI
TL;DR: An assessment of high-level PNs from an engineering perspective using a set of categories proposed for classifying several extensions presented in the literature and the modeling power of representative models of each category is discussed.

Journal ArticleDOI
TL;DR: In both these systems, most of the defects are found to be concentrated on relatively few high-defect modules, which points to the need for appropriate risk identification techniques so that defect removal effort can be focused on those high-definition modules for effective quality improvement.

Journal ArticleDOI
TL;DR: The paper describes an approach for facilitating access to a specification/design model by mapping the multiple views of the model to an integrated underlying representation and providing a Dynamic Navigation System for navigating through this representation in an application-independent and method-independent fashion.

Journal ArticleDOI
TL;DR: A new technique for performing static analysis of programs that contain unconstrained pointers is presented, based on the pointer state subgraph: a reduced control flow graph that takes advantage of the fact that in any program there exists a smaller program that computes only the values of pointer variables.

Journal ArticleDOI
TL;DR: The paper classifies systems in terms of their stability, knowability, and predictability and suggests that each dominant systems class requires a diffierent emphasis in the common processes of requirements elicitation, design, development and implementation.

Journal ArticleDOI
TL;DR: In this article, a buffer management scheme for real-time active database systems (RTADBSs) is proposed, which relies on prefetching and priority based buffer replacement.

Journal ArticleDOI
TL;DR: Commenting, naming and structure are found to be of importance in the group when analysed as a whole, but in the sub-group of best performing subjects only the comments had an effect on perceived comprehensibility.

Journal ArticleDOI
TL;DR: Four measures are developed and empirically tested that attempt to quantify the complexity of rule-based Prolog programs in terms of measuring the dependency between rules, and UPN is a significantly better measure of complexity than any of the other measures.

Journal ArticleDOI
TL;DR: A novel, but relatively simple method for using traces of inter-process messages to recover functional software design threads from a large, multi-process system and seems to be effective in identifying the “as built” threads, and in providing unexpected insights even to Software Engineers who are relatively familiar with the system.

Journal ArticleDOI
TL;DR: The findings indicate the presence of object oriented properties in user cognition, which puts the theorized mechanisms of human information processing, such as, cognitive economy, and limited storage space, in proper perspective.

Journal ArticleDOI
TL;DR: The guidelines presented here deal with modularizing event procedures, graphical representation of E-D programs, sharing data between event/general procedures, using user-defined objects, and developing cohesive procedures and forms.

Journal ArticleDOI
TL;DR: It is shown that the proposed load balancing method is based on the coterie, a tool first used in mutual exclusion and vote assignment, and will always perform task migration whenever possible.