{"title":"A cost model for estimating the cost of developing software in the Ada programming language","authors":"P. Kane, N.D. Leuci, D. Reifer","doi":"10.1109/HICSS.1988.11879","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11879","url":null,"abstract":"The results of a one-year study to determine the impact of Ada on software costs, productivity, and quality are presented. A description is given of the statistical analysis and validation of the forty-one completed projects in the Ada costs database in the areas of cost, distribution of effort, error rates, productivity, and reuse potential. Also described are the development and validation of the mathematical model, the power laws formulated as a result of these activities, the development of the model into an automated cost-estimation package, and experiences with the cost-estimation package.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122410218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Chamberlin, H. Hasselmeier, A. Luniewski, D.P. Paris, B. W. Wade, M. Zolliker
{"title":"Quill: an extensible system for editing documents of mixed type","authors":"D. Chamberlin, H. Hasselmeier, A. Luniewski, D.P. Paris, B. W. Wade, M. Zolliker","doi":"10.1109/HICSS.1988.11821","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11821","url":null,"abstract":"A description is given of Quill, an extensible document creation system that is organized as a collection of cooperating editors, each with its own set of objects and commands. The objects implemented by the various editors can be nested without restriction, forming a hierarchical document that can be described by the Standard Generalized Markup Language (SGML). The user is presented with a 'what you see is what you get' (WYSIWYG) view of the document in which the various objects can be directly manipulated on the display screen. A system shell ensures consistency among the editors and coordinates their foreground and background activities to ensure keystroke responsiveness. Each Quill editor is a programming object that communicate with the shell and with other editors by means of a standard set of procedures. A rigorous specification of the shell/editor interface enables additional editors to be added to the Quill system without affecting the existing editors.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122247278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A classification model of software comprehension","authors":"M. Samadzadeh, W. R. Edwards","doi":"10.1109/HICSS.1988.11848","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11848","url":null,"abstract":"Summary form only given. Measurements of understandability and maintainability of software have traditionally been developed of the basis of graph models, lexical counts, or information theory. The research reported proposes a theoretical foundation for a different way of evaluating software that can lead to a system of metrics. A model is provided that is based on human factors and information theory and can serve as a framework for development of cognitive-oriented measures of software quality.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130844448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Global events and global breakpoints in distributed systems","authors":"D. Haban, W. Weigel","doi":"10.1109/HICSS.1988.11802","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11802","url":null,"abstract":"A solution to the problem of setting breakpoints in distributed systems is described. It is shown what kind of breakpoints are possible, how to detect those breakpoints, and how to halt the system in a consistent state. The communication among the processes may be asynchronous with an arbitrary ordering of messages. The algorithms select between simultaneous events and those ordered according to L. Lamport's happened-before relation (1978). The mechanisms for definition and detection of global breakpoints are implemented in the distributed debugging system DTM (distributed test methodology).<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to form creation based on AND/OR tree","authors":"N. Hirakawa, J. Miyao, T. Kikuno, N. Yoshida","doi":"10.1109/HICSS.1988.11864","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11864","url":null,"abstract":"A basic framework for the design of a prototype form system, CRAFT, is proposed. CRAFT enables users to create (i.e. define and realize) forms with various structures. Form creation is an integrated concept of form definition and form realization. For form definition, a formal form model is introduced. Form realization is specified by using a create graph based on AND/OR trees. CRAFT supports a visual language that provides naive users with an easy visual programming method.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130928454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grain determination for parallel processing systems","authors":"B. Kruatrachue, T. Lewis","doi":"10.1109/HICSS.1988.11797","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11797","url":null,"abstract":"A method of parallel-program optimization called grain packing is introduced that reduces total execution time of a parallel program by balancing execution time and communication time. The new method is applicable to both extended serial and concurrent programming languages, and can be used in languages such as OCCAM, Fortran, and Pascal. It is shown by example that two misconceptions common among programmers can lead to nonoptimal use of parallel processors: (1) load balancing does not give optimal performance in all cases, and (2) explicit parallel constructions in programming languages often lead to nonoptimal partitioning of parallel programs. Grain packing, along with an optimizing scheduler, gives consistently better results than human-engineered scheduling and packing.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116421329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure query processing using AI techniques","authors":"M. Thuraisingham, W. Tsai, T. Keefe","doi":"10.1109/HICSS.1988.11852","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11852","url":null,"abstract":"The use of AI (artificial intelligence) techniques for query processing in a multilevel secure database management system is described. The techniques ensure that a query is modified in such a way that if the modified query is posed, then the response generated will not violate security requirements. These techniques also handle constraints that classify data by content and context, and constraints that classify data that depend on the classifications of other data.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116554352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient decentralized checkpointing in distributed database systems","authors":"S. Son","doi":"10.1109/HICSS.1988.11851","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11851","url":null,"abstract":"The goal of checkpointing in database management systems is to save database states on a separate secure device so that the database can be recovered when errors and failures occur. Recently, the possibility of having a centralized checkpointing mechanism that does not interfere with the transaction processing has been studied. Users are allowed to submit transactions while the checkpointing is in progress, and the transactions are performed in the system concurrently with the checkpointing process. This property of noninterference is highly desirable to real-time applications, where restricting transaction activity during the checkpointing operation is in many cases not feasible. The author presents a decentralized algorithm for noninterfering checkpointing in distributed database systems.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126791482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge based configuration management","authors":"P. Lavency, M. Vanhoedenaghe","doi":"10.1109/HICSS.1988.11791","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11791","url":null,"abstract":"Advanced configuration management systems require explicit representations of various kinds of knowledge. Besides the classical requirements of keeping track of which component versions have been used to build a system, the knowledge that has led to the selection of these versions and the knowledge of compatibility rules between versions are essential to perform many configuration management functions,. A description is given of the languages provided to express version selections in terms of queries and compatibility rules in the system, emphasizing the knowledge representation issues involved here. It is illustrated how queries can be used to represent various aspects of the development methods and to customize the system. An outline is given of the consistency verification technique provided to detect automatically inconsistencies in the rule base or among the assumptions of different developers.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129205452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating explanations from program code: two new approaches","authors":"J. Bauer, C. Specht","doi":"10.1109/HICSS.1988.11786","DOIUrl":"https://doi.org/10.1109/HICSS.1988.11786","url":null,"abstract":"A central issue in help and documentation systems is the task of gaining the information needed for that purpose. Two approaches are provided for generating explanations from the representation that is used for running a program. One of them introduces a novel representation for editor operations that can be used for executing and explaining operations, for searching operations, and for active help. The other does not require such a representation; it generates explanations in German directly from the code.<<ETX>>","PeriodicalId":148246,"journal":{"name":"[1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track","volume":"13 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120939335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}